Protection Service for Business

Size: px
Start display at page:

Download "Protection Service for Business"

Transcription

1 Protection Service for Business FAQ Version 4.0

2 Table of Contents 1. Protection Service for Business... 3 What is Protection Service for Business?... 3 What are the key benefits of Protection Service for Business?... 3 Do I really need Protection Service for Business if I m using a free security solution?... 3 Does Protection Service for Business work with other Security Solutions?... 4 What Products does it contain?... 4 What are its notable security features and what do they do? Subscriptions... 5 What is my subscription key and where can I find it?... 5 How can I transfer a subscription to another computer?... 6 What happens when my subscription key expires? Company Account... 6 How can I change the language in my Portal? Protection Service for Business for Workstations... 7 How do I install the Protection Service for Business for Workstations?... 7 How do I configure Protection Service for Business for Workstations?... 8 What are the supported platforms for Protection Service for Business Workstation? Protection Service for Business Mobile Security... 8 How do I add a new mobile device via SMS provisioning?... 8 How do I add a new mobile device which does not support SMS? How do I configure anti-theft features? How to use the Anti-Theft features: What are the supported platforms for Protection Service for Business Mobile Security? PSB and Server Security How do install PSB & Server Security? General Troubleshooting I did what the instructions said in the Mobile installation section but I m still unable to install Protection Service for Business Mobile Security application? Why Automatic Updates are taking longer to download than usual? How do I know that Protection Service for Business is running smoothly? My network printer is not working after installing Protection Service for Business for Workstation. What happened? My frequently used software is not working after the installation of Protection Service for Business. What happened? How do I send a sample to F-Secure? How do I create F-Secure diagnostic File (FS DIAG)? What do I need it for?... 15

3 1. Protection Service for Business What is Protection Service for Business? Protection Service for Business is a comprehensive turn-key protection suite for challenging and highly-mobile multi-device environments. It specially designed for the needs of small and mediumsized businesses. What are the key benefits of Protection Service for Business? Protection Service for Business has been designed to the specific needs of SMBs, offering considerable benefits from exceptional security to low TCO and minimal IT resource allocation: Low Total Cost of Ownership Protection Service for Business is perfect for SMBs due to its low total cost of ownership. In fact, with the low investment costs and a minimal IT resource allocation requirement, the solution can offer considerable reduction in related costs. Prestigiously Awarded Protection Technologies Our pioneering protection technologies have received numerous prestigious awards from independent expert organizations, such as AV-Test, AV-Comparatives and VB100, ensuring that you are using the very best security solution available at the market! Minimal Administration and Management Protection Service for Business is designed with easy administration in mind. It s powerful and easy-to-use management features ensure efficient operation, while its intuitive technology, smart automation and fast deployment guarantees minimal administration and IT resource allocation. Suitable for mobile Businesses Protection Service for Business offers seamless protection for highly mobile businesses, allowing them to safely use and access any content from any mobile device, be it corporate laptops, smartphones or tablets. The administrator can even manage the whole solution through any mobile device. Do I really need Protection Service for Business if I m using a free security solution? Yes, you do. The protection technology behind Protection Service for Business has been proven countless times by the prestigious awards received from independent expert organizations. Furthermore, its performance, excellent manageability and pioneering security features ensure the outmost security, compatibility and efficiency on your corporate IT environment. The pressure of finding new ways of saving money during challenging economic times makes the idea of free anti-virus a seemingly appealing opportunity. However, by making an objective assessment, businesses can dive deeper into the related costs of free solutions: Consider the detection rate of the solution and whether their claims have been recently validated by independent parties. Additionally, check the compatibility and performance of the solution in order to avoid slowdowns and crashes of your computers. Furthermore, make certain that you are entitled to quality technical support in all cases. And lastly, ensure that the solution has all the features required to protect you against more advanced threats, has an effective management layer and has other required functionalities that enhance productivity and lower operational costs.

4 Does Protection Service for Business work with other Security Solutions? Generally, you should not run two security programs together at the same time, which are both actively monitoring the system (real-time protection). This is because that the various components may interfere with the operation of the solutions, as both attempt to access the same content at the same time. Often, this leads to various system malfunctions such as slowdown, crashes, freezes and strange system behavior. What Products does it contain? is composed of four main products: Workstation Security, & Server Security, Server Security and Mobile Security; and an integrated central management functionality Protection Service for Business Portal. Protection Service for Business Workstation Security Available for Windows, Mac, and Linux. Protection Service for Business Workstation Security provided unparalleled protection to all corporate workstations, ensuring utmost security in the face of increasingly sophisticated malware. Protection Service for Business Server Security Effective protection for Windows and Linux servers. Real-time and scheduled scanning ensures that no malware are stored on your file servers. Windows version also includes enhanced cloudbased protection with DeepGuard. Protection Service for Business Mobile Security The product is available for the Android mobile operating system. Mobile Security contains Anti- Malware, Firewall, Anti-Theft and Browsing Protection, with some differences between operating systems. Please note that Apple IOS and Windows Phone are currently not supported by Protection Service for Business. The closed architecture of these systems are less vulnerable against viruses and malware. At the same, time they do provide the same possibilities for integration of a security solution. Protection Service for Business Portal The Portal is a web-based remote monitoring and management system for administrators. It allows continuous follow-up of the computer network security, and enables administrators to take required actions based on issues detected. Management features, and all issues requiring attention are clearly highlighted, with task links designed to allow direct administration of related parts. Every single feature, device and policy presented can be managed and configured centrally from one unified portal. The web-based management portal can be fully accessed 24/7 through any device, even smartphones in emergency. Task orientation and intuitiveness of the design, coupled with easy configuration makes the management portal extremely efficient to use. What are its notable security features and what do they do?

5 Protection Service for Business contains numerous pioneering security features and functionalities, such DeepGuard and Software Updaters, which ensures utmost security even against the most advanced threats. Anti-Malware F-Secure Anti-Malware can perform simultaneous scans with multiple scanning engines (including on-demand and real-time scans). This technology enables the integration of different antivirus technologies into a single framework, allowing several scanning engines to scan the files side-by-side for outmost protection against malware threats. What is DeepGuard? Why is it so important? DeepGuard is an intelligent anti-malware engine, which combines behavior, memory and reputation analysis to identify the malicious behavior and prevent it, ensuring unparalleled 0-day detection capability. This makes it a fundamental security component against the increasingly sophisticated malware and the previously unknown threats that cannot be blocked with traditional technologies. What is Software Updater? What are its key benefits? Software Updater is an advanced patch management feature that automatically keeps the operating system and 3rd party applications up-to-date. This prevents the widespread exploitation of existing software vulnerabilities, which are some of the most glaring security risk in corporate systems, reducing the possible malware attacks up-to 85%. What is Real-Time Protection Network? How do I benefit from it? Real-Time Protection Network is an in-the-cloud reputation service, which provides an efficient and rapid response against the new and emerging malware. This is important due to the dramatically changed threat situation where the number of new malware and their variants make traditional heuristics or signature-based solutions too slow or inefficient. Furthermore, Real-time Protection Network improves the overall performance of your devices, as the Protection Service for Business doesn t need to scan any applications that Real-time Protection Network has already analyzed and found clean. What is Browsing Protection? What does it do? Browsing Protection offers ideal proactive protection against web based threats, by automatically preventing end-users from interacting with malicious content - even before it is accessed. This ensures minimum end-user exposure to dangerous online material, significantly reducing the number of possible infection points and greatly enhancing online security while browsing the web. Browsing protection has been designed with user-friendliness and intuitiveness in mind. It uses a simple and intuitive color-coded rating system clearly indicates the websites and contents that are safe to enter and what should be avoided. 2. Subscriptions What is my subscription key and where can I find it?

6 Each managed client software type has its own subscription key with independent validity period and size. Every SMB-customer gets one or more unique subscription keys - depending of which client applications are purchased. Each subscription key defines how many instances of the client software can be installed and a fixed validity period. Every time the security software connects to check for updates, the corresponding subscription is checked for validity and all updates are provided for the valid client. The Subscription keys can be found in the PSB Admin Portal. You can access the portal via the My Applications Section in the Swisscom Business Marketplace on the F-Secure App Icon. Subscriptions are listed in portal under Subscriptions tab. How can I transfer a subscription to another computer? If your subscription allows only one installation, you can transfer the subscription to another computer. To do this, first remove the old computer from the portal and then install the security product on the new computer with the same subscription key. The subscription is then transferred to the new computer. What happens when my subscription key expires? If for some reason the client subscription expires, all security features and functions are disabled, with the exception of firewall that retains limited functionality. PSB Portal offers a combined view to the subscription status of the whole computer base with notifications when some specific subscriptions require a renewal. The renewal needs to be done over the Swisscom Business Marketplace 3. Company Account How do I create my company account? You create your company account for by ordering the application on the Swisscom Business Marketplace If you need help ordering an application please visit: How do I recover my password for the Swisscom Business Marketplace? Any specific question in regards to recovering your Swisscom Login password, please visit: How can I change the language in my Portal? To change the language, first log in to the Portal, click your user name at the top right corner. In the Edit account page, from the Language drop-down list, select the language that you want, and click Submit.

7 4. Protection Service for Business for Workstations How do I install the Protection Service for Business for Workstations? Go to the Protection Service for Business Administration Portal via the My Applications Section in the Swisscom Business Marketplace: Click on the F-Secure App Icon. When installing for multiple employees you can use invitation: 1. Go to Computers tab under Protection Service for Business portal 2. Select Add computers write the addresses and click Send. 3. Employees will receive an with instructions how to download and install the application. (For installation instructions see the section directly below). 4. Once the employees have successfully installed the application, you will see their computers connecting the service under Computers tab. To install the program locally: 1. Locate the downloaded file and double-click the.exe file to start the installation. 2. Select the installation language, and click Next to continue. 3. Read the license agreement. To accept the agreement and to continue, click Accept. 4. Enter your subscription key and click Next. 5. Select the installation type, and click Next: Automatic installation: The product is installed automatically. Existing security products may be automatically replaced. The product is installed to the default directory. Step by step installation: During the installation, you can change the installation directory. However, we recommend using the default directory. 6. When the installation is complete, the computer restarts automatically after a while. 7. To restart immediately, click Restart. To install the program remotely: This section explains how to remotely install Workstation Security. Before you start the remote installation, make sure that the domain controller exists and that the computers on which you want to install the software belong to a domain. To be able to remotely install the software, you must have domain administrator rights. To install the software: 1. In Protection Service for Business Portal click the Download software link at the top of the page. 2. In the Download software page, click the Download the Remote Installation Tool link. If you have not downloaded the workstation software yet, click also the Download the workstation software link. 3. Extract the Remote Installation Tool zip file on a local drive. 4. Double-click the ritool.bat file. The F-Secure Remote Installation Tool window opens. 5. In the Software to Install page, click the - button. The Software Installer Selection window opens. 6. Locate the downloaded workstation software file and click OK. Click Next. 7. In the Target Computers page, do the following: Under Domain Name, select the domain to which the computers belong. Under Computer Name, select the computers on which you want to remote install the software. 8. Click Next. 9. In the Account page, do the following: Select Another account. Enter the domain administrator name and password.

8 Confirm the password. 10. Click Next. 11. Click Install. The workstation software begins installing on the selected computers. 12. In the portal, verify that the computer shows in the portal. How do I configure Protection Service for Business for Workstations? Protection Service for Business comes with a pre-set default configuration, which is suitable for the need of vast majority of users and organizations. For more detailed information on configuring the advanced settings and configurations, please refer the Protection Service for Business Admin Guide. What are the supported platforms for Protection Service for Business Workstation? The product can be installed on a computer running one of the following operational systems: Protection Service for Business supports the following Mac OS X versions Mac OS X 10.6 (Snow Leopard, version or later), Mac OS X 10.7 (Lion) and Mac OS X 10.8 (Mountain Lion) Protection Service for Business supports the following Microsoft Windows versions Microsoft Windows XP with SP3 (32-bit editions only) Microsoft Windows Vista with SP2 or newer (all 32-bit and 64-bit editions) Microsoft Windows 7 with SP1 or newer (all 32-bit and 64-bit editions) Microsoft Windows 8 (all 32-bit and 64-bit editions) 5. Protection Service for Business Mobile Security The Protection Service for Business Portal registers mobile devices that you add once they connect to the system by activating the installed software. The product is currently available for the Android mobile operating systems only. When you add a new mobile device, it will appear on the list with the overall status Not connected in Protection Service for Business Portal under Mobile devices tab. If the mobile device is not activated within three days, the status changes to critical (Never connected). How do I add a new mobile device via SMS provisioning? 1. Go to the Protection Service for Business Administration Portal via the My Applications Section in the Swisscom Business Marketplace: Click on the F-Secure App Icon. 2. In the Portal under Mobile devices select subscription you wish to use, first name, last name and phone number. Check that Send download link and activation SMS messages is selected and click Add device. 3. On the your mobile device the first thing you need to do is allow installation from the Unknown sources Open Settings > Security scroll down the list and check that Unknown sources is turned on. You can locate Settings menu by tapping the bottom left button of your Android device on

9 home screen. On tablets you can locate the Settings by tapping the bottom right area of your tablet (where clock and WIFI icons are located). On older (2.x) Android devices: Open Settings > Application and check that Unknown sources is turned on. When this setting is turned on, you can install applications outside the Android Market. You can locate Settings menu by tapping the bottom left button on you Android device on home screen. 4. User will receive a download link and activation SMS. Do not remove the activation message, since it is used to activate the application. 5. Tap the download link in the SMS, web browser will open to a download web page. If more than one application versions are available, it is recommended to use the newest available version.

10 6. Tap download link on the to start the download. If any security questions are presented answer yes to allow the application package to be downloaded. 7. Download will appear on your device s Notifications. Open the Notifications and once the download is complete, tap the downloaded application to start the installation. If presented with a Complete action using dialog, select Package installer and Always. Select Install and once the installation is complete, select Open. 8. Once the application opens, read the License Terms and in order to use the application tap Accept. 9. To complete the service registration you will need to activate the device. Tap Activate. Activation will be in progress and you will be shown Activate device administrator dialog, tap Activate. How do I add a new mobile device which does not support SMS? If you wish to add a device without SMS support here s a two examples how to do it. In both cases you will need to deliver download location and subscription key to the end user. Otherwise the installation instruction are the same (SMS contains download link and activation code). You are adding your own device:

11 1. In the Protection Service for Business Portal go to Download software (top left corner in the portal), open the link to Download mobile software. Now write this address to the browser of your tablet and open the web page. 2. On your tablet download the security application from the web page by tapping download link. 3. Go to Subscriptions tab to view the mobile subscription code. This will be needed once the application is launched the first time on your tablet. 4. Now you follow the instructions mentioned in the How do I add a new mobile device via SMS provisioning?. During the activation you will be asked to enter the subscription key. You are adding someone else s device: 1. Write the user of the tablet an , for this you will need to describe two things: a. In the portal go to Download software (top left corner in the portal), copy the link to Download mobile software location and add it to the . b. Go to Subscriptions tab and copy the mobile subscription code. This will be needed once the application is launched the first time. Add it to the Send this to the user. 3. Now the user can follow the instructions mentioned in the first How do I add a new mobile device via SMS provisioning? Only difference is that the link is opened from the instead of the SMS. During the activation user will be asked to enter the subscription key which can be found from the . How do I configure anti-theft features? In order to utilize Anti-theft features, you will first need to make sure you have set Screen lock on. It is highly recommended to use high security lock, either PIN or Password. You will find the Screen lock under Settings > Lock Screen. To take Anti-Theft into use: 1. Open the mobile application and in the main view, open Anti-Theft. 2. In the Anti-theft menu, select Settings 3. Select Set security code. The Set security code dialog opens. 4. Enter your security code and type it again to make sure you entered it correctly. You will not be able to change Screen lock settings, or remove applications without the code. So you should not forget it. It is possible to reset the setting from the portal. 5. Set the trusted phone number. If someone steals your phone and then changes the SIM card a message will be send to this number. How to use the Anti-Theft features: There are two ways to use the Anti-theft functionality. Via portal or via text message. Via portal: 1. Log in to the portal and open Mobile devices tab. 2. Select you phone from the devices list. 3. Select Anti-theft operations and select the operation. Following operations are available: Lock Device Unlock device and reset anti-theft settings Wipe device data 4. Operation will be performed on your phone. Via text message: 1. It is possible to use the Anti-Theft functionality by sending text message to your phone. 2. The following features are supported: Send text message #lock# <security code> to your phone to lock it. Send text message #locate# <security code> to your phone to locate it. Send text message #wipe# <security code> to wipe it.

12 Send text message #alarm# <security code> to turn the alarm on. Send text message #alarm# <security code> #0 it again to turn the alarm off. What are the supported platforms for Protection Service for Business Mobile Security? The product is currently available for the Android mobile operating systems only. Mobile Security contains Anti-Malware, Firewall, Anti-Theft and Browsing Protection, with some differences between operating systems. Please note that Apple IOS and Windows Phone are currently not supported by Protection Service for Business. The closed architecture of these systems are less vulnerable against viruses and malware. At the same, time they do provide the same possibilities for integration of a security solution. 6. PSB and Server Security How do install PSB & Server Security? Install the software on a computer and after the installation verify that the computer shows in the portal. Download the Server Installation File: To install the software: 1. Locate the downloaded file and double-click the.exe file to start the installation. 2. Select the installation language, and click Next to continue. 3. Read the license agreement. To accept the agreement and to continue, click Accept. 4. Enter your subscription key and click Next. You must enter the same subscription key that you used when you created the account. What are the supported platforms PSB & Server Security? The product can be installed on one of the following operational systems: Microsoft Windows Server 2003 with the latest service pack Microsoft Windows Server 2003 R2 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Small Business Server 2003 Microsoft Small Business Server 2003 R2 Microsoft Small Business Server 2008 Microsoft Small Business Server 2011, Standard edition Microsoft Small Business Server 2011, Essentials Microsoft Windows Server 2012 Microsoft Windows Server 2012 Essentials All Microsoft Windows Server editions are supported except: Windows Server for Itanium processor Windows DataCenter and HPC editions Windows Storage editions

13 Windows MultiPoint Server Windows Home Server Note: For performance and security reasons, you can install the product only on NTFS partition. F-Secure PSB and Server Security can be installed on a computer running the following Microsoft Exchange Server versions: Microsoft Exchange Server 2003 with the latest service pack Microsoft Exchange Server 2007 (64-bit version) with the latest service pack Microsoft Exchange Server 2010 service pack 2, service pack 3 Microsoft Exchange Server 2013 Microsoft Small Business Server 2003 Microsoft Small Business Server 2008 Microsoft Small Business Server 2011, Standard edition The product supports the following roles of Microsoft Exchange Server 2007/2010: Edge Server role Hub Server role Mailbox Server role Combo Server (Mailbox Server and Hub Server roles) Note: The 32-bit version of Microsoft Exchange Server 2007 is not supported. Important: The Collaboration Data Objects for Exchange (CDOEX) update is required if you plan to install F-Secure and Server Security on Microsoft Exchange Server 2007 running on Microsoft Windows Server 2008 R2. The update and installation instructions are available in Microsoft Knowledge Base article It is important to note that the CDOEX update must be installed before installing Microsoft Exchange Server 2007 SP3. F-Secure PSB and Server Security requires Microsoft SQL Server for the quarantine management. The following versions of Microsoft SQL Server are recommended to use: Microsoft SQL Server 2005 (Enterprise, Standard, Workgroup or Express Edition) with the latest service pack Microsoft SQL Server 2008 (Enterprise, Standard, Workgroup or Express Edition) Microsoft SQL Server 2008 R2 (Enterprise, Standard, Workgroup or Express Edition) Microsoft SQL Server 2012 (Enterprise, Business Intelligence, Standard, or Express Edition) Microsoft SQL Server 2008 R2 SP1 Express Edition is distributed with the product and can be installed during F-Secure and Server Security Setup. Note: Microsoft.NET Framework version 2.0 and Microsoft Windows Installer 4.5 are required to install Microsoft SQL Server 2008 R2 SP1 Express Edition. They can be downloaded from Microsoft Download Center. If you plan to have Microsoft SQL Server on the same server, install these components before installing F-Secure and Server Security. Important: We do not recommend using MSDE or Microsoft SQL Server 2005/2008/2008R2 Express Edition if you are planning to use the centralized quarantine management or if your organization sends and receives a large amount of s. For more information about the limitations of the Microsoft SQL Server 2005/2008/2008R2 Express Edition or MSDE, see the product manual.

14 7. General Troubleshooting I did what the instructions said in the Mobile installation section but I m still unable to install Protection Service for Business Mobile Security application? There are numerous Android versions and devices and thus there can be differences in the exact installation flow. The simplest way to get instructions is to use search engine like and use search query based on your device model e.g. install from unknown sources Galaxy S2. Most likely someone else have had the same problem and it has been solved giving you the working solution. Why Automatic Updates are taking longer to download than usual? Automatic updates are turned on as soon as you install the F-Secure software. Whenever your computer is connected to the Internet, the F-Secure product checks for the newest updates automatically and downloads them once every two hours. The entire update package is quite large, and the download time depends on the speed of your Internet connection. If your computer has not been turned on in the last seven days, the entire update package will be downloaded and installed, and this takes longer than the normal daily updates. How do I know that Protection Service for Business is running smoothly? The status of Protection Service for Business is easy to check on the front page of the Protection Service for Business client. It clearly and intuitively shows a large icon which shows to the status of the client. Icon Text Description OK Info Warning Error Off Your computer is protected. The feature is turned on, and working properly. The product informs you about a special status of a feature. This icon is shown, for example, when a feature is being updated. Your computer is not fully protected. For example, the product has not received updates is a long time requires attention. Your computer is not protected. For example, your subscription has expired, a critical feature is turned off. A non-critical feature is turned off. The security status of the whole Protection Service for Business environment can be centrally and continuously followed through the Protection Service for Business Portal. All issues that require attention are clearly highlighted, with specific task links designed to allow direct and immediate administration of related parts and functions. My network printer is not working after installing Protection Service for Business for Workstation. What happened? Protection Service for Business default profile does not have the Network and Printer sharing service enabled by default for security reasons. You can correct the issue by changing the default profile in the Protection Service for Business Portal, either by changing to Office LAN pre-set configuration, or by editing the existing default profile to include the Windows Networking service as an allowed rule item.

15 For more indebt information on configuring Protection Service for Business and its pre-defined security profiles, please consult Admin Guide. My frequently used software is not working after the installation of Protection Service for Business. What happened? Most likely the software has emitted suspicious activity or has been infected with malware, and has been consequently blocked. Protection Service for Business contains highly advanced proactive protection features that monitor the behavior of applications in order to keep your systems protected from previously unknown or advanced threats, which cannot be blocked traditional signature based detection. This means that Protection Service for Business tracks the behavior of the software running in your systems, and if it notices malicious activity, it will block the application. Consequently, this means either two things: 1. Your software is infected by a malware (for example your browser or a plugin in it) and this malware wants to execute malicious activity on your computer. 2. Your software might emit similar behavior as malware, and is consequently recognized as such. This happens for example in cases where the software is penetrating the network (like network scanners) or tracking activity of your keyboard (key loggers). You should always give us a sample of the file that was reported, so that we can examine it personally by analysts. After the examination, you will get a report stating if the file is really malicious (was infected by a malware) or if it is a falsely tagged software. In the latter case, we will immediately add it in our Data Base update and the block will be removed without any action needed from you. How do I send a sample to F-Secure? You can submit a sample to F-Secure through our Sample Analysis Portal that can found here: Samples can be submitted anonymously without an account. If you want to get feedback on the samples, submit large batches of samples or URLs, then you have to register an account and fill in the submission form. Unused accounts will be removed after 12 months of inactivity. How do I create F-Secure diagnostic File (FS DIAG)? What do I need it for? If you have technical problems with your security product, you should always create an FSDIAG file before contacting technical support. The file contains vital information that can be used for troubleshooting and solving problems specific to your computer. You can create the file by using the Support Tool program. The program gathers vital information about your system and its configuration. The information includes product details, operating system logs and system settings. In some cases, this information might be considered confidential. The data collected by Support Tool is stored locally on your computer. Gathering information may take several minutes. To create FS DIAGadd a new subscription key: 1. Click Start. 2. Select All Programs > F-Secure > Support Tool.

16 3. In the Support Tool window, click OK. 4. The tool will start gathering information and it create the fsdiag.tar.gz file on your desktop. Also, if possible: Gather and attach as much information as possible about the case from the affected computer, and add screenshots of any GUI notifications or error pop-up s.

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM EMPLOYEES WORK ON THE MOVE, WITH MULTIPLE DEVICES MEETING CUSTOMERS WORKING FROM HOME BUSINESS TRIP CLOUD SERVICES ARE ENABLERS OF MOBILE

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

FAQ. Safe Anywhere PC. Disclaimer:

FAQ. Safe Anywhere PC. Disclaimer: FAQ Safe Anywhere PC Version: 1.0 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015) AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

More information

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trusteer Rapport. User Guide. Version 3.5.1307 April 2014

Trusteer Rapport. User Guide. Version 3.5.1307 April 2014 Trusteer Rapport User Guide Version 3.5.1307 April 2014 Contents About this Guide 1 Need More Information about Trusteer Rapport? 1 Sending us Feedback 1 1. What is Trusteer Rapport? 3 Antivirus: A False

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Single Product Review: Kaspersky Small Office Security 4

Single Product Review: Kaspersky Small Office Security 4 Kaspersky Lab Single Product Review Kaspersky Small Office Security 4 Language: English June 2015 Last Revision: 30 th June 2015-1 - Introduction Kaspersky Small Office Security 4 is a security package

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

Getting Started Guide: Getting the most out of your Windows Intune cloud

Getting Started Guide: Getting the most out of your Windows Intune cloud Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

avast! Small Office Administration Console Small Office Administration Console User Guide

avast! Small Office Administration Console Small Office Administration Console User Guide Small Office Administration Console User Guide 1 2 Introduction to the Small Off ice Administrat ion Console The Small Office Administration Console provides central management capability for your installation

More information

RMM/MDM. Quick Reference Guide

RMM/MDM. Quick Reference Guide RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Kaspersky Small Office Security User Guide

Kaspersky Small Office Security User Guide Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Protection Service for Business

Protection Service for Business Protection Service for Business Getting Started Guide for Mac Computers System requirements System requirements Supported platforms For all supported OS X versions. Workstation (Mac) Processor: Memory:

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus

More information

SQL EXPRESS INSTALLATION...

SQL EXPRESS INSTALLATION... Contents SQL EXPRESS INSTALLATION... 1 INSTALLING SQL 2012 EXPRESS... 1 SQL EXPRESS CONFIGURATION... 7 BILLQUICK DATABASE... 9 SQL Express Installation The Microsoft SQL Server 2012 Express software is

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business SECURE YOUR BUSINESS WHEREVER IT TAKES YOU Protection Service for Business IT S A MOBILE WORLD Wifi Pedestrian Today we use more devices over more connections than ever before. Choosing when, where and

More information

AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011)

AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011) AVG File Server 2012 User Manual Document revision 2012.03 (8/19/2011) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This

More information

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Getting Started with VMware Horizon View (Remote Desktop Access)

Getting Started with VMware Horizon View (Remote Desktop Access) Getting Started with VMware Horizon View (Remote Desktop Access) Use The Links Below To Navigate This Document Using VMware Horizon View with Tablet and Smartphone APP or Mobile Web Browser Walk Through

More information

BitDefender Security for Exchange

BitDefender Security for Exchange Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

Remote Desktop Services User's Guide

Remote Desktop Services User's Guide Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Home Internet Filter User Guide

Home Internet Filter User Guide Home Internet Filter User Guide TABLE OF CONTENTS About Home Internet Filter... 2 How Home Internet Filter help you?... 2 Setting up the Residential Gateway and accessing to SingTel Home Internet Filter

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014 Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products

More information

AVG File Server 2013. User Manual. Document revision 2013.03 (11/13/2012)

AVG File Server 2013. User Manual. Document revision 2013.03 (11/13/2012) AVG File Server 2013 User Manual Document revision 2013.03 (11/13/2012) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This

More information

Securing Your Business s Bank Account

Securing Your Business s Bank Account Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

QUICK INSTALLATION GUIDE ACTIVATE

QUICK INSTALLATION GUIDE ACTIVATE ACTIVATE ACTIVATE ACTIVATE 1. Activate the business cloud A. Service Activation: You will receive a confirmation e-mail within 2 hours maximum BASE business Cloud: Notification/Notificatie B. Go to https://cdashboard.

More information

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business SECURE YOUR BUSINESS WHEREVER IT TAKES YOU Protection Service for Business IT S A MOBILE WORLD Wifi Today, we use more devices over more connections than ever before. Choosing when, where and how to work

More information

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0 ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

LogMeIn Hamachi. Getting Started Guide

LogMeIn Hamachi. Getting Started Guide LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

OFFICE 365 SELF- CONFIGURATION GUIDE

OFFICE 365 SELF- CONFIGURATION GUIDE IT HELPDESK, REPUBLIC POLYTECHNIC OFFICE 365 SELF- CONFIGURATION GUIDE Version 7.0 IT Helpdesk 6-30-2015 0 TABLE OF CONTENTS Things to note before proceeding with this guide:... 1 Office 365 ProPlus Installation

More information

Kaspersky Security for Mobile Administrator's Guide

Kaspersky Security for Mobile Administrator's Guide Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Virtual Workplace Personal Device Client Installation Instructions

Virtual Workplace Personal Device Client Installation Instructions Virtual Workplace Personal Device Client Installation Instructions 1 Table of Contents About this Installation Guide... 2 Client Overview... 2 VMware Horizon View Clients... 2 UniPrint Clients... 3 Client

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

ESET NOD32 Antivirus. Table of contents

ESET NOD32 Antivirus. Table of contents ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on

More information

ESET Security Solutions for Your Business

ESET Security Solutions for Your Business ESET Security Solutions for Your Business It Is Our Business Protecting Yours For over 20 years, companies large and small have relied on ESET to safeguard their mission-critical infrastructure and keep

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Wireless Printing Setup Guide

Wireless Printing Setup Guide Temple University Beasley School of Law Wireless Printing Setup Guide Updated August, 2012 Temple Law Computer Services 8/27/2012 Table of Contents Computer Operating System Page Windows 7 2 Windows Vista

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

LEVEL 3 SM XPRESSMEET SOLUTIONS

LEVEL 3 SM XPRESSMEET SOLUTIONS LEVEL 3 SM XPRESSMEET SOLUTIONS USER GUIDE VERSION 2015 TABLE OF CONTENTS Level 3 XpressMeet Calendar...3 Level 3 SM XpressMeet Outlook Add-In...3 Overview...3 Features...3 Download and Installation Instructions...

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Abila Nonprofit Online. Connection Guide

Abila Nonprofit Online. Connection Guide Abila Nonprofit Online This is a publication of Abila, Inc. 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information