FAQ. Safe Anywhere PC. Disclaimer:

Size: px
Start display at page:

Download "FAQ. Safe Anywhere PC. Disclaimer:"

Transcription

1 FAQ Safe Anywhere PC Version: 1.0 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure product names (Internet Security and Anti-Virus) and applications (Computer Security and Online Safety) with names and titles of your own. Note also that the document may contain both internal and external links to related and additional information, such as download links, F-Secure estore links and links to F-Secure web site. These links may not necessarily be always applicable to you. 1

2 Contents 1. What are the system requirements? How can I check the operating system version? How do I check the Windows XP version? How do I remove conflicting security products? Why does F-Secure use a network installer? What are the firewall s functions? What to do if virus definitions are out of date? What is the launchpad?...7 2

3 Before installation 1. What are the system requirements? Your computer must meet the requirements listed below. Supported operating systems: Windows 8 (32-bit and 64-bit): All editions. Windows 7 (32-bit and 64-bit): All editions. Windows Vista (32-bit and 64-bit): All editions, Service Pack 2 or later. Windows XP (32-bit): Home, Professional, Service Pack 3 or later. Recommended requirements for Microsoft Windows 8, 7 and Vista: Processor: Intel Pentium 4 2 GHz or higher. Memory: 1 GB or more. Disk space: 800MB of free hard disk space (500MB for Anti-Virus only). Display: 16-bit or more (65,000 colors). Internet connection: An Internet connection is required to validate your subscription and enable receipt of updates. Recommended requirements for Microsoft Windows XP: Processor: Intel Pentium III 1GHz or higher. Memory: 512 MB or more. Operating system: Microsoft Windows XP, Service Pack 3. Disk space: 800 MB of free hard disk space (500 MB for Anti-Virus only). Display: 16-bit or more (65000 colors). Internet connection: An Internet connection is required to validate your subscription and enable receipt of updates. Supported web browsers: Internet Explorer 7 & 8 (Windows XP) and Internet Explorer 8 & 9 (Windows Vista & Windows 7, 32-bit and 64-bit), Internet Explorer 10 (Windows 8, 32-bit and 64-bit). Mozilla Firefox two latest major versions. Google Chrome two latest major versions. 3

4 2. How do I check the operating system version? Check your system properties in Microsoft Windows as follows: 1. Click Start. 2. Click Control Panel. o Windows 7: 1. Select System and Security. 2. Click System. o Windows Vista: 1. Select the System and Maintenance category. Note: This step may not be necessary in all computers. 2. Click System. The System Properties window opens. o Windows XP: 1. Select the Performance and Maintenance category. Note: This step may not be necessary in all computers. 2. Double-click System. The System Properties window opens. Note: Click here to find out whether your computer is running a 32- bit or a 64-bit version of Windows XP. You can view your computer s properties, such as operating system version, processor information and amount of memory (RAM). 3. How to check Windows XP version? Several ways are available to determine whether your computer is running a 32-bit or a 64-bit version of Windows XP: 1. If you have a Windows keyboard, press the Windows key + Pause/Break to display the System Properties dialog box. If the system information mentions nothing about a 32-bit or a 64-bit version, the system is running a 32-bit version of Windows XP. 2. Open My Computer to check system properties: a. Click Start. b. Right-click My Computer and select Properties. The System Properties window opens. c. On the General tab, check the first line under Computer: In 64-bit versions of XP, Itanium or Itanium 2 is shown. In 32-bit XP, some other value is shown. 4

5 4. How do I remove conflicting security products? Tip: Always keep just one security product on your computer for best and smoothest performance. Removing security products manually If you know the name of the security product, you can uninstall it in the following way: 1. Click Start > Control Panel. 2. Double-click Add or Remove Programs. 3. If you can find the product in the list of currently-installed programs, remove (uninstall) it. If the product cannot be uninstalled, contact the software vendor concerned for support and maybe ask for a removal tool. Below are vendor-specific uninstallation instructions for some security products currently on the market: Uninstall AVG 6 Uninstall PC-cillin Uninstall Ad-Aware Uninstall McAfee Uninstall Norton More information If your computer does not start correctly after installing the F-Secure product, follow the steps below: 1. Start your computer in safe mode. For instructions, see article 2110 Computer stops working after installation. 2. Remove the F-Secure product. 3. Restart your computer. 4. Create an FSDiag file. For instructions, see Creating an FSDiag file. 5. Send the FSDiag file to F-Secure support by submitting a support request. Installation 5. Why does F-Secure use a network installer? F-Secure uses a small network installer for the following reasons: 5

6 Initial download is quicker than ever, thanks to the small size of the network installer. The network installer takes over download of additional components, making installation more reliable. Installation of products is now faster because only the required product components will be downloaded and installed. The latest version is always installed. This means the user need not upgrade the product after installation. Changing settings 6. What are the firewall s functions? Blocking download of exploits and other harmful files each downloaded file is scanned and all harmful files are blocked automatically. Preventing suspicious applications from accessing the Internet if the safety of an application cannot be verified, DeepGuard starts to monitor its behavior. Based on behavioral analysis, DeepGuard will either allow or deny network access or asks the user whether to permit access. Browser manipulation detection DeepGuard detects if malware is trying to manipulate the browser and prevents such attempts. Updates 7. What should I do if virus definitions are out of date? 1. Open the F-Secure launchpad, right-click the F-Secure icon and select Check for updates. 2. Open the F-Secure launchpad, right-click the F-Secure icon and select View my subscriptions. You can check your subscription status in the My subscriptions window. 3. Check that the Windows date and time are correct because incorrect settings can cause the product to report that your virus definitions are out of date, even if this is not the case. You can see the date and time in the Windows system tray. You can change clock settings in Date and Time Properties. To open properties, double-click the clock. 4. Download and run fsaua-reset.exe. When the command window opens, press Y. The program will close by itself. 5. Download and run fsdbupdate9.exe which contains a new copy of the virus definitions. 6

7 If the above actions do not help, we recommend that you first uninstall the product, then reinstall. More information 8. What is the launchpad? Once you have downloaded the F-Secure network installer (F- SecureNetworkInstaller.exe) and installed the product, the launchpad is displayed at the bottom of your screen: If it is not visible onscreen, you can open it via the F-Secure icon on your desktop. This is where you can access all your F-Secure applications and manage your subscriptions. The launchpad's common settings apply to all the programs installed on the launchpad. Instead of changing the settings separately in each program, you can simply edit the common settings, which are then used by all the installed programs. You can use the launchpad to change the following common settings: Downloads view information on updates downloaded and manually check if new updates are available. Connection settings change how your computer connects to the Internet. Notifications view past notifications and set the kind of notifications you want to see. Privacy settings select whether or not your computer is allowed to connect to the Real-time Protection Network. Note: For security reasons, some of the settings can be changed only by a user with administrative access rights. 7

8 You can also manage your subscriptions for installed programs through the launchpad: 1. On the launchpad, right-click the right-most icon. A pop-up menu appears. 2. Select View my subscriptions. The My subscriptions window opens. 3. Do one of the following: Select Subscription status to view information on your subscriptions for installed programs. Select Installation status to see what programs are available to be installed. For more information on F-Secure launch pad: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Help. 8

Verizon Security Scan Powered by McAfee. Installation Guide for Home Users

Verizon Security Scan Powered by McAfee. Installation Guide for Home Users Verizon Security Scan Powered by McAfee Installation Guide for Home Users ii Contents Introduction 3 System requirements 5 Installing Security Scan 7 Downloading your software... 7 Download your software...

More information

Shaw Secure Powered by McAfee Registration and Installation

Shaw Secure Powered by McAfee Registration and Installation OVERVIEW This document will guide you through the process of account registration, downloading, and installing Shaw Secure Powered by McAfee. If you experience any challenges with the software installation

More information

FAQ. F-Secure Online Backup 2.1

FAQ. F-Secure Online Backup 2.1 FAQ F-Secure Online Backup 2.1 Before installation... 4 Does the F-Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

FAQ. F-Secure Online Backup

FAQ. F-Secure Online Backup F-Secure Online Backup Before installation... 3 Does the F Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs better

More information

Verizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users

Verizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users Verizon Internet Security Suite Powered by McAfee Installation Guide for Business Users ii Contents Introduction 3 System requirements 5 Installing Verizon Internet Security Suite 7 Signing in to your

More information

Verizon Internet Security Suite Powered by McAfee. Upgrade Guide for Business Users

Verizon Internet Security Suite Powered by McAfee. Upgrade Guide for Business Users Verizon Internet Security Suite Powered by McAfee Upgrade Guide for Business Users ii Contents Introduction 3 System requirements 5 Upgrading Verizon Internet Security Suite 7 Downloading your software...

More information

DOE VPN Client Installation and Setup Guide March 2011

DOE VPN Client Installation and Setup Guide March 2011 DOE VPN Client Installation and Setup Guide March 2011 Table of Contents Introduction... 3 System Requirements... 3 Microsoft Windows... 3 Mac OS X... 4 Windows... 4 Installation for the Cisco AnyConnect

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Sage Grant Management System Requirements

Sage Grant Management System Requirements Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

McAfee Enterprise Edition v 7.1.0 Installation & Configuration For Windows NT, 2000, and XP

McAfee Enterprise Edition v 7.1.0 Installation & Configuration For Windows NT, 2000, and XP McAfee Enterprise Edition v 7.1.0 Installation & Configuration For Windows NT, 2000, and XP McAfee Enterprise Edition v 7.1.0: Installation & Configuration 1 McAfee Enterprise Edition v 7.1.0: Installation

More information

F-Secure Online Backup Quick Installation Guide

F-Secure Online Backup Quick Installation Guide F-Secure Online Backup Quick Installation Guide TOC 3 Contents F-Secure Online Backup Quick Installation Guide...5 Introduction...6 System Requirements...7 Installation...10 Installation on a Windows computer...10

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

================================================================== CONTENTS ==================================================================

================================================================== CONTENTS ================================================================== Disney Planes Read Me File ( Disney) Thank you for purchasing Disney Planes. This readme file contains last minute information that did not make it into the manual, more detailed information on various

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS INSTALLATION INSTRUCTIONS Table of Contents A. Installing Symantec Anti-Virus 8.1 For Windows (32-Bit) From CD B. Installing Norton Anti-Virus 7.61 For Windows 95 From CD C. Installing Norton Anti-Virus

More information

Dexcom Portrait on the Web User Guide For Use with the Dexcom G4 PLATINUM Continuous Glucose Monitoring System

Dexcom Portrait on the Web User Guide For Use with the Dexcom G4 PLATINUM Continuous Glucose Monitoring System Dexcom Portrait on the Web User Guide For Use with the Dexcom G4 PLATINUM Continuous Glucose Monitoring System LBL 0123491 Rev 10 Table of Contents 1 Introduction to Dexcom Portrait on the Web... 3 1.1

More information

Verizon Internet Security Suite Multi-Device Powered by McAfee. Installation Guide for Multi Devices for Residential Users

Verizon Internet Security Suite Multi-Device Powered by McAfee. Installation Guide for Multi Devices for Residential Users Verizon Internet Security Suite Multi-Device Powered by McAfee Installation Guide for Multi Devices for Residential Users Contents Introduction 3 System requirements 4 Installing Verizon Internet Security

More information

Citrix : Remediation - MAC

Citrix : Remediation - MAC Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing

More information

STEP 1: INSTALLING WINDOWS DEFENDER

STEP 1: INSTALLING WINDOWS DEFENDER Office of Information Technology Secure your Windows XP Computer for Use on AU s Network Every member of the AU community has a shared responsibility for the safekeeping of our computer network. Since

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM EMPLOYEES WORK ON THE MOVE, WITH MULTIPLE DEVICES MEETING CUSTOMERS WORKING FROM HOME BUSINESS TRIP CLOUD SERVICES ARE ENABLERS OF MOBILE

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

MITA VPN Client Software Installation Guide

MITA VPN Client Software Installation Guide 01. Introduction Welcome to the Installation of MITA Virtual Private Network Installation Guide. The system allows access to the MAGNET services from your Internet connection in a secure manner. Before

More information

CITRIX TROUBLESHOOTING TIPS

CITRIX TROUBLESHOOTING TIPS CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Policy Bulletin

LOS ANGELES UNIFIED SCHOOL DISTRICT Policy Bulletin Policy Bulletin TITLE: NUMBER: ENTERPRISE LICENSE SYMANTEC ANTI- VIRUS SOFTWARE BUL-717.1 ROUTING All Employees All Locations ISSUER: Margaret A. Klee Chief Information Officer DATE: POLICY: MAJOR CHANGES:

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

U90Ladder / VisiLogic /UniLogic and software utilities system requirements. Contents

U90Ladder / VisiLogic /UniLogic and software utilities system requirements. Contents U90Ladder / VisiLogic /UniLogic and software utilities system requirements Contents Minimum System Requirements... Error! Bookmark not defined. UniLogic Installation... 3 Firmware Update and Management...

More information

Recommended Settings for PACS HRS-d/eJacket via Remote Access

Recommended Settings for PACS HRS-d/eJacket via Remote Access The Main Line Health (MLH) system can be accessed through the Internet using the MLH Extranet Portal. The Extranet Portal gives users access to the MLH Intranet, PACS Horizon RadStation Distributed (HRS-d),

More information

Powerline Network. Utility Program User Guide. for. Instant Networks for Internet Access and More! Solution for SOHO, SMALL OFFICE AND HOME OFFICE

Powerline Network. Utility Program User Guide. for. Instant Networks for Internet Access and More! Solution for SOHO, SMALL OFFICE AND HOME OFFICE Powerline Network Instant Networks for Internet Access and More! Solution for SOHO, SMALL OFFICE AND HOME OFFICE Utility Program User Guide for ALL16820X 1 Index 1. Introduction... 3 1.1. System Requirements...

More information

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0 Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

================================================================== CONTENTS ==================================================================

================================================================== CONTENTS ================================================================== Disney Epic Mickey 2 : The Power of Two Read Me File ( Disney) Thank you for purchasing Disney Epic Mickey 2 : The Power of Two. This readme file contains last minute information that did not make it into

More information

Getting Started with VMware Fusion

Getting Started with VMware Fusion Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site

More information

Installation & Activation Guide. Lepide Active Directory Self Service

Installation & Activation Guide. Lepide Active Directory Self Service Installation & Activation Guide Lepide Active Directory Self Service , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under

More information

Web24 Supported Software

Web24 Supported Software Web24 Supported Software Browser & OS Requirements Connectivity, hardware and browser support are critical to providing the best user experience within Web24. We work hard to make sure that Web24 renders

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

DCPS STUDENT OPTION HOME USE PROGRAM SIGN UP INSTRUCTIONS

DCPS STUDENT OPTION HOME USE PROGRAM SIGN UP INSTRUCTIONS DCPS STUDENT OPTION HOME USE PROGRAM SIGN UP INSTRUCTIONS Step-by-Step Abstract The Enrollment for Education Solutions agreement between Microsoft and Duval County Public Schools provides a student option

More information

Installation Instructions Release Version 15.0 January 30 th, 2011

Installation Instructions Release Version 15.0 January 30 th, 2011 Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof

More information

ODOT UAG Tips/Troubleshooting Guide

ODOT UAG Tips/Troubleshooting Guide ODOT UAG Tips/Troubleshooting Guide These helpful tips are provided by ODOT Computer Support to help those using a non-odot PC and running into issues with connecting the UAG/VPN. This is a best-effort

More information

Outlook to Windows Live Mail

Outlook to Windows Live Mail Overview... 20-01 Learning Objectives... 20-01 Transfer Software... 20-01 System Requirements... 20-02 Application Loading... 20-02 Software Installation... 20-03 Migration Process on the Old PC... 20-05

More information

Simnet Registry Repair 2011. User Guide. Edition 1.3

Simnet Registry Repair 2011. User Guide. Edition 1.3 Simnet Registry Repair 2011 User Guide Edition 1.3 1 Content Getting Started...3 System requirements...3 Minimum system requirements...3 Recomended system specifications...3 Program Overview...4 About

More information

Protection Service for Business

Protection Service for Business Protection Service for Business Getting Started Guide for Mac Computers System requirements System requirements Supported platforms For all supported OS X versions. Workstation (Mac) Processor: Memory:

More information

Section 1.0 Getting Started with the Vālant EMR. Contents

Section 1.0 Getting Started with the Vālant EMR. Contents Section 1.0 Getting Started with the Vālant EMR Contents Getting Started with the Valant EMR application:... 2 Hardware Requirements for the Vālant EMR:... 3 Software Requirements for the Vālant EMR:...

More information

Pre-Requisites: PC and Browser Configuration Guide v1.3

Pre-Requisites: PC and Browser Configuration Guide v1.3 CLIENT FOR CONTRACTORS (C4C) SERVICE REFERENCE GUIDE Pre-Requisites: PC and Browser Configuration Guide v1.3 Introduction Client For Contractors (C4C) is a new service developed by Shell to make contractors

More information

Microsoft Internet explorer 7.0 or higher (Except 10), Mozilla Firefox.

Microsoft Internet explorer 7.0 or higher (Except 10), Mozilla Firefox. Dear Client, Welcome to www.canmoney.in, our portal for online trading. We thank you for choosing us as your trading partner. Our website provides host of services and we have taken adequate care to make

More information

Juniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista

Juniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista Juniper NetScreen IPSec Dial Client Installation Guide for Windows 2000 Windows XP Windows Vista Revision 2.0 NetScreen is a registered trademark of Juniper, Inc. Windows is a registered trademark of Microsoft

More information

Powerline Network Instant Networks for Internet Access and More!

Powerline Network Instant Networks for Internet Access and More! Powerline Network Instant Networks for Internet Access and More! Solution for SOHO, SMALL OFFICE AND HOME OFFICE Utility Program User Guide for ALL168205 1 Index 1. Introduction...3 1.1. System Requirements...

More information

Install and Troubleshoot Java

Install and Troubleshoot Java 01 IG Markets Install and Troubleshoot Java Java software from Sun Microsystems is required to be installed to enable the use of IT-Finance Charts. If Java is not installed, or if there is a problem with

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Grant Management. System Requirements

Grant Management. System Requirements January 26, 2014 This is a publication of Abila, Inc. Version 2014.x 2013 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned

More information

NS Employee Resource Center: Problems and Solutions Accessing the Mainframe (Crewcall, Memo, Realtime, etc.)

NS Employee Resource Center: Problems and Solutions Accessing the Mainframe (Crewcall, Memo, Realtime, etc.) NS Employee Resource Center: Problems and Solutions Accessing the Mainframe (Crewcall, Memo, Realtime, etc.) Below is a list of the solutions for the most common problems when trying to access the mainframe

More information

Installation Guide. McAfee SaaS Endpoint Protection

Installation Guide. McAfee SaaS Endpoint Protection Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Frequently Asked Questions (FAQ) Table of Contents Software Grant Program / Version... 3 1. What is the Autodesk Academic Resource Center?... 3 2. Can I have a hardcopy brochure about the ARC program?...

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES TECHNICAL ARTICLE November 2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Norton Family Product Manual

Norton Family Product Manual Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

E-CERT C ONTROL M ANAGER

E-CERT C ONTROL M ANAGER E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...

More information

Getting Started With Parallels Desktop 10

Getting Started With Parallels Desktop 10 Getting Started With Parallels Desktop 10 Copyright 1999-2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland

More information

Chapter 1: Installation...5

Chapter 1: Installation...5 F-Secure Internet Security 2014 F-Secure Internet Security 2014 TOC 2 Contents Chapter 1: Installation...5 1.1 Before you install for the first time...6 1.2 Installing the product for the first time...7

More information

Speeding up PDF display in Acrobat

Speeding up PDF display in Acrobat Speeding up PDF Display (Firefox 2) Speeding up PDF display in Acrobat WHY CHANGE THE PDF DISPLAY BEHAVIOUR?...1 FIREFOX 2...2 INTERNET EXPLORER 7...5 Why change the PDF display behaviour? Why? Because

More information

User Installation Guide

User Installation Guide The will provide a step-by-step walkthough of how to download and install the application, activate each feature of the product, install any of the feature's prerequisites, extend the license, and deactivate

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

To ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations.

To ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations. Step 2- Computer Check Before you attempt to login to University resources it is important to make sure your computer will support an online course, or an accelerated course with an online component. It

More information

3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age

3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age 3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System Version 4.2 Software Installation Guide (Upgrade) 1 P age Contents Important Information Read First... 3 Software Download...

More information

What is WS_FTP? How WS_FTP Works

What is WS_FTP? How WS_FTP Works What is WS_FTP? WS_FTP is the leading file transfer client with millions of users worldwide. You can easily and securely transfer files between your home and office and to and from customers, clients,

More information

Determining Your Computer Resources

Determining Your Computer Resources Determining Your Computer Resources There are a number of computer components that must meet certain requirements in order for your computer to perform effectively. This document explains how to check

More information

US Cellular : How Do I Update The Software On My US Cellular SCH-R880 (Acclaim) Phone To Android 2.2 Froyo DL25 Build?

US Cellular : How Do I Update The Software On My US Cellular SCH-R880 (Acclaim) Phone To Android 2.2 Froyo DL25 Build? Ho w to gu ides US Cellular : How Do I Update The Software On My US Cellular SCH-R880 (Acclaim) Phone To Android 2.2 Froyo DL25 Build? Samsung has released this software upgrade for the US Cellular SCH-R880

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

PC computer configurations & Windows optimizations (Updated November 2012)

PC computer configurations & Windows optimizations (Updated November 2012) PC computer configurations & Windows optimizations (Updated November 2012) A fast processor and a good amount of memory are important, but do not necessarily guarantee that a computer will perform well

More information

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription

More information

AVG Protection. User Manual. Document revision AVG.32 (6/27/2016)

AVG Protection. User Manual. Document revision AVG.32 (6/27/2016) AVG Protection User Manual Document revision AVG.32 (6/27/2016) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents 1.

More information

BCA Software Installation and Troubleshooting Guide

BCA Software Installation and Troubleshooting Guide BCA Software Installation and Troubleshooting Guide This document contains four components: Prerequisites provides the list of prerequisites and system requirements to successfully install and run the

More information

Motorola Phone Tools. Quick Start

Motorola Phone Tools. Quick Start Motorola Phone Tools Quick Start Contents Minimum Requirements...2 Before Installing Motorola Phone Tools...3 Installing Motorola Phone Tools...4 Mobile Device Installation and Configuration...5 Online

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

Installation Instructions

Installation Instructions Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

User's Guide. Copyright 2013 Bitdefender

User's Guide. Copyright 2013 Bitdefender User's Guide Copyright 2013 Bitdefender Bitdefender Total Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Chapter 2 Installing ShareScope

Chapter 2 Installing ShareScope What you will learn in this chapter: Minimum hardware requirements. How to run ShareScope on a Mac. Where to find your account number & password. How to download the ShareScope software. How to install

More information

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting

What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting Version 1.6 1 1 1 2 2 8 8 9 9 9 What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting your Installation Managing

More information

Installing FileMaker Pro 11 in Windows

Installing FileMaker Pro 11 in Windows Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following

More information

UNGASS CRIS 2008

UNGASS CRIS 2008 version 1.0 UNGASS DATA ENTRY SOFTWARE: GLOBAL REPORTING 2008 TROUBLESHOOTING GUIDE Prepared by UNAIDS Evidence, Monitoring, and Policy Department UNAIDS 20, Avenue Appia 1211 Geneva 27 Switzerland Tel.

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

Verizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users (Mac)

Verizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users (Mac) Verizon Internet Security Suite Powered by McAfee Installation Guide for Business Users (Mac) ii Contents Introduction 3 System requirements 5 Installing Verizon Internet Security Suite 7 Signing in to

More information

If you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines.

If you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines. Join Help If you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines. I can't join a session. If you're having trouble joining

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Abila Grant Management. System Requirements

Abila Grant Management. System Requirements Abila Grant Management This is a publication of Abila, Inc. Version 2015 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names

More information

Xactimate v.27 Network Installation

Xactimate v.27 Network Installation Xactimate v.27 Network Installation Requirements Like all networked software applications, Xactimate Version 27 must be installed on a workstation connected to a network that has been properly set up and

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information