Содержание
......................................................................................................................5
Введение1.
...................................................................................................................................................................................................................5Новые возможности версии 21.1
...................................................................................................................................................................................................................9Минимальные требования к системе1.2
......................................................................................................................10
Пользователи, подключенные к серверу ESET Remote Administrator2.
...................................................................................................................................................................................................................11Сервер ESET Remote Administrator2.1
...................................................................................................................................................................................................................11Веб-консоль2.2
...................................................................................................................................................................................................................12Прокси-сервер2.3
...................................................................................................................................................................................................................12Агент2.4
...................................................................................................................................................................................................................12RD Sensor2.5
......................................................................................................................13
Удаленная установка3.
......................................................................................................................13
Локальная установка на устройство4.
...................................................................................................................................................................................................................14Загрузка с веб-сайта ESET4.1
...................................................................................................................................................................................................................15Загрузка из интернет-магазина Google Play4.2
...................................................................................................................................................................................................................16Мастер начальной настройки4.3
......................................................................................................................17
Удаление5.
......................................................................................................................17
Активация продукта6.
......................................................................................................................18
Защита от вирусов7.
...................................................................................................................................................................................................................19Автоматические сканирования7.1
...................................................................................................................................................................................................................20Журналы сканирования7.2
...................................................................................................................................................................................................................21Правила игнорирования7.3
...................................................................................................................................................................................................................21Дополнительные параметры7.4
......................................................................................................................22
Антивор8.
...................................................................................................................................................................................................................24Контакты администратора8.1
...............................................................................................................................................................................................24Добавление контактов администратора
8.1.1
...................................................................................................................................................................................................................24Информация на заблокированном экране8.2
...................................................................................................................................................................................................................24Доверенные SIM-карты8.3
...................................................................................................................................................................................................................24Удаленные команды8.4
......................................................................................................................25
Контроль приложений9.
...................................................................................................................................................................................................................26Правила блокирования9.1
...............................................................................................................................................................................................26Блокировка по имени приложения
9.1.1
....................................................................................................................................................................................27Блокировка приложений по имени
9.1.1.1
...............................................................................................................................................................................................27Блокировка по категории приложений
9.1.2
....................................................................................................................................................................................27Блокировка приложений по категориям
9.1.2.1
...............................................................................................................................................................................................28Блокировка приложений по типу разрешений
9.1.3
....................................................................................................................................................................................28Блокировка приложений по типу разрешений
9.1.3.1
...............................................................................................................................................................................................28Блокировка неизвестных источников
9.1.4
...................................................................................................................................................................................................................29Исключения9.2
...............................................................................................................................................................................................29Добавление исключений
9.2.1
...................................................................................................................................................................................................................30Обязательные приложения9.3
...................................................................................................................................................................................................................30Разрешенные приложения9.4
...................................................................................................................................................................................................................31Разрешения9.5
...................................................................................................................................................................................................................32Использование9.6