Avira Internet Security FireWall. HowTo
|
|
|
- Amy McCarthy
- 10 years ago
- Views:
Transcription
1 Avira Internet Security FireWall HowTo
2 Table of Contents 1. Basic knowledge about the Firewall Explanation of the terms Configuration Possibilities Security Level Block all Custom High Medium Low Configuration Adapter rules Application rules Trusted vendors Settings Pop-up settings General information about Child Protection Enable Safe Browsing in Child Protection User selection Roles Properties of the role Changing the update intervals Changing an update job Product update Restart settings Avira Internet Security FireWall (Status ) 2
3 Basic knowledge about the Firewall 1. Basic knowledge about the Firewall A firewall works with network protocols like e.g. TCP, UDP, IT, etc. A simple example for building up a connection is also called a handshake procedure. This example shows how a communication is established between two computers in the Internet. Computer A sends a package with the information that it wants to build up a connection with computer B Computer B answers that it is ready Computer A confirms the answer of Computer B The connection between Computer A and B is now established and the exchange of data can begin. 2. Explanation of the terms TCP The Transmission Control Protocol (TCP) is an agreement (or protocol) about the way data is being exchanged between computers. UDP The User Datagram Protocol (UDP) is a minimal connectionless network protocol. So-called ports are used to send the data with UDP to the right program on the target computer. Therefore, the port number of the service that contains the data is sent as well. Additionally, UPD offers an integrity check by sending a check sum. This makes the detection of an incomplete transmission possible. Flooding Flooding describes the overflow in a network that is caused by packages. Flooding can paralyze the data transmission in a network (or of a single computer) as the computer or the network is overflowed by a mass of requests and cannot react anymore. You can compare that to a traffic jam on a freeway. Ports A port can be compared to a house number. The difference is that a house, in this case a computer, can have several numbers. A port is a part of an address which assigns the arriving package to an application. Avira Internet Security FireWall (Status ) 3
4 Explanation of the terms Example Port 110 is responsible for the service POP3 and guarantees the access to the server. Special applications use port numbers that are firmly assigned by the IANA and generally known. Usually the ports are numbered from 0 to 1023 and are called Well Known Ports. Producers of applications can register ports for their own protocols if necessary, similar to domain names. The registration of the ports offers the advantage that an application can be identified according to the port number, but only if the application uses the IANA registered port. The rest of the ports from port number to are so called Dynamic and/or Private Ports. For further information please click here. Port scan Port scans are executed in order to spy out free ports on the computer. If a computer provides a server service to others, it opens either a TCP/IP or UDP port or both or several ports. A web server has to open the port 80. A port scan finds out which ports are opened on the computer. IP In order to get connected to a computer the Internet Protocol (IP) identifies it with a definite IP address. In case you send a letter to a friend you have to write the street and the city on it. The IP address has the same function. Host File Sometimes the host file is used to block known web servers by entering the local host ( ), so that all requests are sent to the own system. The specialty of this method is that the blockage is valid in the whole system and is not limited to the browser as web filters are. Furthermore you can use these filters against some malware programs if they are trying to get commands from already known servers. URL Uniform Resource Locators (URL) are a kind of Uniform Resource Identifiers (URIs). URLs identify and locate a resource via the used network protocol (e.g. HTTP or FTP) and the location of the resource within the computer networks. As URLs are the first and most frequent kind of URIs the terms are often used as synonyms. In colloquial language URL is frequently used as a synonym for Internet addresses like e.g. Slide-Up A slide-up is a small window that appears slowly on the top right or down right of your screen and disappears after an interaction or after some time. Avira Internet Security FireWall (Status ) 4
5 3. Configuration Possibilities 3.1. Security Level First, you have to decide which security level you want to use. A security level that is too high might cause a malfunction of some system features. Using a security level that is to low, you run the risk that not all accesses to your computer are blocked. In general it can be said: If the PC is not connected with a local network and no network-compatible device (e.g. network printer) is located near the PC, the security level can be set to High. This means the computer is invisible in the network. Furthermore, connections from outside are blocked and flooding as well as port scans are prevented. This is the default setting after the installation of the Avira Internet Security. In case the PC is located in a network environment or the PC should have access to network devices like e.g. network printer, the security level should be set on Medium. The High level might block the network printer or not recognize it as the firewall does not know that a printer is available. Please proceed as follows: Start the Avira Control Center Avira Internet Security FireWall (Status ) 5
6 You can start it by a left double click on the umbrella symbol. The tray icon is located in the task bar, down right next to the system time. Open the register FireWall The register is opened by a left mouse click on the register FireWall. The register FireWall is located on the left side of the Control Center below the menu INTER- NET PROTECTION. Adaption of the Security Level of the Firewall By clicking and keeping hold of the security level controller you can adapt the security level. The possible levels are Low, Medium, High, Custom and Block all. You can find a description of the levels directly on the right side of the controller. Please choose the level Medium, in case any problems with network printers, removable hard disk or similar network connections should occur Block all All network connections are blocked Custom With this option you can set user defined rules. Avira Internet Security FireWall (Status ) 6
7 3.1.3 High The computer is invisible in the network and the connections coming from outside are blocked. Flooding and port scan are prevented Medium In comparison to the firewall setting High, the computer is visible in the network and receives TCP and UDP requests. These requests are rejected. TCP and UDP packages which are received unexpectedly will not be processed and accepted. Flooding and port scan will be prevented. Problems with the network can occur using the level Medium, too. In this case you should change the level to Low. The preset level is more distinctive in the security level Medium. This means that with Medium some TCP and UDP package requests are recognized and forwarded automatically. Others are rejected Low The level Low offers you the protection of the Avira Firewall, too. Flooding and port scan will not be prevented, only detected. These are the most frequent methods for finding vulnerabilities on your computer. In case these settings are not enough for you or you have to activate different ports for an application, you can find more configurations in chapter 3.2 Configuration. 3.2 Configuration Click with the right mouse button on the tray icon in the task bar and choose the item Configure Avira Internet Security. You also have the possibility to start the configuration by opening the Avira Control Center. Thereafter, press F8 or click on Extras > Configuration. In the configuration on the left pane double-click on Internet protection and then on FireWall. Activate the Expert mode in order to have access to all possible settings. Here you can configure the following settings: Adapter rules Application rules Trusted vendors Settings Popup settings Avira Internet Security FireWall (Status ) 7
8 3.2.1 Adapter rules Each hardware entity that is simulated by a software or each hardware entity (e.g. a network interface card) is seen as an adapter (e.g. Miniport, Bridge Connection, etc.) The Avira FireWall shows the adapter rules for all adapters that exist on your computer and have a driver installed. A predefined adapter rule is dependent on the security level. You can change the security level via the Avira Control Center as it is described in chapter 3.1 or change the adapter rules as you like. After you have changed the adapter rules the controller of the firewall is set on the security level Custom. Incoming Rules Incoming rules help to control the incoming data traffic with the Avira FireWall. Example You want to add the IP address Avira Internet Security FireWall (Status ) 8
9 If you click on Add rule, a window opens with different predefined rules. There you choose Incoming IP rule and confirm it with OK. In your Incoming rules you can find the item Incoming IP rule. Select this item. You can also rename it. Now you can enter the IP and its mask into the marked box below and enable or block it. You can also decide if the package should be written into the log file or not. Outgoing rules Outgoing rules help to control the outgoing data transfer by means of the Avira FireWall. You can define an outgoing rule for the following protocols: IP ICMP UDP TCP In order to enter settings for the Outgoing rules you can proceed in the same way as for the settings of the Incoming rules. Examples Peer to Peer You can use these default templates if you use e.g. exchange systems, file systems or file sharing systems. You can add the new rule via the following path: Avira Internet Security FireWall (Status ) 9
10 Internet protection > FireWall > Adapter rules > Local Area Connection 2 (Active) Press the Add rule button and select in the next window Allow Peer-To-Peer network. Click OK to confirm. You only have to enable the needed TCP and UDP ports by clicking on the port address in case you need to change it. Avira Internet Security FireWall (Status ) 10
11 VMware In case the Internet access should not be possible from your VMware, you have to enable it using the following template. To change the settings of Allow VMWARE connections, do the same as in the previous rule for the Peer-To-Peer network. Avira Internet Security FireWall (Status ) 11
12 3.2.2 Application rules This list contains all users in the system. If you are logged on as administrator, you can choose a user and set a rule for him. If you do not have administrative rights, the list only shows you the currently logged on users. Example This way an administrator can make sure that a web browser does not receive Internet access or that a chat program cannot be executed. Add application If you click on the button Add application, a new window opens with the programs that are already installed on your computer. Avira Internet Security FireWall (Status ) 12
13 By a simple click the application is marked and can be added to the list with the button Add. Application settings Here you can change the mode from Filtered to Privileged. In the mode Filtered the adapter rules and the application rules are checked. The application rules are checked only in the Privileged mode. Furthermore, the action can be changed from Allow to Deny or Ask. If you choose the action Ask, you are always asked before executing a program if you really want to start the program. In case of the action Deny, the program will be blocked by the Avira Firewall. Avira Internet Security FireWall (Status ) 13
14 3.2.3 Trusted vendors A list of reliable software manufacturers is shown in the menu Trusted vendors. You can add or remove manufacturers on the list by using the option Always trust this vendor in the popup window of the network event. You can allow the network access of applications that are signed by the listed vendors by default. Therefore you activate the option Automatically allow applications created by trusted vendors. Trusted vendors for user This list contains all users in your system. If you are logged on as administrator, you can select a user and view as well as modify his list of trusted vendors. Avira Internet Security FireWall (Status ) 14
15 If you are not a user with privileged rights, the list only shows you the logged-in user. Automatically allow applications created by trusted vendor If this option is activated, applications with a signature of known and trusted vendors get automatically an access to the network. This option is activated by default. We recommend that you keep this option activated since we have the contact data of those vendors. Therefore, the vendors are categorized as trusted vendors. Avira Internet Security FireWall (Status ) 15
16 Vendors The list shows all vendors that have been categorized as trustworthy. Remove The marked entry is removed from the list of trusted vendors. To permanently remove the marked vendor from the list, click on Apply or OK. Avira Internet Security FireWall (Status ) 16
17 Reload With the Reload button all changes are cancelled. The last saved list will be loaded. Note If you remove a vendor from the list and click on Apply or OK the vendor will be removed for good. You can t reload it. But you have the possibility to add the vendor again to the list of trusted vendors using the option Always trust this vendor in the popup window of the network event. The firewall prioritizes application rules: The application rule will be used if you create an application rule and the vendor of the application is part of the list of trusted vendors Settings Automatic rule timeout Block forever A rule that has been created for a portscan is automatically kept. Remove rule after n seconds A rule that has been automatically created, e.g. for a portscan, is removed after the given time. Avira Internet Security FireWall (Status ) 17
18 This option is activated by default. Advanced options Stop Windows Firewall on startup This option deactivates the Windows Firewall on startup. This option is activated by default as the use of two firewalls at the same time might cause problems. Two desktop firewalls interfere with each other. Avira Internet Security FireWall (Status ) 18
19 Notifications Here you can define the category of events that will send a notification from the FireWall. Portscan If you activate this option you will receive a desktop notification in case a portscan has been detected by the FireWall. Portscan are not always malicious, but can be a sign of a possible attack on your system. Flooding You will receive a desktop notification in case a flooding attack has been detected by the FireWall, if you activate this option. Flooding attacks can overload your network with a high volume of data and paralyze your network. Applications blocked In case an application should try to establish an external connection which you have not allowed in the FireWall or which is not privileged, the connection is blocked by the Avira FireWall and you receive a desktop notification. This notification informs you about the application and why it has been blocked. Avira Internet Security FireWall (Status ) 19
20 IP blocked If this options is activated, you will receive a desktop notification in case the FireWall has rejected the data traffic from a certain IP address. We recommend to deactivate this option since there are a lot of unwanted IP address requests in the Internet and as a result, you would receive lots of desktop notifications. Application rules With these options you set the configurations for the application of the FireWall. Advanced settings If you activate this option, you have the possibility to manage different network accesses of an application individually. This means that you create a special application rule for an application. You can manage the traffic for an application individually or you only monitor the application. Basic settings If you activate this option, you can only set one action for different network accesses. Usually this is enough to allow or to block applications. Avira Internet Security FireWall (Status ) 20
21 3.2.5 Pop-up settings Pop-up settings Inspect process launch stack If this option is enabled, the process stack inspection will be more accurate. The FireWall assumes that each process in the stack being deemed as not trustworthy is the one whose child process enables the access to the network. Therefore, a popup-window is opened for each process in the stack that is deemed as untrustworthy. These options are deactivated by default. We recommend you to keep the default settings as you would receive a flow of pop-ups otherwise. Allow multiple pop-ups per process If this option is activated, a pop-up window is opened each time an application tries to build up a network connection. Alternatively, you are informed only on the first connection attempt. This option is deactivated by default. We recommend you to keep the default settings. So you receive only one pop-up window per process. Avira Internet Security FireWall (Status ) 21
22 Remember action for this application Always enabled The option Remember action for this application of the dialog box Network event ist enabled as the default setting. Always disabled The option Remember action for this application of the dialog box Network event ist disabled as the default setting. Enabled for signed applications The option Remember action for this application of the dialogue box Network event is automatically activated for the network access by signed applications of certain vendors. These vendors are: Microsoft, Mozilla, Opera, Yahoo, Google, Hewlet Packard, Sun, Skype, Adobe, Lexmark, Creative Labs, ATI, nvidia. Remember last used state The option Remember action for this application in the dialog box Network event is enabled in the same way as for the last network event. In case the option Remember action for this application has been activated for the last network event, the option will also be active for the following network event. In case the option Remember action for this application has been deactivated for the last network event, the option won t be active for the following network event. Avira Internet Security FireWall (Status ) 22
23 We recommend you to keep this option, so that all actions about the connections of the applications are saved automatically. Show details Here you can configure which detailed information in the box network event is important to you. Show details on demand The detailed information are only displayed on request in the Network event. Details are shown only after a click on the button Show details in the Network event window. Always show details The details are always shown in the Network event window. Remember last used state The display of detailed information is managed in the same way as for the previous network event. Avira Internet Security FireWall (Status ) 23
24 Child Protection 4. General information about Child Protection Avira Internet Security offers a Child Protection function to filter undesired or illegal Internet offers. You can assign different roles to different users. A user role is configurable and contains forbidden or allowed URLs (Internet addresses) and forbidden content categories. Powerful URL filter lists are used to block Internet contents according to certain categories. In these URL filter lists URLs are categorized in content groups depending on the content of the websites. The URL filter lists are updated, adjusted and extended every day. They support European languages (English, German, French, Italian, Russian ). The roles child, young person, adult are preconfigured with the corresponding forbidden categories. In order to configure the parental control, you have to activate it first. If this option is enabled, all the web pages requested by the user while navigating the Internet are scanned on the basis of the role assigned to the registered user in the parental control function. In case of a forbidden website the website is blocked and a note appears in the browser. Example If a blocked page is requested, the following browser window appears. Avira Internet Security FireWall (Status ) 24
25 Child Protection 4.1 Enable Safe Browsing in Child Protection In order to activate the Child Protection, you need to open the configuration window by going to the Avira Control Center and selecting Extras > Configuration. Choose Child Protection > Safe Browsing on the left side panel and you should see the window shown below. Activate Enable Safe Browsing on the right pane. 4.2 User selection Select a user and click on Add. The user appears on the right pane with the default setting Child. You can change the role by a simple click. Avira Internet Security FireWall (Status ) 25
26 Child Protection 4.3 Roles You can add a new role or you can change the given roles. In order to add new roles, enter the role name in the free box. Please note that the name should not exceed 30 characters. Example The role child under 16 should be added. Click on New. The new role appears in the right box. In order to configure the role Child under 16, choose the role and click on Change. Avira Internet Security FireWall (Status ) 26
27 Child Protection Properties of the role Here you can add URLs and block the access to URLs that belong to certain categories. Example and URLs of the category Pornography, Erotica/Sex and Sects should be blocked. The categories are provided by a huge data base of the enterprise Cobion. Furthermore, the web filter has access to a data base of the consumer protection office Hamburg. If you should find a website that belongs to one of those categories, you can categorize it via the Test-A-Site website and have it checked. Avira Internet Security FireWall (Status ) 27
28 Child protection Additionally, it is possible to limit the time of the Internet usage by clicking the button Allowed usage duration. Activate the category Limit time of Internet use and configure the desired maximum Internet surfing time for the current role. By clicking the button Exact usage period you will get the opportunity to configure the maximum online time at a specified time. Enable Only allow Internet use at the specified times and then select the desired online times within the chart. The time frame for allowed online connection can be set varying from 30 minutes to 24 hours each day. Avira Internet Security FireWall (Status ) 28
29 Update 5. Changing the update intervals The update of the virus definitions are predefined in the scheduler with an interval of two hours. You can change this setting in case a different time or a more frequent update should be necessary. Start the Avira Control Center Click on Extras > Configuration and enable the Expert mode Follow the path PC protection > Update in the left menu item of the user interface. The scheduled time of the automatic update will be displayed in the main window. Preconfigured is a frequent update every two hours with an additional activated job that starts an update every time a connection with the Internet has been established. Avira Internet Security FireWall (Status ) 29
30 Update 5.1 Changing an update job In the Automatic update box you can specifiy the interval that defines when the updates should be performed. To change the interval, highlight one of the time options in the box and change the input with the arrow keys on the right side. With the enabled option Start job while connecting to the Internet (dial-up) an update will be performed every time an Internet connection has been established in addition to the specified update interval. The option Repeat job if time has expired gives the oportunity to perform past update jobs that could not be performed at the specified time. 5.2 Product update Whithin the menu Product update you ll find four different configuration options to run an update. Download and install product updates automatically (recommended) Updates will be downloaded and automatically installed as soon they become available. Avira Internet Security FireWall (Status ) 30
31 Update Download product updates. If a restart is necessary, install the update after the system restart, otherwise install it immediately As soon as product updates are available, they will be downloaded and auto matically installed if no restart ist necessary. Otherwise, the product installation will be executed at the next user-controlled system reboot. Notify user when new product updates are available This option sends a notification when new updates become available. Do not download product updates No automatic update or notification of available product updates are perfor - med. Note Updates to the virus definition file and search engine are performed independently of the settings within the option Product updates. Avira Internet Security FireWall (Status ) 31
32 Update 5.3 Restart settings If you have selected automatic product updates under Local protection > Update > Product update, you can choose between the different restart notification and restart cancellation options. Restart the computer after n Seconds The necessary restart after a product update is performed automatically at the specified interval. A countdown message appears with no option for canceling the computer restart. Periodic restart reminder The restart which is necessary after a product update is not performed auto matically. At the specified interval, you will receive the restart notifications wit hout cancellation options. These notifications let you confirm the computer restart or select the Remind me again option. Query whether computer should be restarted You will receive only one message that offers the option to perform a restart directly or cancel the restart routine. Restart computer without query The restart which is necessary is performed automatically. You will not receive any notification. Avira Internet Security FireWall (Status ) 32
33 Further information You will find further information: In the online help of the program In the manual In our knowledge base Avira Internet Security FireWall (Status ) 33
34 This manual was created with great care. However, errors in design and contents cannot be excluded. The reproduction of this publication or parts thereof in any form is prohibited without previous written consent from Avira Operations GmbH & Co. KG. Issued Q Brand and product names are trademarks or registered trademarks of their respective owners. Protected trademarks are not marked as such in this manual. However, this does not mean that they may be used freely Avira Operations GmbH & Co. KG. All rights reserved. Errors and technical modifications are subject to change. Avira Operations GmbH & Co. KG Kaplaneiweg Tettnang Germany Telephone: Facsimile
HowTo. Firewall Avira Premium Security Suite
HowTo Firewall Avira Premium Security Suite Avira Support July 2009 Contents 1. BASIC KNOWLEDGE ABOUT THE FIREWALL...3 2. EXPLANATION OF THE TERMS...3 3. CONFIGURATION POSSIBILITIES...5 3.1 SECURITY LEVEL...5
Avira Professional Security Migration to Avira Professional Security version 2013. HowTo
Avira Professional Security Migration to Avira Professional Security version 2013 HowTo Table of contents 1. Introduction...3 2. Manual Upgrade of Avira Professional Security...3 3. Migration via the Avira
Avira Exchange Security Upgrade from version 9.x to version11.x. HowTo
Avira Exchange Security Upgrade from version 9.x to version11.x HowTo Table of Contents 1. Introduction... 3 2. Scheduling... 3 2.1 What should be considered before the upgrade?...3 2.2 Keep the existing
Avira Management Console AMC server configuration for managing online remote computers. HowTo
Avira Management Console AMC server configuration for managing online remote computers HowTo Table of Contents 1. General... 3 2. Network layout plan... 3 3. Configuration... 4 3.1 Port forwarding...4
Avira Exchange Security Version 12. HowTo
Avira Exchange Security Version 12 HowTo Table of contents 1. General information... 3 2. System requirements... 3 3. Installation of Avira Exchange Security...4 4. Licensing... 5 5. Configuration of Email
Avira Exchange Security Small Business Edition. Quick Guide
Avira Exchange Security Small Business Edition Quick Guide Table of contents Table of contents 1 Introduction...3 2 System requirements...4 3 The Avira Exchange Console...5 3.1 Virus Scanner status...6
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
Frequently Asked Questions: Xplornet Internet Security Suite
Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my
Avira Support Collector. HowTo
Avira Support Collector HowTo Table of contents 1. Introduction... 3 2. Execution of the Avira Support Collector... 3 2.1 Choosing the mode...4 3. Collecting information... 5 4. Analysis of the information...6
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Avira Secure Backup INSTALLATION GUIDE. HowTo
Avira Secure Backup INSTALLATION GUIDE HowTo Table of contents 1. Introduction... 3 2. System Requirements... 3 2.1 Windows...3 2.2 Mac...4 2.3 ios (iphone, ipad and ipod touch)...4 3. Avira Secure Backup
Avira Server Security. HowTo
Avira Server Security HowTo Table of Contents 1. Setup Modes... 3 1.1. Complete...3 1.2 Custom...3 2. Configuration... 8 2.1 Update configuration for the Avira Update Manager...8 2.2 Configuration of product
How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)
Avira Small Business Security Suite HowTo Table of Contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode...3 2.2 Scope of services...3 2.3 Optimum protection. Fast updates. Efficient
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Avira Small Business Security Suite Avira Endpoint Security. Quick Guide
Avira Small Business Security Suite Avira Endpoint Security Quick Guide Table of Contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode...3 2.2 Scope of services...3 2.3 Optimum protection.
Desktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
Avira Server Security Product Updates. Best Practice
Avira Server Security Product Updates Best Practice Table of Contents 1. What is Avira Server Security?... 3 2. Where else can Avira Server Security be found?.. 4 3. What is the difference between updates
Avira Management Console 2.6.1 Optimization for large networks. HowTo
Avira Management Console 2.6.1 Optimization for large networks HowTo Table Of Contents 1. Introduction... 3 2. Activation of the Pull Mode for the AMC Agents.3 3. Define the events sent by the AMC Agent...
Avira Small Business Security Suite. HowTo
Avira Small Business Security Suite HowTo Table of contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode... 3 2.2 Scope of services... 3 2.3 Optimum protection. Fast updates. Efficient
Avira Endpoint and Email Security. HowTo
Avira Endpoint and Email Security HowTo Table of contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode... 3 2.2 Scope of services... 3 2.3 Optimum protection. Fast updates. Efficient
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
Changing Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
Avira System Speedup. HowTo
Avira System Speedup HowTo Table of Contents 1. Introduction... 4 1.1 What is Avira System Speedup?...4 2. Installation... 5 2.1 System Requirements...5 2.2 Installation...5 3. Using the program... 8 3.1
Safe internet: Getting Started Guide
Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration
CentreWare Internet Services Setup and User Guide. Version 2.0
CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and
Cox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Installing the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
Comodo Cloud Drive Software Version 1.0
2 Comodo Cloud Drive Software Version 1.0 User Guide Guide Version 1.0.101414 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Cloud Drive...
10.3.1.8 Lab - Configure a Windows 7 Firewall
5.0 10.3.1.8 Lab - Configure a Windows 7 Firewall Print and complete this lab. In this lab, you will explore the Windows 7 Firewall and configure some advanced settings. Recommended Equipment Step 1 Two
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
Operating Instructions Driver Installation Guide
Operating Instructions Driver Installation Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine. TABLE OF CONTENTS 1. Introduction Before
Software Installation Requirements
Software Installation Guide PrintIQ TM Software Installation Requirements Please use the following guide to ensure that you're meeting all requirements prior to installing the PrintIQ TM Xerox Device Agent
How to Configure Windows Firewall on a Single Computer
Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and
Signup instructions for the End User
Wellnomics Risk Management Server Hosted by Wellnomics Ltd Signup instructions for the End User Wellnomics Risk Management is a series of assessments, designed to help you to manage your exposure to computer-based
Aventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
Configuring Security for FTP Traffic
2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
Installation Instructions
Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs
MGC WebCommander Web Server Manager
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information
Features Overview Guide About new features in WhatsUp Gold v14
Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...
How To Use Ezcrt Computer Rental For A Rental
Page 1 www.vsoftwaretools.com IMPORTANT SOME instructions in this document are used ONLY at the RENTAL COMPUTER! DO NOT INSTALL ezcrt CLIENT software on Staff / Front Counter Computers! Version 2.0, Copyright
WhatsUp Event Alarm v10.x Listener Console User Guide
WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm
Telephony Toolbar Corporate. User Guide
Telephony Toolbar Corporate User Guide Release 7.1 March 2011 Table of Contents 1 About This Guide...7 1.1 Open Telephony Toolbar - Corporate... 7 1.2 First Time Login... 8 1.3 Subsequent Use... 11 2 Using
KPN SMS mail. Send SMS as fast as e-mail!
KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.
If you have questions or find errors in the guide, please, contact us under the following e-mail address:
1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
NETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
PREFACE http://www.okiprintingsolutions.com 07108001 iss.01 -
Network Guide PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the results of errors
SonicOS 5.9 One Touch Configuration Guide
SonicOS 5.9 One Touch Configuration Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
10.3.1.9 Lab - Configure a Windows Vista Firewall
5.0 10.3.1.9 Lab - Configure a Windows Vista Firewall Print and complete this lab. In this lab, you will explore the Windows Vista Firewall and configure some advanced settings. Recommended Equipment Step
Avira and Windows 8/Windows Server 2012
Avira and Windows 8/Windows Server 2012 Table of Contents 1. What does Windows 8 compatibility mean?... 3 2. Why is Avira software not Windows 8/Windows Server 2012 certified?... 3 3. Am I now protected
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Canon WFT-E1 (A) Wireless File Transmitter. Network Support Guide
1 Canon WFT-E1 (A) Wireless File Transmitter Network Support Guide Windows XP - Infrastructure Wireless Mode Connection 2 Setting up the WFT-E1A on Windows XP Home or Professional Infrastructure Wireless
Accessing Windows 7 in the Student Labs
Accessing Windows 7 in the Student Labs This document explains how to access and use Windows 7 and some of the software installed on Windows 7, such as Microsoft Office 2010, on the student lab computers.
Your Assistant Collaboration Module
MITEL Your Assistant Collaboration Module User Guide Notice This guide is released by Mitel Networks Corporation and provides information necessary to use the Mitel Your Assistant Collaboration Module.
Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
LANCOM Advanced VoIP Client 1.20 EN. Notes on Installation
LANCOM Advanced VoIP Client 1.20 EN Notes on Installation Copyright (c) 2002-2007 LANCOM Systems GmbH, Wuerselen (Germany) LANCOM Systems GmbH does not take any guarantee and liability for software not
hp embedded web server for hp LaserJet printers
hp embedded web server for hp LaserJet printers user guide Trademark Credits Microsoft is a U.S. registered trademark of Microsoft Corporation. Netscape is a U.S. trademark of Netscape Communications Corporation.
Vodafone Text Centre User Guide for Microsoft Outlook
Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message
Install MS SQL Server 2012 Express Edition
Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
Lab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
Avira Rescue System. HowTo
Avira Rescue System HowTo Table of contents 1. Introduction... 3 2. System Requirements... 4 3. Product availability... 4 4. Product features... 5 5. Using the Rescue System... 6 5.1 The BIOS setup...6
Network Scanner Tool R3.1. User s Guide Version 3.0.04
Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
Corporate Telephony Toolbar User Guide
Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...
SmartSync Monitor Help
1.0 (Build 15) 2 Table of Contents Foreword 0 Part I Welcome to SmartSync Monitor 3 Part II Getting Started 4 1 Copyright... 4 2 System... requirements and installation 4 3 Uninstalling... 5 6 Part III
QIAsymphony Management Console User Manual
April 2012 QIAsymphony Management Console User Manual For use with software version 4.0 Sample & Assay Technologies Trademarks QIAGEN, QIAsymphony, Rotor-Gene (QIAGEN Group). InstallShield (Informer Technologies,
PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0
T E C H N I C A L N O T E Autonomy Connected Backup Version 8.8 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on
ORACLE BUSINESS INTELLIGENCE WORKSHOP. Prerequisites for Oracle BI Workshop
ORACLE BUSINESS INTELLIGENCE WORKSHOP Prerequisites for Oracle BI Workshop Introduction...2 Hardware Requirements...2 Minimum Hardware configuration:...2 Software Requirements...2 Virtual Machine: Runtime...2
Connection and Printer Setup Guide
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
Allworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
Plesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
Windows XP Service Pack 2 Issues
Windows XP Service Pack 2 Issues NOTICE THIS DOCUMENT SHALL NOT BE REPRODUCED IN WHOLE OR IN PART, FOR ANY PURPOSE OR IN ANY FASHION AND DISTRIBUTED WITHOUT THE PRIOR WRITTEN CONSENT OF RICOH CORPORATION.
CPEi 800/825 Series. User Manual. * Please see the Introduction Section
CPEi 800/825 Series User Manual * Please see the Introduction Section Contents Introduction...iii Chapter 1: CPEi 800/825 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the
Project management - integrated into Outlook
Project management - integrated into Outlook InLoox 5.x configuration guide for Microsoft SQL Server An IQ medialab / OptCon Whitepaper Published: February 2008 Author / copyright: 2008 Heinz-Peter Bross,
