Kaseya 2. User Guide. Version 1.1

Size: px
Start display at page:

Download "Kaseya 2. User Guide. Version 1.1"

Transcription

1 Kaseya 2 AntiMalware User Guide Version 1.1 September 30, 2013

2 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA as updated from time to time by Kaseya at If Customer does not agree with the Agreement, please do not install, use or purchase any Software and Services from Kaseya as continued use of the Software or Services indicates Customer s acceptance of the Agreement Kaseya. All rights reserved.

3 Contents AntiMalware Overview... 1 AntiMalware System Requirements... 1 Machines... 2 Page Layout... 2 Explorer Grid... 3 Control Panel... 3 AntiMalware Columns... 5 Details Panel... 6 Dashboards... 7 Detections... 8 Profiles... 9 AntiMalware Statistics in the Executive Summary Report Anti-Malware - Anti-Malware Installation Statistics Index i

4

5 AntiMalware Overview AntiMalware Overview AntiMalware (KAM) provides Malwarebytes' Anti-Malware Pro endpoint security for managed machines. AntiMalware can be installed independently of Endpoint Security or Antivirus. AntiMalware is particularly adept at detecting and preventing ScareWare or Rogue Antivirus spyware that installs a virus, then attempts to bill the user to remove it. AntiMalware quickly detects, destroys, and blocks malicious software. Every process is monitored and malicious processes are stopped before they even start. Scanning and realtime protection both use advanced heuristic scanning technology to keep systems safe and secure against even the latest malware threats. Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit). Light speed quick scanning. Ability to perform full scans for all drives. Database updates released daily protect against the newest malware in-the-wild. Intelligent heuristics detect even the most persistent malware while remaining light on system resources. Realtime protection monitors filesystem and internet traffic. Scheduler to keep protection up-to-date automatically. Quarantine to hold threats and restore them at your convenience. Ignore list for both the scanner and the protection module. Note: See KAM System Requirements (page 1). Functions Description Machines (page 2) Dashboards (page 7) Detections (page 8) Profiles (page 9) Installs and uninstalls AntiMalware software on selected machines and provides a detailed view of the AntiMalware status of any selected machine. Displays a dashboard view of the status of all machines installed with AntiMalware. Displays virus threats you can take action on. Manages AntiMalware profiles that are assigned to machine IDs. AntiMalware System Requirements Kaseya Server The AntiMalware 1.1 module requires VSA to 6.3. Requirements for Each Managed Machine AntiMalware can be installed on any Kaseya managed machine, excluding Apple and Linux machines. 1

6 Machines Note: Malwarebytes officially supports the following operating systems: Microsoft Windows 2000, XP, Vista, 7 (32-bit and 64-bit). Windows server editions are not supported; however, customers have successfully deployed Malwarebytes to machines running Windows server editions. Kaseya Anti-Malware will allow deployment to machines running Windows server editions, but it is not supported by Kaseya or Malwarebytes. Microsoft Windows 2000 Service Pack 4 or higher. 500MHZ processor. 256 MB of RAM. 15 MB free disk space. Note: See general System Requirements ( Machines AntiMalware > Machines The Machines page installs and uninstalls AntiMalware software on selected machines. This same page also provides a detailed view of the AntiMalware status of any selected machine. Page Layout (page 2) Explorer Grid (page 3) Control Panel (page 3) KAM Columns (page 5) Detail Panel (page 6) Page Layout The layout of the Machines (page 2) page comprises the following main panels: C o n tr o l P a n e l S e le c te d C o lu m n S e t M a c h in e ID / G r o u p ID filte r N a v ig a tio n P a n e l M a c h in e H e a d e r M a c h in e A n ti- M a lw a r e D e ta ils E x p lo r e r G r id P a g e B r o w s e r R o w s P e r P a g e Navigation Panel - Used to navigate to the AntiMalware module. There are four functions: Machines (page 2), Dashboards (page 7), Detections (page 8), and Profiles (page 9). Explorer Grid - Each managed machine in the VSA is listed in this panel. Page Browser - If more than one page of devices displays, pages forwards and back. Rows Per Page - Sets the number of devices displayed per page: 10, 30 or

7 Machines Machine ID / Group ID Filter - Filters the list of machines ID listed in the Explorer Grid. Control Panel - Executes tasks, either for the entire Explorer Grid or for a single selected machine. Details Panel - This expandable/collapsible panel displays the properties and status of a single machine. The Details Panel (page 6) has two sections. Header - Identifies the selected machine in the Explorer Grid. AntiMalware - Displays a summary of the AntiMalware status of a machine. Explorer Grid The Explorer Grid of the Machines (page 2) page lists each machine currently installed with a KAM client and included in the machine ID / group ID filter. Note: The only exception is when the Installation column set is selected. In this case all machines included the machine ID /group ID filter are displayed, whether or not the KAM client is installed. The set of columns displayed is determined by the Column Set selection in the Control Panel (page 3). The currently selected column set displays in the bar just above the Explorer Grid. Note: See KAM Columns (page 5) for a description of each column available to display in any Explorer Grid column set. Page forward using the Page Browser to display multiple pages of machines. Machines per page sets the number of rows on each page. Control Panel The Control Panel at the top of the Machines (page 2) page executes tasks, either for the entire Explorer Grid (page 3) or for a single selected machine. Actions Open - Display machine AntiMalware information in a new window. You can also double-click a machine in the Explorer Grid to open this same window. Cancel Pending Action - Cancel pending actions on selected machines. Open new window - Opens the AntiMalware module in a new window. Reboot - Reboot selected machines. Column Sets Selecting a column set displays a predefined set of columns. Modify Columns - Customize the set of columns displayed by any column set. Or, select one of the following pre-defined sets of column listings. 3

8 Machines Assign Scan Update Install 4 Installation - Display a installation columns in the Explorer Grid for all agent machines. Scan - Display scan columns in the Explorer Grid for all agent machines installed with a KAM client. Update - Display update columns in the Explorer Grid for all agent machines installed with a KAM client. Status - Display status columns in the Explorer Grid for all agent machines installed with a KAM client. Version - Display version columns in the Explorer Grid for all agent machines installed with a KAM client. Licensing - Display licensing columns in the Explorer Grid for all agent machines installed with a KAM client. Detections - Display threat detection columns in the Explorer Grid for all agent machines installed with a KAM client. Profile - Display profile columns in the Explorer Grid for all agent machines installed with a KAM client. Assign an AntiMalware configuration profile (page 9) to selected machines. Schedules an AntiMalware scan on selected machines. Start Date - Start date of the scan. Time - Start time of the scan. Distribution Window - Use the Immediate option to scan at the start date and time. Or reschedule the task to a randomly selected time no later than the specified number of periods from the start date and time, to spread network traffic and server loading. There are three types of scan: Flash - A flash scan analyzes memory and auto-run objects. Quick - A quick scan uses fast scanning technology to scan systems for malicious software. Full - A full scan scans all files on the selected drives. A quick scan is recommended in most cases. Updates selected machines with the latest AntiMalware definitions. Start Date - Start date of the update. Time - Start time of the update. Distribution Window - Use the Immediate option to scan at the start date and time. Or reschedule the task to a randomly selected time no later than the specified number of periods from the start date and time, to spread network traffic and server loading. Install - Installs the AntiMalware client on selected machines. Uninstall - Uninstalls the AntiMalware client on selected machines. Verify - Installs a KAM client when a standalone version of Malwarebytes' AntiMalware is already installed on a managed machine. Auto Extend Enables and disables Auto-Extend for machines installed with AntiMalware. Displays the total number of licenses purchased and expired, and the number of full and partial licenses available. When Auto-Extend is enabled and a KAM license expires, a new, full license is pulled from your license pool automatically. This ensures the endpoint does not go without antimalware protection at any point,

9 Machines as long as you have available licenses. Auto-Extend always uses a full license. In the event you uninstall KAM from an endpoint, that license goes into a partial license pool. When KAM is deployed to a new endpoint, Kaseya License Manager always checks the partial license pool first. If a partial license is available, the partial license is used on the endpoint with the new install. If no partial licenses are available, Kaseya uses a full KAM license. Licenses begin their clock ticking on the first day they are installed. If uninstalled, the clock continues to tick on that license. By deploying these partial licenses for new installations of KAM, you can get the most out of each 1-year license. AntiMalware Columns The following columns are available to select when modifying any column set in the Explorer Grid (page 3). Select Column Set in the Control Panel (page 3) to modify a column set. Anti-Malware Active Detections - If Yes, detections exist that could not be automatically disinfected or deleted and require user attention. Agent Guid Str - The unique GUID of the Kaseya agent, in string format. Auto Extend - If checked, Auto Extend is enabled. Auto Extend automatically extends licensed security protection for the managed machine. If AntiMalware is uninstalled from the machine and its licensed time period partially used, its partially-used license is automatically assigned to the next machine installed with AntiMalware instead of a unused license. Components - Identifies the status of AntiMalware components installed on this machine. Database Date - The date and time of the AntiMalware definition database currently being used by this machine. Database Version - The version of the AntiMalware definition database currently being used by this machine. Date Installed - The date AntiMalware was installed. FileExecutionBlocking Status - Running or Stopped. The Enable protection when windows starts checkbox must be checked to Enable File Execution Blocking in the Profiles (page 9) page. Flags - Possible flags include: Definitions out of date Id - The unique GUID of the Kaseya agent, in numerical format. Install Phase Icon - If checked, AntiMalware is installed on the machine. Install Schedule Date - The date AntiMalware is scheduled to be installed. Install Status - Not Installed, Script Scheduled, Installed Installed - If checked, the AntiMalware client is installed. Kam Assign Completed - If Yes, a KAM profile is assigned to the machine. Kam Protection Enabled - If Yes, protection is enabled on this machine. Last Updated - The date the AntiMalware definition database was last updated. License Date - The date AntiMalware security is scheduled to expire. Log File - Click the View Log link to display the log file from the last scan. Login Name - The currently logged on user. Name - The machine ID.group ID.organization ID of the machine. No Action - The number of detections that were not resolved. Subsequent scans may resolve a No Action detection. Multiple scans that fail to resolve a detection increment the No Action counter for each scan. See the Detections (page 8) page for more information about No Action detections. Online Status - These icons indicate the agent check-in status of each managed machine. Hovering the cursor over a check-in icon displays the agent quick view window. Online but waiting for first audit to complete 5

10 Machines Agent online Agent online and user currently logged on. Agent online and user currently logged on, but user not active for 10 minutes Agent is currently offline Agent has never checked in Agent is online but remote control has been disabled The agent has been suspended Other - Number of detections that cannot be classified under any other category. Applies when Malwarebytes creates a new detection category that AntiMalware does not yet recognize. Pending Actions - Icons representing install, assign, update and scan. Profile - The AntiMalware profile assigned to this machine. Profile Assignment Status - If Yes, a AntiMalware profile is assigned to the machine. Program Version - The Malwarebytes version number of the AntiMalware client installed on this machine. Protect Service Status - If Yes, the Malwarebytes service is running. Protection Status - If checked, protection is enabled. Reboot Needed - If Yes, a reboot is required. Resolved - The number of detections resolved automatically by AntiMalware. Scan Phase - Scheduled, Running, Error, Complete, Processing Result Scan Scheduled Date - The date the next scan is scheduled to run. Service Status - The status of the AntiMalware client. Service Version - The version of the AntiMalware client. Show Tool Tip - If 1, then Show Tool Tips is enabled. If 0, Show Tool Tips is not enabled. See Agent > Edit Profile ( Time Zone Offset - Displays the number of minutes. See System > Preferences ( Tool Tip Notes - Displays the notes assigned to an agent. See Agent > Edit Profile ( Transition Time - (obsolete - this column is being removed) Uninstall Schedule Date - The date/time the AntiMalware client is scheduled to be uninstalled. Update Phase - The status of the update. Update Schedule Date - The date/time the AntiMalware database definitions are scheduled to be updated. WebSiteBlocking Status - Running or Stopped. The Enable protection when windows starts checkbox must be checked to Enable Web Site Blocking in the Profiles (page 9) page. Details Panel Header Name - The machine ID.group ID.organization ID of the machine. OS - The operating system of the machine. Network - The subnetwork the machine is on. AntiMalware tab AntiMalware Summary 6

11 Dashboards Install Status - If checked, AntiMalware security is installed. Select view log to view the log for the machine. Last Updated - The date and time the AntiMalware client was last updated. Auto Extend - If checked, Auto Extend is enabled. Auto Extend automatically extends licensed security protection for the managed machine. If KAM is uninstalled from the machine and its licensed time period partially used, its partially-used license is automatically assigned to the next machine installed with KAM instead of a unused license. Profile - The AntiMalware configuration profile assigned to this machine. License Expiration - The date AntiMalware security is scheduled to expire. Installed On - The date the Kaseya agent was installed. MalwareBytes Status Messages Component Status - Identifies the status of AntiMalware components installed on this machine. - Malwarebytes service is running or stopped. - Protection module is running or stopped. - File Execution Blocking is running or stopped. - Malicious website blocking is running or stopped. Database Version - The version number of the AntiMalware definition database. Database Date - The date and time of the AntiMalware definition database currently being used by this machine. Program Version - The Kaspersky version number of the AntiMalware client installed on this machine. If a failure/error occurs during the installation of Malwarebytes, the message displays here. Dashboards Actions AntiMalware > Dashboards The Dashboards page provides a dashboard view of the status of machines installed with AntiMalware. Note: You must save changes to the currently displayed dashboard before navigating away from this page, or else all changes will be lost. New - Creates a new dashboard. Note: New dashboards are only visible to the user that created them. Save - Saves changes to the currently displayed dashboard. Save As - Saves a copy of the currently displayed dashboard. Delete - Deletes the currently displayed dashboard. Select Dashboard Select from a list of dashboards to display it. 7

12 Detections Add Parts Add or delete individual parts to create custom dashboard views. KAM Automatic License Extension - A bar chart displays the number of machines that have autoextend applied to their license in 30, 60, 90 or 91+ days. KAM License Count - A bar chart displays the number of AntiMalware licenses used and the number of machines pending an install. KAM License Expiration - A bar chart displays the number of machines that have expired licenses or will have expired licenses in 30, 60, 90 or 91+ days. KAM License Summary - A chart displays the number of machines that are Available, Expired, In Use, Partials and Pending Install. KAM Machines Needing Attention - A bar chart displays the number of AntiMalware managed machines needing attention, by category. Categories include No AM Installed, With Uncured Threats, Out of Date, Reboot Needed, Component Status. KAM Machines with Detections - A bar chart displays the number of detections. KAM Protection Status - A pie chart displays percentage categories of machines with AntiMalware protection. Percentage categories include Not Installed, Out of Date, Not Enabled, and Up to Date. KAM Top Threats - A pie chart displays percentages for each category of AntiMalware detection. Open in Separate Window Displays the currently selected dashboard in a separate window. Detections AntiMalware > Detections The Detections page displays malware threats not automatically resolved by AntiMalware. Use the information listed on this page to investigate threats further and manually remove them. Detections may be identified as a PUP or PUM: PUP - A potentially unwanted program. Not necessarily malicious. PUM - A potentially unwanted modification. An unwanted change to your computer's settings. Table Columns Machine - The machine ID. Name - The name of the threat. Time - The date and time the threat was detected. Status - The status of the threat. Detection by Scanner Failed to unload process - A reboot is probably needed to complete the removal of malware. Unloaded process successfully Delete on reboot - A reboot is needed to complete the removal of malware. Quarantined and deleted successfully Not selected for removal - The item was not selected and probably is not a threat. Detection by Protection Module ALLOW - User has clicked Ignore on a malware detection. 8

13 Profiles QUARANTINE - User has clicked Quarantine on a malware detection DENY - User has clicked Quarantine on a malware detection but the blocking was unsuccessful or detection already blocked. Type - The category of threat. Path - The location of the threat on the managed machine. Profiles Actions AntiMalware > Profiles The Profiles page manages AntiMalware profiles. Each profile represents a different set of enabled or disabled options. Changes to a profile affect all machine IDs assigned that profile. A profile is assigned to machine IDs using AntiMalware > Machines (page 2). Typically different types of machines or networks require different profiles. A sample profile is provided for you. New - Creates a new profile. Open - Opens an existing profile for editing and review. Delete - Deletes an existing profile. Save - Saves changes to the currently selected profile. Adding / Editing Profiles Click New to display the New Profile window, or click an existing profile, then click Open to display the Edit Profile window. Summary Name - The name of the profile. Description - A description of the profile. Protection Options - Enable Protection When Windows Starts - If checked, start protection module with windows. - Enable File Execution Blocking - If checked, start file execution blocking when protection module starts. - Enable Website Blocking - If checked, start malicious website blocking when protection module starts. Show tooltip when IP blocked - If unchecked, a tooltip balloon does not display to the user when a when a malicious website is blocked. Scan Options Restart the computer if needed as part of threat removal - If checked, restarts the computer to complete the removal of threats, if necessary. Automatically remove threats - If checked, automatically removes threats. Wake from sleep - If checked, attempts to wake the computer from sleep to perform a scheduled scan. Enable Advanced Heuristics engine - If checked, adds another layer of protection to detect new and unknown malware. Schedule Enabled - If checked, schedules a recurring scan. 9

14 AntiMalware Statistics in the Executive Summary Report Update Options Frequency - Hourly, Daily, Weekly, Monthly, Once, On Reboot. Starting On - Date to start recurring scans. Time - Time to start recurring scans. Scan Type Flash - A flash scan analyzes memory and autorun objects. Quick - A quick scan uses fast scanning technology to scan systems for malicious software. Full - A full scan scans all files on the selected drives. A quick scan is recommended in most cases. Recover if Missed by - The number of hours to attempt to run the scan again if the machine was unavailable to scan at the scheduled time. Repeating every - The number of weeks to repeat Recovery if Missed by if the machine remains unavailable to scan. Download and install program update if available - If checked, updates are downloaded and installed, if available. Use proxy server to download updates - If checked, uses a proxy server to download updates. Proxy server - Enter a valid proxy server name or IP address. Port - Enter a port number. Use Authentication - If checked, proxy authentication is required. Username - If Use Authentication is checked, enter a valid username. Password - If Use Authentication is checked, enter a valid password. Schedule Enabled - If checked, schedules a recurring update. Frequency - Hourly, Daily, Weekly, Monthly, Once, On Reboot. Starting On - Date to start recurring updates. Time - Time to start recurring updates. Recover if Missed by - The number of hours to attempt to run the update again if the machine was unavailable to update at the scheduled time. Repeating every - The number of days to repeat Recovery if Missed by if the machine remains unavailable to update. Wake computer from sleep to perform task - If checked, the machine will be wakened, if necessary, to perform the update. Run flash scan after successful update - If checked, runs a flash scan just after the update. AntiMalware Statistics in the Executive Summary Report Info Center > Reporting > Reports > Executive Summary ( The Executive Summary report includes a section called AntiMalware for the following statistics. If no filtering is selected, statistics are for all machines in all groups in all organizations. The number of days is specified in the report definition. Summary Statistics 10

15 Anti-Malware - Anti-Malware Installation Statistics Machine Installation Ratio - The number of machines installed with AntiMalware compared to the total number of machines. Machines with full scans last <N> Days - The number of machines with AntiMalware installed that have performed a full scan within <N> number of days. Machines needing attention - The number of machine requiring attention. Reasons machines may require attention include AntiMalware not installed, uncured threats, out of date, reboot needed, missing component. Machines with unhandled detections - The number of machines that have at least one unhandled threat displayed in the Detections page. Datebase Version and Date - The latest date of AntiMalware definitions uploaded to the set of machines specified by this report. Performance Statistics Last <N> Days Total Objects Scanned - The number of files and system objects scanned. Total Detections - The number of handled and unhandled threats. Total New Installations - The number of new AntiMalware installations. Total Flash Scans Completed - A flash scan analyzes memory and auto-run objects. Total Quick Scans Completed - A quick scan includes operating system startup objects. Total Full Scans Completed - A full scan includes system memory, programs loaded on startup, system backup, databases, hard drives, removable storage media and network drives. Total Updates Completed - An update updates the AntiMalware definitions on a machine. The Network Health Score of the Executive Summary includes an AntiMalware category. The AntiMalware rating is a composite score weighted as follows for each individual machine: AntiMalware install percentage - 40% - Is AntiMalware installed on the machine? Full scans run during the period - 40% - Has at least one AntiMalware scan run during the period? Active threats - 20% - Has zero threats been detected during the period? After each machine AntiMalware rating is determined, they are grouped into the following percentage buckets, which can be customized: 100%, 75%, 50%, 25%. You can adjust how heavily each category effects the total Network Health Score by adjusting the weight value for each category. Weights range from 0 to 100. Set the weight to zero to turn off that category. Anti-Malware - Anti-Malware Installation Statistics Info Center > Reporting > Reports > Anti-Malware Displays only if the AntiMalware add-on module is installed. The Anti-Malware Installation Statistics report definition generates reports for the following types of AntiMalware data maintained by the VSA. Show Summary Table - Displays the number of machines installed with AntiMalware per machine group. Installation details include the install date and version installed, per machine in each machine group. Show Installation Month Bar Chart - Displays a count of the number of machines installed with AntiMalware, per month. 11

16

17 Index Index A Anti-Malware - Anti-Malware Installation Statistics 11 AntiMalware Columns 5 AntiMalware Overview 1 AntiMalware Statistics in the Executive Summary Report 10 AntiMalware System Requirements 1 C Control Panel 3 D Dashboards 7 Details Panel 6 Detections 8 E Explorer Grid 3 M Machines 2 P Page Layout 2 Profiles 9 13

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Antivirus User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Kaseya 2. User Guide. Version 6.5 and 2.3

Kaseya 2. User Guide. Version 6.5 and 2.3 Kaseya 2 Endpoint Security User Guide Version 6.5 and 2.3 January 31, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA

More information

User Guide. version 1.0

User Guide. version 1.0 User Guide version 1.0 December 16, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's IT Automation

More information

User Guide. version 1.2

User Guide. version 1.2 Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

MALWAREBYTES PLUGIN DOCUMENTATION

MALWAREBYTES PLUGIN DOCUMENTATION Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...

More information

Kaseya 2. User Guide. Version 6.5 and 2.0

Kaseya 2. User Guide. Version 6.5 and 2.0 Kaseya 2 Data Backup User Guide Version 6.5 and 2.0 January 23, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA as

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Patch Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Data Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

User Guide. Version R93. English

User Guide. Version R93. English Antivirus User Guide Version R93 English May 9, 2016 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Malwarebytes Anti-Malware for Business Endpoint Administrators Guide Version 1.80 17 September 2015

Malwarebytes Anti-Malware for Business Endpoint Administrators Guide Version 1.80 17 September 2015 Malwarebytes Anti-Malware for Business Endpoint Administrators Guide Version 1.80 17 September 2015 Notices Malwarebytes products and related documentation are provided under a license agreement containing

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Kaseya 2. User Guide. Version 6.5 and 1.1

Kaseya 2. User Guide. Version 6.5 and 1.1 Kaseya 2 Policy Management User Guide Version 6.5 and 1.1 January 23, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA

More information

User Guide. Version 3.0

User Guide. Version 3.0 Kaseya Backup and Disaster Recovery User Guide Version 3.0 October 12, 2009 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Software Deployment and Update Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Policy Management User Guide Version 1.0 June 6, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Managed Service Edition - G1

Managed Service Edition - G1 Managed Service Edition - G1 Reports User Guide for VSA 5.2.0.0 June 7, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Remote Control Tools User Guide Version 7.0 English December 22, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Malwarebytes Anti-Malware User Guide Version 2.2.1 18 March 2016

Malwarebytes Anti-Malware User Guide Version 2.2.1 18 March 2016 Malwarebytes Anti-Malware User Guide Version 2.2.1 18 March 2016 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

Patch Management Table of Contents:

Patch Management Table of Contents: Table of Contents: Manage Machines Manage Updates Patch Policy Configure Patch Parameters 153 Chapter 5 - Sadjadi et al. Introduction As new operating system and software updates are released in an ever

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Monitoring Configuration User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Remote Control Tools User Guide Version R8 English December 22, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

Comodo LoginPro Software Version 1.5

Comodo LoginPro Software Version 1.5 Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets

More information

Kaseya 2. Quick Start Guide. for VSA 6.1

Kaseya 2. Quick Start Guide. for VSA 6.1 Kaseya 2 Monitoring Configuration Quick Start Guide for VSA 6.1 January 17, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Data Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Kaseya 2. User Guide. for VSA 6.3

Kaseya 2. User Guide. for VSA 6.3 Kaseya 2 Remote Control User Guide for VSA 6.3 May 10, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Norman Security Portal

Norman Security Portal User Guide Norman Security Portal SECURITY PORTAL Features Cloud-based endpoint management Managed & unmanaged customers Generate client software Statistics & reports Security Module Antivirus & Antispyware

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

How To Install & Use Metascan With Policy Patrol

How To Install & Use Metascan With Policy Patrol Policy Patrol 9 technical documentation June 16, 2014 How To Install & Use Metascan With Policy Patrol No antivirus engine is perfect. With over 220,000 new threats emerging daily, it would be impossible

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

Safe internet: Getting Started Guide

Safe internet: Getting Started Guide Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration

More information

webkpi SaaS ETL Connector Installation & Configuration Guide

webkpi SaaS ETL Connector Installation & Configuration Guide webkpi SaaS ETL Connector Installation & Configuration Guide SaaS ETL Version 2.5.0.12 Version 1.6 September 2013 webkpi SaaS ETL Connector Version 2.5.0.12 V 1.6 Page 1 Table of Contents Table of Contents

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Quick Start Guide. www. K7Computing.com

Quick Start Guide. www. K7Computing.com Quick Start Guide Table of Contents Before you install the Product... 3 Installing the program... 3 Quick Installation... 4 Custom Installation... 4 Installation... 7 Activation... 8 Offline Activation...

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

Malwarebytes Anti-Malware Users Guide Version 2.0.1 07 April 2014

Malwarebytes Anti-Malware Users Guide Version 2.0.1 07 April 2014 Malwarebytes Anti-Malware Users Guide Version 2.0.1 07 April 2014 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

Client Manager for Endpoint Protection (CMEP) User s Guide

Client Manager for Endpoint Protection (CMEP) User s Guide Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product

More information

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2 Last modified on 08.11.2011 TABLE OF CONTENTS Introduction... 4 Features... 5 General Features... 5 Backup Features... 5 Restore Features... 6 Link for Application Download... 6 Install IBackup for Mac...

More information

User Guide. Kaseya 2008

User Guide. Kaseya 2008 Agent Configuration and Deployment User Guide Kaseya 2008 March 25, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4 Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

The Carbonite Appliance HT10 User Guide

The Carbonite Appliance HT10 User Guide The Carbonite Appliance HT10 User Guide Keep business moving with the Carbonite Appliance HT10. The hybrid data solution that s just right for your clients. For assistance, reach the Carbonite Support

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Malwarebytes Enterprise Edition System Administration Guide Version 1.3

Malwarebytes Enterprise Edition System Administration Guide Version 1.3 Malwarebytes Enterprise Edition Version 1.3 Notices The products and programs described in this manual are licensed products of Malwarebytes Corporation. This manual contains proprietary information protected

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Installation and Deployment

Installation and Deployment Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

Antivirus. Quick Start Guide. Antivirus

Antivirus. Quick Start Guide. Antivirus Antivirus 2007 Antivirus plus I Firewall Quick Start Guide Helpful Information on Installation and Set-Up STOPS and Removes Viruses DELIVERS Proactive Firewall Protection EASY to Set Up and Use FREE Upgrades

More information

Trend Micro KASEYA INTEGRATION GUIDE

Trend Micro KASEYA INTEGRATION GUIDE Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update Secure Remote Access Dell SonicWALL SRA 7.5.0.9 Contents Release Purpose...1 Platform Compatibility...1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance...2 Important Differences between

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me

McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me McAfee Enterprise Edition v 7.1.0: Installation & Configuration 1 McAfee Enterprise Edition v 4.5.1: Installation &

More information

COMODO System-Cleaner

COMODO System-Cleaner Creating Trust Online COMODO System-Cleaner Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 United States. User Guide Table of Contents 1 Table of Contents 1 COMODO System-Cleaner-

More information

Using WMI Scripts with BitDefender Client Security

Using WMI Scripts with BitDefender Client Security Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update Secure Remote Access Dell SonicWALL SRA 7.5.0.12 Contents Release Purpose... 1 Platform Compatibility... 1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance... 2 Important Differences

More information

Avira AntiVir Personal Free Antivirus User Manual

Avira AntiVir Personal Free Antivirus User Manual Avira AntiVir Personal Free Antivirus User Manual Trademarks and Copyright Trademarks AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014

Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014 Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

EVENT LOG MANAGEMENT...

EVENT LOG MANAGEMENT... Event Log Management EVENT LOG MANAGEMENT... 1 Overview... 1 Application Event Logs... 3 Security Event Logs... 3 System Event Logs... 3 Other Event Logs... 4 Windows Update Event Logs... 6 Syslog... 6

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Deposit Direct. Getting Started Guide

Deposit Direct. Getting Started Guide Deposit Direct Getting Started Guide Table of Contents Before You Start... 3 Installing the Deposit Direct application for use with Microsoft Windows Vista... 4 Running Programs in Microsoft Windows Vista...

More information

Seagate Dashboard User Guide

Seagate Dashboard User Guide Seagate Dashboard User Guide Seagate Dashboard User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks

More information

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Release Notes for Websense Web Endpoint (32- and 64-bit OS)

Release Notes for Websense Web Endpoint (32- and 64-bit OS) Release Notes for Websense Web Endpoint (32- and 64-bit OS) Updated: 8-Feb-2013 Applies To: Websense Cloud Web Security solutions Use the Release Notes to learn about: What s new in Websense Web Endpoint?

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information