QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10

Size: px
Start display at page:

Download "QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10"

Transcription

1 QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10

2 About This Guide The intention of this guide is to provide a step through of the initial installation of Kaspersky Security Center 10 and deployment of Kaspersky Endpoint Security 10 in Standard Installation mode (default). NOTE Standard Installation includes anti-malware and firewall technologies plus endpoint control features (Application Control, Web Control, and Device Control). There is the ability to modify the installation package in order to install Endpoint Security in other modes. This is documented in Kaspersky Security 10 for Windows Administrators Guide. Please consult your reseller or sales channel in order to discover more about the available tiers with Kaspersky Endpoint Security for Business. This guide also offers best practice recommendations covering two of the Kaspersky Security for Business tiers, namely Core and Select. Please note that this guide does not replace previously released deployment or administration guides from Kaspersky. Moreover, this is an aid to enable a quick start of the system there is recommended reading of other documentation and resources, as mentioned in the Further Information section below. CONTENTS CHAPTER ONE Installation of Security Center and Endpoint Security Prerequisites for Installation 4 Installation of Security Center 5 Configuring Security Center Using Quick Start Wizard 10 Deploying Kaspersky Protection 12 Task Creation 1 - Deploy Network Agent Task 13 Task Creation 2 - Remove Existing AV Software task 15 Task Creation 3 - Deploy Kaspersky Endpoint Security Task 16 Task Creation - Result 18 Assigning Client Machines 18 CHAPTER TWO - Protection Management and Best Practises Admin Server Settings & Policy Recommendations 20 Kaspersky Security Center Settings 20 Network Agent Settings 22 Kaspersky Endpoint Security 10 for Windows settings: servers* and workstations 23 Kaspersky Endpoint Security 10 settings: Windows Servers* specific features 27 Task Recommendations 28 Update Task Recommendations 28 Virus Scan Task Recommendations 29 CHAPTER THREE - Working with Reports and Notifications An Introduction to Reports and Notifications 31 Working with the Statistics Dashboard 31 Configuring Your Dashboard 32 Configuring Computer Statuses 32 Event Notifications automatic delivery 33 Reports scheduling delivery, creating templates & on-demand 34 Computer Selections displaying specific information 34 SUMMARY 35 2

3 CHAPTER ONE INSTALLATION OF SECURITY CENTER 10 DEPLOYMENT OF ENDPOINT SECURITY 10 TOPICS COVERED INCLUDE; INITIAL DEPLOYMENT OF SECURITY CENTER 10 AND ENDPOINT SECURITY 10; QUICK START CONFIGURATION AND MIGRATION FROM EXISTING ANTIVIRUS SOFTWARE 3

4 PREREQUISITES FOR INSTALLATION The installation of Kaspersky Security Center 10 includes all the software components needed to start deploying Kaspersky Endpoint Security 10 to the network. Kaspersky Endpoint Security 10 - Supported Operating systems and Requirements: 1 GB of free hard drive space Intel Pentium 1 GHz or faster 1 GB RAM Microsoft Windows XP Professional SP3 or higher Microsoft Windows Server 2003 Standard SP2 or higher For workstations, a complete listing is available here: For servers, a complete listing is available here: Kaspersky Security Center 10 Admin Server, Database Server and Web Console Requirements: 1 GHz or higher. 1.4 GHz is a minimum for a 64-bit OS. 1 GB.RAM 10 GB.of free hard drive space Most versions of Microsoft SQL 2005 and SQL Express 2005 or higher Various versions of MySQL The database server can be separate to the Admin server A complete listing is available here: Kaspersky Security Center 10 Server Installation Changes: The first step is to install Security Center, and if not already present, the following applications required for Kaspersky to operate will also be installed: Microsoft Windows Installer 4.5 Microsoft Data Access Component 2.8 Microsoft.NET Framework 2.0 SP2 MSXML 4.0 Microsoft SQL Server 2008 Express SP2 (you can use existing SQL) As well as these pre-requisites plus SQL services, the Security Center installer will install some, or all of the following Services listed here: The Security Center comes prepopulated with Kaspersky Endpoint Security 10 ready to install to both Windows servers and workstations so there is no need to download separate setup files. If Linux or Mac protection is needed please approach your contractual support channel, who will direct to the relevant Kaspersky downloads. 4

5 INSTALLATION OF SECURITY CENTER To start the installation of Security Center, run the downloaded executable. Click Next to start, and on the preceding window, read and then Agree to the License Agreement. A Custom install allows for extra configuration such as specifying the SQL database to be used, naming the shared folder and crucially entering the account that will run the Kaspersky Administration Server service. Once this account is set you do not need to add accounts to run specific Tasks (assuming you specify an account with rights to all managed machines, such as an account with Domain Admin privileges): Note the three checkboxes - these offer support for implementing Kaspersky NAC (Network sniffer and Access Control option), Cisco NAC and administration of Mobile devices running Kaspersky Security for Mobile. Select these options if applicable. NOTE! - Selecting these options may run additional services and will open ports on the Admin server. Please approach your contractual support channel. You can select the appropriate Network Size option, dependent on your requirements: 5

6 Please see the following table for information on choosing the correct Network Size: Specify an account to run the Kaspersky Administration Server service. This account ideally needs to have admin rights to all PCs that will be managed by the Security Center, so that deployments can occur successfully: By default SQL 2008 Express will install on the same machine as the Security Center: 6

7 If you have an existing SQL server and wish to use this, click Choose existing. If you would like to discuss this option further please approach your contractual support channel: There is the option to designate a shared folder used to store the installation packages and updates: Ports and (both TCP) are used for communication between the Admin Server and Network Agent. These are the default ports recommended by Kaspersky we advise not to change these, unless there is a conflict with existing software: 7

8 It is recommended to use the static IP address for the Administration Server address: Kaspersky Security Center can manage different versions of Kaspersky endpoint protection. Choose the appropriate plug-ins to be installed, in order to have the ability to create policies and tasks in order to centrally manage these endpoints: Click Install to start the installation as per your choices made in the previous steps: 8

9 Installation will proceed including a prompt to agree to the EULA for the console plug-in(s): Once the installation has completed, there is the option to Start Administration Console which in turn will launch a Quick Start Wizard: 9

10 CONFIGURING SECURITY CENTER USING QUICK START WIZARD Follow the Quick Start Wizard in order to enter your Activation Code and configure the use of; Kaspersky Security Network; SMTP server; proxy connections: Keep Automatically deploy key to managed computers box checked: Activating requires a code. The code is sent to the Kaspersky Lab activation server which returns the appropriate key files. These keys are used to license the endpoint protection (in Security Center click Repositories > Keys) but also may unlock additional functionality of Security Center (right click Admin Server > Properties > Keys): Additional functions may include Kaspersky Endpoint Security with Encryption, Mobile Device Management, System Management Edition. Please approach your contractual support channel for more information. 10

11 The Kaspersky Security Network is an advanced cloud based technology, providing an Urgent Detection System to combat new threats as well as an application categorisation and reputation service. The service is free and only passes anonymous, basic, information into the cloud. This is an opt-in service that benefits many modules of Kaspersky protection. More can be read here: ksn.kaspersky.com The initial protection policy to cover desktop and servers is created along with applicable tasks. Note the automatic creation of the Download Updates and Backup Tasks for the Administration Server: For deployment of endpoint software, it is recommend to leave Start protection deployment unticked and follow the next section: 11

12 DEPLOYING KASPERSKY PROTECTION It is recommended to deploy the Kaspersky Network Agent and Kaspersky Endpoint Security packages separately. Whilst you can install both at once, a more staggered approach benefits from granular real-time reporting and increases availability to troubleshoot at different stages of the deployment. Click Managed Computers > Create a subgroup then enter an appropriate name. The below example is called Deployment: All deployment tasks will be created within this group and due to their nature will target any machines residing in the group (by default, overwrite installations will not happen) A word about task creation and scheduling Tasks can be created very easily and can either reside at the Tasks for specific computers node (whereby you can target already managed clients or newly discovered Unassigned machines) or as a Group Task within an existing group or subgroup. These groups reside in the Managed Computers section (this task will target every appropriate machine in the group and subgroup). With regards to scheduling tasks to run there is the Define task launch automatically check box. If this option is on, manual settings for randomization period is disabled, and administration server automatically recalculates the randomization period on every task properties modification based on the current target computers count for the task. 12

13 TASK CREATION 1 - DEPLOY NETWORK AGENT TASK Choose Create a task and name it accordingly > Next: Choose Install application remotely > Next: Select the Network Agent package > Next: 13

14 Click Next: Make sure Do not restart the computer is selected. Click Next: Click Next through the Accounts screen (this is only needed if you are in a Workgroup environment). Keep Scheduled Start to Manually > Next: Click Finish the task will be created. 14

15 TASK CREATION 2 - REMOVE EXISTING AV SOFTWARE TASK Choose Create a task and name it accordingly > Next: Choose Uninstall application remotely: Choose Uninstall the incompatible application: Select the appropriate AV, in this case AdAware has been chosen. Click OK then Next 15

16 Choose a restart option (this is needed before Kaspersky can be installed into previously-protected machines): Click Next through the Accounts screen (this is only needed if you are in a Workgroup environment). Change the Scheduled Start so that the Removal task runs on successful completion of the previous task (Deploy Network Agent task): Proceed through the Wizard and click Finish TASK CREATION 3 - DEPLOY KASPERSKY ENDPOINT SECURITY TASK The third and final task should be created in a similar manner to the previous (Create task > Install application remotely making sure to choose the Endpoint Security package). This can be set to run on successful completion of the removal task and runs automatically after the reboot of the client machine. The following screenshots overleaf have points to consider: 16

17 NOTE make sure that the Network Agent is not selected when creating this package: A restart after installation of Kaspersky Endpoint is not needed: Set the schedule so this final task runs on successful completion of the AV removal: 17

18 TASK CREATION - RESULT The final result will show three tasks, with the second and third set to run on completion of the first (Deploy Network Agent). Once client PCs are within the Deployment Group, then select the first task 1. Deploy Network Agent task > click Start button: ASSIGNING CLIENT MACHINES Client PCs can be manually placed into managed groups in a variety of ways: Within Unassigned Computers entries can be right clicked > Move To Group By using the Add computers to the group link, in our example, click on Deployment Group > Groups tab Automatic movement of machines can occur by using Relocation Rules. Click Unassigned Computers > Configure rules of computer allocation link. Please refer to Security Center Help files or approach your contractual support channel for information on automatic computer allocation and using Relocation Rules. 18

19 CHAPTER TWO PROTECTION AND MANAGEMENT BEST PRACTISES SOFTWARE COVERED; SECURITY CENTER 10 & NETWORK AGENT 10, ENDPOINT SECURITY 10 AND KASPERSKY ANTI- VIRUS FOR WINDOWS SERVER ENTERPRISE EDITION 8 19

20 ADMIN SERVER SETTINGS & POLICY RECOMMENDATIONS This section makes suggestions as to areas you may wish to consider reviewing. The following recommendations are based on Kaspersky Lab technical and customer-based experiences. Discussed in this section are recommendations that cover not only the Security Center and its operations but also protection and control features of the endpoint software for server and desktop operating systems. Some components are only available to customers with Select licensing and are marked with an asterisk. Kaspersky Security Center Settings Admin Server Backup Task: The Backup Administration Server task is set to run daily by default. You may feel this is too often, depending on the amount of changes you make within Security Center. As such, a weekly backup would suffice: Ensure that the backup location is a remote location, in case of failure of the Kaspersky Admin Server. This location should be write-accessible from the Admin Server: 20

21 Admin Server Events Set all events to be registered on the Administration Server for 60 days except for informational events which should be left on 30 days. The storage time can be increased but it this will increase the database size and should not generally be necessary. Admin Server Keys The Administration Server has multiple functions; these are unlocked during the initial installation, by use of your Activation Code. Binary key files are auto-generated and installed into the below location. Clicking into View restrictions will give details as to the functions available: Settings & Update Agent Assignment By default the Security Center will hold a maximum of 400,000 events 1, this can be increased for very large installs but it could dramatically increase the database size. Providing this document is followed it should not be necessary unless Kaspersky Endpoint Security with Encryption, Systems Management or Mobile Device Management capabilities are licensed and enabled. If this is the case please approach your contractual support channel for more information. An Update agent is a PC within the Administration server network dedicated to store and distribute database updates, installation packages, group tasks and policies. You can assign an Update agent into any administration group. This is achieved by right clicking your Managed Computers group (or a subgroup) > Properties > Update Agents. From here choose to Add and Update Agent and edit accordingly. 21

22 Turn off automatic assignment of Update Agents 2 to groups with over 100 machines: 1 NOTE! Update Agents use Multicast IP technology to reduce the chance of high network loads. It lowers the number of sent packages, and allows automatic installation of applications / execution of tasks as soon as a PC with installed Network agent appears in the network. This is on by default. 2 Virus Outbreak These options should be disabled in the Administration Server settings/policy. These options should be used with caution especially for new installs as infections are often found during initial rollouts which could then trigger an outbreak notification. This powerful feature can be used once you are happy with the security state of your network and configured accordingly to your requirements. Network Agent Settings Settings There is the facility to prevent the uninstallation of the Network Agent through the use of a password. Enable this as shown below: 22

23 Events The registration of most Info events can be reduced or disabled; this will reduce load and shrink the database size: All events save for the exceptions below: Application has been removed Update for program modules has been installed successfully Device connected - reduce to 7 days - reduce to 14 days - reduce to 14 days - reduce to 14 days Kaspersky Endpoint Security 10 for Windows settings: servers* and workstations Protection > File Anti-Virus If all endpoints are to be covered with security then there is a strong argument against scanning across the network for real time operations. In this case, the scanning of All network drives is not needed under Protection Scope settings: 23

24 Advanced Settings > Application Settings When Concede resources to other applications is selected, Kaspersky Endpoint Security suspends scheduled tasks when it detects an increased load on the CPU - this frees up operating system resources for user applications. This helps to relieve the load on the CPU and disk subsystems. It is recommended to use password protection to prevent end users from changing Endpoint settings or uninstalling protection: A word on exclusions and trusted processes By default Security Center will automatically create exclusions and trusted processes in accordance to Kaspersky recommendations and also Microsoft recommendations. These are included within the Trusted Zone section(s) of the policy. Kaspersky exclusions are very flexible and easily implemented, making use of wildcards (*), variables (?) and system variables (%). Exclusions and trusted zone is accessed via Protection > General Protection Settings. See the screenshots overleaf for some examples: 24

25 Further information on trusted zone exclusion masks for Endpoint Security is discussed here: Endpoint Control Device Control* If reporting on Device Control* is required, then further logging should be enabled in order to record the relevant events. The next three screenshots show the Critical, Warning and Info events needed in order to produce comprehensive reporting. These events are: Operation with the device prohibited (a critical event) Temporary access to the device activated (a warning event) Device connected (an info event) Device disconnected (an info event) 25

26 Endpoint Control Web Control* If Web Control* is used then it s also advised to turn on logging of Access to unwanted content successfully attempted after warning: 26

27 A word on best practice scenarios for Application Startup Control* For best practice on the Endpoint Control* elements of Kaspersky Endpoint Security 10 require an understanding of their modes of operation and how this interacts with an organisations operation. As such it s not possible at this time to recommend general best practice settings since these will be scenario based (for instance: Default Deny scenario where all applications are barred from starting except for whitelisted ones; No Gambling During The Working Day where gambling sites are blocked via web content filtering from 9am to 5pm). Please refer to the separate Administrators guide for the endpoint modules: You may also find the link below useful for information regarding application whitelisting: Kaspersky Endpoint Security 10 settings: Windows Servers* specific features There are notable differences between the implementation of the product on Windows workstation and File Server, mostly in the difference between the installed modules: Module/Function Workstation Server File Anti-Virus Mail Anti-Virus Web Anti-Virus IM Anti-Virus Firewall Network Attack Blocker Application Startup Control Application Privilege Control Vulnerability Monitor Device Control Web Control Antivirus scan, vulnerability scan, and update tasks Kaspersky Security Center 10 Network Agent Connector The above features are also dependent on which Tier is purchased Core, Select, Advanced or Total. NOTE! - Care should be taken when setting a single policy for both servers and workstations and as such it is generally advised to separate the policy management for file servers from workstations in the logical network (most easily achieved by creating a separate group for file servers at the same or higher level than the workstations). 27

28 TASK RECOMMENDATIONS Updates and scan tasks, both controlled via Security Center, are discussed below. These recommendations can cover many products. The following pages focus on Kaspersky Endpoint Security 10 (KES 10) and Kaspersky Anti- Virus for Windows Server Enterprise Edition (WSEE). A word about task creation and scheduling Tasks can be created very easily and can either reside at the Tasks for specific computers node (whereby you can target already managed clients or newly discovered unassigned machines) or as a Group Task within an existing group or subgroup. These groups reside in the Managed Computers section (this task will target every appropriate machine in the group and subgroup). With regards to scheduling tasks to run there is the Define task launch automatically check box under the Schedule link on many Tasks. If this option is on, manual settings for randomization period is disabled, and administration server automatically recalculates the randomization period on every task properties modification based on the current target computers count for the task. Update Task Recommendations Update database (KES 10 & WSEE*) Frequency - every 3hrs: Update modules (WSEE* only) Frequency - once per week: 28

29 Virus Scan Task Recommendations Workstation KES 10 (Critical Areas) Tuesday 12:01 Run missed tasks OFF Workstation KES 10 (Full Scan) Manual start Run missed tasks OFF Servers* KES 10 & WSEE* (Critical Areas) Sunday 00:01 Run missed tasks ON Servers* KES 10 & WSEE* (Full Scan) If you choose to run a full scan of the client machine s hard drive, then please choose a convenient time for this to run. Run missed tasks ON NOTE! A default install of Security Center provides a Virus Scan task that targets critical areas only. It is you choice if you wish to create a full scan task or create tasks on a per group basis (for instance a separate scan task applying to a servers group only) * Function/features/software indicated is only available for customers purchasing Select tier or above. 29

30 CHAPTER THREE WORKING WITH REPORTS AND NOTIFICATIONS HOW TO USE THE REAL-TIME DASHBOARD, SCHEDULE REPORTS AND CONFIGURE NOTIFICATIONS. 30

31 AN INTRODUCTION TO REPORTS AND NOTIFICATIONS Kaspersky Security Center 10 enables you to effectively view and manage the protection of your network in a clear, simple manner. Whether you need schedule ed reports, instant notifications or the ability to have drill down reports with connected relevant actions Security Center can accommodate these needs. Many aspects of this view can be customised. A real advantage is the ability to drill-down and discover issues within three clicks then take remedial action immediately. This section is an introduction into working with the reporting and notification functions, it is not provided as a stepby-step guide. WORKING WITH THE STATISTICS DASHBOARD Click into Protection Status page, here you will have an overview of protection. In the below example a Critical machine is referenced: Selecting the Critical link runs a targeted report, showing all Clients with a Critical Status. There may be many reasons for turning Critical. Note the Status Description column in the picture overleaf: Also, there is the ability to right click a computer entry then right click > All tasks > Run a Task (such as an ad-hoc Update or Scan task): This results in the starting of a predefined task, targeting the correct clients in order to rectify their Critical status. This is a great method of working and can result in swift diagnosis and immediate action there no need to drill through the management structure, run a search or guess why a machine is classed as warning or critical. 31

32 CONFIGURING YOUR DASHBOARD The dashboard is an ideal viewpoint and can be customised so that you view only what matters. This makes for a very powerful and efficient management tool when coupled with the ability to act easily on what is displayed, as per above. Select any of the wrench icons as shown below to configure an existing page to: Add further info panels into the page 1 Edit an existing info panel and change its display 2 Create your own new page CONFIGURING COMPUTER STATUSES Security Center will change the status of machines according to the settings contained within the Computer status areas under the Properties of the Managed Computers group and/or sub groups. These settings are inherited throughout the group hierarchy. Default settings include Set computer to Critical if: Not scanned for a long time = More than 14 days; Set computer to Warning if: Not connected for a long time = More than 7 days. Consider changing these variables to suit your needs. Right click on Managed Computers group > Properties > Computer status: 32

33 EVENT NOTIFICATIONS AUTOMATIC DELIVERY Every state change to a client protected with Kaspersky Endpoint Security 8 has an event registered back into the Security Center. This allows for the dashboard reports and enables production of on-demand reports. When an event is received by the Security Center you can be notified via . Whilst much of Kaspersky functions, from updates and scans through to virus disinfection, are automated, there are occasions when notifications can be useful. For instance, a Critical event will be registered when a network attack is detected this could indicate an internal network threat (network worm for example). An notification can easily be set up. The following two screenshots show how this can be set: NOTE! you may need to first set up relaying. Go to Reports and notifications > Notifications > Modify notification delivery settings and enter your SMTP server details. 33

34 REPORTS SCHEDULING DELIVERY, CREATING TEMPLATES & ON-DEMAND Reports in the Security Center contain information about the condition of the anti-virus protection. These reports are generated based on event information and can be configured in many ways: To automatically send the report via 1 this occurs on a scheduled basis (the creation of which is wizard-driven) To create your own report template 2 To utilise or customise the existing default reports (green hyperlinks) COMPUTER SELECTIONS DISPLAYING SPECIFIC INFORMATION Computer selections can be used to filter specific computers based on conditional formatting - in order to display outdated clients, newly discovered machines, detected virus and much more. This reporting and management mechanism uses the same Events as the Reports section but uses the data to allow for specific, appropriate actions to occur. Information about the status of client computers is available in the Event and computer selections > Computer selections subfolder. Within Computer Selections you have the ability run Actions (towards bottom-right hand side of the console) on the displayed information. This can include, but not limited to: Create a new task which guides you through a task creation wizard Perform an existing scan task reuse a previous task to treat problem machines: 34

35 SUMMARY This guide has covered the initial installation of Security Center 10 and how to best deploy Endpoint Security in a migration scenario. Also topics such as working with the real-time dashboard, setting up notifications and scheduling reports have been covered. Areas also covered include configuring software settings for the Security Center Server and for the Endpoint protection and controls; working with the real-time dashboard; setting up notifications and scheduling reports has been discussed As previously mentioned, not all features are available to all customers please enquire further if you are unsure or need extra information as to the tiers available in Kaspersky Endpoint Security for Business. Further Information Additional information about deployment and other Kaspersky settings can be found in the newly revised help files within the software. There is also documentation available: and technical articles on Feel free to contact us if you have any further questions or specific issues. Kaspersky Lab UK Business Support Team business.support@kasperskylab.co.uk Tel (option 3) 35

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

GFI Product Manual. Version 6.0. Getting Started Guide

GFI Product Manual. Version 6.0. Getting Started Guide GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Kaspersky Endpoint Security 10 for Windows Administrator's Guide Kaspersky Endpoint Security 10 for Windows Administrator's Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product! We hope that you will find this documentation

More information

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

escan Corporate Edition User Guide

escan Corporate Edition User Guide Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement

More information

Kaspersky Small Office Security User Guide

Kaspersky Small Office Security User Guide Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Kaspersky Internet Security

Kaspersky Internet Security Kaspersky Internet Security User Guide APPLICATION VERSION: 16.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Kaspersky Endpoint Security 10 for Windows Administrator's Guide Kaspersky Endpoint Security 10 for Windows Administrator's Guide APPLICATION VERSION: 10.0 Dear User, Thank you for choosing our product! We hope that you will find this documentation useful and that it

More information

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center Reviewer s Guide Contents Introduction / Solution Headlines... 3 Getting Started... 4 Deployment... 4 Installation on an Infected

More information

Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition INSTALLATION GUIDE

Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition INSTALLATION GUIDE Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition INSTALLATION GUIDE P R O G R A M V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will

More information

LifeCyclePlus Version 1

LifeCyclePlus Version 1 LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

Installation Overview

Installation Overview Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Installing TeamLab on a Local Server

Installing TeamLab on a Local Server About TeamLab Server TeamLab Server is a portal version intended for those who decided to install and configure TeamLab on their own server. Starting with version 6.0 TeamLab installer performs all operations

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

GFI Cloud User Guide A guide to administer GFI Cloud and its services

GFI Cloud User Guide A guide to administer GFI Cloud and its services GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works

More information

Backing up IMail Server using Altaro Backup FS

Backing up IMail Server using Altaro Backup FS Backing up IMail Server using Altaro Backup FS Purpose The purpose of this document is to provide guidelines and procedures for backing up IMail server system data and user data in case of a hardware or

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) This document is designed to provide a quick installation and configuration guide for MDaemon along

More information

Kaspersky Internet Security User Guide

Kaspersky Internet Security User Guide Kaspersky Internet Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

BITDEFENDER ENDPOINT SECURITY TOOLS

BITDEFENDER ENDPOINT SECURITY TOOLS BITDEFENDER ENDPOINT SECURITY TOOLS Beta Version Testing Guide Bitdefender Endpoint Security Tools Beta Version Testing Guide Publication date 2014.11.26 Copyright 2014 Bitdefender Legal Notice All rights

More information

Partner. Sage Pastel. Accounting. Installation Guide

Partner. Sage Pastel. Accounting. Installation Guide Sage Pastel Accounting Partner Installation Guide Sage Pastel: +27 11 304 3000 Sage Pastel Intl: +27 11 304 3400 www.pastel.co.za www.sagepastel.com info@pastel.co.za info@sagepastel.com Sage Pastel Accounting

More information

Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition Administrator's Guide

Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition Administrator's Guide Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition Administrator's Guide APPLICATION VERSION: 8.0 SERVICE PACK 2 Dear User, Thank you for choosing our product. We hope that this documentation

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

Installation Procedure For McAfee Agent

Installation Procedure For McAfee Agent THE CHINESE UNIVERSITY OF HONG KONG Installation Procedure For McAfee Agent Prepared by Information Technology Services Centre The Chinese University of Hong Kong Version 1.1 August 2014 For enquiries,

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012 SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse

More information

BillQuick Agent 2010 Getting Started Guide

BillQuick Agent 2010 Getting Started Guide Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc. with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

Installing Policy Patrol on a separate machine

Installing Policy Patrol on a separate machine Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Kaspersky Total Security User Guide

Kaspersky Total Security User Guide Kaspersky Total Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Installing and Administering VMware vsphere Update Manager

Installing and Administering VMware vsphere Update Manager Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download

More information

Netwrix Auditor for Exchange

Netwrix Auditor for Exchange Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix

More information

Providing Patch Management With N-central. Version 7.2

Providing Patch Management With N-central. Version 7.2 Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012 Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for

More information

MailEnable Installation Guide

MailEnable Installation Guide MailEnable Installation Guide MailEnable Messaging Services for Microsoft Windows 2000/2003/2008 Installation Guide for: MailEnable Standard Edition MailEnable Professional Edition MailEnable Enterprise

More information

Kaspersky Security Center 10 Getting Started

Kaspersky Security Center 10 Getting Started Kaspersky Security Center 10 Getting Started A P P L I C A T I O N V E R S I O N : 1 0 M A I N T E N A N C E R E L E A S E 1 Dear User, Thank you for choosing our product. We hope that this document will

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc. Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking

More information

Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide

Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide P R O G R A M V E R S I O N : 8. 0 M A I N T E N A N C E P A C K 1 Dear User! Thank you for choosing our product. We hope

More information

Trend ScanMail. for Microsoft Exchange. Quick Start Guide

Trend ScanMail. for Microsoft Exchange. Quick Start Guide Trend ScanMail for Microsoft Exchange Quick Start Guide Trend ScanMail for Microsoft Exchange ScanMail for Exchange This Quick Start Guide provides a step-by-step guide to installing ScanMail for Exchange,

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide

Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide A P P L I C A T I O N V E R S I O N : 8. 0 M P 2 C F 2 Dear User! Thank you for choosing our product. We hope that this documentation will

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

LabTech Integration Instructions

LabTech Integration Instructions LabTech Integration Instructions Overview... 2 Requirements... 2 Webroot Activation... 3 Plug-In Installation... 5 Global Site Manager Integration... 6 Usage... 8 Information by Computer/Device... 8 Reference...

More information

Client Manager for Endpoint Protection (CMEP) User s Guide

Client Manager for Endpoint Protection (CMEP) User s Guide Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Sage Grant Management System Requirements

Sage Grant Management System Requirements Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to

More information

Remote Backup Software User Manual V 2.0

Remote Backup Software User Manual V 2.0 Remote Backup Software User Manual V 2.0 Table of Contents Chapter 1 Welcome to Remote Backup Software... 2 1.1 Overview... 2 1.2 Computer Disposition Request... 2 1.3 Convention... 2 Chapter 2 Installing

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

Altaro Hyper-V Backup V4 - User Guide

Altaro Hyper-V Backup V4 - User Guide Altaro Hyper-V Backup V4 - User Guide 1 / 161 Table of contents Introducing Altaro Hyper-V Backup... 5 Roles... 6 Sample Scenario... 7 Different Editions... 9 Getting Started... 11 System requirements...

More information

Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix

Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Standard Setup Guide 1 2 3 4 5 Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Read this manual carefully before you use this product and keep it

More information