MULTI-DEVICE SECURITY FAQS. INDEX p. 1-5 General FAQs p. 6 PC FAQs p.7 Mac and ios FAQs p.8 Android FAQs
|
|
- Amos Holmes
- 7 years ago
- Views:
Transcription
1 MULTI-DEVICE SECURITY FAQS INDEX p. 1-5 General FAQs p. 6 PC FAQs p.7 Mac and ios FAQs p.8 Android FAQs
2 General FAQs Q: What is Multi-Device Security? A: Computer Security was recently upgraded to our new service, Multi-Device Security. Multi-Device Security allows you to protect up to 10 devices including PC, Mac, Android and ios devices from online threats such as malware, viruses, and web sites trying to steal your personal information. Q: I already have Multi-Device Security on one or more of my devices. Where can I go to download Multi-Device Security on another device? A: Click here in order to add Multi-device Security to another device. You will need the username and password you used to login when you set up your Multi-Device Security account. Once logged in, 1. Click the "Add Device" button underneath your username. 2. Choose "Install on this Device" if you want to activate Multi-Device Security on the device you are currently on. 3. If you want to install on another device, click the "Install on Another Device" button. Note: If you do not have your username for Multi-Device Security, please call If you have forgotten your password, click "Forgot your password?" link on the Login Screen. Q: I ordered Multi-Device Security and I would like to download it for the first time. Where do I go? A: Click here in order to download Multi-Device Security for the first time. You will need the username and temporary password sent to you via when you first ordered the product. If you did not receive a Welcome , call our Support Team at Q: How do I install Multi-Device Security on my devices? A: Click here to log in to you Multi-Device Security account. Once logged in, 1. Click the "Add Device" button underneath your username. 2. Choose "Install on this Device" if you want to activate Multi-Device Security on the device you are currently on. 3. If you want to install on another device, click the "Install on Another Device" button. Note: If you do not have your username for Multi-Device Security, please call If you have forgotten your password, click "Forgot your password?" link on the Login Screen. Page 1 of 8
3 Q: What are the minimum system requirements for Multi-Device Security? A: PC: Supported Platforms Windows 10* Windows 8.1 and 8* Windows 7 (all editions) Windows Vista (Service Pack 2 or newer) *ARM based processors are not supported Systems Requirements Processor: Intel Pentium 4 or higher Memory requirements: 1 GB or more Disk space: 1.2 GB free disk space Internet (LAN or Wi-Fi) connection to validate your subscription and receive updates Note: The system must fulfill Windows minimum requirements as specified by Microsoft. Mac: Supported platforms OS X (El Capitan) OS X (Yosemite) OS X 10.9 (Mavericks) OS X 10.8 (Mountain Lion) Systems requirements Processor: Intel Memory requirements: 1 GB or more Disk space: 250 MB free disk space Internet (LAN or Wi-Fi) connection to validate your subscription and receive updates Android/iOS: Supported Platforms Android 4.0 or later ios 6 or later Page 2 of 8
4 Q: Multi-Device Security shows that the virus definitions are out of date. What can I do? A: Usually, you do not have to do anything. Multi-Device Security updates itself automatically when your computer or mobile device is connected to the Internet. However, if the virus definitions are not automatically updated, you can do the following: PC/Mac: 1. Go to Multi-Device Security main user interface 2. Select "tools" tab. 3. Select "Check for updates". 4. You can verify the last update check by going back to the "Status" tab. Android: Multi-Device Security is fully cloud enabled meaning there is no need to update the virus database on your device. The up-to-date virus database is stored in the cloud. In case you still want to check the latest service status and updates: 1. Go to Multi-Device Security main user interface 2. Tap the side menu icon (top left on the screen with three lines). 3. Select "More" and "Updates". 4. Under "Updates" tap on "Update now". Note: Make sure that the time and date of your device is correct. If they are not, updates may not install. Q: What are some of the features of Multi-Device Security filtering? A: Multi-Device Security provides many features for filtering in Outlook, Outlook Express, and Windows Mail. You have the option to mark spam messages with SPAM in the subject field. Also, when spam filtering is enabled, rules are automatically created in Outlook, Outlook Express, and Windows Mail. If you use another application, you have to create the filtering rules manually. Q: How do I manage my licenses? OR How many licenses do I have left/ have I used? A: You can view the total number of Multi-Device Security licenses within the user portal. Simply login the portal here to view the number of user licenses available to you. You may switch protected devices easily by removing the unnecessary devices and installing Multi-Device Security on your preferred devices. Note: You may extend your license quota by contacting Frontier Secure at Q: Where do I view my subscription status? A: All Multi-Device Security subscription related information is available on the user portal. You can access the portal by logging in here. Within the user portal, you can view the number of used licenses and the number of free licenses. Q: How can I reset my Multi-Device Security password? A: You can reset your password by accessing the Multi-Device Security user portal login screen by clicking here and following these steps. 1. Click on "Forgot your password" link. 2. Enter your address and click Send button. 3. An will be sent to your with a reset password link. 4. Enter new password and click on Reset Password. 5. Use the new password when you log into Web Portal. Page 3 of 8
5 Q: How can I change my address in Multi-Device Security? A: Please call our Technical Support team at in order to change your address in Multi-Device Security. Q: How can I buy more licenses for Multi-Device Security? A: You may extend your license quota by contacting our Technical Support team at Q: How do I view my account information for Multi-Device Security? A: All Multi-Device Security related information is available on the user portal. You can access the portal by logging in here. On the main screen of the user portal, select "Account details". This will show the information you entered upon registration and the choices you have made in terms of the service notifications and ers. Q: Where do I see my orders and payments for Multi-Device Security? A: Please call our Technical Support team at in order to receive information regarding your orders and payments. Q: How much does Multi-Device Security cost? A: Multi-Device Security is $5.99/month, unless bundled with other services. If you have any questions related to pricing for Multi-Device Security, please call our Technical Support team at Q: What is Multi-Device Security Safe Browsing? A: Multi-Device Security Safe Browsing is a security-enhanced search engine. It provides website safety ratings while you are searching online, helping you keep both your personal details and your devices protected from online threats. When Multi-Device Security Safe Browsing is enabled, it checks for known harmful sites, such as phishing sites that try to steal your personal information and sites that spread malware. Each search result link is clearly marked with a safety rating, letting you know which sites are safe to visit and which to avoid. Multi-Device Security Safe Browsing also automatically filters out explicit and adult images, making it a more suitable search engine to be used by children. Page 4 of 8
6 Q: How do I share Multi-Device Security with a family member/friend? A: Multi-Device Security sharing is easy. There are two options. 1. Add a new device: To add a new device under your account: 1. Login into the user portal here. 2. Click the "Add Device" button underneath your username. 3. Choose "Install on this Device" if you want to activate Multi-Device Security on the device you are currently on. 4. If you want to install on another device, click the "Install on Another Device" button. Note: This process works best for devices you can personally manage or have access to within your household such as your children s tablets or your spouse s devices. 2. Add a new user: To invite a new user, login to your Multi-Device Security account. 1. On the home screen, select "Add User". 2. Insert the details necessary to invite the new user (either by or SMS) 3. The new user is automatically added as a new user circle within your My Multi-Device Security portal. 4. After sending the invitation, the new user receives either an or SMS message with instructions about how to install Multi-Device Security on their device. The new user also receives personal credentials for accessing their own services. Note: This process is best for your loved ones, friends, co-workers, etc. that need internet security but you would like them to manage which devices they choose to protect. Q: How do I remove a user from my Multi-Device Security account/portal? A: To remove a user, 1. Click on the icon of the user you wish to remove and then click again on the bubble of the user. 2. You will then see a link to remove the user. Click on the remove person link. Note: If you are the Admin of the Multi-Device Security account, you can remove any user except yourself. If you are not the Admin of the account, you can only remove/add your devices. You cannot remove other users. Page 5 of 8
7 PC FAQs Q: If I already have antivirus software installed on my PC, do I need to remove it before I begin to install Multi-Device Security? A: Yes. You cannot have two antivirus or multi-purpose security products from different companies installed on your computer. Multi-Device Security will automatically detect and remove the most common antivirus and security products during the installation process. You can also manually remove any other antivirus or security products before installing Multi-Device Security, if you prefer. Q: How does the Browsing protection in Multi-Device Security work on my PC? A: Browsing protection is a reputation service, which treats the Internet pages as either safe or unsafe. Unsafe sites are typically identified as phishing and malware sites. The web page reputations are checked seamlessly while you browse the Internet. Access to safe sites happens normally without any interruptions while access to unsafe sites is automatically blocked. You can modify Browsing protection settings by clicking the icon on the Multi-Device Security main user interface. Profiles displayed are specific to the Windows accounts currently set up on your PC. You can modify the profiles by selecting which user's profile you want to modify, and then select "Settings". Each account can have different settings. For example, you can enable Content Filtering for your children to prevent their access to unsuitable web content. Q: How do I uninstall Multi-Device Security from my PC device? A: For Operating Systems up to Windows 10: 1. Go into Control Panel and select Add/ remove Programs. 2. Select Multi-Device Security from the list and then click "uninstall". For Windows 10: 1. Open Settings, select Apps & Features. 2. Search for Multi-Device Security and then click "uninstall". Q: How do I set up Multi-Device Security Parental Controls on my PC? 1. Open the Multi-device Security application and then click "Browsing Protection". 2. Click on the user you wish to adjust and then click "Settings". Note: If you do not see the user you wish to edit, you can create a new user by clicking "Create New User" button on the left hand menu. a. In order to filter the content that can be viewed by the user, click "Content Filtering" on the left hand menu and click the top right corner toggle, so that it shows green, to adjust the content you wish to be blocked. b. To turn on Browsing Protection, click "Browsing Protection" on the left hand menu and click the top right corner toggle so that it shows green. c. To set up browsing time limits for a user, click on "Browsing Time Limits" on the left hand menu and click the top right corner toggle so that it shows green. You will then be able to adjust the date, time or number of hours the user can browse. Note: Parental Controls can be different for each user. Page 6 of 8
8 Mac and ios FAQs Q: If I already have antivirus software installed on my Mac, do I need to remove it before I begin to install Multi-Device Security? A: Yes. You will need to manually remove any antivirus software you currently have running on your Mac. To do so, 1. Open a Finder window 2. Navigate to Apps 3. Drag the antivirus security app to your trash bin to uninstall the software. If this process does not work to uninstall the antivirus software, go to Spotlight in the top right corner of your Mac and type remove <name of program> Replace <name of program> with the name of the Anti-virus software you are currently running and then follow the prompts. Note: You may need to authenticate as an administrative user during the uninstallation process. Q: If I already have antivirus software installed on my ios device, do I need to remove it before I begin to install Multi-Device Security? A: Yes. It is recommended to remove other antivirus products before installing Multi-Device Security. You can manually remove any other antivirus or security products through device settings or the App store. Q: How does the Browsing protection in Multi-Device Security work on my Mac? A: If a web page you are about to visit is knowingly harmful and your browsing protection is turned on, Multi-Device Security will alert you of this harmful site and advise you not to visit it. Q: How does the Browsing protection in Multi-Device Security work on my ios devices? A: Browsing protection is a reputation service, which treats the Internet pages as either safe or unsafe. Unsafe sites are typically identified as phishing and malware sites. The web page reputations are checked seamlessly while you browse the Internet. Access to safe sites happens normally without any interruptions while access to unsafe sites is automatically blocked. On ios devices, you can also restrict the access to unsuitable web content under Parental Control settings. Q: How do I uninstall Multi-Device Security from my Mac device? A: Open the Applications folder in Finder. Within the Multi-Device Security folder, there is an application called uninstall. Run this, authenticating as an administrative user when necessary. Q: How do I set up Multi-Device Security Parental Controls on my ios device? A: 1. Open the Multi-Device Security App and select the menu in the top left corner. 2. Tap Parental control listed near the bottom of the menu. 3. If parental controls are off, turn on parental controls by moving the toggle to the right. 4. Select the controls or features you want to limit. You have the option to adjust browsing content or time limits. Note: For browsing content, you ll see the list of categories. A tick in the box means this content IS allowed to be seen. Content which IS blocked will mean the user sees a warning. Page 7 of 8
9 Android FAQs Q: If I already have antivirus software installed on my Android device, do I need to remove it before I begin to install Multi-Device Security? A: Yes. It is recommended to remove other antivirus products before installing Multi-Device Security. You can manually remove any other antivirus or security products through device settings or Google Play. More detailed instructions are provided under "How do I uninstall Multi-Device Security from my Android device?" Q: How does the Browsing protection in Multi-Device Security work on my Android devices? A: Browsing protection is a reputation service, which treats the Internet pages as either safe or unsafe. Unsafe sites are typically identified as phishing and malware sites. The web page reputations are checked seamlessly while you browse the Internet. Access to safe sites happens normally without any interruptions while access to unsafe sites is automatically blocked. On Android devices, you can also restrict the access to unsuitable web content under Parental Control settings. Q: How do I uninstall Multi-Device Security from my Android device? A: Click on the Multi-Device Security app. Select more from the menu and then click uninstall. Q: How do I set up Finder features on my Android phone or tablet? A: Finder is the new name for the Multi-Device Security Anti-theft feature. Locate, Alarm and Wipe features are automatically enabled upon installation. Login to the user portal to locate your device on a map or play a loud alarm. In case your device is lost or stolen, you may want to lock it to prevent unauthorized access to your device and data. If your device is unrecoverable, you may consider wiping all your personal information with the Wipe command. Remote locking of the device is configured separately. All Finder remote commands can be executed through the user portal. Q: How do I set up Multi-Device Security Parental Controls on my Android device? A: 1. Click on the Multi-Device Security app. 2. Enter your Security Code, if prompted. Note: Security Code prohibits your child from making adjustments to their Parental Control settings. 3. Select "Parental Controls" from the menu. a. Turn Parental Controls on from the top right corner by sliding the toggle. b. To limit time usage, slide toggle next to "Time Limits" and set daily limits. c. To limit content, select "Web Content" and select the categories which should be permitted. d. For Apps, select "Apps" and select the permitted apps. Page 8 of 8
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationVirtual Workplace Personal Device Client Installation Instructions
Virtual Workplace Personal Device Client Installation Instructions 1 Table of Contents About this Installation Guide... 2 Client Overview... 2 VMware Horizon View Clients... 2 UniPrint Clients... 3 Client
More informationQUICK INSTALLATION GUIDE ACTIVATE
ACTIVATE ACTIVATE ACTIVATE 1. Activate the business cloud A. Service Activation: You will receive a confirmation e-mail within 2 hours maximum BASE business Cloud: Notification/Notificatie B. Go to https://cdashboard.
More informationU.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
More informationONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0
ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a
More informationVerizon Internet Security Suite Multi-Device Powered by McAfee. Installation Guide for Multi Devices for Residential Users
Verizon Internet Security Suite Multi-Device Powered by McAfee Installation Guide for Multi Devices for Residential Users Contents Introduction 3 System requirements 4 Installing Verizon Internet Security
More informationQuick Start Guide v4.0 Client Outlook Connection
Quick Start Guide v4.0 Client Outlook Connection Contents Chapter 1 Outlook Anywhere - Outlook Anywhere 3 - Setting up Outlook Anywhere for PC 4 - Setting up Outlook for Mac 9 CLIENT OUTLOOK CONNECTION
More informationInstallation Instructions
Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other
More informationLIBRARY MEMBER USER GUIDE
LIBRARY MEMBER USER GUIDE CONTENTS PAGE Part 1) How to create a new account... 2 Part 2) How to checkout a magazine issue... 4 Part 3) How to download Zinio Reader 4... 10 a) For your PC... 10 b) For your
More informationAdministrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
More informationExchange 2003 Mailboxes
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
More informationContents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large
More informationMicrosoft Office 365 Microsoft Office 2016 for Mac Installation and Activation Walkthrough
Microsoft Office 365 Microsoft Office 2016 for Mac Installation and Activation Walkthrough Contents Introduction... 2 System Requirements... 2 Installing Microsoft Office 2016 for Mac... 3 Manage/Deactivate
More informationMcAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.
McAfee Multi Access from ø Step-by-step guide to protecting your devices. Always. Contents 3 Welcome to McAfee Multi Access 5 Setting up your Windows PC Setting up McAfee Multi Access on your Windows PC
More informationSeagate Access for Personal Cloud User Manual
Seagate Access for Personal Cloud User Manual 2015 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks of Seagate
More informationWatchDox for Mac User Guide
WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized
More informationInstallation Instructions
Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand
More informationGREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
More informationF-Secure Mobile Security for Business. Getting Started Guide
F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6
More informationGoogle 2 factor authentication User Guide
Information Technology Services Centre Google 2 factor authentication User Guide Description: This guide describes how to setup Two factor authentication for your Google account. Version: 1.0 Link: Effective
More informationShareSync Get Started Guide
ShareSync Get Started Guide WHAT IS SHARESYNC? ShareSync is a cloud file sync and share service. ShareSync allows you to easily sync files between multiple computers, the ShareSync web portal and mobile
More informationAVG Protection. User Manual. Document revision AVG.32 (6/27/2016)
AVG Protection User Manual Document revision AVG.32 (6/27/2016) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents 1.
More informationAVG Protection. User Manual. Document revision 2015.37 (26.8.2015)
AVG Protection User Manual Document revision 2015.37 (26.8.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents
More informationSpontania User Setup Guide
Spontania User Setup Guide ClearOne 5225 Wiley Post Way Suite 500 Salt Lake City, UT 84116 Telephone 1.800.945.7730 1.801.975.7200 Spontania Support 1.801.974.3612 TechSales 1.800.705.2103 FAX 1.801.977.0087
More informationProtection Service for Business
Protection Service for Business Getting Started Guide for Mac Computers System requirements System requirements Supported platforms For all supported OS X versions. Workstation (Mac) Processor: Memory:
More informationMICROSOFT OFFICE 2016. (Mac OS)
MICROSOFT OFFICE 2016 Table of Contents (Mac OS) 1 Prerequisites of Microsoft Office 2016 Installation... 1 2 Logging in Office 365 for Online Download... 2 3 Guided Installation Steps... 6 4 Check and
More informationKaspersky Password Manager
Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.
More informationSIMIAN systems. Sitellite Desktop User Manual. Sitellite Professional Edition
Sitellite Desktop User Manual Sitellite Professional Edition Introduction The Sitellite Desktop is a cross-platform desktop application that can manage one or more Sitellite 5-powered websites in a more
More informationReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA
User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label
More informationAvira Free Android Security (version 1.2) HowTo
Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5
More informationNorton Family Product Manual
Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual
More informationUser Guide. BES12 Self-Service
User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5
More informationShareSync Get Started Guide for Mac
ShareSync Get Started Guide for Mac WHAT IS SHARESYNC? ShareSync is an enterprise-class cloud file backup and sharing service. ShareSync allows you to back up your files in real-time to protect against
More informationAccess the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA)
Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Table of Contents Introduction. 1 Determine your Windows Operating System (for software
More informationAvira Secure Backup INSTALLATION GUIDE. HowTo
Avira Secure Backup INSTALLATION GUIDE HowTo Table of contents 1. Introduction... 3 2. System Requirements... 3 2.1 Windows...3 2.2 Mac...4 2.3 ios (iphone, ipad and ipod touch)...4 3. Avira Secure Backup
More informationimail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2
imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 4 1. How to access to Sunway imail account?... 4 2. I can t login to my
More informationNQ Mobile Security Frequently Asked Questions (FAQs) for Android
NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running
More informationCommack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices
Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices This allows district staff and students to access the Commack UFSD network from home or anywhere
More informationOneNet Cloud Services
OneNet Cloud Services Documentation OneNet Limited Distribution Page 1 of 19 Contents Summary... 3 Logging into Control Panel... 4 Microsoft Cloud Services Management... 6 Creating a new user (applies
More informationUP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
More informationMobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
More informationESET MOBILE SECURITY FOR ANDROID
ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3
More informationShareSync Get Started Guide
ShareSync Get Started Guide WHAT IS SHARESYNC? ShareSync is a cloud backup and file sync and share service. ShareSync allows you to easily sync files between multiple computers, the ShareSync web App and
More informationTOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
More informationShareSync Get Started Guide
ShareSync Get Started Guide WHAT IS SHARESYNC? ShareSync is a cloud file sync and share service. ShareSync allows you to easily sync files between multiple computers, the ShareSync web portal and mobile
More informationF-Secure Mobile Security for Nokia E51, E71 and E75. 1 Installing and Activating F-Secure Client 5.1
F-Secure Mobile Security for Nokia E51, E71 and E75 1 Installing and Activating F-Secure Client 5.1 N.B.: The previous version of F-Secure Mobile Security does not have to be uninstalled. The new version
More informationOneDrive for Business User Guide
OneDrive for Business User Guide Contents OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive App... 3
More informationOneDrive for Business User Guide
OneDrive for Business User Guide Contents About OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive for
More informationAccessInternet. Get Started. Internet The Way You Want It
AccessInternet Get Started Internet The Way You Want It 1 Important Numbers 24/7 Customer Service 1-866-363-2225 For all customer care & billing inquiries, to set up new services, change existing services
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More informationStore & Share Quick Start
Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationHow To Access Your Cpa.Com Email From Your Computer Or A Mobile Phone Or Ipad (For A Free Download) Without Having To Use A Webmail Account
CPA.com Full Email Account Getting Started Guide Note: You do not need to read this guide if you signed up for the CPA.com Forward-Only Service. Congratulations on the purchase of your new CPA.com Full
More informationTIPS FOR USING OS X 10.8 MOUNTAIN LION
Mac OS X Tutorial 10.8 Mountain Lion 1 TIPS FOR USING OS X 10.8 MOUNTAIN LION LAUNCHPAD Launchpad is an application launcher first introduced in OS X 10.7 Lion and improved upon in Mountain Lion. Launchpad
More informationLive Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
More informationComodo Mobile Security for Android Software Version 2.5
Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile
More informationiphone and Android Apps Guide iphone and Android Apps Guide
iphone and Android Apps Guide A safe and efficient way of accessing your People s Choice Credit Union accounts, paying bills and transferring money. 1 Contents. 1. Mobile Banking using the People s Choice
More informationInformation Technology User Guide Office 365 ProPlus
Information Technology User Guide Office 365 ProPlus Scope: CCC Revision Date: 03/02/2016 Table of Contents Table of Contents... 1 1) Introduction... 2 2) Accessing the software download area... 2 3) Deciding
More information3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
More informationB&SC Office 365 Email
B&SC Office 365 Email Microsoft Office 365 In its continuous efforts to provide the highest quality student experience, Bryant & Stratton College is giving students access to a new tool for accessing email.
More informationUser's Guide. Copyright 2012 Bitdefender
User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced
More informationATTENTION: End users should take note that Main Line Health has not verified within a Citrix
Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal
More informationSYSTEM REQUIREMENTS... 5 FREE RESOURCES... 6 GETTING STARTED...
Table of Contents ABOUT... 4 Authorized Use... 4 Questions and Contact Information... 4 SYSTEM REQUIREMENTS... 5 FREE RESOURCES... 6 GETTING STARTED... 7 Account Creation Overview and Types of Accounts...
More informationGetting Started with VMware Horizon View (Remote Desktop Access)
Getting Started with VMware Horizon View (Remote Desktop Access) Use The Links Below To Navigate This Document Using VMware Horizon View with Tablet and Smartphone APP or Mobile Web Browser Walk Through
More informationLIBRARY MEMBER USER GUIDE
LIBRARY MEMBER USER GUIDE CONTENTS PAGE Part 1) How to create a new account... 2 Part 2) How to checkout a magazine issue... 4 Part 3) How to download and use Zinio Reader 4... 8 a) For your PC... 8 b)
More informationProtection Service for Business
Protection Service for Business FAQ Version 4.0 Table of Contents 1. Protection Service for Business... 3 What is Protection Service for Business?... 3 What are the key benefits of Protection Service for
More informationTechnology Services Group Procedures. IH Anywhere guide. 0 P a g e
VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationESET Mobile Security Windows Mobile
ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3
More informationQuick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
More informationMOBILE BANKING USER GUIDE
MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees
More informationOneDrive for Business User Guide
OneDrive for Business User Guide Contents OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive App... 3
More information@student.chuhai.edu.hk Email Services Users Manual
@student.chuhai.edu.hk Email Services Users Manual Revised: APR 2014 Contents 1. How to start using student.chuhai.edu.hk email services?... 2 2. How to login to student.chuhai. edu.hk?... 3 3. How to
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationHow to get Office 365 through your Student Email
How to get Office 365 through your Student Email Locating and installing Microsoft Office 365 ProPlus is a quick and simple process. To begin the installation, log into your GCU email account, either by
More informationDOE VPN Client Installation and Setup Guide March 2011
DOE VPN Client Installation and Setup Guide March 2011 Table of Contents Introduction... 3 System Requirements... 3 Microsoft Windows... 3 Mac OS X... 4 Windows... 4 Installation for the Cisco AnyConnect
More informationCampus Mobile App User Guide
Requirements Campus Mobile App User Guide The following items are required to view information on the Campus Mobile App: An active Campus Portal account. A supported ios (ipad, iphone, ipod Touch) or Android
More informationApple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry...
Contents Email Accounts... 3 Adding accounts... 3 Account Modifications... 6 Adding Aliases... 7 Primary E-mail Addresses... 10 Mailbox Quotas... 12 Removing accounts... 13 Mail Forwarding and Distribution
More informationAT&T Toggle. 4/23/2014 Page i
Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...
More informationAnchor End-User Guide
Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share
More informationPROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM
PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM EMPLOYEES WORK ON THE MOVE, WITH MULTIPLE DEVICES MEETING CUSTOMERS WORKING FROM HOME BUSINESS TRIP CLOUD SERVICES ARE ENABLERS OF MOBILE
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationOnline Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
More informationOnline Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
More informationMDM User Guide June 2012
June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App
More information2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
More informationFAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
More informationESET Mobile Security Windows Mobile. Installation Manual and User Guide
ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3
More informationInstall MS Office 365 on your Android mobile device
Install MS Office 365 on your Android mobile device IT Documentation Team, March 2015 This factsheet contains instructions for installing the Office Mobile for Android phone and Office for Android tablet
More informationOneDrive for Business FAQ s Updated 6/19/14
OneDrive for Business FAQ s Updated 6/19/14 What is OneDrive for Business? OneDrive for Business is an online service that provides resources for file storage, collaboration, and communication. It provides
More informationRelease 2.0. Cox Business Online Backup Quick Start Guide
Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.
More informationESET ENDPOINT SECURITY FOR ANDROID
ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1...3 Installation of ESET Endpoint Security 1.1 Installation...3
More informationContents. Using Web Access... 1. Managing Shared Folders... 28. Managing Account Settings... 36. Index... 39
Contents Using Web Access... 1 Using the Sign In Page... 1 Signing In to Seagate Global Access... 2 Creating a Seagate Global Access Account... 2 If You Forget Your Password... 5 Viewing Central Axis Details...
More informationUser Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007
Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...
More informationJunos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
More informationInstructions for Registering for a Miradi Account & Installing Miradi Software
Instructions for Registering for a Miradi Account & Installing Miradi Software www.miradi.org/download Version: March 2015 Introduction The following slides guide users through the process for registering
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationAvira Antivirus Security. HowTo
Avira Antivirus Security HowTo Table of contents 1. Introduction... 3 2. Supported Manufacturers... 3 3. Product Overview...4 4. Installation... 5 4.1 Installing the app... 5 4.2 Updating the app... 5
More informationAT&T Business Messaging Account Management
AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein
More informationLOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS
INSTALLATION INSTRUCTIONS Table of Contents A. Installing Symantec Anti-Virus 8.1 For Windows (32-Bit) From CD B. Installing Norton Anti-Virus 7.61 For Windows 95 From CD C. Installing Norton Anti-Virus
More information