Lumension Endpoint Management and Security Suite. L.E.M.S.S. AntiVirus v8.2. Migration Guide & Frequently Asked Questions

Size: px
Start display at page:

Download "Lumension Endpoint Management and Security Suite. L.E.M.S.S. AntiVirus v8.2. Migration Guide & Frequently Asked Questions"

Transcription

1 Lumension Endpoint Management and Security Suite L.E.M.S.S. AntiVirus v8.2 Migration Guide & Frequently Asked Questions [FOR INTERNAL USE ONLY - DO NOT DISTRIBUTE] Copyright 2015, Lumension

2 Introduction L.E.M.S.S. AntiVirus v8.2 introduces a new AV engine to deliver improved malware detection, reduced bandwidth utilization, and improved endpoint performance. L.E.M.S.S. AntiVirus v8.1 (and earlier) endpoints automatically migrate to the new engine when they are upgraded to L.E.M.S.S. v8.2. The upgrade process has been designed to be seamless and the user experience is similar to upgrading any previous L.E.M.S.S. release. This Migration Guide & FAQ provides guidance to help ensure that the migration goes as smoothly as possible. 2

3 Table of Contents Introduction... 1 Table of Contents... 3 Migration Guide... 5 Server Upgrade... 5 AntiVirus Definition Distribution Delay... 5 Check that Excludes have been applied... 6 Endpoint Upgrade... 7 Initial rollout... 7 Extending to additional endpoints... 8 Frequently Asked Questions When will the new L.E.M.S.S. AV solution be available? How much time will I have to migrate to the new L.E.M.S.S. AV solution? How long will Lumension continue to support the legacy L.E.M.S.S. v7.2 to v8.1 AV solution? 10 What happens if I don t upgrade? How do I transition to the new L.E.M.S.S. AV solution? Do I need to switch all of my endpoints at once to the new L.E.M.S.S. AV solution? Will I need to reboot my endpoints as part of the migration? Will the new AV solution be backward compatible to work on my current L.E.M.S.S. version? 11 How will the new L.E.M.S.S. AV v8.2 solution differ from the current L.E.M.S.S. AV solution? 11 How will AntiVirus Management change? Will any features change? How will the AntiVirus policies change? How will end-user UI change? Will there be any impact on licensing or renewals? Will Professional Services be available to support the migration to the new AV solution? Why did Lumension switch to a new engine? Are there any new AV features? What changes have been made to AV definition size and frequency? How large is the initial endpoint download? What will be the process to address False Positives if these occur with the new L.E.M.S.S. AV solution and what will the turnaround time be? What will be the process to address suspicious files that may be malware and what will the turnaround time be? What operating systems will be supported? Will my XP and Windows 2003 endpoints still be supported?

4 Appendix A AntiVirus Definition Distribution Delay feature change details Legacy Implementation New Implementation

5 Migration Guide Server Upgrade L.E.M.S.S. AntiVirus v8.2 requires the Microsoft Visual C Update 4 Redistributable Package. Though the Lumension Installation Manager installs.net requirements during an upgrade to Lumension AntiVirus v8.2, this specific package must be installed manually before you start the upgrade. It is available for download at: To obtain L.E.M.S.S. v8.2 from within the L.E.M.S.S. console replicate with the Global Subscription Service (GSS). Then download the v8.2 components using the Installation Manager. ANTIVIRUS DEFINITION DISTRIBUTION DELAY If you currently use the AntiVrus Definition Distribution Delay feature in L.E.M.S.S. v8.1 (or earlier), you will need to set the delay for v8.2 endpoints in your agent policy sets following the L.E.M.S.S. server upgrade to v8.2 and before you upgrade your endpoints to v8.2. The feature is used to delay requesting a new AV definitions file from the L.E.M.S.S. Server. This feature can be used, for example, to test definitions before rolling them out to organizational endpoints and servers. After upgrading the server to v8.2, edit your agent policy sets to set the delay for v8.2 endpoints. Scroll down to the AntiVirus Engine & Definition Distribution Settings. You will see that the delay setting for v7.2 to v8.1 endpoints is already populated. If you want to use this same value for v8.2 endpoints, you should update the agent policy set with this value and save this change. Repeat this for all other agent policy sets. IMPORTANT: Note that for L.E.M.S.S. v8.2 AntiVirus agents, the maximum delay that can be applied is 23 hours (compared with 72 hours for v7.2 to v8.1 endpoints). Also, the delay must be less than the AntiVirus polling frequency. To review the polling frequency, select Tools > Subscription Updates, click on Configure and select the AntiVirus tab. Scroll down to review the polling frequency. As in the example below, if the polling frequency is 6 hours, the maximum delay that can be applied for v8.2 endpoints is 5 hours. 5

6 CHECK THAT EXCLUDES HAVE BEEN APPLIED Before proceeding to upgrade your endpoints, you should check that all of your existing real-time monitoring policies have the correct file and/or directory folder excludes applied to minimize the performance impact on your endpoints. There are no changes to the list of recommended excludes for the new engine so you should already have these in your existing policies but now would be a good time to review and confirm this. The list of recommended excludes are available at This KB article contains the list of recommended excludes along with XML files for core system exclusions and common application exclusions. If your real-time monitoring policies do not already have these in place, you can simply download and import these XML files via the policy wizard. However, if these are already implemented, do not import them again as this will result in unnecessary duplication in the policy. 6

7 Endpoint Upgrade Once the server has been upgraded and the agent policy sets have been updated to set the AntiVirus Definition Distribution Delay setting for v8.2 endpoints (if this feature is used), you can proceed to upgrade your endpoints. The introduction of a new Lumension AntiVirus engine requires the installation of a new set of AV definitions (approximately 130MB to 200MB in size) on each endpoint. In addition, the new engine will have different malware detection characteristics to the previous engine which may result in some additional detections post upgrade. INITIAL ROLLOUT Start with a small number of endpoints and upgrade them to v8.2. Once the upgrade has completed, conduct a Scan Now of these endpoints. For this initial scan, select the option to Perform no action when a virus is detected. By selecting this option, when a scan is executed, if the engine detects possible malware, it will generate an alert but take no further action such as quarantining files. This enables you to review any alerts and determine whether these are likely to be malicious or whether they are possibly false positives. If you believe the endpoint is falsely detecting legitimate files as malware, you should submit these to Lumension Support for analysis. Pack the file(s) into a single.zip or.rar archive and protect the archive with the password infected and send to [email protected]. While waiting for this to be addressed, you can exclude this file from being scanned by adding an exclusion in your AntiVirus policies or you can just hold off on rolling out to additional endpoints until the AV definitions have been updated to address the false positive. If the initial scan has identified malware, you can repeat this scan but change the action to Attempt to clean then quarantine. Alternatively, you can just wait until the regular recurring scan cleans it up. The malware will be detected and the files will be quarantined by the real time monitoring policy if the user attempts to access these files. 7

8 EXTENDING TO ADDITIONAL ENDPOINTS Once you are satisfied that the initial endpoint upgrades have completed successfully and the scan has not resulted in any False Positive detections, you can now extend the migration to additional endpoints. For the upgrade to v8.2, the endpoint pulls down the full antimalware database for the new AV engine from the L.E.M.S.S. server. The total size of this download is approximately 130MB to 200MB in size and each endpoint needs to download the database during the upgrade process. To minimize the impact on your network bandwidth and to minimize the protection gap on the endpoints during the upgrade process, you should implement a phased upgrade of the endpoints in your network. For remote locations, you should upgrade a couple of endpoints at each location initially to seed the proxies at those locations. Subsequent upgrades at those locations will then retrieve the files locally from the proxy rather than each endpoint trying to pull the files across the network from the L.E.M.S.S. server, reducing the impact on your network bandwidth and time to upgrade. With each phase in the rollout, conduct a Scan Now using the Perform no action setting in the scan options and review the results to identify any potential False Positives. If users complain of performance impacts during this scan, reduce the CPU utilization setting to Medium or Low for subsequent phases during your migration. 8

9 By following these steps you should be able to successfully upgrade all of your v7.2 to v8.1 LAV endpoints to L.E.M.S.S. v8.2 AV. Refer to the FAQ below for additional information during the upgrade process. If you have any additional questions, please contact 9

10 Frequently Asked Questions When will the new L.E.M.S.S. AV solution be available? The new L.E.M.S.S. AV solution will be available with L.E.M.S.S. v8.2, which is being released on 03/March/2015. How much time will I have to migrate to the new L.E.M.S.S. AV solution? Legacy AV definitions for L.E.M.S.S. v7.2 to v8.1 endpoints will end on 31/July/2015. Any endpoints that are still using the legacy engine and AV definitions will stop receiving updated definition files on that date and might be vulnerable to new malware. How long will Lumension continue to support the legacy L.E.M.S.S. v7.2 to v8.1 AV solution? Legacy AV definitions will end on 31/July/2015. What happens if I don t upgrade? Any endpoints which have not migrated to the new AV solution by 31/July/2015 will no longer receive AV definition updates after that date and might be vulnerable to new malware. How do I transition to the new L.E.M.S.S. AV solution? The new AV solution will be available with L.E.M.S.S. v8.2. You will need to upgrade both the server and the agents to L.E.M.S.S. v8.2 to obtain the new solution. Step one is to upgrade the server to L.E.M.S.S. v8.2. The L.E.M.S.S. v8.2 server can be used to manage both v8.2 and legacy (v7.2 to v8.1) endpoints. It will distribute the legacy AV definitions to the legacy endpoints and will distribute the new AV definitions to the v8.2 endpoints. This will enable you to complete a phased rollout of the agent upgrade. Step two is to upgrade the agents to L.E.M.S.S. v8.2. Endpoints are automatically migrated to the new AV solution following the upgrade to the L.E.M.S.S. v8.2 agent. The legacy engine and AV definitions are removed and the new engine and AV definitions installed. Existing LAV policies are applied to the new AV solution and endpoints continue to be protected. The endpoint upgrade 10

11 experience to L.E.M.S.S. v8.2 will effectively be the same as with previous L.E.M.S.S. agent upgrades. New installations of L.E.M.S.S. v8.2 will simply use the new AV solution. Do I need to switch all of my endpoints at once to the new L.E.M.S.S. AV solution? No. The L.E.M.S.S. v8.2 server can be used to manage both new and legacy AV endpoints during the transition period. This enables you to upgrade a number of endpoints to v8.2 and conduct whatever testing is required before extending the rollout to the remaining endpoints before the 31/July/2015 deadline. Will I need to reboot my endpoints as part of the migration? No. Endpoints will not need to be rebooted to complete the migration to the new AV solution. Will the new AV solution be backward compatible to work on my current L.E.M.S.S. version? No. The new solution is not backward compatible to current L.E.M.S.S. versions. Both server and endpoints must be upgraded to L.E.M.S.S. v8.2 to migrate to the new AV solution. How will the new L.E.M.S.S. AV v8.2 solution differ from the current L.E.M.S.S. AV solution? By switching to using the new AV engine and definitions, endpoint users should experience better protection and reduced performance impact on the endpoint as compared with the legacy engine. In addition, as the AV definitions for the new engine are smaller and more frequent than the definitions for the legacy engine, the impact on network bandwidth will be significantly reduced. How will AntiVirus Management change? Will any features change? From a feature perspective, the goal for the initial release of the new engine is to provide feature parity with the legacy AV implementation so that the transition to the new solution is as seamless as possible. While the underlying AV engine and definitions will be changed, from a feature implementation perspective, your experience on both the server and endpoint will be mostly unchanged. 11

12 The main exception to this is for the AV definition delay feature which requires a different implementation with the new engine. Refer to Appendix A for a more detailed overview of the changes but the key change is that a maximum delay of 23 hours can be achieved with the new engine as compared with a maximum delay of 72 hours with the legacy engine. How will the AntiVirus policies change? The L.E.M.S.S. Real-time Monitoring and Recurring Virus and Malware Scan policy definitions will not change. You do not need to take any action for these policies; your existing antivirus detection policies will continue to be enforced with no disruption. If you use the AV definition delay feature, you will need to update your agent policy sets to set the delay for v8.2 endpoints. Refer to the migration guide above for more information. How will end-user UI change? There will be one slight difference from an end-user experience. The endpoint notification which pops up when new AV definitions have been downloaded will not be used with the new AV solution due to the increased frequency of definition updates. Will there be any impact on licensing or renewals? No, there will be no impact on licensing or renewals. The new AV solution will simply use the existing AV licenses. Will Professional Services be available to support the migration to the new AV solution? You should not require Professional Services to migrate to the new AV solution. All that is required is to upgrade your AV endpoints to L.E.M.S.S. v8.2. You can contact Support in the event that you encounter any issues during the upgrade. Why did Lumension switch to a new engine? The AV engine has been changed to deliver improved malware detection, reduced bandwidth utilization and improved endpoint performance. Are there any new AV features? There will not be any new AV features as part of the initial release of the new engine. If there are feature enhancements that you need for your AV implementation, you should submit these via the 12

13 Product Feature Request Form on the Lumension Support Page ( What changes have been made to AV definition size and frequency? The legacy engine definitions consist of a base definition file (nvcbin) and an increment file (nvcincr). The increment file starts out as 0MB but grows larger with each increment. Typically there are two increments per day. Once the increment file grows to about15mb, it gets absorbed into the base definition file which then grows larger and the increment file is reduced again to 0MB and the cycle starts over again. With the ever increasing growth in malware, the base definition file is now approaching 0.5GB and gets redistributed once a month which can have a significant impact on network bandwidth. The new engine provides smaller definition updates more frequently. The number of updates per day varies but the average would be 18 updates per day. The following are indicative figures for the expected size of updates per endpoint: Single update download size: 414 bytes minimum, Kb maximum, 19.74Kb median Once-a-day-update download size: Kb minimum, 1.33Mb maximum, Kb median While approximately 18 updates are provided per day, you can still use the AV polling frequency on the Tools > Subscription Updates page to limit the number of times that definition updates get distributed each day. How large is the initial endpoint download? Installing the new engine requires that the full antimalware database for the new AV engine be downloaded from the L.E.M.S.S. server. The total size of this download is approximately 130MB to 200MB in size (depending on Operating System). Each endpoint needs to download the database during the upgrade or installation process. To minimize the impact on your network, you should use caching proxies for remote locations and implement a phased rollout across your environment. Note that endpoints require 1.3GB of available disk space to support the new AV engine. This space is required to support the antimalware database and database backup, space for extracting files from archives during an AV scan, as well as temporary storage during AV definition updates. 13

14 What will be the process to address False Positives if these occur with the new L.E.M.S.S. AV solution and what will the turnaround time be? The process for submitting suspected false positives to Lumension for analysis will be unchanged. You should contact Lumension Support and submit the suspect file in a password protected archive file with the password = infected. The turnaround time for analyzing and addressing false positives will also be similar. Analyzing files takes an average of 4 to 8 hours following which AV definitions are updated to eliminate the false positive, once it has been confirmed. What will be the process to address suspicious files that may be malware and what will the turnaround time be? The process for submitting suspicious files to Lumension will be unchanged. You should contact Lumension Support and submit the suspect file in a password protected archive file with password = infected. Analyzing files takes an average of 4 to 8 hours following which an update will be provided outlining the malware details and associated remediation instructions. What operating systems will be supported? Will my Windows XP and Server 2003 endpoints still be supported? Both Windows XP and Server 2003 endpoints will be supported on L.E.M.S.S. v8.2. The operating systems supported for the new AV solution will be the same as for the other modules and will include the following: Microsoft Windows 8.1 Microsoft Windows 8 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2012 Microsoft Windows Storage Server 2012 Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 2003 SP1+ Microsoft Windows XP SP2+ 14

15 Appendix A AntiVirus Definition Distribution Delay feature change details The AntiVirus Definition Distribution Delay feature will function differently in the L.E.M.S.S. AV v8.2 implementation compared with the legacy v7.2 to v8.1 implementation and a maximum delay of 23 hours will be possible as compared with a maximum delay of 72 hours (3 days) at present. LEGACY IMPLEMENTATION There are two (2) controls which determine when AV definition updates are delivered to endpoints. The first of these is the polling frequency which determines how frequently or when the L.E.M.S.S. server checks for a definition update. The polling frequency determines when the latest definitions are downloaded to the L.E.M.S.S. server. The second control is the Delay AV definition distribution by, which can be defined via the agent policy sets and assigned to a group of endpoints so that those endpoints will not receive the latest definitions until the delay has elapsed. The delay is in hours and can be between 0 and 72 hours from the time that the definitions are downloaded onto the server. You could use this feature, for example, to distribute AV definitions to a test group of endpoints immediately (0 hours), to the general population after 4 hours and to critical servers after 24 hours. By using the feature in this way, you significantly reduce the risk of a false-positive incident having a widespread impact in their environment. The legacy engine issues two (2) AV definition updates per day; so, by storing six (6) definition versions on the server, support can be provided for a 72 hour (3 day) delay. 15

16 NEW IMPLEMENTATION The same two (2) controls are still used, although the time options are changed. As there are much more frequent updates with the new engine (as frequently as once per hour), it would be impractical to store multiple sets of AV definitions on the L.E.M.S.S. server. For the new engine, only one set of definitions will be stored on the L.E.M.S.S. server at any time. The maximum polling frequency will continue to be 24 hours (as at present), but the maximum definition distribution delay that can be implemented will be 23 hours instead of 72 hours. By combining the polling frequency with the AV definition delay you can delay the distribution of the latest set of definitions up to the time that a new set of definitions are downloaded. For example, if the polling frequency is set to 4 hours, it means that a new set of definitions will be downloaded every 4 hours and you then have the possibility to delay the distribution of those definitions for 0, 1, 2 or 3 hours. You will need to ensure that the AV definition delay is always set to less than the polling frequency. If the definition delay is set to be equal to or greater than the polling frequency, the delay will be reduced to 1 hour less than the polling frequency. For example, if the polling frequency is 4 hours and you set the definition delay to 8 hours, the actual delay applied will be 3 hours. Note that the longer the time between the availability of the latest AV definitions and these definitions being updated on an endpoint, the greater the security risk. Therefore, this feature should only be used if you have specific change control policies that are being adhered to. End of Document 16

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes

More information

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010. Situation Microsoft IT had limited monitoring and reporting functionality with its existing antimalware system. Although the system could scan for malware, there was no reporting capability or configurable

More information

Lumension AntiVirus. Best Practice Implementation Guide

Lumension AntiVirus. Best Practice Implementation Guide Lumension AntiVirus Best Practice Implementation Guide This document provides a best practice workflow to act as a guide for administrators when implementing L.E.M.S.S.: AntiVirus 23/Dec/2013 Version 1.0

More information

Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide

Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Planning your migration with Service Pack 1 This document provides guidance for customers who plan

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Avira and Windows 8/Windows Server 2012

Avira and Windows 8/Windows Server 2012 Avira and Windows 8/Windows Server 2012 Table of Contents 1. What does Windows 8 compatibility mean?... 3 2. Why is Avira software not Windows 8/Windows Server 2012 certified?... 3 3. Am I now protected

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 9 ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

Sophos Computer Security Scan startup guide

Sophos Computer Security Scan startup guide Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

What is Windows Intune? The Windows Intune Administrator Console. System Overview

What is Windows Intune? The Windows Intune Administrator Console. System Overview What is Windows Intune? Windows Intune helps you manage and secure computers in your environment through a combination of Windows cloud services and upgrade licensing. Windows Intune delivers cloud-based

More information

VEEAM ONE 8 RELEASE NOTES

VEEAM ONE 8 RELEASE NOTES VEEAM ONE 8 RELEASE NOTES This Release Notes document provides last-minute information about Veeam ONE 8 Update 2, including system requirements, installation instructions as well as relevant information

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me

McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me McAfee Enterprise Edition v 7.1.0: Installation & Configuration 1 McAfee Enterprise Edition v 4.5.1: Installation &

More information

Quick Start - Generic NAS File Archiver

Quick Start - Generic NAS File Archiver Page 1 of 19 Quick Start - Generic NAS File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2:

More information

Forefront Endpoint Protection. Jack Cobben

Forefront Endpoint Protection. Jack Cobben Forefront Endpoint Protection Jack Cobben Page number 1 1. Contents 2. Release Notes... 8 Microsoft Forefront Endpoint Protection 2010... 8 Running a repair on Microsoft Forefront Endpoint Protection 2010

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

How To Install & Use Metascan With Policy Patrol

How To Install & Use Metascan With Policy Patrol Policy Patrol 9 technical documentation June 16, 2014 How To Install & Use Metascan With Policy Patrol No antivirus engine is perfect. With over 220,000 new threats emerging daily, it would be impossible

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Quick Start - NetApp File Archiver

Quick Start - NetApp File Archiver Page 1 of 19 Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec

More information

COMPRESS Installation Guide

COMPRESS Installation Guide COMPRESS Installation Guide Upgrade Existing Installation Single User License Build 6310 Contents System Requirements... 1 Installation Overview... 2 Upgrade From Build 6300... 3 Upgrade From Build 6263

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 AntiMalware User Guide Version 1.1 September 30, 2013 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA as updated

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Acronis Cloud Backup Advanced USER GUIDE

Acronis Cloud Backup Advanced USER GUIDE Acronis Cloud Backup Advanced APPLIES TO THE FOLLOWING PRODUCTS Acronis Backup Advanced for Windows Server Acronis Backup Advanced for Linux Server Acronis Backup Advanced for PC Acronis Backup Advanced

More information

Migrating from Legacy to New Business Solutions

Migrating from Legacy to New Business Solutions Migrating from Legacy to New Business Solutions Thank you for your loyalty and for choosing the Newest Technology from Bitdefender. As we understand that this is an important step for your business, this

More information

Using Windows Update for Windows Me

Using Windows Update for Windows Me Using Windows Update for Windows Me Contents Introduction... 1 Before You Begin... 2 Downloading and Installing the Windows Update Components... 2 Maintaining a Secure Computing Environment... 6 Introduction

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

Desktop and Professional Editions

Desktop and Professional Editions YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Desktop and Professional Editions Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

Patch Management Reference

Patch Management Reference Patch Management Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Tracking Anti-Malware Protection 2015

Tracking Anti-Malware Protection 2015 Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure

More information

Acronis Backup & Recovery Online Advanced. User Guide

Acronis Backup & Recovery Online Advanced. User Guide Acronis Backup & Recovery Online Advanced User Guide Table of contents 1 Introduction to Acronis Backup & Recovery Online...4 1.1 What is Acronis Backup & Recovery Online?... 4 1.2 What data can I back

More information

Sophos Cloud Migration Tool Help. Product version: 1.0

Sophos Cloud Migration Tool Help. Product version: 1.0 Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Installing Lumension Endpoint Management and Security Suite (L.E.M.S.S.) Using a Remote SQL Server

Installing Lumension Endpoint Management and Security Suite (L.E.M.S.S.) Using a Remote SQL Server Installing Lumension Endpoint Management and Security Suite (L.E.M.S.S.) Using a Remote SQL Server A Step-by-Step Guide July 2011 v.1.0 Copyright 2009, Lumension Table of Contents Description... 3 Step-by-Step

More information

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing NOD32 Typical Installation Guide Version 2.7 Includes Windows Vista and 64-bit protection Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing Best Detection Fastest

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

Help. F-Secure Online Backup

Help. F-Secure Online Backup Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating

More information

Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:

Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec: Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on

More information

SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007

SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 SonicOS Enhanced 3.8.0.6 TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 CONTENTS PLATFORM COMPATIBILITY SONICWALL RECOMMENDATIONS KNOWN ISSUES RESOLVED KNOWN ISSUES UPGRADING

More information

Seqrite Antivirus Server Edition

Seqrite Antivirus Server Edition Seqrite Antivirus Server Edition User Guide www.seqrite.com Copyright & License Information Copyright 2016 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication may be reproduced,

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright 2007-2015 Palo Alto Networks

Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright 2007-2015 Palo Alto Networks Manage the Endpoints Palo Alto Networks Advanced Endpoint Protection Administrator s Guide Version 3.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

Acronis Backup & Recovery Online Advanced. User Guide

Acronis Backup & Recovery Online Advanced. User Guide Acronis Backup & Recovery Online Advanced User Guide Table of contents 1 Introduction to Acronis Backup & Recovery Online...4 1.1 What is Acronis Backup & Recovery Online?... 4 1.2 What data can I back

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Endpoint Security Client

Endpoint Security Client Endpoint Security Client R80.10 User Guide 7 February 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

Using Windows Update for Windows XP

Using Windows Update for Windows XP Using Windows Update for Windows XP Introduction This document provides instructions on updating Windows XP with the necessary patches. It is very important to update your operating system software in

More information

BitDefender Security for Exchange

BitDefender Security for Exchange Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System

More information

Lumension Endpoint Management and Security Suite

Lumension Endpoint Management and Security Suite Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module

More information

Installation and User Guide for Partners and Businesses

Installation and User Guide for Partners and Businesses Installation and User Guide for Partners and Businesses Copyright 2013 SOS Online Backup Table of Contents Page Getting Ready 3 Choosing Components 4 Installing and Configuring ShadowProtect 5 Setting

More information

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

AliOffice 2.0 Installation Guide

AliOffice 2.0 Installation Guide January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Kaspersky PURE User Guide

Kaspersky PURE User Guide Kaspersky PURE User Guide Application version: 3.0 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions

More information

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide Avira Small Business Security Suite Avira Endpoint Security Quick Guide Table of Contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode...3 2.2 Scope of services...3 2.3 Optimum protection.

More information

Getting Started with VMware Fusion

Getting Started with VMware Fusion Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Kaseya 2. User Guide. Version 6.1

Kaseya 2. User Guide. Version 6.1 Kaseya 2 Kaseya Server Installation and Update User Guide Version 6.1 March 14, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products

More information

Patch Management Reference

Patch Management Reference www.novell.com/documentation Patch Management Reference ZENworks 11 SP3 February 2014 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Kaspersky Anti-Virus 2012 User Guide

Kaspersky Anti-Virus 2012 User Guide Kaspersky Anti-Virus 2012 User Guide APPLICATION VERSION: 12.0 Dear User! Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most

More information

A+ Practical Applications Solution Key

A+ Practical Applications Solution Key A+ Practical Applications Solution Key Module 1 Assignment: Introducing Microsoft Windows - answer the following questions: 1. What attributes are available in the NTFS file system that are not available

More information

LT Auditor+ for Windows

LT Auditor+ for Windows LT Auditor+ for Windows Quick Start Guide Documentation issue: 5.3 Copyright Blue Lance Inc. Distributed by: LT Auditor+ for Windows: Overview LT Auditor+ is a security software application that provides

More information

Things to consider before you do an In-place upgrade to Windows 10. Setup Info. In-place upgrade to Windows 10 Enterprise with SCCM

Things to consider before you do an In-place upgrade to Windows 10. Setup Info. In-place upgrade to Windows 10 Enterprise with SCCM In this doc we will see the steps for In-place upgrade to Windows 10 Enterprise with SCCM. Most of the Organizations today are running Windows 7 on their computers. Looking at the stability and features

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information