Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:

Size: px
Start display at page:

Download "Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:"

Transcription

1 Image not found it.ucsf.edu Published on it.ucsf.edu ( Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on March 23, 2016 Updating Security Definitions (AV and IPS) Campus Clients UCSF SEP for Windows clients connected to the campus network will automatically receive updates to security definitions on a regular basis from the central IT SEP Management servers. Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec: 1. Launch the SEP client. Windows 7: double-click on the SEP icon in your taskbar at the lower-right corner of your screen Windows 8 / 8.1 : launch the SEP icon from the Windows 8 user interface formerly known as "Metro" 2. Click on the 'LiveUpdate' button in the Symantec Endpoint Protection window 3. A 'LiveUpdate' window will appear and immediately check online for any updates 4. Once the latest updates have been downloaded and installed, click the OK button to close the window Off Campus Clients Off-campus SEP for Windows clients are also scheduled to automatically receive updates via LiveUpdate on a regular pre-set schedule directly from Symantec. You can also run LiveUpdate manually, as well as, modify the LiveUpdate Schedule. To run Live Update Manually: 1. Launch the SEP client. Windows 7: double-click on the SEP icon in your taskbar at the lower-right corner of your screen Windows 8 / 8.1 : launch the SEP icon from the Windows 8 user interface formerly known as "Metro" 2. Click on the 'LiveUpdate' button in the Symantec Endpoint Protection window

2 3. A 'LiveUpdate' window will appear and immediately check online for any updates 4. Once the latest updates have been downloaded and installed, click the OK button to close the window To modify the LiveUpdate schedule to better suit your computing needs: 1. Open the SEP client. Windows 7: double-click on the SEP icon in your taskbar at the lower-right corner of your screen Windows 8 / 8.1 : launch the SEP icon from the Windows 8 user interface formerly known as "Metro" 2. On the left hand column, click on the 'Change Settings' button 3. To the right where it says 'Client Management', click on the 'Configure Settings' button

3 4. At the top of the 'Client Management Settings' window, click on the 'LiveUpdate' tab

4 5. Modify the 'Frequency' section to your preference Warning: Setting the 'Frequency' to "Continuously" may cause system performance issues. We high recommend against choosing this option A few things to consider: On average, Symantec releases mini-updates four times a day. Choosing an update schedule anywhere from every 8 hours to once a day is generally acceptable. The longer the frequency time, the larger the update which requires a longer time to download and more system resources during the update. Manually updating clients off-line (not connected to the Internet) If you are infected with a new virus that is not being detected properly and have taken your computer off-line (not connected to the Internet) to prevent propagating the virus on your network, you can still update your virus definitions manually. Note: You will need another computer that is connected to the Internet and a removable media device such as a thumbdrive or cd-r. To manually update your definitions off-line: 1. Go to a different machine that is free of viruses and connected to the Internet 2. Using the clean machine, go to Symantec's Download Virus Definitions [1] page 3. Under 'Download Definitions by Product', click on 'Select Product' and choose

5 "'Symantec Endpoint Protection'" Under the 'File-Based Protection' section, click on "Virus Definitions" next to 'Download' Download the appropriate file for your platform onto your removable media For 32-bit Windows Clients, choose the file under the section 'Symantec Endpoint Protection Client Installation on Windows platforms (32-bit)' For 64-bit Windows Clients, choose the file under the section 'Symantec Endpoint Protection Client Installation on Windows platforms (64-bit)' Take your removable media and load it onto the computer you wish to update On the computer you wish to update, double-click on the file you downloaded You will be prompted to update your virus definitions. Click the 'Yes' button. You will be notified after the update is complete. Click the 'Ok' button to complete the process. Upgrading to the latest version What is the latest version for SEP for Windows? The latest version that has been verified for the UCSF environment can always be found at: [2] How do I upgrade to the latest version? Just download and install the latest version by following the SEP for Windows: Install Guide [3] How do I find out what version of SEP is installed?

6 Launch Symantec Endpoint Protection ( Start > All Programs > Symantec Endpoint Protection > Symantec Endpoint Protection ) Click on the 'Help' button (in the upper right corner of the window) Click on 'About...' Running, Pausing, and Delaying Scans The UCSF SEP clients have settings and policies enabled to actively protect your system that require no interaction unless a threat is found. SEP clients are scheduled weekly to run a full system scan in the background and also requires no interaction. Although we try to schedule scans to have as little impact on system resources, it is still sometimes necessary to pause or delay a scan if it impedes with work productivity. If you suspect your computer may have been infected with a virus or other malware, or have had to connect to a questionable network that is prone to attacks, you may want to run a manual scan or schedule scans to occur on a more regular basis. This section covers the following topics to address these issues: Scanning a specific file/folder on-demand

7 Running a Manual Scan Running and Scheduling a Custom Scan Pausing or Delaying a Scan in Progress Running Scans in Safe Mode Scanning a Specific File or Folder On-Demand 1. Right-click on the file or folder you want to scan 2. In the context menu that appears, click on 'Scan for viruses...' 3. A progress window will appear to report files containing risks, type of risks, and the action it took or recommends taking 4. After the scan has completed and all actions taken, click on the 'Close' button to close the window Running a Manual Scan 1. Under Window 7, open the 'Symantec Endpoint Protection' window by double-clicking on the SEP icon in your taskbar at the bottom-right corner of your screen on Windows 8 / 8.1 double click the SEP icon found on the Windows 8 user interface formerly known as "Metro" 2. On the left side of the window, click on 'Scan for threats' 3. Click on the type of scan you want to run: 'Run Active Scan': will run a scan on commonly infected areas such as the Windows System folders and Temporary Internet Files folders. 'Run Full Scan': will run a scan on your entire computer, except for Network Drives the scan will run and give you a report of anything it finds 4. After clicking on the scan you want to run, a progress window will appear to report files containing risks, type of risks, and the action it took or recommends taking 5. After the scan has completed and all actions taken, click on the 'Close' button to close the window Running a Custom Scan 1. Open the 'Symantec Endpoint Protection' window by double-clicking on the SEP icon in your taskbar at the bottom-right corner of your screen 2. On the left side of the window, click on 'Scan for threats' 3. Click on the 'Create a New Scan' link in the middle of the window 4. Set your options for the scan, then click on the button 'Next' 5. Choose 'On demand', then click on the button 'Next' 6. Type in a name for the scan and a description for the type of scan you are creating 7. Click on the button 'Finish', the main SEP window should now list your scan under the 'Scan Name' 8. Right-click on the scan your just created, and click 'Scan Now'the scan will run and give you a report of anything it finds 9. After the scan has completed and all actions taken, click on the 'Close' button to close the window

8 Scheduling a Custom Scan 1. Open the 'Symantec Endpoint Protection' window by double-clicking on the SEP icon in your taskbar at the bottom-right corner of your screen 2. On the left side of the window, click on 'Scan for threats' 3. Click on the 'Create a New Scan' link in the middle of the window 4. Choose the 'Custom Scan' radio button then click on the button 'Next'

9 5. Set your options for the scan, then click on the button 'Next' 6. Choose 'At specified times', then click on the button 'Next'

10 7. Verify there is a check next to the 'Enable' checkbox 8. Choose your 'Scan Schedule', then click on the button 'Next'

11 9. Type in a name for the scan and a description for the type of scan you are creating

12 10. Click on the button 'Finish', the main SEP window should now list your scan under the 'Scan Name' Pausing and Delaying Scans Although we try to schedule scans to have as little impact on system resources, it is still sometimes necessary to pause or delay a scan if it impedes with work productivity. By default, the general UCSF SEP settings allow this functionality. If you do not see this feature on your client, please check with your department's IT support staff. To pause a scan you initiated, just click on the 'Pause Scan' button found in the scan dialogue box. When you are ready to resume the scan, just click the 'Resume Scan' button and the scan will continue where it left off. To pause a scheduled scan: 1. For Windows 7 double-click the SEP client icon, yellow shield, in the system tray (bottom right corner where the clock is). On Windws 8 / 8.1 open the SEP application from the Windows 8 user interface formerly known as "Metro" 2. In the upper right corner just to the left of the help button, there should be a link to indicate either a scan is in progress or schedule to begin soon. Click this link and follow the on-screen instructions to either pause or delay the scan.

13 1. If the link is absent or missing, no scan is in progress or scheduled for the next hour. Running Scans in Windows SafeMode Sometimes it is necessary to run a scan while in Windows SafeMode to prevent malware from loading that may interfere with antivirus programs. This procedure requires the use of special utility by Symantec called "SymHelp with Symantec Power Eraser". Booting into 'SafeMode

14 with Networking' may also be required to carry out this scan. Note: The SymHelp utility should be downloaded whenever possible while in Windows normal mode. The easiest way to accomplish this task is through the SEP client interface. If the SEP client cannot be launched, or if your computer can only boot into SafeMode, the SymHelp utility can also be downloaded at: [4]. First, download and install SymHelp Utility 1. Open the SEP interface (double-click on the SEP icon in the systray) 2. On the rupper right of the window, click the Help menu and choose "Download Support Tool follow the prompts to install the SymHelp utility Then, once the application has been downloaded and installed, you can perform a scan by: 1. Run the SymHelp Utility -- Run Threat Analysis Scan 2. Check the box "Basic scan - 5 min." Remove any other check marks.

15 3. Click the Scan button to begin the scan of the hard drive Note: If a Rootkit is believed to be causing the problem, check the box "Include a rootkit..." to enable this feature. A reboot is required, and you will be prompted to reboot, hit the "yes" button. 4. When the scan completes, note what files were identified (some legitimate files may be identified) and select any suspicious programs you wish to remove and click Fix (this will cause the system to reboot). You may wish to select to save a copy of the log records to the desktop.

16 Additional instructions on how to use the SymHelp utility can be found in Symantec's Knowledge Base Article TECH [5] and TECH [6] Creating Scan Exceptions By default, the UCSF SEP client policies are set to give applications priority to system resources over the SEP processes. Creating exceptions (or exclusions) for processes, files, or directories can negatively hinder the security posture of your computer and is not recommended for most cases. However, there are certain applications that will recommend creating exception (or exclusion) policies to assist with system performance issues caused by the application's interaction with anti-virus/anti-malware scanners. Typically these applications deal with large data files, or lots of rapidly changing data files, with no executable code in those files. These recommendations can typically found in the "Best Practices Guide" of such applications. Before proceeding with creating a scan exception/exclusion, please consult with your IT support staff. User-Defined Exceptions There are a number of Exceptions that users are allowed to configure in the UCSF SEP client. The two types we will concentrate on are 1) File/Folder exclusions and 2) Process exclusions. Excluding Files/Folders To prevent special files or folders from being scanned, you will need to create a "Security Risk Exception" and a "SONAR Exception" 1. Double-click on SEP client Icon found in systray (bottom-right of the screen) 2. On the left side of the SEP window, click "Change Settings" 3. On the right side of the SEP window next to 'Exceptions', click on the button labeled "Configure Settings" 4. In the 'Exceptions' window, click on the button "Add..." found in the 'User-defined Exceptions' tab 5. Then select 'Security Risk Exception' and choose "Folder" (or "File") 6. Find the Folder (or File) you wish to exclude and select it by clicking on it (the folder should become highlighted and the "Folder" field will change to match your selection). 7. Under 'Exception Type:', select "Auto-Protect" For best security practice, you will still want to scan these files for malicious code during the normal weekly scheduled scans. Selecting "Auto-Protect" will prevent scanning/monitoring of this folder/file while it is being used by its application. 8. Click the button, "OK" 9. In the 'Exceptions' window, click on the button "Add..." found in the 'User-defined Exceptions' tab 10. Then select 'SONAR Exception' and choose "Folder" 11. Find the Folder you wish to exclude and select it by clicking on it (the folder should become highlighted and the "Folder" field will change to match your selection).

17 SONAR is the heuristic monitoring engine for SEP that prevents zero-day attacks by monitoring behaviour of processes as they interact with files/folders on the system. Creating a 'SONAR Exception' will exclude a specific folder from being examined during this process. 12. In the 'Exceptions' window, click the "Close" button Excluding Applications/Processes To prevent an application (or process) from being scanned by the SEP's auto-protect and SONAR features, you will need to create an "Application Exception". Note: Creating an Application Exception puts your computer at great risk and is not recommended for most applications! 1. Double-click on SEP client Icon found in systray (bottom-right of the screen) 2. On the left side of the SEP window, click "Change Settings" 3. On the right side of the SEP window next to 'Exceptions', click on the button labeled "Configure Settings" 4. In the 'Exceptions' window, click on the button "Add..." found in the 'User-defined Exceptions' tab 5. Then click on "Application Exception" 6. Find the Application (exe) you wish to exclude and select it by clicking on it (the application/file should become highlighted and the "File" field will change to match your selection) 7. Make sure the 'Action:' field is set to "Ignore" 8. Click the button "OK" 9. In the 'Exceptions' window, click the "Close" button System Tray Icons

18 Checking what version of SEP is installed There have been several versions of SEP introduced at UCSF. It is always recommended to run the latest release to ensure the most up-to-date protection for your system. The installers found at the site [7], can always be downloaded and installed on top of your current version to ensure that you have the latest of SEP. Alternatively, you can check the version currently installed on your system by following these steps: 1. Launch the SEP for Windows client. Windows 7: double-click on the SEP icon in your taskbar at the lower-right corner of your screen Windows 8 / 8.1 : launch the SEP icon from the Windows 8 user interface formerly known as "Metro" 2. Click on the "Help" button found in the upper right corner of the SEP window. 3. Select the "About" menu item to display the current version of the client. Uninstalling Though uninstalling SEP is not recommended, you can uninstall the UCSF SEP client at anytime. Please note that the UCSF SEP client does not require subscription renewal and should be installed on your system to be compliant with UCSF policies, as well as provide your system adequate protection against malware and other network-related risks. To uninstall SEP for Windows, please follow the appropriate set of instructions depending on your Operating System. Windows XP, 2000, Open 'Control Panel' 2. Select 'Add/Remove Programs' 3. Select 'Symantec Endpoint Protection', click 'Add/Remove', and follow the instructions on the screen Manual uninstall procedures for SEP 11.x can be found on Symantec's Knowledge Base Article TECH [8] Manual uninstall procedures for SEP 12.x can be found on Symantec's Knowledge Base Article TECH [9]

19 Windows Vista, 7, 2008, 2008R2 1. Open 'Control Panel' 2. Select 'Programs and Features' 3. Select 'Symantec Endpoint Protection', click 'Uninstall', and follow the instructions on the screen Manual uninstall procedures for 32-bit clients of SEP 11.x can be found on Symantec's Knowledge Base Article TECH [10] Manual uninstall procedures for 64-bit clients of SEP 11.x can be found on Symantec's Knowledge Base Article TECH91038 [11] Manual uninstall procedures for SEP 12.x can be found on Symantec's Knowledge Base Article TECH [12] Common Warning Messages and Client Behaviour I keep getting a warning message saying that svchost.exe has been blocked. Isn't svchost.exe a valid Windows process? Svchost.exe is used to run a number of services on newer versions of Windows, most of them are legitimate but some are not. SEP has detected malicious behavior with a particular service and has blocked it for your protection. Typically, this alert is related to remote desktop. The default UCSF SEP client firewall policies prohibits non-ucsf Internet connections from remotely controlling (via RDP, VNC, Timbuktu, etc) computers connected to the University network. If you look at the traffic logs in the SEP client (SEP -> View Logs -> Network Threat Protection -> View Logs -> Traffic Logs) you will see which firewall rule caused the block. Remote Desktop stopped working after I installed SEP, how do I connect from offcampus to my computer at UCSF with SEP installed? Remote access applications (such as MS Remote Desktop, VNC, and Timbuktu) poses unnecessary security risks to the university network and increases your computer's potential for being hacked. For increased security, the default UCSF SEP firewall policies block all remote access from non-ucsf IP addresses to your UCSF computer. If you have enabled these remote desktop services/applications, you can still connect to you computer from off-campus by securely signing into the vpn@ucsf [13] system before attempting to remotely control your machine. I keep getting messages saying a number of tmp files (DWH*.tmp) are infected and SEP keeps quarantining them. How do I fix this issue?

20 This was a known bug in the first version of SEP that UCSF deployed. To fix the issue: 1. Download and install the latest version of SEP for Windows, available on the software@ucsf site [2]. 2. reboot your computer 3. delete all DWH*.tmp files in your quarantine folder 4. delete all DWH*.tmp in the temp folder (Start -> Run -> "%temp%") Every time I open up a PDF file or open Acrobat, I get an error saying "Adobe Reader cannot open in Protected Mode due to a problem with your system configuration..." Adobe's site says this may be an issue with older versions of SEP. When will UCSF get the newer version that is compatible with Acrobat's Protected Mode feature? The latest version of UCSF's SEP client should now be compatible with Acrobat's Protected Mode feature. Please visit the software@ucsf [2] site to download the updater for Windows to SEP. I keep getting a lot of pop-up messages saying messages can't be sent, even when I'm not trying to send out messages. How do I fix this? The SEP client is most likely doing its job and preventing an undetected threat from turning your computer into a spam relay station. You should run a full scan to make sure your computer is not infected. More information can be found at: [14] Why has the default home page of my web browser been changed to " The SEP for Windows client has the ability to combat web browser hijackers [16]. When the homepage of a SEP client's browser has been redirected to an undesired site by a malicious infection, SEP will change the homepage as part of its remediation. As there is no way of determining what the computers original homepage was, a default of [15] You should run a full scan to make sure your computer is not infected other malware. Please contact your Computer Support Coordinator or the IT Help Desk for further assistance. My computer is behaving weirdly, how do i determine if SEP is affecting my computer adversely? Please review the SEP for Windows Troubleshooting documentation [17]. Other Frequently Asked Questions Who can use SEP and how much does it cost?

21 SEP is provided free to the UCSF community and can be used on computers of Faculty, Staff, Student or Affiliate working on UCSF business; both University-owned and home (personal) systems. Can our department use the UCSF license to manage our own clients, including policies, settings, and reporting? The UCSF SEP service is managed centrally by ITS and licenses are only distributed through this service offering. ITS does offer SEP group administration through its SEP server cluster to allow groups/departments to manage their own set of clients allowing your department/group to: Centrally manage your clients Set policies specific to your group Create automated reports Without the neeed to run individual servers To request SEP group administration, please submit a ticket to the help desk with the contact information of the IT Manager and the MSO or Director of your group/department. Do I have to manually update the SEP client? As mentioned earlier, UCSF SEP for Windows clients will automatically receive security definition (anti-virus and IPS) updates from the central servers. Manual update instructions can be found in the previous section. Updates to the client itself, may also be sent from the central UCSF SEP servers if you are connected to the campus network (ethernet, ucsfwpa, or vpn@ucsf [18]). The move up-todate client versions are also available on the software@ucsf download site [2] and can always be used to update your client to the latest version. What if my computer is unable to reach the UCSF SEP server; will it still get updates? Yes, if your computer has access to the Internet but is unable to reach the central UCSF SEP server, it will receive definition updates directly from the Symantec Corporate LiveUpdate server. What ports do we need to allow in our hardware firewalls so SEP clients can get updates automatically and correctly communicate with the management servers? The UCSF SEP client uses standard http and https ports to communicate with the central SEP servers. If you restrict Port 80 or Port 443 on your network, please contact the ITS Customer Service Desk to receive a list of SEP servers to put in your firewall rules. I'm already running an anti-virus and host-based firewall program. Can I install SEP for additional protection?

22 Running multiple anti-virus and firewall programs will degrade your system's performance and may cause a number of issues. We highly recommend removing other anti-virus, antimalware, and host-based firewall programs before installing SEP. More information can be found in the Symantec KB Article TECH [19] Do I have to disable the Windows firewall before installing SEP? No. SEP works with Microsoft Windows security components and will take care of the Windows firewall settings during its install. How do I find the quarantine and delete infected files if necessary? Launch the application by double clicking the shield icon located near the Windows clock. Alternatively it can also be launched from the icon on the Windows metro tile or found by navigating through "all programs". On the main window click on the option to "View Quarantine" from the left side of the main Symantec window. The ability to delete or restore the file if the file is known to not be malware infected can be performed from this screen. Does SEP support Windows Internet Connection Sharing (ICS)? No. More informaton can be found at [20] Required Service Information Symantec Endpoint Protection (SEP) [21] Images

23

24

25

26

27

28

29

30

31

32 GET IT HELP. Contact the Service Desk online, or phone Site Login Site Index Suggest an IT Improvement UC Regents Source URL: Links: [1] [2] [3] [4] [5] [6] [7] [8]

33 [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21]

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:

More information

Windows XP with Symantec AntiVirus 10 Corporate Edition

Windows XP with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only

More information

Sophos Computer Security Scan startup guide

Sophos Computer Security Scan startup guide Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

STEP 1: INSTALLING WINDOWS DEFENDER

STEP 1: INSTALLING WINDOWS DEFENDER Office of Information Technology Secure your Windows XP Computer for Use on AU s Network Every member of the AU community has a shared responsibility for the safekeeping of our computer network. Since

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Symantec Endpoint Protection and Symantec Network Access Control Client Guide

Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

Follow the instructions below for first-time users only

Follow the instructions below for first-time users only Whittier Law School Law Library Cisco NAC Agent Wireless Installation Guide For Microsoft Windows In order to access the wireless network on campus, Microsoft Windows laptop users must go through the Cisco

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Symantec Endpoint Protection and Symantec Network Access Control Client Guide

Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished

More information

Table of Contents. Rebit 5 Help

Table of Contents. Rebit 5 Help Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Symantec Endpoint Protection Small Business Edition Client Guide

Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide The software described in this book is furnished under a license agreement

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Symantec Endpoint Protection Analyzer Report

Symantec Endpoint Protection Analyzer Report Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the

More information

How To Install Database Oasis On A Computer Or Computer (For Free)

How To Install Database Oasis On A Computer Or Computer (For Free) INSTALLATION INSTRUCTIONS Table of Contents Installation Instructions 1 Table of Contents 1 System Requirements 2 Installation 3 Selecting where to Install the Professional Server 3 Installing Prerequisites

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

SOS Suite Installation Guide

SOS Suite Installation Guide SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing

More information

Using Remote Web Workplace Version 1.01

Using Remote Web Workplace Version 1.01 Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

Symantec Endpoint Protection End-User Guide For MacOS X

Symantec Endpoint Protection End-User Guide For MacOS X Symantec Endpoint Protection End-User Guide For MacOS X Symantec Endpoint Protection (SEP) is the evolutionary successor to Symantec Anti-Virus (SAV). SEP provides the anti-virus protection of SAV and

More information

Installing and Configuring Microsoft Dynamics Outlook Plugin to Use with ipipeline MS CRM

Installing and Configuring Microsoft Dynamics Outlook Plugin to Use with ipipeline MS CRM Installing and Configuring Microsoft Dynamics Outlook Plugin to Use with ipipeline MS CRM Downloading 1. Download zip file for your version of Outlook (32-bit or 64-bit) and save to computer. (This is

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

Remote Access in Windows XP

Remote Access in Windows XP Remote Access in Windows XP Overview Sections: Page: Security Precautions to Consider When Connecting Remotely 2 1. Check for Operating System updates 2 2. Install Antivirus 2 3. Run a Full System Scan

More information

Ad-Aware Antivirus Overview

Ad-Aware Antivirus Overview Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day

More information

2. PMP New Computer Installation. & Networking Instructions

2. PMP New Computer Installation. & Networking Instructions ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for

More information

Microsoft Windows Installation and Troubleshooting Guide

Microsoft Windows Installation and Troubleshooting Guide Remote Access Services Microsoft Windows - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MICROSOFT WINDOWS XP INSTALLATION PROCEDURES... 3 2 MICROSOFT

More information

Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727)

Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) If you are unable to resolve your issue using the Troubleshooting steps below, please contact Sprint Customer

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0.

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0. User Guide for the Essentials Edition Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere User Guide for the Essentials Edition

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

McAfee.com Personal Firewall

McAfee.com Personal Firewall McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

How to Configure Sophos Anti-Virus for Home Systems

How to Configure Sophos Anti-Virus for Home Systems How to Configure Sophos Anti-Virus for Home Systems When you download and install Sophos on your home computer, on-access scanning is enabled. However, the settings for scheduled scans and scanning for

More information

Remote Access Services Microsoft Windows - Installation Guide

Remote Access Services Microsoft Windows - Installation Guide Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

How to use SURA in three simple steps:

How to use SURA in three simple steps: How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.

More information

Before You Begin, Your Computer Must Meet the System Requirements

Before You Begin, Your Computer Must Meet the System Requirements Before You Begin, Your Computer Must Meet the System Requirements Windows: Minimum: Windows Vista SP2 or Windows 7 & 8 Remote Desktop Protocol (connection) 7.1 or higher 150 MB hard drive space 2 GB RAM

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Installation Guide. Research Computing Team V1.9 RESTRICTED

Installation Guide. Research Computing Team V1.9 RESTRICTED Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Windows Embedded Standard 7 (WES7) Administration Guide

Windows Embedded Standard 7 (WES7) Administration Guide Windows Embedded Standard 7 (WES7) Administration Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Using TS-ACCESS for Remote Desktop Access

Using TS-ACCESS for Remote Desktop Access Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources

More information

User Guide Replica Automatic Backup System

User Guide Replica Automatic Backup System User Guide Replica Automatic Backup System 2009 Seagate Technology Contents 1 Getting Started with the Seagate Replica Automatic Backup System...4 Replica s First Steps...4 Safely Disconnect...4 Using

More information

NComputing vspace Server 8.3 for Windows. Software and Firmware Upgrade Guide. Document version 1.2

NComputing vspace Server 8.3 for Windows. Software and Firmware Upgrade Guide. Document version 1.2 NComputing vspace Server 8.3 for Windows Software and Firmware Upgrade Guide Document version 1.2 October 20, 2015 Table of contents 1. Introduction... 4 1.1. Purpose of the document... 4 1.2. Intended

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Bloomfield Hills Schools VPN and Viewconnect Instructions

Bloomfield Hills Schools VPN and Viewconnect Instructions Connect to Bloomfield Hills Schools VPN - Open Internet Explorer. - Type https://vpn.bloomfield.org into the address bar. - Click Continue to this website (not recommended). if prompted. - If this is your

More information

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x)

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Start your Internet Explorer browser and direct it to the faculty home page. Click on the link Remote Access,

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information