AntiSpyware Enterprise Module Beta 2

Size: px
Start display at page:

Download "AntiSpyware Enterprise Module Beta 2"

Transcription

1 AntiSpyware Enterprise Module Beta 2 Product Guide About the AntiSpyware Enterprise Module The McAfee AntiSpyware Enterprise Module 8.7 is an add-on to the VirusScan Enterprise 8.7i product that extends its ability to detect and take action on potentially unwanted spyware and cookies. Where can I get the module? AntiSpyware Enterprise Module 8.7 is available from the product CD or the McAfee download website at: How does the module work? The module uses the VirusScan Enterprise on-access scanner, ondemand scanner, and unwanted programs policy with the scanning engine and detection definition (DAT) file to protect you from potentially unwanted spyware-related files, registry entries, and cookies in the cookies folder. Contents About the AntiSpyware Enterprise Module 1 Pre-installation information 2 Installing the AntiSpyware Enterprise Module 2 Configuring the AntiSpyware Enterprise Module 5 Viewing scan results 7 Removing the AntiSpyware Enterprise Module 8 Submitting samples to McAfee Avert Labs 8 Resources 9 Icon Conventions Caution Tip When detections occur, the action taken depends on which component detected the threat, what you configured, and what is defined in the DAT file. For example, if the scanner action is set to clean but the detected item cannot be cleaned because there is no cleaner or it is damaged beyond repair, the DAT file might delete the item even though you set the action to clean. For security purposes, deleting the file is the safest way to protect your environment. Component On-Access Scanner On-Demand Scanner Unwanted Programs Policy The on-access scanner provides the primary protection by detecting items as they are accessed. Enable unwanted program detection and configure primary and secondary actions The action taken depends on the type of detection: Clean files automatically. The action depends on what is detected: Cookies The detected cookie is cleaned. Files and registry items If the file or registry item cannot be cleaned, the DAT file may take an alternative action. This can include killing processes, removing injected.dll files, deleting files, and/or deleting registry keys. In most cases with spyware, the user will only notice that files have been deleted as that action is the most visible. Delete files automatically. The detected item is deleted. The on-demand scanner detects cookies and spyware-related registry entries that were not previously cleaned. Enable unwanted program detection and configure primary and secondary actions. The action taken depends on the type of detection: Clean files. The action depends on what is detected: Cookies The detected cookie is cleaned. Registry items If the registry item cannot be cleaned, the DAT file may take an alternative action. This can include cleaning or deleting registry values or keys. Delete files. The detected file, registry item, or entire cookie is deleted. s and Tips All other actions are treated as Continue scanning. Specify additions or exclusions to the list of detection items: User-defined detections Items that are not being detected by the current DAT file. Exclusions Items that you legitimately use or do not want to detect. When items are cleaned or deleted, they are backed up to the quarantine directory and can be restored using the Quarantine Manager Policy. 1

2 Pre-installation information Take these actions before you start the installation process. 1 Verify that your computer meets these requirements: A server or workstation that meets the system requirements as detailed in the VirusScan Enterprise 8.7i Installation Guide. A server or workstation with an installed, licensed version of VirusScan Enterprise 8.7i. Caution This release of AntiSpyware Enterprise Module 8.7 does not work with earlier versions of VirusScan Enterprise. 2 Review the product Release s (Readme.txt) for: Special requirements Known issues Last minute additions or changes 3 Get the installation files: a Retrieve the AntiSpyware Enterprise Module 8.7.ZIP file from the product CD or the McAfee download website at: b Extract the files from the product.zip file to a temporary location on the hard drive. The product.zip file includes these files: MAS870DET.MCS PACKING.LST PKGCATALOG.Z VSE87MAS.EXE VSEMAS870 EXTENSION README.HTML (A file for each language) Installing the AntiSpyware Enterprise Module When you install the module, it adds anti-spyware protection to VirusScan Enterprise. The module installation process automatically changes some of the VirusScan Enterprise 8.7i configuration settings to ensure that you receive the full benefit of the module s capabilities: Unwanted Programs Policy: The categories on the Detection tab in the Unwanted Programs Policy are selected differently based on these scenarios: If no categories were previously selected, all categories are automatically selected. If some or all categories were previously selected, no change is made. On-Access Scan Properties: Scan cookie files appears and is enabled on the General tab. Detect unwanted programs is enabled on the Unwanted Programs tab, if it was not already enabled. On-Demand Scan Properties: Detect unwanted programs is enabled on the Unwanted Programs tab, if it was not already enabled. The default Full Scan task includes two new Registry and Cookies scan items: The Registry and Cookies scan items are added to every existing and every new on-demand scan task. A new Targeted Scan task has been added to the VirusScan Console. The default task includes Registry and Cookies scan items. It can be configured to meet your requirements. This new task is not available in epolicy Orchestrator. If you are installing the module from the command line or using an installation package that you created with McAfee Installation Designer, you can add the /NC option to prevent automatic changes to VirusScan Enterprise 8.7i configuration settings. This guide describes these installation methods: Setup Utility on page 3. Windows Command Line on page 3. epolicy Orchestrator on page 4. McAfee Installation Designer on page 4 2

3 Method Setup Utility Windows Command Line To add the module to the VirusScan Enterprise product using the Setup utility: 1 From the temporary folder where you extracted the installation files, double-click VSE85MAS.EXE. 2 Click Next, then click Finish when the installation completes. 3 After installation, view the VirusScan Enterprise About dialog box to confirm it displays VirusScan Enterprise + Add-on Module(s). s and Tips If you do not want to change the configuration settings as a result of installation, use one of the other installation methods. To add the module to the VirusScan Enterprise product from the command line: 1 Select Start Run to open the Windows command-line component. 2 Browse to the temporary folder where you extracted the files, then type the command line to install the module. Use these command-line options to customize the installation: /LOGFILE filename Records installation activity in the specified file. /SILENT Run the setup utility in silent mode. /REBOOT Restart the computer if required. Use the =F option to force a restart, the =R option to prevent a restart, and the =A option to always restart. /PROMPT Display the prompt dialog box before restarting the computer. /NC Prevent the VirusScan Enterprise configuration settings from automatically changing when the module is installed. /E Extract the product installation files to the location you specify. DIR The path, directory, or folder where you want to place the extracted installation files. For example, to install the module silently: VSE87MAS [[/LOGFILE filename][/silent][/reboot][/prompt][/e DIR]] For example, to install the module silently without changing any existing configuration settings: VSE87MAS [[/LOGFILE filename][/silent][/reboot][/prompt][/nc][/e DIR]] 3 After installation, view the VirusScan Enterprise About dialog box to confirm it displays VirusScan Enterprise + Add-on Module(s). s and Tips For more information about using command-line options for installation, see the VirusScan Enterprise Installation Guide. 3

4 Method epolicy Orchestrator McAfee Installation Designer To place the module under epolicy Orchestrator management and deploy it to client computers: 1 Add the PkgCatalog.z file to the repository: a From the epolicy Orchestrator console, select Repository then select Check in package in the details pane. b Click Next to continue. c Select Products or updates, then click Next. d Specify the path to the module PkgCatalog.z file, or click Browse to locate and select it. If you used McAfee Installation Designer to create an installation package, you can select it at this time. e Click Next, then click Finish to check the package in. 2 Add the VSEMAS870 extension file to the repository: a From the epolicy Orchestrator console, select Repository then select Check in NAP in the details pane. b Click Next to continue. c Select Add new software to be managed, then click Next. d From the Select a Software Package dialog box, locate the VSEMAS870 extension file, then select it and click Open. 3 Confirm that McAfee Anti-Spyware Enterprise Module has been added to the Managed Products in the Repository. 4 Use the deployment task to install the product on client computers. s and Tips If you do not want to change the configuration settings when you install the product on client computers, use McAfee Installation Designer to create an installation package using the /NC command-line option. See Windows Command Line on page 3 for information about using this option. For more information about using epolicy Orchestrator, see the product documentation. To use McAfee Installation Designer to create an installation package, then deploy it: 1 From McAfee Installation Designer, configure the installation package to include the AntiSpyware Enterprise Module and any other products you want to include. 2 Deploy the installation package from epolicy Orchestrator or using the tool of your choice. 3 After installation, view the VirusScan Enterprise About dialog box to confirm it displays VirusScan Enterprise + Add-on Module(s). s and Tips If you do not want to change the configuration settings as a result of installation, use the /NC command-line option when creating the installation package. See Windows Command Line on page 3 for information about using this option. If the installation package includes both VirusScan Enterprise and the AntiSpyware Enterprise Module, the module installs after VirusScan Enterprise. For more information about using McAfee Installation Designer, see the product documentation. 4

5 Configuring the AntiSpyware Enterprise Module This guide describes these configuration methods: From the VirusScan Console. From the epolicy Orchestrator console on page 6. From the VirusScan Console Update DAT files, configure unwanted programs policy and the on-access scanner, then create and/or configure on-demand scan tasks.. Update the DAT file Perform an update task immediately after installing the module to ensure that you have the most current spyware and cookie definitions. From the VirusScan Console, right-click AutoUpdate, then click Start. Unwanted programs policy Specify exclusions or user-defined detections. You must specify the exact detection name; do not use the file name, the registry key, or the cookie. From the VirusScan Console, open the Unwanted Programs Policy dialog box. 1 On the Detection tab: a b Under Detection from DATs, review the category selections and make changes as required. Click Exclusions to specify items that you do not want to detect. Exclusions can be specified for files, registry keys/ values, or cookies. Type the exact detection name or click Browse to locate and select it, then click OK. You can find the exact detection name by looking in the Detected as section of the log file. Repeat this step for each exclusion you want to add. 2 On the User-Defined Detection tab, specify files that are not included in the current DAT file. User-defined detections apply only to files; they do not apply to registry keys/values, or cookies. a Click Add. Type the exact detection name. Type the description that you want to appear in the notification, then click OK. Repeat this step for each user-defined detection you want to add. On-access scanner From the VirusScan Console, open the On-Access Scan Properties dialog box. 1 On the General tab, confirm that Scan cookie files is selected. 2 Select All Processes in the left pane. 3 On the Unwanted Programs tab: a Confirm that Detect unwanted programs is selected. b Review the actions on the Unwanted Programs tab to ensure they meet your needs. See How does the module work? on page 1 for information about how actions are applied. On-demand scan tasks From the VirusScan Console, open the On-Demand Scan Properties dialog box. 1 On the Unwanted Programs tab: a Confirm that Detect unwanted programs is selected. b Review the actions on the Unwanted Programs tab to ensure they meet your needs. See How does the module work? on page 1 for information about how actions are applied. 2 On the Where tab, create and/or configure a Registry or Cookies scan. a To add a scan item, click Add, then select Registry or Cookies from the drop-down list. You can specify unwanted program detection to be the same for all processes or individually for default, low-risk, and/or high-risk processes. The Registry or Cookies scan item is already added to the task if you installed the module by a method that changed the configuration settings. Create and configure as many scan tasks as necessary. These task settings do not apply to registry and cookie scans: The Heuristics options on the Advanced tab. The options on the Actions tab. 5

6 From the epolicy Orchestrator console Configure the module from the VirusScan Enterprise 8.7i policy pages because the module is an add-on to VirusScan Enterprise. Update DAT files, configure policies for unwanted programs detection and on-access scanning, then create and/or configure on-demand scan tasks. Update the DAT file Perform an update task to ensure that you have the most current spyware and cookie definitions. 1 From the epolicy Orchestrator console, select the Task tab in the details pane. 2 Configure an update task to update the DAT file and run immediately. Unwanted programs policy Specify exclusions or user-defined detections. You must specify the exact detection name; do not use the file name, the registry key, or the cookie. From the epolicy Orchestrator console, select the Policies tab in the details pane, then expand the VirusScan Enterprise policies: 1 Select Unwanted Program Policies. 2 In Settings for, select Workstation (default) or Server from the dropdown list. 3 On the Detection tab: b c Under Detection from DATs, review the category selections and make changes as required. Click Exclusions to specify items that you do not want to detect. Exclusions can be specified for files, registry keys/ values, or cookies. Type the exact detection name, then click OK. You can find the exact detection name by looking in the Detected as section of the log file. Repeat this step for each exclusion you want to add. 4 On the User-Defined Detections tab, specify files to detect that are not included in the current DAT file. User-defined detections apply only to files. They cannot be specified for registry keys/ values, or cookies. b Click Add. Type the exact detection name. Type the description that you want to appear in the notification, then click OK. Repeat this step for each user-defined detection you want to add. 5 Repeat this procedure to configure settings for the workstation or the server. On-access scanner policies From the epolicy Orchestrator console, select the Policies tab in the details pane, then expand the VirusScan Enterprise policies: 1 Select On-Access Default Processes Policies, On-Access Low-Risk Processes Policies, or On-Access High-Risk Processes Policies 2 In Settings for, select Workstation (default) or Server from the dropdown list. 3 On the Unwanted Programs tab: b Confirm that Detect unwanted programs is selected. c Review the actions on the Unwanted Programs tab to ensure they meet your needs. See How does the module work? on page 1 for information about how actions are applied. 4 Repeat this procedure to configure settings for the workstation or the server and for default, low-risk, and high-risk processes. On-demand scan tasks To create a new task: 1 From the epolicy Orchestrator console, right-click Directory or the desired site, group, or computer, then click Schedule Task. 1 Type the New Task Name for the scan task. 2 Select VirusScan Enterprise 8.7 On-Demand Scan from the Software Task Type list, then click OK to create the task. To configure a task: 1 From the epolicy Orchestrator console, select the Task tab in the details pane. 2 Right-click the task and select Edit Task to open the epolicy Orchestrator Scheduler dialog box. 3 Click Settings. 4 On the Unwanted Programs tab: b Confirm that Detect unwanted programs is selected. c Review the actions on the Unwanted Programs tab to ensure they meet your needs. See How does the module work? on page 1 for information about how actions are applied. 5 On the Where tab: b To add a scan item, click Add, then select Registry or Cookies from the drop-down list. If you are configuring a new task, the Registry and Cookies scan items are already added to the task. Create and configure as many scan tasks as necessary. These task settings do not apply to registry and cookie scans: The Heuristics options on the Advanced tab. The options on the Actions tab. 6

7 Viewing scan results View scan results from VirusScan Enterprise or epolicy Orchestrator. Information Source VirusScan Enterprise epolicy Orchestrator On-Access Scanner View detection results in: The On-Access Scan Messages dialog box. The On-Access Scan Statistics dialog summary. The activity log. On-Demand Scan Tasks View detection results in: The On-Demand Scan Progress dialog box while the scan is in progress. The On-Demand Scan Statistics dialog summary. The activity log. Reports The results of scans performed by the AntiSpyware Enterprise Module are available in the epolicy Orchestrator reports under Anti-Virus VirusScan Enterprise. The module is an add-on to VirusScan Enterprise, so VirusScan Enterprise collects and reports the data. Use the Coverage reports to see how many computers have the AntiSpyware Enterprise Module installed. Use the VirusScan Enterprise reports, such as the Top 10 Unwanted Programs and the various Unwanted Program Detections reports to view detection information. Filtering reports In addition to using standard reports, you can filter report results to exclude cookies or include specific types of threats. Some filter examples follow. Filter out cookie detections: Data Filter Tab = Detection Condition = Not Starting With Term/Variable = Cookie Filter out all detections except Adware: Data Filter Tab = Type Condition = Equal to Term/Variable = Adware Filter out all detections except Adware and Remote Admin tools: Data Filter Tab = Type Condition = Equal to Term/Variable = Adware Term/Variable = Remote Admin s and Tips Some filter terms are case sensitive; for example Cookie. The Unwanted Program Detections reports do not display virus activity even if you filter on it. 7

8 Removing the AntiSpyware Enterprise Module Use one of these methods to remove the AntiSpyware Enterprise Module. Removal Method Windows Add or Remove Programs epolicy Orchestrator Use the Windows Add or Remove Programs utility to remove the AntiSpyware Enterprise Module. Use the deployment task to remove the AntiSpyware Enterprise Module. Caution Do not use the VirusScan Enterprise Repair Installation feature to remove the AntiSpyware Enterprise Module. Using this feature may not remove all of the necessary files. You must use one of the methods described here. Submitting samples to McAfee Avert Labs If you find a spyware application or cookie that is not being detected with the current DAT file, you can submit a sample of it to McAfee Avert Labs through WebImmune. The sample is analyzed and considered for inclusion in the DAT file. If the module detects something that you think it should not detect, you can also submit a sample of it to McAfee Avert Labs through WebImmune. The sample is analyzed and considered for exclusion from the DAT file. To submit a sample: Method to submit WebImmune Standard Mail This is the preferred method to submit samples because it provides the fastest turnaround time on sample reviews, and provides historical information for all samples that you submitted. By accessing / and creating a free account you can upload files directly to McAfee Avert Labs automated systems for review. If the automated system is unable to determine a threat exists the issue will be escalated to the analysts. Access to get more information about WebImmune. You can send s directly to McAfee Avert Labs automated systems for review. If the automated system is unable to determine a threat exists, the issue will be escalated to analysts. To submit a sample via , send it to the global address at virus_research@avertlabs.com, or get additional regional addresses from the WebImmune website. This is the least preferred method. Submitting samples in this way causes the longest turnaround time for review of your sample. 8

9 Resources Getting information What product documentation is available? The product documentation is available in PDF format on the product CD and also on the McAfee download website. AntiSpyware Enterprise Module 8.7 Release s ReadMe. Product information, any known issues, and last minute additions or changes to the product or its documentation. Product Guide This guide. Installation, configuration, and operating procedures. VirusScan Enterprise 8.7i Release s ReadMe. Product information, resolved issues, any known issues, and last minute additions or changes to the product or its documentation. Installation Guide System requirements and instructions for installing and removing the software using the Setup utility and the command line. Product Guide Product introduction and features, detailed instructions for configuring the software, information on deployment, recurring tasks, and operating procedures. Configuration Guide For use with epolicy Orchestrator. Configuring, deploying, and managing VirusScan Enterprise through epolicy Orchestrator. Quick Reference Card Product information that is printed and accompanies the product CD. epolicy Orchestrator or 4.0 Release s ReadMe. Product information, resolved issues, any known issues, and last minute additions or changes to the product or its documentation. Product Guide Product introduction and features, detailed instructions for configuring the software, information on deployment, recurring tasks, and operating procedures. McAfee Installation Designer 8.7 Release s ReadMe. Product information, resolved issues, any known issues, and last minute additions or changes to the product or its documentation. Product Guide Product introduction and features, detailed instructions for configuring the software, information on deployment, recurring tasks, and operating procedures. How do I contact technical support? By phone For a list of current product support phone numbers: From the web Log on to the SecurityCenter website with your user name and password. Click the Help tab, then select Contact Support. Copyright 2006 McAfee, Inc. All Rights Reserved. DBN-001-EN mcafee.com 9

Anti-Spyware Enterprise Module software

Anti-Spyware Enterprise Module software Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that

More information

Total Protection Service

Total Protection Service User Help McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee VirusScan Enterprise 8.8 software Product Guide

McAfee VirusScan Enterprise 8.8 software Product Guide McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0 Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

To install antivirus software on the Selenia Dimensions product. This document provides instructions for the following products.

To install antivirus software on the Selenia Dimensions product. This document provides instructions for the following products. 1.1 Introduction 1.1.1 Purpose 1.1.2 Scope To install antivirus software on the Selenia Dimensions product. This document applies to all Dimensions products with version 1.6.2 software and above. 1.1.3

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

McAfee MOVE / VMware Collaboration Best Practices

McAfee MOVE / VMware Collaboration Best Practices McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...

More information

Release Notes for McAfee VirusScan Enterprise for Storage 1.0

Release Notes for McAfee VirusScan Enterprise for Storage 1.0 Release Notes for McAfee VirusScan Enterprise for Storage 1.0 About this document New features Known issues Where to find McAfee enterprise product information License attributions About this document

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Product Guide. McAfee VirusScan for Mac 9.8.0

Product Guide. McAfee VirusScan for Mac 9.8.0 Product Guide McAfee VirusScan for Mac 9.8.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS Intel

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111.

For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111. McAfee VirusScan Enterprise 8.7i Repost Patch 5 Release Notes Thank you for using McAfee software. This document contains important information about the current release. We strongly recommend that you

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee VirusScan Enterprise 8.8 software Installation Guide

McAfee VirusScan Enterprise 8.8 software Installation Guide McAfee VirusScan Enterprise 8.8 software Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved.

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release date: August 28, 2014 This build was developed and tested on: -

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

To install anti virus software on the Selenia 5.x product. This document applies to all Selenia 5.x products with version 5.2 software and above.

To install anti virus software on the Selenia 5.x product. This document applies to all Selenia 5.x products with version 5.2 software and above. 1.0 Introduction 1.1 Purpose To install anti virus software on the Selenia 5.x product. 1.2 Scope This document applies to all Selenia 5.x products with version 5.2 software and above. 1.3 Estimated Time

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Snow Inventory. Installing and Evaluating

Snow Inventory. Installing and Evaluating Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

Product Guide. McAfee SaaS Endpoint Protection 5.2.0

Product Guide. McAfee SaaS Endpoint Protection 5.2.0 Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Laptop Backup - User Guide (Windows)

Laptop Backup - User Guide (Windows) Laptop Backup - User Guide (Windows) Page 1 of 14 Page 2 of 14 Laptop Backup - User Guide - (Windows) TABLE OF CONTENTS INSTALLATION MONITOR RESTORE ADVANCED OPTIONS Adding Backup Content Filtering Contents

More information

How To Install & Use Metascan With Policy Patrol

How To Install & Use Metascan With Policy Patrol Policy Patrol 9 technical documentation June 16, 2014 How To Install & Use Metascan With Policy Patrol No antivirus engine is perfect. With over 220,000 new threats emerging daily, it would be impossible

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Using McAfee VirusScan Enterprise 8.7i Jocelyn Kasamoto

Using McAfee VirusScan Enterprise 8.7i Jocelyn Kasamoto WIN1049 October 2009 Using McAfee VirusScan Enterprise 8.7i Jocelyn Kasamoto Introduction Introduction... 1 Product Overview... 2 System Requirements... 3 Where to Get the Software... 4 Installation Instructions...

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

TIBCO Spotfire Automation Services Installation and Configuration

TIBCO Spotfire Automation Services Installation and Configuration TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0 February 2015 Updated March 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

MALWAREBYTES PLUGIN DOCUMENTATION

MALWAREBYTES PLUGIN DOCUMENTATION Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Using McAfee VirusScan. Professional Edition Version 8.0. Software On a DX8000 DVR

Using McAfee VirusScan. Professional Edition Version 8.0. Software On a DX8000 DVR Using McAfee VirusScan Professional Edition Version 8.0 Software On a DX8000 DVR DX8000 Digital Video Recorder C1611M-B (12/04) Contents Using McAfee VirusScan Professional Edition Version 8.0.....................................................................5

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

VirusScan Enterprise. Product Guide Revision 1.0. version 7.1.0

VirusScan Enterprise. Product Guide Revision 1.0. version 7.1.0 VirusScan Enterprise Product Guide Revision 1.0 version 7.1.0 COPYRIGHT 2003 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Security for Microsoft SharePoint 2.5.0 User Guide

McAfee Security for Microsoft SharePoint 2.5.0 User Guide McAfee Security for Microsoft SharePoint 2.5.0 User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee

Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Technical Report Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp June 2015 TR-4286 Abstract An antivirus solution is key for enterprises

More information

Avira AntiVir Personal Free Antivirus User Manual

Avira AntiVir Personal Free Antivirus User Manual Avira AntiVir Personal Free Antivirus User Manual Trademarks and Copyright Trademarks AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in

More information

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service

Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........

More information

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

McAfee VirusScan Enterprise for Storage 1.1.0

McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Administration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Gpupdate is a trademark owned by Specops Software.

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority In this post we will see the steps for deploying the client certificate for windows computers. This post is a part of Deploy PKI Certificates for SCCM 2012 R2 Step by Step Guide. In the previous post we

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

In this note, you will learn the basic applications of McAfee VirusScan Enterprise (hereafter McAfee ). Six topics will be covered as below:

In this note, you will learn the basic applications of McAfee VirusScan Enterprise (hereafter McAfee ). Six topics will be covered as below: ANTIVIRUS SOFTWARE In this note, you will learn the basic applications of McAfee VirusScan Enterprise (hereafter McAfee ). Six topics will be covered as below: 1. Start McAfee VirusScan Enterprise 2. Change

More information

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task. Lab 8 User name: Administrator Password: Password1 Contents Exercise 8-1: Assigning a Custom Load Evaluator... 1 Scenario... 1 Configuring a Custom Load Evaluator... 1 Assigning a Load Evaluator to a Server...

More information

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System

More information

Juris Installation / Upgrade Guide

Juris Installation / Upgrade Guide Juris Installation / Upgrade Guide Version 2.7 2015 LexisNexis. All rights reserved. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

IBM Information Server

IBM Information Server IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01 IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

MICROSOFT STEP BY STEP INTERACTIVE VERSION 3.0 ADMINISTRATION GUIDE

MICROSOFT STEP BY STEP INTERACTIVE VERSION 3.0 ADMINISTRATION GUIDE MICROSOFT STEP BY STEP INTERACTIVE VERSION 3.0 ADMINISTRATION GUIDE Part 1: Network Installation Guide Introduction Part 1 of this document provides instructions for installing Microsoft Interactive Training

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0

Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0 Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0 Product version: 9.5 Document date: November 2010 Contents 1 About this guide...3 2 Overview...4 3 System requirements...5

More information

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo

More information

McAfee Internet Security Suite Quick-Start Guide

McAfee Internet Security Suite Quick-Start Guide Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet

More information

Litigation Support connector installation and integration guide for Summation

Litigation Support connector installation and integration guide for Summation Litigation Support connector installation and integration guide for Summation For AccuRoute v2.3 July 28, 2009 Omtool, Ltd. 6 Riverside Drive Andover, MA 01810 Phone: +1/1 978 327 5700 Toll-free in the

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X version 10.4 or later Product version: 8 Document date: April 2012 Contents 1 About Sophos Anti-Virus...3 2 Scanning

More information

ESET NOD32 Antivirus. Table of contents

ESET NOD32 Antivirus. Table of contents ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32

More information

ImageNow Cluster Resource Monitor

ImageNow Cluster Resource Monitor ImageNow Cluster Resource Monitor Installation and Setup Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2012 2012 Perceptive Software. All rights reserved CaptureNow,

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

SAS 9.3 Foundation for Microsoft Windows

SAS 9.3 Foundation for Microsoft Windows Software License Renewal Instructions SAS 9.3 Foundation for Microsoft Windows Note: In this document, references to Microsoft Windows or Windows include Microsoft Windows for x64. SAS software is licensed

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information