Improving Virus Protection at Kent State University

Size: px
Start display at page:

Download "Improving Virus Protection at Kent State University"

Transcription

1 Improving Virus Protection at Kent State University (Prepared by Joe Aulino. Distributed at UCT Oct. 31, 2003) For the purpose of this document, the term virus will be used generically to mean any piece of software that is loaded onto your computer without your knowledge and runs against your wishes. This very general use of the term virus is meant to cover viruses, worms, Trojan Horses and other computer infestations 1. How does KSU currently provide Virus protection? a. Information Services provide licenses for virus protection software for every faculty, staff and student. b. Updates to virus software are made available as soon as they are available from the vendor. c. All sent to kent.edu or Lotus Notes is scanned for viruses before being delivered. d. The Kent Network Users Group (KNUG) as a group and as a listserv is very active in sharing information among technical staff across the University. This helps to raise awareness and often stops viruses before they become problems. e. Some systems administrators across the University have also invested in their own virus protection systems to further protect resources under their control. 2. Have there been times when Kent State s approach to virus protection failed? Yes. Three incidents have happened over the last year where Virus protection failed in substantial ways. A brief description of each follows: a. SQL Slammer Virus: This virus hit the campus last spring. It caused unprotected servers running SQL server software to flood our network with traffic and brought the network down for approximately 1.5 days. b. RPC Virus: This virus hit the campus last week. While network services took fast action to contain the virus, technical staff had to clean numerous infected computers across campus. c. Sobig Virus: This virus hit on Tuesday, August 19 th. Virus protection software was not available from vendors until approximately 4 hours after the virus infected our computers. delivery was delayed (in some cases over 24 hours) but no was lost and the backlog was cleared by August What is the cost of these failures? a. Lost productivity by faculty, staff and students represents the greatest share of the cost and is immeasurable. Some more direct costs follow. b. SQL Slammer: i. Lost use of the network for 1.5 days ii. Roughly 98 Hours of IS staff time iii. Numerous hours of Lan Admin staff time

2 c. RPC Virus: i. Lost use of numerous desktop PCs ii. Roughly 84 Hours of IS staff time iii. Numerous hours of Lan Admin staff time d. Sobig Virus: i. Lost use of numerous desktop PCs ii. Delays of 24 to 48 hours in delivering (Lotus Notes to Lotus Notes s were not impacted) iii. Roughly 60 hours of IS staff iv. Numerous hours of Lad Admin staff time The bottom line these outbreaks are disruptive, costly in man-hours needed for correction, costly in lost productivity and degrade the ability of IS to provide support for mission critical activities and 4. Are there any themes or patterns in the causes of these outbreaks? There are two areas that particularly raise Kent State s risk. The first is unprotected computers. In the case of Sobig, the virus moved too quickly (it was the fastest moving virus of all time) for the protection software to keep pace, but this is the exception. Unprotected servers and computers were definitely the problem in the SQL Slammer and RPC attacks. Second, the number of servers on campus presents the University with a very large risk. servers, particularly if unprotected, present the simplest way to infect the most computers in the shortest amount of time. This was evident in the Sobig attack. 5. How does IS recommend addressing these issues in the short term? a. The kent.edu and Lotus Notes servers should no longer accept certain types of attachments. A list of these attachment types appears at the end. There are ways that users needing to send or receive these attachments can safely do so (this is also explained in detail at the end). Information Services is proposing that this be implemented no later than September 15, b. All should be routed through smtp.kent.edu. This will ensure that all is virus checked and that the majority of spam is eliminated. This does not preclude units from running their own and from running their own virus scans. Information Services is proposing that this be implemented no later than Nov 15,2003. This time is necessary to increase the processing power of the existing mail relays. 6. Why eliminate certain types of attachments? attachments are the most common method used to deliver viruses to desktop computers. Viruses have to use these types of attachments because it allows them to automatically launch their program and infect the target machine. This relatively simple recommendation will eliminate many viruses - 2 -

3 from ever reaching a computer. Again, for those who need to send or receive such attachments, the last page explains two methods for doing so. 7. Won t those sending viruses just go to different attachment types? Of course this is possible and in some cases likely. However, viruses need a type of file that is able to execute a command on your computer. This limits the choices that virus purveyors have, and it makes this approach very robust. 8. What will happen to the s with the offending attachments? The s will be delivered as addressed. However, the attachment will be deleted from the . The recipient can then contact the sender and request the attachment be modified in a way that it can arrive safely. 9. Does have to be routed through IS servers if sufficient virus protection is in place on local servers? No. If local servers have sufficient and appropriate virus and spam protection in place, does not have to be routed through IS servers. However, administrators will have to contact IS (Greg Seibert gregs@kent.edu) and arrange for an audit of their systems if they wish to take advantage of this exception. IS will evaluate these requests on a case-by-case basis. Exceptions will be granted if the server is sufficiently protected, if the server removes attachments per the list at the end of this document, and the unit has sufficient dedicated resources to maintain an appropriate level of protection. Exceptions will be revoked if systems fail to maintain adequate virus protection or resources to support the server. Given the risk to the University, IS will err on the side of not granting exceptions. 10. What does IS recommend in the longer-term to address these issues? a. Establishing a patch server(s) on Kent State. This patch server would house the latest patches for operating systems and applications to protect computers against viruses. Ideally, these patches would be pushed onto computers connected to the Kent State network. How to run and maintain such a server, issues associated with pushing fixes onto computers and other policy issues will have to be addressed as this moves forward. IS will take a collaborative approach and work with all divisions in developing and implementing this idea. b. Providing Active Directory services to all faculty, students and staff. This will simplify the task of getting patches and virus protection out particularly in short notice situations. Again, a University-wide, collaboratively developed plan will be necessary to make this a success

4 11. When do the long-term solutions need to be in place? The long-term solution should be in place as quickly as possible. But, there are technical, process and policy issues to be evaluated and addressed before we can move forward. To help hasten this, IS is working on a pilot project to test these technologies

5 Attachment Extensions to Be Removed from s containing attachments with these extensions will have the attachments removed and then be delivered..ade Microsoft Access project extension.adp Microsoft Access project.mdb Microsoft Access program.bas Microsoft Visual Basic class module.mde Microsoft Access MDE database.bat Batch file.mhtml Eudora metarefresh.chm Compiled HTML Help file.msc Microsoft Common Console document.class Java bytecode file.msi Microsoft Windows Installer package.cmd Microsoft Windows NT Command script.msp Microsoft Windows Installer patch.com Microsoft MS-DOS program.mst Microsoft Visual Test source files.cpl Windows Control Panel extension.pcd Microsoft Visual compiled script.crt Security certificate.pif Shortcut to MS-DOS program.exe Program.reg Registration entries.hlp Help file.scf Windows Explorer.hta HTML archive.scr Screen saver.inf Setup Information.sct Windows Script Component.ins Internet Naming Service.sh[bs] Shell Scrap object.isp Internet Communication settings.url URL.jar Java archive.vb Visual Basic scripts.js Javascript file.vb[es] Visual Basic scripts.jse Javascript encoded script file.[xl]xnk Microsoft Exchange shortcut.jsp HTML-Java link.ws[cfh] Windows Script.jsp HTML-Java link.ma[dfgmqrstvw] Microsoft Access shortcuts If You Need to Send or Receive an with one of these Attachment Types There are two options: 1. Change (or have the sender change) the extension of the attachment to a name that s not restricted. At the receiving end, the extension can be changed back. For instance a file named test.scr could be changed to test.sss and then changed back to test.scr upon receipt. 2. Put the file in a zip format and then attach it. zip files will go through with no problem

Trust Informatics Policy. Information Governance Department. Computer Antivirus Management Policy

Trust Informatics Policy. Information Governance Department. Computer Antivirus Management Policy Document Control Trust Informatics Policy Information Governance Department Computer Antivirus Management Policy Document Title Author/Contact Computer Antivirus Management Policy Pauline Nordoff-Tate,

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010. Situation Microsoft IT had limited monitoring and reporting functionality with its existing antimalware system. Although the system could scan for malware, there was no reporting capability or configurable

More information

Chapter 6: ScanMail emanager

Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the purpose of ScanMail emanager

More information

Virus Protection for Small to Medium Networks

Virus Protection for Small to Medium Networks Virus Protection for Small to Medium Networks Overview Computer viruses are a leading security threat to Internet-connected networks. As more and more businesses have increased their productivity by using

More information

Reduce Your Virus Exposure with Active Virus Protection

Reduce Your Virus Exposure with Active Virus Protection Reduce Your Virus Exposure with Active Virus Protection Executive Summary Viruses are the leading Internet security threat facing businesses of all sizes. Viruses spread faster and cause more damage than

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

NITB Public & Partner File sharing Websites. User Guide

NITB Public & Partner File sharing Websites. User Guide NITB Public & Partner File sharing Websites User Guide SharePoint Online Page 1 of 23 Computer Services Table of Contents Table of Contents... 2 Introduction... 3 Accessing the Website... 4 Public Content...

More information

Perspective on secure network for control systems in SPring-8

Perspective on secure network for control systems in SPring-8 Perspective on secure network for control systems in SPring-8 Toru Ohata, M. Ishii, T. Fukui* and R. Tanaka JASRI/SPring-8, Japan *RIKEN/SPring-8, Japan Contents Network architecture Requirement and design

More information

Print Audit 6 Network Installation Guide

Print Audit 6 Network Installation Guide Print Audit 6 Network Installation Guide IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want

More information

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e B e s t P r a c t i c e s G u i d e It s a fact of business today: because of the economy, most organizations are asking everyone, including the IT staff, to do more with less. But tight budgets and the

More information

Microsoft Live@edu. The next generation platform for student collaboration and communication

Microsoft Live@edu. The next generation platform for student collaboration and communication Microsoft Live@edu The next generation platform for student collaboration and communication Introducing Microsoft Live@edu. It s free, familiar, reliable Windows Live Hotmail with your organization s name

More information

Email Security - A Holistic Approach to SMBs

Email Security - A Holistic Approach to SMBs Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

STANDARD ON CONTROLS AGAINST MALICIOUS CODE EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMAN RESOURCES AND SECURITY Directorate HR.DS - Security Informatics Security Brussels, 21/06/2011 HR.DS5/GV/ac ARES (2011) 663475 SEC20.10.05/04 - Standards European

More information

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg. STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication

More information

Enterprise Security Critical Standards Summary

Enterprise Security Critical Standards Summary Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors

More information

Anti-Virus Policy. Computing and Networking Services (CNS).

Anti-Virus Policy. Computing and Networking Services (CNS). Anti-Virus Policy Reference: CNS-P-I-ANTIVIRUS Revision: A Supersedes: Purpose: Source: None CNS is to provide a computing network that is virus-free. The purpose of this policy is to provide instructions

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Microsoft Outlook 2003 Quick Reference

Microsoft Outlook 2003 Quick Reference Microsoft Outlook 2003 Quick Reference Table of Contents Creating Messages 3 Using the Address book 3 Sending messages 3 Saving unfinished messages 4 Adding attachments 4 Using automatic signatures 5 Reading

More information

Guidance for recipients of an encrypted NHSmail email

Guidance for recipients of an encrypted NHSmail email Guidance for recipients of an encrypted NHSmail email January 2015 V.03 Copyright 2013, Health and Social Care Information Centre. 1 Contents Introduction 3 Receiving an encrypted email 3 Reply to and

More information

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Copyright (C) 2012 MessageSolution Inc. All Rights Reserved Table of Contents Chapter 1: Introduction... 3 1.1 About MessageSolution

More information

Web based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install:

Web based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install: Software V NO. 1.7 Date 9/06 ROI Configuration Guide Before you begin: Note: It is important before beginning to review all installation documentation and to complete the ROI Network checklist for the

More information

Edge-based Virus Scanning

Edge-based Virus Scanning APPLICATION NOTE Edge-based Virus Scanning 658 Gibraltar Court Milpitas, CA 95035 Phone: 408-635-8400 Fax: 408-635-8470 www.servgate.com i Edge-based Virus Scanning APPLICATION NOTE All product names referenced

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

Contents of this tutorial. Virus Protection under windows

Contents of this tutorial. Virus Protection under windows Contents of this tutorial?? Virus protection under Windows?? Printing under windows?? Connecting to Rice wireless network?? List of useful software Virus Protection under windows Let s face it, some people

More information

Today s Government Environment

Today s Government Environment Today s Government Environment What customers tell us IT Decision Makers E-mail is mission critical to our business Securing the enterprise is a top concern Compliance is difficult to enforce Built-in

More information

Symantec AntiVirus for Network Attached Storage Integration Guide

Symantec AntiVirus for Network Attached Storage Integration Guide Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement

More information

UQconnect Email+ for Life Basics

UQconnect Email+ for Life Basics UQconnect Email+ for Life Basics Course Objectives Read, Send, Reply to and Delete e-mail Locate and use addresses in an address book Send receive and open attachments Use folders to manage e- mail University

More information

Virus Definition and Adware

Virus Definition and Adware DANEnet Round Table: Viruses and Spyware Definition of a computer virus: -A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may

More information

Using Windows Update for Windows XP

Using Windows Update for Windows XP Using Windows Update for Windows XP Introduction This document provides instructions on updating Windows XP with the necessary patches. It is very important to update your operating system software in

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway

From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway This guide will assist you in going from the SPAMfighter SMTP Anti Spam Server to the SPAMfighter Mail Gateway. It is strongly advised

More information

Installing GFI FAXmaker

Installing GFI FAXmaker UTH Installing GFI FAXmaker System Requirements Before you install GFI FAXmaker, please ensure that you meet all the following requirements. GFI FAXmaker FAX Server: A Windows 2000 or 2003 server machine

More information

EM L09 Simplify IT with Creative Ways to Leverage Dashboards, Reports and Workflows Hands-On Lab

EM L09 Simplify IT with Creative Ways to Leverage Dashboards, Reports and Workflows Hands-On Lab EM L09 Simplify IT with Creative Ways to Leverage Dashboards, Reports and Workflows Hands-On Lab Description Operationally many IT departments are flooded with things to do," and with every additional

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Computer and Network Security Policy

Computer and Network Security Policy Coffeyville Community College Computer and Network Security Policy Created By: Jeremy Robertson Network Administrator Created on: 6/15/2012 Computer and Network Security Page 1 Introduction: The Coffeyville

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Northwestern University Dell Kace Patch Management

Northwestern University Dell Kace Patch Management Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.

More information

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520 AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN 1250 Siskiyou Boulevard Ashland OR 97520 Revision History Revision Change Date 1.0 Initial Incident Response Plan 8/28/2013 Official copies

More information

White Paper: Easy Remote Program Installations Using the Task Scheduler Service Rev 4 June 1, 2006

White Paper: Easy Remote Program Installations Using the Task Scheduler Service Rev 4 June 1, 2006 White Paper: Easy Remote Program Installations Using the Task Scheduler Service Rev 4 June 1, 2006 Lieberman Software Corporation http://www.liebsoft.com Abstract In this paper you will see how simple

More information

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support m-satut@northwestern.edu

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support m-satut@northwestern.edu Microsoft Software Update Services and Managed Symantec Anti-virus Michael Satut TSS/Crown IT Support m-satut@northwestern.edu Introduction The recent increase in virus and worm activity has created the

More information

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper THE COMPLETE VIEWER FOR MS PROJECT Seavus DOOEL 2010 2 TABLE OF CONTENTS 1 DEPLOYMENT OPTIONS... 3 1.1 SINGLE USER INSTALLATION... 3 1.2 CONCURRENT USER INSTALLATION... 4 1.3 SINGLE COMPANY KEY INSTALLATION...

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Introduction. POP and IMAP Servers. MAC1028 June 2007

Introduction. POP and IMAP Servers. MAC1028 June 2007 MAC1028 June 2007 Getting Started with Thunderbird 2.0 For Macintosh OS X Author: John A. Montgomery Adapted to OS X by: Peter Lee Revised by Mitchell Ochi and Deanna Pasternak Introduction...1 POP and

More information

IQware's Approach to Software and IT security Issues

IQware's Approach to Software and IT security Issues IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.

More information

Microsoft Outlook: Security Features. and Vulnerabilities

Microsoft Outlook: Security Features. and Vulnerabilities Microsoft Outlook: Security Features and Vulnerabilities ECE478 Report By: Mohammad Al-Fares Fares Al-Osaimi Abstract: Microsoft Outlook has been a favorite victim of virus makers for its relatively easy

More information

PC Proactive Solutions Technical View

PC Proactive Solutions Technical View PC Proactive Solutions Technical View PC Proactive Solutions Technicians View The following pages briefly describe our technicians view of our proactive management utility. Our software application is

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Computer System Security Updates

Computer System Security Updates Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),

More information

Upgrading Good Mobile Messaging and Good Mobile Control Servers

Upgrading Good Mobile Messaging and Good Mobile Control Servers Good Mobile Messaging Server 8.1.6 Good Mobile Control Server 2.6.4 for IBM Lotus Domino Upgrading Good Mobile Messaging and Good Mobile Control Servers Updated: 09/25/15 1 Introduction 1 2 Pre-Upgrade

More information

Best Practices in Deploying Anti-Malware for Best Performance

Best Practices in Deploying Anti-Malware for Best Performance The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying

More information

Information leakage from PC by P2P file-sharing application, Phishing and Spy ware

Information leakage from PC by P2P file-sharing application, Phishing and Spy ware Information leakage from PC by P2P file-sharing application, Phishing and Spy ware Koji Muto Institute of Systems & Information Technologies/KYUSHU 2 nd Laboratory Contents Introduction P2P file-sharing

More information

Guidelines for E-mail Account Management and Effective E-mail Usage

Guidelines for E-mail Account Management and Effective E-mail Usage Guidelines for E-mail Account Management and Effective E-mail Usage October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government

More information

Quick Reference Guide: Shared Hosting

Quick Reference Guide: Shared Hosting : Shared Hosting TABLE OF CONTENTS GENERAL INFORMATION...2 WEB SERVER PLATFORM SPECIFIC INFORMATION...2 WEBSITE TRAFFIC ANALYSIS TOOLS...3 DETAILED STEPS ON HOW TO PUBLISH YOUR WEBSITE...6 FREQUENTLY ASKED

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features

Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features Mail Services Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features Enterprise-class mail server High-performance Postfix SMTP services Scalable Cyrus IMAP and

More information

Enterprise K12 Network Security Policy

Enterprise K12 Network Security Policy Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,

More information

COMPUTER-INTERNET SECURITY. How am I vulnerable?

COMPUTER-INTERNET SECURITY. How am I vulnerable? COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer

More information

FlexSim LAN License Server

FlexSim LAN License Server FlexSim LAN License Server Installation Instructions Rev. 20150318 Table of Contents Introduction... 2 Using lmtools... 2 1. Download the installation files... 3 2. Install the license server... 4 3. Connecting

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

System Services. Engagent System Services 2.06

System Services. Engagent System Services 2.06 System Services Engagent System Services 2.06 Overview Engagent System Services constitutes the central module in Engagent Software s product strategy. It is the glue both on an application level and on

More information

Norton AntiVirus 9.0 for Macintosh

Norton AntiVirus 9.0 for Macintosh Norton AntiVirus 9.0 for Macintosh Upgrade Overview Overview Norton AntiVirus 9.0 for Macintosh is the latest release of Symantec s awardwinning Norton AntiVirus product line. This document explains the

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont. Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4

More information

Standard: Patching and Malicious Code Management

Standard: Patching and Malicious Code Management Standard: Patching and Malicious Code Management Page 1 Executive Summary San Jose State University (SJSU) is highly diversified in the information that it collects and maintains on its community members.

More information

Backup with synchronization/ replication

Backup with synchronization/ replication Backup with synchronization/ replication Peer-to-peer synchronization and replication software can augment and simplify existing data backup and retrieval systems. BY PAUL MARSALA May, 2001 According to

More information

BRIGHTSERVE 19468 SW 80 TH CT MIAMI, FL 33157 PHONE: 305.909.9586

BRIGHTSERVE 19468 SW 80 TH CT MIAMI, FL 33157 PHONE: 305.909.9586 BRIGHTSERVE 1 19468 SW 80 TH CT MIAMI, FL 33157 PHONE: 305.909.9586 2 BRIGHTSERVE TM BRIGHTSERVE : MAXIMIZING YOUR WEBSITE S REVENUE CONTENTS WHAT IS YOUR WEBSITE S AD REVENUE POTENTIAL?... 4 WHAT IS BRIGHTSERVE?...

More information

How to install phpbb forum on NTU student club web server

How to install phpbb forum on NTU student club web server How to install phpbb forum on NTU student club web server This guide contains the step by step instructions to install phpbb (stable release 3.0.7- PL1) on NTU student club web server. It does not cover

More information

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

(Self-Study) Identify How to Protect Your Network Against Viruses

(Self-Study) Identify How to Protect Your Network Against Viruses SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Malware: Malicious Code

Malware: Malicious Code Malware: Malicious Code UIC 594/Kent Law: Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations 2007, 2008 Robert H. Sloan Malicious code: Viruses Most famous type of

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Computer Viruses. What is a virus? Participating With Safety Briefing no. 5

Computer Viruses. What is a virus? Participating With Safety Briefing no. 5 Participating With Safety Briefing no. 5 Written by Paul Mobbs for the Association for Progressive Communications, March 2002. This briefing is one of a series on Information Security. It looks at: What

More information

Biological Sciences Computer Systems

Biological Sciences Computer Systems Biological Sciences Computer Systems Summary of Acceptable Use Policies There are several policies that users must adhere to when using the Life Sciences Network. Most are derived from federal and state

More information

Using Diskeeper Corporation Products with Windows XP Service Pack 2, Windows Server 2003 Service Pack 1 and Windows Vista

Using Diskeeper Corporation Products with Windows XP Service Pack 2, Windows Server 2003 Service Pack 1 and Windows Vista Using Diskeeper Corporation Products with Windows XP Service Pack 2, Windows Server 2003 Service Pack 1 and Windows Vista 1.0 Introduction Service Pack 2 (SP2) for Windows XP and Service Pack 1 (SP1) for

More information

Evolutionism of Intrusion Detection

Evolutionism of Intrusion Detection Evolutionism of Intrusion Detection Jackie Lai The network technology changes with each passing day; and the attack technique of hacker also weeds through the old to bring forth the new. Worms such as

More information

Student Halls Network. Connection Guide

Student Halls Network. Connection Guide Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to

More information

Thexyz Premium Webmail

Thexyz Premium Webmail Webmail Access all the benefits of a desktop program without being tied to the desktop. Log into Thexyz Email from your desktop, laptop, or mobile phone, and get instant access to email, calendars, contacts,

More information

Hosted Exchange Sales Toolkit. Common objections FAQs

Hosted Exchange Sales Toolkit. Common objections FAQs Hosted Exchange Sales Toolkit Common objections FAQs Hosted Exchange Toolkit Common Objections FAQs Target Audience Usage Marketing Managers Used to create online FAQs and knowledge base content for self-service

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

LANDESK Service Desk. Desktop Manager

LANDESK Service Desk. Desktop Manager LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,

More information

ANTIVIRUS BEST PRACTICES

ANTIVIRUS BEST PRACTICES ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information