BITDEFENDER SECURITY FOR MSP. Mihai Cristian POPESCU Technical Training and Documentation Coordinator

Size: px
Start display at page:

Download "BITDEFENDER SECURITY FOR MSP. Mihai Cristian POPESCU Technical Training and Documentation Coordinator"

Transcription

1 BITDEFENDER SECURITY FOR MSP Mihai Cristian POPESCU Technical Training and Documentation Coordinator

2 MAIN TOPICS 1. Cloud Security for MSP 2. ConnectWise Integration 3. Bitdefender Endpoint Security plugin for Kaseya

3

4 WHAT IS CLOUD SECURITY FOR MSP? CLOUD SECURITY FOR MSP

5 1. Cloud Security for MSP 1.1 Overview 1.2 Architecture 1.3 System requirements 1.4 Login mechanism & Accounts types 1.5 Installation 1.6 Configuration 1.7 Summary

6 CLOUD SECURITY FOR MSP OVERVIEW

7 OVERVIEW CLOUD SECURITY FOR MSP Bitdefender Cloud Security for MSP protects systems using security technology that has been rated first time and time again. security service hosted on Bitdefender s public cloud centralized Software-as-a-Service multiple deployment model does not require on-site hardware Control Center: Web-based management interface Bitdefender Endpoint Security Tools (BEST)

8 CLOUD SECURITY FOR MSP COMPONENTS ARCHITECTURE

9 1.2 Architecture Control Center Security for Endpoints

10 CONTROL CENTER CLOUD SECURITY FOR MSP WEB CONSOLE Bitdefender security solutions are managed from a single point of management, Control Center web console, which provides easier management and access to overall security posture, global security threats, and control over all security modules protecting virtual or physical desktops and servers.

11 SECURITY FOR ENDPOINTS BITDEFENDER ENDPOINT SECURITY TOOLS (BEST)

12 SECURITY FOR ENDPOINTS BITDEFENDER ENDPOINT SECURITY TOOLS (BEST) Protects any number of Windows, Linux and Mac OS X systems. Includes the following modules: Antimalware with Active Virus Control Firewall* Content Control* (web access control, application control, data protection) Device Control* Power User *not available on Mac and Windows Server OSes

13 SECURITY FOR ENDPOINTS BEST SCANNING ENGINES The scanning engines are automatically set during Bitdefender Endpoint Security Tools packages creation, letting the endpoint agent detect the machine's configuration and adapt the scanning technology accordingly: Local Scan Hybrid Scan

14 SECURITY FOR ENDPOINTS BEST SCANNING ENGINES Bitdefender Security Cloud Local Scan Hybrid Scan

15 SECURITY FOR ENDPOINTS BEST WITH RELAY ROLE Special role of Bitdefender Endpoint Security Tools which installs an Update Server on the target machine along with BEST client. Provides the following additional functionalities: Communication Proxy for the BEST clients installed in a remote office BEST installation package for remote deployments Network Discovery Local Update Server

16 SECURITY FOR ENDPOINTS BEST WITH RELAY ROLE Headquarter Remote Office Endpoint Security Relay Remote Office / Home Office Users Provides extra features for local network: Update Server Communication Proxy Network Discovery

17 CLOUD SECURITY FOR MSP SYSTEM REQUIREMENTS

18 1.3 System Requirements Control Center Security for Endpoints

19 CONTROL CENTER WEB CONSOLE Internet Explorer 9+, Mozilla Firefox 14+, Google Chrome 15+, Safari 5+ Recommended screen resolution: 1024x768 or higher

20 ENDPOINT PROTECTION PHYSICAL AND VIRTUAL ENDPOINTS Windows Operating Systems: Workstation OSes Server OSes Tablet & Embedded OSes* Windows 8.1 Windows Server 2012 R2 Windows Embedded 8.1 Industry Windows 8 Windows Server 2012 Windows Embedded 8 Standard Windows 7 Windows SBS 2011 Windows Embedded Standard 7 Windows Vista SP1 Windows SBS 2008 Windows Embedded Compact 7 Windows XP SP3 Windows Server 2008, 2008 R2 Windows Embedded POSReady 7 Windows XP SP2 64 bit Windows SBS 2003 Windows Embedded Enterprise 7 Windows Server 2003 R2 Windows Embedded POSReady 2009 Windows Server 2003 SP1 Windows Embedded Standard 2009 Windows Home Server Windows XP Embedded SP2 Windows XP Tablet PC Edition

21 ENDPOINT PROTECTION PHYSICAL AND VIRTUAL ENDPOINTS Mac and Linux Operating Systems: Mac OSes Mac OS X Yosemite (10.10.x) Mac OS X Mavericks (10.9.x) Mac OS X Mountain Lion (10.8.x) Mac OS X Lion (10.7.x) Linux OSes Red Hat Enterprise Linux / CentOS 5.6 or higher Ubuntu LTS or higher SUSE Linux Enterprise Server 11 or higher OpenSUSE 11 or higher Fedora 15 or higher Debian 5.0 or higher Oracle Solaris 11, 10 (only in VMware vshield environments)

22 ENDPOINT PROTECTION PHYSICAL AND VIRTUAL ENDPOINTS On Linux systems, on-access scanning support is provided in the following situations: Kernel Version Linux Distribution On-access scanning support or higher All supported The fanotify kernel option must be enabled Debian 5.0, 6.0 Ubuntu LTS CentOS 6.x Red Hat Enterprise Linux 6.x Bitdefender provides support via DazukoFS with prebuilt kernel modules. Fanotify and DazukoFS enable third-party applications to control file access on Linux systems. For any other distribution or kernel version you need to manually compile the DazukoFS module.

23 ENDPOINT PROTECTION SUPPORTED BROWSERS Endpoint browser security is compatible with the following browsers: Internet Explorer 8+ Mozilla Firefox 8+ Google Chrome 15+ Safari 4+

24 ENDPOINT PROTECTION HARDWARE REQUIREMENTS Intel Pentium compatible processor: Workstation Operating Systems 1 GHz or faster for Microsoft Windows XP SP3, Windows XP SP2 64 bit and Windows 7 Enterprise (32 and 64 bit) 2 GHz or faster for Microsoft Windows Vista SP1 or higher (32 and 64 bit), Microsoft Windows 7 (32 and 64 bit), Microsoft Windows 7 SP1 (32 and 64bit), Windows MHZ or faster for tablet & embedded OSes Server Operating Systems Minimum: 2.4 GHz single-core CPU Recommended: 1.86 GHz or faster Intel Xeon multi-core CPU

25 ENDPOINT PROTECTION HARDWARE REQUIREMENTS Free RAM Memory: Free HDD Space: OS Local Scanning AV Only Full Options Hybrid Scanning AV Only Full Options Windows Linux Mac n/a n/a OS Local Scanning AV Only Full Options Hybrid Scanning AV Only Full Options Windows Linux Mac n/a n/a At least 6 GB free disk space is required for entities with Bitdefender Endpoint Security Tools Relay role, as they will store all updates and installation packages locally.

26 ENDPOINT PROTECTION NETWORK COMMUNICATION Port 80(HTTP)/443(HTTPS) HTTP(s) 80 / 443 Usage Port used to access the Control Center web console Bitdefender Cloud Antispam Detection Service 80 Update Server port 8443 (HTTPS) Port used by client/agent software to connect to the Communication Server 7074 (HTTP) Communication with Endpoint Security Relay (if available) 53 (UDP) Port used for Realtime IP Blocklist (RBLs)

27 CLOUD SECURITY FOR MSP LOGIN MECHANISM & ACCOUNTS TYPES

28 1.4 Login mechanism & Accounts types Control Center Companies Types Account & User Types Create Companies Accounts Monthly Subscription Create User Accounts

29 LOGIN MECHANISM CONTROL CENTER Control Center a central web interface used for installing, configuring, monitoring, and reporting on the security status of datacenters and end-user systems, scaling to any number of endpoints and defending them anywhere.

30 LOGIN MECHANISM CONTROL CENTER Control Center access - User Accounts are created by Bitdefender personnel or by other Control Center users accounts with Manage Users rights Credentials and login information are sent automatically to the address of the created user once the account has been created

31 COMPANIES TYPES Bitdefender partners will be in charge of creating and managing Control Center accounts for their partner and customer companies they provide services to. Partner Companies accounts Intended for companies that sell the security solution to other companies (service providers, distributors or resellers of the service) Customer Companies accounts Intended for companies that use the security solution to protect their computer networks. Such companies can install, configure, manage and monitor their protection.

32 ACCOUNTS & USER TYPES Different types of user accounts are connected in a hierarchical structure under each company. Each account has visibility over its child accounts. User accounts have to be linked to their companies to allow the employees of companies under a specific account to access the security solution. Each company account must be linked to at least one user account with corresponding administration rights. User accounts roles: Partner Company administrator Network Administrator Reporter Custom

33 ACCOUNTS & USER TYPES Account Role Allowed Child Accounts User Rights Partner Manage Companies Company Administrators Manage Users PARTNER Manage Company Network Administrators Manage Networks Reporters Manage Reports Company Administrators Manage Users COMPANY ADMINISTRATOR Network Administrators Manage Company Manage Networks Reporters Manage Reports NETWORK ADMINISTRATOR Network Administrators Manage Users Manage Networks Reporters Manage Reports REPORTER - Manage Reports

34 ACCOUNTS & USER TYPES User Rights Manage Companies Manage Users Manage Company Manage Networks Manage Reports Actions create subordinate partner company accounts create customer company accounts. edit, suspend or delete companies under their account manage the license keys create, edit or delete user accounts edit the company s profile settings manage their own license key provides administrative privileges over the network security settings: network inventory policies & tasks installation packages Quarantine create, edit and delete reports

35 CREATE COMPANIES ACCOUNTS Create COMPANY accounts 1. Access the Control Center 2. Go to Companies 3. Click Add 4. Add the Company name and fill in the other details requested 5. Under Company Settings select the company type (Partner or Customer) 6. Select the license type (Trial, Licensed or Monthly subscription) 7. When selecting Licensed you can enter an yearly key or enable Monthly subscription. Under Monthly subscription, partners can limit the number of seats by entering a specific number in the Reserve seats field.

36 MONTHLY SUBSCRIPTION RESERVE SEATS Reserved: 300 Used: 200 MSP 3 MSP 1 License Key Reserved 1000 Used : 200 MSP 2 No reservation Used: 300 can use up to 400 seats (MSP1) 200 (MSP2) = 400 MSP 4 Reserved: 200 Used: 200 Distributor License Key - Reserved 900

37 CREATE USER ACCOUNTS Create USER accounts 1. Access the Control Center 2. Go to Accounts 3. Click Add 4. Provide the user and full name 5. Select the company to which the new user account belongs 6. Under Settings and Privileges select the account role and configure the rights

38 CLOUD SECURITY FOR MSP INSTALLATION

39 1.5 Installation Endpoint Security Tools - Overview Preparing for installation Create installation package Local installation Remote installation Managed systems

40 ENDPOINT SECURITY TOOLS - OVERVIEW THE CLIENT SOFTWARE Bitdefender Endpoint Security Tools manages protection on the local endpoint. Notification filters View installed protection modules Start on-demand scan tasks

41 ENDPOINT SECURITY TOOLS POWER USER MODE Power User Mode will only be available if it has been installed as a module at deployment time or added to existing installations with a Reconfigure Client task. Power User is protected with a password and can only be enabled if the password has been specified through a policy assigned from the console. Switch to Power User mode

42 ENDPOINT SECURITY TOOLS POWER USER MODE Closing the Power User interface will disable the Power User mode. To re-enter the mode you will need to specify the Power User password again. Power User mode

43 PREPARING FOR INSTALLATION Computers should meet the minimum system requirements Uninstall any security software from the computers. The installation requires administrative privileges and Internet access. Endpoints must have connectivity to Control Center. NOTE: The first machine on which you install protection must have Relay role, otherwise you will not be able to deploy Bitdefender Endpoint Security Tools on other Endpoints in the network. The Bitdefender Endpoint Security Tools Relay machine must be powered-on and online in order for the clients to communicate with Control Center.

44 ENDPOINT SECURITY TOOLS CREATE INSTALLATION PACKAGE Create under Network Packages custom installation packages that can be used for remote deployments or manual installations. Settings that can be configured when creating custom installation packages: Modules: Antimalware, Active Virus Control, Firewall, Content Control, Device Control, Power User Roles: Relay Scan mode: Automatic or Custom (local or hybrid scan) Settings: scan before installation, custom installation path, uninstall password Deployer: specify the package communication settings (Cloud or Relay)

45 ENDPOINT SECURITY TOOLS CREATE INSTALLATION PACKAGE You can create multiple custom installation packages, that cover the different protection needs of your endpoints and save them all under the Packages Window. Network Packages New Endpoint Package Window

46 ENDPOINT SECURITY TOOLS LOCAL INSTALLATION Download the installation package from the Control Center web console and run it locally. The installation package must be run using administrator privileges or under an administrator account once Endpoint Security Tools has been installed, the computer will show up as managed in Control Center (Network page) within a few minutes Package Download

47 ENDPOINT SECURITY TOOLS REMOTE INSTALLATION Endpoint Security Tools can be installed remotely on other computers detected in the network after the first Relay has been installed. Endpoint Security Tools uses Microsoft Computer Browser Service to detect computers (automatically for Relay role, using Tasks for normal endpoints) to enable network discovery you must have Endpoint Security Tools installed on at least one network computer detected computers are displayed as unmanaged computers on the Network page More information about how network discovery works and its requirements, is available under the following KB article:

48 ENDPOINT SECURITY TOOLS REMOTE INSTALLATION Select unmanaged computers under the Network page and assign them Installation Tasks. The installation task allows you to: Run the deployment immediately or scheduled Provide administrative credentials Select Deployer (Relay) Select installation package Customize installation package Install client task

49 ENDPOINT SECURITY TOOLS MANAGED SYSTEMS Once Endpoint Security Tools has been installed, the computer will show up as managed in Control Center, Network page Computers and Groups, within a few minutes: Managed computer, no issues Managed computer, with issues Managed computer, Relay Network Managed Computers

50 CONTROL CENTER WEB CONSOLE CONFIGURATION

51 1.6. Configuration Dashboard Network Section Policies Reports Quarantine Accounts Notifications User Account Options

52 DASHBOARD MONITOR SECURITY STATUS The console dashboard provides you with an overview of the security status of your systems. Allows you to quickly identify any issues that might require your attention. Fully customizable users can select the target computer groups for portlets and the information to be displayed.

53 NETWORK SECTION Install protection, apply policies to manage security settings, run tasks remotely and create quick reports: Tasks Reports Policy assignment Control Center Network Computers and Groups

54 NETWORK SECTION TASKS Administrative tasks can be run remotely on network objects. View and manage tasks on the Tasks page: Click to view execution progress Control Center Tasks

55 NETWORK SECTION PACKAGES Lists the default and custom installation packages for Endpoint Security Tools. Allows you to create custom installation packages according to your security requirements. Add custom installation package Download installation package List of default and custom installation packages Control Center Packages

56 POLICIES Create and manage security policies. to assign security policies to clients or groups of clients, go to the Network page select the Assign Policy button to open the Policy Assignment window After installation, network inventory objects are assigned the default policy, which is preconfigured with the recommended protection settings. You cannot modify or delete the default policy. You can only use it as a template for creating new policies.

57 POLICIES Allows you to configure the Endpoint Security Tools settings: General settings like display settings, update settings and uninstall password Antivirus settings (real-time protection and on-demand scan settings) Firewall settings Content Control settings Device Control settings Relay settings Policies New Policy Template

58 POLICIES Policy Section General Settings Antimalware Firewall Settings Pop-up notifications, status alerts Uninstall password, Power User password, Proxy Configuration Endpoint communication assignment Update settings On-access scan settings, Active Virus Control settings On-demand scan settings, Device scanning Quarantine settings, Exclusions Block Port Scans, ICS, IDS Networks, Adapters Firewall Rules

59 POLICIES Policy Section Content Control Relay Settings Traffic Scan Settings Web access control Applications control Data protection Communication between Relays and Cloud Services Update Settings

60 REPORTS CHECK NETWORK SECURITY STATUS Reports will be generated based on the information stored in the product database. Several different types of reports are available. Can be generated on-demand or scheduled to be generated later or at specific time intervals. scheduled reports can be sent by to the administrator Custom reporting period available. Can be sent by to the administrator or exported as a *.pdf (Report Summary) / *.csv (Report Details).

61 QUARANTINE Allows you to remotely manage quarantined files Centralized management of quarantined files: Security for Endpoints: quarantined files stored locally on each managed computer files can be deleted or restored to original or custom path

62 ACCOUNTS USER ACTIVITY Logs operations and actions. Define a search using available filters to display recorded events you are interested in. Filters Log Details Control Center User Activity

63 NOTIFICATIONS Control Center displays notifications in the Notifications Area to inform you about the security status of your environment Click here to display Notification Settings Control Center - Notifications

64 NOTIFICATIONS SETTINGS Configure global notifications recipients, enable notifications and select individual recipients for each notification type. Global notifications recipients Available notification types recipients of the selected notification Notifications Settings

65 USER ACCOUNT OPTIONS By pointing to the username in the upper-right corner of the console, you will be able to access the options below: My Account: Allows you to manage your account details and preferences My Company: Allows you to manage your company details and license key Integrations integrations with third party solutions, such as Remote Monitoring and Management (RMM) platforms Credentials Manager: Manage the authentication credentials required for integration with the virtualized environments and for remote installation tasks Logout: Log out of your account User Account Options

66 CLOUD SECURITY FOR MSP SUMMARY

67 CLOUD SECURITY FOR MSP UNFOLLOW THE TRADITIONAL

68

69 INTEGRATING CONNECTWISE WITH BITDEFENDER CONNECTWISE INTEGRATION

70 2. ConnectWise Integration 2.1 Overview 2.2 Integration prerequisites 2.3 Setting up ConnectWise 2.4 Managing the ConnectWise integration within Bitdefender Control Center 2.5 Ticketing setup 2.6 Billing setup 2.7 Summary

71 CONNECTWISE INTEGRATION OVERVIEW

72 OVERVIEW CONNECTWISE INTEGRATION The ConnectWise integration module allows the following actions: Connecting Bitdefender Control Center to a ConnectWise account Setting up the ticketing service for different types of events Malware Outbreak Blocked URLs Outdated clients Setting up the billing service Importing ConnectWise companies to Bitdefender Control Center SMB SMB SMB MSP

73 INTEGRATION PREREQUISITES

74 INTEGRATION PREREQUISITES To connect your Bitdefender Control Center account to ConnectWise, you must meet the following requirements: Bitdefender Control Center partner account. Monthly Usage license key issued by Bitdefender. ConnectWise User Account. ConnectWise Integrator Account ConnectWise companies must be successfully imported to Bitdefender Control Center.

75 SETTING UP CONNECTWISE

76 2.3 Setting up ConnectWise Create an Integrator Account Define the ConnectWise Billing Settings

77 CREATE AN INTEGRATOR ACCOUNT 1. Go to System > Setup Tables. 2. Search for Integrator Login in the Table column. 3. Click Integrator Login. 4. Click the New Item icon to create a new entry. 5. Enter the username and password for the integrator account. 6. For the Access Level, select All records. 7. Enable the following APIs: Service Ticket API. Managed Services API. Company API. 8. Click the Save and Close icon.

78 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE A MANAGEMENT IT SOLUTION 1. Go to System > Setup Tables. 2. Search for Management IT in the Table column. 3. Click Management IT. 4. Click the New Item icon to create a new management solution. 5. Enter the solution name. 6. Select the Custom type. 7. For the custom solution name, enter the same solution name. 8. Click the Save and Close icon.

79 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE AN AGREEMENT TYPE 1. Go to System > Setup Tables. 2. Search for Agreement Type in the Table column. 3. Click Agreement Type. 4. Click the New Item icon to create a new agreement type. 5. Fill in the Description field. For simplicity reasons, you can use the same name as for the Management Solution. 6. Optionally, you can configure the rest of the agreement type options as you want. 7. Click the Save and Close icon.

80 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE CROSS-REFERENCES FOR THE MANAGEMENT SOLUTION 1. Go to System > Setup Tables. 2. Search for Managed Devices in the Table column. 3. Click Managed Devices Integration. 4. Click the previously created management solution

81 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE CROSS-REFERENCES FOR THE MANAGEMENT SOLUTION 5. In the Cross-References tab, click the New Item icon to create across-reference.

82 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE CROSS-REFERENCES FOR THE MANAGEMENT SOLUTION 6. Fill in the following mandatory fields: Type and Level Agreement Type Product If no product has been defined, proceed as follows: a. Click the Search icon next to the Product field. b. Click the New Item icon to create a new product. c. Define the following mandatory settings: Product ID Description Unit Price Customer Description d. Click the Save and Close icon. 7. Click the Save and Close icon.

83 DEFINE THE CONNECTWISE BILLING SETTINGS CREATE AGREEMENTS FOR EACH COMPANY 1. Go to Finance > Agreements. 2. Click the New Item icon to create a new agreement. 3. Make the following mandatory settings: Select the agreement type you have previously created. Enter the agreement's name. Select the target company. Choose or define a contact within the selected company. Define the agreement's ending date. 4. Click the Save and Close icon.

84 MANAGING THE CONNECTWISE INTEGRATION WITHIN BITDEFENDER

85 CONFIGURE THE CONNECTWISE INTEGRATION 1. Log on to Bitdefender Control Center using your partner credentials. 2. Point to your username in the upper-right corner of the console and choose Integrations. 3. Click the Add button. 4. Click the Add ConnectWise Integration link. 5. Type in the ConnectWise server details. 6. Define the services you want to use with the ConnectWise platform. 7. Click Save and wait until Bitdefender Control Center connects to ConnectWise with the provided credentials.

86 CONFIGURE THE CONNECTWISE INTEGRATION 8. Import to Bitdefender Control Center the list of companies that you want as follows: a. Select the companies that you want to import. b. Choose the Licensing type for imported companies. 9. Click Import.

87 TICKETING SETUP

88 TICKETING SETUP For the ticketing service to work, the following conditions must be fulfilled: 1. The Service Ticket API has been enabled in your ConnectWise Integrator Account. 2. At least one ticket type has been enabled and configured as required in the ConnectWise integration wizard. 3. Endpoint Security (the client security software) has been installed on your managed companies endpoints.

89 TICKETING SETUP To view tickets in ConnectWise: 1. Go to Service Desk > Service Ticket Search. 2. In the Company column, search for the company you are interested in.

90 BILLING SETUP

91 BILLING SETUP For the billing service to work, the following conditions must be fulfilled: 1. The Managed Services API has been enabled in your ConnectWise Integrator Account. 2. A pricing model has been defined in ConnectWise for each managed company. 3. The billing service has been enabled and configured as required in the ConnectWise integration wizard. 4. Managed companies are licensed with a monthly subscription.

92 BILLING SETUP To view the usage records of a company in ConnectWise: 1. Go to Companies > Companies and search for the company you are interested in. 2. Click the company's name. 3. Go to the Agreements tab. 4. Click the previously created Agreement Type. 5. Go to the Additions tab.

93 CONNECTWISE INTEGRATION SUMMARY

94 CONNECTWISE INTEGRATION The integration module with ConnectWise, available within Bitdefender Control Center, enables MSPs to automatically create tickets and billing procedures for their customer companies, based on delivered Bitdefender security services. SMB SMB SMB MSP

95

96 INTEGRATING CONNECTWISE WITH BITDEFENDER BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA

97 3. Bitdefender Endpoint Security plugin for Kaseya 3.1 Overview 3.2 System Requirements 3.3 Installation 3.4 Dashboard 3.5 Licensing 3.6 Policies 3.8 Quarantine 3.9 Audit Logs 3.10 Alerts 3.11 Settings 3.12 Uninstalling 3.13 Summary 3.7 Endpoints

98 BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA OVERVIEW

99 OVERVIEW BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA MSP 3 Using Kaseya Allocated 300 Used: 200 MSP Using Kaseya License Key 1 Reserved 1000 Used : 200 MSP 2 Using Kaseya Allocated 400 Used: 300 MSP 4 Using Kaseya Allocated 200 Used: 200 License Key 2 - max 400 License Key 3 max 300 Distributor License Key 4 max 200

100 OVERVIEW BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA The plugin utilizes a number of Kaseya technologies: Agent Procedures, to retrieve data from the agents and send commands Alerts, including alarms, tickets, and the notification bar LAN Cache, to reduce network traffic and server load during agent installation Machine Filter Bar, that maintains consistent filtering settings between the plugin and other Kaseya modules

101 SYSTEM REQUIREMENTS

102 SYSTEM REQUIREMENTS KASEYA SERVER REQUIREMENTS Kaseya 7.0 or later On-premise Kaseya installation Microsoft.NET Framework 4 (Full) Microsoft Internet Information Server (IIS) 7.0 or later Windows 2008 or later SQL Server 2008 or later 8 GB RAM

103 SYSTEM REQUIREMENTS SUPPORTED BROWSERS & ENDPOINTS REQUIREMENTS Internet Explorer 8+ Mozilla Firefox 8+ Google Chrome 15+ Safari 4+ Kaseya agent Microsoft.NET Framework 4 (Full) Windows XP Service Pack 3 and later 1 GB RAM

104 INSTALLATION

105 INSTALLATION PLUGIN INSTALLATION 1. Copy the Installer on to the Kaseya server. 2. Double-click to run the installer. 3. Follow the prompts by clicking Next. 4. The last step of the installer has a check box that will start the Kaseya Reapply Schema process after the Finish button is pressed. Note: the plugin will not be available in Kaseya until Reapply Schema has run at least once.

106 INSTALLATION BITDEFENDER AGENT INSTALLATION Pre-installation notes The 32 and 64 bit agent installers are not included in the plugin installation package. The latest versions of the installers are downloaded to the Kaseya server after the plugin is installed. These agent installers will be automatically updated as new versions are released. Deployed agents will automatically update themselves. Before installing the agent on an endpoint, it is highly recommended that any existing antimalware software is completely removed. Many of the security programs that are incompatible with Bitdefender Endpoint Security are automatically detected and removed at installation time.

107 INSTALLATION BITDEFENDER AGENT INSTALLATION Bulk Deployment Steps: 1. In Kaseya, open the Agent Procedures module. 2. On the Schedule / Create page, select the Bitdefender Install procedure from the System \ Bitdefender Kaseya Module folder. 3. Under the Schedule tab, select the machines you want to deploy the Bitdefender agent to. Keep in mind you can use machine filters to select large numbers of endpoints. 4. Click the Schedule Agent Procedure button. 5. On the Schedule Agent Procedure tab, select a Recurrence of "Once" and choose a distribution window based on the number of selected endpoints. 6. On the Script Prompt tab, enter "0" for the Task Id prompt. 7. Click Submit to schedule the installation agent procedures.

108 DASHBOARD

109 DASHBOARD

110 LICENSING

111 LICENSING Dashboard Components: A. Kaseya Navigation Panel B. Machine Filter Bar modifies the scope of data displayed in the charts C. License Page Toggle D. Organization Grid Toggle Function E. Organization Grid

112 LICENSING ORGANIZATIONS TAB The Organizations tab displays all organizations with license data (key, type, status, expiration, usage and number of licenses still available). From this pane, you can assign new licenses or revoke current licenses by simply clicking the box next to the organization name and then either assign license or revoke license. There are four possible outcomes after adding a license key: Success Expired Deactivated Unknown/Cracked The types of licenses available are: End User Monthly

113 LICENSING ENDPOINTS TAB The Endpoints tab in the License page gives you control over licensing on a per-endpoint level. In this view, you can exclude endpoints from using a license, as well as see the status and availability of licenses on each endpoint. Licensed Endpoints Table: Column Machine Group IP Address Status License Description Name of the Kaseya endpoint Machine group for the endpoint IP address of the machine Status of the agent Status of the license in relation to the endpoint: is it already licensed, are there available slots in the license that could be used, is there a license assigned to the organization

114 POLICIES

115 POLICIES The settings and behavior of the Bitdefender Endpoint Security agent are controlled through policies. Each machine can have one policy assigned to it at a time and will inherit the nearest policy from the machine group or organization it is in. A default policy is always included with the plugin and will be used if no other policy is assigned to an endpoint.

116 POLICIES DEPLOY POLICIES To start deploying new policies to your endpoints, click on the Deploy button to open the deploy dialog. This dialog lets you assign policies to organizations, machines groups, and endpoints. The assignment of policies obeys the following inheritance model: Organization > Machine Group > Endpoint Each endpoint determines what policy should be applied to itself by starting with itself and looking up the inheritance tree to find the closest assigned policy.

117 POLICIES POLICY SETTINGS General General settings help you manage user interface display options, communication options, update preferences, password protection and other settings of Endpoint Security. Anti-Malware The Antimalware module protects the system against all kinds of malware threats (viruses, Trojans, spyware, rootkits, adware and so on). The protection is divided in two categories: On-access scanning: prevents new malware threats from entering the system. On-demand scanning: allows detecting and removing malware already residing in the system.

118 ENDPOINTS

119 ENDPOINTS The Endpoints page is the home of a number of key functions and information panels. It is here that Bitdefender can be installed or uninstalled, scans can be triggered, scan and task logs can be viewed and agent specific audit logs can be found as well.

120 QUARANTINE

121 QUARANTINE The Quarantine page shows information about all the quarantined files that are stored locally, on each endpoint. From here you can either restore files or delete them.

122 AUDIT LOGS

123 AUDIT LOGS The audit log is a global list of all actions taken within the plugin, as well as a log of any errors or other information that would be relevant to an end-user

124 ALERTS

125 ALERTS Alerts provide a mechanism for receiving notifications when certain events happen within the plugin. These notifications can be sent through four different Kaseya methods: alarms, tickets, s and the notification bar.

126 ALERTS ALERT METHODS Alert methods: Alarm Ticket Notification Bar Events: Agent Out-of-Date Application Blocked License Expired License Limit Almost Reached License Limit Exceeded Malware Cleaned Malware Outbreak Monthly License Usage Scan Results

127 SETTINGS

128 SETTINGS The Settings pane displays the Endpoint Refresh Interval, License Usage Daily Report Time, License Limit Alert Threshold, Agent Out-of-Date Threshold and Malware Outbreak Threshold currently set in the module.

129 UNINSTALL

130 UNINSTALL UNINSTALLING THE BITDEFENDER AGENT There are two approaches you can take to uninstalling the Bitdefender Endpoint Security agent from an endpoint. If the endpoint is visible inside of the plugin in Kaseya, you can use the plugin s Uninstall function to start the uninstall process. Otherwise, or if the remote uninstall fails, you can log into the endpoint and manually uninstall the agent.

131 UNINSTALL POST-UNINSTALL CLEAN UP To remove the plugin from Kaseya, follow these steps: 1. Log into the Kaseya server. 2. Open the Add / Remove Programs window. 3. Select the Bitdefender Kaseya Plugin entry. 4. Click the Uninstall button. 5. Follow the prompts to remove the plugin. To completely remove all traces of the plugin from the Kaseya database, follow these steps: 1. Log into the Kaseya server. 2. Find the following SQL file: C:\Kaseya\DBInstall\Bitdefender\script\bitdef.CleanUp.sql 3. Connect to the Kaseya database through SQL Management Studio The Kaseya database is called ksubscribers 4. Execute the bitdef.cleanup.sql file through SQL Management Studio

132 BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA SUMMARY

133 SUMMARY BITDEFENDER ENDPOINT SECURITY PLUGIN FOR KASEYA MSP 3 Using Kaseya Allocated 300 Used: 200 MSP Using Kaseya License Key 1 Reserved 1000 Used : 200 MSP 2 Using Kaseya Allocated 400 Used: 300 MSP 4 Using Kaseya Allocated 200 Used: 200 License Key 2 - max 400 License Key 3 max 300 Distributor License Key 4 max 200

134

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

BITDEFENDER ENDPOINT SECURITY TOOLS

BITDEFENDER ENDPOINT SECURITY TOOLS BITDEFENDER ENDPOINT SECURITY TOOLS Beta Version Testing Guide Bitdefender Endpoint Security Tools Beta Version Testing Guide Publication date 2014.11.26 Copyright 2014 Bitdefender Legal Notice All rights

More information

GravityZone INSTALLATION GUIDE

GravityZone INSTALLATION GUIDE GravityZone INSTALLATION GUIDE Bitdefender GravityZone Installation Guide Publication date 2015.10.28 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

BITDEFENDER GRAVITYZONE

BITDEFENDER GRAVITYZONE BITDEFENDER GRAVITYZONE Quick Start Guide Bitdefender GravityZone Quick Start Guide Publication date 2013.11.07 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be

More information

BITDEFENDER GRAVITYZONE

BITDEFENDER GRAVITYZONE BITDEFENDER GRAVITYZONE Quick Start Guide Bitdefender GravityZone Quick Start Guide Publication date 2014.11.18 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be

More information

GravityZone INSTALLATION GUIDE

GravityZone INSTALLATION GUIDE GravityZone INSTALLATION GUIDE Bitdefender GravityZone Installation Guide Publication date 2015.10.01 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

GRAVITYZONE UNIFIED SECURITY MANAGEMENT

GRAVITYZONE UNIFIED SECURITY MANAGEMENT GRAVITYZONE UNIFIED SECURITY MANAGEMENT Quick Start Guide GravityZone Unified Security Management Quick Start Guide Publication date 2013.02.22 Copyright 2013 Bitdefender Legal Notice All rights reserved.

More information

BITDEFENDER GRAVITYZONE

BITDEFENDER GRAVITYZONE BITDEFENDER GRAVITYZONE Administrator's Guide Bitdefender GravityZone Administrator's Guide Publication date 2015.02.25 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book

More information

BITDEFENDER SMALL OFFICE SECURITY

BITDEFENDER SMALL OFFICE SECURITY BITDEFENDER SMALL OFFICE SECURITY Quick Start Guide Bitdefender Small Office Security Quick Start Guide Publication date 2014.06.18 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

escan Corporate Edition User Guide

escan Corporate Edition User Guide Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

BITDEFENDER SECURITY FOR AMAZON WEB SERVICES

BITDEFENDER SECURITY FOR AMAZON WEB SERVICES BITDEFENDER SECURITY FOR AMAZON WEB SERVICES Beta Version Testing Guide Bitdefender Security for Amazon Web Services Beta Version Testing Guide Publication date 2015.03.04 Copyright 2015 Bitdefender Legal

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

GravityZone PARTNER'S GUIDE

GravityZone PARTNER'S GUIDE GravityZone PARTNER'S GUIDE Bitdefender GravityZone Partner's Guide Publication date 2015.10.28 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Request Manager Installation and Configuration Guide

Request Manager Installation and Configuration Guide Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Installation Guide. Help Desk Manager. Version v12.1.0

Installation Guide. Help Desk Manager. Version v12.1.0 Installation Guide Help Desk Manager Version v12.1.0 Documentation published: March 12, 2014 Contents Introduction to Help Desk Manager 3 Help Desk Manager Key Features 3 Do-It-Yourself Installation and

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

GravityZone INSTALLATION GUIDE

GravityZone INSTALLATION GUIDE GravityZone INSTALLATION GUIDE Bitdefender GravityZone Installation Guide Publication date 2015.09.25 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

SecureAnywhereTM Business Global Site Manager

SecureAnywhereTM Business Global Site Manager SecureAnywhereTM Business Global Site Manager Webroot SecureAnywhere Business MSP... 3 Requirements... 3 Management Console Access Requirements... 3 WSA Agent - System Requirements... 3 Workstations...

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

1. Server 2008 - Microsoft FEP 2010 - Instalation

1. Server 2008 - Microsoft FEP 2010 - Instalation 1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements

More information

What is Windows Intune? The Windows Intune Administrator Console. System Overview

What is Windows Intune? The Windows Intune Administrator Console. System Overview What is Windows Intune? Windows Intune helps you manage and secure computers in your environment through a combination of Windows cloud services and upgrade licensing. Windows Intune delivers cloud-based

More information

VEEAM ONE 8 RELEASE NOTES

VEEAM ONE 8 RELEASE NOTES VEEAM ONE 8 RELEASE NOTES This Release Notes document provides last-minute information about Veeam ONE 8 Update 2, including system requirements, installation instructions as well as relevant information

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide

Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide A P P L I C A T I O N V E R S I O N : 8. 0 M P 2 C F 2 Dear User! Thank you for choosing our product. We hope that this documentation will

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices. About Foglight NMS Foglight NMS is a comprehensive device, application, and traffic monitoring and troubleshooting solution. It is capable of securely monitoring single and multi-site networks of all sizes,

More information

Installing and Configuring WhatsUp Gold

Installing and Configuring WhatsUp Gold Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 AntiMalware User Guide Version 1.1 September 30, 2013 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA as updated

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

Redtail CRM Integration. Users Guide. 2011 Cities Digital, Inc. All rights reserved. Contents i

Redtail CRM Integration. Users Guide. 2011 Cities Digital, Inc. All rights reserved. Contents i Redtail CRM Integration Users Guide 2011 Cities Digital, Inc. All rights reserved. Contents i Contents Redtail Integration with Laserfiche by Cities Digital 1 Overview... 1 Requirements 3 Minimum Server

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Vector Asset Management User Manual

Vector Asset Management User Manual Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2 JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

Microsoft Windows Apple Mac OS X

Microsoft Windows Apple Mac OS X Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

Comodo One Software Version 1.8

Comodo One Software Version 1.8 rat Comodo One Software Version 1.8 Patch Management Module Administrator Guide Guide Version 1.8.100915 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

SOLARWINDS ORION. Patch Manager Evaluation Guide

SOLARWINDS ORION. Patch Manager Evaluation Guide SOLARWINDS ORION Patch Manager Evaluation Guide About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse requirements of

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

Copyright 2014 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

Copyright 2014 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, Copyright 2014 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2 JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

Installation and Configuration Guide for Windows and Linux

Installation and Configuration Guide for Windows and Linux Installation and Configuration Guide for Windows and Linux vcenter Operations Manager 5.7 This document supports the version of each product listed and supports all subsequent versions until the document

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10 QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10 About This Guide The intention of this guide is to provide a step through of the initial installation of Kaspersky Security

More information

VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com

VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET

More information

Netwrix Auditor for Exchange

Netwrix Auditor for Exchange Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix

More information

Unitrends Virtual Backup Installation Guide Version 8.0

Unitrends Virtual Backup Installation Guide Version 8.0 Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...

More information

inforouter V8.0 Server & Client Requirements

inforouter V8.0 Server & Client Requirements inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended

More information

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment... Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware

More information

ivms-5200 Professional Web Manager User Manual

ivms-5200 Professional Web Manager User Manual ivms-5200 Professional Web Manager User Manual UD.6L0202D1651A01 Hikvision ivms-5200 Professional Web Manager User Manual This manual, as well as the software described in it, is furnished under license

More information