Norman Security Portal

Size: px
Start display at page:

Download "Norman Security Portal"

Transcription

1 User Guide Norman Security Portal SECURITY PORTAL Features Cloud-based endpoint management Managed & unmanaged customers Generate client software Statistics & reports Security Module Antivirus & Antispyware protection - endpoints - servers

2 Norman Security Portal Admin Guide Limited Warranty Limited Warranty This warranty is limited to replacement of the product. We are not liable for any other form of loss or damage arising from use of the software or documentation or from errors or deficiencies therein, including but not limited to loss of earnings. With regard to defects or flaws in the documentation, or this licensing agreement, this warranty supersedes any other warranties, expressed or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose. In particular, and without the limitations imposed by the licensing agreement with regard to any special use or purpose, we will in no event be liable for loss of profits or other commercial damage including but not limited to incidental or consequential damages. This warranty expires 30 days after purchase. The information in this document as well as the functionality of the software is subject to change without notice. The software may be used in accordance with the terms of the license agreement. The purchaser may make one copy of the software for backup purposes. No part of this documentation may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or information storage and retrieval systems, for any purpose other than the purchaser s personal use, without the explicit written permission of the owner. Names of products mentioned in this documentation are either trademarks or registered trademarks of their respective owners. They are mentioned for identification purposes only. Norman documentation and software are. All rights reserved. Last revised June ii

3 Norman Security Portal Admin Guide Contents Introduction...5 System requirements... 5 Network requirements for communication.5 Network requirements for deployment... 5 Help & Support... 6 Contact us... 6 Trial version... 6 About this guide... 6 What is this... 7 How does it work... 8 User privilege levels... 8 Groups, policies and installers... 8 Secure login with an authenticator... 9 The distributor role... 9 The Partner role... 9 The Customer role... 9 Managed... 9 Unmanaged... 9 License tracking and ordering process Scalability Security modules Getting started...11 Login...12 Partner Customer Register How to navigate the portal...13 The top menu Printing feature Search Settings...15 Notifications My account Change address Change language Change Password Show warning messages Authenticators Add an authenticator Delete an authenticator Recovery key Get a recovery key Reset Recovery Key Account History Company information Partner Customer Trial Link Customer License Request or disable management Manage users Help & Support About Log out Home...22 Infections and Quarantine Summary Top Customers Top Malware Endpoints Status Endpoints per Policy Customers...24 Add a customer Dashboard Users Information Deleting a customer Requesting or disabling management Disable management Request management iii

4 Norman Security Portal Admin Guide Contents continued... Endpoints...27 Groups Customized groups Default groups Graphical presentation Endpoint overview Move to group Assign policy Delete endpoint Policies...30 Standard policies Antivirus configuration Real-time Scanner Scan files on network drives Scan for potentially unwanted software.32 Advanced options Cleaning options Allow user to disable real-time scanner from endpoint Enable real-time scanner Manual and Scheduled Scans Install Screensaver Scanner Scan for potentially unwanted software.33 Advanced options Cleaning options Scheduled scans Quarantine Exclude paths or extensions Path or extension to exclude Apply to Updates and Other Advanced Options Virus definition and software updates.. 34 Use Proxy settings Use distribution point Other advanced options Installers...37 Generate installers Delete installers Download and distribute installers Installing on endpoints Removing existing antivirus Executing installers Quarantine...41 Administer the quarantine Requested Uploads Download uploaded items Delete requested upload Delete items Restore items License use...45 Lead license use License use per customer Client interface...46 Administration Settings Display GUI on endpoint Use Scan your computer Disable the Real-time scanner Uninstall the antivirus application Screensaver scanner iv

5 Norman Security Portal Admin Guide Introduction Introduction System requirements Below you will find system requirements as per writing this user guide. We strongly recommend that you confer with our frequently updated requirements at Operating system (antivirus client) Windows Windows Windows Windows Windows Windows Windows Windows Server Windows Server Windows Server Windows Server Windows Server Windows Server XP 32-bit SP3 Vista 32-bit SP1 Vista 64-bit 7 32-bit 7 64-bit 8/ bit 8/ bit bit SP1 R bit SP bit SP R2 64-bit bit 2012 R2 64-bit Internet Browsers (portal administration) Mozilla Firefox latest version Internet Explorer latest version Opera latest version Chrome latest version Note that browsers must be configured to use TLS 1.2 or higher Hardware (client) Processor (CPU) Memory (RAM) Disk space 1,5 GHz 1 GB 1,5 GB Network requirements for communication Ports 80 and 8444 must be open (egress-filtering) in the firewall/router in order for the endpoints to update and communicate with the portal. Network requirements for deployment Before you install client software, make sure there are no other antivirus products installed on the endpoints and that you have administrator rights on the computer. 5

6 Norman Security Portal Admin Guide Introduction Help & Support We provide technical support and consultancy services and security issues in general. For training or technical support issues please contact your local dealer or a Norman Office. Search web support articles for frequently asked questions and other support issues or visit our blog which contains articles with relevant information and scenarios. Support Blog Contact us Please refer to the last page of this document for a list of offices and web addresses, or visit our web site for an up-to-date overview of our offices and countries. Contact us Trial version It is easy to get hold of a version of the Norman Security Portal; register for a trial version online, activate your account from the you receive, log in. Set up groups and policies, generate and run installers on the endpoints, and start to monitor and manage your network. Norman Partners Certified partners should register with Norman directly, even for testing purposes. Customers If you are assigned a service provider (Norman Partner) already, you should preferably register directly with the provider, or else you will be assigned one after signing up for a trial. For both parties, see also Login on page 12. About this guide This guide describes the software options and configurations to get you started with the application, giving you the basic information needed. See also the short intro chapter Getting started on page 11. 6

7 Norman Security Portal Admin Guide Introduction What is this Norman Security Portal with antivirus is a cloud based solution for endpoints and servers. Built from the ground up and using state of the art technology, it does not sacrifice security for convenience. It is a great fit for businesses of all sizes, protecting computers both on and off premise with around the clock antivirus updates. Access Norman Security Portal from anywhere, with any web browser and generate installers, manage endpoints and view the security status of your network directly in your web browser. Security was never easier than this. The Norman Security Portal enables customers, service providers and Norman to manage endpoints from a centralized web portal (cloud) and control policies that assist in securing the endpoints. The endpoint antivirus software is new and completely customized to work efficiently as a part of the Norman Security Portal infrastructure. It is controlled by Norman Security Portal and is completely redesigned using a next generation scan engine, well prepared to handle the threats of today and tomorrow. 99 Easy setup, rapid and effective cloud managed service 99 Easily manageable for service providers 99 Easy handling of security for your customers 99 Easily manageable for customers 99 Protects your network from malware 99 Included the next generation antivirus software 99 Best protection against new threats. 7

8 Norman Security Portal Admin Guide Introduction How does it work Norman Security Portal is a hosted service for managing endpoints in a network via a web interface. With endpoint management as a service, customers and partners can manage endpoints and control policies that assist in securing the endpoints. This is all done from a web portal (the cloud), and there is no need to install endpoint management software. Certified partners (service providers) register an account with Norman or a Norman distributor. They add customers to their account, and both the service providers and the customers are able to logon and monitor the endpoints. Of course, the customer can only view their own endpoints, while the partner can view all their customers and their endpoints, as long as the customer is managed. The security portal home page presents a few relevant parameters and gives an overall view of customers and endpoints. See Home on page 22. The top bar menu options view differ from a logged in service provider to a customer. As a service provider, as opposed to a customer, you will have multiple customers with endpoints registered. You are required to select a customer to access the endpoints view. This is why you find the Customers option on the service provider s menu only. In addition you have other options to view customer information which is relevant for the partner-side customer management. This information stems from data that the logged in customers can view from the settings menu when logged into their account. See also How to navigate the portal on page 13. For a customer who becomes unmanaged the service provider s access is reduced to the information menu. The customer is moved from Managed Customers to the Unmanaged Customers section of the service provider s customer list. See also Unmanaged customers on page 24. User privilege levels Account users are granted different levels of privileges; see also This menu presents a graphical overview per customer, like the graph on the customer s home page. on page 25: User - As a user you can monitor endpoints, users and policies, but you cannot remove or add items Administrator - As an administrator you can do everything Groups, policies and installers For large customers you can group endpoints for better control and overview. Create one or more suitable groups and assign a policy for each group before you generate endpoint installers from the portal. See Groups on page 27 and Policies on page 30. An installer consists of a framework and an antivirus module. It is distributed to the endpoints for installation. See Installers on page 37. Once the installation is complete the endpoints become visible from the portal enabling the administrator to approve and manage them. The endpoints receive virus definition files and software updates as soon as they are approved in the portal. Ports 80 and 8444 must be open (egress-filtering) in the firewall/router in order for the endpoints to update and communicate with the portal. If you configure and run non-interactive installers with automatic approval on the endpoints they are automatically moved to the right group without any interaction. This requires that you have complete control over the endpoints, but you should always verify the approved endpoints regardless. 8

9 Norman Security Portal Admin Guide Introduction Secure login with an authenticator Secure authentication is extremely important for a cloud based system. We recommend that you use our two-factor authentication app Norman Authenticator when you log in to the portal. The app is available for Android devices and you can download it from Google Play. See Authenticators on page 17. You should always create a recovery key when you use an authenticator. With the recovery key you are always able to log in even if your device is inaccessible for some reason, or stolen. See Get a recovery key on page 19. The distributor role This is the top level distribution line where Norman and Norman Distributors reside. Only they are certified to register partner accounts in Norman Security Portal. When registered partners add or edit a customer license, an order is sent to Norman or to the distributor for some countries. The Partner role A partner account is registered with Norman (or a Norman distributor for some countries). Our software is sold through our certified partners (the customer s service providers). When you sell licenses to your customers it means that you add customers to your security portal partner account. (See Login on page 12). The partners install and maintain security software and provide assistance to their customers. Some customers have dedicated technical personnel so that they can handle security issues internally. Others have no internal technical resources and depend on external human resources to maintain the security in their network. Since most of our customers have their core business on other areas than technology, our partner is often both a human and a technical resource they depend upon. An important feature of Norman Security Portal is to help partners improve the level of service they can provide for their customers. From the security portal the partner can administer and monitor security on any of their customer s networks. It is up to the customer to make this information available for the partner, and the partner can then make sure customer security is handled properly. The Customer role A customer is assigned to a service provider; a certified Norman partner. Customers are managed or unmanaged and in both cases the service provider handles purchase and termination of the customer s licenses. Customers are by default assigned to Norman until they become assigned to a service provider. Managed Managed customers allow a service provider to monitor and manage endpoint security. Customers that do not have dedicated personnel to do the work, or do not want to spend internal resources on security management may need management via the portal. For such customers the service provider can offer to monitor and manage endpoint security. See also Managed customers on page 24. Unmanaged Unmanaged customers monitor and manage endpoint security themselves. Some customers may have the knowledge and people to manage and monitor their own network security. In that case there is no need for the service provider to see the customer s network topology. Such customers are still assigned to a service provider who assists with license purchase or termination. When an unmanaged customer needs assistance they can request management via the security portal. This will immediately enable the service provider to view and manage the customer s endpoints. Both the service provider and the customer can disable management again. See also Unmanaged customers on page 24. 9

10 Norman Security Portal Admin Guide Introduction License tracking and ordering process Norman Security Portal keeps information about the partner and its customers and licenses. The portal communicates with our customer management system and tracks the purchased licenses and the number of seats in use. Information about the account and licenses from the CRM system is intercepted by the portal, which avails the partner to add customers and endpoints, and the customer to add endpoints. The service provider handles the practical purchase and termination of licenses for their customers. All customers are assigned to a service provider (a Norman certified partner or Norman). The security portal generates a license expiry date upon registration, while future updates are done via our internal customer management system as the security portal receives data about changes from that system. There is one exception though, since the security portal can handle conversions from trial customers into licensed paying customers. Scalability The unlimited technicalities of Norman Security Portal invite also larger customers to use the product. It is designed to efficiently handle any number of endpoints and automatically scales to the customer s needs. With the opportunity to add groups and assign several policies per customer, you can still maintain a good overview even if the company has thousands or more endpoints. Security modules Norman Security Portal is flexible and can manage any security module to create and maintain a secure platform. We can add, change or remove security modules which communicate with Norman Security Portal via a predefined interface. For now we have added an antivirus module to work with the framework. 10

11 Norman Security Portal Admin Guide Getting started Getting started 1. Login (See Login on page 12) Register a partner account with Norman. A customer registers an account via their service provider (a partner), or they can register for a trial via the login page. Go to the login page. Add authenticator Install Norman Authenticator, a two-factor authentication app for secure logins to the portal. Download the app from Google Play and install it on your Android device. (See Authenticators on page 17). You should get a recovery key when you use an authenticator. (See Get a recovery key on page 19.) Partner (service provider) vs. customer Service providers will see relevant data about their customers with endpoints, while customers will see their endpoints only. Service providers select a customer first to view more details for that customer. Managed/unmanaged customers The service provider handles everything for the managed customers, while the unmanaged customer handles everything themselves except from the license purchase, extension or termination. 2. Partners only: Add customers (see Customers on page 24) Configure your account and add users with the necessary privileges; User or Administrator. Add your customers and enter the required account information and users. 3. Create groups ( Endpoints on page 27) Create rational groups. Divide the endpoints into groups and get better control over larger customers. For smaller companies you can configure the installer to automatically approve the endpoints. With a predefined group the endpoints are then automatically approved and moved to the predefined group. 4. Create policies (see Policies on page 30) Assign a policy to each group that you created. It is sufficient to use one of the standard policies to start with. If you configure the installer to auto-approve endpoints, and you predefined a group, the endpoints are automatically approved and moved to the right group and assigned the predefined policy. 5. Generate installers (see Installers on page 37) Generate installers for the endpoints. Generate one installer per group if you configure it to automatically approve the endpoints. The endpoints are then automatically approved and moved to the right group. Select interactive or non-interactive installer type. The non-interactive installer is self-extracting and installs automatically, while you must manually open and run the interactive installer. 6. Run installers on the endpoints (see Download and distribute installers on page 38) Distribute and run installers on the endpoints. Once the software is installed the endpoints communicate with the security portal. Ports 80 and 8444 must be open (egress-filtering) in the firewall/router. The endpoints appear in the unapproved group assigned with a default policy. Approve and move the endpoints to groups and assign policies. If you configured automatic approval and selected a group and a policy the endpoints are automatically moved to the group and assigned the policy you selected. 7. Approve endpoints, manually or automatically (see Generate installers on page 37) Once the endpoints are approved they receive software and virus definition updates. At a determined time interval they communicate with the security portal and informs about their status or incidents. 8. Ready to monitor customers and endpoints Customers are registered and you have executed the steps above. Use a web browser to log in to the security portal from anywhere and start to monitor endpoints. Remember to use Norman Authenticator, the two-step authentication app for a secure login to the portal. (See Authenticators on page 17) 11

12 Norman Security Portal Admin Guide Login Login The Norman Security Portal URL is Use a two-step verification app for a secure login, see Authenticators on page 17. We distinguish portal accounts by partners and customers. Customers are registered with a license, while the partner is registered as a manager of customers with licenses. A customer is managed or unmanaged, still, always assigned to a service provider (partner). Read more about this in The Partner role on page 9, The Customer role on page 9, Customers on page 24 and Endpoints on page 27. Partner Certified Norman Partners must register an account directly with their Norman office (or with the Norman distributor for some countries), before they can start to add customers. Contact your local Norman office if you are not registered yet. See also The Partner role on page 9. If you want a license for your own network and endpoints, you can add yourself as a customer in your partner account and purchase a license. Customer If you are a customer please contact your service provider or contact Norman to learn how to get a license. If you simply want to try Norman Security Portal for free, you are welcome to do so - just register and try it. See the next paragraph on how to register for a trial. See also The Customer role on page 9. Register If you are a trial customer you can register an account from the login page (or you can contact your service provider and ask them to set up a trial for you). You will receive an with a link to confirm your registration, which you must confirm before you can log in, and so must any user that you add to the account. address duplicates are not allowed in the portal. Select Register new account and fill in the form on the Register Account page. Click the globe at the top of the page to change the application language. Enter the required information and the image check, and click Register to complete. Check your to confirm the registration. Go to Norman Security Portal login page at Who can register If you are a certified Norman Partner and you have not registered an account yet, please contact Norman. If you are customer, please contact your service provider (a Norman partner), or contact Norman and we will assign you to a partner and register you for a trial. 12

13 Norman Security Portal Admin Guide How to navigate the portal How to navigate the portal The top menu Select from the top menu bar to navigate the portal, use the search feature to search the portal, or enter the settings to view account information or notifications. The top menu options view differs based on whether you are a logged in service provider (partner) or a logged in customer. Access to relevant data about the customers is essential for a service provider, while customers only need access to see data about their own endpoints. Customer Service Provider A service provider with several customers selects a customer to access that customer s details, like endpoints, groups and policy details. The menu is expanded with a submenu once a customer is selected. The submenu contains a few more options compared to the customer menu, like Dashboard, Users and Information. The Users and Information pages display the customer s account data and equals the information that the customer can view via the settings menu. The Dashboard displays a graphical representation of infections and quarantine, endpoint status, endpoints per policy and top malware for a customer. This page equals the logged in customers home page. Printing feature Click the print icon from any page for a printer friendly page. 13

14 Norman Security Portal Admin Guide How to navigate the portal Search You can search any part of the security portal for endpoint names, operating systems, user names, policy names, group names, IP-addresses, quarantined item filenames, etc. Enter a search subject and click the search symbol. The search results page appears with the results from your search. The results are sectioned into relevant areas of the portal. For each area you can click a result entry to view more details. Narrow your search Click the search drop-down menu and select an area from the list to narrow your search. Remember that if you select a specific area like this, the search takes in results only from that area. 14

15 Norman Security Portal Admin Guide Settings Settings From this page you can view notifications from the portal, administer your account or add users, get help, read about the product or log out. From the My account option you can add or remove authenticators, get or reset the recovery key, and more. Other options enable you to edit the company information and add or remove users. The help and support section features a search option that links to our support web page and support articles herein. The Settings menu and options apply to the partner account for the logged in partner, while management of a customer s account is done from the Information or Users options. Likewise, the Settings menu applies to the customer account for the logged in customer. Notifications From this section you can view security portal event notifications, which stems from activity on the account you are logged in to, service provider or customer. Partner notifications include customer, license, user or company account events. Customer notifications include endpoint, group, policy, installer or user events. Clicking Mark All Read or Delete All will mark all the notifications as read or delete them all in one go. Alternatively you can select one or more notifications at a time and mark them as read (envelope icon) or delete them (trash can icon). 15

16 Norman Security Portal Admin Guide Settings My account From this section you can edit your account Administrator user, change language, configure notifications, change your password, add or remove authenticators, get recovery key and view account history. Change address The account user is the logged in user. You can edit your name and phone number, but not the address since it is unique to the portal. If you want to change your address, you must add a new user with the new address, before you can delete the old one. Log in with your old address. Create a new Administrator user with your new address. Log out from the portal. Check your new inbox for the confirmation . Confirm the user account registration and log in with your new user. Delete the old Administrator user from Manage Users. Change language Select a language from the Language Preference drop-down menu and click Save to confirm. Change Password This is where you change your account user password. Enter your current password and your new password, then repeat your new password and click Change to confirm. The new password will take effect the next time you log in to the portal. If you forgot your password go to the portal login page and click Forgot your password? A message with a link to set your password is sent to your address. Show warning messages Select all the options if you want a warning message when you try to delete groups, endpoints or policies. If you deselect these options the portal will never warn, but immediately execute your action to delete. 16

17 Norman Security Portal Admin Guide Settings Authenticators This section describes how to use the two-factor authentication mechanism for secure logins to the portal. Norman Authenticator is an app developed to support a two-factor authentication and provides an extra layer of security to your user account. This drastically reduces potentially unwanted access to the portal in case your user credentials are stolen. Download Norman Authenticator from Google Play (supports Android devices). In a cloud-based system, secure authentication is extremely important. You should therefore always use the two-factor authentication app when you log in to the portal. Add an authenticator 1. Download Norman Authenticator from Google Play. Install the app on your Android device and open it. You are prompted for an activation code. 2. Log in to the portal and go to the Authenticators section in Settings > My account. 3. Get Recovery Key First you should get a recovery key which enables you to log on to your account in case your device should become unaccessible. You can click Skip to omit this step, although we strongly recommend against it. When using an authenticator you need either your working device with the app installed or a recovery key to log on to your account. Click Get Recovery Key and write down the key that appears on your screen. If you already got a recovery key the button text toggles to Reset Recovery Key. Reset the key if you cannot find or have lost your previous key. Remember to write down the new key. The previous one is deleted when you reset your key. We strongly recommend that you have a recovery key when you use an authenticator, or else you may not be able to log in to your account. (See Get a recovery key on page 19). 4. Add authenticator Make sure that you have your device at hand before you proceed. a) On your device, open the Norman Authenticator app. 17

18 Norman Security Portal Admin Guide Settings b) In the portal, click the plus icon to add a new authenticator and an activation code appears. c) On your device, enter the activation code in the Activation Code field and click Save to confirm. d) In log out from your portal account. e) Your device is ready to authenticate a login to the portal. 6. Settings Edit the app settings or continue to the next step if you want to change them at a later time: Press the cogwheel icon to open the app Settings: -- Set a Password for the app login. A password adds extra security when you use the authenticator app on your device. -- Select a Language for the application. English, German and Norwegian are available and more languages will come. -- Reset to original settings. If you select this option you will reset the language and password to factory settings. -- Deactivate the Authenticator. If you deactivate the authenticator from your device it is made unusable on that device, but it is not removed from the portal. Always remember to remove the authenticator from the portal before you deactivate it on your device, or else you cannot log in to the portal, unless you have another authenticator or a recovery key. If you deactivate the authenticator from your device it is not removed from your portal account. If you deactivate the authenticator like this, you will need another authenticator or a recovery key to log in to your account (see next page about recovery key). 7. With your device at hand, open the portal login web page in your browser and log in as usual. Notice the token that is displayed. 8. Open the authenticator app on your device and press Authenticate. Make sure you are connected to Internet. 9. Compare the token from the portal login dialog with the token on the app s Confirm login dialog. Press Allow to confirm the identical token and a legitimate login. If it is an illegitimate attempt, e.g. the tokens does no match, press Deny. The app authenticates your login and gives you access to the portal. Repeat steps 7 to 9 each time you log in to the portal using an authenticator; attempt a login to the portal, press authenticate, compare tokens, press allow, and you are logged in. 18

19 Norman Security Portal Admin Guide Settings Delete an authenticator Always delete the authenticator from the portal before you deactivate it on your device - never the other way round. If you uninstall the authenticator app or deactivate the authenticator from your device it is not removed from the portal. You will not be able to access your account, unless you have a recovery key or another authenticator to log in with. In case of emergency: If you cannot log in with your authenticator and you do not have a recovery key, please contact Norman. We will follow comprehensive security procedures to make sure you are the right owner of the account, protecting your user and the account. Recovery key Get a recovery key A recovery key is a backup key that enables access to your account. Write down the recovery key and keep it in a safe place. Do not save the key on your computer or device. Go to Settings > My account and select Get Recovery Key. Write down the key. We strongly recommend that you get a recovery key when using an authenticator. If you lose your device, the recovery key is used to access your account. In case of emergency: If you cannot log in with your authenticator and you do not have a recovery key, please contact Norman. We will follow comprehensive security procedures to make sure you are the right owner of the account, protecting your user and the account. Reset Recovery Key Once you have generated a recovery key for the first time, you can reset it whenever needed. The new key will delete your current key and create a new one. Make sure to write down the new key and keep it in a safe place. Do not save the key on your computer or device. After a reset you can destroy your old key which is rendered invalid. Go to Settings > My account. Select Reset Recovery Key. Click Reset to confirm deletion of the current key and generate a new one. Write down the key. 19

20 Norman Security Portal Admin Guide Settings Account History The account history displays events, like when you were logged in, at what time and date, from what IPaddress, in what country, and what browser and operating system you used. Company information This section contains information about your registered company name and country. When you change your company name or switch country the change is communicated to our customer relationship management system and updated accordingly. Other information in this section alternates between a partner and a customer account and is described separately in the next paragraphs. Partner The partner account is a management account and there is no license information to display, as there is none. If you want a product license to manage your own endpoints, you can register your company as a regular customer and purchase the license you need as you would for any customer. Customer Trial Link The customer trial link is an auto-generated url located in the company information section of your partner account. The url contains data about you and the address to our trial registration page. Copy the url from the portal and send it via to a customer who wants to register for a license or a trial. Add some instructions to your on how the customer should proceed. Customers that use your trial link when they register are auto-assigned to your partner account. Customer From the company information section you can view your registrered company name and country and your license details. In addition, you can make a management request to your service provider, or select to disable the service provider s management of your account. License The allowed number of endpoints indicates how many licensed seats you have purchased, while the approved endpoints indicates how many of the purchased seats that are actually in use. The number of available endpoints indicates purchased seats minus the number of endpoints that are approved. Request or disable management You can make a management request to your service provider. If you are managed, you can disable management so that the service provider no longer have access or permission to manage your account. With this feature customers can manage their endpoints themselves and yet they have the opportunity to request immediate help if needed. See Requesting or disabling management on page 26. Only the customer can set the unmanaged state to be managed again. The partner can disable management for a customer, but cannot enable management once disabled. 20

21 Norman Security Portal Admin Guide Settings Manage users From this option you can add, edit or remove a company account user. Click the plus icon to add a user or select a user name entry to edit or delete a user. You can grant users administrator or user privileges. Only an Administrator user can add, delete or edit the account users. User type User Administrator Can monitor endpoints, users and policies, but cannot remove or add items Can do everything Help & Support In this section you can search our web for relevant support articles with the security portal search feature. Search results are displayed in the portal as links to web pages. Click a link entry to go to the web page if you want to read more about a search result. At the right-hand side you will find an address and a phone number if you want to send us an message or call us for help. About This section contains information about the product. In addition to the product version number you will find web links about contact infomation, our terms of service and privacy policy, and open source information. Log out Right click the Settings icon and select Log out. 21

22 Norman Security Portal Admin Guide Home Home This is the security portal home page and it is the first page you see when you log in to the portal. The home page displays a numeric summary of connected endpoints, groups, policies and quarantined items. The graphical representations and data varies between a logged in customer or a partner. The home page displays the service provider s customers and endpoints. When a customer is logged in the home page displays that customer s endpoints. Infections and Quarantine This graph displays the number of items quarantined per day. Hover the graph with your pointing device to see the dates and the number of items. Graphical overview - service provider s view Summary Partner view only: This summary is adjusted to service providers and gives you a quick first hand status overview of customers, endpoints and quarantined items. Click an entry to view more details. Top Customers Partner view only: This graph is adjusted to service providers and represents your customers with the most endpoints registered. Hover the graph with your pointing device to see more details. Click a customer name below the graph to hide it from the graph view. Click again to show it. 22

23 Norman Security Portal Admin Guide Home Top Malware This chart represents a list of malware types that are the most detected ones in customer networks. The malware list represents the total of a service provider s customer data, or the total of the endpoints data for a customer. The data is collected from the quarantine. Graphical overview - customer s view Endpoints Status Customer view only: This chart is adjusted to customers and toggles between the percentage of online and offline or approved and unapproved endpoints. Offline endpoints are endpoints that have not reported back to the portal within a given amount of time. Unapproved endpoints have the client software installed and communicate with the portal, but they are not yet approved. Endpoints per Policy Customer view only: This graph is adjusted to customers and represents the amount of endpoints assigned per policy name. You can click a policy name below the graph to hide the policy from the graph. Click again to show it. 23

24 Norman Security Portal Admin Guide Customers Customers Customers are placed in the groups managed or unmanaged when they are added to the portal. Select a customer to view more details. Service providers cannot access unmanaged customers, but can view and handle the customer s information and license from the Information option. Add a customer Click the add icon and enter the required fields; company information, contact information, management select, license period and number of endpoints. Once you have registered a new customer and notified us formally we will activate the customer s license. Add groups and policies and generate installers. See also Groups on page 27, Policies on page 30 and Generate installers on page 37. Managed customers Customers are managed or unmanaged. A service provider manages the license and endpoints for managed customers. The service provider adds the customer with users, groups and policies. Once the client software is installed on the customer s endpoints the service provider can see and handle them from the portal. Both the customer and the service provider can request that a customer becomes unmanaged. See also Requesting or disabling management on page 26. Unmanaged customers Customers are managed or unmanaged. A service provider hosts the license and endpoints for unmanaged customers. The service provider cannot see or manage the customer s endpoints, add users or access the customer s account, except from via the information page where the customer s license is handled. If you want to switch from unmanaged to managed, you can make a request via your account settings. See also Requesting or disabling management on page 26. The following menu options are explained in their own chapters: Endpoints - Endpoints on page 27 Policies - Policies on page 30 Installers - Installers on page 37 24

25 Norman Security Portal Admin Guide Customers Dashboard This menu presents a graphical overview per customer, like the graph on the customer s home page. Users This menu option is available from a partner account and is accessible only if the customer is managed. The partner can view and manage the customer account users. The customer information is available also to the customer from Settings > Manage Users, when he/she is logged in to his/her account. Users are categorized as User or Administrator. User Administrator Can monitor endpoints, users and policies, but cannot remove or add items Can do everything Information This menu option is available for partner s and it is accessible whether the customer is managed or not. This is the sole access point to unmanaged customers, enabling the partner to handle the customers licenses. You can view and edit the customer s company name with details and you can disable management for a customer. The customer s management status is shown on this page. You can also delete a customer from this page. Customer information is available to the customer from Settings > Manage Users, when he/she is logged in to his/her account. Deleting a customer From the information page partners are able to delete a customer. You are prompted when you try to delete a customer, since this action cannot be undone. When deleting a customer like this the customer entry and its data will disappear from the portal. However, the deleted customer s license and updates will run until Norman or the distributor receive confirmatory information. In most cases partners should not need to delete a customer like this, unless the relation with this customer is already terminated. Click Delete Customer and then OK to confirm. Deleting a customer cannot be undone. If you deleted a customer by accident please call Norman (or your distributor) for assistance. 25

26 Norman Security Portal Admin Guide Customers Requesting or disabling management Both the service provider and the customer can disable management for the customer, the service provider via the information page and the customer via the company information settings. However, it s only the customer who can re-establish management again. Disable management Note that if you are a service provider, once you unmanage a customer you do no longer have access or management permissions to the customer account and you cannot revert the customer to become managed. Partner: Go to Customer > Information, deselect Managed customer and click Disable Management. Customer: Go to Settings > Company Information, deselect Managed customer and click Disable Management. Partner s view The customer is managed Managed customer was deselected The customer is unmanaged The unmanaged customer must him/herself enable management again. The service provider has no influence on the unmanaged customer, except to handle the customer s company information and license. Customer s view The customer is unmanaged Allow service... was selected The customer is managed Request management If you are a customer, you can enable management at any time. Your service provider will get acces to your account immediately after having accepted your request to be managed. Go to Settings > Company Information, select Allow service provider to manage and click Request to be Managed. The service provider receives you request and is ready to assist immediately after clicking Accept. 26

27 Norman Security Portal Admin Guide Endpoints Endpoints This page displays an overview of the endpoints in form of group names, ungrouped or unapproved endpoints, graphical presentation of the groups and the endpoints status. This page also presents a list of the endpoints and details like group, policy and operating system (OS). Ports 80 and 8444 must be open (egress-filtering) in the firewall/router in order for the endpoints to update and communicate with the portal. When a customer is registered you should create rational group names and move endpoints to the groups. Especially with customers that have a large number of endpoints you get better overview and tighter control when you divide the endpoints into groups. Select a group name or a column entry from the endpoints list to view more details. Click an endpoint name for a detailed view of the endpoint. Groups Customized groups This section displays the group names that you create for a customer. From the groups view you can easily assign endpoints to another policy, move endpoints to a different group, delete endpoints from the group, or delete the group name altogether. Click a group name to view endpoint names, group name, the assigned policies and operating system for the endpoints in that group. If you delete a group (name) its endpoints are moved to the Ungrouped folder. The policy will stick to the endpoint. 27

28 Norman Security Portal Admin Guide Endpoints Default groups The default groups are preset and contains endpoints that are set as distribution point, are ungrouped or are not yet approved. Distribution point This group contains endpoints that are appointed as distribution points. They are automatically moved to this group once appointed. See also Use distribution point on page 35. Ungrouped This group contains approved endpoints with the antivirus application installed. They communicate with the portal, but they are not yet moved to a group. Approving endpoints should include moving them to a defined group and assigning them a policy. We recommend that all endpoints are assigned to a group, which is rational and gives a better overview and control over the endpoints. Unapproved This group contains unapproved endpoints with the antivirus application installed. They communicate with the portal, but they are not yet approved. Once you approve the endpoints in this group they are moved to the default ungrouped group. Approving endpoints should include moving them to a defined group and assigning them a policy. We recommend that all endpoints are assigned to a group, which is rational and gives a better overview and control over the endpoints. Graphical presentation The groups and status graphs presents groups and online/offline or approved/unapproved endpoints for a selected customer. Use you pointing device to hover the charts for more details. Endpoint overview The list at the bottom Endpoints page displays all the endpoints for the selected customer. You can sort endpoints by the column; endpoint name, group, policy or operating system (OS). Use the Search feature to search for specific endpoints, groups, policies, operating system, and more. See Search on page 14. Move to group You can move one or more endpoints at a time to another group. Select the endpoints you want to move. Click the move group icon (folder). From the drop-down menu select a group and click Move. The endpoints you selected are immediately moved to the new group. 28

29 Norman Security Portal Admin Guide Endpoints Assign policy You can assign a policy to one or more endpoints at a time. Select the endpoints you want to assign a policy. Click the assign icon (document). From the drop-down menu select a policy and click Assign. The endpoints you selected are immediately assigned to the policy. Delete endpoint You can delete one or more endpoints at a time. Select the endpoints you want to delete and click the trash can icon. Unless you chose to not show warning messages from Settings > My Account you are prompted when you try to delete endpoints. Click OK to confirm the deletion. If you select Do not ask again from the deletion prompt dialog, you will not be asked the next time you try to delete endpoints. When you delete an endpoint it is immediately removed from the security portal. The next time the endpoint communicates with the portal, it is recognized as a deleted endpoint and the endpoint software is uninstalled. If you delete an endpoint from the portal, the client software is uninstalled from the endpoint and it will no longer receive updates or be protected. If you need to add a previously deleted endpoint, you have to follow the procedures for adding a new endpoint; install the client software and approve the endpoint. See Generate installers on page 37, Unapproved on page 28 and Move to group on page

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Norton Family Product Manual

Norton Family Product Manual Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

PrinterOn Mobile App for ios and Android

PrinterOn Mobile App for ios and Android PrinterOn Mobile App for ios and Android User Guide Version 3.4 Contents Chapter 1: Getting started... 4 Features of the PrinterOn Mobile App... 4 Support for PrinterOn Secure Release Anywhere printer

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

Help. F-Secure Online Backup

Help. F-Secure Online Backup Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

Endpoint Protection Administrator Guide

Endpoint Protection Administrator Guide Endpoint Protection Administrator Guide Copyright Endpoint Protection Administrator Guide June, 2013 2012-2013 Webroot, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

SYSTEM REQUIREMENTS... 5 FREE RESOURCES... 6 GETTING STARTED...

SYSTEM REQUIREMENTS... 5 FREE RESOURCES... 6 GETTING STARTED... Table of Contents ABOUT... 4 Authorized Use... 4 Questions and Contact Information... 4 SYSTEM REQUIREMENTS... 5 FREE RESOURCES... 6 GETTING STARTED... 7 Account Creation Overview and Types of Accounts...

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Resource Online User Guide JUNE 2013

Resource Online User Guide JUNE 2013 Resource Online User Guide JUNE 2013 CHASE PAYMENTECH SOLUTIONS MAKES NO WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Comodo Mobile Device Manager Software Version 1.0

Comodo Mobile Device Manager Software Version 1.0 Comodo Mobile Device Manager Software Version 1.0 Installation Guide Guide Version 1.0.041114 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.CMDM Setup... 3 1.1.System

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 AntiMalware User Guide Version 1.1 September 30, 2013 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA as updated

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

ReadyNAS Replicate. User Manual. July 2013 202-10774-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Replicate. User Manual. July 2013 202-10774-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual July 2013 202-10774-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate the serial number on the label

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Spam Manager. Quarantine Administrator Guide

Spam Manager. Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

ASUS WebStorage Client-based for Windows [Advanced] User Manual

ASUS WebStorage Client-based for Windows [Advanced] User Manual ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

How To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black

How To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

AliOffice 2.0 Installation Guide

AliOffice 2.0 Installation Guide January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

DataSuite Installation and Activation Guide

DataSuite Installation and Activation Guide DataSuite Installation and Activation Guide This document provides a detailed overview of the installation and activation procedure for the DataSuite v2.4.0.0 software. DataSuite allows you to configure

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Avira System Speedup. HowTo

Avira System Speedup. HowTo Avira System Speedup HowTo Table of Contents 1. Introduction... 4 1.1 What is Avira System Speedup?...4 2. Installation... 5 2.1 System Requirements...5 2.2 Installation...5 3. Using the program... 8 3.1

More information

VEEAM ONE 8 RELEASE NOTES

VEEAM ONE 8 RELEASE NOTES VEEAM ONE 8 RELEASE NOTES This Release Notes document provides last-minute information about Veeam ONE 8 Update 2, including system requirements, installation instructions as well as relevant information

More information

WA2102 Web Application Programming with Java EE 6 - WebSphere 8.5 - RAD 8.5. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc.

WA2102 Web Application Programming with Java EE 6 - WebSphere 8.5 - RAD 8.5. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc. WA2102 Web Application Programming with Java EE 6 - WebSphere 8.5 - RAD 8.5 Classroom Setup Guide Web Age Solutions Inc. Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3

More information

Senior Systems Cloud Services

Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

OPTAC Fleet Viewer. Instruction Manual

OPTAC Fleet Viewer. Instruction Manual OPTAC Fleet Viewer Instruction Manual Stoneridge Limited Claverhouse Industrial Park Dundee DD4 9UB Help-line Telephone Number: 0870 887 9256 E-Mail: optac@stoneridge.com Document version 4.0 Part Number:

More information

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud CaseWare Time CaseWare Cloud Integration Guide For Time 2015 and CaseWare Cloud Copyright and Trademark Notice Copyright. 2015 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication,

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Deposit Direct. Getting Started Guide

Deposit Direct. Getting Started Guide Deposit Direct Getting Started Guide Table of Contents Before You Start... 3 Installing the Deposit Direct application for use with Microsoft Windows Vista... 4 Running Programs in Microsoft Windows Vista...

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Safe internet: Getting Started Guide

Safe internet: Getting Started Guide Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

PrinterOn Embedded Application For Samsung Printers and MFPs

PrinterOn Embedded Application For Samsung Printers and MFPs PrinterOn Embedded Application For Samsung Printers and MFPs Table of Contents 1. Introduction... 3 2. Setup and Service Prerequisites... 4 3. How to Purchase the PrinterOn Service... 5 4. How to install

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update Secure Remote Access Dell SonicWALL SRA 7.5.0.9 Contents Release Purpose...1 Platform Compatibility...1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance...2 Important Differences between

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5 Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

Quick Start Guide. www. K7Computing.com

Quick Start Guide. www. K7Computing.com Quick Start Guide Table of Contents Before you install the Product... 3 Installing the program... 3 Quick Installation... 4 Custom Installation... 4 Installation... 7 Activation... 8 Offline Activation...

More information

Drake Hosted User Guide

Drake Hosted User Guide Drake Hosted User Guide Last Revision Date: 11/23/2015 Support.DrakeSoftware.com (828) 524-8020 Drake Hosted User Guide Copyright The Drake Hosted User Guide, Drake Tax Software, and any other related

More information

Sabal Trust Company. WebLink User Guide

Sabal Trust Company. WebLink User Guide If you are having any difficulty or need any help with these changes or the new configuration, please call your Relationship Manager Sabal Trust Company WebLink User Guide Table of Contents WELCOME TO

More information

MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA

MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA All Information provided in this document and in the accompanying software is subject to change without notice and does not represent a commitment on the part of RamSoft. RamSoft assumes no responsibility

More information

LEVEL 3 SM XPRESSMEET SOLUTIONS

LEVEL 3 SM XPRESSMEET SOLUTIONS LEVEL 3 SM XPRESSMEET SOLUTIONS USER GUIDE VERSION 2015 TABLE OF CONTENTS Level 3 XpressMeet Calendar...3 Level 3 SM XpressMeet Outlook Add-In...3 Overview...3 Features...3 Download and Installation Instructions...

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06 SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228

BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228 BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228 Contents Getting Started...4 Tips for Using Actionable Intelligence... 4 Logging into Actionable Intelligence...

More information

Clickfree Software User Guide

Clickfree Software User Guide Clickfree Software User Guide Last Revised: Nov 2, 2011 Clickfree_backup_software_user_guide_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation.

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

NetClient CS Document Management Portal User Guide. version 9.x

NetClient CS Document Management Portal User Guide. version 9.x NetClient CS Document Management Portal User Guide version 9.x TL 23560 (6/9/11) Copyright Information Text copyright 2001-2011 by Thomson Reuters/Tax & Accounting. All rights reserved. Video display images

More information

OneDrive for Business User Guide

OneDrive for Business User Guide OneDrive for Business User Guide Contents About OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive for

More information

Qvidian Playbooks & Salesforce Setup Guide. Fall Release 2013

Qvidian Playbooks & Salesforce Setup Guide. Fall Release 2013 Qvidian Playbooks & Salesforce Setup Guide Fall Release 2013 Last Updated: 11/12/2013 Introduction Welcome to Qvidian Sales Playbooks & Analytics! This guide is directed toward CRM Administrators, Playbook

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Stellar Phoenix Exchange Server Backup

Stellar Phoenix Exchange Server Backup Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically

More information

SAS Visual Analytics 7.1 for SAS Cloud. Quick-Start Guide

SAS Visual Analytics 7.1 for SAS Cloud. Quick-Start Guide SAS Visual Analytics 7.1 for SAS Cloud Quick-Start Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Visual Analytics 7.1 for SAS Cloud: Quick-Start Guide.

More information

RMFT Outlook Add-In User Guide

RMFT Outlook Add-In User Guide RMFT Outlook Add-In User Guide Software Version 2.5 November 23, 2011 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: info@repliweb.com, Support:

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4 Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information