Managed Antivirus Quick Start Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Managed Antivirus Quick Start Guide"

Transcription

1 Quick Start Guide

2 Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt Software does not believe in Bloatware and the VIPRE Enterprise Antivirus agent delivers high-performance, comprehensive endpoint malware protection with low system resource usage. Clean, fast, and powerful: 'by admins for admins'. We couldn t wait to get our hands on VIPRE and are pleased to announce that Dashboard v5.17 and Agent v8.8 Release Candidate utilize this technology to provide a Managed Antivirus solution that can be deployed, configured, monitored and reported on, all from your GFI MAX RemoteManagement Dashboard. Like Patch Management and Take Control before that, deployment is flexible and Managed Antivirus can be enabled, on individual servers and workstations or on all servers and workstations at a client or site. The Advanced Monitoring Agent on these servers and workstations will then download, install and configure the Managed Antivirus agent with the appropriate protection policy for that type of device at that client. From your GFI MAX RemoteManagement Dashboard, you can:» Enable Managed Antivirus on individual servers and workstations or on all servers and workstations at a client or site.» Configure every aspect of the Managed Antivirus agent including scan schedules, remediation action (i.e. what to do if a threat is discovered) and file and folder exclusions.» Save this as a protection policy for use on similar types of device at other clients and sites.» Receive alerts if a threat is quarantined and choose to delete or release from quarantine.» Start, Pause, Resume and Cancel scans all from the Dashboard!» View reports that demonstrate the service you re providing. This document describes the simple steps to follow to start doing all of this today! Step 1 Update to Agent v8.8 RC Managed Antivirus requires Advanced Monitoring Agent v8.8 Release Candidate. From the Agent menu, select Download Agent v8.8 RC and run this on each server and workstation on which Managed Antivirus is to be enabled. Alternatively, select Download Site Installation Package to generate a silent installer for installation on multiple workstations via Group Policies or the oneclick Remote Worker installer for workstations not connected to Active Directory. All existing configuration settings are retained when the Agent is updated. The Summary tab displays Agent Supported Features reflecting whether Managed Antivirus is available. 2

3 Please note that Managed Antivirus can only be used at sites where there is no proxy server or where that proxy server uses BASIC authentication only. Also, Managed Antivirus cannot be used on Windows Agent v8.8 should be available for automatic update late May Step 2 Designate a Site Concentrator (if required) Managed Antivirus uses incremental differences in the Antivirus pattern definition updates meaning downloads are usually less than 100KB. However, the initial Antivirus pattern definition download can be as much as 60MB on each server or workstation. If there are a large number of workstations at a site, then a server at that site running Agent v8.8 can be designated as a Site Concentrator for that site. The Site Concentrator will download and cache both the initial Antivirus pattern definition as well as the incremental difference updates for use by other Agents at the site. These other Agents, then download them from the Site Concentrator, ensuring that each file is downloaded only once, reducing external network traffic. Select the required site in the Dashboard and then from the Edit menu, select Edit Site and the Site Concentrator tab. Select the server (running Agent v8.8) that is to act as the Site Concentrator and also the port on the Server that other Agents at that site should connect to. Please note that if you have a firewall running on the server, you may need to create a rule to allow Agents to connect to this port. 3

4 If you do not wish the downloaded files to be cached on C:\ drive, you can also optionally specify the drive and path where the cached downloaded files are to be stored. Please ensure that there is sufficient free disk space on the specified drive. Files are removed from the cache if they have not been accessed for 30 days. Please note that it is not possible for the Site Concentrator to work through another proxy server. Step 3 Enable Managed Antivirus and select Protection Policies In exactly the same way as Patch Management and Take Control before that, Managed Antivirus can be switched on for all servers and workstations or for servers and workstations at individual clients and sites only, from the Settings menu, Managed Antivirus, Settings. Should you wish to exclude a server or workstation, or only enable Managed Antivirus on specific servers and workstations, this can be done from the Managed Antivirus tab of the Edit Server and Edit Workstation dialogs. (These settings are available to Superusers only.) By default, servers and workstations will inherit policy from site, which will in turn inherit from client, which will in turn inherit policies set for all servers and workstations. Once enabled you must select which Protection Policy is to be applied to the different server or workstation at that client or site. The Protection Policy configures every aspect of the Managed Antivirus agent including scan schedules, remediation action (i.e. what to do if a threat is discovered) and file and folder exclusions. Different policies can be specified on individual devices or for use with Laptops, Desktops, different versions of Small Business Servers and all other servers at that client or site as appropriate. Default policies have been supplied for Laptops, Desktops, different versions of Small Business Server, Exchange Servers, SQL Servers and generic servers, all of which follow Microsoft s own recommendations for file and folder exclusions (further information on what is excluded from each policy will be available in Help System). 4

5 Step 4 Uninstall existing Antivirus product (if required) and reboot Having two Antivirus agents installed and running on the same device is usually catastrophic for that device. Therefore, the Managed Antivirus agent will not be installed if another Antivirus product is detected (including VIPRE). This will be shown in the summary tab for that device. In order for the Managed Antivirus agent to install, the existing Antivirus product must first be uninstalled and the device rebooted to complete the uninstallation. This will be shown in the summary tab for that device. The device can be rebooted manually, as part of the uninstallation process, or via Dashboard, by selecting Reboot Now from Server or Workstation drop-down menu. Warning: The next time the Agent uploads data it will be instructed to reboot the device after a delay of five minutes. Once this instruction has been sent to the Agent, it cannot be cancelled either from the Dashboard or on the device itself. Please ensure that any users logged onto this device save their work before proceeding. If you are using a central management console (such as VIPRE Antivirus Business) then please ensure that it does not attempt to reinstall the existing Antivirus product when it detects it has been uninstalled. In the future, we hope to be able to automate the removal of other Antivirus products. Step 5 Reboot to complete the installation of Managed Antivirus Once the existing Antivirus product has been uninstalled, the Advanced Monitoring Agent will then install the Managed Antivirus agent. It is again necessary to reboot the server or workstation to complete the installation. If a reboot is required, this will be shown in the summary tab for that device. The device can be rebooted manually or via Dashboard, by selecting Reboot Now from Server or Workstation drop-down menu. 5

6 Warning: The next time the Agent uploads data it will be instructed to reboot the device after a delay of five minutes. Once this instruction has been sent to the Agent, it cannot be cancelled either from the Dashboard or on the device itself. Please ensure that any users logged onto this device save their work before proceeding. Step 6 Fine tune your Protection Policies The Protection Policy configures every aspect of the Managed Antivirus agent including scan schedules, remediation action (i.e. what to do if a threat is discovered) and file and folder exclusions. Default policies have been supplied for Laptops, Desktops, different versions of Small Business Server, Exchange Servers, SQL Servers and generic servers, all of which follow Microsoft s own recommendations for file and folder exclusions (further information on what is excluded from each policy will be available in Help System). The default policies can be edited or new policies created (based on an existing policy) from the Settings menu, Managed Antivirus, Protection Policy. The General tab specifies which type of device the policy applies to, the end-user interaction, whether to delete files from quarantine and how often to check for definition updates. 6

7 The Scanning tab specifies options common to both quick and deep scan such as whether to perform scan if running on battery power; whether to scan USB drives upon insertion and what to do if a scheduled scan is missed. The Quick Scan tab and Deep Scan tab specify where to scan (drives and common threat locations etc), what to scan (common file types) and when to run quick scan and deep scan respectively. The Active Protection tab specifies the behavior of the resident in-memory scanner, whether it is enabled and when to scan (on execution or when some or all files are touched). The Remediation tab specifies what action the Managed Antivirus agent should take when it discovers traces of a threat during a Quick Scan, Deep Scan or Active Protection event. All threats are categorized and different remediation actions (Allow, Report, Quarantine or Delete) can be set for each category and sub-category. 7

8 The Allowed Threats tab specifies any programs that although listed in threat definitions are not harmful and should be ignored by Managed Antivirus agent (for example: remote control tools). The Exceptions tab specifies files and folders that are to be excluded (allowed) by the Managed Antivirus agent. Any files or folders that are considered harmful and are always to be included (blocked) by the Managed Antivirus agent can also be specified here. Warning: this is not recommended and care must be taken to ensure that you do not quarantine (depending on the remediation action specified for Misc category, Misc General sub-category) important system files or folders. Any changes to a Protection Policy are included in the User Audit Report, from the Reports menu. 8

9 Step 7 Run scans and view their results The Managed Antivirus Check monitors the Managed Antivirus Agent on each device and will fail if a threat is quarantined and requires intervention, if Active Protection is off and a scan hasn t run for a specified number of days (as specified in the Protection Policy) or the Managed Antivirus Agent stops uploading data. Click More Information to show the number of items in quarantine, when the Managed Antivirus Agent on that device last uploaded data, the status of Active Protection, the date and time of the last Quick and Deep scan and what type of scan is currently running. The Antivirus Protection Report available from the Reports menu, Managed Antivirus Reports shows this same information on all devices at selected clients. It can include details of other Antivirus products monitored by the GFI MAX RemoteManagement Antivirus Update Daily Safety Check on devices where Managed Antivirus is not enabled. Quick and Deep scans will be run automatically according to schedule specified in the Protection Policy for that device. However, they can also be started, paused, resumed and cancelled from the Managed Antivirus Scan option in the Server or Workstation drop down menu in the Dashboard. 9

10 Click on the Scans tab to see a history of Quick and Deep scans as well as Active Protection events on that device in the last sixty days. Any traces of threats discovered can be seen by expanding the results of the scan. Step 8 Manage quarantine When traces of a threat are discovered during a Quick scan, Deep scan or Active Protection event, the remediation action specified for that category and sub-category of threat is taken automatically. Although, please note that Active Protection will allow any threats for which remediation action is report and quarantine any threats for which remediation action is delete. The Managed Antivirus Check monitors the Managed Antivirus Agent on each device and will fail, generating an alert, if a threat is quarantined and requires intervention. The Quarantine tab will show all traces of threats that are In Quarantine as well as a history of those traces that have been deleted from quarantine or released from quarantine in the last sixty days. Expand an event to see the file traces in quarantine of the discovered threat. The file traces can then be Released from quarantine or Deleted from quarantine as appropriate by clicking on the Actions drop down menu. 10

11 SB0037-v1.0-EN Please note if you release from quarantine, you should also update your protection policies to either change the remediation action for the category of threats or allow the threat (not recommended) to prevent the file traces from being quarantined by Active Protection or the next scheduled Quick or Deep Scan. This can be done from the Policy drop down of the Threats tab, which will prompt you to select which protection policies to update. The Threats tab will list all threats that have been discovered on that device in the last sixty days, when a trace belonging to that threat was last discovered and what remediation action was taken. Expand the threat to see how traces were discovered (Quick scan, Deep scan or Active Protection event), when traces discovered. Expand each event to see what file traces were discovered. The Managed Antivirus Threat Report available from the Reports menu, Managed Antivirus Reports shows this same information on all devices on which Managed Antivirus discovered traces of threats at selected clients within the time-frame specified during last sixty days. Further options will be added to this report in the coming months GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. 11

Vulnerability Scanning and Patch Management

Vulnerability Scanning and Patch Management Vulnerability Scanning and Patch Management Vulnerability Scanning and Patch Management Security vulnerabilities remain amongst the most disruptive and damaging types of problem experienced in real-world

More information

GFI Cloud User Guide A guide to administer GFI Cloud and its services

GFI Cloud User Guide A guide to administer GFI Cloud and its services GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Sophos Computer Security Scan startup guide

Sophos Computer Security Scan startup guide Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Tutorial. Patch Management

Tutorial. Patch Management Tutorial Patch Management 2011 DeskCenter Solutions AG Table of Contents 1. Introduction...3 2. Software deployer...4 2.1 Preparing the software deployer...4 2.2 Configuring software deployers...4 3. Central

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

Installation Guide for WebAdmin Customers

Installation Guide for WebAdmin Customers Panda Managed Office Protection Installation Guide for WebAdmin Customers Contents 1. Introduction... 4 2. Installing Panda Managed Office Protection from Panda WebAdmin... 4 2.1. Accessing the Panda Managed

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Sophos Cloud Migration Tool Help. Product version: 1.0

Sophos Cloud Migration Tool Help. Product version: 1.0 Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0

Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0 Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0 Product version: 9.5 Document date: November 2010 Contents 1 About this guide...3 2 Overview...4 3 System requirements...5

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

GFI Product Manual. Version 6.0. Getting Started Guide

GFI Product Manual. Version 6.0. Getting Started Guide GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

This document details the procedure for installing Layer8 software agents and reporting dashboards.

This document details the procedure for installing Layer8 software agents and reporting dashboards. Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Server Edition Administrator s Guide

Server Edition Administrator s Guide Server Edition Administrator s Guide July 13, 2010 Introduction This document covers FinePrint, pdffactory, and pdffactory Pro Server Editions (SE). Installing SE on a Windows server provides easy deployment

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

System Administrator Guide

System Administrator Guide System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,

More information

Installing GFI Network Server Monitor

Installing GFI Network Server Monitor Installing GFI Network Server Monitor System requirements Computers running GFI Network Server Monitor require: Windows 2000 (SP4 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Remote Drive PC Client software User Guide

Remote Drive PC Client software User Guide Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

If the Domain Controller is running Windows Server 2003, it is strongly advised that the Group Policy Management tool is installed.

If the Domain Controller is running Windows Server 2003, it is strongly advised that the Group Policy Management tool is installed. BGfL Proxy Servers Slow Internet Following a number of calls to the Link2ICT Service desk reporting slow Internet, Investigations were carried out by the BGfL team who identified that slow internet performance

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Abila MIP. Installation Guide

Abila MIP. Installation Guide This is a publication of Abila, Inc. Version 2015.x Copyright 2014 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks

More information

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

Migrating MSDE to Microsoft SQL 2008 R2 Express

Migrating MSDE to Microsoft SQL 2008 R2 Express How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,

More information

ANTIVIRUS EVALUATION GUIDE. AntivirusBusiness. Make the Right Choice the First Time

ANTIVIRUS EVALUATION GUIDE. AntivirusBusiness. Make the Right Choice the First Time ANTIVIRUS EVALUATION GUIDE AntivirusBusiness Make the Right Choice the First Time As an IT administrator, you face a unique set of challenges. You may be managing a network supporting hundreds or even

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

BitDefender Security for Exchange

BitDefender Security for Exchange Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the

More information

Providing Patch Management With N-central. Version 7.1

Providing Patch Management With N-central. Version 7.1 Providing Patch Management With N-central Version 7.1 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

Egress Switch Client Deployment Guide V4.x

Egress Switch Client Deployment Guide V4.x Egress Switch Client Deployment Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents System Requirements... 4 Deployment Process... 4 Computer & User Based Policy Application...

More information

How To Upgrade Your Microsoft SQL Server for Accounting CS Version 2012.1

How To Upgrade Your Microsoft SQL Server for Accounting CS Version 2012.1 How To Upgrade Your Microsoft SQL Server for Version 2012.1 The first step is to gather important information about your existing configuration. Identify The Database Server and SQL Server Version The

More information

Actualtests.C2010-508.40 questions

Actualtests.C2010-508.40 questions Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Mac OS X 10.4/10.5 Browser: Firefox 2+, Safari 2+ Version 2.2 Chapter 1 Chapter 2 Chapter 3 Appendix Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment

More information

ScriptLogic File System Auditor User Guide

ScriptLogic File System Auditor User Guide ScriptLogic File System Auditor User Guide FILE SYSTEM AUDITOR I 2005 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all rights are reserved by ScriptLogic

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

1. How do I access my VPS control panel?

1. How do I access my VPS control panel? VPS Business FAQ Section 1: Installation...2 1. How do I access my VPS control panel?...2 2. How do I access my Windows VPS?...6 3. How do I access my Linux VPS?...8 Section 2: using a VPS...9 4. How to

More information

LANDesk Management Suite 9.0. Getting started with Patch Manager

LANDesk Management Suite 9.0. Getting started with Patch Manager LANDesk Management Suite 9.0 Getting started with Patch Manager DOWNLOAD PATCH CONTENT TO THE CORE SERVER INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

FileMaker Server 15. Getting Started Guide

FileMaker Server 15. Getting Started Guide FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

Setting up FileMaker 10 Server

Setting up FileMaker 10 Server Setting up FileMaker 10 Server Note : If your current live Database folder is located in the default database folder ( C:\Program Files\FileMaker\FileMaker Server\Data\Databases ), move\copy this folder

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Administrator s Guide

Administrator s Guide Attachment Save for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4 3. System

More information

Providing Patch Management With N-central. Version 7.2

Providing Patch Management With N-central. Version 7.2 Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

For Splunk Universal Forwarder and Splunk Cloud

For Splunk Universal Forwarder and Splunk Cloud Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

ESET REMOTE ADMINISTRATOR. Migration guide

ESET REMOTE ADMINISTRATOR. Migration guide ESET REMOTE ADMINISTRATOR Migration guide ESET REMOTE ADMINISTRATOR migration guide Copyright 2012 by ESET, spol. s r.o. ESET REMOTE ADMINISTRATOR was developed by ESET, spol. s r.o. For more information

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

FAQ. How does the new Big Bend Backup (powered by Keepit) work? FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016 ZENworks 11 Support Pack 4 Management Zone Settings Reference May 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

Installing GFI LANguard Network Security Scanner

Installing GFI LANguard Network Security Scanner Installing GFI LANguard Network Security Scanner System requirements Install GFI LANguard Network Security Scanner on a computer which meets the following requirements: Windows 2000 (SP4) / XP (SP2) /

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

What Is Ad-Aware Update Server?

What Is Ad-Aware Update Server? Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

Installation Manual (MSI Version)

Installation Manual (MSI Version) Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Comodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo MyDLP Software Version 2.0 Endpoint Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features...

More information