Managed Antivirus Quick Start Guide
|
|
- Tobias Morgan
- 8 years ago
- Views:
Transcription
1 Quick Start Guide
2 Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt Software does not believe in Bloatware and the VIPRE Enterprise Antivirus agent delivers high-performance, comprehensive endpoint malware protection with low system resource usage. Clean, fast, and powerful: 'by admins for admins'. We couldn t wait to get our hands on VIPRE and are pleased to announce that Dashboard v5.17 and Agent v8.8 Release Candidate utilize this technology to provide a Managed Antivirus solution that can be deployed, configured, monitored and reported on, all from your GFI MAX RemoteManagement Dashboard. Like Patch Management and Take Control before that, deployment is flexible and Managed Antivirus can be enabled, on individual servers and workstations or on all servers and workstations at a client or site. The Advanced Monitoring Agent on these servers and workstations will then download, install and configure the Managed Antivirus agent with the appropriate protection policy for that type of device at that client. From your GFI MAX RemoteManagement Dashboard, you can:» Enable Managed Antivirus on individual servers and workstations or on all servers and workstations at a client or site.» Configure every aspect of the Managed Antivirus agent including scan schedules, remediation action (i.e. what to do if a threat is discovered) and file and folder exclusions.» Save this as a protection policy for use on similar types of device at other clients and sites.» Receive alerts if a threat is quarantined and choose to delete or release from quarantine.» Start, Pause, Resume and Cancel scans all from the Dashboard!» View reports that demonstrate the service you re providing. This document describes the simple steps to follow to start doing all of this today! Step 1 Update to Agent v8.8 RC Managed Antivirus requires Advanced Monitoring Agent v8.8 Release Candidate. From the Agent menu, select Download Agent v8.8 RC and run this on each server and workstation on which Managed Antivirus is to be enabled. Alternatively, select Download Site Installation Package to generate a silent installer for installation on multiple workstations via Group Policies or the oneclick Remote Worker installer for workstations not connected to Active Directory. All existing configuration settings are retained when the Agent is updated. The Summary tab displays Agent Supported Features reflecting whether Managed Antivirus is available. 2
3 Please note that Managed Antivirus can only be used at sites where there is no proxy server or where that proxy server uses BASIC authentication only. Also, Managed Antivirus cannot be used on Windows Agent v8.8 should be available for automatic update late May Step 2 Designate a Site Concentrator (if required) Managed Antivirus uses incremental differences in the Antivirus pattern definition updates meaning downloads are usually less than 100KB. However, the initial Antivirus pattern definition download can be as much as 60MB on each server or workstation. If there are a large number of workstations at a site, then a server at that site running Agent v8.8 can be designated as a Site Concentrator for that site. The Site Concentrator will download and cache both the initial Antivirus pattern definition as well as the incremental difference updates for use by other Agents at the site. These other Agents, then download them from the Site Concentrator, ensuring that each file is downloaded only once, reducing external network traffic. Select the required site in the Dashboard and then from the Edit menu, select Edit Site and the Site Concentrator tab. Select the server (running Agent v8.8) that is to act as the Site Concentrator and also the port on the Server that other Agents at that site should connect to. Please note that if you have a firewall running on the server, you may need to create a rule to allow Agents to connect to this port. 3
4 If you do not wish the downloaded files to be cached on C:\ drive, you can also optionally specify the drive and path where the cached downloaded files are to be stored. Please ensure that there is sufficient free disk space on the specified drive. Files are removed from the cache if they have not been accessed for 30 days. Please note that it is not possible for the Site Concentrator to work through another proxy server. Step 3 Enable Managed Antivirus and select Protection Policies In exactly the same way as Patch Management and Take Control before that, Managed Antivirus can be switched on for all servers and workstations or for servers and workstations at individual clients and sites only, from the Settings menu, Managed Antivirus, Settings. Should you wish to exclude a server or workstation, or only enable Managed Antivirus on specific servers and workstations, this can be done from the Managed Antivirus tab of the Edit Server and Edit Workstation dialogs. (These settings are available to Superusers only.) By default, servers and workstations will inherit policy from site, which will in turn inherit from client, which will in turn inherit policies set for all servers and workstations. Once enabled you must select which Protection Policy is to be applied to the different server or workstation at that client or site. The Protection Policy configures every aspect of the Managed Antivirus agent including scan schedules, remediation action (i.e. what to do if a threat is discovered) and file and folder exclusions. Different policies can be specified on individual devices or for use with Laptops, Desktops, different versions of Small Business Servers and all other servers at that client or site as appropriate. Default policies have been supplied for Laptops, Desktops, different versions of Small Business Server, Exchange Servers, SQL Servers and generic servers, all of which follow Microsoft s own recommendations for file and folder exclusions (further information on what is excluded from each policy will be available in Help System). 4
5 Step 4 Uninstall existing Antivirus product (if required) and reboot Having two Antivirus agents installed and running on the same device is usually catastrophic for that device. Therefore, the Managed Antivirus agent will not be installed if another Antivirus product is detected (including VIPRE). This will be shown in the summary tab for that device. In order for the Managed Antivirus agent to install, the existing Antivirus product must first be uninstalled and the device rebooted to complete the uninstallation. This will be shown in the summary tab for that device. The device can be rebooted manually, as part of the uninstallation process, or via Dashboard, by selecting Reboot Now from Server or Workstation drop-down menu. Warning: The next time the Agent uploads data it will be instructed to reboot the device after a delay of five minutes. Once this instruction has been sent to the Agent, it cannot be cancelled either from the Dashboard or on the device itself. Please ensure that any users logged onto this device save their work before proceeding. If you are using a central management console (such as VIPRE Antivirus Business) then please ensure that it does not attempt to reinstall the existing Antivirus product when it detects it has been uninstalled. In the future, we hope to be able to automate the removal of other Antivirus products. Step 5 Reboot to complete the installation of Managed Antivirus Once the existing Antivirus product has been uninstalled, the Advanced Monitoring Agent will then install the Managed Antivirus agent. It is again necessary to reboot the server or workstation to complete the installation. If a reboot is required, this will be shown in the summary tab for that device. The device can be rebooted manually or via Dashboard, by selecting Reboot Now from Server or Workstation drop-down menu. 5
6 Warning: The next time the Agent uploads data it will be instructed to reboot the device after a delay of five minutes. Once this instruction has been sent to the Agent, it cannot be cancelled either from the Dashboard or on the device itself. Please ensure that any users logged onto this device save their work before proceeding. Step 6 Fine tune your Protection Policies The Protection Policy configures every aspect of the Managed Antivirus agent including scan schedules, remediation action (i.e. what to do if a threat is discovered) and file and folder exclusions. Default policies have been supplied for Laptops, Desktops, different versions of Small Business Server, Exchange Servers, SQL Servers and generic servers, all of which follow Microsoft s own recommendations for file and folder exclusions (further information on what is excluded from each policy will be available in Help System). The default policies can be edited or new policies created (based on an existing policy) from the Settings menu, Managed Antivirus, Protection Policy. The General tab specifies which type of device the policy applies to, the end-user interaction, whether to delete files from quarantine and how often to check for definition updates. 6
7 The Scanning tab specifies options common to both quick and deep scan such as whether to perform scan if running on battery power; whether to scan USB drives upon insertion and what to do if a scheduled scan is missed. The Quick Scan tab and Deep Scan tab specify where to scan (drives and common threat locations etc), what to scan (common file types) and when to run quick scan and deep scan respectively. The Active Protection tab specifies the behavior of the resident in-memory scanner, whether it is enabled and when to scan (on execution or when some or all files are touched). The Remediation tab specifies what action the Managed Antivirus agent should take when it discovers traces of a threat during a Quick Scan, Deep Scan or Active Protection event. All threats are categorized and different remediation actions (Allow, Report, Quarantine or Delete) can be set for each category and sub-category. 7
8 The Allowed Threats tab specifies any programs that although listed in threat definitions are not harmful and should be ignored by Managed Antivirus agent (for example: remote control tools). The Exceptions tab specifies files and folders that are to be excluded (allowed) by the Managed Antivirus agent. Any files or folders that are considered harmful and are always to be included (blocked) by the Managed Antivirus agent can also be specified here. Warning: this is not recommended and care must be taken to ensure that you do not quarantine (depending on the remediation action specified for Misc category, Misc General sub-category) important system files or folders. Any changes to a Protection Policy are included in the User Audit Report, from the Reports menu. 8
9 Step 7 Run scans and view their results The Managed Antivirus Check monitors the Managed Antivirus Agent on each device and will fail if a threat is quarantined and requires intervention, if Active Protection is off and a scan hasn t run for a specified number of days (as specified in the Protection Policy) or the Managed Antivirus Agent stops uploading data. Click More Information to show the number of items in quarantine, when the Managed Antivirus Agent on that device last uploaded data, the status of Active Protection, the date and time of the last Quick and Deep scan and what type of scan is currently running. The Antivirus Protection Report available from the Reports menu, Managed Antivirus Reports shows this same information on all devices at selected clients. It can include details of other Antivirus products monitored by the GFI MAX RemoteManagement Antivirus Update Daily Safety Check on devices where Managed Antivirus is not enabled. Quick and Deep scans will be run automatically according to schedule specified in the Protection Policy for that device. However, they can also be started, paused, resumed and cancelled from the Managed Antivirus Scan option in the Server or Workstation drop down menu in the Dashboard. 9
10 Click on the Scans tab to see a history of Quick and Deep scans as well as Active Protection events on that device in the last sixty days. Any traces of threats discovered can be seen by expanding the results of the scan. Step 8 Manage quarantine When traces of a threat are discovered during a Quick scan, Deep scan or Active Protection event, the remediation action specified for that category and sub-category of threat is taken automatically. Although, please note that Active Protection will allow any threats for which remediation action is report and quarantine any threats for which remediation action is delete. The Managed Antivirus Check monitors the Managed Antivirus Agent on each device and will fail, generating an alert, if a threat is quarantined and requires intervention. The Quarantine tab will show all traces of threats that are In Quarantine as well as a history of those traces that have been deleted from quarantine or released from quarantine in the last sixty days. Expand an event to see the file traces in quarantine of the discovered threat. The file traces can then be Released from quarantine or Deleted from quarantine as appropriate by clicking on the Actions drop down menu. 10
11 SB0037-v1.0-EN Please note if you release from quarantine, you should also update your protection policies to either change the remediation action for the category of threats or allow the threat (not recommended) to prevent the file traces from being quarantined by Active Protection or the next scheduled Quick or Deep Scan. This can be done from the Policy drop down of the Threats tab, which will prompt you to select which protection policies to update. The Threats tab will list all threats that have been discovered on that device in the last sixty days, when a trace belonging to that threat was last discovered and what remediation action was taken. Expand the threat to see how traces were discovered (Quick scan, Deep scan or Active Protection event), when traces discovered. Expand each event to see what file traces were discovered. The Managed Antivirus Threat Report available from the Reports menu, Managed Antivirus Reports shows this same information on all devices on which Managed Antivirus discovered traces of threats at selected clients within the time-frame specified during last sixty days. Further options will be added to this report in the coming months GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. 11
Vulnerability Scanning and Patch Management
Vulnerability Scanning and Patch Management Vulnerability Scanning and Patch Management Security vulnerabilities remain amongst the most disruptive and damaging types of problem experienced in real-world
More informationGFI Cloud User Guide A guide to administer GFI Cloud and its services
GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works
More informationK7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationSophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
More informationSophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5
More informationTutorial. Patch Management
Tutorial Patch Management 2011 DeskCenter Solutions AG Table of Contents 1. Introduction...3 2. Software deployer...4 2.1 Preparing the software deployer...4 2.2 Configuring software deployers...4 3. Central
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationSystem Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
More informationInstallation Guide for WebAdmin Customers
Panda Managed Office Protection Installation Guide for WebAdmin Customers Contents 1. Introduction... 4 2. Installing Panda Managed Office Protection from Panda WebAdmin... 4 2.1. Accessing the Panda Managed
More informationSophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
More informationUser Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
More informationSophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
More informationComodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationSophos Cloud Migration Tool Help. Product version: 1.0
Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationhttp://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationSophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0
Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0 Product version: 9.5 Document date: November 2010 Contents 1 About this guide...3 2 Overview...4 3 System requirements...5
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationGFI Product Manual. Version 6.0. Getting Started Guide
GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
More informationNet Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
More informationhttp://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationIntelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationMetalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationThis document details the procedure for installing Layer8 software agents and reporting dashboards.
Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via
More informationSTATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
More informationThe SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
More informationServer Edition Administrator s Guide
Server Edition Administrator s Guide July 13, 2010 Introduction This document covers FinePrint, pdffactory, and pdffactory Pro Server Editions (SE). Installing SE on a Windows server provides easy deployment
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationSophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0
Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationUpgrading Client Security and Policy Manager in 4 easy steps
Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security
More informationSophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
More informationCitrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
More informationSystem Administrator Guide
System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,
More informationInstalling GFI Network Server Monitor
Installing GFI Network Server Monitor System requirements Computers running GFI Network Server Monitor require: Windows 2000 (SP4 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5
More informationSophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
More informationESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
More informationQuick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
More informationHow To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
More informationGetting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
More informationIf the Domain Controller is running Windows Server 2003, it is strongly advised that the Group Policy Management tool is installed.
BGfL Proxy Servers Slow Internet Following a number of calls to the Link2ICT Service desk reporting slow Internet, Investigations were carried out by the BGfL team who identified that slow internet performance
More informationGetting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
More informationCore Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
More informationDell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
More informationAbila MIP. Installation Guide
This is a publication of Abila, Inc. Version 2015.x Copyright 2014 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
More informationImplementing Endpoint Protection in System Center 2012 R2 Configuration Manager
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationMigrating MSDE to Microsoft SQL 2008 R2 Express
How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,
More informationANTIVIRUS EVALUATION GUIDE. AntivirusBusiness. Make the Right Choice the First Time
ANTIVIRUS EVALUATION GUIDE AntivirusBusiness Make the Right Choice the First Time As an IT administrator, you face a unique set of challenges. You may be managing a network supporting hundreds or even
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationMcAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationBitDefender Security for Exchange
Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the
More informationProviding Patch Management With N-central. Version 7.1
Providing Patch Management With N-central Version 7.1 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
More informationEgress Switch Client Deployment Guide V4.x
Egress Switch Client Deployment Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents System Requirements... 4 Deployment Process... 4 Computer & User Based Policy Application...
More informationHow To Upgrade Your Microsoft SQL Server for Accounting CS Version 2012.1
How To Upgrade Your Microsoft SQL Server for Version 2012.1 The first step is to gather important information about your existing configuration. Identify The Database Server and SQL Server Version The
More informationActualtests.C2010-508.40 questions
Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got
More informationAspera Connect User Guide
Aspera Connect User Guide Mac OS X 10.4/10.5 Browser: Firefox 2+, Safari 2+ Version 2.2 Chapter 1 Chapter 2 Chapter 3 Appendix Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment
More informationScriptLogic File System Auditor User Guide
ScriptLogic File System Auditor User Guide FILE SYSTEM AUDITOR I 2005 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all rights are reserved by ScriptLogic
More informationSpector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
More information1. How do I access my VPS control panel?
VPS Business FAQ Section 1: Installation...2 1. How do I access my VPS control panel?...2 2. How do I access my Windows VPS?...6 3. How do I access my Linux VPS?...8 Section 2: using a VPS...9 4. How to
More informationLANDesk Management Suite 9.0. Getting started with Patch Manager
LANDesk Management Suite 9.0 Getting started with Patch Manager DOWNLOAD PATCH CONTENT TO THE CORE SERVER INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing
More informationThere are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
More informationSophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
More informationGFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"
More informationFileMaker Server 15. Getting Started Guide
FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationNetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
More informationSetting up FileMaker 10 Server
Setting up FileMaker 10 Server Note : If your current live Database folder is located in the default database folder ( C:\Program Files\FileMaker\FileMaker Server\Data\Databases ), move\copy this folder
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationAdministrator s Guide
Attachment Save for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4 3. System
More informationProviding Patch Management With N-central. Version 7.2
Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
More informationFor Splunk Universal Forwarder and Splunk Cloud
Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise
More informationCTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationESET REMOTE ADMINISTRATOR. Migration guide
ESET REMOTE ADMINISTRATOR Migration guide ESET REMOTE ADMINISTRATOR migration guide Copyright 2012 by ESET, spol. s r.o. ESET REMOTE ADMINISTRATOR was developed by ESET, spol. s r.o. For more information
More informationF-Secure Client Security. Administrator's Guide
F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main
More informationGetting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
More informationFAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
More informationCitrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016
ZENworks 11 Support Pack 4 Management Zone Settings Reference May 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
More information2. Installation and System requirements
RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationGetting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks
More informationInstalling GFI LANguard Network Security Scanner
Installing GFI LANguard Network Security Scanner System requirements Install GFI LANguard Network Security Scanner on a computer which meets the following requirements: Windows 2000 (SP4) / XP (SP2) /
More informationez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
More informationWhat Is Ad-Aware Update Server?
Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationInstallation Manual (MSI Version)
Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationKaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
More informationRemote Management System
RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationUser Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationComodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Endpoint Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features...
More information