F-Secure Anti-Virus. for Windows Servers. Administrator s Guide

Size: px
Start display at page:

Download "F-Secure Anti-Virus. for Windows Servers. Administrator s Guide"

Transcription

1 F-Secure Anti-Virus for Windows Servers Administrator s Guide

2 "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice. Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation. Copyright F-Secure Corporation. All rights reserved. # F08

3 Contents 1. Welcome... 1 Today's Challenges... 1 The Solution F-Secure Anti-Virus... 1 Administration... 2 Local Interface Installation System Requirements Remote Installation... 4 F-Secure Policy Manager Installation... 5 Remote Installation... 5 Local Installation Centrally Managing F-Secure Anti-Virus F-Secure Policy Manager Console Features... 9 Configuring Settings... 9 Operations Settings Operations... 20

4 Statistics Using F-Secure Anti-Virus Real-Time Protection Scanning for Viruses Manually Shortcut Menu Status Indicator Windows Start Menu How Disinfection Wizard Removes a Virus F-Secure Anti-Virus Local Settings Statistics Real-Time Protection Manual Scanning Updates Updating Virus Definition Databases Update Methods Appendix A. Parameters & Return Codes Using Command-Line Scanner Command-Line Scanner Parameters Command-Line Scanner Return Codes Appendix B. F-Secure Anti-Virus for DOS Installation Scanning for Viruses Updating Command-Line Options Error Codes... 64

5 Technical Support Web Club Virus Descriptions on the Web Electronic Mail Support About F-Secure Corporation The F-Secure Product Family... 72

6

7 1. Welcome Today's Challenges Seven to ten new viruses are found each day, some of them with the ability to spread globally within hours. If a virus enters the corporate network, fighting against it can be very costly, difficult and time consuming. Virus infections often cause big financial losses due to network disruptions, decreased productivity, corrupted data and leaks of confidential data. Also, the company reputation can be in danger if it spreads viruses to its business associates. The Solution F-Secure Anti-Virus for Windows Servers ensures that users who connect with infected machines to the corporate file servers do not spread viruses to others on the network. With F-Secure, antivirus protection is fast, efficient and easy. antivirus installations and management can be done remotely from one central location. 1.1 F-Secure Anti-Virus F-Secure Anti-Virus has an easily accessible user interface, which not only provides important update information, but also makes it possible for users to perform manual scans. You do not have to worry about manually updating virus database updates; F-Secure Anti-Virus with F-Secure BackWeb make sure that the databases are kept up-to-date. F-Secure Anti-Virus provides the network administrator with comprehensive security management features and a three-tier architecture that will scale from a small LAN with only a few workstations, all the 1

8 Chapter 1 Welcome way up to a large WAN with hundreds of thousands of nodes distributed around the globe. Every major function of F-Secure Anti-Virus is transparent to the user, which reduces maintenance costs. Software distribution and alerting functions are based on a three-tier system that uses the HTTP protocol to work in any TCP/IP network. The HTTP protocol will work easily with your existing routers, firewalls, and other components of your network infrastructure. Administration The F-Secure Policy Manager Console utility provides central administration under a three-tier management architecture. The administration tasks include software distribution, updating, alerting, and configuration management. F-Secure Anti-Virus is scalable to enterprise-wide networks through distributed F-Secure Policy Manager Servers and HTTP protocol. F-Secure Management Agent provides statistics from each workstation and sends alerts when a virus is found. The administrator can create and distribute policies that specify different settings for manual scans and real-time protection. Alerts, reports, and messages are viewed in F-Secure Policy Manager Console. Improved support for the industry-standard SNMP protocol. Installation and updates are supported under the Microsoft Systems Management Server (SMS) on Windows networks. Local Interface A new and simple user interface makes the most common functions available from a shortcut menu. A new Disinfection Wizard guides the user through the removal of viruses from the system. The new and easy-to-use virus information database on the F-Secure Web site can be conveniently accessed. All F-Secure Anti-Virus settings can be centrally managed by the administrator. The administrator can determine what is visible in the user interface, thus controlling the level of transparency to the user. 2

9 2. Installation This chapter describes the different installation methods for system administrators who need to install F-Secure Anti-Virus with centrally managed features. 2.1 System Requirements Operating System: Processor: MS Windows NT Server 4.0 with Service Pack 6 or later, MS Windows 2000 Server with Service Pack 3 or later, MS Windows 2000 Advanced Server with Service Pack 3 or later, MS Windows Server 2003, Standard Edition with latest service pack, MS Windows Server 2003, Enterprise Edition with latest service pack Intel Pentium processor Memory: 64 MB for Windows NT Server MB for Windows 2000 Server, Windows Server 2003 Free Hard Disk space: Approximately 30MB During installation 60 MB 3

10 Chapter 2 Installation 2.2 Remote Installation Remote installation is recommended for network environments with more than 50 hosts. This installation method uses F-Secure Policy Manager to push F-Secure Anti-Virus to the hosts. This section describes what F-Secure Policy Manager is and how it works, and what the installation order is. Please read the F-Secure Policy Manager manual on the F-Secure CD if you are not familiar with F-Secure Policy Manager. F-Secure Policy Manager F-Secure Policy Manager provides a scalable way to manage the security of multiple applications on multiple operating systems from one central location. F-Secure Policy Manager can be used to keep security software up-to-date, manage configurations, oversee enterprise compliance and be scaled to handle even the largest, most mobile workforce. F-Secure Policy Manager provides a tightly integrated infrastructure for defining security policies, deploying both policies and applications software to local and remote systems, and monitoring the activities of all systems in the enterprise to ensure compliance with corporate policies and centralized control. F-Secure Policy Manager consists of the following architectural components: F-Secure Policy Manager Server F-Secure Policy Manager Console F-Secure Policy Manager Console can be run on several different platforms. It can be used to remotely deploy F-Secure Management Agent on other hosts with no need for local login scripts, rebooting, or any actions by the end user. F-Secure Management Agent handles all management functions on local hosts. It provides a common interface for all F-Secure applications, and operates within the policy-based management infrastructure to enforce the policies set by the administrator. Policy-Based Management F-Secure Policy Manager uses a concept known as policy-based management. A security policy is a set of well-defined rules that regulate how sensitive information and other resources are managed, protected, and distributed. F-Secure Policy Manager uses policies that are configured by the administrator centrally. 4

11 Installation Section 2.3 This enables the most effective control over security in a corporate environment. Policy-based management implements many functions, including: Remotely controlling and monitoring the behavior of the products. Monitoring statistics provided by the products and F-Secure Management Agent. Remotely starting predefined operations. Transmitting alerts and notifications from the products to the system administrator. Information between F-Secure Policy Manager Console and the hosts is exchanged through the transfer of policy files. NOTE: The management architecture is covered in detail in the F-Secure Policy Manager Administrator s Guide available on the F-Secure CD. Please refer to the manual if you are not familiar with the F-Secure Policy Manager product. 2.3 Installation F-Secure Anti-Virus for Windows Server provides real-time protection for the entire corporate network by protecting information stored on your server. It protects the server by automatically searching for viruses in every file that is being accessed from any host connected to the server. If a virus is found in a file, access to that file is blocked. F-Secure Anti-Virus provides extensive logging, communication and administration features making the administrator s job easier, simpler, and safer. F-Secure Anti-Virus supports all Windows-compatible networks and integrates in F-Secure Policy Manager. Remote Installation You need to have F-Secure Policy Manager already installed before you can install F-Secure Anti-Virus. F-Secure Policy Manager is not installed, install the components in the following order: Step 1 Install F-Secure Policy Manager Server. 5

12 Chapter 2 Installation Step 2 Install F-Secure Policy Manager Console. Step 3 Install F-Secure Management Agent. Step 4 Install F-Secure Anti-Virus. The following list describes which components are installed on the network computers: 1. Administrator s machine F-Secure Policy Manager Console controls all the hosts remotely. 2. Policy Manager Server The Web server that enables communication between hosts and the administrator s machine. 3. File Servers Servers running WinNT 4.0 or Windows 2000/2003 operating systems. F-Secure Management Agent must be remotely installed on the hosts before F-Secure Anti-Virus can be installed remotely. Local Installation To install the software from the F-Secure CD directly, do the following: Step 1 Insert the F-Secure CD in the CD-ROM drive. Step 2 Choose Corporate Use and click Next to continue. Step 3 Click on Anti-Virus Solutions listed under Install Security Software. 6

13 Installation Section 2.3 Step 4 Enter the keycode you received with your software and click Next to continue. Step 5 Click on the product name to start the installation. Step 6 When prompted for the Administration Method, choose Centralized Administration Through Network. Step 7 Under Choose Products to Install, be sure to select the F-Secure Management Agent checkbox. F-Secure Management Agent handles communication between the administrator and the host. Step 8 If you have had F-Secure Anti-Virus previously installed on the server, you are now given an opportunity to add components or to re-install all components. Step 9 When installing F-Secure Anti-Virus, sometimes it may be necessary to change public-key settings and communication settings. You can keep the existing settings or you can define new settings. If you decide to keep the existing settings, the next screen will display the list of changes to the system and the installation will be complete. Otherwise, proceed to Step 10. Step 10 Enter the path to the public Management Key that you created during the F-Secure Policy Manager Console setup. Click the Browse button to search for this key. You can transfer the key to the host by using any of the following methods: 1. Use a shared folder on the file server, or 2. Use a floppy disk, or 3. Send the key as an attachment to an message. 7

14 Chapter 2 Installation Step 11 If you are using F-Secure Policy Manager Server with HTTP protocol, you only need to enter the Web address of the server to complete the installation. If you are using the shared Communication Directory to administer the hosts, you have to enter the user name and password for the domain user account that you created for accessing the Communication Directory on the file server. See the F-Secure Policy Manager Administrator s Guide for more information. Step 12 After you have entered all the information, the changes to your system will be displayed, and you can finish the installation by clicking Finish. 8

15 3. Centrally Managing F-Secure Anti-Virus This chapter describes the F-Secure Policy Manager Console settings and operations. For detailed information on the F-Secure Anti-Virus settings, operations and statistics, see Settings on page 11. In order to distribute F-Secure Anti-Virus and policies to hosts, F-Secure Policy Manager must be installed on an administrator s machine, and F-Secure Management Agent must be installed on the hosts. For more information on installing F-Secure Policy Manager, see the F-Secure Policy Manager on page F-Secure Policy Manager Console Features Configuring Settings The behavior of F-Secure Anti-Virus is determined by settings stored in policy files. All of the settings can be configured centrally using F-Secure Policy Manager Console. Most of the settings can be viewed at the host using F-Secure Settings and Statistics, which can be launched by double-clicking the F icon in the system tray, or by double-clicking the Status Indicator icon. For more information on settings that can be configured, see Settings on page 11. For information on using F-Secure Policy Manager Console to change settings, see the F-Secure Policy Manager Administrator s Guide. 9

16 Chapter 3 Centrally Managing F-Secure Anti-Virus Operations Operations are tasks that the administrator can launch on hosts through F-Secure Policy Manager Console. To display a list of available operations for F-Secure Anti-Virus, select a domain or host in the Domain pane of F-Secure Policy Manager Console, and open the Operations folder in the Product pane. This will display a list of available operations for F-Secure Anti-Virus. When you have selected an operation, click Start to start it. An operation is not actually started until you have distributed the policy and the hosts have received it. You can undo an operation before you have distributed the policy to the hosts. ILaunching a Manual Scan To launch a manual scan of all the hard disks on any host or logical domain, do the following in F-Secure Policy Manager Console: 1. In the Domain pane, select the domain. 2. In the Product pane, browse to Operations and choose Launch Manual Scanning. 3. Click Start. This will force the host to perform a manual scan on all hard disks, according to the manual scanning settings on each host. NOTE: Using this feature will force the host to scan all the local hard drives. Scanning all the local hard drives usually takes a long time, so this feature should not be used carelessly. Distributing Virus Database Updates You can force a host to get new updates of the virus definition databases. To do this, follow this procedure using F-Secure Policy Manager Console: 1. In the Domain pane, select the domain that will receive the update. 2. In the Product pane, browse to Operations, and choose Get Virus Database Update. 10

17 Settings Section Click Start. The hosts will retrieve the latest virus signature database files from the F-Secure Policy Manager Server. 4. Distribute the policy. To automatically update the virus database files on the F-Secure Policy Manager Server, go to and download the F-Secure Anti-Virus Update utility. In order to use the automatic database updates, hosts must have both read and write rights to the folder Program Files\F-Secure Anti-Virus and the directory Program Files\F-Secure\Common\commdir and their subdirectories. NOTE: Distributing virus definition databases is not usually needed, since the default setting for centrally managed hosts is to get the updates automatically the administrator only has to make sure that the updates are downloaded to the F-Secure Policy Manager Server regularly. 3.2 Settings F-Secure Anti-Virus settings can be modified in F-Secure Policy Manager Console through the Policy tab of the Properties pane. New settings will take effect only after the modified policy has been distributed to the hosts. The settings listed below are for Language, Plug-Ins, Virus Definition Database Updates, Real-Time Protection, Manual Scanning and Scheduler. Language Language used in the user interface of F-Secure Anti-Virus. Plug-Ins Opens a table of plug-ins you have installed for F-Secure Anti-Virus. Plug-ins can include third-party scanning engines. The table below describes settings that can be made for each plug-in. Settings followed by an asterisk (*) should not be changed. 11

18 Chapter 3 Centrally Managing F-Secure Anti-Virus To disable a scan engine, change its "Status" value to "Disabled" and distribute the policy. The given scan engine will be disabled on the hosts and it will cease to consume CPU and memory resources. NOTE: Note that virus protection will be effectively removed if all scan engines are disabled. Virus Definition Database Updates The polling interval is specified in F-Secure Management Agent Settings, under Communications > Protocols > Incoming Packages Polling Interval. Setting Poll Automatically Launch Scan After Update Information Site Definition (Default = Enabled) (Default = Disabled) Host will be scanned immediately after being updated with a new virus database. The URL path to an ISP (Internet Service Provider) defined information site, where users are directed after pressing the More Information button in the Update page of the F-Secure Anti-Virus Properties pane. For more information about F-Secure Management Agent, see the F-Secure Policy Manager Administrator s Guide. Update Reminder Setting Reminder Status Reminder Interval Definition (Default = Disabled). Enables the automatic virus definition database update reminders. If this status has been disabled, the user cannot access the Remind me about updates every X days check box in the Updates page of the Properties pane. (Default = 7 days). Specifies how often an update dialog appears. If the above Reminder Status is disabled, this status is also disabled. 12

19 Settings Section 3.2 Setting Allow Manual Updates Force URL Definition (Default = Disabled). Specifies whether manual updates are available to the user or not. If this feature is not available, the Update Reminders dialog and the Update Now button in the Update page of the F-Secure Anti-Virus Properties pane cannot be used. URL for virus signature database downloads. Alert Administrator When Databases Are Old Setting Send a Trap When Databases Are Old Number of Days for Databases to Become Old Definition (Default = Enabled) Specifies whether a trap is sent to the administrator when the virus definition databases have become old. (Default = 30 days) This value (number of days) specifies when the virus definition databases are considered old. An alert will be sent to the administrator when the latest database has become older than the specified number of days. Visual Setting Status Indicator Definition (Default = Enabled). The Status Indicator is an icon in the System Tray that shows the state of real-time protection to the user. Settings for Real-Time Protection Setting Scanning Enabled Definition Activates real-time scanning for viruses. 13

20 Chapter 3 Centrally Managing F-Secure Anti-Virus Setting Memory Scan Boot Sector Scanning File Scanning Definition Specifies whether system memory will be scanned for viruses at start-up. Allows you to set the following options: Action on Infection. Specifies the action taken when an infection is detected. Set by default to Disinfect Automatically. Scan Floppy Disk Boot Sectors. Scan Floppy Boot Sectors on Shutdown. This is done to prevent boot sector viruses from spreading. Allows you to set the following options: Scan Files. Specifies which files to scan. This can be all files, or only files with extensions that are listed under Inclusions and Exclusions (see below). Action on Infection. The action taken when a virus is detected. The action value "Default" means that the action as defined here under this setting will be applied. Set by default to Disinfect Automatically. Scan Network Drives. When enabled, F-Secure Anti-Virus real-time protection scans files accessed over the network (Default =Enabled). Scan when Created or Modified. (Default =Enabled). Scan Inside Archives (Default =Disabled). Scan inside archived files, such as ZIP ARJ LZH TAR TGZ GZ CAB RAR BZ2, MSI, Z and JAR. This depends on the setting Included extensions for compressed files. 14

21 Settings Section 3.2 Setting Inclusions and Exclusions. Definition Specifies files to be scanned or excluded from scanning. If this option is enabled, objects or file extensions can be specified to determine which files will be scanned or excluded from scanning. Options: Included Extensions = list of extensions included Included Extensions for Compressed Files (Default = ZIP ARJ LZH TAR TGZ GZ CAB RAR BZ2, MSU, Z and JAR) Add Extensions Defined in Database Updates (Default = Enabled) Excluded Extensions Enabled (Default = Disabled) Excluded Extensions Excluded Objects Enabled (Default = Disabled) Actions, Advanced These advanced settings specify the behavior of software when detecting infected files with real-time scanning. Under normal conditions, it is not necessary to change the default settings under this branch. Actions Entry Index Action Description Primary Action Definition The index column Verbal description of action. This does not affect the operation of the software in any way. Primary action to be carried out if specified conditions are met. If the primary actions are set to something other than "Default", the action as specified by the "Action on Infection" setting has no effect. This means that any action the user selects from the F-Secure Anti-Virus user interface will be overridden by the action specified in this table. In case the primary actions in this table are set to something other than "Default", it is recommended to change the "Action on Infection" setting to match the selected primary action in this table, and to set the access restriction of the "Action on Infection" setting to "Final". 15

22 Chapter 3 Centrally Managing F-Secure Anti-Virus Actions Entry Secondary Action File State User State File Type Definition Secondary action is carried out in case the primary action fails. Condition specifying file state. Can be Undefined, Existing or Created. Condition specifying the user state. Can be Undefined, Logged On or Not Logged On. Condition specifying file type.can be Undefined, OLE or Mailbox. Actions, Advanced; User Input Timeouts User Input Timeout Setting Ask After Scan Timeout Ask After Scan Timeout for New Infected Files Definition (Default=5) Specifies a timeout value in minutes; the setting will be used if the action to be carried out on infected file has been specified as "Ask After Scan". A value of zero means that the action prompt will never time out. Same as Ask After Scan Timeout but applies to infections found in new files created on the system. Settings for Manual Scanning Setting Memory Scan Definition Specifies whether the system memory will be scanned for viruses once a manual scan has been launched. The Excluded Segment setting specifies the memory segments to be excluded from scanning. 16

23 Settings Section 3.2 Setting Boot Sector Scanning File Scanning Inclusions and Exclusions Definition Allows you to set the following options: Action on infection. The action taken when an infection is detected. Set by default to Disinfect Automatically. Scan Floppy Disk Boot Sectors. Allows you to set the following options: Scan Files. Specifies which files to scan. This can be all files, or only files with extensions that are listed under Inclusions and Exclusions (see below). Action on infection. The action taken when a virus is detected. This is set by default to Disinfect Automatically. Scan Inside Archives. Scan inside archived files, such as ARJ, ZIP, and LZH files. This depends on the setting Included extensions for compressed files. Specifies files to be scanned or excluded from scanning. If this option is enabled, objects or file extensions can be specified to determine which files will be scanned or excluded from scanning. Options: Included Extensions = list of extensions included Included Extensions for Compressed Files (Default = ZIP ARJ LZH TAR TGZ GZ CAB RAR BZ2, MSI, Z and JAR) Add Extensions Defined in Database Updates (Default= Enabled) Excluded Extensions Enabled (Default = Disabled) Excluded Extensions Excluded Objects Enabled (Default = Disabled) Actions, Advanced Actions Entry Index Definition The index column 17

24 Chapter 3 Centrally Managing F-Secure Anti-Virus Actions Entry Action Description Primary Action Secondary Action User State File Type Definition Verbal description of action. This does not affect the operation of the software in any way. Primary action to be carried out if specified conditions are met. If the primary actions are set to something other than "Default", the action as specified by the "Action on Infection" setting has no effect. This means that any action the user selects from the F-Secure Anti-Virus user interface will be overridden by the action specified in this table. In case the primary actions in this table are set to something other than "Default", it is recommended to change the "Action on Infection" setting to match the selected primary action in this table, and to set the access restriction of the "Action on Infection" setting to "Final". Secondary action is carried out in case the primary action fails. Condition specifying the user state. Can be Undefined, Logged On or Not Logged On. Condition specifying file type.can be Undefined, OLE or Mailbox. Scheduler You can set specific scanning, database update and generic tasks with the scheduler. The table below explains the settings for the scheduled tasks. Task Entry Name Description Name of the scheduled task. The name will be visible in the user interface for the scheduled tasks on the user s computer. Note: each task must have a unique name. 18

25 Settings Section 3.2 Task Entry Scheduling Parameters Task Type Description A command-line type of setting consisting of parameters that determine when the scheduled task is to be executed. The following parameters are supported: Execution time (required): "/thh:mm", where HH:MM specifies the start time (local time) of the task execution. Execution time, alternative format for "system idle" tasks: "/timinutes", where MINUTES specifies the number of minutes the system must remain idle for the task to start. "/t" and "/ti" parameters are mutually exclusive. Begin date (optional): "/byyyy-mm-dd", where YYYY-MM-DD specifies the first date to which the scheduled task execution applies. The year number value must have four digits; if the parameter is not specified, the task's scheduling will apply as soon as the policy with the scheduled task is retrieved by the user's computer. End date (optional): "/eyyyy-mm-dd", where YYYY-MM-DD specifies the last date to which the scheduled task execution applies. The year number value must have four digits. Repeat mode (optional): "/rrepeat_mode", where REPEAT_MODE has one of the following values: "once" (task will be executed once only), "daily", "weekly", "monthly" (task will be executed once per day, week or month respectively); if the parameter is not specified, the task will be executed daily. Examples: "/t18:00 /b /rweekly" : execute a task weekly starting on Oct 15, 2001 (Monday), at 18:00. "/ti30" : execute a task daily after the computer has been idle for 30 minuted. Specifies one of the following task types: Scan local drives, Poll for Updates or Generic. 19

26 Chapter 3 Centrally Managing F-Secure Anti-Virus Task Entry Task Type Specific Parameters Description Parameters specific to the task type: Generic tasks: command-line for task (name of executable and command-line parameters). Scan Local Drives and Poll for Updates tasks: this parameter is not used. Operations The operations settings are in the Policy tab of the Properties pane. These settings let you start a remote operation on a host from the administrator's machine. Operations settings also show the status of operations reported through the incremental policy. Operations are not triggered immediately. Operations are triggered on a host only after the policy has been distributed to the host and read by the host. Reset Statistics Reset: Contains a Start button for starting the operation. Variables to Reset: Allow you to select which variables you want to have reset during the operation. Setting Realtime / Object Counters / Scanned Files.../ Object Counters / Scanned Boot Sectors... / Object Counters / Infected Files Definition (Scanned Files) Total number of files scanned. (Scanned Boot Sectors) Total number of boot sectors scanned. (Infected Files) Total number of files infected. 20

27 Settings Section 3.2 Setting.../ Object Counters / Infected Boot Sectors... / Object Counters / Disinfected Files... / Disinfected Boot Sectors... / Renamed Files (Infected Boot Sectors) Total number of boot sectors infected. (Disinfected Files) Total number of files disinfected. Total number of boot sectors disinfected. Total number of files renamed..../ Deleted Files Total number of files deleted.... / Viruses Found in Memory.../ Suspected Files... / Suspected Boot Sectors../ Remotely Accessed Files Definition Total number of infections found in memory. Total number of suspected files found. Total number of suspected boot sectors found. Total number of remotely accessed files found infected. Get Virus Database Update: Contains a Start button for forcing the host to poll for updates. Launch Manual Scanning: Contains a Start button for launching a manual scan on the host. The scanning task will run only after the policy has been distributed to the host. 21

28 Chapter 3 Centrally Managing F-Secure Anti-Virus Statistics The F-Secure Anti-Virus statistics can be viewed in the Status tab in F-Secure Policy Manager Console s Properties pane. Setting Previous Reset of Statistics MIB Version Installation Directory Common/Product Name/ Hotfixes Plug-Ins Plug-in statuses: Definition Timestamp of the previous reset of statistics. The value is the number of seconds elapsed since :00 UTC. If reset has never been done, the value is zero. The running version number of the product MIB. Complete directory path where the product is installed on the host. HotfixesEntry: Index: For indexing hotfix applications. ID: Hotfix package identifier as assigned by F-Secure Corporation. Description: Short description indicating the content or purpose of the hotfix. Release Timestamp: Hotfix manufacture or release timestamp. Product Version: Product version on top of which the hotfix was applied. Product Build: Product build on top of which the hotfix was applied. Application Timestamp: Timestamp of the hotfix application. Information and status of the plug-ins installed on the host; displayed as a table. 0 = Not loaded 1 = Loaded but disabled 2 = Loaded and enabled 22

29 Settings Section 3.2 Virus Database Updates Setting Last Remind Date Number of Database Updates Received Current Detection Rate Definition When the virus signature database update reminder was shown the last time. Number of virus definition database updates received since the first-time installation of the product. Measures the detection rate of the product. It is the sum of virus definition database record counts of all scan engines used by the product. This value should not be interpreted as the count of different viruses detected by the product. Real-Time Statistics Real-Time Statistics/ Object Counters Setting Realtime / Object Counters / Scanned Files.../ Object Counters / Scanned Boot Sectors.../ Object Counters / Infected Files Definition (Scanned Files) Total number of files scanned. (Scanned Boot Sectors) Total number of boot sectors scanned. (Infected Files) Total number of files infected. 23

30 Chapter 3 Centrally Managing F-Secure Anti-Virus Setting... / Object Counters / Infected Boot Sectors... / Object Counters / Disinfected Files.../ Disinfected Boot Sectors... / Renamed Files Definition (Infected Boot Sectors) Total number of boot sectors infected. (Disinfected Files) Total number of files disinfected. Total number of boot sectors disinfected. Total number of files renamed..../ Deleted Files Total number of files deleted.... / Viruses Found in Memory.../ Suspected Files... / Suspected Boot Sectors... / Remotely Accessed Files / Last Time Infected Object Was Detected Total number of infections found in memory. Total number of suspected files found. Total number of suspected boot sectors found. An estimate of the number of remotely accessed files found infected. The last time an infection was found (elapsed seconds since :00 UTC). 24

31 Settings Section 3.2 Real-Time Statistics / Object Counters, Since First-Time Installation Object Counters that will not be reset at reboot. Scanned Files Scanned Boot Sectors Infected Files Infected Boot Sectors Disinfected Files Disinfected Boot Sectors Renamed Files Deleted Files Real-Time Protection Daeactivations Definition Number of files scanned. Number of boot sectors scanned. Number of infected files detected. Number of infected boot sectors detected. Number of files disinfected. Number of boot sectors disinfected. Number of files renamed. Number of files deleted. Shows the number of times real-time protection has been deactivated on the computer since first-time installation. Real-Time Statistics / File Scanning Setting Inclusions and Exclusions Definition Included Extensions: List of file name extensions included for scanning. The list is a combination of extensions defined in policy and database updates, unless adding of extensions defined in database updates has been disabled. 25

32 Chapter 3 Centrally Managing F-Secure Anti-Virus Manual Scanning Statistics Manual Scanning Statistics / Object Counters Setting Realtime / Object Counters / Scanned Files.../ Object Counters / Scanned Boot Sectors.../ Object Counters / Infected Files... / Object Counters / Infected Boot Sectors... / Object Counters / Disinfected Files... / Disinfected Boot Sectors.../ Renamed Files Definition (Scanned Files) Total number of files scanned. (Scanned Boot Sectors) Total number of boot sectors scanned. (Infected Files) Total number of files infected. (Infected Boot Sectors) Total number of boot sectors infected. (Disinfected Files) Total number of files disinfected. Total number of boot sectors disinfected. Total number of files renamed.... / Deleted Files Total number of files deleted.... / Viruses found in Memory Total number of infections found in memory 26

33 Settings Section 3.2 Setting... / Suspected Files... / Suspected Boot Sectors.../ Last Time Infected Object Was Detected Database Date Definition Total number of files found with a suspected virus. Total number of boot sectors found with a suspected virus. The last time an infection was found (elapsed seconds since :00 UTC). Tells the current virus signature database date (elapsed seconds since :00 UTC). Manual Scanning Statistics / Object Counters, Since First-Time Installation Setting Scanned Files Scanned Boot Sectors Infected Files Infected Boot Sectors Disinfected Files Disinfected Boot Sectors Renamed Files Deleted Files Definition Number of files scanned. Number of boot sectors scanned. Number of infected files detected. Number of infected boot sectors detected. Number of files disinfected. Number of boot sectors disinfected. Number of files renamed. Number of files deleted. 27

34 Chapter 3 Centrally Managing F-Secure Anti-Virus Manual Scanning Statistics / File Scanning Setting Inclusions and Excllusions Definition Included Extensions: List of file name extensions included for scanning. The list is a combination of extensions defined in policy and database updates, unless adding of extensions defined in database updates has been disabled. Common Scanning Statistics Statistics common to both real-time scanning and manual scanning. Setting Last Infection Information.../Timestamp.../Virus Name.../Infected Object Name.../Action Taken Definition Information about the last infection detected on the computer. Time of encountering the infection (as seconds since :00 UTC). Name of the virus, trojan or worm. Name of the infected object. Information about the action taken on the infected object. 28

35 Settings Section 3.2 Scheduler Statistics for scheduled tasks. Setting Scheduled TasksEntry/ Name = Scheduled task.../last Execution Time.../Last Exit Code=0.../System Scheduler Error Code =0 Defintion Name of the scheduled task. The name will be visible in user interface for scheduled tasks on user's computer. Note: each task must have a unique name. Date and time of last execution of the task, in format "YYYY-MM-DD hh:mm" (local time). If empty then the task has not been executed yet. Exit code of last execution of the task. Error code from the Windows System Task Scheduler (component of the operating system that is responsible for executing the scheduled tasks). 29

36 4. Using F-Secure Anti-Virus This chapter covers the following topics: What Real-Time Protection is, and how it functions How to run manual scans on disks, folders and diskettes How F-Secure Anti-Virus Disinfection Wizard works when a virus is detected What the F-Secure Anti-Virus user settings are, and how to use them. 4.1 Real-Time Protection To see if Real-Time Protection is active, check the Status Indicator icon in the System Tray in the lower right corner of the screen. Alternatively, you can double-click the (F-Secure) icon in the System tray to open F-Secure Settings and Statistics. If the status of F-Secure Anti-Virus is Enabled, Real-time Protection is active and providing continuous protection. Status Indicator Status Real-Time Protection is enabled. 30

37 Scanning for Viruses Manually Section 4.2 Real-Time Protection is disabled. Real-Time Protection is malfunctioning. These may mean that some components are not working.you can test the virus protection with the EICAR Standard Anti-Virus Test File. Virus definition databases are old. To update them, right-click the Status Indicator icon and select Update Virus Definition Databases. For information on the Status Indicator features, go to the section Status Indicator on page Scanning for Viruses Manually The real-time detection features of F-Secure Anti-Virus ensure the strongest protection against viruses automatically. The information in this section is for reference in case you want to run a manual scan. During manual scanning the Manual Scan Statistics dialog box displays a progress indicator and statistics for the scan. The scan can be interrupted by clicking Stop. A report is generated after the scan is completed. You can view the report in your Web browser by clicking Show Report. 31

38 Chapter 4 Using F-Secure Anti-Virus You can start a manual scan from one of the following: Shortcut menu (right-click on a file, folder or disk) Status Indicator (right-click on the icon to select one of the scan actions) Windows Start menu (right-click on the menu) Shortcut Menu To scan a file, folder, or disk for viruses, right-click its icon, and choose Scan Folders for Viruses from the shortcut menu. Any file, folder, or drive can be scanned this way, regardless of extension. 32

39 Scanning for Viruses Manually Section 4.2 Status Indicator The Status Indicator icon is next to the F-Secure icon in the system tray. Right-click the Status Indicator to open the pop-up menu. The pop-up menu has the following actions: Scan All Hard Disks Scan Diskette Scan Target Properties Update Virus Definition Databases 33

40 Chapter 4 Using F-Secure Anti-Virus Scan Options To start a manual scan, right-click the Status Indicator, and choose one of the scan actions listed in the pop-up menu: Scan All Hard Disks, Scan Diskette or Scan Target. If you choose Scan All Hard Disks, all of the hard disks will be scanned. If you choose Scan Diskette, the diskette you inserted will be skanned. If you choose Scan Target, the folder or disk that you selected will be scanned. The Manual Scan Statistics dialog box displays a progress indicator and statistics during all of the scan actions described above. Properties If you select Properties from the Status Indicator pop-up menu, you can view the F-Secure Anti-Virus status and user settings information. The status is Enabled if real-time protection is active, and Disabled if it is not active. Click the Properties button to access the user settings information. For more details on user settings, go to F-Secure Anti-Virus Local Settings on page 40. You can also open the Properties dialog directly by double-clicking the Status Indicator icon in the system tray. Update Virus Definition Databases For information on virus definition databases, go to Updating Virus Definition Databases on page 49. Windows Start Menu You can scan hard disks, diskettes, and folders from the Windows Start menu. To start a manual scan, select one of the following scan commands on the menu: Scan all local hard disks, Scan diskette or Scan folder. If you select Scan folder, you will need to select a folder or disk to scan. 34

41 How Disinfection Wizard Removes a Virus Section How Disinfection Wizard Removes a Virus When F-Secure Anti-Virus detects a virus, it starts Disinfection Wizard by default. Administrators can change this in the security policy. NOTE: The default is disinfect automatically. 35

42 Chapter 4 Using F-Secure Anti-Virus Step 1 Virus Detected Disinfection Wizard opens a dialog with the name of the detected virus displayed. Disinfection Wizard will disinfect the object by default within the time set. You can stop the timer by clicking the Stop Timer button, or by clicking Next. If you are a corporate user, you can view the timer settings in Settings on page 11. For information about the virus, click on its name, and then click the Virus Info button. The Virus Information page will display information about the virus detected. If the virus is new, it may not yet be described here. Check the Virus Information Database at our Web site for the latest information. To proceed with the virus disinfection, click Next. 36

43 How Disinfection Wizard Removes a Virus Section 4.3 Step 2 Action Taken A list of infected objects will be displayed. An object can, for example, be a document file that a virus has used to spread. In the Action to Take box, choose the action to be taken on the infected objects. Disinfect and Rename are the recommended actions, as these actions do not destroy the objects the virus is attached to. WARNING: Please remember that if you select Delete as the action to be taken, the object that is infected will also be deleted. After you have chosen the action to be taken, click Next, and Disinfection Wizard will perform the action automatically on all of the selected objects. 37

44 Chapter 4 Using F-Secure Anti-Virus Step 3 Action Results The results of the action will be displayed after the action has been taken. Click Next to exit Disinfection Wizard. 38

45 How Disinfection Wizard Removes a Virus Section 4.3 Step 4 Closing Disinfection Wizard Click Finish to close the dialog. NOTE: A report is generated in manual scanning only. In real-time scanning the Finish button does not contain the option to generate a report. The scan report is sent to the administrator if the program is centrally managed. The administrator can view the report in F-Secure Policy Manager Console (in the Reports page of the Properties pane). The report contains links to corresponding virus descriptions in the Web Club s virus database. The administrator can configure F-Secure Anti-Virus to automatically remove viruses from the computer without prompting for any action. In this case, Disinfection Wizard does not run. 39

46 Chapter 4 Using F-Secure Anti-Virus 4.4 F-Secure Anti-Virus Local Settings You can view and modify the F-Secure Anti-Virus local settings by double-clicking the Status Indicator icon in the system tray. The F-Secure Anti-Virus user settings dialog will open directly.you can also open the user settings by double-clicking the F-Secure icon in the system tray. The F-Secure Settings and Statistics dialog will open and display a list of installed F-Secure products. You can either double-click the F-Secure Anti-Virus application, or click Properties to open the F-Secure Anti-Virus Properties dialog box. In the F-Secure Anti-Virus Properties dialog box, you can specify different settings for Real-time Protection, Manual Scanning and Updates. The F-Secure Anti-Virus Properties dialog box also has information on scan statistics since the initial start-up of the computer. Action Statistics Real-Time Protection Manual Scanning Updates Description Displays results of the real-time scan. Settings for transparent, continuous protection provided by F-Secure Anti-Virus while it runs in the background, scanning files as they are accessed. Settings for the scanning tasks that are started manually. Settings for virus definition database update reminders for manual updates. The Update Now button starts immediate definition database updates Real-time scans should be restricted so that they do not use a large amount of system resources, which can occur when scanning compressed files and other special files. One way to save system resources is to avoid scanning archives. Because manual scans are only performed when desired, they can be set to scan larger groups of files, which will consume more system resources. Statistics The Statistics dialog of the F-Secure Anti-Virus Properties dialog box displays results of the real-time scan for the current session. 40

47 F-Secure Anti-Virus Local Settings Section 4.4 Real-Time Protection In the Real-Time Protection dialog of the F-Secure Anti-Virus Properties dialog box, you can set what action is taken when an infected file is found, and which files are scanned during real-time scanning. To enable Real-Time Protection, tick the Enable Protection check box. To disable Real-Time Protection, clear the Enable Protection check box. Action to Take on Infected Files In the Action to Take on Infected Files box, you can choose what action F-Secure Anti-Virus will take when an infected file is detected. Choose one of the following actions: Action Ask after scan Definition Starts the Disinfection Wizard when an infected file is detected. 41

48 Chapter 4 Using F-Secure Anti-Virus Action Disinfect automatically Rename automatically Delete automatically Report only Definition Disinfects the file automatically when a virus is detected (by default). Renames the file automatically when a virus is found. Deletes the file automatically when a virus is found. Note that this option also deletes the object the virus is attached to, so this option is not recommended. Indicates that a virus is found, and does not let you open the infected object. This option only reports, it does does not take any action against the virus. Scanning Options Under Scanning Options, you can choose which files will be scanned in real-time. 42

49 F-Secure Anti-Virus Local Settings Section 4.4 The following options are available: All files All files will be scanned, regardless of their file extension. This option is not recommended because it might slow down system performance considerably. Files with these extensions Files with specified extensions will be scanned. To specify files that have no extension, type. You can use the wildcard?. Enter each file extension separated by a space. This option is recommended for real-time protection. Exclude files with these extensions You can specify files that will not be scanned. NOTE: Invalid characters are not accepted in these fields. They are replaced with the underscore ( _ ) symbol if copied from the clipboard. Exclude objects You can specify individual files or folders that will not be scanned. To do so, click the Select button to open the Exclude from scanning dialog box (see screenshot below). In the dialog box, select the files or folders you want to exclude from scanning and click the Add button. To remove any files or folders from the Excluded objects list, select the files or folders, and click the Remove button. The files or folders will then be included in the scans again. 43

50 Chapter 4 Using F-Secure Anti-Virus Scan inside compressed files Select this check box to scan inside compressed ZIP, ARJ, LZH, RAR, CAB, TAR, BZ2, GZ, JAR,.MSI,.Z and TGZ files. Scanning inside large compressed files might use a lot of system resources and slow down the system, therefore it is not recommended with real-time protection. 44

51 F-Secure Anti-Virus Local Settings Section 4.4 Manual Scanning The settings for manual scan operations can be specified in the Manual Scanning dialog of the F-Secure Anti-Virus Properties dialog box. You can set what action is taken when an infected file is found, and which files are scanned during manual scanning. Action to Take on Infected Files In the Action to Take on Infected Files box, you can choose what action F-Secure Anti-Virus will take when an infected file is detected. You can choose Ask after Scan, Disinfect automatically, Rename automatically, Delete automatically or Report Only: Action Ask after Scan Disinfect automatically Rename automatically Delete automatically Report only Definition Starts the Disinfection Wizard when an infected file is detected. Disinfects the file automatically when a virus is detected (by default). Renames the file automatically when a virus is found. Deletes the file automatically when a virus is found. Note that this option also deletes the object the virus is attached to, so this option is not recommended. Generates an HTML report regardless whether infections were found or not. Scanning Options Under Scanning Options, you can choose which files will be scanned during the manual scanning operation. 45

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System

More information

F-Secure E-mail and Server Security. Administrator's Guide

F-Secure E-mail and Server Security. Administrator's Guide F-Secure E-mail and Server Security Administrator's Guide TOC F-Secure E-mail and Server Security Contents Preface: Disclaimer...vi Chapter 1: About This Guide...7 1.1 Introduction...8 1.1.1 Product contents...8

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

F-Secure Policy Manager. Administrator's Guide

F-Secure Policy Manager. Administrator's Guide F-Secure Policy Manager Administrator's Guide TOC F-Secure Policy Manager Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8

More information

About This Guide... 4. Signature Manager Outlook Edition Overview... 5

About This Guide... 4. Signature Manager Outlook Edition Overview... 5 Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

F-Secure Policy Manager. Administrator's Guide

F-Secure Policy Manager. Administrator's Guide F-Secure Policy Manager Administrator's Guide F-Secure Policy Manager TOC 3 Contents Chapter 1: Introduction...7 System requirements...8 Policy Manager Server...8 Policy Manager Console...8 Main components...9

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

P e r s o n a l E d i t i o n For Windows 95, 98, NT

P e r s o n a l E d i t i o n For Windows 95, 98, NT P e r s o n a l E d i t i o n For Windows 95, 98, NT Getting Started Version 5.0 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end

More information

RESCUE CD. User s Guide

RESCUE CD. User s Guide RESCUE CD User s Guide 2 CONTENTS 1. When to use the Rescue CD 2 1.1 System Requirements 2 1.2 Using the Rescue CD 3 1.2.1 Using a USB drive 3 Recommended method 3 Alternative method 4 1.2.2 Automate the

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Remote Console Installation & Setup Guide. November 2009

Remote Console Installation & Setup Guide. November 2009 Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Crystal Reports Installation Guide

Crystal Reports Installation Guide Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks

More information

F-Secure Policy Manager. Administrator's Guide

F-Secure Policy Manager. Administrator's Guide F-Secure Policy Manager Administrator's Guide F-Secure Policy Manager TOC 2 Contents Chapter 1: Introduction...8 1.1 System requirements...9 1.1.1 Policy Manager Server...9 1.1.2 Policy Manager Console...10

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Introduction. This white paper provides technical information on how to approach these steps with Symantec Antivirus Corporate edition.

Introduction. This white paper provides technical information on how to approach these steps with Symantec Antivirus Corporate edition. Introduction The process of updating virus definitions on workstations protected by Deep Freeze Enterprise involves three fundamental steps: 1. Rebooting the workstations into a Thawed state so the updates

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

F-Secure Anti-Virus for Microsoft Exchange. Deployment Guide

F-Secure Anti-Virus for Microsoft Exchange. Deployment Guide F-Secure Anti-Virus for Microsoft Exchange Deployment Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either

More information

email-lead Grabber Business 2010 User Guide

email-lead Grabber Business 2010 User Guide email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks

More information

SOS Suite Installation Guide

SOS Suite Installation Guide SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing

More information

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1 EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014 Version 1 NEC EXPRESSCLUSTER X 3.x for Windows SQL Server 2014 Quick Start Guide Document Number ECX-MSSQL2014-QSG, Version

More information

Administrator s Guide

Administrator s Guide Administrator s Guide Citrix Network Manager for MetaFrame XPe Version 1.0 Citrix Systems, Inc. Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

Network Scanner Tool R3.1. User s Guide Version 3.0.04

Network Scanner Tool R3.1. User s Guide Version 3.0.04 Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,

More information

F-Secure E-mail and Server Security. Administrator s Guide

F-Secure E-mail and Server Security. Administrator s Guide F-Secure E-mail and Server Security Administrator s Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks

More information

File Auditor for NAS, Net App Edition

File Auditor for NAS, Net App Edition File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0

Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0 Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0 Product version: 9.5 Document date: November 2010 Contents 1 About this guide...3 2 Overview...4 3 System requirements...5

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Exclaimer Signature Manager 2.0 User Manual

Exclaimer Signature Manager 2.0 User Manual Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How Does it Work?... 11 But That's Not All...... 12 And

More information

12 NETWORK MANAGEMENT

12 NETWORK MANAGEMENT 12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

SmartSync Monitor Help

SmartSync Monitor Help 1.0 (Build 15) 2 Table of Contents Foreword 0 Part I Welcome to SmartSync Monitor 3 Part II Getting Started 4 1 Copyright... 4 2 System... requirements and installation 4 3 Uninstalling... 5 6 Part III

More information

VPOP3 Your email post office Getting Started Guide

VPOP3 Your email post office Getting Started Guide VPOP3 Your email post office Getting Started Guide VPOP3 Getting Started Guide, version 2.1 1 Copyright Statement This manual is proprietary information of Paul Smith Computer Services and is not to be

More information

Windows 2003 Server Installation Guide

Windows 2003 Server Installation Guide Windows 2003 Server Installation Guide Revision 2.0 April 14, 2011 Licenses This manual is the exclusive property of Prometric, Inc. This manual is licensed for use with restrictions to authorized centers

More information

Getting Started Guide

Getting Started Guide Getting Started Guide www.exclaimer.com Contents About This Guide... 2 Mail Disclaimers Overview... 3 What Does Exclaimer Mail Disclaimers Do?... 3 But That s Not All... 3 And There s More... 3 How Does

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

Managing Software Updates with System Center 2012 R2 Configuration Manager

Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES

More information

Getting Started Guide

Getting Started Guide Getting Started Guide www.exclaimer.com Contents About This Guide... 2 Signature Manager Overview... 3 How does it Work?... 3 But That s Not All... 4 And There s More... 4 Licensing... 5 Licensing Information...

More information

Symantec pcanywhere Administrator s Guide

Symantec pcanywhere Administrator s Guide Symantec pcanywhere Administrator s Guide Symantec pcanywhere Administrator s Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

Installing F-Secure Anti-Virus (FSAV) Table of Contents. FSAV 8.x and FSLS 7.x End of Life. FSAV 9.x and FSLS 9.x End of Life

Installing F-Secure Anti-Virus (FSAV) Table of Contents. FSAV 8.x and FSLS 7.x End of Life. FSAV 9.x and FSLS 9.x End of Life Installing F-Secure Anti-Virus (FSAV) Last update: 15 Jul 2015 Please see also the LISTSERV/F-Secure FAQ for further information. Table of Contents FSAV 4.x, 5.x and 7.x End of Life FSAV 8.x and FSLS 7.x

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information