Charter Business Desktop Security Administrator's Guide

Size: px
Start display at page:

Download "Charter Business Desktop Security Administrator's Guide"

Transcription

1 Charter Business Desktop Security Administrator's Guide

2 Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password... 8 Recover your password... 8 Change your password... 9 Viewing the subscription key...10 Chapter 3: Download and Install Charter Business Desktop Security Workstation Security System requirements...14 Download and Install Charter Business Desktop Security Workstation Security...16 Download Charter Business Desktop Security Software...16 Install Charter Business Desktop Security Software...17 Chapter 4: Upgrade Upgrading to the latest version...25 Chapter 5: Administering the product Checking the system status...27 View reports and infection status...27 Scan for Malware...28 Keeping computers in the network safe...29 Checking the status of a group of devices...30 Checking the status of computers...30 Managing product settings...31 Assigning operations...31 Assigning profiles...32 Manage groups...32 Managing profiles...36 Creating a profile...36 Editing a profile...39 Changing profile name or description...43 Setting a default profile...44 Resetting default profiles...44

3 Managing software updates...46 Installing software updates automatically...46 Installing software updates on selected computers...47 Checking software update status for a specific computer...48 Chapter 6: Troubleshooting Frequently Asked Questions...52 Appendix A Download and Install Charter Business Desktop Security Workstation Security for Mac System requirements...14 Download and Install Charter Business Desktop Security Workstation Security for Mac...15 Download Charter Business Desktop Security Software for Mac...15 Install Charter Business Desktop Security Software...17

4 Chapter 1: Introduction This guide is divided into chapters that give you general information about Charter Business Desktop Security software, its deployment and installation. This guide contains instructions how to install and administer Charter Business Desktop Security Portal and Charter Business Desktop Security software.

5 Chapter 2: Getting Started Topics: Creating a new user Recovering your password Viewing your subscription key This chapter explains how to get started with the Charter Business Desktop Security. In this chapter, you will find instructions on how to create a new user, recover your password, and view your subscription key.

6 Creating a new user You are able to create new user accounts for users you wish to allow access to the Charter Business Desktop Security Portal. To create a new user: 1. Click the My company account and users located on the top right of the Portal. 2. The Account details page opens. Click Create user. 3. Complete the form fields and Click Submit. User name: Enter a unique user name. Password: Enter a password. Confirm password: Confirm the password entered. See the Recover and change your password section for instructions on changing a password. Mobile phone number (optional): Enter the user s mobile phone number. Language: Select the user s language. address: Enter the user s address.

7 Receive as: Select how the user wishes to receive , either as plain text or HTML. Read-only (No editing rights): Select yes if you do not want the user to be able to edit, select no if you want the user to be able to edit. Time zone: Select the time zone for the user s location. 4. The User was created page opens, confirming that the user was created successfully. 5. The new user will now appear on your My company account and users > Account details page. You may now provide the user information to the user for them to log into the Charter Business Desktop Security portal.

8 Recovering and changing your password You are able to recover and change your password using the Charter Business Desktop Security Portal. Recover your password If you have forgotten your password, you can recover it through the Forgot your password link. To recover your password: 1. On the log in page of the Charter Business Desktop Security Portal, click the Forgot your password? link. 2. Enter your user name, and click Submit.

9 3. An message is sent to the address that you provided when you created the account. The message contains a link to the Charter Business Desktop Security Portal where you can change your password. Change your password If you would like to change your password you may do so through the My user name link. To change your password: 1. Click the My user name link at the top right of the Portal page. The Edit user / change password page opens. 2. Click Change password. Enter the old password, new password, and confirm the new password. Click Submit.

10 3. You receive confirmation that your password was changed successfully. Viewing the subscription key You are able to view the subscription information for your company account. To view your subscription information: 1. Click the Subscriptions tab. The Subscriptions page opens, displaying your subscription information, such as such as key, usage, active computers, and expiration date.

11

12 Chapter 3: Download and Install Charter Business Desktop Security Workstation Security Topics: System requirements Download and Install Charter Business Desktop Security Workstation Security System requirements and software download and installation instructions for Charter Business Desktop Security Workstation Security. This section describes the system requirements for installing and using the product, and gives you instructions on how to download and install the product.

13 System requirements Read the following before starting to install and use Charter Business Desktop Security Workstation Security. Your computer must meet the following minimum requirements for installing and using the product. For Mac users, see Appendix A. Operating system version: Processor: Memory: Display: Disk space: Internet connection: Microsoft Windows XP (32-bit) service pack 2 or newer: Home, Professional and Media Center editions Microsoft Windows 7 and Vista (32- and 64-bits). All service packs: Starter Home Basic Home Premium Business Ultimate Enterprise Windows 8 32-bit and 64-bit For Microsoft Windows XP: Intel Pentium III 1 GHz or higher Microsoft Windows 7 and Vista: Intel Pentium 4 2 GHz or higher For Microsoft Windows XP: 512 MB For Microsoft Windows 7 and Vista: 1 GB For Microsoft Windows XP: 8-bit (256 colors) For Microsoft Windows 7 and Vista: 16-bit or more (65000 colors) For Microsoft Windows XP: 800MB free HD space For Microsoft Windows 7 and Vista: 800MB free HD space An Internet connection is required in order to validate your subscription and receive updates.

14 Browser: For Microsoft Windows XP: Internet Explorer 5.0 or newer is required. For Microsoft Windows 7 and Vista: Internet Explorer 7.0 or newer is required Supported browsers for using the Charter Business Desktop Security Portal: Internet Explorer 6.x or newer is required. JavaScript and cookies must be enabled in the browser Firefox 2.x or newer is required. JavaScript and cookies must be enabled in the browser Note: To use Profile Editor, you need to have Java Runtime Environment 1.6 or newer installed on your computer.

15 Download and Install Charter Business Desktop Security Workstation Security This section describes how to locally download and install Charter Business Desktop Security Workstation Security. You are able to download and install the Charter Business Desktop Security on a workstation locally from the Charter Business Desktop Security Portal. Download Charter Business Desktop Security Software To download Charter Business Desktop Security on a workstation locally: 1. On the workstation computer, go to the Charter Business Desktop Security Portal URL. 2. The Charter Business Desktop Security Portal login page opens. 3. Enter your Administrator user name and password and click Enter. The Charter Business Desktop Security Portal Home page opens. 4. Click the Download software link located at the top left of the Charter Business Desktop Security Portal.

16 5. The download workstation software page opens. Click either Windows or Mac. 6. Several windows will open: The download window opens. Click Run. The Internet Explorer Security Warning window opens, asking if you want to run the software. Click Run. The User Account Control window opens, asking if you want to allow the following program to make changes to this computer. Click Yes. Install Charter Business Desktop Security Software To install Charter Business Desktop Security on a workstation locally: 1. The Charter Business Desktop Security Setup page opens. Click Next.

17 2. The License Agreement page opens. Read the license agreement and click Accept to accept the license agreement and continue the installation. 3. The Subscription key page opens. Enter your Subscription Key, click Next.

18 Note: You can find your subscription key under the Subscriptions tab in the Charter Business Desktop Security Portal. 4. The Installation Type page opens. Select the installation type you want to install, and click Next. Automatic installation: The product is installed automatically. Existing security products may be automatically replaced. The product is installed to the default directory. Step by step installation: During the installation, you can change the installation directory. However, we recommend using the default directory. 5. The Updating and installing files page opens, stating that the file update and installation is in progress. Click Next. The application will search for conflicts.

19 6. If conflicting software is found, the system will prompt you to either automatically or manually remove it. 7. The Removing conflicting security programs page opens, showing progress of the program removal.

20 8. Depending on the computer s system configuration, the PC may prompt for a reboot. Select to either Restart now (recommended) or Restart later. Click Finish. 9. After the reboot, the splash screen will display again.

21 10. The Completing installation window will display the progress of the install. Installation of updates will proceed until complete. 11. The Installation Complete window will display once all updates have been installed successfully. Click Close. 12. The Charter Business Desktop Security icon is now in the computer s system tray. If clicked, the Charter Business Desktop Security page opens to view status, tasks, and statistics (see Charter Business Desktop Security Workstation Guide for more information). 13. The computer is now associated with the respective subscription and is visible on the Charter Business Desktop Security Portal. Log into the Portal to verify that the computer shows in the Portal Computers page.

22 Note: It may take up to two hours before the connection is established. On the Charter Business Desktop Security Portal main page (Home Tab), you can view the status of all computers and subscriptions associated with the account. If the computer has not yet received the latest updates, you may see either a yellow or a red status icon. For more details on the computer(s), click the Computers tab.

23 Chapter 4: Upgrade Topics: Upgrading to the latest version This chapter explains how to upgrade to the latest version of Charter Business Desktop Security software.

24 Upgrading to the latest version Charter Business Desktop Security products support channel upgrade functionality. All Charter Business Desktop Security products support channel upgrade functionality. This means that when a new version of any Charter Business Desktop Security product is published on the Charter Business Desktop Security Portal, all the computers on which the product is installed receive a notification about the update automatically. You can install the new version after you receive the update notification or postpone it if you do not want to start the installation immediately. Note: In most cases, the installation of a new version of a Charter Business Desktop Security product requires a system restart.

25 Chapter 5: Administering the product Topics: Checking the system status Managing product settings Managing profiles Managing software updates Managing Groups This chapter describes how to administer the product using the Portal. The Portal shows you the security status of the computers in your network and points to any security problems that you should fix. You can change the product setup locally through the program installed on a computer, or remotely using the Charter Business Desktop Security Portal.

26 Checking the system status Follow the instructions in this chapter to solve any issues that you may need to fix. The Portal shows you the security status of the devices in your network and points to any security problems that you should fix. View reports and infection status On the Home tab on the Portal you can view the overall protection status of your network. The pie chart shows the proportions of the network computers that are protected, or that have either minor or critical problems. Note: The Portal only shows security information about the devices that are registered to the Portal. If you have devices that are not registered to the Portal, they may be a security risk. The list on the right shows network information by each security component. If you only see green icons, all devices are protected. You can also see the overall number of the accounts and devices in your network. Viewing reports In addition to the overall protection status that is displayed on the Home page, you can view other systemwide information by clicking on the Reports tab. Note: The Reports page may take a moment to load fully while the system gets the most recent data. The Reports page shows six different reports: Overall protection: This chart shows the overall protection status for the last four weeks. Click on a date at the bottom of the chart to display the pie chart for that day. Virus protection: This chart shows the number of viruses blocked by Virus and Spy Protection during the last four weeks, along with the ten most commonly found infections and most commonly affected computers. Internet Shield: This chart shows the number of network services blocked by Internet Shield during the last four weeks, along with the ten most commonly blocked services. Automatic updates: This chart shows the status of virus definitions updates throughout the system during the last four weeks. Viewing infection status You can view a list of all the infections found in your network on the Infections tab. The Infections page lists all of the malware found in your network over the past four weeks.

27 Each entry includes the following information: Date: Date and time when the infection was found. Computer Name: The name of the computer where the infection was found. Click the entry in this column to see an overview of the computer's protection status. Infection Name: The name of the infection found. Click the entry in this column to see a description of the infection. Type: Indicates the type of source for the infection, for example whether it was found in a file or in web traffic. Action: The action that was taken when the infection was found. Infected Object: The path to the infected object. Account Name: The name of account that the infected computer belongs to. Click the entry in this column to see an overview of the account's protection status. User Name: The account of the user who was logged in when the infection was found. You can export the infection information by clicking Export data. You can choose to export the information in either Excel or CSV format. Scan for Malware To scan for malware, do the following: 1. Click on the Computers tab. 2. On the Computers page, select the computers that you wish to scan for malware, and click the Scan for Malware tab.

28 3. Click Assign operation. 4. The page states that you have successfully assigned an operation to the computer. Click Close. Keeping computers in the network safe

29 You keep all the computers in the network safe. To keep the computers in the network safe, do the following: 1. Make sure all your computers are registered to the Portal. 2. Check whether any of the computers that are registered to the Portal have security problems. Some of these problems you can fix directly from the Portal; some of these problems you may have to fix locally. 3. Check which users need a more strict security profile. Checking the status of a group of devices You can check the status of devices that belong to the same group, that have the same subscription key or that share the same problem. Viewing devices that have the same problem You can view all the devices that have the same problem. To view the devices: 1. On the Home tab, click one of the links that show the number of devices with a specific problem. For example, "virus definitions are very old in 3 computers". 2. The Computers page opens, displaying the devices with the respective problem. Viewing computers that belong to the same group You can view all the computers that belong to the same group. To view the computers: 1. Click the Computers tab. The Computers page opens. 2. Click the Central Management tab. 3. On the Central Management page, do one of the following: Click the Group column title to sort the computers by their group name. Enter the name of a group in the Search box at the top right corner of the computer list, and click Search. The number of computers belonging to the group is shown. Click the link to view all the computers in the group. View devices with the same subscription key You can view all devices with the same subscription key. To view devices: 1. Click on the Computers tab. 2. Click the Installed software tab. 3. On the Installed software page, click the Subscription key column title to sort the computers by their subscription key. Checking the status of computers On the Computers tab, you can check the overall protection status of computers.

30 The Computers tab shows you detailed information about the computers that are registered to the Charter Business Desktop Security Portal. By clicking the different tabs, you can view the following: Overall Protection Virus Protection Internet shield Automatic updates Software updates Central management: Computer information Installed software Note: To view additional details related to an individual workstation, click the computer name. Managing product settings This chapter explains how to remotely manage the product settings by assigning operations and profiles using the Charter Business Desktop Security Portal. Assigning operations You can also assign operations to a remote computer from the Portal, for example, enable the firewall or real-time virus scanning on a remote computer. To assign an operation: 1. Select computers from the list by selecting the appropriate checkboxes. 2. Click Operations. A list of operations appears. 3. Select one of the following operations from the list:

31 Select... Send full status update Enable firewall Enable Real-time Scanning Enable Application Control Set Internet Shield security level to Office Scan for missing software updates according to profile in use To... force the remote computer to send a full report of it's status to the Portal. allow safe internet traffic and blocking unsafe traffic. find and block viruses on the remote computer before they can cause harm. let the user decide which applications are allowed to access the Internet on the remote computer. select the most commonly applicable level of protection from unsafe traffic on the remote computer. reduce software vulnerabilities in corporate systems by automatically keeping installed software up-to-date. 4. Click Assign Operation to assign the operation to the remote computer. The operation is applied to the computer the next time the computers checks for updates with the Portal. Assigning profiles You can assign a new profile to a computer, for example, to restrict the users of that computer from making dangerous changes to the security settings. There are default profiles for connecting to the Internet from a fixed location (for example, Office open, Office locked) and from outside office premises (for example, Laptop open, Laptop locked). An open profile allows end users to change security settings; a locked one does not allow changes. To assign a profile: 1. In the Computers list, select the computers to which you want to assign a profile. 2. Click Assign profile. A list of available profiles is shown. 3. From the list, select a profile. 4. Click Assign. 5. The local operation or profile is applied to the computer the next time the computers checks for updates with the Charter Business Desktop Security Portal. The remote computer must be on and connected to the Internet to be able to check for pending local operations or new profiles. Manage groups You are able to view and change the groups to which computers are assigned.

32 View groups To view the group to which computers are assigned: 1. Click the Computers tab. 2. From the Computers page, click the Central Management tab. Change groups To change the group to which computers are assigned: 1. Click the Computers tab to view the list of computers. The Computers page opens to the Overall protection tab. 2. Select the computers whose group you want to change.

33 3. Select Change group. 4. Enter the group name for the selected computers. Click Change.

34 5. The page confirms the group to which the computer(s) was assigned.

35 Managing profiles You can create, edit, or remove profiles using the profile editor. Profiles let you control what users can do with the security settings on a computer. Profiles differ by: Users' computer skills: A profile for novice users may restrict their rights to change their security settings. Computer type: Laptop or desktop computer. A profile for a laptop computer is designed to protect users when they access the Internet from unsafe locations, such as cafes with free Internet access. A profile for a desktop computer is designed to protect access to the Internet from a fixed location. There are predefined profiles that you can apply to computers. If a suitable profile does not exist for users, you can create your own profiles. You can use an existing profile as a basis for a new profile. You can also add your own default profiles. Creating a profile You can create a new profile that can be assigned to remote computers. To create a profile: 1. Click the Profiles tab. 2. Select Launch Profile Editor. The Profile editor page opens.

36 3. Select an existing profile on which to base the new profile. Select a profile that is similar to what you want so you do not have to change many settings. Hover over the profile name to see a description of the profile. 4. Click the Create new profile icon.

37 5. The Profile Properties window opens. Complete the fields and click OK. Profile name: Enter a name for the profile. This name represents the profile on the Computers page. Profile description: Enter a description for the profile. You see the description of a selected profile on the Computers page when you assign a profile. The description should clearly tell all users what the profile does.

38 6. A new profile with the same settings as the base-profile is added to the Profile tree. 7. You can now assign this profile to remote computers on the Computers page. Editing a profile When you edit an existing profile, the changes that you make are enforced on all the computers with that profile. To edit a profile: 1. From the Profiles tab, click Launch Profile Editor. The Profile editor page opens.

39 2. Select an editable profile. Profiles that are created by other users are locked and you cannot edit them. These profiles have a yellow lock icon next to the profile name.

40 3. Click the Edit profile icon. The profile name indicates that it is being edited. 4. In the Settings tab, select one of the groups of settings. 5. Change a setting: Select or clear a setting. If you do not want the user to be able to change the setting on the remote computer, click the lock icon next to the setting or click Disallow user changes. 6. Repeat the previous steps until the profile has the settings you want. 7. Click the Publish profile icon to save and publish the profile changes. 8. You can remove any edits you made and leave the profile with no changes. Click the Edit profile and click the Discard changes icon. 9. The changes you made to the profile settings are applied to all the computers with this profile when they next check with the Portal for updates. Deleting a profile You can remove a profile from the list of available profiles. To delete a profile: 1. Select an editable profile from the profile tree. You cannot delete profiles that were created by other users. These profiles are locked and have a yellow lock icon next to the profile name.

41 2. Click the Delete selected profile icon 3. A window will pop up to confirm that you want to delete the selected profile. Click Yes. 4. All sub-profiles are also deleted. The selected profile and all its sub-profiles are deleted and no information about the profile is available in the Portal. The deleted profile is not deleted from the actual workstation.

42 Changing profile name or description You can rename a profile and edit the description if, for example, the settings of the profile no longer agree with the name and description. To rename a profile: 1. On the Profiles tab, click Launch Profile Editor. 2. Select an editable profile from the profile tree on the left. You cannot edit profiles that are created by other users. These profiles are locked and have a yellow lock icon next to the profile name. 3. Click the edit profile icon. 4. Click the profile properties icon. 5. Edit the profile name and description and click OK. You can enter the description in multiple languages.

43 6. You can remove any edits you made and leave the profile with no changes. Click the Edit profile and click the Discard changes icon. Setting a default profile You can set your own default profiles for remote computers. These profiles are applied to new computers that you add to the system. If you do not set any default profiles, the system default profiles are applied to computers. To set a default profile: 1. From the Profiles tab, select a profile that you want to set as the default profile. 2. Click Set default profiles. 3. Click Update. 4. In the Default profiles column, you can view the profiles that you selected as the default profiles. They are applied to new computers that you add to the system. Resetting default profiles If you have set your own default profiles for remote computers, but you want to restore the system default profiles, reset the default profiles. To reset the default profiles: 1. On the Profiles tab, click Reset default profiles. 2. Click Reset default profiles.

44 Your own default profiles are cleared from the Default profiles column, and the system default profiles are shown instead. The system default profiles are applied to new computers that you add to the system.

45 Managing software updates Through the Charter Business Desktop Security Portal, you can manage and install software updates for the computers in your network. It is important to have the latest software updates installed on the workstations in your network, because many updates fix security vulnerabilities in installed products. In the Portal, software updates that are categorized as critical or important security updates affect the overall protection status. In addition, computers that are missing critical security updates are highlighted on the Home tab. You can configure your profiles to automatically install critical and important security updates to computers. You can also check the status of software updates both for individual computers on the computer details page from the Computers tab and on the Software updates tab, where you can also install missing software updates manually. Installing software updates automatically You can configure profiles to automatically install security-related software updates to computers in your networks. By default, automatic installation of software updates is turned off. To turn on automatic installation of software updates: 1. Click the Profiles tab. 2. From the Profiles page, click Launch Profile Editor. 3. On the Profile editor page, select the profile that you want to edit. 4. Click Software updater from the list of settings in the Settings section on the right. 5. Select Enable Software Updater and set the schedule and update categories to be automatically installed.

46 6. Click the Publish changes icon to save and publish the profile changes. Installing software updates on selected computers You can also install updates on selected computers. 1. From the Computers tab, select the computers for which you want to install updates. 2. Select Software updater at the top of the Computers tab. 3. Select the updates you want to install and click Install. 4. The Software updater page confirms that you have successfully assigned an operation. 5. Click Close.

47 Checking software update status for a specific computer You can check the status of software updates for an individual computer from the Computers tab. To check the software update status for a specific computer: 1. Click the Computers tab. 2. On Computers page, select the computer for which you want to view software update status. 3. Click the Software updates tab. You can also view the status of software updates for an individual computer. 1. From the Computers tab, click on the computer for which you want to view software updates. The Detailed computer information page opens. 2. On the Detailed computer information page you can view details for software updates for the specific computer. Checking the status of software updates in your network On the Software updates tab, you can check the status of software updates in your network. The Software updates page provides a list of updates for the software in use within your network. Each entry on the list includes the category, software, bulletin ID, update name, and CVE ID. From this page, you can check which computers are missing selected updates, and also install the missing updates to those computers. Note: Software updates are checked and installed according to the policies in use.

48 Viewing computers that are missing software updates You can check which computers have not installed the software updates that you select on the Software updates page. To check which computers are missing software updates: 1. Click the Software updates tab. 2. On the Software updates page, select the software updates that you want to check. 3. Click View affected computers. 4. Click View computers. 5. The Affected computers dialog opens, showing a list of the computers that are missing the selected software updates. Installing missing software updates You can install missing software updates to either all affected computers or only selected computers. If you want to test software updates on a pilot group in your network, or to troubleshoot specific updates, you should install updates to a selected group of computers. Otherwise, you can install the missing software updates to all computers. To install the missing software updates: 1. On the Software updates page, select the updates that you want to install. 2. Click Install. To install the selected updates to all affected computers: 1. On the Install missing updates tab, click Install. 2. The missing updates are installed to all the affected computers.

49 To install the selected updates to specific computers: 1. On the Install missing updates tab, click Select computers. 2. The Affected computers dialog opens, listing the computers that are missing the selected software updates. 3. Select the computers where you want to install the missing software updates, then click Install. 4. The missing updates are installed to the selected computers.

50 Chapter 6: Troubleshooting Topics: Frequently asked questions This chapter answers the most frequently asked questions. If you do not find answers to your questions in this manual, please contact support.

51 Frequently Asked Questions Answers to the most frequently asked questions. Q. How can I change the language in my Charter Business Desktop Security Portal? A. To change the language, first log in to the Charter Business Desktop Security Portal, click your user name at the top right corner. In the Edit account page, from the Language drop-down list, select the language that you want, and click Submit. Q. I installed the Charter Business Desktop Security software on a computer, but I cannot see the computer in the Charter Business Desktop Security Portal. What should I do? A. If you do not see a computer in the Charter Business Desktop Security Portal, click the Check now button on your Charter Business Desktop Security Workstation Security main interface. If you still do not see your computer in the Portal, check that the subscription key has been added to the Portal. Q. When do I need to create my own security profile? A. You need to create a new security profile if none of the Charter Business Desktop Security predefined profiles matches the needs of your end customers. For example, if you have a program on your computer that slows down too much because of real time scanning operations, you need to create a profile in which that program is excluded from scanning. Or if a network software such as a VPN client cannot connect to the Internet with the default firewall rules, you must create a new security profile with specific firewall rules for the software. Q. Can I get reports out from the Charter Business Desktop Security Portal? A. You can export information about your network computers on the Export data tab (under the Computers tab). On the Reports tab, you can currently only view information about your network computers, such as overall protection status and status by each security component.

52 Appendix A Download and Install Charter Business Desktop Security Workstation Security for Mac Topics: System requirements Download and Install Charter Business Desktop Security Workstation Security System requirements and software download and installation instructions for Charter Business Desktop Security Workstation Security. This section describes the system requirements for installing and using the product, and gives you instructions on how to download and install the product.

53 System requirements Read the following before starting to install and use Charter Business Desktop Security Workstation Security. Your computer must meet the following minimum requirements for installing and using the product. Operating system version: Macintosh OS X Mavericks 10.9 Processor: Intel Processor Memory: 1 GB or more Display: N/a Disk space: 250 MB of free disk space Internet connection: An Internet connection is required in order to validate your subscription and receive updates.

54 Download and Install Charter Business Desktop Security Workstation Security for Mac This section describes how to locally download and install Charter Business Desktop Security Workstation Security for Mac. You are able to download and install the Charter Business Desktop Security on a workstation locally from the Charter Business Desktop Security Portal. Download Charter Business Desktop Security Software for Mac To download Charter Business Desktop Security for Mac on a workstation locally: 1. On the workstation computer, go to the Charter Business Desktop Security Portal URL. 2. The Charter Business Desktop Security Portal login page opens. 3. Enter your Administrator user name and password and click Enter. The Charter Business Desktop Security Portal Home page opens.

55 4. Click the Download software link located at the top left of the Charter Business Desktop Security Portal. 5. The download workstation software page opens. Click Mac. 6. Select Save File and Okay to save the download file to the computer.

56 Install Charter Business Desktop Security Software To install Charter Business Desktop Security on a Mac workstation locally: 7. Locate the installation file on the computer. Double-click to initiate the install. 8. The Welcome window opens. Select Continue.

57 9. The Software License Agreement page opens. Read the License Terms and click Continue. 10. Read the Software License Agreement. To accept the Software License Agreement, click Agree.

58 11. Click Install to perform a standard installation of the software. 12. Select Manage Subscription to enter the subscription key.

59 13. Enter the Subscription Key and click Set. 14. The installation window indicates that the installation was completed successfully. Click Close.

60 15. The Main Charter Business Desktop Security window indicates that your computer is protected.

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

Q1. Does PC Security work with other antivirus or firewall software installed on my computer?

Q1. Does PC Security work with other antivirus or firewall software installed on my computer? Faqs > PC security Before Installation Q1. Does PC Security work with other antivirus or firewall software installed on my computer? Ans.: No. You cannot have two antivirus solutions from different vendors

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

FAQ. Safe Anywhere PC. Disclaimer:

FAQ. Safe Anywhere PC. Disclaimer: FAQ Safe Anywhere PC Version: 1.0 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

McAfee Enterprise Edition v 7.1.0 Installation & Configuration For Windows NT, 2000, and XP

McAfee Enterprise Edition v 7.1.0 Installation & Configuration For Windows NT, 2000, and XP McAfee Enterprise Edition v 7.1.0 Installation & Configuration For Windows NT, 2000, and XP McAfee Enterprise Edition v 7.1.0: Installation & Configuration 1 McAfee Enterprise Edition v 7.1.0: Installation

More information

MySabre with Sabre VPN

MySabre with Sabre VPN MySabre with Sabre VPN MIGRATION / INSTALLATION GUIDE T a b l e o f C o n t e n t s Table of Contents... ii Introduction... 3 Before Installing... 3 New MySabre User Installation... 4 Appendix A ActiveX

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

Seagate Dashboard User Guide

Seagate Dashboard User Guide Seagate Dashboard User Guide Seagate Dashboard User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

FAQ. F-Secure Online Backup

FAQ. F-Secure Online Backup F-Secure Online Backup Before installation... 3 Does the F Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs better

More information

Installation Manual (MSI Version)

Installation Manual (MSI Version) Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Verizon Security Scan Powered by McAfee. Installation Guide for Home Users

Verizon Security Scan Powered by McAfee. Installation Guide for Home Users Verizon Security Scan Powered by McAfee Installation Guide for Home Users ii Contents Introduction 3 System requirements 5 Installing Security Scan 7 Downloading your software... 7 Download your software...

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Quick Start Using DASYLab with your Measurement Computing USB device

Quick Start Using DASYLab with your Measurement Computing USB device Quick Start Using DASYLab with your Measurement Computing USB device Thank you for purchasing a USB data acquisition device from Measurement Computing Corporation (MCC). This Quick Start document contains

More information

Microsoft Windows Installation and Troubleshooting Guide

Microsoft Windows Installation and Troubleshooting Guide Remote Access Services Microsoft Windows - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MICROSOFT WINDOWS XP INSTALLATION PROCEDURES... 3 2 MICROSOFT

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

SAFETICA INSIGHT INSTALLATION MANUAL

SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Policy Bulletin

LOS ANGELES UNIFIED SCHOOL DISTRICT Policy Bulletin Policy Bulletin TITLE: NUMBER: ENTERPRISE LICENSE SYMANTEC ANTI- VIRUS SOFTWARE BUL-717.1 ROUTING All Employees All Locations ISSUER: Margaret A. Klee Chief Information Officer DATE: POLICY: MAJOR CHANGES:

More information

Scholastic Reading Inventory Installation Guide

Scholastic Reading Inventory Installation Guide Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Section 1.0 Getting Started with the Vālant EMR. Contents

Section 1.0 Getting Started with the Vālant EMR. Contents Section 1.0 Getting Started with the Vālant EMR Contents Getting Started with the Valant EMR application:... 2 Hardware Requirements for the Vālant EMR:... 3 Software Requirements for the Vālant EMR:...

More information

Mercy s Remote Access Instructions

Mercy s Remote Access Instructions Mercy s Remote Access Instructions ~~~~~~~~~~~~~~ Section A Windows 2000 / XP ~~~~~~~~~~~~~~ I. Install Meditech............................... A1 II. Install VPN Client............................. A3

More information

Table of Contents. 1. Overview... 3. 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3. 2. Installation Instructions..

Table of Contents. 1. Overview... 3. 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3. 2. Installation Instructions.. Table of Contents 1. Overview..... 3 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3 2. Installation Instructions.. 4 2.1 Installing the On Call Diabetes Management Software. 4 2.2

More information

What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting

What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting Version 1.6 1 1 1 2 2 8 8 9 9 9 What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting your Installation Managing

More information

owncloud Configuration and Usage Guide

owncloud Configuration and Usage Guide owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS INSTALLATION INSTRUCTIONS Table of Contents A. Installing Symantec Anti-Virus 8.1 For Windows (32-Bit) From CD B. Installing Norton Anti-Virus 7.61 For Windows 95 From CD C. Installing Norton Anti-Virus

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System

More information

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM

More information

Installation and Setup Guide

Installation and Setup Guide Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

PC Requirements and Technical Help. Q1. How do I clear the browser s cache?

PC Requirements and Technical Help. Q1. How do I clear the browser s cache? Q1. How do I clear the browser s cache? A1. Clear your browser's cache, and close all other applications that are running in your PC to free up memory space. For instructions on clearing cache (temporary

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

This guide provides all of the information necessary to connect to MoFo resources from outside of the office

This guide provides all of the information necessary to connect to MoFo resources from outside of the office REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your

More information

SMART Sync 2011. Windows operating systems. System administrator s guide

SMART Sync 2011. Windows operating systems. System administrator s guide SMART Sync 2011 Windows operating systems System administrator s guide Trademark notice SMART Sync, smarttech and the SMART logo are trademarks or registered trademarks of SMART Technologies ULC in the

More information

Imaging Computing Server User Guide

Imaging Computing Server User Guide Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Managed Security Web Portal USER GUIDE

Managed Security Web Portal USER GUIDE Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1

More information

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4 Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

Pre-Requisites: PC and Browser Configuration Guide v1.3

Pre-Requisites: PC and Browser Configuration Guide v1.3 CLIENT FOR CONTRACTORS (C4C) SERVICE REFERENCE GUIDE Pre-Requisites: PC and Browser Configuration Guide v1.3 Introduction Client For Contractors (C4C) is a new service developed by Shell to make contractors

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

8x8 Click2Pop User Guide

8x8 Click2Pop User Guide USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft

More information

User Guide for Mac OS X

User Guide for Mac OS X User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

7.x Upgrade Instructions. 2015 Software Pursuits, Inc.

7.x Upgrade Instructions. 2015 Software Pursuits, Inc. 7.x Upgrade Instructions 2015 Table of Contents INTRODUCTION...2 SYSTEM REQUIREMENTS FOR SURESYNC 7...2 CONSIDERATIONS BEFORE UPGRADING...3 TERMINOLOGY CHANGES... 4 Relation Renamed to Job... 4 SPIAgent

More information

PCLaw 11.0. Administration Guide

PCLaw 11.0. Administration Guide PCLaw 11.0 Administration Guide About this guide This guide provides a list of tasks for installing PCLaw Practice Management Software. If you need additional information, refer to the PCLaw Support Center.

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

FAQ. F-Secure Online Backup 2.1

FAQ. F-Secure Online Backup 2.1 FAQ F-Secure Online Backup 2.1 Before installation... 4 Does the F-Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs

More information

McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me

McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me McAfee Enterprise Edition v 7.1.0: Installation & Configuration 1 McAfee Enterprise Edition v 4.5.1: Installation &

More information

Remote Drive PC Client software User Guide

Remote Drive PC Client software User Guide Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB

MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB Last Updated: February 18, 2012. Med Access Support Alberta Netcare Portal Support Alberta Health Services

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

DOCSVAULT Document Management System for everyone

DOCSVAULT Document Management System for everyone Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

This tutorial provides detailed instructions to help you download and configure Internet Explorer 6.0 for use with Web Commerce application.

This tutorial provides detailed instructions to help you download and configure Internet Explorer 6.0 for use with Web Commerce application. IE 6.0 Download and Set-up To use the Web Commerce e-commerce service, you need to: Gain access to the Internet Install Microsoft Internet Explorer 6.0 Configure Temporary Internet files in Internet Explorer.

More information

Endpoint Protection Administrator Guide

Endpoint Protection Administrator Guide Endpoint Protection Administrator Guide Copyright Endpoint Protection Administrator Guide June, 2013 2012-2013 Webroot, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS The following instructions are required for installation of Best Access System s Keystone 600N5 (KS600N) network key control software for the server side. Please see the system requirements on the Keystone

More information

Juniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista

Juniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista Juniper NetScreen IPSec Dial Client Installation Guide for Windows 2000 Windows XP Windows Vista Revision 2.0 NetScreen is a registered trademark of Juniper, Inc. Windows is a registered trademark of Microsoft

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Protection Service for Business

Protection Service for Business Protection Service for Business Getting Started Guide for Mac Computers System requirements System requirements Supported platforms For all supported OS X versions. Workstation (Mac) Processor: Memory:

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Orange Apps UserLogonUSB V1.0

Orange Apps UserLogonUSB V1.0 Orange Apps UserLogonUSB V1.0 KUKA KRC4 User Documentation As of 07/08/2013 Document version: 1.0 2 Introduction Copyright 2013 OrangeApps GmbH Arnikaweg 1 87471 Durach Germany www.orangeapps.de This documentation

More information

Avigilon Control Center Server User Guide

Avigilon Control Center Server User Guide Avigilon Control Center Server User Guide Version 4.10 PDF-SERVER-D-Rev1 Copyright 2011 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,

More information

SMART Classroom Suite 2011

SMART Classroom Suite 2011 SMART Classroom Suite 2011 Windows operating systems System administrator s guide Trademark notice SMART Board, SMART Classroom Suite, SMART Notebook, SMART Response, SMART Sync, SMART Document Camera,

More information

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide Stellar Phoenix SQL Database Repair 6.0 Installation Guide Overview Stellar Phoenix SQL Database Repair software is an easy to use application designed to repair corrupt or damaged Microsoft SQL Server

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

ARCHER & GREINER. Citrix Client Install Instructions - For ALL Citrix Users. BigHand Client Install Instructions - For BigHand Users Only

ARCHER & GREINER. Citrix Client Install Instructions - For ALL Citrix Users. BigHand Client Install Instructions - For BigHand Users Only ARCHER & GREINER Citrix Client Install Instructions - For ALL Citrix Users BigHand Client Install Instructions - For BigHand Users Only Table of Contents Citrix Client Install Instructions - For ALL Citrix

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Connecting Remotely via the Citrix Access Gateway (CAG)

Connecting Remotely via the Citrix Access Gateway (CAG) 2011 Connecting Remotely via the Citrix Access Gateway (CAG) Version 2.0 *** The CAG is intended for users with OE equipment only. Users with GFE must still use RESCUE as their VPN solution. *** All VISN

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information