ESET Mobile Security Business Edition for Windows Mobile
|
|
|
- Thomasine Wilkins
- 10 years ago
- Views:
Transcription
1 ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document
2 Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation Installation...3 on your device Installation...3 using your computer 1.3 Uninstallation Product...5 activation 2.1 Activation...5 using login and password 2.2 Activation...5 using registration key 3. Update Settings On-access...7 scanner 4.1 Settings On-demand...8 scanner 5.1 Running...8 a whole device scan 5.2 Scanning...8 a folder 5.3 General...8 settings 5.4 Extensions...9 settings 6. Threat...10 found 6.1 Quarantine Anti-Theft Settings Firewall Settings Security...15 audit 9.1 Settings Antispam...17 ESET Mobile Security 10.1 Settings Whitelist...17 / Blacklist 10.3 Locating...18 spam messages Copyright 2011 by ESET, spol. s r.o. ESET Mobile Security was developed by ESET, spol. s r.o. For more information visit All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without permission in writing from the author. ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice. Customer Care: REV Deleting...18 spam messages 11. Remote...19 administration 11.1 Settings Viewing...20 logs and statistics 13. Troubleshooting...22 and support 13.1 Troubleshooting Unsuccessful...22 installation Update...22 failed Downloading...22 file timed out Update...22 file missing Database...22 file corrupted 13.2 Technical...22 support
3 1. Installation of ESET Mobile Security device model. The installation file may appear in a different menu or folder on your device. 1.1 Minimum system requirements To install ESET Mobile Security for Windows Mobile, your mobile device must meet following system requirements: Minimum system requirements Operating system Windows Mobile 5.0 and later Processor 200 MHz Memory 16 MB Available free space 2.5 MB 1.2 Installation Save all open documents and exit all running applications before installing. You can install ESET Mobile Security directly on your device or use your computer to install it. After successful installation, activate ESET Mobile Security by following the steps in the Product activation 5 section Installation on your device To install ESET Mobile Security directly on your device, download the.cab installation file onto your device by Wi-Fi, Bluetooth, USB file transfer or attachment. Go to Start > Programs > File Explorer to locate the file. Tap the file to launch the installer and then follow the prompts in the installation wizard. Installation progress After installation, you can modify the program settings. However, the default configuration provides the maximum level of protection against malicious programs Installation using your computer To install ESET Mobile Security using your computer, connect your mobile device to the computer via ActiveSync (in Windows XP) or Windows Mobile Device Center (in Windows 7 and Vista). After the device is recognized, run the downloaded installation package ( exe file) and follow the instructions in the installation wizard. Launching the installer on your computer Then follow the prompts on your mobile device. Installing ESET Mobile Security NOTE: The Windows Mobile user interface varies by 3
4 1.3 Uninstallation To uninstall ESET Mobile Security from your mobile device, tap Start > Settings, tap the System tab and then tap the Remove Programs icon. NOTE: The Windows Mobile user interface varies by device model. These options may be slightly different on your device. Removing ESET Mobile Security Select ESET Mobile Security and tap Remove. Tap Yes when prompted to confirm the uninstallation. Removing ESET Mobile Security 4
5 2. Product activation The main ESET Mobile Security window (Start > Programs > ESET Mobile Security) is the starting point for all instructions in this manual. 2.1 Activation using login and password If you purchased your product from a distributor, you received a login and password with your purchase. Select the Login/Password option and enter the information you received in the Login and Password fields. Enter your current contact address in the field. Tap Activate to complete the activation. You will receive a confirmation about a successful product activation. 2.2 Activation using registration key If you acquired ESET Mobile Security with a new device (or as a boxed product), you received a Registration key with your purchase. Select the Registration key option, enter the information you received in the Key field and your current contact address in the field. Tap Activate to complete the activation. Your new authentication data (Login and Password) will automatically replace the Registration key and will be sent to the address you specified. The main ESET Mobile Security window After a successful installation, ESET Mobile Security must be activated. If you are not prompted to activate your product, tap Menu > Activate. Each activation is valid for a fixed period of time. After the activation expires, it will be necessary to renew the program license (the program will notify you about this in advance). NOTE: During activation, the device must be connected to the Internet. A small amount of data will be downloaded. These transfers are charged according to your service agreement with your mobile provider. Program activation There are two activation methods; the one that applies to you will depend on the manner in which you acquired your ESET Mobile Security product. 5
6 3. Update By default, ESET Mobile Security is installed with an update task to ensure that the program is updated regularly. You can also perform updates manually. After installation, we recommend you run the first update manually. To do so, tap Action > Update. 3.1 Settings To configure update settings, tap Menu > Settings > Update. The Internet Update option enables or disables automatic updates. You can specify the Update Server from which updates are downloaded (we recommend leaving the default setting of updmobile.eset.com). To set the time interval for the automatic updates, use the Auto Update option. Update settings NOTE: To prevent unnecessary bandwidth usage, virus signature database updates are issued as needed, when a new threat is added. While virus signature database updates are free with your active license, you may be charged by your mobile service provider for data transfers. 6
7 4. On-access scanner The On-access scanner checks files that you interact with in real time. Files that are run, opened or saved are checked for threats automatically. Scanning takes place before any action is performed on a file, ensuring maximum protection with default settings. The Onaccess scanner launches automatically at system startup. 4.1 Settings Tap Menu > Settings > On-access to enable or disable following options: Enable On-access Scan If enabled, the On-access scanner runs in the background. Heuristics Select this option to apply heuristic scanning techniques. Heuristics proactively identify new malware not yet detected by the virus signature database by analyzing code and recognizing typical virus behavior. Its disadvantage is that additional time is required to complete the scan. Run After Restart If selected, the On-access scanner will automatically start after restart of the device. Display scan in action status Select this option to show scan status in the bottom right corner while scanning is in progress. Show shell icon - displays the quick access icon of the On-access settings (in the bottom right corner of the Windows Mobile Start screen). Show splash screen - this option allows you to turn off the ESET Mobile Security splash screen shown during the startup of your device. On-access scanner settings 7
8 5. On-demand scanner You can use the On-demand scanner to check your mobile device for the presence of infiltrations. Certain predefined file types are scanned by default. 5.3 General settings To modify scanning parameters, tap Menu > Settings > General. 5.1 Running a whole device scan A whole device scan checks memory, running processes, their dependent dynamic link libraries (DLLs) and files that are part of internal and removable storage. To run a whole device scan, tap Action > Scan > Whole device. NOTE: A memory scan is not performed by default. You can enable it in Menu > Settings > General. The program scans system memory first (including running processes and their dependent DLLs) and then scans files and folders. The full path and file name of each scanned file will be displayed briefly. NOTE: To abort a scan in progress, tap Action > Scan > Stop Scan. General settings 5.2 Scanning a folder Select the Show alert dialog option to display threat alert notifications. To scan a particular folder on your device, tap Action > Scan > Folder. Tap the folder you wish to scan and tap Select. You can specify a default action that will be performed automatically when infected files are detected. You can choose from the following options: Quarantine, Delete, Do Nothing (not recommended). The Stored Logs option allows you to define the maximum number of logs to be stored in the Menu > Logs > Scan section. If the Memory Scan is enabled, the device memory will be automatically scanned for malicious programs prior to the actual file scan. Selecting a folder to scan If the Heuristics option is enabled, ESET Mobile Security will use heuristic scanning techniques. Heuristics is an algorithm-based detection method that analyzes code and searches for typical virus behavior. Its main advantage is the ability to identify malicious software not yet recognized in the current virus signature database. Its disadvantage is that additional time is required to complete the scan. The Archive Nesting option allows you to specify the depth of nested archives to be scanned. (The higher the number, the deeper the scan.) If the Archive Deletion option is enabled, archive files ( zip, rar and jar) containing infected objects will be automatically deleted. 8
9 5.4 Extensions settings To specify the file types to be scanned on your mobile device, tap Menu > Settings > Extensions. The Extensions window will be displayed, showing the most common file types exposed to infiltration. Select the file types you wish to scan or deselect the extensions to exclude them from scanning. If you enable the Archives option, all supported archive files ( zip, rar and jar) will be scanned. To scan all files, deselect the Extension sensitive checkbox. Extensions settings 9
10 6. Threat found If a threat is found, ESET Mobile Security will prompt you to take an action. Quarantine List Threat alert dialog We recommend you select Delete. If you select Quarantine, the file will be moved from its original location to quarantine. If you select Ignore, no action will be performed and the infected file will remain on your mobile device. If an infiltration is detected in an archive (e.g.,.zip file), the Delete archive option is available in the alert window. Select this option along with the Delete option to delete all archived files. If you disable the Show alert dialog option, no alert windows will be displayed during the current scan (to disable alerts for all future scans, see the General settings 8 ). 6.1 Quarantine The main task of the quarantine is to safely store infected files. Files should be quarantined if they cannot be cleaned, if it is not safe or advisable to delete them or if they are being falsely detected by ESET Mobile Security. Files stored in the quarantine folder can be viewed in a log that displays the date and time of quarantine and original location of the infected file. To open quarantine, tap Menu > View > Quarantine. 10 You can restore quarantined files by tapping Menu > Restore (each file will be restored to its original location). If you wish to permanently remove the files, tap Menu > Delete.
11 7. Anti-Theft The Anti-Theft feature protects your mobile phone from unauthorized access. If you lose your phone or someone steals it and replaces your SIM card with a new (untrusted) one, an Alert SMS will be secretly sent to certain user-defined phone number(s). This message will include the phone number of the currently inserted SIM card, the IMSI (International Mobile Subscriber Identity) number and the phone's IMEI (International Mobile Equipment Identity) number. The unauthorized user will not be aware that this message has been sent, since it will be automatically deleted from the Sent folder. To erase all data (contacts, messages, applications) stored on your device and all currently inserted removable media, you can send a Remote wipe SMS to the unauthorized user's mobile number in the following form: #RC# DS password where password is your own password set in Menu > Settings > Password. 7.1 Settings First, set your password in Menu > Settings > Password. This password is required when: sending a Remote wipe SMS to your device, accessing the Anti-Theft settings on your device, uninstalling ESET Mobile Security from your device. Setting a security password To access Anti-Theft settings, tap Menu > Settings > Anti-Theft and enter your password. To disable automatic checking of inserted SIM card (and possible sending of Alert SMS), deselect the Enable SIM matching option. If the SIM card currently inserted in your mobile device is the one you wish to save as trusted, check the Current SIM is trusted check box and the SIM will be saved to the Trusted SIM list (Trusted SIM tab). The SIM Alias text box will be automatically filled with IMSI number. To set a new password, type your password in New password and Retype password fields. The Reminder option (if set) displays a hint in case you do not remember your password. If you are using more than one SIM card, you may want to distinguish each one by modifying its SIM Alias (e. g., Office, Home etc.). To change existing password, Enter current password first and then fill in new password. In Alert SMS, you can modify the text message that will be sent to the predefined number(s) after an untrusted SIM card is inserted in your device. IMPORTANT: Please choose your password carefully as this will be required when uninstalling ESET Mobile Security from your device. 11
12 The Trusted SIM tab shows the list of trusted SIM cards. Each entry consists of the SIM Alias (left column) and IMSI number (right column). To remove a SIM from the list, select the SIM and tap Menu > Remove. Anti-Theft settings The Alert Recipients tab shows the list of predefined numbers that will receive an Alert SMS after an untrusted SIM card is inserted in your device.to add a new number, tap Menu > Add. To add a number from the contact list, tap Menu > Add contact. Trusted SIM list NOTE: the phone number must include the international dialing code followed by the actual number (e.g., ). Predefined phone numbers list 12
13 8. Firewall The Firewall controls all inbound and outbound network traffic by allowing or denying individual connections based on filtering rules. from two filtering modes: Automatic - suitable for users who prefer easy and convenient use of the firewall with no need to define rules. This mode allows all outbound traffic. For the inbound traffic, you can set a default action (Default Allow or Default Block) in Behavior option. Interactive - allows you to customize your personal firewall. When a communication without a corresponding rule is detected, a dialog window reporting an unknown connection is displayed. The dialog window gives the option to allow or block the communication and to create a rule. If you choose to create a rule, all such future connections will be allowed or blocked according to the rule. If an application with an existing rule has been modified, a dialog window gives you the option to accept or deny this change. The existing rule will be modified based on your response. Block roaming data - if enabled, ESET Mobile Security automatically detects if your device is connected to a roaming network and blocks both incoming and outgoing data. This option does not block the data received via Wi-Fi or GPRS. Firewall alert 8.1 Settings To modify the Firewall settings, tap Menu > Settings > Firewall. Allow this MMS connection - choose a connection for receiving MMS messages in a roaming network. MMS messages from other connections will be blocked by ESET Mobile Security. In the Rules tab, you can edit or remove existing filtering rules. Firewall settings You can choose from the following profiles: Firewall rules list Allow All - allows all network traffic, Block All - blocks all network traffic, Custom Rules - lets you define your own filtering rules. While in the Custom Rules profile, you can choose 13
14 To create a new rule, tap Menu > Add, fill in all the required fields and tap Done. Creating a new rule 14
15 9. Security audit To see each item's details, select the item and tap Menu > Details. The Security audit checks the phone's status regarding battery level, bluetooth status, free disk space, etc. To run a Security audit manually, tap Action > Security audit. A detailed report will be displayed. Running Processes The Running Processes option shows the list of all processes running on your device. Security audit results A green color next to each item indicates that the value is above the threshold or that the item does not represent a security risk. Red color means that the value is below the threshold or that the item could represent a potential security risk. To see the process details (full path name of the process and its memory usage), select the process and tap Details. 9.1 Settings To modify Security audit parameters, tap Menu > Settings > Security audit. If Bluetooth Status or Device Visibility is highlighted in red, you can turn off its status by selecting the item and tapping Menu > Fix. Security audit settings If the Fix automatically option is enabled, ESET Mobile Security will automatically attempt to fix the items at risk (e.g., bluetooth status, device visibility) without user interaction. This setting only applies to an automatic (scheduled) audit. 15
16 The Audit Period option allows you to choose how often the automatic audit will be performed. If you wish to disable the automatic audit, select Never. You can adjust the threshold value at which the Free Disk Space and Battery Level will be considered as low. In the Items to Audit tab, you can select the items to be checked during the automatic (scheduled) security audit. Automatic audit settings 16
17 10. Antispam The Antispam module blocks unsolicited SMS and MMS messages sent to your mobile device. Unsolicited messages usually include advertisements from mobile phone service providers or messages from unknown or unspecified users Settings 10.2 Whitelist / Blacklist The Blacklist is a list of phone numbers from which all messages are blocked. Entries listed here override all options in the Antispam settings (Settings tab). The Whitelist is a list of phone numbers from which all messages are accepted. Entries listed here override all options in the Antispam settings (Settings tab). Tap Menu > View > Statistics to see statistical information about received and blocked messages. In the Antispam settings (Menu > Settings > Antispam ), the following filtering modes are available: Block unknown contacts Enable this option to accept messages only from contacts in your address book. Block known contacts Enable this option to receive messages only from senders not included in your address book. Enable both Block unknown contacts and Block known contacts to automatically block all incoming messages. Disable both Block unknown contacts and Block known contacts to turn off the Antispam. All incoming messages will be accepted. NOTE: The Whitelist and Blacklist entries override these options (see Whitelist / Blacklist 17 section). Blacklist To add a new number to the Whitelist/Blacklist, select the tab for the list you wish to modify and tap Menu > Add. To add a number from the contact list, tap Menu > Add contact. Warning: Adding a number/contact to the blacklist will automatically and silently move messages from that sender to the Spam folder. Antispam settings 17
18 10.3 Locating spam messages 10.4 Deleting spam messages The Spam folder is used to store blocked messages categorized as spam according to the Antispam settings. The folder is automatically created when the first spam message is received. To locate the Spam folder and review blocked messages, follow the steps below: To delete spam messages from your mobile device, follow the steps below: 1. Open the program your device uses for messaging, e. g. Messaging from the Start menu, 2. Tap Text Messages (or MMS if you wish to locate the MMS Spam folder), 3. Tap Menu > Go To > Folders... (or Menu > Folders on the smartphones), 4. Select the Spam folder. 1. Tap Menu >Settings > Antispam from the ESET Mobile Security main window, 2. Tap Purge spam, 3. Tap Yes to confirm the deletion of all spam messages. Deleting Spam messages Spam folder 18
19 11. Remote administration ESET Remote Administrator (ERA) allows you to manage ESET Mobile Security in a network environment directly from one central location. From ERA Server, you can scan your device, install updates, check the log files, send messages, etc. ESET Mobile Security Business Edition is compatible with ESET Remote Administrator Settings To access the Remote administration settings, tap Menu > Settings > Remote administration. Remote administration settings Enter the remote server name in the Remote server and port field. The Port field contains a predefined server port used for network connection. We recommend that you leave the default port setting of If ESET Remote Administrator requires password authentication, check the ERA Server requires password option and enter the password in the Password field. The Connection interval option allows you to specify how often ESET Mobile Security will connect to the ERA Server to send out data. The minimum connection interval is 1 hour. If you wish to connect to the ERA Server immediately, tap Action > Connect to ERA from the main ESET Mobile Security window. NOTE: For further guidance on how to manage your network using ESET Remote Administrator, please refer to the ESET Remote Administrator Installation Manual and User Guide. 19
20 12. Viewing logs and statistics The Scan log section (Menu > Logs > Scan) contains logs providing comprehensive data about completed scan tasks. Logs are created after each successful Ondemand scan or when an infiltration is detected by the On-access scan. All infected files are highlighted in red. At the end of each log entry is an explanation of why the file was included in the log. Scan logs contain: log file name (usually in the form Scan.Number.log), date and time of the event, list of scanned files, actions performed or errors encountered during the scan. Security audit log The Firewall Log (Menu > Logs > Firewall) contains the information about the firewall events blocked by ESET Mobile Security. The log is updated after every communication performed through the firewall. New events appear on the top of the log. Firewall Log contains: date and time of the event, name of the rule used, action performed (based on the rule settings), source IP address, destination IP address, protocol used. Scan log The Security audit log section (Menu > Logs > Security audit) stores all security audit results from both automatic (scheduled) audit and manually triggered audit. Security audit logs contain: log file name (in the form auditnumber.log), date and time of audit, detailed results. Firewall log The Statistics screen (Menu > View > Statistics) displays a summary of: files scanned by the On-access scanner, received and blocked messages, 20
21 quarantined files, received and sent data through firewall. If you wish to reset current statistics, tap Menu > Reset counters. NOTE: All statistical data get calculated starting from the latest restart of the device. Statistics The Connections section (Menu > View > Connections) displays the applications used for sending and receiving data. Information includes: name of the process, amount of data sent, amount of data received. Connections 21
22 13. Troubleshooting and support 13.1 Troubleshooting This section provides solutions to common questions related to ESET Mobile Security Unsuccessful installation The most common cause of an error message displayed during installation is that the wrong version of ESET Mobile Security has been installed on your device. When downloading the installation file from the ESET website, please make sure you are downloading the correct product version for your device Update failed This error message is displayed after an unsuccessful update attempt if the program is not able to contact the update servers. Try the following solutions: 1. Check your Internet connection open your Internet browser to to verify that you are connected to the Internet. 2. Verify that the program is using the correct update server tap Menu > Settings > Update and you should see updmobile.eset.com in the Update Server field Downloading file timed out The Internet connection was unexpectedly slowed down or interrupted during the update. Try to run the update again later, please Update file missing If you are trying to install new virus signature database from the update file (esetav_wm.upd), the file must be present in the ESET Mobile Security installation folder (\Program Files\ESET\ESET Mobile Security) Database file corrupted The virus signature database update file (esetav_wm. upd) is corrupted. You need to replace the file and run the update again Technical support For administrative assistance or technical support related to ESET Mobile Security or any other ESET security product, our Customer Care specialists are available to help. To find a solution to your technical support issue, you can choose from the following options: To find answers to the most frequently asked questions, access the ESET Knowledgebase at: 22 The Knowledgebase contains an abundance of useful information for resolving the most common issues with categories and an advanced search. To contact ESET Customer Care, use the support request form available at:
ESET Mobile Security Windows Mobile
ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3
ESET Mobile Security Windows Mobile. Installation Manual and User Guide
ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3
ESET MOBILE SECURITY FOR ANDROID
ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3
ESET ENDPOINT SECURITY FOR ANDROID
ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1...3 Installation of ESET Endpoint Security 1.1 Installation...3
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document
ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
Sophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
ESET NOD32 ANTIVIRUS 8
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
ESET NOD32 ANTIVIRUS 9
ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection
FOR MAC. Quick Start Guide. Click here to download the most recent version of this document
FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
contents 1. ESET Smart Security...4 2. Installation...5 3. Beginner s guide...9 4. Work with ESET Smart Security...12
Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware ESET Personal Firewall ESET Antispam New generation of NOD32 technology User Guide we protect your digital worlds contents 1. ESET Smart
NOD32 Antivirus 3.0. User Guide. Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware. we protect your digital worlds
NOD32 Antivirus 3.0 Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware User Guide we protect your digital worlds contents 1. ESET NOD32 Antivirus 3.0...4 1.1 What s new... 4 1.2 System
Kaspersky Endpoint Security 8 for Smartphone for Android OS
Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and
GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
ViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
Green House Data Spam Firewall Administrator Guide
Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum
Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide
ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine
F-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
F-Secure Client Security. Administrator's Guide
F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main
Sophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Frequently Asked Questions: Xplornet Internet Security Suite
Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my
Bitdefender Internet Security 2015 User's Guide
USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
ESET NOD32 Antivirus. Table of contents
ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32
Comodo Antivirus for Linux Software Version 1.0
Comodo Antivirus for Linux Software Version 1.0 User Guide Guide Version 1.0.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus for
IceWarp Unified Communications. AntiVirus Reference. Version 10.4
IceWarp Unified Communications AntiVirus Reference Version 10.4 Printed on 13 January, 2012 Contents AntiVirus 1 Anti-Virus... 2 Latest Avast! Engine... 2 Kaspersky Anti-Virus Support... 2 Support for
ES Exchange Server - How to Remove XMON
w e p r o t e c t d i g i t a l w o r l d s NOD32 Server Edition for MS Exchange Server Installation Copyright Eset, spol. s r. o. All rights reserved. No part of this document may be reproduced or transmitted
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
Cox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Compliance Rule Sets in MaaS360
Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable
POLICY PATROL MFT. Manual
POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated
How does the Excalibur Technology SPAM & Virus Protection System work?
How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being
U.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition
Quickstart Guide First Edition, Published September 2009 Remote Administrator / NOD32 Antivirus 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1
User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego
Avira Exchange Security Version 12. HowTo
Avira Exchange Security Version 12 HowTo Table of contents 1. General information... 3 2. System requirements... 3 3. Installation of Avira Exchange Security...4 4. Licensing... 5 5. Configuration of Email
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X
Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos
Endpoint Security Console. Version 3.0 User Guide
Version 3.0 Table of Contents Summary... 2 System Requirements... 3 Installation... 4 Configuring Endpoint Security Console as a Networked Service...5 Adding Computers, Groups, and Users...7 Using Endpoint
Vodafone Text Centre User Guide for Microsoft Outlook
Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message
Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5
Server Installation, Administration and Integration Guide
Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management
Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition
Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
ESET NOD32 Antivirus 4
ESET NOD32 Antivirus 4 for Mac Installation Manual and User Guide - Public Beta ESET NOD32 Antivirus Copyright 2010 by ESET, spol. s.r.o. ESET NOD32 Antivirus 4 was developed by ESET, spol. s r.o. For
How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)
MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE
Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later
Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
How To Manage Your Quarantine Email On A Blackberry.Com
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
For Businesses with more than 25 seats. www.eset.com
For Businesses with more than 25 seats www.eset.com ESET Secure Enterprise Whether your business is just starting or Simple and Straightforward established, there are a few things you expect With ESET
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection
User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
AV Management Dashboard
LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
http://connectwise.reflexion.net/login?domain=connectwise.net
ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.
Email - Spam Spam Email Firewall How Does the Spam Firewall Work? Getting Started username Create New Password
Email - Spam Spam Email Firewall ODU s Information Services has implemented a Spam Firewall to help you manage spam e-mail from Internet senders. Generally defined, spam e-mail is an unsolicited mailing,
Welcome to MaxMobile. Introduction. System Requirements
MaxMobile 10.5 for Windows Mobile Smartphone Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Smartphone provides you with a way to take your customer information on the road. You can
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
F-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection
Manual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
Sophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
Comodo Mobile Security for Android Software Version 2.5
Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile
Upgrading Client Security and Policy Manager in 4 easy steps
Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
ESET NOD32 Antivirus 4
ESET NOD32 Antivirus 4 for Linux Desktop Installation Manual and User Guide - Public Beta ESET NOD32 Antivirus Copyright 2010 by ESET, spol. s.r.o. ESET NOD32 Antivirus 4 was developed by ESET, spol. s
User Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
