background image

Trusted zone setup

After the installation has completed 
and a network connection is detected, 
a prompt window allowing you to 
configure a trusted zone will appear. 
The window shows the local subnet 
defined in your computer’s system 
setup. These options only affect the 
visibility of your computer in the local 
network, not the internet. There are 
two access modes available:

Strict protection

 – select this option 

if you do not want to share files and 
folders on your computer and want 

your computer to be invisible to other 
users on the same network. This 
setting is recommended for users with 
a wireless connection.

Allow sharing

 – select this option if 

you want to be able to share files and 
folders on your computer and want 
your computer to be visible to other 
users on the same network. This 
setting is recommended for local home 
or office trusted networks.

Summary of Contents for NOD32 ANTIVIRUS 4 - FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008

Page 1: ...Quick Start Guide Microsoft Windows 7 Vista XP 2000 2003 2008...

Page 2: ...us system ESET Smart Security continues to deliver unprecedented protection against zero day threats without the need for constant reactive signature updates to recognize the threats The integrated fi...

Page 3: ...s and cleans more known and unknown viruses worms trojans and rootkits than any other security product Antivirus Prevents unauthorized users from gaining access to your computer Monitors traffic to an...

Page 4: ...program updates It is vitally important for the program to update regularly to provide the maximum level of protection against the latest threats The ESET Smart Security setup options allow you to ad...

Page 5: ......

Page 6: ...ation To launch the installer wizard either do one of the following If you install from the installation CD insert the CD into the CD ROM Installation drive and the installation should automatically b...

Page 7: ...information will be sent to the email address you supplied when activating Activate using a Username and Password If you already have a valid username and password select the Activate using a Username...

Page 8: ...a security risk the user s consent is required to enable detection We recommend selecting the Enable detection of potentially unwanted applications option Click NEXT to proceed to the next step Comple...

Page 9: ...ternet There are two access modes available Strict protection select this option if you do not want to share files and folders on your computer and want your computer to be invisible to other users on...

Page 10: ...urity Display user interface If your license has expired and you have received a new username and password after purchasing a renewal or you did not enter your username and password during installatio...

Page 11: ...ve not entered your User name and Password during installation and no update has been performed yet we recommend starting the update manually as follows Select Update in the left pane of the main ESET...

Page 12: ...em tray area You should be able to continue working as normal while the scan takes place ESET Smart Security s current protection status is indicated in the following ways The system tray icon A detai...

Page 13: ...alists are ready to assist you in resolving potential problems Before contacting technical support we strongly recommend that you search for a solution on the ESET website first This will help you res...

Page 14: ...dition to the issue description the program also supports submission of other important information to ESET that can help find the source of the problem We strongly recommend that you leave all option...

Page 15: ...A technical support representative will contact you as soon as possible...

Page 16: ...reatSense ThreatSense Net and or other mentioned products of ESET spol s r o are registered trademarks of ESET spol s r o Other companies mentioned here or products may be registered trademarks of its...

Reviews: