BITDEFENDER SECURITY FOR MSP. Mihai Cristian POPESCU Technical Training and Documentation Coordinator
|
|
- Isabella Lee
- 7 years ago
- Views:
Transcription
1 BITDEFENDER SECURITY FOR MSP Mihai Cristian POPESCU Technical Training and Documentation Coordinator
2 MAIN TOPICS 1. Cloud Security for MSP 2. ConnectWise Integration 3. Bitdefender Endpoint Security plugin for Kaseya
3
4 WHAT IS CLOUD SECURITY FOR MSP? CLOUD SECURITY FOR MSP
5 1. Cloud Security for MSP 1.1 Overview 1.2 Architecture 1.3 System requirements 1.4 Login mechanism & Accounts types 1.5 Installation 1.6 Configuration 1.7 Summary
6 CLOUD SECURITY FOR MSP OVERVIEW
7 OVERVIEW CLOUD SECURITY FOR MSP Bitdefender Cloud Security for MSP protects systems using security technology that has been rated first time and time again. security service hosted on Bitdefender s public cloud centralized Software-as-a-Service multiple deployment model does not require on-site hardware Control Center: Web-based management interface Bitdefender Endpoint Security Tools (BEST)
8 CLOUD SECURITY FOR MSP COMPONENTS ARCHITECTURE
9 1.2 Architecture Control Center Security for Endpoints
10 CONTROL CENTER CLOUD SECURITY FOR MSP WEB CONSOLE Bitdefender security solutions are managed from a single point of management, Control Center web console, which provides easier management and access to overall security posture, global security threats, and control over all security modules protecting virtual or physical desktops and servers.
11 SECURITY FOR ENDPOINTS BITDEFENDER ENDPOINT SECURITY TOOLS (BEST)
12 SECURITY FOR ENDPOINTS BITDEFENDER ENDPOINT SECURITY TOOLS (BEST) Protects any number of Windows, Linux and Mac OS X systems. Includes the following modules: Antimalware with Active Virus Control Firewall* Content Control* (web access control, application control, data protection) Device Control* Power User *not available on Mac and Windows Server OSes
13 SECURITY FOR ENDPOINTS BEST SCANNING ENGINES The scanning engines are automatically set during Bitdefender Endpoint Security Tools packages creation, letting the endpoint agent detect the machine's configuration and adapt the scanning technology accordingly: Local Scan Hybrid Scan
14 SECURITY FOR ENDPOINTS BEST SCANNING ENGINES Bitdefender Security Cloud Local Scan Hybrid Scan
15 SECURITY FOR ENDPOINTS BEST WITH RELAY ROLE Special role of Bitdefender Endpoint Security Tools which installs an Update Server on the target machine along with BEST client. Provides the following additional functionalities: Communication Proxy for the BEST clients installed in a remote office BEST installation package for remote deployments Network Discovery Local Update Server
16 SECURITY FOR ENDPOINTS BEST WITH RELAY ROLE Headquarter Remote Office Endpoint Security Relay Remote Office / Home Office Users Provides extra features for local network: Update Server Communication Proxy Network Discovery
17 CLOUD SECURITY FOR MSP SYSTEM REQUIREMENTS
18 1.3 System Requirements Control Center Security for Endpoints
19 CONTROL CENTER WEB CONSOLE Internet Explorer 9+, Mozilla Firefox 14+, Google Chrome 15+, Safari 5+ Recommended screen resolution: 1024x768 or higher
20 ENDPOINT PROTECTION PHYSICAL AND VIRTUAL ENDPOINTS Windows Operating Systems: Workstation OSes Server OSes Tablet & Embedded OSes* Windows 8.1 Windows Server 2012 R2 Windows Embedded 8.1 Industry Windows 8 Windows Server 2012 Windows Embedded 8 Standard Windows 7 Windows SBS 2011 Windows Embedded Standard 7 Windows Vista SP1 Windows SBS 2008 Windows Embedded Compact 7 Windows XP SP3 Windows Server 2008, 2008 R2 Windows Embedded POSReady 7 Windows XP SP2 64 bit Windows SBS 2003 Windows Embedded Enterprise 7 Windows Server 2003 R2 Windows Embedded POSReady 2009 Windows Server 2003 SP1 Windows Embedded Standard 2009 Windows Home Server Windows XP Embedded SP2 Windows XP Tablet PC Edition
21 ENDPOINT PROTECTION PHYSICAL AND VIRTUAL ENDPOINTS Mac and Linux Operating Systems: Mac OSes Mac OS X Yosemite (10.10.x) Mac OS X Mavericks (10.9.x) Mac OS X Mountain Lion (10.8.x) Mac OS X Lion (10.7.x) Linux OSes Red Hat Enterprise Linux / CentOS 5.6 or higher Ubuntu LTS or higher SUSE Linux Enterprise Server 11 or higher OpenSUSE 11 or higher Fedora 15 or higher Debian 5.0 or higher Oracle Solaris 11, 10 (only in VMware vshield environments)
22 ENDPOINT PROTECTION PHYSICAL AND VIRTUAL ENDPOINTS On Linux systems, on-access scanning support is provided in the following situations: Kernel Version Linux Distribution On-access scanning support or higher All supported The fanotify kernel option must be enabled Debian 5.0, 6.0 Ubuntu LTS CentOS 6.x Red Hat Enterprise Linux 6.x Bitdefender provides support via DazukoFS with prebuilt kernel modules. Fanotify and DazukoFS enable third-party applications to control file access on Linux systems. For any other distribution or kernel version you need to manually compile the DazukoFS module.
23 ENDPOINT PROTECTION SUPPORTED BROWSERS Endpoint browser security is compatible with the following browsers: Internet Explorer 8+ Mozilla Firefox 8+ Google Chrome 15+ Safari 4+
24 ENDPOINT PROTECTION HARDWARE REQUIREMENTS Intel Pentium compatible processor: Workstation Operating Systems 1 GHz or faster for Microsoft Windows XP SP3, Windows XP SP2 64 bit and Windows 7 Enterprise (32 and 64 bit) 2 GHz or faster for Microsoft Windows Vista SP1 or higher (32 and 64 bit), Microsoft Windows 7 (32 and 64 bit), Microsoft Windows 7 SP1 (32 and 64bit), Windows MHZ or faster for tablet & embedded OSes Server Operating Systems Minimum: 2.4 GHz single-core CPU Recommended: 1.86 GHz or faster Intel Xeon multi-core CPU
25 ENDPOINT PROTECTION HARDWARE REQUIREMENTS Free RAM Memory: Free HDD Space: OS Local Scanning AV Only Full Options Hybrid Scanning AV Only Full Options Windows Linux Mac n/a n/a OS Local Scanning AV Only Full Options Hybrid Scanning AV Only Full Options Windows Linux Mac n/a n/a At least 6 GB free disk space is required for entities with Bitdefender Endpoint Security Tools Relay role, as they will store all updates and installation packages locally.
26 ENDPOINT PROTECTION NETWORK COMMUNICATION Port 80(HTTP)/443(HTTPS) HTTP(s) 80 / 443 Usage Port used to access the Control Center web console Bitdefender Cloud Antispam Detection Service 80 Update Server port 8443 (HTTPS) Port used by client/agent software to connect to the Communication Server 7074 (HTTP) Communication with Endpoint Security Relay (if available) 53 (UDP) Port used for Realtime IP Blocklist (RBLs)
27 CLOUD SECURITY FOR MSP LOGIN MECHANISM & ACCOUNTS TYPES
28 1.4 Login mechanism & Accounts types Control Center Companies Types Account & User Types Create Companies Accounts Monthly Subscription Create User Accounts
29 LOGIN MECHANISM CONTROL CENTER Control Center a central web interface used for installing, configuring, monitoring, and reporting on the security status of datacenters and end-user systems, scaling to any number of endpoints and defending them anywhere.
30 LOGIN MECHANISM CONTROL CENTER Control Center access - User Accounts are created by Bitdefender personnel or by other Control Center users accounts with Manage Users rights Credentials and login information are sent automatically to the address of the created user once the account has been created
31 COMPANIES TYPES Bitdefender partners will be in charge of creating and managing Control Center accounts for their partner and customer companies they provide services to. Partner Companies accounts Intended for companies that sell the security solution to other companies (service providers, distributors or resellers of the service) Customer Companies accounts Intended for companies that use the security solution to protect their computer networks. Such companies can install, configure, manage and monitor their protection.
32 ACCOUNTS & USER TYPES Different types of user accounts are connected in a hierarchical structure under each company. Each account has visibility over its child accounts. User accounts have to be linked to their companies to allow the employees of companies under a specific account to access the security solution. Each company account must be linked to at least one user account with corresponding administration rights. User accounts roles: Partner Company administrator Network Administrator Reporter Custom
33 ACCOUNTS & USER TYPES Account Role Allowed Child Accounts User Rights Partner Manage Companies Company Administrators Manage Users PARTNER Manage Company Network Administrators Manage Networks Reporters Manage Reports Company Administrators Manage Users COMPANY ADMINISTRATOR Network Administrators Manage Company Manage Networks Reporters Manage Reports NETWORK ADMINISTRATOR Network Administrators Manage Users Manage Networks Reporters Manage Reports REPORTER - Manage Reports
34 ACCOUNTS & USER TYPES User Rights Manage Companies Manage Users Manage Company Manage Networks Manage Reports Actions create subordinate partner company accounts create customer company accounts. edit, suspend or delete companies under their account manage the license keys create, edit or delete user accounts edit the company s profile settings manage their own license key provides administrative privileges over the network security settings: network inventory policies & tasks installation packages Quarantine create, edit and delete reports
35 CREATE COMPANIES ACCOUNTS Create COMPANY accounts 1. Access the Control Center 2. Go to Companies 3. Click Add 4. Add the Company name and fill in the other details requested 5. Under Company Settings select the company type (Partner or Customer) 6. Select the license type (Trial, Licensed or Monthly subscription) 7. When selecting Licensed you can enter an yearly key or enable Monthly subscription. Under Monthly subscription, partners can limit the number of seats by entering a specific number in the Reserve seats field.
36 MONTHLY SUBSCRIPTION RESERVE SEATS Reserved: 300 Used: 200 MSP 3 MSP 1 License Key Reserved 1000 Used : 200 MSP 2 No reservation Used: 300 can use up to 400 seats (MSP1) 200 (MSP2) = 400 MSP 4 Reserved: 200 Used: 200 Distributor License Key - Reserved 900
37 CREATE USER ACCOUNTS Create USER accounts 1. Access the Control Center 2. Go to Accounts 3. Click Add 4. Provide the user and full name 5. Select the company to which the new user account belongs 6. Under Settings and Privileges select the account role and configure the rights
38 CLOUD SECURITY FOR MSP INSTALLATION
39 1.5 Installation Endpoint Security Tools - Overview Preparing for installation Create installation package Local installation Remote installation Managed systems
40 ENDPOINT SECURITY TOOLS - OVERVIEW THE CLIENT SOFTWARE Bitdefender Endpoint Security Tools manages protection on the local endpoint. Notification filters View installed protection modules Start on-demand scan tasks
41 ENDPOINT SECURITY TOOLS POWER USER MODE Power User Mode will only be available if it has been installed as a module at deployment time or added to existing installations with a Reconfigure Client task. Power User is protected with a password and can only be enabled if the password has been specified through a policy assigned from the console. Switch to Power User mode
42 ENDPOINT SECURITY TOOLS POWER USER MODE Closing the Power User interface will disable the Power User mode. To re-enter the mode you will need to specify the Power User password again. Power User mode
43 PREPARING FOR INSTALLATION Computers should meet the minimum system requirements Uninstall any security software from the computers. The installation requires administrative privileges and Internet access. Endpoints must have connectivity to Control Center. NOTE: The first machine on which you install protection must have Relay role, otherwise you will not be able to deploy Bitdefender Endpoint Security Tools on other Endpoints in the network. The Bitdefender Endpoint Security Tools Relay machine must be powered-on and online in order for the clients to communicate with Control Center.
44 ENDPOINT SECURITY TOOLS CREATE INSTALLATION PACKAGE Create under Network Packages custom installation packages that can be used for remote deployments or manual installations. Settings that can be configured when creating custom installation packages: Modules: Antimalware, Active Virus Control, Firewall, Content Control, Device Control, Power User Roles: Relay Scan mode: Automatic or Custom (local or hybrid scan) Settings: scan before installation, custom installation path, uninstall password Deployer: specify the package communication settings (Cloud or Relay)
45 ENDPOINT SECURITY TOOLS CREATE INSTALLATION PACKAGE You can create multiple custom installation packages, that cover the different protection needs of your endpoints and save them all under the Packages Window. Network Packages New Endpoint Package Window
46 ENDPOINT SECURITY TOOLS LOCAL INSTALLATION Download the installation package from the Control Center web console and run it locally. The installation package must be run using administrator privileges or under an administrator account once Endpoint Security Tools has been installed, the computer will show up as managed in Control Center (Network page) within a few minutes Package Download
47 ENDPOINT SECURITY TOOLS REMOTE INSTALLATION Endpoint Security Tools can be installed remotely on other computers detected in the network after the first Relay has been installed. Endpoint Security Tools uses Microsoft Computer Browser Service to detect computers (automatically for Relay role, using Tasks for normal endpoints) to enable network discovery you must have Endpoint Security Tools installed on at least one network computer detected computers are displayed as unmanaged computers on the Network page More information about how network discovery works and its requirements, is available under the following KB article:
48 ENDPOINT SECURITY TOOLS REMOTE INSTALLATION Select unmanaged computers under the Network page and assign them Installation Tasks. The installation task allows you to: Run the deployment immediately or scheduled Provide administrative credentials Select Deployer (Relay) Select installation package Customize installation package Install client task
49 ENDPOINT SECURITY TOOLS MANAGED SYSTEMS Once Endpoint Security Tools has been installed, the computer will show up as managed in Control Center, Network page Computers and Groups, within a few minutes: Managed computer, no issues Managed computer, with issues Managed computer, Relay Network Managed Computers
50 CONTROL CENTER WEB CONSOLE CONFIGURATION
51 1.6. Configuration Dashboard Network Section Policies Reports Quarantine Accounts Notifications User Account Options
52 DASHBOARD MONITOR SECURITY STATUS The console dashboard provides you with an overview of the security status of your systems. Allows you to quickly identify any issues that might require your attention. Fully customizable users can select the target computer groups for portlets and the information to be displayed.
53 NETWORK SECTION Install protection, apply policies to manage security settings, run tasks remotely and create quick reports: Tasks Reports Policy assignment Control Center Network Computers and Groups
54 NETWORK SECTION TASKS Administrative tasks can be run remotely on network objects. View and manage tasks on the Tasks page: Click to view execution progress Control Center Tasks
55 NETWORK SECTION PACKAGES Lists the default and custom installation packages for Endpoint Security Tools. Allows you to create custom installation packages according to your security requirements. Add custom installation package Download installation package List of default and custom installation packages Control Center Packages
56 POLICIES Create and manage security policies. to assign security policies to clients or groups of clients, go to the Network page select the Assign Policy button to open the Policy Assignment window After installation, network inventory objects are assigned the default policy, which is preconfigured with the recommended protection settings. You cannot modify or delete the default policy. You can only use it as a template for creating new policies.
57 POLICIES Allows you to configure the Endpoint Security Tools settings: General settings like display settings, update settings and uninstall password Antivirus settings (real-time protection and on-demand scan settings) Firewall settings Content Control settings Device Control settings Relay settings Policies New Policy Template
58 POLICIES Policy Section General Settings Antimalware Firewall Settings Pop-up notifications, status alerts Uninstall password, Power User password, Proxy Configuration Endpoint communication assignment Update settings On-access scan settings, Active Virus Control settings On-demand scan settings, Device scanning Quarantine settings, Exclusions Block Port Scans, ICS, IDS Networks, Adapters Firewall Rules
59 POLICIES Policy Section Content Control Relay Settings Traffic Scan Settings Web access control Applications control Data protection Communication between Relays and Cloud Services Update Settings
60 REPORTS CHECK NETWORK SECURITY STATUS Reports will be generated based on the information stored in the product database. Several different types of reports are available. Can be generated on-demand or scheduled to be generated later or at specific time intervals. scheduled reports can be sent by to the administrator Custom reporting period available. Can be sent by to the administrator or exported as a *.pdf (Report Summary) / *.csv (Report Details).
61 QUARANTINE Allows you to remotely manage quarantined files Centralized management of quarantined files: Security for Endpoints: quarantined files stored locally on each managed computer files can be deleted or restored to original or custom path
62 ACCOUNTS USER ACTIVITY Logs operations and actions. Define a search using available filters to display recorded events you are interested in. Filters Log Details Control Center User Activity
63 NOTIFICATIONS Control Center displays notifications in the Notifications Area to inform you about the security status of your environment Click here to display Notification Settings Control Center - Notifications
64 NOTIFICATIONS SETTINGS Configure global notifications recipients, enable notifications and select individual recipients for each notification type. Global notifications recipients Available notification types recipients of the selected notification Notifications Settings
65 USER ACCOUNT OPTIONS By pointing to the username in the upper-right corner of the console, you will be able to access the options below: My Account: Allows you to manage your account details and preferences My Company: Allows you to manage your company details and license key Integrations integrations with third party solutions, such as Remote Monitoring and Management (RMM) platforms Credentials Manager: Manage the authentication credentials required for integration with the virtualized environments and for remote installation tasks Logout: Log out of your account User Account Options
66 CLOUD SECURITY FOR MSP SUMMARY
67 CLOUD SECURITY FOR MSP UNFOLLOW THE TRADITIONAL
68
69 INTEGRATING CONNECTWISE WITH BITDEFENDER CONNECTWISE INTEGRATION
70 2. ConnectWise Integration 2.1 Overview 2.2 Integration prerequisites 2.3 Setting up ConnectWise 2.4 Managing the ConnectWise integration within Bitdefender Control Center 2.5 Ticketing setup 2.6 Billing setup 2.7 Summary
71 CONNECTWISE INTEGRATION OVERVIEW
72 OVERVIEW CONNECTWISE INTEGRATION The ConnectWise integration module allows the following actions: Connecting Bitdefender Control Center to a ConnectWise account Setting up the ticketing service for different types of events Malware Outbreak Blocked URLs Outdated clients Setting up the billing service Importing ConnectWise companies to Bitdefender Control Center SMB SMB SMB MSP
73 INTEGRATION PREREQUISITES
74 INTEGRATION PREREQUISITES To connect your Bitdefender Control Center account to ConnectWise, you must meet the following requirements: Bitdefender Control Center partner account. Monthly Usage license key issued by Bitdefender. ConnectWise User Account. ConnectWise Integrator Account ConnectWise companies must be successfully imported to Bitdefender Control Center.
75 SETTING UP CONNECTWISE
76 2.3 Setting up ConnectWise Create an Integrator Account Define the ConnectWise Billing Settings
77 CREATE AN INTEGRATOR ACCOUNT 1. Go to System > Setup Tables. 2. Search for Integrator Login in the Table column. 3. Click Integrator Login. 4. Click the New Item icon to create a new entry. 5. Enter the username and password for the integrator account. 6. For the Access Level, select All records. 7. Enable the following APIs: Service Ticket API. Managed Services API. Company API. 8. Click the Save and Close icon.
78 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE A MANAGEMENT IT SOLUTION 1. Go to System > Setup Tables. 2. Search for Management IT in the Table column. 3. Click Management IT. 4. Click the New Item icon to create a new management solution. 5. Enter the solution name. 6. Select the Custom type. 7. For the custom solution name, enter the same solution name. 8. Click the Save and Close icon.
79 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE AN AGREEMENT TYPE 1. Go to System > Setup Tables. 2. Search for Agreement Type in the Table column. 3. Click Agreement Type. 4. Click the New Item icon to create a new agreement type. 5. Fill in the Description field. For simplicity reasons, you can use the same name as for the Management Solution. 6. Optionally, you can configure the rest of the agreement type options as you want. 7. Click the Save and Close icon.
80 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE CROSS-REFERENCES FOR THE MANAGEMENT SOLUTION 1. Go to System > Setup Tables. 2. Search for Managed Devices in the Table column. 3. Click Managed Devices Integration. 4. Click the previously created management solution
81 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE CROSS-REFERENCES FOR THE MANAGEMENT SOLUTION 5. In the Cross-References tab, click the New Item icon to create across-reference.
82 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE CROSS-REFERENCES FOR THE MANAGEMENT SOLUTION 6. Fill in the following mandatory fields: Type and Level Agreement Type Product If no product has been defined, proceed as follows: a. Click the Search icon next to the Product field. b. Click the New Item icon to create a new product. c. Define the following mandatory settings: Product ID Description Unit Price Customer Description d. Click the Save and Close icon. 7. Click the Save and Close icon.
83 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE AGREEMENTS FOR EACH COMPANY 1. Go to Finance > Agreements. 2. Click the New Item icon to create a new agreement. 3. Make the following mandatory settings: Select the agreement type you have previously created. Enter the agreement's name. Select the target company. Choose or define a contact within the selected company. Define the agreement's ending date. 4. Click the Save and Close icon.
84 MANAGING THE CONNECTWISE INTEGRATION WITHIN BITDEFENDER
85 CONFIGURE THE CONNECTWISE INTEGRATION 1. Log on to Bitdefender Control Center using your partner credentials. 2. Point to your username in the upper-right corner of the console and choose Integrations. 3. Click the Add button. 4. Click the Add ConnectWise Integration link. 5. Type in the ConnectWise server details. 6. Define the services you want to use with the ConnectWise platform. 7. Click Save and wait until Bitdefender Control Center connects to ConnectWise with the provided credentials.
86 CONFIGURE THE CONNECTWISE INTEGRATION 8. Import to Bitdefender Control Center the list of companies that you want as follows: a. Select the companies that you want to import. b. Choose the Licensing type for imported companies. 9. Click Import.
87 TICKETING SETUP
88 TICKETING SETUP For the ticketing service to work, the following conditions must be fulfilled: 1. The Service Ticket API has been enabled in your ConnectWise Integrator Account. 2. At least one ticket type has been enabled and configured as required in the ConnectWise integration wizard. 3. Endpoint Security (the client security software) has been installed on your managed companies endpoints.
89 TICKETING SETUP To view tickets in ConnectWise: 1. Go to Service Desk > Service Ticket Search. 2. In the Company column, search for the company you are interested in.
90 BILLING SETUP
91 BILLING SETUP For the billing service to work, the following conditions must be fulfilled: 1. The Managed Services API has been enabled in your ConnectWise Integrator Account. 2. A pricing model has been defined in ConnectWise for each managed company. 3. The billing service has been enabled and configured as required in the ConnectWise integration wizard. 4. Managed companies are licensed with a monthly subscription.
92 BILLING SETUP To view the usage records of a company in ConnectWise: 1. Go to Companies > Companies and search for the company you are interested in. 2. Click the company's name. 3. Go to the Agreements tab. 4. Click the previously created Agreement Type. 5. Go to the Additions tab.
93 CONNECTWISE INTEGRATION SUMMARY
94 CONNECTWISE INTEGRATION The integration module with ConnectWise, available within Bitdefender Control Center, enables MSPs to automatically create tickets and billing procedures for their customer companies, based on delivered Bitdefender security services. SMB SMB SMB MSP
95
96 INTEGRATING CONNECTWISE WITH BITDEFENDER BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA
97 3. Bitdefender Endpoint Security plugin for Kaseya 3.1 Overview 3.2 System Requirements 3.3 Installation 3.4 Dashboard 3.5 Licensing 3.6 Policies 3.8 Quarantine 3.9 Audit Logs 3.10 Alerts 3.11 Settings 3.12 Uninstalling 3.13 Summary 3.7 Endpoints
98 BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA OVERVIEW
99 OVERVIEW BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA MSP 3 Using Kaseya Allocated 300 Used: 200 MSP Using Kaseya License Key 1 Reserved 1000 Used : 200 MSP 2 Using Kaseya Allocated 400 Used: 300 MSP 4 Using Kaseya Allocated 200 Used: 200 License Key 2 - max 400 License Key 3 max 300 Distributor License Key 4 max 200
100 OVERVIEW BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA The plugin utilizes a number of Kaseya technologies: Agent Procedures, to retrieve data from the agents and send commands Alerts, including alarms, tickets, and the notification bar LAN Cache, to reduce network traffic and server load during agent installation Machine Filter Bar, that maintains consistent filtering settings between the plugin and other Kaseya modules
101 SYSTEM REQUIREMENTS
102 SYSTEM REQUIREMENTS KASEYA SERVER REQUIREMENTS Kaseya 7.0 or later On-premise Kaseya installation Microsoft.NET Framework 4 (Full) Microsoft Internet Information Server (IIS) 7.0 or later Windows 2008 or later SQL Server 2008 or later 8 GB RAM
103 SYSTEM REQUIREMENTS SUPPORTED BROWSERS & ENDPOINTS REQUIREMENTS Internet Explorer 8+ Mozilla Firefox 8+ Google Chrome 15+ Safari 4+ Kaseya agent Microsoft.NET Framework 4 (Full) Windows XP Service Pack 3 and later 1 GB RAM
104 INSTALLATION
105 INSTALLATION PLUGIN INSTALLATION 1. Copy the Installer on to the Kaseya server. 2. Double-click to run the installer. 3. Follow the prompts by clicking Next. 4. The last step of the installer has a check box that will start the Kaseya Reapply Schema process after the Finish button is pressed. Note: the plugin will not be available in Kaseya until Reapply Schema has run at least once.
106 INSTALLATION BITDEFENDER AGENT INSTALLATION Pre-installation notes The 32 and 64 bit agent installers are not included in the plugin installation package. The latest versions of the installers are downloaded to the Kaseya server after the plugin is installed. These agent installers will be automatically updated as new versions are released. Deployed agents will automatically update themselves. Before installing the agent on an endpoint, it is highly recommended that any existing antimalware software is completely removed. Many of the security programs that are incompatible with Bitdefender Endpoint Security are automatically detected and removed at installation time.
107 INSTALLATION BITDEFENDER AGENT INSTALLATION Bulk Deployment Steps: 1. In Kaseya, open the Agent Procedures module. 2. On the Schedule / Create page, select the Bitdefender Install procedure from the System \ Bitdefender Kaseya Module folder. 3. Under the Schedule tab, select the machines you want to deploy the Bitdefender agent to. Keep in mind you can use machine filters to select large numbers of endpoints. 4. Click the Schedule Agent Procedure button. 5. On the Schedule Agent Procedure tab, select a Recurrence of "Once" and choose a distribution window based on the number of selected endpoints. 6. On the Script Prompt tab, enter "0" for the Task Id prompt. 7. Click Submit to schedule the installation agent procedures.
108 DASHBOARD
109 DASHBOARD
110 LICENSING
111 LICENSING Dashboard Components: A. Kaseya Navigation Panel B. Machine Filter Bar modifies the scope of data displayed in the charts C. License Page Toggle D. Organization Grid Toggle Function E. Organization Grid
112 LICENSING ORGANIZATIONS TAB The Organizations tab displays all organizations with license data (key, type, status, expiration, usage and number of licenses still available). From this pane, you can assign new licenses or revoke current licenses by simply clicking the box next to the organization name and then either assign license or revoke license. There are four possible outcomes after adding a license key: Success Expired Deactivated Unknown/Cracked The types of licenses available are: End User Monthly
113 LICENSING ENDPOINTS TAB The Endpoints tab in the License page gives you control over licensing on a per-endpoint level. In this view, you can exclude endpoints from using a license, as well as see the status and availability of licenses on each endpoint. Licensed Endpoints Table: Column Machine Group IP Address Status License Description Name of the Kaseya endpoint Machine group for the endpoint IP address of the machine Status of the agent Status of the license in relation to the endpoint: is it already licensed, are there available slots in the license that could be used, is there a license assigned to the organization
114 POLICIES
115 POLICIES The settings and behavior of the Bitdefender Endpoint Security agent are controlled through policies. Each machine can have one policy assigned to it at a time and will inherit the nearest policy from the machine group or organization it is in. A default policy is always included with the plugin and will be used if no other policy is assigned to an endpoint.
116 POLICIES DEPLOY POLICIES To start deploying new policies to your endpoints, click on the Deploy button to open the deploy dialog. This dialog lets you assign policies to organizations, machines groups, and endpoints. The assignment of policies obeys the following inheritance model: Organization > Machine Group > Endpoint Each endpoint determines what policy should be applied to itself by starting with itself and looking up the inheritance tree to find the closest assigned policy.
117 POLICIES POLICY SETTINGS General General settings help you manage user interface display options, communication options, update preferences, password protection and other settings of Endpoint Security. Anti-Malware The Antimalware module protects the system against all kinds of malware threats (viruses, Trojans, spyware, rootkits, adware and so on). The protection is divided in two categories: On-access scanning: prevents new malware threats from entering the system. On-demand scanning: allows detecting and removing malware already residing in the system.
118 ENDPOINTS
119 ENDPOINTS The Endpoints page is the home of a number of key functions and information panels. It is here that Bitdefender can be installed or uninstalled, scans can be triggered, scan and task logs can be viewed and agent specific audit logs can be found as well.
120 QUARANTINE
121 QUARANTINE The Quarantine page shows information about all the quarantined files that are stored locally, on each endpoint. From here you can either restore files or delete them.
122 AUDIT LOGS
123 AUDIT LOGS The audit log is a global list of all actions taken within the plugin, as well as a log of any errors or other information that would be relevant to an end-user
124 ALERTS
125 ALERTS Alerts provide a mechanism for receiving notifications when certain events happen within the plugin. These notifications can be sent through four different Kaseya methods: alarms, tickets, s and the notification bar.
126 ALERTS ALERT METHODS Alert methods: Alarm Ticket Notification Bar Events: Agent Out-of-Date Application Blocked License Expired License Limit Almost Reached License Limit Exceeded Malware Cleaned Malware Outbreak Monthly License Usage Scan Results
127 SETTINGS
128 SETTINGS The Settings pane displays the Endpoint Refresh Interval, License Usage Daily Report Time, License Limit Alert Threshold, Agent Out-of-Date Threshold and Malware Outbreak Threshold currently set in the module.
129 UNINSTALL
130 UNINSTALL UNINSTALLING THE BITDEFENDER AGENT There are two approaches you can take to uninstalling the Bitdefender Endpoint Security agent from an endpoint. If the endpoint is visible inside of the plugin in Kaseya, you can use the plugin s Uninstall function to start the uninstall process. Otherwise, or if the remote uninstall fails, you can log into the endpoint and manually uninstall the agent.
131 UNINSTALL POST-UNINSTALL CLEAN UP To remove the plugin from Kaseya, follow these steps: 1. Log into the Kaseya server. 2. Open the Add / Remove Programs window. 3. Select the Bitdefender Kaseya Plugin entry. 4. Click the Uninstall button. 5. Follow the prompts to remove the plugin. To completely remove all traces of the plugin from the Kaseya database, follow these steps: 1. Log into the Kaseya server. 2. Find the following SQL file: C:\Kaseya\DBInstall\Bitdefender\script\bitdef.CleanUp.sql 3. Connect to the Kaseya database through SQL Management Studio The Kaseya database is called ksubscribers 4. Execute the bitdef.cleanup.sql file through SQL Management Studio
132 BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA SUMMARY
133 SUMMARY BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA MSP 3 Using Kaseya Allocated 300 Used: 200 MSP Using Kaseya License Key 1 Reserved 1000 Used : 200 MSP 2 Using Kaseya Allocated 400 Used: 300 MSP 4 Using Kaseya Allocated 200 Used: 200 License Key 2 - max 400 License Key 3 max 300 Distributor License Key 4 max 200
134
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright
More informationBITDEFENDER ENDPOINT SECURITY TOOLS
BITDEFENDER ENDPOINT SECURITY TOOLS Beta Version Testing Guide Bitdefender Endpoint Security Tools Beta Version Testing Guide Publication date 2014.11.26 Copyright 2014 Bitdefender Legal Notice All rights
More informationGravityZone INSTALLATION GUIDE
GravityZone INSTALLATION GUIDE Bitdefender GravityZone Installation Guide Publication date 2015.10.28 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced
More informationBITDEFENDER GRAVITYZONE
BITDEFENDER GRAVITYZONE Quick Start Guide Bitdefender GravityZone Quick Start Guide Publication date 2013.11.07 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be
More informationBITDEFENDER GRAVITYZONE
BITDEFENDER GRAVITYZONE Quick Start Guide Bitdefender GravityZone Quick Start Guide Publication date 2014.11.18 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be
More informationGravityZone INSTALLATION GUIDE
GravityZone INSTALLATION GUIDE Bitdefender GravityZone Installation Guide Publication date 2015.10.01 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced
More informationGRAVITYZONE UNIFIED SECURITY MANAGEMENT
GRAVITYZONE UNIFIED SECURITY MANAGEMENT Quick Start Guide GravityZone Unified Security Management Quick Start Guide Publication date 2013.02.22 Copyright 2013 Bitdefender Legal Notice All rights reserved.
More informationBITDEFENDER GRAVITYZONE
BITDEFENDER GRAVITYZONE Administrator's Guide Bitdefender GravityZone Administrator's Guide Publication date 2015.02.25 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book
More informationBITDEFENDER SMALL OFFICE SECURITY
BITDEFENDER SMALL OFFICE SECURITY Quick Start Guide Bitdefender Small Office Security Quick Start Guide Publication date 2014.06.18 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationescan Corporate Edition User Guide
Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationCore Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationBITDEFENDER SECURITY FOR AMAZON WEB SERVICES
BITDEFENDER SECURITY FOR AMAZON WEB SERVICES Beta Version Testing Guide Bitdefender Security for Amazon Web Services Beta Version Testing Guide Publication date 2015.03.04 Copyright 2015 Bitdefender Legal
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationGravityZone PARTNER'S GUIDE
GravityZone PARTNER'S GUIDE Bitdefender GravityZone Partner's Guide Publication date 2015.10.28 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationCTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationRequest Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationRemote Application Server Version 14. Last updated: 25-02-15
Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationEkran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationRemote Application Server Version 14. Last updated: 06-02-15
Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationInstallation Guide. Help Desk Manager. Version v12.1.0
Installation Guide Help Desk Manager Version v12.1.0 Documentation published: March 12, 2014 Contents Introduction to Help Desk Manager 3 Help Desk Manager Key Features 3 Do-It-Yourself Installation and
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationGetting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationTable of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
More informationKaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE
Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your
More informationVeeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
More informationGravityZone INSTALLATION GUIDE
GravityZone INSTALLATION GUIDE Bitdefender GravityZone Installation Guide Publication date 2015.09.25 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationSecureAnywhereTM Business Global Site Manager
SecureAnywhereTM Business Global Site Manager Webroot SecureAnywhere Business MSP... 3 Requirements... 3 Management Console Access Requirements... 3 WSA Agent - System Requirements... 3 Workstations...
More informationKaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More information1. Server 2008 - Microsoft FEP 2010 - Instalation
1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements
More informationWhat is Windows Intune? The Windows Intune Administrator Console. System Overview
What is Windows Intune? Windows Intune helps you manage and secure computers in your environment through a combination of Windows cloud services and upgrade licensing. Windows Intune delivers cloud-based
More informationVEEAM ONE 8 RELEASE NOTES
VEEAM ONE 8 RELEASE NOTES This Release Notes document provides last-minute information about Veeam ONE 8 Update 2, including system requirements, installation instructions as well as relevant information
More informationGFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
More informationKaspersky Security Center Web-Console
Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION
More informationKaspersky Anti-Virus 8.0 for Linux File Server Installation Guide
Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide A P P L I C A T I O N V E R S I O N : 8. 0 M P 2 C F 2 Dear User! Thank you for choosing our product. We hope that this documentation will
More informationKaseya 2. User Guide. Version 1.1
Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More informationQuick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
More informationProduct Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with
More informationComodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
More informationKaspersky Security Center Web-Console
Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION
More informationRunning custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.
About Foglight NMS Foglight NMS is a comprehensive device, application, and traffic monitoring and troubleshooting solution. It is capable of securely monitoring single and multi-site networks of all sizes,
More informationInstalling and Configuring WhatsUp Gold
Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationKaseya 2. User Guide. Version 1.1
Kaseya 2 AntiMalware User Guide Version 1.1 September 30, 2013 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA as updated
More informationAVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
More informationRedtail CRM Integration. Users Guide. 2011 Cities Digital, Inc. All rights reserved. Contents i
Redtail CRM Integration Users Guide 2011 Cities Digital, Inc. All rights reserved. Contents i Contents Redtail Integration with Laserfiche by Cities Digital 1 Overview... 1 Requirements 3 Minimum Server
More information1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationImplementing Endpoint Protection in System Center 2012 R2 Configuration Manager
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes
More informationSophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
More informationMcAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationKaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationVector Asset Management User Manual
Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationJAMF Software Server Installation and Configuration Guide for OS X. Version 9.2
JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
More informationAvaya Video Conferencing Manager Deployment Guide
Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationMicrosoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02
More informationTable of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
More informationComodo One Software Version 1.8
rat Comodo One Software Version 1.8 Patch Management Module Administrator Guide Guide Version 1.8.100915 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationPHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
More informationTivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide
Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product
More informationAudit Management Reference
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationE-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
More informationE-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationSOLARWINDS ORION. Patch Manager Evaluation Guide
SOLARWINDS ORION Patch Manager Evaluation Guide About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse requirements of
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More informationCopyright 2014 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,
Copyright 2014 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole
More informationBitdefender Internet Security 2015 User's Guide
USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationGetting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationJAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
More informationInstallation and Configuration Guide for Windows and Linux
Installation and Configuration Guide for Windows and Linux vcenter Operations Manager 5.7 This document supports the version of each product listed and supports all subsequent versions until the document
More informationHow To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
More informationGetting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
More informationGetting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
More informationQUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10
QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10 About This Guide The intention of this guide is to provide a step through of the initial installation of Kaspersky Security
More informationVERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com
VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET
More informationNetwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
More informationUnitrends Virtual Backup Installation Guide Version 8.0
Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...
More informationinforouter V8.0 Server & Client Requirements
inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended
More informationAd-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...
Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware
More informationivms-5200 Professional Web Manager User Manual
ivms-5200 Professional Web Manager User Manual UD.6L0202D1651A01 Hikvision ivms-5200 Professional Web Manager User Manual This manual, as well as the software described in it, is furnished under license
More information