Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:
|
|
- Loraine Cole
- 8 years ago
- Views:
Transcription
1 Image not found it.ucsf.edu Published on it.ucsf.edu ( Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on March 23, 2016 Updating Security Definitions (AV and IPS) Campus Clients UCSF SEP for Windows clients connected to the campus network will automatically receive updates to security definitions on a regular basis from the central IT SEP Management servers. Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec: 1. Launch the SEP client. Windows 7: double-click on the SEP icon in your taskbar at the lower-right corner of your screen Windows 8 / 8.1 : launch the SEP icon from the Windows 8 user interface formerly known as "Metro" 2. Click on the 'LiveUpdate' button in the Symantec Endpoint Protection window 3. A 'LiveUpdate' window will appear and immediately check online for any updates 4. Once the latest updates have been downloaded and installed, click the OK button to close the window Off Campus Clients Off-campus SEP for Windows clients are also scheduled to automatically receive updates via LiveUpdate on a regular pre-set schedule directly from Symantec. You can also run LiveUpdate manually, as well as, modify the LiveUpdate Schedule. To run Live Update Manually: 1. Launch the SEP client. Windows 7: double-click on the SEP icon in your taskbar at the lower-right corner of your screen Windows 8 / 8.1 : launch the SEP icon from the Windows 8 user interface formerly known as "Metro" 2. Click on the 'LiveUpdate' button in the Symantec Endpoint Protection window
2 3. A 'LiveUpdate' window will appear and immediately check online for any updates 4. Once the latest updates have been downloaded and installed, click the OK button to close the window To modify the LiveUpdate schedule to better suit your computing needs: 1. Open the SEP client. Windows 7: double-click on the SEP icon in your taskbar at the lower-right corner of your screen Windows 8 / 8.1 : launch the SEP icon from the Windows 8 user interface formerly known as "Metro" 2. On the left hand column, click on the 'Change Settings' button 3. To the right where it says 'Client Management', click on the 'Configure Settings' button
3 4. At the top of the 'Client Management Settings' window, click on the 'LiveUpdate' tab
4 5. Modify the 'Frequency' section to your preference Warning: Setting the 'Frequency' to "Continuously" may cause system performance issues. We high recommend against choosing this option A few things to consider: On average, Symantec releases mini-updates four times a day. Choosing an update schedule anywhere from every 8 hours to once a day is generally acceptable. The longer the frequency time, the larger the update which requires a longer time to download and more system resources during the update. Manually updating clients off-line (not connected to the Internet) If you are infected with a new virus that is not being detected properly and have taken your computer off-line (not connected to the Internet) to prevent propagating the virus on your network, you can still update your virus definitions manually. Note: You will need another computer that is connected to the Internet and a removable media device such as a thumbdrive or cd-r. To manually update your definitions off-line: 1. Go to a different machine that is free of viruses and connected to the Internet 2. Using the clean machine, go to Symantec's Download Virus Definitions [1] page 3. Under 'Download Definitions by Product', click on 'Select Product' and choose
5 "'Symantec Endpoint Protection'" Under the 'File-Based Protection' section, click on "Virus Definitions" next to 'Download' Download the appropriate file for your platform onto your removable media For 32-bit Windows Clients, choose the file under the section 'Symantec Endpoint Protection Client Installation on Windows platforms (32-bit)' For 64-bit Windows Clients, choose the file under the section 'Symantec Endpoint Protection Client Installation on Windows platforms (64-bit)' Take your removable media and load it onto the computer you wish to update On the computer you wish to update, double-click on the file you downloaded You will be prompted to update your virus definitions. Click the 'Yes' button. You will be notified after the update is complete. Click the 'Ok' button to complete the process. Upgrading to the latest version What is the latest version for SEP for Windows? The latest version that has been verified for the UCSF environment can always be found at: [2] How do I upgrade to the latest version? Just download and install the latest version by following the SEP for Windows: Install Guide [3] How do I find out what version of SEP is installed?
6 Launch Symantec Endpoint Protection ( Start > All Programs > Symantec Endpoint Protection > Symantec Endpoint Protection ) Click on the 'Help' button (in the upper right corner of the window) Click on 'About...' Running, Pausing, and Delaying Scans The UCSF SEP clients have settings and policies enabled to actively protect your system that require no interaction unless a threat is found. SEP clients are scheduled weekly to run a full system scan in the background and also requires no interaction. Although we try to schedule scans to have as little impact on system resources, it is still sometimes necessary to pause or delay a scan if it impedes with work productivity. If you suspect your computer may have been infected with a virus or other malware, or have had to connect to a questionable network that is prone to attacks, you may want to run a manual scan or schedule scans to occur on a more regular basis. This section covers the following topics to address these issues: Scanning a specific file/folder on-demand
7 Running a Manual Scan Running and Scheduling a Custom Scan Pausing or Delaying a Scan in Progress Running Scans in Safe Mode Scanning a Specific File or Folder On-Demand 1. Right-click on the file or folder you want to scan 2. In the context menu that appears, click on 'Scan for viruses...' 3. A progress window will appear to report files containing risks, type of risks, and the action it took or recommends taking 4. After the scan has completed and all actions taken, click on the 'Close' button to close the window Running a Manual Scan 1. Under Window 7, open the 'Symantec Endpoint Protection' window by double-clicking on the SEP icon in your taskbar at the bottom-right corner of your screen on Windows 8 / 8.1 double click the SEP icon found on the Windows 8 user interface formerly known as "Metro" 2. On the left side of the window, click on 'Scan for threats' 3. Click on the type of scan you want to run: 'Run Active Scan': will run a scan on commonly infected areas such as the Windows System folders and Temporary Internet Files folders. 'Run Full Scan': will run a scan on your entire computer, except for Network Drives the scan will run and give you a report of anything it finds 4. After clicking on the scan you want to run, a progress window will appear to report files containing risks, type of risks, and the action it took or recommends taking 5. After the scan has completed and all actions taken, click on the 'Close' button to close the window Running a Custom Scan 1. Open the 'Symantec Endpoint Protection' window by double-clicking on the SEP icon in your taskbar at the bottom-right corner of your screen 2. On the left side of the window, click on 'Scan for threats' 3. Click on the 'Create a New Scan' link in the middle of the window 4. Set your options for the scan, then click on the button 'Next' 5. Choose 'On demand', then click on the button 'Next' 6. Type in a name for the scan and a description for the type of scan you are creating 7. Click on the button 'Finish', the main SEP window should now list your scan under the 'Scan Name' 8. Right-click on the scan your just created, and click 'Scan Now'the scan will run and give you a report of anything it finds 9. After the scan has completed and all actions taken, click on the 'Close' button to close the window
8 Scheduling a Custom Scan 1. Open the 'Symantec Endpoint Protection' window by double-clicking on the SEP icon in your taskbar at the bottom-right corner of your screen 2. On the left side of the window, click on 'Scan for threats' 3. Click on the 'Create a New Scan' link in the middle of the window 4. Choose the 'Custom Scan' radio button then click on the button 'Next'
9 5. Set your options for the scan, then click on the button 'Next' 6. Choose 'At specified times', then click on the button 'Next'
10 7. Verify there is a check next to the 'Enable' checkbox 8. Choose your 'Scan Schedule', then click on the button 'Next'
11 9. Type in a name for the scan and a description for the type of scan you are creating
12 10. Click on the button 'Finish', the main SEP window should now list your scan under the 'Scan Name' Pausing and Delaying Scans Although we try to schedule scans to have as little impact on system resources, it is still sometimes necessary to pause or delay a scan if it impedes with work productivity. By default, the general UCSF SEP settings allow this functionality. If you do not see this feature on your client, please check with your department's IT support staff. To pause a scan you initiated, just click on the 'Pause Scan' button found in the scan dialogue box. When you are ready to resume the scan, just click the 'Resume Scan' button and the scan will continue where it left off. To pause a scheduled scan: 1. For Windows 7 double-click the SEP client icon, yellow shield, in the system tray (bottom right corner where the clock is). On Windws 8 / 8.1 open the SEP application from the Windows 8 user interface formerly known as "Metro" 2. In the upper right corner just to the left of the help button, there should be a link to indicate either a scan is in progress or schedule to begin soon. Click this link and follow the on-screen instructions to either pause or delay the scan.
13 1. If the link is absent or missing, no scan is in progress or scheduled for the next hour. Running Scans in Windows SafeMode Sometimes it is necessary to run a scan while in Windows SafeMode to prevent malware from loading that may interfere with antivirus programs. This procedure requires the use of special utility by Symantec called "SymHelp with Symantec Power Eraser". Booting into 'SafeMode
14 with Networking' may also be required to carry out this scan. Note: The SymHelp utility should be downloaded whenever possible while in Windows normal mode. The easiest way to accomplish this task is through the SEP client interface. If the SEP client cannot be launched, or if your computer can only boot into SafeMode, the SymHelp utility can also be downloaded at: [4]. First, download and install SymHelp Utility 1. Open the SEP interface (double-click on the SEP icon in the systray) 2. On the rupper right of the window, click the Help menu and choose "Download Support Tool follow the prompts to install the SymHelp utility Then, once the application has been downloaded and installed, you can perform a scan by: 1. Run the SymHelp Utility -- Run Threat Analysis Scan 2. Check the box "Basic scan - 5 min." Remove any other check marks.
15 3. Click the Scan button to begin the scan of the hard drive Note: If a Rootkit is believed to be causing the problem, check the box "Include a rootkit..." to enable this feature. A reboot is required, and you will be prompted to reboot, hit the "yes" button. 4. When the scan completes, note what files were identified (some legitimate files may be identified) and select any suspicious programs you wish to remove and click Fix (this will cause the system to reboot). You may wish to select to save a copy of the log records to the desktop.
16 Additional instructions on how to use the SymHelp utility can be found in Symantec's Knowledge Base Article TECH [5] and TECH [6] Creating Scan Exceptions By default, the UCSF SEP client policies are set to give applications priority to system resources over the SEP processes. Creating exceptions (or exclusions) for processes, files, or directories can negatively hinder the security posture of your computer and is not recommended for most cases. However, there are certain applications that will recommend creating exception (or exclusion) policies to assist with system performance issues caused by the application's interaction with anti-virus/anti-malware scanners. Typically these applications deal with large data files, or lots of rapidly changing data files, with no executable code in those files. These recommendations can typically found in the "Best Practices Guide" of such applications. Before proceeding with creating a scan exception/exclusion, please consult with your IT support staff. User-Defined Exceptions There are a number of Exceptions that users are allowed to configure in the UCSF SEP client. The two types we will concentrate on are 1) File/Folder exclusions and 2) Process exclusions. Excluding Files/Folders To prevent special files or folders from being scanned, you will need to create a "Security Risk Exception" and a "SONAR Exception" 1. Double-click on SEP client Icon found in systray (bottom-right of the screen) 2. On the left side of the SEP window, click "Change Settings" 3. On the right side of the SEP window next to 'Exceptions', click on the button labeled "Configure Settings" 4. In the 'Exceptions' window, click on the button "Add..." found in the 'User-defined Exceptions' tab 5. Then select 'Security Risk Exception' and choose "Folder" (or "File") 6. Find the Folder (or File) you wish to exclude and select it by clicking on it (the folder should become highlighted and the "Folder" field will change to match your selection). 7. Under 'Exception Type:', select "Auto-Protect" For best security practice, you will still want to scan these files for malicious code during the normal weekly scheduled scans. Selecting "Auto-Protect" will prevent scanning/monitoring of this folder/file while it is being used by its application. 8. Click the button, "OK" 9. In the 'Exceptions' window, click on the button "Add..." found in the 'User-defined Exceptions' tab 10. Then select 'SONAR Exception' and choose "Folder" 11. Find the Folder you wish to exclude and select it by clicking on it (the folder should become highlighted and the "Folder" field will change to match your selection).
17 SONAR is the heuristic monitoring engine for SEP that prevents zero-day attacks by monitoring behaviour of processes as they interact with files/folders on the system. Creating a 'SONAR Exception' will exclude a specific folder from being examined during this process. 12. In the 'Exceptions' window, click the "Close" button Excluding Applications/Processes To prevent an application (or process) from being scanned by the SEP's auto-protect and SONAR features, you will need to create an "Application Exception". Note: Creating an Application Exception puts your computer at great risk and is not recommended for most applications! 1. Double-click on SEP client Icon found in systray (bottom-right of the screen) 2. On the left side of the SEP window, click "Change Settings" 3. On the right side of the SEP window next to 'Exceptions', click on the button labeled "Configure Settings" 4. In the 'Exceptions' window, click on the button "Add..." found in the 'User-defined Exceptions' tab 5. Then click on "Application Exception" 6. Find the Application (exe) you wish to exclude and select it by clicking on it (the application/file should become highlighted and the "File" field will change to match your selection) 7. Make sure the 'Action:' field is set to "Ignore" 8. Click the button "OK" 9. In the 'Exceptions' window, click the "Close" button System Tray Icons
18 Checking what version of SEP is installed There have been several versions of SEP introduced at UCSF. It is always recommended to run the latest release to ensure the most up-to-date protection for your system. The installers found at the site [7], can always be downloaded and installed on top of your current version to ensure that you have the latest of SEP. Alternatively, you can check the version currently installed on your system by following these steps: 1. Launch the SEP for Windows client. Windows 7: double-click on the SEP icon in your taskbar at the lower-right corner of your screen Windows 8 / 8.1 : launch the SEP icon from the Windows 8 user interface formerly known as "Metro" 2. Click on the "Help" button found in the upper right corner of the SEP window. 3. Select the "About" menu item to display the current version of the client. Uninstalling Though uninstalling SEP is not recommended, you can uninstall the UCSF SEP client at anytime. Please note that the UCSF SEP client does not require subscription renewal and should be installed on your system to be compliant with UCSF policies, as well as provide your system adequate protection against malware and other network-related risks. To uninstall SEP for Windows, please follow the appropriate set of instructions depending on your Operating System. Windows XP, 2000, Open 'Control Panel' 2. Select 'Add/Remove Programs' 3. Select 'Symantec Endpoint Protection', click 'Add/Remove', and follow the instructions on the screen Manual uninstall procedures for SEP 11.x can be found on Symantec's Knowledge Base Article TECH [8] Manual uninstall procedures for SEP 12.x can be found on Symantec's Knowledge Base Article TECH [9]
19 Windows Vista, 7, 2008, 2008R2 1. Open 'Control Panel' 2. Select 'Programs and Features' 3. Select 'Symantec Endpoint Protection', click 'Uninstall', and follow the instructions on the screen Manual uninstall procedures for 32-bit clients of SEP 11.x can be found on Symantec's Knowledge Base Article TECH [10] Manual uninstall procedures for 64-bit clients of SEP 11.x can be found on Symantec's Knowledge Base Article TECH91038 [11] Manual uninstall procedures for SEP 12.x can be found on Symantec's Knowledge Base Article TECH [12] Common Warning Messages and Client Behaviour I keep getting a warning message saying that svchost.exe has been blocked. Isn't svchost.exe a valid Windows process? Svchost.exe is used to run a number of services on newer versions of Windows, most of them are legitimate but some are not. SEP has detected malicious behavior with a particular service and has blocked it for your protection. Typically, this alert is related to remote desktop. The default UCSF SEP client firewall policies prohibits non-ucsf Internet connections from remotely controlling (via RDP, VNC, Timbuktu, etc) computers connected to the University network. If you look at the traffic logs in the SEP client (SEP -> View Logs -> Network Threat Protection -> View Logs -> Traffic Logs) you will see which firewall rule caused the block. Remote Desktop stopped working after I installed SEP, how do I connect from offcampus to my computer at UCSF with SEP installed? Remote access applications (such as MS Remote Desktop, VNC, and Timbuktu) poses unnecessary security risks to the university network and increases your computer's potential for being hacked. For increased security, the default UCSF SEP firewall policies block all remote access from non-ucsf IP addresses to your UCSF computer. If you have enabled these remote desktop services/applications, you can still connect to you computer from off-campus by securely signing into the vpn@ucsf [13] system before attempting to remotely control your machine. I keep getting messages saying a number of tmp files (DWH*.tmp) are infected and SEP keeps quarantining them. How do I fix this issue?
20 This was a known bug in the first version of SEP that UCSF deployed. To fix the issue: 1. Download and install the latest version of SEP for Windows, available on the software@ucsf site [2]. 2. reboot your computer 3. delete all DWH*.tmp files in your quarantine folder 4. delete all DWH*.tmp in the temp folder (Start -> Run -> "%temp%") Every time I open up a PDF file or open Acrobat, I get an error saying "Adobe Reader cannot open in Protected Mode due to a problem with your system configuration..." Adobe's site says this may be an issue with older versions of SEP. When will UCSF get the newer version that is compatible with Acrobat's Protected Mode feature? The latest version of UCSF's SEP client should now be compatible with Acrobat's Protected Mode feature. Please visit the software@ucsf [2] site to download the updater for Windows to SEP. I keep getting a lot of pop-up messages saying messages can't be sent, even when I'm not trying to send out messages. How do I fix this? The SEP client is most likely doing its job and preventing an undetected threat from turning your computer into a spam relay station. You should run a full scan to make sure your computer is not infected. More information can be found at: [14] Why has the default home page of my web browser been changed to " The SEP for Windows client has the ability to combat web browser hijackers [16]. When the homepage of a SEP client's browser has been redirected to an undesired site by a malicious infection, SEP will change the homepage as part of its remediation. As there is no way of determining what the computers original homepage was, a default of [15] You should run a full scan to make sure your computer is not infected other malware. Please contact your Computer Support Coordinator or the IT Help Desk for further assistance. My computer is behaving weirdly, how do i determine if SEP is affecting my computer adversely? Please review the SEP for Windows Troubleshooting documentation [17]. Other Frequently Asked Questions Who can use SEP and how much does it cost?
21 SEP is provided free to the UCSF community and can be used on computers of Faculty, Staff, Student or Affiliate working on UCSF business; both University-owned and home (personal) systems. Can our department use the UCSF license to manage our own clients, including policies, settings, and reporting? The UCSF SEP service is managed centrally by ITS and licenses are only distributed through this service offering. ITS does offer SEP group administration through its SEP server cluster to allow groups/departments to manage their own set of clients allowing your department/group to: Centrally manage your clients Set policies specific to your group Create automated reports Without the neeed to run individual servers To request SEP group administration, please submit a ticket to the help desk with the contact information of the IT Manager and the MSO or Director of your group/department. Do I have to manually update the SEP client? As mentioned earlier, UCSF SEP for Windows clients will automatically receive security definition (anti-virus and IPS) updates from the central servers. Manual update instructions can be found in the previous section. Updates to the client itself, may also be sent from the central UCSF SEP servers if you are connected to the campus network (ethernet, ucsfwpa, or vpn@ucsf [18]). The move up-todate client versions are also available on the software@ucsf download site [2] and can always be used to update your client to the latest version. What if my computer is unable to reach the UCSF SEP server; will it still get updates? Yes, if your computer has access to the Internet but is unable to reach the central UCSF SEP server, it will receive definition updates directly from the Symantec Corporate LiveUpdate server. What ports do we need to allow in our hardware firewalls so SEP clients can get updates automatically and correctly communicate with the management servers? The UCSF SEP client uses standard http and https ports to communicate with the central SEP servers. If you restrict Port 80 or Port 443 on your network, please contact the ITS Customer Service Desk to receive a list of SEP servers to put in your firewall rules. I'm already running an anti-virus and host-based firewall program. Can I install SEP for additional protection?
22 Running multiple anti-virus and firewall programs will degrade your system's performance and may cause a number of issues. We highly recommend removing other anti-virus, antimalware, and host-based firewall programs before installing SEP. More information can be found in the Symantec KB Article TECH [19] Do I have to disable the Windows firewall before installing SEP? No. SEP works with Microsoft Windows security components and will take care of the Windows firewall settings during its install. How do I find the quarantine and delete infected files if necessary? Launch the application by double clicking the shield icon located near the Windows clock. Alternatively it can also be launched from the icon on the Windows metro tile or found by navigating through "all programs". On the main window click on the option to "View Quarantine" from the left side of the main Symantec window. The ability to delete or restore the file if the file is known to not be malware infected can be performed from this screen. Does SEP support Windows Internet Connection Sharing (ICS)? No. More informaton can be found at [20] Required Service Information Symantec Endpoint Protection (SEP) [21] Images
23
24
25
26
27
28
29
30
31
32 GET IT HELP. Contact the Service Desk online, or phone Site Login Site Index Suggest an IT Improvement UC Regents Source URL: Links: [1] [2] [3] [4] [5] [6] [7] [8]
33 [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21]
Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition
NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:
More informationWindows XP with Symantec AntiVirus 10 Corporate Edition
NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only
More informationSophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
More informationCox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
More informationContents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
More informationQuick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
More informationContents. VPN Instructions. VPN Instructions... 1
VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationSTEP 1: INSTALLING WINDOWS DEFENDER
Office of Information Technology Secure your Windows XP Computer for Use on AU s Network Every member of the AU community has a shared responsibility for the safekeeping of our computer network. Since
More informationNetwork Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
More informationAV Management Dashboard
LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data
More informationAirtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
More informationClient Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
More informationSymantec Endpoint Protection and Symantec Network Access Control Client Guide
Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationDocufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
More informationFollow the instructions below for first-time users only
Whittier Law School Law Library Cisco NAC Agent Wireless Installation Guide For Microsoft Windows In order to access the wireless network on campus, Microsoft Windows laptop users must go through the Cisco
More informationNet Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
More informationAspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationSymantec Endpoint Protection and Symantec Network Access Control Client Guide
Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished
More informationTable of Contents. Rebit 5 Help
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
More informationSymantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationUser Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection
User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot
More informationSpector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
More informationSymantec Endpoint Protection Small Business Edition Client Guide
Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide The software described in this book is furnished under a license agreement
More informationClient Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
More informationContents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29
Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your
More informationServer Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s
Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable
More informationavast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
More informationGetting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
More informationHow to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationSymantec Endpoint Protection Analyzer Report
Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationAllworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
More informationSophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later
Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the
More informationHow To Install Database Oasis On A Computer Or Computer (For Free)
INSTALLATION INSTRUCTIONS Table of Contents Installation Instructions 1 Table of Contents 1 System Requirements 2 Installation 3 Selecting where to Install the Professional Server 3 Installing Prerequisites
More informationhttp://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationF-Secure Anti-Virus for Windows Servers. Administrator's Guide
F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationSymantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More informationSOS Suite Installation Guide
SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationFrequently Asked Questions: Xplornet Internet Security Suite
Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my
More informationSymantec Endpoint Protection End-User Guide For MacOS X
Symantec Endpoint Protection End-User Guide For MacOS X Symantec Endpoint Protection (SEP) is the evolutionary successor to Symantec Anti-Virus (SAV). SEP provides the anti-virus protection of SAV and
More informationInstalling and Configuring Microsoft Dynamics Outlook Plugin to Use with ipipeline MS CRM
Installing and Configuring Microsoft Dynamics Outlook Plugin to Use with ipipeline MS CRM Downloading 1. Download zip file for your version of Outlook (32-bit or 64-bit) and save to computer. (This is
More informationBasic Virus Removal Steps
Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove
More informationRemote Access in Windows XP
Remote Access in Windows XP Overview Sections: Page: Security Precautions to Consider When Connecting Remotely 2 1. Check for Operating System updates 2 2. Install Antivirus 2 3. Run a Full System Scan
More informationAd-Aware Antivirus Overview
Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day
More information2. PMP New Computer Installation. & Networking Instructions
ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for
More informationMicrosoft Windows Installation and Troubleshooting Guide
Remote Access Services Microsoft Windows - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MICROSOFT WINDOWS XP INSTALLATION PROCEDURES... 3 2 MICROSOFT
More informationTroubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727)
Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) If you are unable to resolve your issue using the Troubleshooting steps below, please contact Sprint Customer
More informationMicrosoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
More informationUser Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0.
User Guide for the Essentials Edition Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere User Guide for the Essentials Edition
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationMcAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationHow to Configure Sophos Anti-Virus for Home Systems
How to Configure Sophos Anti-Virus for Home Systems When you download and install Sophos on your home computer, on-access scanning is enabled. However, the settings for scheduled scans and scanning for
More informationRemote Access Services Microsoft Windows - Installation Guide
Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3
More informationF-Secure Client Security. Administrator's Guide
F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationSophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationHow to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
More informationBefore You Begin, Your Computer Must Meet the System Requirements
Before You Begin, Your Computer Must Meet the System Requirements Windows: Minimum: Windows Vista SP2 or Windows 7 & 8 Remote Desktop Protocol (connection) 7.1 or higher 150 MB hard drive space 2 GB RAM
More informationBest Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
More informationXythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationREMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM
REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationInstallation Guide. Research Computing Team V1.9 RESTRICTED
Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
More informationESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
More informationWindows Embedded Standard 7 (WES7) Administration Guide
Windows Embedded Standard 7 (WES7) Administration Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates
More informationF-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
More informationAdministrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
More informationESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
More informationTrend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
More informationavast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)
avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products
More informationGetting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
More informationProduct Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
More informationHoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
More informationUsing TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
More informationUser Guide Replica Automatic Backup System
User Guide Replica Automatic Backup System 2009 Seagate Technology Contents 1 Getting Started with the Seagate Replica Automatic Backup System...4 Replica s First Steps...4 Safely Disconnect...4 Using
More informationNComputing vspace Server 8.3 for Windows. Software and Firmware Upgrade Guide. Document version 1.2
NComputing vspace Server 8.3 for Windows Software and Firmware Upgrade Guide Document version 1.2 October 20, 2015 Table of contents 1. Introduction... 4 1.1. Purpose of the document... 4 1.2. Intended
More informationImmotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationBloomfield Hills Schools VPN and Viewconnect Instructions
Connect to Bloomfield Hills Schools VPN - Open Internet Explorer. - Type https://vpn.bloomfield.org into the address bar. - Click Continue to this website (not recommended). if prompted. - If this is your
More informationBasic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition
Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationRemote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x)
Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Start your Internet Explorer browser and direct it to the faculty home page. Click on the link Remote Access,
More information2. Installation and System requirements
RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product
More informationManaged Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
More information