RELEASE NOTES. F-Secure Client Security Version build 309 (RTM) F-Secure Client Security Premium Version build 118 (RTM) 1.

Size: px
Start display at page:

Download "RELEASE NOTES. F-Secure Client Security Version 11.50 build 309 (RTM) F-Secure Client Security Premium Version 11.50 build 118 (RTM) 1."

Transcription

1 RELEASE NOTES F-Secure Client Security Version build 309 (RTM) F-Secure Client Security Premium Version build 118 (RTM) Copyright F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product may be covered by one or more F-Secure patents, including the following: GB , GB , GB , GB , GB , GB , GB General This document contains information about F-Secure Client Security release. We strongly recommend that you read the entire document. Please refer to the online help for more information. 2. Product contents The solution can be licensed and deployed as F-Secure Client Security or F-Secure Client Security Premium. F-Secure Client Security product has the following features that you can install: Virus & spyware protection protects your computer against viruses, trojans, spyware, rootkits and other malware. DeepGuard proactive, instant protection against unknown threats. It monitors application behavior and stops potentially harmful activities in real-time. scanning detects malicious content in traffic (IMAP4, POP3 and SMTP protocols) to protect you against malware. Web traffic scanning detects and blocks malicious content in web traffic (HTTP protocol) to provide additional protection against malware. Internet Shield consists of Firewall, Application Control, and Intrusion Prevention (IPS). Browsing protection provides additional protection against unsafe web sites. Device control lets you control and disable hardware devices. Microsoft NAP Plug-in integrates with Microsoft Network Access Protection (NAP). Offload scanning allows to offload malware scanning to F-Secure Scanning and Reputation Server. F-Secure Client Security Premium product includes the additional feature: Software Updater -- keeps your system and applications up-to-date by automatically installing patches as they are released by vendors. The supported languages are: English, Chinese (P.R.C, Taiwan, Hong Kong), Czech, Danish, Dutch, Estonian, Finnish, French, Canadian French, German, Greek, Hungarian, Italian, Japanese, Korean,

2 Norwegian, Polish, Portuguese, Brazilian Portuguese, Romanian, Russian, Slovenian, Spanish, Latin American Spanish, Swedish, and Turkish. 3. What s new 3.1 New features and improvements Offload Scanning Agent It can be installed in order to offload malware scanning and content reputation checking to a dedicated server running F-Secure Scanning and Reputation Server. This allows to minimize the performance impact to virtualization infrastructure. Host Identification changes You can chose additional Host Identification methods. The added Host Identification methods are identifying the host by WINS name or MAC address. Randomization of scheduled scan tasks It is now possible to start scheduled scan tasks with a randomized delay interval. This allows to minimize performance impact when scheduled scanning starts on multiple virtual machines simultaneously. Added support for Microsoft Windows 8.1 You can install and use the product on Microsoft Windows 8.1. Other enhancements made in this release: AUA content folder has been moved from %ProgramFIles% to %ProgramData% folder. 3.2 Fixed issues This section lists important issues fixed in this release: SVCE-301: No scanners available after fsav-1100-bin update is installed SVCE-328: Too many errors with the full computer scan SPT-253: Web Traffic Scanning can cause delay on network services SVCE-413: The client is using random UID even though the MSI package was prepared to use MAC based host identification 4. Installation and system requirements Before you install the product, we recommend that you review the sections in this document to make sure that your network, hardware, software, and other system components meet the requirements for F-Secure Client Security Local and centrally managed installations For centrally managed installations, import the Client Security installation JAR package (fscs_ rtm.jar or fscspr_ rtm.jar) to Policy Manager Console and deploy the product remotely to selected hosts. With Policy Manager Console, you can also export an MSI package that you can deploy via other central management systems to install the product. To run the installation locally, create the MSI package with the export tool in F-Secure Policy Manager Console. Note that the installation requires local administrator rights. Note: Standalone installation has not been supported since F-Secure Client Security version

3 4.1.1 Installation instructions in Virtual Environments using the F-Secure Offload Scanning Agent If you want to deploy F-Secure Client Security in a virtual environment using the Offload Scanning Agent to minimize the performance impact to virtualization infrastructure you need to select the installation of the Offload Scanning Agent during the installation or export of the MSI package. For detailed installation instructions of this feature please refer to the F-Secure Security for Virtual and Cloud Environments deployment guide. Note: Please note that you need to have the Scanning and Reputation Server in place for this functionality to work. Note: In this version, the Device Control feature can be managed only from Policy Manager Console. 4.2 Supported platforms This release can be installed on the following platforms: Microsoft Windows XP (32-bit editions only) Microsoft Windows Vista (all 32-bit and 64-bit editions) Microsoft Windows 7 (all 32-bit and 64-bit editions) Microsoft Windows 8 and 8.1 (all 32-bit and 64-bit editions) Note: All operating systems are required to have the latest Service Pack installed. Note: Here, 64-bit editions mean AMD64 (x64) platform editions. 4.3 Recommended hardware requirements Microsoft Windows 8, Windows 7 and Vista Processor: Intel Pentium 4 2GHz or higher Memory: 1GB for 32-bit / 2 GB for 64-bit or more Disk space: at least 1,5 GB Internet connection: an Internet connection is required to receive updates and use cloud-based technology features Microsoft Windows XP SP3 Processor: Intel Pentium III 1Gz or higher Memory: 512 MB or more Disk space: at least 1,5 GB Internet connection: an Internet connection is required to receive updates and use cloud-based technology features 4.4 Centralized management requirements The following versions of F-Secure Policy Manager are required to centrally manage F-Secure Client Security installations F-Secure Policy Manager (Windows) or newer F-Secure Policy Manager (Linux) or newer 5. Known issues

4 5.1 Sidegrade PSB WKS sidegrade does not work correctly When installing Client Security, PSB Workstation Security sidegrade does not work correctly. To solve this issue, install Client Security twice or uninstall PSB Workstation Security before the installation. 5.2 Installation, upgrade and uninstallation Remote installation to Windows 8 To remotely install Client Security to Windows 8 host from Policy Manager Console, set the following registry at the host to enable access to 'admin$' share: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "LocalAccountTokenFilterPolicy"=dword: Policies are not received immediately after reboot In some cases, the installed client may not receive policies immediately after the reboot. Usually, the client receives the new policy after some time and recovers automatically. If this does not happen, restart the computer. Unused databases are still visible after upgrade When upgrading from a previous version, some database and engine updates that were used in the previous version may not be needed anymore. They are still visible in Settings > Other settings > Downloads marked as Not Installed. This is normal and entries will disappear automatically after 7 days. System might be slow for several minutes after the first reboot while the installation finishes The system may start up slowly during the initial restart after the installation. After the restart, the product downloads and installs various updates to finalize the installation in the background. The effect is more noticeable after a fresh installation, as more updates need to be downloaded. The local user interface has a blue status indicator and a Completing Installation status until the installation is complete. Subsequent restarts are not affected. NAP Health Validator is not removed from configured health policies during uninstallation During uninstallation, references to F-Secure System Health Validator (SHV) are not automatically removed from health policies. Computers that use these policies are considered as non-compliant with health policies and they are quarantined. To fix broken references to F-Secure SHV, open the health policies properties in the Network Policy Server console (nps.msc) and confirm the automatic update. Installation of Client Security removes McAfee Agents During the installation, the product removes 3rd-party software that may be incompatible (including McAfee Agent and McAfee NAI epolicy Orchestrator Agent). If you need 3rd-party software that would be removed, submit a support ticket to F-Secure customer support to request a special build that does not remove software that you need. 5.3 Browsing protection and Web traffic scanning Change in Browsing protection settings may look ineffective due to caching

5 Sometimes it may seem that new Browsing protection settings do not do anything, because the browser finds the page content from the browser cache. Use Ctrl-F5 to ignore the cache and reload the web page content. Uninstalling only Browsing protection/web traffic scanning does not immediately switch it off After you uninstall the Browsing protection feature, it works until the GateKeeper service (FSGKHS) is restarted. The same is true with Web traffic scanning. Browsing protection search results Browsing protection does not show safety ratings on search result pages that use HTTPS. Web traffic scanning does not protect encrypted traffic This version of Web traffic scanning does not handle and protect HTTPS protocol scanning TLS- and SSL-encrypted protocols not supported (44173, 44869, 54496, 55285, 89415) scanning works only with unencrypted s using protocols POP3, IMAP or SMTP. Scanning s that are encrypted with Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols is not supported. When TLS and SSL protocols are used, scanning either cannot scan e- mails or may block them. Turn off scanning if you use either TLS or SSL protocols for secure transmissions. If scanning is configured to listen to a port which is used by TLS- or SSL- encrypted , the traffic is blocked completely even when scanning is turned off [89415]. To solve this issue, reconfigure scanning to listen to the standard unencrypted port (110) or to any unused port, if port 110 is used already. Unable to open attachment scanned via IMAP on Thunderbird client (CTS-91745/CSEP-441) Sometimes, Thunderbird cannot download messages or attachments via IMAP protocol when scanning is turned on. In these cases, the user can turn off the mail.server.default.fetch_by_chunks setting in Thunderbird at the host: 1. Open Thunderbird and go to Tools > Options. 2. In the dialog that opens, select Advanced settings (rightmost icon) and go to the General tab. 3. Click the "Config Editor..." button. The Advanced options dialog opens. 4. In the Advanced options, set the following value: mail.server.default.fetch_by_chunks = false 5. Close the dialogs and restart Thunderbird. For centrally managed hosts, the administrator can use the setting in Advanced mode to Allow partial FETCH for IMAP clients. Note, however, that this decreases the level of protection. 5.5 Anti-Virus Incorrect engine versions are shown in policy statistics After a clean installation, the Status tab of Policy Manager Console (F-Secure Anti-Virus > Plug-ins table) and scanning reports show incorrect engine versions. To solve this issue, restart the FSGKHS service.

6 5.6 Software Updater Some proxy configurations can prevent Software Updater functionality (CTS-91963/CSEP-543) If your corporate network is behind a proxy or a firewall that has strict deny rules, Software Updater may be unable to download patches from some sites. Make sure that your proxy allows hosts to access download.microsoft.com and the download sites of other vendors (web or ftp), whose products are installed in your corporate environment. Software Updater does not automatically install updates not signed by trusted authority Some updates, for example Notepad++, WinZip, and 7-Zip, are released unsigned. Software Updater does not automatically install unsigned updates and reports the installation error There is no signature. The administrator can use the selective installation from the Policy Manager Console to install these updates. Alternatively, the administrator can use the setting to Allow unsigned updates automatic installation. Note, however, that this may decrease the level of protection, because it applies to all future updates, which are installed according to automatic installation rules, including missing updates of newly installed products. Installation of some updates can hang The installation of updates runs under the local system account without user interaction. On rare occasions, the installation can hang because it waits for user s input or is handling an error. The installation is cancelled after the timeout period, which is 4 hours by default. After the timeout, the batch installation continues, skipping the problematic patch / update. Software Updater reports the installation error as Installation hung up. To forcibly retry the installation of the problematic update, use the selective installation. Installation dialog shown every day for MS Office updates (CSEP-461) Software Updater requests a path input for MS Office 2003 patches. Failed to download update for MS Office 2000 suite (CTS-91704) This issue is related to the issue with the MS Office 2003 patches (CSEP-461). A dialog requests the user to provide the path to MS Office 2000 installation sources and if the user does not answer anything within one hour, all Office 2000 patches are skipped. Skype Update requires reboot when distributed through SWUP (CSEP-631) When Software Updater updates Skype, the Skype update (for example from version 6.3 to version 6.5) requests to restart the computer. 6. Contact information and feedback We look forward to hearing your comments and feedback on the product functionality, usability and performance. Please report any technical issues via: F-Secure support web site: F-Secure Community: When reporting a technical problem, please attach the F-Secure system summary report to the feedback. To collect the system summary report, you need to have administrator rights.

7 In Windows XP, select Start All Programs F-Secure Client Security, right-click on Support Tool, select Run as and finally select to run the program as administrator. In Windows Vista and Windows 7, select Start All Programs F-Secure Client Security Premium, right-click on Support Tool and select Run as administrator. In Windows 8, right-click on Support Tool application in Metro UI and use Run as Administrator option. 7. F-Secure license terms F-Secure license terms are included in the software. You must read and accept them before you can install and use the software.

RELEASE NOTES F-Secure E-mail and Server Security Version 10.01 RTM build 173

RELEASE NOTES F-Secure E-mail and Server Security Version 10.01 RTM build 173 RELEASE NOTES F-Secure E-mail and Server Security Version 10.01 RTM build 173 Copyright 1993-2013 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. Portions Copyright

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

RELEASE NOTES F-Secure E-mail and Server Security version 11.00 build 739 (RTM)

RELEASE NOTES F-Secure E-mail and Server Security version 11.00 build 739 (RTM) RELEASE NOTES F-Secure E-mail and Server Security version 11.00 build 739 (RTM) 1993-2014 F-Secure Corporation. All rights reserved. Portions Copyright 2004 BackWeb Technologies Inc. Portions Copyright

More information

RELEASE NOTES F-Secure E-mail and Server Security Version 10.00 RTM build 435

RELEASE NOTES F-Secure E-mail and Server Security Version 10.00 RTM build 435 RELEASE NOTES F-Secure E-mail and Server Security Version 10.00 RTM build 435 Copyright 1993-2013 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. Portions Copyright

More information

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System

More information

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM EMPLOYEES WORK ON THE MOVE, WITH MULTIPLE DEVICES MEETING CUSTOMERS WORKING FROM HOME BUSINESS TRIP CLOUD SERVICES ARE ENABLERS OF MOBILE

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

escan Corporate Edition User Guide

escan Corporate Edition User Guide Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

FAQ. Safe Anywhere PC. Disclaimer:

FAQ. Safe Anywhere PC. Disclaimer: FAQ Safe Anywhere PC Version: 1.0 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch

More information

F-Secure E-mail and Server Security. Administrator's Guide

F-Secure E-mail and Server Security. Administrator's Guide F-Secure E-mail and Server Security Administrator's Guide TOC F-Secure E-mail and Server Security Contents Preface: Disclaimer...vi Chapter 1: About This Guide...7 1.1 Introduction...8 1.1.1 Product contents...8

More information

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Trimble Office Synchronizer Release Notes. Version 1.68 November 2013

Trimble Office Synchronizer Release Notes. Version 1.68 November 2013 Trimble Office Synchronizer Release Notes Version 1.68 November 2013 Corporate Office Trimble Navigation Limited Engineering and Construction Division 935 Stewart Drive Sunnyvale, California 94085 U.S.A.

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Operating Instructions Driver Installation Guide

Operating Instructions Driver Installation Guide Operating Instructions Driver Installation Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine. TABLE OF CONTENTS 1. Introduction Before

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Product Library v.1.1 EUR Release Notes. DVD Contents. January 10th, 2014. Windows. Windows. Windows 8. Server 2008 Server 2008 R2.

Product Library v.1.1 EUR Release Notes. DVD Contents. January 10th, 2014. Windows. Windows. Windows 8. Server 2008 Server 2008 R2. 1 of 8 Product Library v.1.1 EUR Release Notes January 10th, 2014 DVD Contents Printer Drivers Version KX DRIVER 5.1.1405e2 (Generic) KX DRIVER 6.0.3306 KX (XPS) DRIVER PCL Mini Driver (Generic) PCL Mini

More information

SMART Meeting Pro System Administrator s Guide

SMART Meeting Pro System Administrator s Guide PLEASE THINK BEFORE YOU PRINT SMART Meeting Pro System Administrator s Guide Windows Operating Systems Product Registration If you register your SMART product, we ll notify you of new features and software

More information

Shavlik Protect. Installation and Setup Guide

Shavlik Protect. Installation and Setup Guide Shavlik Protect Installation and Setup Guide Copyright and Trademarks Copyright Copyright 2009 2014 LANDESK Software, Inc. All rights reserved. This product is protected by copyright and intellectual property

More information

Poliscript Installation Guide

Poliscript Installation Guide Poliscript Installation Guide Version 4.0 Current Poliscript Build: Version 2.7 Build 23 Please note this document is correct up to 27 th July 2010 Important Information: - Please note that Poliscript

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

BitDefender Security for Exchange

BitDefender Security for Exchange Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

BitDefender for Microsoft ISA Servers Standard Edition

BitDefender for Microsoft ISA Servers Standard Edition BitDefender for Microsoft ISA Servers Standard Edition Copyright 2006 SOFTWIN Edition 1. How Does It Work? As content entering or leaving your company must meet security policies, it is crucial to choose

More information

Reporting for Call Center Set Up and Operations Guide

Reporting for Call Center Set Up and Operations Guide Reporting for Call Center Set Up and Operations Guide www.nortelnetworks.com 2004 Nortel Networks P1012912 Issue 02 (05) Table of Contents Change History...1 How to Use This Guide...2 Introduction...2

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

F-Secure Policy Manager. Administrator's Guide

F-Secure Policy Manager. Administrator's Guide F-Secure Policy Manager Administrator's Guide TOC F-Secure Policy Manager Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

Xactimate v.27 Network Installation

Xactimate v.27 Network Installation Xactimate v.27 Network Installation Requirements Like all networked software applications, Xactimate Version 27 must be installed on a workstation connected to a network that has been properly set up and

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Service Updates and Enhancements

Service Updates and Enhancements Service Updates and Enhancements May 8, 2013 McAfee understands that providing the tools for a trusted communication environment is our primary directive. Accomplishing this goal requires listening to

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Basic Administration Guide

Basic Administration Guide *Formerly Panda Managed Office Protection Copyright notice Trademarks Panda Security 2010. All rights reserved. Neither the documents nor the programs that you may access may be copied, reproduced, translated

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Novell Filr. Windows Client

Novell Filr. Windows Client Novell Filr Windows Client 0 Table of Contents Supported Environments 2 Supported Languages 2 Getting Started 3 Which Folders Are Synchronized 3 What Actions Are Supported 4 Configuring Folders to Synchronize

More information

GFI Product Manual. Version 6.0. Getting Started Guide

GFI Product Manual. Version 6.0. Getting Started Guide GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

IBackup Drive User Guide

IBackup Drive User Guide IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Downloading and Mass Deploying Applications

Downloading and Mass Deploying Applications Downloading and Mass Deploying Applications Use of this product requires additional applications that must be downloaded to your users' computers. You can download and mass deploy these applications using

More information

Forefront Protection 2010 for Exchange Server Overview

Forefront Protection 2010 for Exchange Server Overview Forefront Protection 2010 for Exchange Server Overview Fast and effective protection against malware and spam Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses,

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Symantec Mobile AntiVirus for Windows Mobile Implementation Guide

Symantec Mobile AntiVirus for Windows Mobile Implementation Guide Symantec Mobile AntiVirus for Windows Mobile Implementation Guide Contents Chapter 1 Introducing Symantec Mobile AntiVirus... 7 About Symantec Mobile AntiVirus... 7 Components of Symantec Mobile AntiVirus...

More information

www.novell.com/documentation Administration Guide Messenger 2.2 July 30, 2013

www.novell.com/documentation Administration Guide Messenger 2.2 July 30, 2013 www.novell.com/documentation Administration Guide Messenger 2.2 July 30, 2013 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Verizon Security Scan Powered by McAfee. Installation Guide for Home Users

Verizon Security Scan Powered by McAfee. Installation Guide for Home Users Verizon Security Scan Powered by McAfee Installation Guide for Home Users ii Contents Introduction 3 System requirements 5 Installing Security Scan 7 Downloading your software... 7 Download your software...

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Managing Multi-Hypervisor Environments with vcenter Server

Managing Multi-Hypervisor Environments with vcenter Server Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

www.novell.com/documentation Administration Guide Messenger 3.0 February 2015

www.novell.com/documentation Administration Guide Messenger 3.0 February 2015 www.novell.com/documentation Administration Guide Messenger 3.0 February 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

F-Secure E-mail and Server Security. Deployment Guide

F-Secure E-mail and Server Security. Deployment Guide F-Secure E-mail and Server Security Deployment Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Product Library 2.5 EUR. DVD Contents. Release Notes January 31st, 2012. Windows 2000 Windows Server 2000. Windows. Windows Vista. Windows.

Product Library 2.5 EUR. DVD Contents. Release Notes January 31st, 2012. Windows 2000 Windows Server 2000. Windows. Windows Vista. Windows. 1 von 7 Product Library 2.5 EUR Release Notes January 31st, 2012 DVD Contents Printer Drivers Version 2000 Server 2000 XP Vista 7 Server 2003 R2 KX DRIVER (Generic) 5.1.1405e2 KX DRIVER 5.2.1327d KX (XPS)

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A Ascent Capture Internet Server 5 Getting Started with Ascent Capture Internet Server 5 10300260-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA. The information

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

SMART Bridgit software

SMART Bridgit software Specifications SMART Bridgit software Version 4.5 Product description SMART Bridgit conferencing software is a cost-effective client/server application that lets you easily schedule meetings and connect,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015) AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux

Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux Page 1 of 5 DOWNLOAD Please download the connector installer msi file and save it to your computer.

More information

Remote Desktop Services Guide

Remote Desktop Services Guide Remote Desktop Services Guide Mac OS X V 1.1 27/03/2014 i Contents Introduction... 1 Install and connect with Mac... 1 1. Download and install Citrix Receiver... 2 2. Installing Citrix Receiver... 4 3.

More information

Installation Instructions Release Version 15.0 January 30 th, 2011

Installation Instructions Release Version 15.0 January 30 th, 2011 Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01 Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

ABBYY FineReader 11 Corporate Edition

ABBYY FineReader 11 Corporate Edition ABBYY FineReader 11 Corporate Edition 2012 ABBYY. All rights reserved. Information in this document is subject to change without notice and does not bear any commitment on the part of ABBYY. The software

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

Verizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users

Verizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users Verizon Internet Security Suite Powered by McAfee Installation Guide for Business Users ii Contents Introduction 3 System requirements 5 Installing Verizon Internet Security Suite 7 Signing in to your

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Upgrade to Webtrends Analytics 8.7: Best Practices

Upgrade to Webtrends Analytics 8.7: Best Practices Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.

More information