Windows 10 and the Anti-malware Ecosystem Dennis Batchelder. Director, Antimalware strategy
|
|
|
- Benjamin Lyons
- 10 years ago
- Views:
Transcription
1 Windows 10 and the Anti-malware Ecosystem Dennis Batchelder Director, Antimalware strategy
2 We shipped Windows 10!
3 Recap: The Windows 10 upgrades process for AVs Our AV upgrade plan If the AV product is Windows 10-compatible, auto-upgrade Else, if the AV product has passed MS certification tests, offer for upgrade after 3 hours, and again on every reboot We presented this plan in Docs, MVI meetings, and at MSRA in July When we presented, AVs had the following concerns No time to upgrade products to Windows 10-compatible versions Customers would never see/click on the pop-up Customers would never reboot, see the pop-up, etc. We said we d measure and report the results
4 What we measured Data used: MSRT and Windows Defender telemetry Caveats: - data only through September 13 - not all machines run MSRT each month - this is early in the Windows 10 upgrade process - some issues mapping machines across OS installs - imperfect mapping of AV vendors First: MSRT saw as Win 7/8 Then: Windows Defender saw as Win10 Finally: MSRT saw as Win 10 We called this How many we measured What else we measured: Yes No Yes Auto-upgrades 10 million Country Vendor Yes Yes Yes Offer-upgrades 46 million No n/a Yes Fresh installs 24 million Country Vendor Country Offered vendor Eventual vendor AV protection state Windows Defender infections found Days Windows Defender was active Then we calculated: OfferRetention OfferBonus FirstDayRetention
5 So how did AV vendors fare? --- the biggest affecting factor: 1) Net change: AV vendors retained most customers who upgraded Windows 10 2) 77% of machines did not have on-box Windows 10-compatible AVs for auto-upgrades, causing us to offer upgrades --- then when we had to offer AV after the upgrade: 3) The majority of machines were retained by AV vendor 4) The majority of retained machines occurred on the first day 5) Many customers chose to switch 3 rd party AV vendors after the offered upgrade 6) Very few machines with out-of-date or disabled AVs were retained by AV vendor 7) Few machines where Windows Defender found infections were retained by AV vendor 8) No machines with missing Windows-10 compatible AVs were retained by AV vendor
6 Suggestions to increase AV retentions on Windows 10 upgrades 1) Avoid offer-upgrades Get your AV ready for auto-upgrades by making it Windows 10-compatible 2) If that fails, make sure you have a Windows 10 AV for us to offer Otherwise customers won t have a fast path to install your product after upgrade 3) And, encourage your customers to enable your product Unprotected customers aren t staying with their original AV vendor 4) Also, reduce your infection rates Infected customers aren t staying with their original AV vendor 5) Promote your product/brand as Windows 10-ready Ride the wave of upgrades and maybe pick up some new customers
7 Antimalware Platform on Windows 10
8 Antimalware Platform The Antimalware Platform (AMP) is a Windows-based effort to ensure that all Windows 10 users are protected from malware by an antimalware app that provides synchronous protection using updated signatures. Microsoft invests in platform features that help protect our common customers. Many AMs take advantage of: ELAM, Secure Events Channel, AM-PPL, etc. Guidelines are required to keep the platform healthy and growing.
9 MVI members received this whitepaper (v2) on 2 July 2015 Antimalware Platform Whitepaper: Requirements for Windows 10 The AMPW requirements focus on three primary areas : 1. Performance requirements detail the metrics that will be used to ensure that antimalware software does not unnecessarily degrade the user experience. The metrics being used revolve around boot, browser launch, browser page display, and Windows Store app time. 2. Reliability requirements have been added in order to make sure customers are able to receive and install timely security and operating system updates. This boils down to not using undocumented APIs and data structures. 3. User notifications: a) AM apps must make exclusive use of User Protection Always On (UPAO) notifications that WSC provides to notify users that the app may expire soon, and enable users to proactively take action to renew their subscription. b) We have revised the other notification requirements in Chapter 9 to be objective and measurable, and these requirements will be included in the next version of the Whitepaper.
10 Motivation for AMPW Requirements 1. Current RTP software has a dramatic impact on performance, leading to a poor user experience. Performance impact is also a significant contributor to users turning RTP off, and thus making it less secure. REASONS FOR TURNING OFF SECURITY SOFTWARE (Base: Windows Users that would/turned off security software; USA+DEU+JPN) Affected device performance Didn't catch malware 42% 47% 2. Necessary system updates and upgrades are sometimes blocked by RTP software s use of undocumented APIs and data structures, resulting in customer frustration, as well as customers being left in a less secure state. Didn't remove malware Tried to upsell me Required too much user intervention 33% 32% 38% 3. Many antimalware applications generate an excessive number of alerts. This not only leads to a poor user experience, but could also habituate the user to dismissing alerts if out of hand, thus missing out on truly urgent notifications. Restricted web browsing Too many false positives Other reason 4% 29% 27% Source: Microsoft Market Research conducted May 2015 Q (mid & right): At what point would you consider turning off or uninstalling your security software, or what has caused you to turn off or uninstall your security software in the past? Study Sample size: USA=1,652 / DEU=2,626 / JPN = 2,884
11 AMP Engagement Calendar Windows is a Service (WaaS) 75 million devices in 1 st month. We ll deliver new features when they re ready, not waiting for the next major release. You should too! White Paper & Requirements updates to match Windows releases We ll update the white paper up to three times a year, aligned with Windows releases.* Your timely feedback on draft requirements is very important. Continue regular engagement with our AM partners Today at Virus Bulletin December in Da Nang, Vietnam (AVAR) February in San Diego (AMTSO) May in Bucharest (CARO) July in Redmond (MSRA) * Microsoft reserves the right to change this schedule as required to keep our customers safe.
12 Platform Updates
13 We will be encouraging you to use these as undocumented API replacements Windows 10 AMP Improvements AM-PPL: Antimalware Protected Process Light AM processes can run critical user-mode service components as AM-PPL which is at a higher level than an Admin thus can help shield itself from admin level malware White paper on MSDN Secure Event Channel Extensible channel that provides critical insight into process activities AMs can listen to selected TCB/kernel/win32 level events without kernel level hooks TCB/kernel events are trusted, they cannot be tampered with by malware Whitepaper published via Connect in Feb Inbox support for Offline Cleaning WSC provides API to AM apps to make use of inbox WinRE (Windows Recovery Environment) to provide seamless frictionless offline cleaning experience. AM applications can remove rootkits and kernel malware difficult to clean online using this feature, without a need to carry their own offline environment.
14 Upcoming API Deprecations Anti Spyware component in Windows Security Center (WSC) will be deprecated WSC will support only Anti-Virus but not Anti-Spyware Converging will simplify AM management through WSC All the existing APIs will continue to work, and will gracefully ignore Anti-Spyware registration/status WDEnable API will be deprecated (MSDN link) Windows Defender status that the calling application wants to set. TRUE enables Windows Defender. FALSE disables Windows Defender. This API will be deprecated. WSC is the only supported way to disable Windows Defender Timeline for Change Anti Spyware component deprecated: July 2016* WDEnable API deprecated no later than July 2016* * Microsoft reserves the right to change this schedule as required to keep our customers safe.
15 Reliability
16 Real World Problems with Current Reliability Example 1 Internal testing showed that Windows would suffer BSOD when receiving a security update if the user had AM software from a particular vendor. The update was delayed for the entire world for a month. When it did ship, Windows Update detected if that vendor s software was present and didn t install the update, leaving those customers insecure until the vendor issued their own update. Root cause: relying on undocumented data structures. : : Example 2 Another vendor s AM software blocked upgrades to Windows 10. Root cause: the software was parsing signature information directly, rather than using the publicly documented crypto APIs.
17 Windows 10 AMP Reliability Requirements Antimalware apps for Windows 10 must not use any undocumented, unsupported or private Windows APIs or data structures. Antimalware apps for Windows 10 should use Microsoft-documented APIs and data structures for which documentation is: Publically available via the Microsoft Developer Network, and/or Privately shared with antimalware ISVs via the Microsoft Virus Initiative or Virus Information Alliance. Our goal is to improve reliability, not limit your ability to detect block or remove malware.
18 Update on API lists sent to Microsoft Since July: Received more than 1000 requests from 12 ISVs 700+ unique APIs and data structures. Volume much higher than expected. We ve triaged many of them, sent some back to you via Sysdev for more info. Themes have emerged: General Use case How it is done Supported Mechanism to Consider System observation for detection purposes Hooking/interception of undocumented APIs for parameter inspection. Writing signatures to match calling patterns associated with known malicious behavior. Secure Event Channel Filter Drivers System observation for self-preservation purposes Direct modification of APIs/Data Structures for remediation purposes Hooking/interception of undocumented APIs for parameter inspection. Looking to match calling patterns associated with known malicious behavior with their own processes/resources as the target. Invocation of undocumented APIs or changes made to in-memory data structures as part of cleaning a detected threat. AM-PPL WinRE Offline Cleaning If there are themes missing, let us know: Sysdev or [email protected]
19 Performance
20 The AM ecosystem has noted the importance of performance Why is Performance Important? According to Microsoft research, 19% of consumers who pay for security software rate performance as one of their top three criteria for purchasing. According to the same study, 47% of users who turned their security software off did so because of how they perceived it affected device performance. This was the number one reason cited for disabling security software. A Forester Research study concluded that performance was the second most important criteria (behind reliability) for purchasing a new PC.
21 Performance Requirements For a given metric, a system falls into one of three categories, based on measured performance: exceptional, on target, or strong concerns. For each of the four metrics, we run the test twice, once without the 3 rd party AM software and once with it. For each of the four metrics, a system must be in the same measured performance category with the 3 rd party AM software as it was without it. If it does, it passes for that metric. If it doesn t, but the performance degradation was less than 20% or less than 200ms, then it still passes. There are eight predefined off-the-shelf systems with varying characteristics that are used for testing. The antimalware must pass for all 4 metrics on all 8 systems in order to be compliant ADK Assessment Boot Performance (Fast Startup) Internet Explorer Startup Performance Internet Explorer Security Software Impact Windows Store App Performance Microsoft Edge Performance Metric and units Total Boot [Excluding BIOS] Duration in seconds IE Startup Duration (User Perceived) in seconds Page Display Time in seconds Launch time in seconds The evaluated metric will be an average of the launch time of all Bing apps on the system. Navigation time in seconds
22 Performance Impact (ms) Performance Progress May-15 Jul-15 Sep-15 The ADK enabled us to make double digit improvements for many perf metrics across low/mid/high end platforms. For some metrics we observed 30% ~50% improvements. --AM vendor performance engineer Edge Launch and Render IE Launch IE Render Do not delay in submitting your app for performance testing. See submission details in the white paper.
23 Notifications
24 Problems with Current Notifications Alerts that are modal and display on top of whatever other applications the customer has open REASONS FOR TURNING OFF SECURITY SOFTWARE (Base: Windows Users that would/turned off security software; USA+DEU+JPN) Alerts that do not leverage Windows Notification Services (WNS) Alerts that are not always clear or actionable to the customer (Ex: Unknown device or PC detected ) Affected device performance Didn't catch malware Didn't remove malware Tried to upsell me Required too much user intervention 47% 42% 38% 33% 32% Alerts that are shown to the customer by default, with no option within the desktop app to turn off alerts. Frequent pop-ups for marketing or sales purposes Restricted web browsing Too many false positives Other reason 4% 29% 27% Source: Microsoft Market Research conducted May 2015 Q (mid & right): At what point would you consider turning off or uninstalling your security software, or what has caused you to turn off or uninstall your security software in the past? Study Sample size: USA=1,652 / DEU=2,626 / JPN = 2,884
25 User Protection Always On (UPAO) Requirement User Protection Always On: Antimalware apps must use UPAO notifications that WSC provides to notify users that the app may expire soon, and enable users to proactively take action to renew their subscription. This requirement has been published since March 31 st 2015 in the AMPW, and it will be enforced by February 1 st This enforcement date will not be extended. Notifying Users Before Expiration WSC provides an API for antimalware apps to notify users 5 days prior to the app s expiration date. AM apps must: Register with WSC to report their apps correct status as expired. Notify the user through the provided API. (They cannot notify the user outside of the API.) Requirements to prompt users before the antimalware app expires. AM apps must: Be active, enabled, and not out of date. Be close to its expiration date. Invoke the UPAO scenario, but no more than 2x s in a 30 day period.
26 Windows 10 Notification Requirements Updated Windows 10 Notification Requirements: 1. Non-critical information, no user action required Use a toast message with Suppress-Popup = TRUE. Notification will show up directly in the Action Center 2. Non-critical issue, may or may not be due to malware issues Use a toast notification. No more than once per 24 hours 3. User action or decision needed, not a malware threat Use a toast notification No more than once per 72 hours Windows 10 Notification Recommendations: Critical malware issues Use current notification service via AM Can use toast notifications, is desired. Please send any feedback you have on WNS to: [email protected] by 10/16.
27 We heard your Feedback
28 Upgrade.exe UX Changes
29 Post-upgrade notifications: antimalware Feedback is consistent Users want to be informed about their protection state Toast notification is not prominent enough Adjust messaging to ensure users are informed of state and choices Notify users as soon as possible, rather than 3 hours after OOBE Ensure users know that they have protection (Windows Defender) Users can quickly fetch a compatible version of their third party antimalware if upgrade.exe is present Better way to notify users (e.g., system modal dialog, persistent toast, etc) upgrade.exe isn t present, offer users options on landing page
30 Summary
31 Summary Ship a Windows 10 compatible app before your customers upgrade. Feb 2016 enforcements include Perf, UPAO and notifications. Please send us feedback on revised notifications requirements by 10/16. Start preparing now for the No undocumented API requirement in July. Scenario Detailed Scenario By July 2015 By February 2016 By July 2016 Fast Startup Total boot duration - App Launch Internet Explorer startup performance - Responsiveness Internet Explorer Security Software impact - Windows Store apps performance - Browsing Microsoft Edge performance - Energy Efficiency Streaming video playback - - File Operations File Copy - - OOBE OOBE duration - - User Experience Upgrade.exe No additional apps promoted through Upgrade.exe Using Notifications In Windows 10 - No undocumented APIs - - User Protection Always On - Newly enforced in February 2016 Newly enforced in July 2016
32 Q&A
33
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
Forefront Client Security. Ronald Beekelaar Beekelaar Consultancy [email protected]
Forefront Client Security Ronald Beekelaar Beekelaar Consultancy [email protected] Introductions Presenter Ronald Beekelaar MVP Windows Security MVP Virtual Machine Technology E-mail: [email protected]
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
Basic Computer Maintenance
Basic Computer Maintenance Presented by East Central Regional Library The Institute of, a Federal Agency that fosters innovation, leadership and a lifetime of learning, in conjunction with State Library
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application
Maintaining, Updating, and Protecting Windows 7
Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center
Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing
NOD32 Typical Installation Guide Version 2.7 Includes Windows Vista and 64-bit protection Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing Best Detection Fastest
User Manual. HitmanPro.Kickstart User Manual Page 1
User Manual HitmanPro.Kickstart User Manual Page 1 Table of Contents 1 Introduction to HitmanPro.Kickstart... 3 2 What is ransomware?... 4 3 Why do I need HitmanPro.Kickstart?... 6 4 Creating a HitmanPro.Kickstart
Why should I back up my certificate? How do I create a backup copy of my certificate?
Why should I back up my certificate? You should always keep a backup copy of your ACES Business Certificate on a location external to your computer. Since it s stored locally on your computer, in the Windows
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments
#1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of
Evaluating Microsoft s protection performance and capabilities
Evaluating Microsoft s protection performance and capabilities How the Microsoft Malware Protection Center evaluates its ability to keep customer computers secure. Evaluating Microsoft s protection performance
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Sophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
Microsoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition
Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
VirtualXP Users Guide
VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter
Vtiger CRM Outlook Plugin Documentation
Vtiger CRM Outlook Plugin Documentation Outlook Plugin Version 1.0.04 Different Solutions GmbH [email protected] http://www.different-solutions.com Support Forum: http://forum.vtiger.de Date:
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
Lumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module
Spyware - The invisible computer virus
Issue 3 Edition 1 Spyware - The invisible computer virus Inside This Issue: By Chris Noles You have probably heard a lot about Spyware or Adware lately. In fact, you probably have some type of spyware
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
How to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
Protection against viruses, spyware, rootkits, and network vulnerabilities. Productivity-oriented default configuration
Built on distribution infrastructure of Microsoft System Center Configuration Manager software Supports all System Center Configuration Manager topologies and enables enterprise-wide scalability Facilitates
2. Installation and System requirements
RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product
Symantec Endpoint Protection End-User Guide For MacOS X
Symantec Endpoint Protection End-User Guide For MacOS X Symantec Endpoint Protection (SEP) is the evolutionary successor to Symantec Anti-Virus (SAV). SEP provides the anti-virus protection of SAV and
Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.
Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive
Symantec Endpoint Protection Analyzer Report
Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...
Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition
Quickstart Guide First Edition, Published September 2009 Remote Administrator / NOD32 Antivirus 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
Kaspersky Lab Product Support. Enterprise Support Program
Kaspersky Lab Product Support Enterprise Support Program Contents 1 Definitions... 3 2 Overview... 4 3 Description... 6 4 Limitations... 11 2 1 Definitions Product(s) shall mean software product(s) of
AdwareMedic. About AdwareMedic... 2. How to use AdwareMedic... 3. Frequently Asked Questions... 7. Version History... 9 License Agreement...
AdwareMedic http://www.adwaremedic.com [email protected] About AdwareMedic... 2 System Requirements... 2 Limitations... 2 How to use AdwareMedic... 3 Scan for Adware... 4 Optional items... 5 Firefox
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:
Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC)
Security@Microsoft Trustworthy Computing (TwC) Programs supporting security outreach and engagement Microsoft Active Protections Program (MAPP), Government Security Program (GSP) (was SCP) Microsoft Security
Trusteer Rapport. User Guide. Version 3.5.1307 April 2014
Trusteer Rapport User Guide Version 3.5.1307 April 2014 Contents About this Guide 1 Need More Information about Trusteer Rapport? 1 Sending us Feedback 1 1. What is Trusteer Rapport? 3 Antivirus: A False
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
How To Use Ezcrt Computer Rental For A Rental
Page 1 www.vsoftwaretools.com IMPORTANT SOME instructions in this document are used ONLY at the RENTAL COMPUTER! DO NOT INSTALL ezcrt CLIENT software on Staff / Front Counter Computers! Version 2.0, Copyright
Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.
Microsoft s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Luncheon Webinar Series May 11th, 2015. Stewardship Center for Information Governance Presented by Ernie Ostic Sponsored By:
Luncheon Webinar Series May 11th, 2015 Stewardship Center for Information Governance Presented by Ernie Ostic Sponsored By: Stewardship Center for Information Governance Questions and suggestions regarding
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Hi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
Driver Updater Manual
Driver Updater Manual Keep your drivers up-to-date! Improve your system performance and stability by keeping your drivers updated. Automatically find, update and fix the drivers on your computer and turn
Nexio Backup and Recovery
Nexio Backup and Recovery 11/2/2015 175-100271-00 RevE Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and its contents
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.
USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Overview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10
Overview... 2 Installing... 2 Step 1: Download... 2 Step 2: Install... 2 Step 3: Sign In... 3 Step 4: That's It!... 3 Minimum System Requirements:... 3 Using the Secure Desktop Agent... 4 Accessing & Login
webkpi SaaS ETL Connector Installation & Configuration Guide
webkpi SaaS ETL Connector Installation & Configuration Guide SaaS ETL Version 2.5.0.12 Version 1.6 September 2013 webkpi SaaS ETL Connector Version 2.5.0.12 V 1.6 Page 1 Table of Contents Table of Contents
BitDefender Client Security Workstation Security and Management
BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from
Salesnet CRM Documents
Salesnet CRM Documents Outlook Add-In for Salesnet CRM Requirements Installation Instructions Add-in Overview Release Notes 2001-2012 Salesnet. All Rights Reserved. Document History Salesnet CRM Documents
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Basic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
Client Manager for Endpoint Protection (CMEP) User s Guide
Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product
Table of Contents. Rebit 5 Help
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
Session ID: Session Classification:
Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate
ProperSync 1.3 User Manual. Rev 1.2
ProperSync 1.3 User Manual Rev 1.2 Contents Overview of ProperSync... 3 What is ProperSync... 3 What s new in ProperSync 1.3... 3 Getting Started... 4 Installing ProperSync... 4 Activating ProperSync...
Dynamics CRM for Outlook Basics
Dynamics CRM for Outlook Basics Microsoft Dynamics CRM April, 2015 Contents Welcome to the CRM for Outlook Basics guide... 1 Meet CRM for Outlook.... 2 A new, but comfortably familiar face................................................................
Unity web- player issues in browsers & in client system
Software /Hardware requirements for unity web player i) Software Requirement Operating System: Windows XP or later; Mac OS X 10.5 or later. ii) Graphics Card: Pretty much any 3D graphics card, depending
M100 System File Manager Help
Copyright (c) Vuzix Corporation 2013-2014. All Rights Reserved. M100 System File Manager Help Section I) Installation of the M100 Section II) General Information Section III) Troubleshooting Section IV)
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Kopano product strategy & roadmap
Kopano product strategy & roadmap 11 January 2016 INTRODUCING KOPANO For many years Zarafa has provided software solutions for organising the lives of busy professionals. Emailing and advanced calendaring
WHAT'S NEW WITH SALESFORCE FOR OUTLOOK
WHAT'S NEW WITH SALESFORCE FOR OUTLOOK Salesforce for Outlook v2.8.1 Salesforce for Outlook v2.8.1, we ve improved syncing and fixed issues with the side panel and error log. Sync Side Panel Error Log
RMM/MDM. Quick Reference Guide
RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5
Mobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
Insight. Security Response. Deployment Best Practices
Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users
