OPTENET Security Suite / OPTENET PC Web Filter

Size: px
Start display at page:

Download "OPTENET Security Suite / OPTENET PC Web Filter"

Transcription

1 OPTENET Security Suite / OPTENET PC Web Filter Version User Guide (rev 1.7)

2 COPYRIGHT No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Optenet S.A., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS Optenet, EDUNET, COTENET, E-Optenet, Optenet.BE, Optenet.CL, Optenet.CO.CR, Optenet.COM.EC, EDUNET.COM.ES, Optenet.COM.ES, EDUNET.ES, Optenet.ES, Optenet.US, Optenet.FR, OBTENET.COM, OBTENET.NET, Optenet.COM, Optenet.NET, CAPITANNET.COM, CAPITANNET.ORG, CAPITANNET.NET, CAPITANET.COM, CAPITANET.ORG, CAPITANET.NET, Optenet.BIZ, PROTEGELES.COM, PROTEGELES.NET, PROTEGELES.ORG, SURF-MATE.COM, SURF- MATE.NET, SURF-MATE.ORG, PROTEGELOS.COM, PROTEGEALOSNINOS.COM, SIFT- PLATFORM.ORG, Optenet.COM.GT, Optenet.COM.HN, Optenet.COM.MX, Optenet.COM.PA, Optenet.COM.PE, PTENET.CO.UK (in process), Optenet.COM.VE, are registered trademarks or trademarks of Optenet S.A. and/or its affiliates in Spain and/or other countries. All other registered and unregistered trademarks herein are the sole property of their respective owners LICENSE INFORMATION LICENSE AGREEMENT NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSE SOFTWARE.

3 Index 1 Introduction Main Features of OPTENET Security Suite Parental Control Antivirus Firewall Protocols Filtering Effectiveness Optenet Security Suite Languages Browsing Speed When Using Optenet Security Suite Web Filter Security Unblocking Service for Pages Blocked in Error Activation or Deactivation of the Security Suite Blocking P2P File Sharing and Downloading of Programs Blocking Instant Messaging Programs Blocking Updates Technical Requirements Technical Knowledge System Compatibility and Minimum Requirements Installation General OPTENET Security Suite Change Password License Management Software Update Proxy settings Help Parental Control Profiles... 28

4 6.2 Configuration Categories Browsing schedules Black and White Lists Applications manager Filter types Keyword filtering Port filtering Advanced Options Whitelists and blacklists Contribution Reports Advanced settings Repeated attempts blocking Browser filtering Excluded web domains Antivirus Antivirus Protection Level Analysis On demand analysis Scheduled Analysis Set active process analysis Reports Quarantine Firewall Firewall Protection Level Application Control Service configuration IP Configuration Reports Uninstall... 76

5

6 1 INTRODUCTION Optenet Security Suite / Optenet PC WebFilter is a tool that optimizes Internet usage and provides the highest levels of security. It offers the most effective protection on the market for both IT equipment and Users. This is achieved through the combination of highly effective individual components. In addition, Optenet Security Suite / Optenet PC WebFilter is a transparent application that does not affect the functioning of other applications, system performance, or the speed of communications. There are two types of licenses that activate different services: WebFilter. Activates parental control services and protocol filtering SecuritySuite. In addition to activates parental control services and protocol filtering it also enables antivirus and firewall services. This manual refers to Optenet Security Suite because it contains the services included OPTENET PC Web Filter. Optenet Security Suite is the most advanced and complete protection tool on the market. Various modules complement each other. The highly effective Anti-virus tool makes it difficult for harmful programs to install themselves. With Web Filter content control the risk of exposing children to undesirable content is greatly minimized. If a virus does infect the machine, the Firewall, which controls activity, minimizes the harm that it can cause. 2 MAIN FEATURES OF OPTENET SECURITY SUITE Over 99% effective in filtering. Error rate less than 0.1%, eliminated completely through the Contributions service. Integrates the most advanced technology: databases of websites, viruses and Spammers, Semantic Analysis Engine for online content, heuristic analysis of executables, content-based protocol identification, etc. The filters do not affect communications; it takes less than a millisecond to analyze a web page. Automatic database and program updates. Reports on all filtering processes.

7 Broad interpretation of the definition and nature of viruses, incorporating worms, trojans, spyware, adware, etc. 2.1 Parental Control Web Filter prevents access to undesirable Internet content, such as pornographic websites, dangerous file downloads, Instant Messaging servers or P2P. It captures traffic entering and leaving the PC. In addition to identifying the type of traffic, it requests the relevant integrated service for analyzing, monitoring or tracing the content, ensuring that browsing is safe and based on the configured parameters. It is based on semantic analysis of website content and lists of sites that have been placed in various content categories. The lists are updated continuously. Independently of whether a website is included on a list, semantic analysis verifies whether the page contains any text with inappropriate content, in which case the User is blocked from accessing it. 2.2 Antivirus Service only available with SecuritySuite license Optenet Security Suite Anti-virus protects Users from viruses, spyware, trojans and worms that could infect their PC equipment through or browsing the Internet, as well as detecting viruses already present on the computer. Optenet Security Suite Anti-virus integrates latest generation virus detection technology developed by European company Bitdefender. It offers various levels of protection. These levels allow the User to choose between preconfigured profiles. It is also possible to schedule scans or initiate them at any time. 2.3 Firewall Service only available with SecuritySuite license. Optenet Security Suite Firewall controls the execution of applications that connect to the Internet. It is used to control connections, allowing Users to set the firewall to allow the connection, deny it or prompt the User each time an application initiates a connection. It also prevents unauthorized access to the User s PC, for example, by hackers. Optenet Security Suite Firewall can be set to display an alert when a program attempts to connect to the Internet. The User can allow or deny the connection and can make the decision to take the default action whenever the program tries to connect.

8 2.4 Protocols Filtering Protocol filtering detects connections and identifies the protocol type, performing various actions depending on the configuration. This allows Users to control applications like Instant Messenger, P2P, Chat, and Newsgroups. 2.5 Effectiveness Optenet Security Suite leverages the most effective security service technologies. Content filtering uses a combination of the semantic analyzer and predefined lists giving the Security Suite an effectiveness of over 98%.The Anti-virus service achieves 99% effectiveness through integrated technology from Bitdefender. Moreover, Optenet Security Suite's combination of filters makes its overall effectiveness far superior to that of each individual component. For example, a piece of spyware could be blocked by any of the following mechanisms: Anti-virus detects spyware signatures. Anti-virus detects that the program is using techniques normally employed by spyware (heuristic analysis). The website hosting the spyware is in the database of the Web Filter, which blocks access to the page. The Web Filter content analyzer detects it as spyware. The administrator prohibits the download of executables as a preventative measure 2.6 Optenet Security Suite Languages Optenet filters the main languages used on the Internet with over 98% effectiveness. The Security Suite lists contain pages from all languages. Additionally, the Semantic Analyzer is trained periodically with pages from around the world, enabling it to detect pages in all languages. To achieve as high a level of effectiveness as possible (99%), for certain languages (e.g. English, Spanish, French, Dutch, Portuguese, German and Italian) a broad collection of pages is put together to train the Semantic Analyzer. 2.7 Browsing Speed When Using Optenet Security Suite Optenet Security Suite is extremely fast and, as a result, is transparent to the User. Both the list query and the content analysis process performed by the system take one thousandth of a second. It is effectively an instantaneous process.

9 2.8 Web Filter Security If attempts are made to get around the filter, Internet access is blocked completely as a security measure. Access can only be re-established using a password. 2.9 Unblocking Service for Pages Blocked in Error Optenet Security Suite has an error rate of around 0.1%, the lowest on the market. In addition, it has an unblocking service. If a page is blocked in error, the user can request a review from the block page explaining the reason for failure to correct. Our Customer Care Center (CCC) will review it and in case it has been an error the User will be able to gain access to the page in around 15 minutes Activation or Deactivation of the Security Suite Optenet Security Suite is activated or deactivated using a password so that administrators can browse without restrictions. The password is requested from the User at the time of installation. If the User does not have the password or if someone attempts to deactivate the Security Suite, the system has self-protection mechanisms that make it impossible to deactivate it Blocking P2P File Sharing and Downloading of Programs It is possible to block P2P file sharing and downloading of programs through the protocol configuration of the Web Filter. The P2P server category can also be blocked, providing a greater level of security Blocking Instant Messaging Programs It is possible to block Instant Messaging programs through the protocol configuration of the Web Filter. The Instant Messaging server category can also be blocked, providing a greater level of security Blocking It is possible to block through the protocol configuration of the Web Filter. To block webmail, the relevant category must be selected Updates The list system is updated automatically via the Internet. This process requires no administration.

10

11 3 TECHNICAL REQUIREMENTS 3.1 Technical Knowledge No specific technical knowledge is required to install or configure the filters. 3.2 System Compatibility and Minimum Requirements The OSSPC is available for the following operating systems: a. Windows XP Sp3 b. Windows Vista (32 and 64 bits) c. Windows 7 (32 and 64 bits) d. Window 8 (32 and 64 bits) OS RAM. Minimum: Free Hard Disk Space: Windows XP sp3 512 MB 500 MB Windows Vista 32 bits, 64 bits 1 GB 500MB Windows 7 32 bits 2 GB 500MB Windows 7 64 bits 2 GB 500MB Windows 8 64 bits 2 GB 500MB It can be used with any web browser.

12 4 INSTALLATION Whether the tool is downloaded from the website or installed from a CD, it is recommended to save the program to the computer s hard disk and follow these steps: Double click on the file Optenet (the name of the file is OptenetSecuritySuite.exe) The Optenet interface is available in three languages: English, French and Spanish. Select the language and click [Next]. End User Agreement. Accept license terms:

13 Select the folder where the software will be installed. By default, Program Files directory will be used. Click [Next]. Enter the password to be used to access the Optenet Administration Console (filter configuration). This password ensures that only the administrator can make changes to the setup and remove the program. It is recommended that a password is chosen that is personal and confidential and should be kept in a safe place. Remember that this password will be required to un-install Optenet Suite at a later time! Password Reminder: Type a question and answer to be used in case the password is forgotten. Enter an address to send the password in case the configured control question has been forgotten. The address entered here will be the only address where the password will be sent in case it has been! This will prevent unauthorized Users from acquiring the administrative password in order to alter filter settings and/or un-install the program.

14 Enter license code (this will most likely have been received via when the product was purchased). Note: Where available, it may also be possible to use an evaluation license to try other available products (complete suite etc). In this case, select the trial Product and click on [Next].

15 If the user opts for an evaluation installation, then, each time the software is launched display a warning notice that you are using an evaluation version, and suggest purchasing a permanent license: If the entered license or product chosen for evaluation include the Antivirus, during installation, the program will download updated bases required for the Antivirus work with full guarantees from the start. Antivirus bases occupy more than 100 MB so depending on the speed of your internet connection this operation could take even minutes. Finally, it is necessary to restart the PC to complete the installation. The program may not work properly until the PC has been restarted.

16 Once the computer has been restarted, notice that a new icon in shown on Windows Status Bar. Right-Click on it to open contextual menu (listed options might vary depending on installed product): This icon will indicate filtering status or additional operations being performed at a given moment: Icon Meaning

17 Filer Active Filter has been deactivated manually. Software or anti-virus signatures are being updated. Scanning for viruses License has expired. No filtering is being performed unless a license is acquired.

18 5 GENERAL This section gives an overview of the tools, services and basic actions to the proper functioning of OPTENET Security Suite. 5.1 OPTENET Security Suite Optenet Security Suite Console can be accessed: a. From the Windows Start menu. b. Right-clicking on the Optenet icon on the windows status bar and selecting [Optenet Security Suite Administration]. An administrative password is required to prevent unauthorized access (this is the password indicated at installation time). In case you do not remember the password for access to the administration, by clicking on "Forgot your password" two ways to recover the password will be proposed: The first is to correctly answer the challenge question that was entered during installation. If the answer is correct, a new pop inform what the password is.

19 The second way to recover the password is by " ing". Clicking this option, the program will send an with the password to the address that was entered during installation. Once the password has been entered correctly, the administrative console will be shown: Optenet Security Suite includes the following sections (when available, and depending on licensed product): a. Web Filter b. Anti-virus

20 c. Firewall From this page of the management console can, the status of their services (enabled, disabled and non-contracted) can be checked and also modified it if desired. To change the status of a service, you have to click on the appropriate button: To activate the service, you will have to click on the "Activate" button. To deactivate the service, you will have to click on the "Disable button. The Parental Control feature, in addition to "On" or "Off", you can be in a third state: "Monitor". This mode is useful for when the administrator does not want the filter to intervene and filter navigation, but to save a record of what you have browsed (generating navigation logs). From this screen, we can also view and modify the level of Antivirus and Firewall protection. To do that, you have to click on the 'Change the level of protection' available for these two services. While Parental Control, you can change the navigation profile. Non-contracted services come identified and can be contracted directly through the management interface itself: In the case any services has been contracted (or all contracted services are disabled), the icon in the menu bar OPTENET appear in red:

21 5.2 Change Password In this option from the main menu, you can configure some aspects of access to the product configuration interface. The first option is the one that allows the management and "Change Password" to access the management interface:

22 On the other hand you can edit the question and answer for the "Password Recovery": And finally, you can edit the "Session Timeout" that can have the management console. This precaution is of interest to ensure that administration window left unattended for some time cannot be used more and has to re-authenticate to access it. 5.3 License Management In this section you can check the OPTENET license status.

23 In the case of getting any problems with it, this notification will be displayed as follows: If required, you can also modify the product license code by clicking on "Enter new license", and enter the new license that must have been provided previously by the OPTENET support. In case the license has expired, an alert warning of the situation will be displayed. In these cases, the software stops the services and cut-off the navigation to advice of the situation.

24 This screen provides different options: To contact the customer service center from OPTENET. To request a new license or at least, go to OPTENET portal where you can find out what is happening with the license or just manage it. Enter the administration password to retrieve the navigation, but with no Parental Control service is provided! 5.4 Software Update Software and virus databases updates can be made fully automatic and transparent so that the user does not have to worry about when we released new versions and updates. In the case of software updates, it is first shown the current product version and the date of publication or update. It also provides options for updating the Software:

25 Let the software automatically find the new versions and in case exists a new one, propose: Update automatically. Inform its existence to the user to decide when to update. Find a new software update manually (button "Search for updates") Any changes made must be saved by clicking on the 'Save Changes'. The button 'Restore' retrieves the last saved configuration. Useful when you are not sure if it has changed something from the current display settings. In the case of database updates of Antivirus, displays information about the Antivirus engine: Antivirus engine integrated version, number of signatures in the database, the date of the last update, etc... The default AV update is performed automatically (each time the software is restarted, and then every two hours), but the user can always set the schedule at his convenience.

26 In case you are completing an update (either the software or Antivirus bases); the OPTENET icon shown in the menu bar will appear in blue: 5.5 Proxy settings In certain environments where OPTENET Security Suite is used, it is possible that the internet has to go through an intermediate proxy (businesses, schools, etc...). For updates to run normally, it is recommended to set the proxy settings:

27 5.6 Help For any questions about OPTENET, you can download the manual available in PDF format.

28 6 PARENTAL CONTROL You must have purchased the Parental Control service to access its management. If not, as a first window in the Parental Control section, it is shown an invitation to contract the service. The Parental Control feature included in the OPTENET Security Suite presents a complete range of functions that we will describe in the following sections. The main Parental Control screen provides general information about the service. You can check the status and access for editing the navigation profile: 6.1 Profiles Parental Control provides several predefined profiles adapted for each age. The administrator can also adjust the settings for each profile according to the needs and concerns over the contents that can be accessed. Here is the list of predefined profiles: Restricted: with only access to the contents of the global white list profile. Child: Child Portal navigation and global whitelists profile. Adolescent: blocking unsafe and unfit content for teenagers. Custom: you can define and adapt to detail the profile navigation Secure: protects profile from surf threats (malware, phishing, hacking,...) Adult: internet access without restrictions except global blacklists profile. On this screen you can define to which profile belong each windows users. By default, just installed, users belong to the profile "teen". However, the administrator is free to move a user (by clicking on the Windows user name, dragging and dropping the item) to the profile you want to associate. As shown in the attached image, users belong by default to "teen" profile but then some were relocated (user "optenet" as Profile "Custom" and the user "Administrator" and "Adult"). By default, if it is detected that a new Windows user had been created, it would automatically be assigned in the profile "Teenager" (although the administrator can always change the default group).

29 6.2 Configuration The Parental Control provides several predefined profiles adapted for each age and use. In any case, the administrator can always modify these profiles to suit needs and concerns about the content what is allowed to access. To do so, for each profile there are certain features that can be configured: Restricted: Since it only allows access to the contents of the global whitelist, and whitelist own profile, you can only configure the "White and black lists" and "Browsing time". Child: Only allow access to the children portal and the white lists (global and own Profile), so you can only configure the "Browsing time", "white and black lists", "Application Filtering", "Types file "and" port filtering ". Teen and Custom: For these two profiles it can be set all the functionalities and features: "Categories", "Browsing time", "white and black lists", "Application Filtering", "File Types", "Filtered by keyword "," port filtering "and" Advanced ". Secure: this profile is limited to protect the computer from threats (malware, phishing, hacking...) so you do not have to configure or "Categories" and "Browsing time", while the other functions do remain configurable. Adult: This profile has a full Internet access, so the only thing you can configure is the "White and black lists".

30 To switch from one profile to another, simply move the cursor on the horizontal bar: Below we will detail information about configurable features: Categories It provides a list of categories and content that Parental Control can categorize, and therefore, that can be blocked if configured by the administrator. By default is blocked the content that may be unsafe for PC (phishing, spyware) or not appropriate for children or adolescents navigation.

31 To block or not a category, just click on it and save the changes. When a page has been blocked because of its categorization, it is shown a blocking page similar to this one:

32 6.2.2 Browsing schedules You can configure whether navigation is allowed without any restriction of time or limits the hours when Web browsing (HTTP and HTTPS) is permitted. When you are defining browsing schedule: It is possible to define several navigation intervals for each day of the week, so you can navigate only within that time frame, outside, navigation will be blocked. If for a particular day nothing is defined, it is assumed that by default, you can browse all that day. You can set the weekly and daily number of hours that you can navigate. Once exceeded this limit will block navigation and a page explaining the reason for blocking will appear.

33 You can define time range independently (per day) or jointly, so that every day of the week will have the same configuration:

34 When a page has been blocked by the browsing scheduled, it is shown a block page like this:

35 6.2.3 Black and White Lists You can define specific URLs or domains to allow or block web. To do so, you can use wildcards to include an entire domain or any request regardless of its parameters. Examples: *.optenet.*: with this setting, you can accept or reject any URL containing the string ". optenet." for example: images.optenet.com, / test with this setting, you can accept or deny all of the aforementioned pages belonging to the host. with this input, you can accept or reject all attempts to access from the users whose name starts with "foo". When a page has been blocked by the configuration list, it is shown a block page like this: Notice: global lists have higher priority than the particular defined for a particular profile Applications manager You can set filtering rules (allow / deny / permit by time) on different types of applications:

36 Peer to peer: Torrent, Kazaa, Emule, etc. Instant Messaging: Skype, Microsoft Messenger MSN, oovoo, Yahoo Instant Messenger, etc. Mail: Regulates the use of via protocols POP3 (port 110), SMTP (port 25) or IMAP (port 143). Newsgroups: NNTP Chat: Chat application like mirc, etc. Virtual worlds: Second Life For each group of applications, you can define: Permitted access to the programs and applications for that protocol category is permitted. Blocked access to the programs and applications for that protocol category is blocked. Scheduled access is regulated by time, depending on the timeframes specified in the Surf Schedule table: o On the days where a timeframe is specified, access will be permitted only on those timeframes.

37 o day. On the days where a timeframe is not specified, access will be permitted the entire Filter types The Parental Control allows you to block downloading certain types of files on your PC. To do so, simply select and check the pre-defined extensions. You can always also define new extensions. Example:

38 6.2.6 Keyword filtering In addition to filter by category, you can specify certain keywords that will cause blocking to those websites that contain them. You can use partial words as "pornogra" (so you can block web content with words like "pornography" or "pornographic"), or you can even use the asterisk '*' as a wildcard symbol to include words that contain part of an expression. You can also specify whether the search keywords will be done in the URL will be accessed and / or in the content of the page.

39 When a page is blocked because found a keyword in the URL, it displays a message like: Port filtering In this section you can configure the ports to which you can establish or deny connections. There are two ways to work or manage this configuration: Allowing access to all ports, except a few that are explicitly defined as blocked. Blocking access to all ports, except a few that are explicitly defined as allowed.

40 There are several exceptions to be taken into account in the management of ports: Configurable ports in this section may not correspond with default ports of other applications (that can be configured in the section "Application Filtering"), so you can configure ports like 80 and 443 (HTTP / HTTPS) 110, 25 and 143 ( ). Although requests are destined for connections to different ports than 80 or 443, if the content and protocol analyzer identifies HTTP communication, then port configuration is skipped and process the connection as configured for HTTP / HTTPS browsing Advanced Options There are some more advanced options that the administrator can set for the profile. This is automatic activation "SafeSearch" for popular search engines (Google, yahoo and bing) so that they restrict the results, and avoid displaying search results that have identified himself as "adults only"

41 So the results returned by the search engine itself, already have a filter applied: 6.3 Whitelists and blacklists The configuration of global black and white lists is independent of the configuration of lists that may have a specific profile. Moreover, the global lists have higher priority than the particular defined for a particular profile.

42 The syntax of how you can entry new values in the list as well as its usability is the same as the one defined for a profile lists (see section above). 6.4 Contribution If you believe that some content is not properly classified, you can let them know to OPTENET filling out a simple form and pressing the submit button. If the user indicates the address, he will receive a confirmation once the direction has been reviewed and correctly classified, if appropriate. 6.5 Reports From this section you can view a summary of information about the actions taken by the Parental Control.

43 By default, it shows the reports collected in the last week. You can perform reports for certain dates deploying the option 'Show search reports by date': By clicking on the line in the report itself, we will see a summary of the data collected at the bottom: The full report can also be opened in a text editor from the summary above (by clicking directly on 'Open in a text editor') or by clicking the icon on the right as shown below:

44 You can also delete reports, just select them and press "Delete Selected Reports": 6.6 Advanced settings As part of an overall advanced settings for Parental control (and as such, not subject to a particular profile), it exists the following functionalities:

45 6.6.1 Repeated attempts blocking You can block web browsing user who repeatedly tries to access (10 different websites) banned by content filtering rules from Parental Control. The corresponding block page briefly explains why browsing is blocked: If you provide an address, the administrator will be notified with the name of the blocked user Browser filtering Parental Control provides the ability to completely block certain browsers navigation. This may be of interest to those administrators with security policy prohibiting the use from some of them.

46 6.6.3 Excluded web domains For proper operation of the software, it is convenient (and sometimes necessary) that certain URLs are not treated by the Parental Control, so that they are always accessible (regardless of active navigation profile, schedules, categorization or state license). It is usual to allow this access to privileged OPTENET servers, Windows update servers, Bitdefender, etc...

47 7 ANTIVIRUS Service only available with SecuritySuite license. You must have purchased the Antivirus service to access the management. If not contracted yet, it can be done clicking the button to "Purchase". 7.1 Antivirus The antivirus included in the Optenet Security Suite offers a complete range of functionality that we will describe in the following sections. From the main screen of Antivirus, provides an overview of the status. You can see both the operating status and the level of protection, the scan settings or quarantine. From this screen you can directly access each of the options listed for modification or query in detail.

48 7.2 Protection Level In the Optenet Security Suite Anti-virus section, the level of protection for the computer can be configured. The available levels of protection are: High: maximum protection Recommended: best compromise between protection and resources consuming. Customized: protection can be personalized. Only when the Custom mode is selected, the User can fine-tune the behavior of the Antivirus (Anti-virus techniques and files to be analyzed): Analyze programs included in compressed files Analyze self-extract executables. 7.3 Analysis In this section, the Anti-virus can be launched and an analysis performed, based on the default parameters, and custom settings for the analysis can be configured. When the analysis window is closed, the analysis goes on and informs users through the following message:

49 The different types of analysis are: On demand analysis It allows four different types of analysis: Complete analysis of the PC: Make a thorough analysis of the entire system both running programs as file systems (hard drives, CD / DVD, USB...). The progress of the analysis is shown as follows:

50 Express Analysis: Perform a quick scan of the computer including the running programs, the system directory and the more prone to malware attacks. Analyze folder: Make a scanning of the selected folder. This will need to press the 'Browse' button which will open a new window from which you can select the folder to be scanned. The progress of the analysis is shown as follows:

51 Custom analysis: This analysis allows analyzing memory or file system, you can select the action to take if a virus is found.

52 You can select the file system to analyze and the folder or folders that you also want to do the analysis. The Antivirus also can select the files to be analyzed based on its extension. They should write the desired extension and click the 'Add' button:

53 And remove them when no longer wish to analyze by selecting them and pressing the 'Remove' button. During the analysis you can define the action to take in case a virus or a suspicious file is detected:

54 7.3.2 Scheduled Analysis From this section of the Antivirus, you can perform memory analysis and selected files as described in the section 'Custom Scan' can also set the time of execution of this analysis When starting the execution of a programmed analysis, Optenet Security Suite will alert with a balloon message in the systray zone.

55 7.3.3 Set active process analysis To access the configuration of this analysis, it is necessary to select the level of protection: Custom. Configure the monitoring of all read and write operations of the processes running on the computer. This analysis is fully automatic and transparent. Select the file systems to analyze and folder or folders to exclude from scanning.

56 The Antivirus can also select files to be excluded from real-time monitoring. You should write the desired extension and click the 'Add' button: If you want to eliminate them from the analysis, select and press the 'Delete' button. During the analysis you can define the action to take in case a virus or a suspicious file is detected:

57 7.4 Reports From this section you can view a summary of the actions taken by the Antivirus. By default, it lists the reports collected in the last week. You can perform a search report from a certain period deploying the option 'Show search reports by date':

58 By clicking on the line in the report itself, we will see a summary of the data collected at the bottom: The full report can also be opened in a text editor from the summary above (by clicking directly on 'Open in a text editor') or by clicking the icon on the right as shown below: You can also delete reports, this will require select them and press "Delete Selected Reports":

59 7.5 Quarantine From this section you can view the files that Antivirus has quarantined. The files that appear in the quarantine can be unlocked or removed definitively. This will require selecting them and pressing Restore Selected Files or Delete selected" respectively.

60

61 8 FIREWALL Service only available with SecuritySuite license. You must have purchased the Firewall service to access management. In case the service is note contracted, you can get it by clicking "Purchase" button. 8.1 Firewall The firewall included in the Optenet Security Suite offers a complete range of functions that allow you to manage Internet access to applications. The Firewall screen provides an overview of the status. You can see both the operating status and the level of protection, control timing or configuration of the different sections (application control, filtering services...). From this screen you can directly access each of the options listed for modification or query in detail.

62 8.2 Protection Level In the Optenet Security Suite Firewall section, the level of security for the computer can be configured. The available levels of security are: High : maximum protection Recommended: best compromise between protection and resources consuming. Customized: protection can be personalized. Only where the Customized mode is selected, the User can fine-tune the behavior of the Firewall:

63 Both in [High] and [Recommended] levels, preset configuration will be used. Only in case of selecting the [Customized] Protection level, changes to the configuration being done in the different sections will be allowed to be saved. 8.3 Application Control The management of this section must be done under the Custom security level. In this section, access to the Internet can be granted to applications. Initially, the list includes applications that normally have access to the Internet when they are executed.

64 If you do not automatically allow access to signed applications will be treated according to the general configuration. The firewall can be configured so that it alerts the User whenever any new (unknown) application (not included in the list) attempts to access the Internet and optionally activate sound alerts. If alerts are activated, whenever an application tries to access the Internet a balloon will be shown over the Optenet Security Suite icon (on the windows status bar), asking for instructions and the appropriate action to take: Allow always (in and out): Internet access for this application (input or output) will always be allowed. Block always: Internet access for this application (input or output) will always be blocked. (this configuration can be changed later). You can also select from the following options: Ask every time you run the application Monitor Activity Program

65 If no action is chosen after a given period of time, the default action will be applied (See below). The options available by selection the default action to apply when a new application attempts to access the Internet are: Allow always. Internet access for this application (input or output) will always be allowed Block always. Internet access for this application (input or output) will always be blocked If no option is selected by default in the previous menu and no action has been selected in the previous dialogs for a certain period of time, the default behavior of the solution is "Block Always". All applications containing this alert, will be included in the list of "Other Applications" that shows the interface. Your configuration will depend on the settings you have chosen in the alert. For this action to be contained in the reports, it will be necessary to edit within the 'Predefined applications' the 'Presets' and check the box "Monitoring the program saving activity reports", save the changes before exiting.

66 Finally, you can define what type of input and output services are allowed or denied for each application from the list of known applications. To do this, you must click on the option "Edit" on the application and the following screen: You can also add new applications, pressing the "Add Application": Then you can choose the application browsing the computer's directory tree:

67 And once selected, can be configured through the following screen: At this point it is possible to select the application to be included and further configure them in the same way as previously described in the case of default applications. For each application, you can configure the methods of operation both input and output. For each, you can:

68 Define if you want the application to use any of the services defined, or, determine what services are to be allowed. For example, in the case of the "Input services allowed, it will be selected as shown in the following figure: And when we are enabling services (input and / or output) that an application can use, you can also define from where they can: o o Public: all IP Private: only allowed IPs that have defined within 'IP Filtering' section 'allowed IPs' (see section f) of this chapter). For example, in the case of the "allowed input Services', it will be selected as shown in the following image. Boxed in red refers to the reference parameter 'private' in its corresponding screen:

69 Do note that it only keeps track of the activity of applications that have been specifically marked for monitoring. You need to check the box "supervise the program saving activity reports." When you check this option, from the "Reports" section, you can ask for the actions taken by the Firewall (see paragraph h) Reports of this section) To register in the initial action reports by the Firewall for each application that is not included within "Other Applications", you should edit within the 'Predefined applications' the 'Presets'. In the new window that appears, check the box there to "supervise the program saving activity reports." 8.4 Service configuration The management of this section must be done under the Custom security level.

70 The services defined in this section will be the ones that can be used by applications (allowed, denied etc) e.g.: define that telnet.exe can apply telnet services that in turn are defined as a set of TCP and/or UDP Port ranges. Specific services can be created defining TCP and UDP port ranges to be allowed or blocked (when used by the different applications). From the section 'Application Control', you can associate the services here defined to each applications in order to allow the application. The services configured by default are: Telecommunication Network (telnet) Service Message Block (SMB) Hypertext Transfer protocol (HTTP) Hypertext Transfer Protocol over TLS/SSL (HTTPS) Domain Name Service (DNS) Secure Shell (SSH) Remote Procedure Call (RPC) Simple Mail Transfer Protocol (SMTP) Resource Location Protocol (RLP) Host Name Server (HNS) Network Printing Protocol (NPP) Post Office Protocol version 3 (POP3) Simple File Transfer Protocol (SFTP) Dynamic Host Configuration Protocol version 6 client (DHCPC) Dynamic Host Configuration Protocol version 6 server (DHCPS) Internet Key Exchange (IKE) Dynamic Host Configuration Protocol (DHCP) Universal Plug and Play (UPnP)

71 Remote Desktop Protocol (RDP) To define the range of TCP and UDP that should be allowed or blocked select 'Edit' on the corresponding service coming to the following screen: 8.5 IP Configuration The management of this section must be done under the Custom security level. The firewall service also offers the ability to manage in real-time IP address ranges used by applications in communications. In the Firewall configuration section, two lists of IPs can be defined: Permitted IPs: White list of IPs with which the computer can establish a connection. Blocked IPs: Black list of IPs that are unable to establish a connection with the computer.

72 8.6 Reports In this section, a summary report can be viewed on the actions taken by the Firewall. Additionally in this section, log files to be deleted automatically to save disk space can be programmed.

73 NOTE: This only keeps track of the activity of applications that have been specifically marked for monitoring from the Firewall section: Application Control. By default, it lists the reports collected in the last week. But from the 'General' tab you can perform a search report from a certain time deploying the option 'Show search reports by date': By clicking on the line in the report itself, you will see a summary of the total number of blocked and allowed connections:

74 The summary of the selected report also appears when you click on the actual line of the report you want to query. The full report can also be opened in a text editor from the summary above (by clicking directly on 'Open in a text editor') or by clicking the icon on the right as shown below: You can also delete reports, this will require select them and press "Remove Selected Reports":

75 From the tab "Monitoring" it can be viewed in real-time connections that are established on the computer at the time of the query.

76 Moving the mouse over the 'application' of a connection, you can visualize the full path from which the application is running: 9 UNINSTALL To uninstall the Optenet Security Suite, use the shortcut created in the Start menu of your computer, or does it from Control Panel -> Add or Remove Programs. During the uninstall process you are prompted for administrator password, thus preventing anyone succeed in eliminating the program. If during installation process, the program realizes that there are elements in quarantine, before proceeding to delete and continue uninstalling, it is inviting the user to review them, in case you were interested in recovering some files. Do not attempt to uninstall the program by removing Antivirus and Firewall directories will damage irreparably installation and completely lose Internet access. Always use your computer's access to uninstall the software. If you run the installer application Security Pack on a machine that already has the software will start the process of uninstalling the previous version (with the introduction of the administrator password) without overwriting files.

OPTENET PC Web Filter. Version 10.09

OPTENET PC Web Filter. Version 10.09 OPTENET PC Web Filter Version 10.09 COPYRIGHT No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com

USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com 06-06-2008 1 2 CONTENTS 1. INTRODUCTION... 6 2. INSTALLATION STEPS... 7 3. SET-UP... 10 3.1. Filter status: Activating/ Deactivating...10

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Safe internet: Getting Started Guide

Safe internet: Getting Started Guide Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

User's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes

User's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes NAME OPTENET WEBFILTER PC Company Optenet S.A. Version 10.09.69 Type of product Devices supported Operating systems Client Computer Windows XP Sp2 Windows Vista (32 and 64 bits) Windows 7 (32 and 64 bits)

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company

Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company Web Filter SurfControl Web Filter 5.0 Installation Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company NOTICES NOTICES Copyright 2005 SurfControl plc. All rights reserved. No part

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

Basic Administration Guide

Basic Administration Guide *Formerly Panda Managed Office Protection Copyright notice Trademarks Panda Security 2010. All rights reserved. Neither the documents nor the programs that you may access may be copied, reproduced, translated

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix

Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Standard Setup Guide 1 2 3 4 5 Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Read this manual carefully before you use this product and keep it

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

IsItUp Quick Start Manual

IsItUp Quick Start Manual IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

Installation Instructions Release Version 15.0 January 30 th, 2011

Installation Instructions Release Version 15.0 January 30 th, 2011 Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Comprehensibility: Look and Feel: Time to install and configure: 130 minutes NAME PROFIL PARENTAL FILTER 2. Profil Technology. Company. Version 2.4.

Comprehensibility: Look and Feel: Time to install and configure: 130 minutes NAME PROFIL PARENTAL FILTER 2. Profil Technology. Company. Version 2.4. NAME PROFIL PARENTAL FILTER 2 Company Profil Technology Version 2.4.0 Type of product Devices supported Operating systems Client Computer Windows 7 (32/64 bit) Windows XP (32/64 bit) Windows Vista (32/64

More information

How to set up popular firewalls to work with Web CEO

How to set up popular firewalls to work with Web CEO How to set up popular firewalls to work with Web CEO Contents How to set up popular firewalls to work with Web CEO... 1 Setting up Agnitum Outpost Firewall 2.5... 2 Setting up Black ICE 3... 6 Setting

More information

NetBak Replicator 4.0 User Manual Version 1.0

NetBak Replicator 4.0 User Manual Version 1.0 NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

F-SECURE INTERNET SECURITY 2012

F-SECURE INTERNET SECURITY 2012 NAME F-SECURE INTERNET SECURITY 2012 Company F-Secure Corporation Version 1.62 Type of product Devices supported Operating systems Client Computer Windows 7 (all editions) Windows Vista Windows XP Home,

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

Zimbra Connector for Microsoft Outlook User Guide 7.1

Zimbra Connector for Microsoft Outlook User Guide 7.1 Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual

More information

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0 Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:

More information

escan Corporate Edition User Guide

escan Corporate Edition User Guide Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Installation Guide For ChoiceMail Enterprise Edition

Installation Guide For ChoiceMail Enterprise Edition Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Avira Internet Security FireWall. HowTo

Avira Internet Security FireWall. HowTo Avira Internet Security FireWall HowTo Table of Contents 1. Basic knowledge about the Firewall... 3 2. Explanation of the terms... 3 3. Configuration Possibilities... 5 3.1. Security Level...5 3.1.1 Block

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

IBackup Drive User Guide

IBackup Drive User Guide IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

Avira Exchange Security Version 12. HowTo

Avira Exchange Security Version 12. HowTo Avira Exchange Security Version 12 HowTo Table of contents 1. General information... 3 2. System requirements... 3 3. Installation of Avira Exchange Security...4 4. Licensing... 5 5. Configuration of Email

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

contents 1. ESET Smart Security...4 2. Installation...5 3. Beginner s guide...9 4. Work with ESET Smart Security...12

contents 1. ESET Smart Security...4 2. Installation...5 3. Beginner s guide...9 4. Work with ESET Smart Security...12 Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware ESET Personal Firewall ESET Antispam New generation of NOD32 technology User Guide we protect your digital worlds contents 1. ESET Smart

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32) NAME Windows Live Family Safety Company Microsoft Version 2012 Type of product Devices supported Operating systems Price* Client Computer Windows 7 (32 or 64 bit edition) Windows Vista Service Pack 2 Windows

More information

Sage HRMS 2014 Sage Employee Self Service

Sage HRMS 2014 Sage Employee Self Service Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

Technical Brief for Windows Home Server Remote Access

Technical Brief for Windows Home Server Remote Access Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

CentreWare Internet Services Setup and User Guide. Version 2.0

CentreWare Internet Services Setup and User Guide. Version 2.0 CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and

More information

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products

More information

Verizon Internet Security Suite Powered by McAfee User Guide

Verizon Internet Security Suite Powered by McAfee User Guide Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0

Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0 Zimbra Connector for Microsoft Outlook User Guide Network Edition 7.0 February 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks

More information

Central Management Software CV3-M1024

Central Management Software CV3-M1024 Table of Contents Chapter 1. User Interface Overview...5 Chapter 2. Installation...6 2.1 Beginning Installation...6 2.2 Starting the CMS software...10 2.3 Starting it from the Start menu...10 2.4 Starting

More information

Burst Technology. bt-webfilter User Guide

Burst Technology. bt-webfilter User Guide Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com

More information

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the

More information

User's Guide. Copyright 2013 Bitdefender

User's Guide. Copyright 2013 Bitdefender User's Guide Copyright 2013 Bitdefender Bitdefender Internet Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

How to Install Windows 7 software

How to Install Windows 7 software Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT

NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT You can read the recommendations in the user, the technical or the installation for NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT 4.0. You'll find the answers to all your questions on the NOVELL ZENWORKS

More information

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against

More information