
11
Warning!
An incorrect trusted zone configuration may pose a security
risk to your computer.
NOTE:
By default, workstations from a Trusted zone are granted
access to shared files and printers, incoming RPC communication is
enabled, and remote desktop sharing is also available.
3.4 Proxy server setup
If you use a proxy server to mediate connection to the Internet on
a system using ESET Smart Security, it must be specified in Advanced
Setup (F5). To access the
Proxy server
configuration window, click
Miscellaneous > Proxy server
from the Advanced Setup tree. Select
the
Use proxy server
check box, and enter the IP address and port of
the proxy server, along with its authentication data.
If this information is not available, you can attempt to automatically
detect proxy server settings for ESET Smart Security by clicking the
Detect proxy serve
r
button.
NOTE:
Proxy server options for various update profiles may differ. If
this is the case, configure the proxy server in the advanced update
setup.
3.5 Settings protection
ESET Smart Security Settings can be very important from the
perspective of your organization’s security policy. Unauthorized
modifications can potentially endanger the stability and protection
of your system. To password protect the setup parameters, start
from the main menu and click
Setup > Enter entire advanced setup
tree... > User interface > Settings protection
and click the
Enter
password...
button.
Enter a password, confirm it by typing it again, and click
OK
. This
password will be required for any future modifications to ESET Smart
Security settings.