Total Protection Service
|
|
|
- Bryce Augustus McCarthy
- 9 years ago
- Views:
Transcription
1 User Guide McAfee Total Protection Service for Microsoft Windows Home Server
2 COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. License Attributions Refer to the product Release s. Issued February 2008 / Total Protection Service for WHS
3 Contents 5 What is Total Protection Service? Installing your software Activating your software Purchasing or renewing a full subscription Using the Total Protection Service console Accessing the features Checking notifications Checking the status of Total Protection Service Configuring settings for Total Protection Service Launching the SecurityCenter Updating Total Protection Service Scanning for threats Scanning manually (on-demand scans) Scheduling scans Managing potentially unwanted program detections Managing quarantined files Troubleshooting Testing your virus protection Uninstalling and reinstalling Total Protection Service Frequently asked questions Error messages and notifications Index 21 3
4 Contents 4
5 This guide provides basic instructions for using McAfee Total Protection Service for WHS to safeguard your Microsoft Windows Home Server against a variety of threats. What is Total Protection Service? Installing your software Using the Total Protection Service console Launching the SecurityCenter Updating Total Protection Service Scanning for threats Managing potentially unwanted program detections Managing quarantined files Troubleshooting What is Total Protection Service? Total Protection Service is a comprehensive security management solution that: Checks for viruses, spyware, unwanted programs, and other potential threats. Every time a file is accessed on your server, Total Protection Service scans the file to make sure it is free of viruses and spyware. Sends security status information for your server to an administrative website that is unique to your account, known as the McAfee SecurityCenter. You can visit the SecurityCenter to check detection reports or set up security rules. Updates itself automatically at regular intervals with the latest versions of components and detection definition (DAT) files. This ensures that Total Protection Service is always able to protect you against the latest threats. Typically, Total Protection Service operates in the background without any interaction on your part. Occasionally, however, you might need to interact with it. For example, you might want to schedule a weekly scan of all the files on your server. This guide explains how to use your basic security features and troubleshoot problems. 5
6 Installing your software Optimized for WHS Total Protection Service is optimized for your WHS multimedia environment. It continually monitors activity on the server to ensure that scanning operations do not interfere. When another activity places high demand on the server s processing capabilities, Total Protection Service pauses its scan, then resumes it when greater processing capability becomes available. This means that, for example, a scheduled scan might take longer than you anticipate, but will never degrade the performance of another activity, such as viewing a movie. Installing your software Total Protection Service is delivered to your server as an add-in. To install Total Protection Service: 1 Click Settings in the upper right corner of the WHS console. 2 In the dialog box, click McAfee Total Protection Service. 3 Click Add-ins. 4 Click the Available tab. 5 Click Install. 6 When uninstallation is complete, you are notified that you need to close the WHS console, then restart it. After installation, a trial period begins. Your copy of Total Protection Service updates the detection definition (DAT) files used to detect threats. Then the on-access scanning feature is activated to check all files automatically as you access them, and you can perform on-demand scans to check all the files on your server for threats. To continue receiving updates that protect you against new threats or to schedule scans, you need to activate your copy of Total Protection Service. On or before the end of the trial period, you must purchase a full subscription to extend protection beyond the trial period. Activating your software Purchasing or renewing a full subscription Activating your software Activate your copy of Total Protection Service to continue receiving DAT file updates that protect against the latest threats. An activated copy checks for updates automatically at regular intervals and allows you to schedule scans. After activating a trial version, you will also have an option to purchase a full subscription that extends protection beyond the trial period. To activate your software: 1 In the Common Tasks area of the Total Protection Service console, select Activate Now. 2 Follow the instructions in the Activation wizard to enter information that identifies your account. 6
7 Using the Total Protection Service console Purchasing or renewing a full subscription Once you have activated a trial of Total Protection Service, you can extend protection by purchasing a full subscription during the trial period. A full subscription ensures you continue to receive updates and retain access to features such as on-demand scans and scheduled scans. When a full subscription nears expiration, you can renew it to ensure uninterrupted protection. To purchase or renew a subscription: 1 In the Common Tasks area of the Total Protection Service console, select Buy Now. 2 Enter your contact and payment information when prompted. If your trial or full subscription has expired, Total Protection Service is no longer protecting your computer against new threats with updated DAT files. When you attempt to access a feature, a dialog box notifies you that your copy has expired and offers you the opportunity to purchase or renew a full subscription. Using the Total Protection Service console Total Protection Service provides a centralized interface for accessing and managing security for your Windows Home Server. Accessing the features Checking notifications Checking the status of Total Protection Service Configuring settings for Total Protection Service 7
8 Using the Total Protection Service console Accessing the features Access Total Protection Service features through the Total Protection Service area of the WHS console. To view the Total Protection Service console: Click McAfee Total Protection at the top of the console window. Figure Use this area of the console... 1 Common Tasks 2 On-Demand Scan 3 Status and About 4 Network Health 5 Settings To do this... Perform common tasks: Activate or purchase your software (see Activating your software and Purchasing or renewing a full subscription). Visit the administrative website for your account (see Launching the SecurityCenter). Check for updates to Total Protection Service components and threat detection files (see Updating Total Protection Service). Schedule a time for a scan to occur (see Scanning for threats). Respond to a potentially unwanted program detection (see Managing potentially unwanted program detections). View the folder where detected threats are stored (see Managing quarantined files). Scan one or more shares on your server (see Scanning for threats). Check the current status of your server and your software s components (see Checking the status of Total Protection Service). Check notifications about the health of your system (see Checking notifications). Open the Settings dialog box, where you can schedule a scan or access Add-Ins to install, uninstall, or reinstall Total Protection Service (see Scheduling scans, Installing your software, and Uninstalling and reinstalling Total Protection Service). 8
9 Using the Total Protection Service console Checking notifications Total Protection Service displays important information about your network s health in two locations: Using the Network icon at the top of the console. In popup messages in the bottom right corner of the screen. These messages appear on client computers where the notifications feature is enabled. If the notification feature has been disabled: Click the WHS icon in the system tray, then select Display Network Health Notifications. Notification dialog boxes alert you to specific situations. Read each notification carefully to determine whether you need to respond. Notifications can indicate that: A threat has been detected, such as a virus or spyware. To view a threat detection notification, click the yellow Network icon at the top of the console. See Managing potentially unwanted program detections and Managing quarantined files for information on responding to detections. You need to activate your trial (see Activating your software). Your trial period is expiring (see Purchasing or renewing a full subscription). Your server is not fully protected due to one of these problems (see Error messages and notifications): Threat detection files have not been updated in the last 14 days. Total Protection Service is not running. One or more components of Total Protection Service, such as the on-access scanning or automatic update feature, are not operational. Checking the status of Total Protection Service At the top of the status area, Total Protection Service displays your server s status: Your server is protected Total Protection Service is performing an update Your server is not protected All Total Protection Service components are active and functioning properly. Total Protection Service is checking the update website for new versions of components or threat detection files. You should not disconnect from the Internet or turn off your server until the update is complete. Possible causes are: Threat detection files have not been updated in the last 14 days. Total Protection Service is not running. One or more components of Total Protection Service, such as the on-access scanning or automatic update feature, are not operational. See Error messages and notifications for more information. 9
10 Launching the SecurityCenter The About area of the Total Protection Service console displays messages to indicate the status of all components. Product version Last updated Last checked Detection definitions (DAT file) Created on Scan engine Buffer overflow protection definitions Description The version of your virus and spyware protection software. The last date when your server downloaded updated files. The last date when your server checked for updated files. The version of the file that defines virus and spyware threats. The date when your DAT file was created. The version of the component that scans files to check for threats. The version of the file that defines buffer overflow threats. Configuring settings for Total Protection Service Access Total Protection Service settings from the Windows Home Server Settings dialog box. To open the Windows Home Server Settings dialog box: 1 Click Settings in the upper right corner of the WHS console. 2 In the dialog box, click McAfee Total Protection Service. From the dialog box, you can: Schedule a scan (see Scheduling scans). Install, uninstall, and reinstall Total Protection Service (see Installing your software and Uninstalling and reinstalling Total Protection Service). Launching the SecurityCenter Total Protection Service sends security status information for your server to an administrative website that is unique to your account. You can visit this site, known as the SecurityCenter, to check detection reports or set up security rules. To open the SecurityCenter: In the Common Tasks area of the Total Protection Service console, select Launch SecurityCenter. To learn more about the SecurityCenter: View an audio-based overview of using the SecurityCenter to manage your computers, available at Get detailed instructions for all SecurityCenter features in the product guide, available from the SecurityCenter s Help tab as a printable PDF file or as online help. 10
11 Updating Total Protection Service Updating Total Protection Service Total Protection Service connects directly to a site on the Internet and checks for: Updates to the detection definition (DAT) files used to detect threats. DAT files contain definitions for threats such as viruses and spyware, and these definitions are updated as new threats appear. Upgrades to software components. (To simplify product terminology, both updates and upgrades are referred to as updates.) Updates usually occur automatically in the background. By default, they occur 5 minutes after you turn on your server and every 12 hours thereafter. In addition, Total Protection Service checks every hour for a special DAT file released by McAfee in response to a threat outbreak. A message in the Total Protection Service console indicates when an update is in progress, and you should not disconnect from the Internet or turn off your server until the update is complete. You might also need to check for updates manually. If a scheduled or on-demand scan is in progress when an update is scheduled to occur, the scan will be canceled. Be sure to schedule scans so they will not conflict with updates. To manually check for new udpates: In the Total Protection Service console, select Update Now. A dialog box shows the progress of the update. When the update is completed, the About section of the console displays Last Update, the date, and a list of files that were downloaded. Scanning for threats Total Protection Service scans information on your Windows Home Server at these times: When you access files, folders, and programs, referred to as an on-access scan. You can specify which types of file are scanned on access by configuring a policy in the SecurityCenter. When you request a manual scan, referred to as an on-demand scan. After you install Total Protection Service for the first time, we recommend running an on-demand scan of all your server s shares before proceeding. When you specify a future time to perform a manual scan, referred to as a scheduled scan. If your server is powered off when a scan is scheduled to occur, the scan takes place five minutes after you power it up again. If a scheduled or on-demand scan is in progress when an update is scheduled to occur, the scan will be canceled. Be sure to schedule scans so they will not conflict with updates. 11
12 Scanning for threats Scanning manually (on-demand scans) Use this feature to scan one or more shares on your server at any time. To perform an on-demand scan: 1 In the On-Demand Scan section of the Total Protection Service console, select the share you want to scan. To select more than one share, press Ctrl while you click each one. 2 Click Start Scan. Status and results for the scan appear in the On-Demand Scan area of the console. If another activity is placing a high demand on the server s processing capabilities, Total Protection Service pauses the scan, then resumes it when greater processing capability becomes available. A message appears in the On-Demand Scan area of the console to indicate the scan is paused. Scheduling scans Use this feature to specify a future time to perform a scan. You can schedule a single or a recurring scan. To schedule a scan: 1 In the Common Tasks area of the Total Protection Service console, select Schedule a Scan. OR In the Total Protection Service console, click Settings, then click McAfee Total Protection Service. 2 Specify when you want the scan to run. 3 Click OK. When another activity places high demand on the server s processing capabilities, Total Protection Service pauses its scan, then resumes it when greater processing capability becomes available. This means that a scheduled scan might take longer than you anticipate, but will never degrade the performance of another activity, such as viewing a movie. 12
13 Managing potentially unwanted program detections Managing potentially unwanted program detections Total Protection Service notifies you when it detects a potentially unwanted program attempting to run. The Network icon at the top of the console turns yellow to indicate that your network is at risk. To respond to a detection notification: 1 Click the yellow Network icon. 2 In the dialog box, click Close. 3 In the Common Tasks area of the Total Protection Service console, select Manage PUP Detections. 4 In the Potentially Unwanted Programs Viewer, review the detection and select a response (see To manage detections of potentially unwanted programs:). 5 After closing the Potentially Unwanted Programs Viewer, click the yellow Network icon again, select Ignore this issue, then click Close. If you select Ignore this issue without approving the detected program. Total Protection Service detects the program each time it is accessed. To prevent the program from being detected again, you must open the Potentially Unwanted Program Viewer and approve the program. To manage detections of potentially unwanted programs: 1 In the Common Tasks area of the Total Protection Service console, select Manage PUP Detections. The Potentially Unwanted Programs Viewer lists each detected item that requires action. Items can include program files, registry keys, and cookies. 2 Select one or more items, then click an action. Clean: Place an original copy of each selected item in a quarantine folder in a binary proprietary format, then attempt to clean it. If it cannot be cleaned, delete the item. Approve: Add each selected item to the list of approved programs so they will not be detected as spyware. Clicking Approved displays a list of all currently approved programs on your server. 3 Check the status of each item. Action Required: You have not performed any action on this item since it was detected. Approved: The item was added to the list of user-approved programs and will no longer be detected as spyware. Cleaned: The item was cleaned successfully and can be used safely. A backup copy of the original item was placed in a quarantine folder in a binary proprietary format. 13
14 Managing potentially unwanted program detections Quarantined: The item could not be cleaned. The original item was deleted and a copy was placed in a quarantine folder in a binary proprietary format. If the item was a program, all associated cookies and registry keys were also deleted. Items are placed into the quarantine folder in a format that is no longer a threat to your server. These items are deleted after 30 days. You can manage these items using the Quarantine Viewer (see Managing quarantined files). Delete failed: The item could not be cleaned or deleted. If it is in use, close it and attempt the clean again. If it resides on read-only media, such as CD, no further action is required. Total Protection Service has prevented the original item from accessing your server, but it cannot delete the item. Any items copied to your system have been cleaned. If you are not sure why the item could not be cleaned, a risk might still exist. 4 Click OK to close the dialog box. At the start of an on-demand scan, previous detections of potentially unwanted programs are cleared from the Potentially Unwanted Program Viewer. For on-access scans, previous detections remain in the Potentially Unwanted Program Viewer, and new detections are appended to the existing list. To display a list of approved programs excluded from spyware scans: 1 In the Common Tasks area of the Total Protection Service console, select Manage PUP Detections. 2 In the Potentially Unwanted Programs Viewer, click Approved. 14
15 Managing quarantined files Managing quarantined files When Total Protection Service detects a threat, it places a copy of the item containing the threat in a quarantine folder before cleaning or deleting the original item. The copy is in a binary proprietary format and cannot harm your server. By default, items in the quarantined folder are deleted after 30 days. Until then, you can view these files in the Quarantine Viewer. To access files in the Quarantine Viewer: 1 In the Common Tasks area of the Total Protection Service console, select View Quarantined Files. The Quarantine Viewer lists all the items in the quarantine folder and their status. 2 Select one or more items, then click an action: Rescan: Scan each selected item again. This option is useful when new detection definition (DAT) files include a method of cleaning a detection that could not be cleaned previously. In this case, rescanning the file cleans it and allows you to restore it for normal use. Restore: Place each selected item back in its original location on your server. The restored item will overwrite any other items with the same name in that location. Caution Total Protection Service detected this item because it considers the item to be a threat. Do not restore the item unless you are sure it is safe. Delete: Remove each selected item from the quarantine folder, along with all associated registry keys and cookies. No copy will remain on your computer. 3 Check the status of each item: Cleaned: The item was cleaned successfully and can be used safely. A backup copy of the original item was placed in a quarantine folder in a binary proprietary format. Clean failed: The item cannot be cleaned. Delete failed: The item cannot be cleaned or deleted. If it is in use, close it and attempt the clean again. If it resides on read-only media, such as CD, no further action is required. Total Protection Service has prevented the original item from accessing your server, but it cannot delete the item. Any items copied to your system have been cleaned. If you are not sure why the item could not be cleaned, a risk might still exist. Quarantined: You have not performed any action on this item since it was placed in the quarantine folder. 4 Click OK to close the Quarantine Viewer. 15
16 Troubleshooting Troubleshooting The following sections contain information to assist you in detecting and resolving problems with Total Protection Service. Testing your virus protection Uninstalling and reinstalling Total Protection Service Frequently asked questions Error messages and notifications Testing your virus protection Test the virus detection feature at any time by downloading the EICAR Standard Anti-Virus Test File. Although it is designed to be detected as a virus, the EICAR test file is not a virus. To run a test: 1 From a computer that has WHS connector software installed and is connected to your server, visit the following site in your browser: 2 Click Anti-Malware Testfile. 3 Right-click eicar.com.txt, select Save Target As, and save to the desktop. 4 Open a share on the computer. (From the WHS tray icon, select Shared Folder and log on if necessary.) 5 Copy the EICAR.TXT file to a WHS share (for example, \\SERVER\Software). If installed properly, Total Protection Service interrupts the download and displays a detection notification. The Network Health Notifications feature must be enabled. See Checking notifications for more information. 6 Click OK, then select Cancel in the file download dialog box. If installed incorrectly, Total Protection Service does not detect the virus or interrupt the download process. In this case, delete the EICAR test file, then reinstall Total Protection Service and test the new installation. 16
17 Troubleshooting Uninstalling and reinstalling Total Protection Service For testing purposes or before reinstalling, you might need to uninstall Total Protection Service from your server. To uninstall Total Protection Service: 1 Click Settings in the upper right corner of the WHS console. 2 In the dialog box, click McAfee Total Protection Service. 3 Click Add-ins. 4 Click the Installed tab. 5 Click Uninstall. 6 When uninstallation is complete, you are notified that you need to close the WHS console, then restart it. Caution If you uninstall Total Protection Service, your server is no longer protected. We recommend that you reinstall as soon as possible. To reinstall Total Protection Service: 1 Click Settings in the upper right corner of the WHS console. 2 In the dialog box, click McAfee Total Protection Service. 3 Click Add-ins. 4 Click the Available tab. 5 Click Install. 6 When installation is complete, you are notified that you need to close the WHS console, then restart it. 17
18 Troubleshooting Frequently asked questions Can I stop a scheduled scan once it has started? I copied a virus to my server as a test and nothing seemed to happen. Why didn't my virus and spyware protection service detect it? Can I push the Total Protection Service firewall or browser protection service (SiteAdvisor ) to my Windows Home Server? Will policy settings I configure on the SecurityCenter override my local settings in Total Protection Service? Why does Total Protection Service detect the same potentially unwanted program multiple times? Why did my scheduled scan take much longer than expected to complete? Why did my scheduled scan end prematurely? Can I stop a scheduled scan once it has started? No. Once a scheduled scan has started, you cannot stop the scan unless you restart the server. I copied a virus to my server as a test and nothing seemed to happen. Why didn't my virus and spyware protection service detect it? Total Protection Service is designed to quietly detect and clean threats without interrupting you. Most types of viruses are cleaned without you being notified. Threat detection is always noted on the reports available from the SecurityCenter, and you can check quarantined detections in the Quarantine Viewer. If you do not receive a notification when downloading the EICAR.TXT test file, check to be sure the notifications feature is enabled (see Testing your virus protection). Can I push the Total Protection Service firewall or browser protection service (SiteAdvisor ) to my Windows Home Server? No. Do not install these applications on your server. Will policy settings I configure on the SecurityCenter override my local settings in Total Protection Service? Yes. If you configure a policy (security rules) that does not include a scheduled scan, or if your policy includes a scan scheduled for a different time than one you have configured locally, your policy settings will override your local scheduled scan. Why did my scheduled scan take much longer than expected to complete? When Total Protection Service detects another activity placing a high demand on system resources, it pauses the scan until more resources are available. It is possible that a scan of multiple shares might be paused more than once to accommodate other activity on the server. If this happens, your scan can take longer to complete than you anticipated. Why did my scheduled scan end prematurely? If an update is scheduled to begin while an on-demand scan is in progress, the update takes precedence and the scan is canceled. Be sure to schedule scans for times when they will not conflict with updates. 18
19 Troubleshooting Why does Total Protection Service detect the same potentially unwanted program multiple times? Possible causes and solutions are: You have responded to a threat detection prompt by selecting Ignore this issue. Total Protection Service detects the program each time it is accessed unless you open the Potentially Unwanted Program Viewer and clean the program or approve it to run on your server (see Managing potentially unwanted program detections). The disk duplication (DEMigrator) feature in WHS has backed up the program on multiple shares. Each time a program is accessed on one of these shares, Total Protection Service detects it. (Check the Shared Folders area of the console to see which shares have the duplication feature enabled.) To prevent a detected program from being detected multiple times, open the Potentially Unwanted Program Viewer and clean the program or approve it to run on your server (see Managing potentially unwanted program detections). Error messages and notifications Your software is not up-to-date. Please activate to receive the latest updates. Your trial expires in 45 days. Detection: PUP. Resolve your detections using the Manage PUP Detections task, then select "Ignore this issue." Detection: VIRUS. Your server is not protected. Your software is not up-to-date. Please activate to receive the latest updates. You have not activated a trial copy of Total Protection Service. You cannot receive udpates against the latest threats or schedule scans until you activate. To activate, select Activate Now in the Total Protection Service console. Your trial expires in 45 days. Your activated trial will expire. To purchase a full subscription, select Buy Now in the Total Protection Service console. Detection: PUP. Resolve your detections using the Manage PUP Detections task, then select "Ignore this issue." A potentially unwanted program has been detected. See Managing potentially unwanted program detections for information on resolving it. Detection: VIRUS. A virus or other threat has been detected. This message includes the name of the detected item, the type of threat, the location of the threat, and the action taken. See Managing quarantined files for information. 19
20 Troubleshooting Your server is not protected. Possible causes and solutions are: DAT files have not been updated in the last 14 days. Select Update Now to download the latest files (see Updating Total Protection Service). If your trial or subscription has expired, buy or renew your subscription to continue receiving updated DAT files (see Purchasing or renewing a full subscription). Total Protection Service is not running. Reboot your server. If the problem persists, contact support. One or more components of Total Protection Service, such as the on-access scanning or automatic update feature, are not operational. Reboot your server. If the problem persists, contact support. 20
21 Index A About area of Total Protection Service console 10 actions for error messages 18 for notifications 9, 18 on potentially unwanted program detections 13 on quarantined items 15 activating Total Protection Service 6 adding approved programs 13 Add-Ins 17 administrative website defined 5 launching 10 approved programs, potentially unwanted programs 13 B buying trial software 7 C clean failed, for quarantined items 15 configuring Network Health Notifications 9 security rules 10 settings for Total Protection Service 10 console About area 9 accessing 8 description 8 illustrated 8 notification area 9 status area 9 D DAT files defined 11 out-of-date 20 updating 11 DEMigrator 19 demo about using SecurityCenter 10 detection definition files see DAT files detections multiple 13, 19 reports of 10 disk duplication feature 19 E EICAR test virus 16 error messages Detection PUP 19 Detection VIRUS 19 notification dialog boxes for 9 Your server is not protected 20 Your software is not up-to-date 19 Your trial expires in 45 days 19 exclusions, potentially unwanted programs 13 F frequently asked questions 18 I ignoring potentially unwanted program detections 13 installing Total Protection Service 6 L launching the SecurityCenter 10 M managing detections 13 notifications 9 potentially unwanted programs 13 quarantined items 15 monitoring system utilization 6 N Network Health area of Total Protection Service console 9 Network Health Notifications 9 notifications also see error messages defined 9 enabling 9 testing virus protection and 16 O on-access scans defined 11 trials and 6 on-demand scans defined 11 performing 12 trials and 6 updates and 11, 18 optimizing server performance 6 overview of Total Protection Service 5 P pausing scans 6, 18 performance optimizing 6 policies defined 5 interaction with scheduled scans 18 potentially unwanted programs ignoring 13 managing 13 purchasing trial software 7 Q quarantined items, managing 15 R reports, detections 10 rescan quarantined items 15 restore quarantined items 15 S scanning on-access, defined 11 on-demand, performing 12 pausing 6, 18 scheduled, performing 12 updates and 11, 18 scheduled scans defined 11 interaction with policy settings 18 pausing 18 performing 12 21
22 Index trials and 6 troubleshooting 18 security rules configuring 10 interaction with scheduled scans 18 SecurityCenter website defined 5 demo of basic features 10 launching 10 Settings dialog box 10, 12, 17 status area of Total Protection Service console 9 system utilization, monitoring 6 T testing your installation 16 Total Protection Service console see console trial software activating 6 buying 7 features of 6 troubleshooting U uninstalling Total Protection Service 17 Update Now 11 updating DAT files and components 11 manually 11 on-demand scans and 11, 18 trials and 6 upgrades, defined 11 V viewing approved programs 14 potentially unwanted programs 13 quarantined items 15 W website, administrative 10 22
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
Release Notes for McAfee VirusScan Enterprise for Storage 1.0
Release Notes for McAfee VirusScan Enterprise for Storage 1.0 About this document New features Known issues Where to find McAfee enterprise product information License attributions About this document
Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service
Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
McAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
McAfee Email Gateway 7.x Encryption and IronPort Integration Guide
Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption
Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software
Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying
McAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Product Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices
McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee Risk Advisor 2.7
Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0
Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Verizon Internet Security Suite Powered by McAfee User Guide
Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
McAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Product Guide. McAfee SaaS Endpoint Protection 5.2.0
Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Recommended Recommended for all environments. Apply this update at the earliest convenience.
Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation
Installation Guide. McAfee SaaS Endpoint Protection 5.2.0
Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
Anti-Spyware Enterprise Module software
Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that
Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
McAfee Solidcore Change Reconciliation and Ticket-based Enforcement
Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
epolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0
Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
Release Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
McAfee VirusScan Enterprise 8.8 software Product Guide
McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to
Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.
Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All
McAfee Security for Microsoft SharePoint 2.5.0 User Guide
McAfee Security for Microsoft SharePoint 2.5.0 User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
McAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111.
McAfee VirusScan Enterprise 8.7i Repost Patch 5 Release Notes Thank you for using McAfee software. This document contains important information about the current release. We strongly recommend that you
Product Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Implementing McAfee Device Control Security
Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.
Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring
McAfee Internet Security Suite Quick-Start Guide
Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet
McAfee GTI Proxy 1.0.0 Administration Guide
McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
Product Guide. McAfee VirusScan for Mac 9.8.0
Product Guide McAfee VirusScan for Mac 9.8.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS Intel
Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0
Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide
ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine
Best Practices Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Best Practices Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Sophos Anti-virus Basic Level Handout
Sophos Anti-virus Basic Level Handout Sophos Anti-Virus provides cross-platform protection against: Computer viruses Potentially Unwanted Applications (PUA s) such as spyware and adware Host intrusions
McAfee VirusScan Enterprise 8.8 software Installation Guide
McAfee VirusScan Enterprise 8.8 software Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS
Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS - About this Document - About this Release - Purpose
McAfee Agent Handler
McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
Using McAfee VirusScan. Professional Edition Version 8.0. Software On a DX8000 DVR
Using McAfee VirusScan Professional Edition Version 8.0 Software On a DX8000 DVR DX8000 Digital Video Recorder C1611M-B (12/04) Contents Using McAfee VirusScan Professional Edition Version 8.0.....................................................................5
Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software
Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
Stellar Phoenix Exchange Server Backup
Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically
McAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
McAfee UTM Firewall Control Center Product Guide. version 2.0
McAfee UTM Firewall Control Center Product Guide version 2.0 COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
ESET NOD32 ANTIVIRUS 8
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
McAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
McAfee Solidcore 5.1.0 Product Guide
McAfee Solidcore 5.1.0 Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x
McAfee VirusScan Enterprise for Storage.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x COPYRIGHT Copyright 200 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
FOR MAC. Quick Start Guide. Click here to download the most recent version of this document
FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on
McAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
McAfee SiteAdvisor Enterprise 3.5.0
Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender
Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should
ESET Mobile Security Windows Mobile
ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3
Installation Guide. McAfee SaaS Endpoint Protection
Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
ESET NOD32 ANTIVIRUS 9
ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection
Bitdefender Antivirus Plus 2016 User's Guide
USER'S GUIDE Bitdefender Antivirus Plus 2016 User's Guide Publication date 01/28/2016 Copyright 2016 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
Welcome to Cox Business Security Suite:
Welcome to Cox Business Security Suite: Thank you for choosing Cox Business Security Suite Powered by McAfee. Cox Business Security Suite is a simple, efficient and reliable way to protect your business
Installation Guide. McAfee SaaS Endpoint Protection 6.0
Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
ESET MOBILE SECURITY FOR ANDROID
ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3
AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Bellsouth Internet Security)
AT&T Internet Security Suite - powered by McAfee Installation Guide (for Bellsouth Internet Security) 2 Contents Introduction 1. Start Download Manager 4 2. Remove Incompatible Products.11 3. Select Access
2. Installation and System requirements
RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Sendspace Wizard Desktop Tool Step-By-Step Guide
Sendspace Wizard Desktop Tool Step-By-Step Guide Copyright 2007 by sendspace.com This publication is designed to provide accurate and authoritative information for users of sendspace, the easy big file
Product Guide. McAfee epolicy Orchestrator 4.6.0 Software
Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
ESET Mobile Security Windows Mobile. Installation Manual and User Guide
ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
Using Windows Update for Windows Me
Using Windows Update for Windows Me Contents Introduction... 1 Before You Begin... 2 Downloading and Installing the Windows Update Components... 2 Maintaining a Secure Computing Environment... 6 Introduction
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Bitdefender Total Security 2016 User's Guide
USER'S GUIDE Bitdefender Total Security 2016 User's Guide Publication date 01/28/2016 Copyright 2016 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
Avira System Speedup. HowTo
Avira System Speedup HowTo Table of Contents 1. Introduction... 4 1.1 What is Avira System Speedup?...4 2. Installation... 5 2.1 System Requirements...5 2.2 Installation...5 3. Using the program... 8 3.1
McAfee VirusScan Enterprise 8.8 Best Practices Guide
Best Practices Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0
Smart Control Center User Guide 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10685-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,
Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome
Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Browser toolbars have been around for years, however, in the last couple of months they became a huge mess. Unfortunately, lots of free software
McAfee VirusScan and epolicy Orchestrator Administration Course
McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from
HP External Hard Disk Drive Backup Solution by Seagate User Guide. November 2004 (First Edition) Part Number 373652-001
HP External Hard Disk Drive Backup Solution by Seagate User Guide November 2004 (First Edition) Part Number 373652-001 Copyright 2004 Hewlett-Packard Development Company, L.P. The information contained
