User Guide for the Identity Shield
|
|
|
- Darrell Patrick
- 10 years ago
- Views:
Transcription
1 User Guide for the Identity Shield
2 Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is a trademark of Webroot Software, Inc. All other product and company names mentioned may be trademarks or registered trademarks of their respective owners.
3 Table of Contents Getting Started 1 Installing the Identity Shield 2 Using the Identity Shield 5 Opening the main interface 6 Responding to alerts 8 Setting program configuration options 9 Managing Identity Protection 13 Changing shield settings 14 Managing protected applications 17 Managing protected websites 20 Disabling the shield 25 Managing Your Account 27 Viewing your account details 28 Upgrading to a threat-removal version 29 Accessing Support and Resources 33 Accessing Technical Support options 34 Accessing additional publications 35 Shutting down or uninstalling the Identity Shield 36 Glossary 37 Index 41
4
5 Getting Started The Webroot Identity Shield provides safe Internet browsing and data protection. As you perform online transactions, it watches for Trojans or phishing sites that try to steal personal data -- including user names, passwords, security codes, account numbers, and credit card numbers. The Identity Shield blocks any attempts to gain personal information, so you can rest assured that the details you provide on a website are always secure. Two versions of the Identity Shield are available: Identity protection only. Blocks threats that try to steal information during your online activity. Identity protection, plus threat detection. In addition to protecting your online activity, this version scans for threats on your computer. If you want to remove the threat, you must upgrade to a full version of Webroot SecureAnywhere. See "Upgrading to a threat-removal version" on page 29. To get started with the Identity Shield, see the following topics: Installing the Identity Shield 2 Using the Identity Shield 5 Opening the main interface 6 Responding to alerts 8 Setting program configuration options 9-1 -
6 Webroot Identity Shield User Guide Installing the Identity Shield You can install the Identity Shield on a PC with one of the following operating systems and browsers: Operating systems: Windows 8 32-bit and 64-bit Windows 7 32-bit and 64-bit (all Editions), Windows 7 SP1 32-bit and 64-bit (all Editions) Windows XP 32-bit and 64-bit SP2, SP3 Windows Vista 32-bit (all Editions), Windows Vista SP1, SP2 32-bit and 64-bit (all Editions) Browsers: Microsoft Internet Explorer 7.0 and higher Mozilla Firefox 3.6 and higher (32-bit only) Google Chrome 10.0 or higher Opera 9 and higher (32-bit only) To install the software: 1. Your banking institution will provide a login link to the Webroot Identity Shield. Click on the Webroot download link, available when you log into your banking account. 2. When the installation dialog opens, click Run. The following dialog opens
7 Getting Started 3. In the middle field, enter the keycode provided by your banking institution. (If you don't see a field in the middle of the dialog, your version does not require a keycode.) 4. If desired, you can click "Change installation options" at the bottom of the dialog to modify the following settings: Create a shortcut to SecureAnywhere on the desktop. This option places a shortcut icon on your Windows Desktop for the Identity Shield. Randomize the installed filename to bypass certain infections. This option changes the Webroot installation filename to a random name (for example, QrXC251G.exe ), which prevents malware from detecting and blocking Webroot s installation file. Protect the SecureAnywhere files, processes, and memory from modification. This option enables self protection and the CAPTCHA prompts. (CAPTCHA requires you to read distorted text on the screen and enter the text in a field before performing any critical actions.) Change Language. To change the language displayed in the Identity Shied, click the Change Language button and select from the supported languages. (You can only change the displayed language during installation, not after.) 5. Click Agree and Install. The Identity Shield installs in a few seconds
8 Webroot Identity Shield User Guide 6. To verify that the Identity Shield is running, look for the Webroot icon in your system tray. The Identity Shield runs in the background to automatically protect your online activities. You do not need to manually start Identity Shield protection, nor do you need to shut it down
9 Getting Started Using the Identity Shield After you install the Identity Shield, it works silently in the background to protect your browsing activity. The Identity Shield will not slow down your computer or interrupt normal operations. If the Identity Shield detects suspicious activity, it performs one of the following actions: Blocks malicious programs on websites, which try to steal your login credentials and other personal data. Opens an alert if you try to access a phishing website or if malware tries to re-direct you to a malicious website. See "Responding to alerts" on page 8. Prevents malware from reading or copying your information on a website. Webroot has configured the Identity Shield for you. You do not need to change its settings or perform any tasks yourself. However, if you are an advanced user, you can open the main interface and adjust protection levels (see "Opening the main interface" on page 6). Note: The Identity Shield cannot remove malware already installed on your computer. To fully protect your computer, you should upgrade to one of the following Webroot SecureAnywhere versions: AntiVirus, Internet Security Plus, or Complete. See "Upgrading to a threat-removal version" on page
10 Webroot Identity Shield User Guide Opening the main interface The main interface for the Identity Shield provides access to all functions and settings. To open the main interface, double-click on the Webroot icon from the system tray menu. You can also right-click on the icon, and then click View Status. The main interface opens, similar to the example below. Along the top of the panel, the main interface includes navigation tabs
11 Getting Started Navigation tab Overview PC Security Identity & Privacy System Tools My Account Description View your system status. Run support tools. If you have the threat-detection version, additional options are available to scan for threats. For instructions on scanning, see "Scanning for Malware" in the Webroot SecureAnywhere User Guide for PCs. To remove threats, you must upgrade to a full version of Webroot SecureAnywhere. See "Upgrading to a threat-removal version" on page 29. Adjust the Identity Protection settings. See "Managing Identity Protection" on page 13. Use tools to manage processes and files, view reports, and submit a file to Webroot Support. For more information about system tools, see the Webroot SecureAnywhere User Guide for PCs. View your account information and upgrade your subscription to include threat removal
12 Webroot Identity Shield User Guide Responding to alerts The Identity Shield blocks known phishing sites. If it detects a suspicious site, it opens an alert similar to the following example. If this alert opens, you must decide whether to continue or not. If you aren't sure what to do, we recommend that you click Close. Only click Allow if you are absolutely sure the website is legitimate, and not a phishing site
13 Getting Started Setting program configuration options Webroot has preconfigured the Identity Shield with our recommended settings. If desired, you can modify these settings to change the behavior of the program. Note: This section describes basic configuration. For information about other program settings, see the Webroot SecureAnywhere User Guide for PCs. To change basic configuration: 1. Open the main interface (see "Opening the main interface" on page 6). 2. In the upper right corner, click Settings
14 Webroot Identity Shield User Guide 3. In the Settings panel, click Advanced Settings
15 Getting Started 4. Make sure Basic Configuration is selected at the left. 5. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When you re done, click Save All. Note: We recommend that you keep Webroot s default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button. The following table describes the options. Basic Configuration setting Show a SecureAnywhere shortcut on the desktop Show a system tray icon Description Provides quick, double-click access to the main interface by placing the shortcut icon on your desktop. Provides quick access to Identity Shield functions by placing the Webroot icon on your desktop. You can double-click the icon to open the main interface or right-click to open a menu of common functions, like scanning
16 Webroot Identity Shield User Guide Basic Configuration setting Show a splash screen on bootup Show SecureAnywhere in the Start Menu Show SecureAnywhere in Add/Remove Programs Show SecureAnywhere in Windows Security Center Hide the SecureAnywhere license keycode on-screen Automatically download and apply updates Operate background functions using fewer CPU resources Favor low disk usage over verbose logging (fewer details stored in logs) Lower resource usage when intensive applications or games are detected Allow SecureAnywhere to be shut down manually Force non-critical notifications into the background Fade out warning messages automatically Store Execution History details Description Opens the Webroot splash screen on system startup, which lets you know that the program is running and protecting your computer. Lists Webroot SecureAnywhere in the Windows Startup menu items. Lists Webroot SecureAnywhere in the Windows Add/Remove Programs panel. Lists Webroot SecureAnywhere in the Windows Security Center, under Virus Protection information. Blocks your license keycode from displaying on the My Account panel. Downloads product updates automatically without alerting you. Saves CPU resources by running non-scan related functions in the background. Saves disk resources by saving only the last four log items. Suppresses Webroot functions while you are gaming, watching videos, or using other intensive applications. Displays a Shutdown command in the system tray menu. If you deselect this option, the Shutdown command is removed from the menu. Suppresses information-only messages from appearing in the system tray. Closes warning dialogs in the system tray after a few seconds. If you disable this option, you must manually click on a message to close it. Stores data for the Execution History logs, available under Reports
17 Managing Identity Protection To configure advanced Identity shield protection, see the following topics: Changing shield settings 14 Managing protected applications 17 Managing protected websites 20 Disabling the shield
18 Webroot Identity Shield User Guide Changing shield settings You can change the behavior of the Identity Shield and control what it blocks, as described in this section. To change Identity Shield settings: 1. Open the main interface (see "Opening the main interface" on page 6). 2. Click the Identity & Privacy tab. 3. Click the Change Settings link on the upper right. The Identity Shield settings panel opens
19 Managing Identity Protection 4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When you re done, click the Save All button. Note: We recommend that you keep Webroot s default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button. The following table describes the shield options. Identity Shield settings Look for identity threats online Description Analyzes websites as you browse the Internet or open links. If the shield detects any malicious content, it blocks the site and opens an alert
20 Webroot Identity Shield User Guide Identity Shield settings Analyze websites for phishing threats Verify websites when visited to determine legitimacy Verify the DNS/IP resolution of websites to detect Man-inthe-Middle attacks Block websites from creating high risk tracking information Prevent programs from accessing protected credentials Warn before blocking untrusted programs from accessing protected data Allow trusted screen capture programs access to protected screen contents Description Analyzes websites for phishing threats as you browse the Internet or open links. If the shield detects a phishing threat, it blocks the site and opens an alert. Phishing is a fraudulent method used by criminals to steal personal information. Typical scams might include websites designed to resemble legitimate sites, such as PayPal or a banking organization, which trick you into entering your credit card number. Analyzes the IP address of each website to determine if it has been redirected or is on our blacklist. If the shield detects an illegitimate website, it blocks the site and opens an alert. Looks for servers that could be redirecting you to a malicious website (man-in-the-middle attack). If the shield detects a man-in-the-middle attack, it blocks the threat and opens an alert. Blocks third-party cookies from installing on your computer if the cookies originate from malicious tracking websites. Cookies are small bits of text generated by a web server and then stored on your computer for future use. Cookies can contain everything from tracking information to your personal preferences. Blocks programs from accessing your login credentials (for example, when you type your name and password or when you request a website to remember them). Opens an alert any time malware attempts to access data, instead of blocking known malware automatically. (This option is for technical users only; we recommend that you keep this option disabled so the program does not open numerous alerts.) Allows you to use legitimate screen capture programs, no matter what content is displayed on your screen
21 Managing Identity Protection Managing protected applications You can provide additional security for software applications that may contain confidential information, such as Instant Messaging clients or tax preparation software. By protecting these applications, you secure them against information-stealing Trojans like keyloggers, man-in-the-middle attacks, and clipboard stealers. As you work on your computer, the Identity Shield automatically adds web browsers and applications to the Protected Applications list. It assigns applications to one of these levels of protection: Protect. Protected applications are secured against information-stealing malware, but also have full access to data on the system. By default, web browsers are assigned to the protected status. If desired, you might also want to add other software applications to protected, such as financial management software. When you run a protected application, the Webroot icon in the system tray displays a padlock: Allow. Allowed applications are not secured against information-stealing malware, and also have full access to protected data on the system. Many applications unintentionally access protected screen contents or keyboard data without malicious intent when running in the background. If you trust an application that is currently marked as Deny, you can change it to Allow. Deny. Denied applications cannot view or capture protected data on the system, but can otherwise run normally. To manage the application list and specify levels of protection: 1. Open the main interface (see "Opening the main interface" on page 6). 2. Click the Identity & Privacy tab. 3. Click View/Edit Protected Applications
22 Webroot Identity Shield User Guide The Protected Applications panel opens.this panel shows the web browsers on your system and any other applications that you run on the computer
23 Managing Identity Protection 4. In the row for the application you want to modify, click the radio button for Protect, Allow, or Deny. (To include another application in this list, click Add Application, then select an executable file.) 5. When you re done, click Close
24 Webroot Identity Shield User Guide Managing protected websites The Identity Shield already includes the recommended security settings for specific types of websites. If desired, you can adjust security for a website to one of the following levels: None. Provides unfiltered access to all potentially malicious content. (Not recommended.) Low. Protects stored data and identifies malware in real time. You may want to use this setting if you have an application that does not work properly when the security level is set to Medium or higher. Medium. Protects your stored data while also providing software compatibility. You may want to use this setting if you have an application that does not work properly when the security level is set to High or Maximum. High. Provides strong protection against threats, while still enabling screen accessibility for impaired users (for example, allows text-to-speech programs to run normally). Maximum. Provides maximum protection against threats, but blocks screen accessibility for impaired users. When you load a secured website, the Webroot icon in the system tray displays a padlock: Note: The Identity Shield only protects a secured website when the browser window is active in the foreground window (the padlock is shown in the tray icon). For full protection from screen grabbers, information-stealing Trojans, and other threats, make sure the browser window is in the foreground and the padlock is displayed in the tray icon. If the Identity Shield encounters a website that may be a threat, it opens an alert. You can decide whether you want to stay secure (click Block) or continue despite the warning (click Allow). To manage settings for protected websites: 1. Open the main interface (see "Opening the main interface" on page 6). 2. Click the Identity & Privacy tab. 3. Click View/Edit Protected Websites
25 Managing Identity Protection The Protected Websites panel opens
26 Webroot Identity Shield User Guide 4. In the Protected Websites table, click in the row for the type of website you want to adjust. To include an individual site, enter the address in the field at the top of the dialog, then click Add Website. 5. Adjust the slider for minimum to maximum protection configuration. As an alternative, you can also select the individual protection options by clicking on the green checkmark or red X. (A green checkmark indicates the option is on; a red X indicates the option is off.) When you re done, click Save. The following table describes the protection options. Website protection options Block phishing and known malicious websites Description Alerts you to phishing sites and other malicious sites listed in our Webroot database. Phishing is a fraudulent method used by criminals to steal personal information. Typical scams might include websites designed to resemble legitimate sites, such as PayPal or a banking organization, which trick you into entering your credit card number
27 Managing Identity Protection Website protection options Protect cookies and saved website data Detect and prevent man-in-the middle attacks Protect against keyloggers Protect sensitive clipboard data Protect against URL grabbing attacks Protect browser components from external access Protect against Man-in-the- Browser attacks Isolate untrusted browser addons from data Block browser process modification attempts Description Alerts you if a malicious program attempts to gather personal data from cookies installed on your computer. Cookies are small bits of text generated by a web server and then stored on your computer for future use. Cookies can contain everything from tracking information to your personal preferences. Alerts you if a server is redirecting you to a malicious website (manin-the-middle attack). This is a method of intercepting communications between two systems and stealing data. Stops keyloggers from recording keystrokes on your computer. Keyloggers may monitor s, chat room dialogue, instant message dialogue, websites visited, usernames, passwords, programs run, and any other typed entries. They have the ability to run in the background, hiding their presence. Stops malware programs from capturing clipboard data. The clipboard is a utility that allows you to cut and paste stored data between documents or applications. Hides your web browsing activity from malware that attempts to log the websites you visit. Hides your web browsing activity from malware that attempts to modify your browser with memory injection and other behind-thescenes attacks. Blocks a malicious toolbar from stealing data. A man-in-the-browser attack is a Trojan that infects a web browser. It can modify pages and the content of your transactions without being detected. Blocks a browser add-on (browser helper object) from stealing data. While most browser add-ons are legitimate, some can display ads, track your Internet activity, or hijack your home page. Analyzes browser memory to see if code injection is taking place
28 Webroot Identity Shield User Guide Website protection options Protect against screen grabbing attacks Block suspicious access to browser windows Description Blocks a malicious program from viewing and capturing your screen content. Blocks a malicious program from viewing and capturing data in Windows components
29 Managing Identity Protection Disabling the shield We recommend that you keep the Identity Shield enabled; however, you can disable it if you want. To disable the Identity Shield: 1. Open the main interface (see "Opening the main interface" on page 6). 2. Click the Identity & Privacy tab. The Identity Shield panel opens. The green button indicates the shield is on. 3. Click the green button to turn it off. The button turns gray when the shield is off
30 Webroot Identity Shield User Guide
31 Managing Your Account To learn more about your account, see the following topics: Viewing your account details 28 Upgrading to a threat-removal version
32 Webroot Identity Shield User Guide Viewing your account details You can view your keycode and the time remaining on your subscription from the My Account window. To view account details: 1. Open the main interface (see "Opening the main interface" on page 6). 2. Click the My Account tab. Your account information appears in the panel. From here, you can activate a new keycode, upgrade or renew your license, or check for software updates
33 Managing Your Account Upgrading to a threat-removal version If you want to block and remove malware from your computer, you can upgrade to one of the following SecureAnywhere editions: AntiVirus. Provides protection from viruses and spyware, and also includes the Identity Shield and firewall protection. Internet Security Plus. Provides all the features of the AntiVirus edition, plus password management and protection for mobile devices. Complete. Provides all the features of the Internet Security Plus edition, as well as backup management and a system cleaner that removes temporary files and your browsing history. To upgrade your version: 1. Open the main interface (see "Opening the main interface" on page 6). 2. Click on the Upgrade Now link
34 Webroot Identity Shield User Guide If you don't see this link on the Overview panel, click the My Account tab and then the Upgrade or renew link
35 Managing Your Account 3. When the Webroot website opens, you can purchase an upgrade to your software
36 Webroot Identity Shield User Guide
37 Accessing Support and Resources To learn more about Webroot's Support options and other resources, see the following topics: Accessing Technical Support options 34 Accessing additional publications 35 Shutting down or uninstalling the Identity Shield
38 Webroot Identity Shield User Guide Accessing Technical Support options Webroot offers a variety of Technical Support options, including: Ticket and phone support. Interactive knowledgebase. To access these support options, go to our online Support site: SecureAnywhere Product Support
39 Accessing Support and Resources Accessing additional publications To access additional user guides and other resources, go to our Help and Product Guides page
40 Webroot Identity Shield User Guide Shutting down or uninstalling the Identity Shield If desired, you can temporarily shut down Identity Shield protection or uninstall the program entirely, as described below. Note: We recommend that you keep the Identity Shield running in the background at all times. Normally, you do not need to shut it down. To shut down the Identity Shield: 1. Right-click on the Webroot icon from the system tray menu. 2. Click Shut down Protection, then click Yes at the prompt. 3. If a CAPTCHA dialog opens, enter the displayed characters and click Enter. The Identity Shield stops its protection activities and the Webroot icon is removed from the system tray. 4. To turn on protection again, go to the Windows Start menu and select All Programs, Webroot SecureAnywhere, and Webroot SecureAnywhere again. To uninstall the Identity Shield: 1. Go to the Windows Start menu and select All Programs, Webroot SecureAnywhere, and Tools. 2. Click Uninstall Webroot. 3. At the prompt, click Yes to continue
41 Glossary A adware Software designed to display advertisements on your system or hijack web searches (rerouting searches through its own web page). It may also change your default home page to a specific website. Adware generally propagates itself using dialog boxes and social engineering methods. C CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). These prompts require you to read distorted text on the screen and enter the text in a field before performing any critical actions. cookies Small strings of text designed to help websites remeber your browser and preferences. Cookies cannot steal information off your machine, but some do store personal information that you may not want outside parties to gather. You can manage cookie settings in your browser's security or privacy preferences. H hosts file A file that helps direct your computer to a website using Internet Protocol (IP) addresses. When you enter a web address in a browser, your computer first looks in the hosts file to see if the domain is already listed. If so, it goes directly to the IP address. Some types of malware can hijack the entries in the hosts file
42 Webroot Identity Shield User Guide K keycode Your keycode is the 20-character license that identifies your Webroot account. After installation, the My Account panel lists your keycode. keylogger A system monitor that records keyboard activity. Keyloggers can be used for legitimate purposes, but can also record sensitive information for malicious purposes. M malware Malicious software that is designed to destroy or harm your computer system. Malware includes viruses, spyware, adware, and all types of threats. P phishing A fraudulent method criminals use to steal personal information. These criminals design websites or messages that appear to originate from trustworthy sources, such as ebay, PayPal, or even your own bank. Typical scams can trick you into entering your user names, passwords, and credit card information. R registry A database of hardware and software settings about your computer s configuration, such as the types of programs that are installed. Spyware can create entries in the Windows registry, which can ultimately slow down your computer and cause problems in your system
43 Glossary rootkit A collection of tools that enable administrator-level access to a computer or network. By using fileobfuscation techniques, rootkits can hide logins, processes, files and logs, and may include software to capture information from desktops or a network. Spyware developers often use rootkits to avoid detection and removal. S scan Webroot's process of searching for potential threats on your computer, such as spyware and viruses. It then moves items to quarantine, where they are rendered inoperable. spyware A program that may either monitor your online activities or install programs without your knowledge. Spyware may get bundled with freeware, shareware, or attachments. You can also accidentally install spyware by clicking on dialog boxes in websites. Once installed, spyware can send information about your online activities to a third party for malicious purposes. T Trojan Horse A program that takes control of your computer files, allowing a hacker to install, execute, open, or close programs. A Trojan is usually disguised as a harmless software program. It may also be distributed as an attachment. When you open the program or attachment, the Trojan can launch an auto-installation process that downloads third-party programs onto your computer. V virus A self-replicating program that can infest computer code, documents, or applications. While some viruses are purposefully malignant, others are more of a nuisance, replicating uncontrollably and inhibiting system performance
44 Webroot Identity Shield User Guide
45 Index Explorer support 2 F Firefox support 2 A account changing keycode 28 viewing details 28 Add/Remove programs, removing SecureAnywhere from 12 alerts disabling fade-out 12 forcing in the background 12 reducing number of 16 responding to 8 applications, managing protection for 17 B basic configuration settings 9 browser add-ons, blocking 23 browsers supported 2 browsing activity, hiding 23 C Chrome support 2 clipboard data, protecting 23 configuration settings 9 cookies blocking 23 blocking third-party 16 CPU resources, preserving 12 D disk usage, lowering 12 E I Identity & Privacy tab 7 installation 2 K keycode changing 28 entering at installation 3 hiding on screen 12 keyloggers, protection from 23 knowledgebase 34 L language, changing 3 license, renewing 28 lock icon in system tray with applications 17 with browsers 20 login credentials, protecting 16 M main interface 6 man-in-the-browser attacks, protection from 23 man-in-the-middle attacks in website protection 23 protection in general settings 16 My Account tab 7 O opening the main interface 6 Opera support 2 Execution History details, storing
46 Webroot Identity Shield User Guide operating systems supported 2 Overview panel 6 P padlock icon in system tray with applications 17 with browsers 20 PC Security 7 phishing protection in general settings 16 protection in website settings 22 publications, Webroot 35 R renewing subscription 28 reports 7 resource usage 12 T Technical Support 34 turning off 36 U uninstalling SecureAnywhere 36 updates, automatically downloading 12 URL grabbing attacks, protection from 23 W warnings, responding to 8 web browsers supported 2 Webroot publications 35 Webroot Support 34 Windows systems supported 2 S scanning for threats 7 screen capture programs, allowing 16 screen grabbers, protecting from 24 Security Center, listing Webroot in 12 settings changing for basic configuration 9 changing for Identity Shield 14 shortcut, desktop 3, 11 shutdown command, removing from tray menu 12 shutting down 36 splash screen, disabling on bootup 12 Start Menu, removing SecureAnywhere from 12 subscription, extending 28 support options 34 system requirements 2 System Tools 7 system tray icon, showing
User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0.
User Guide for the Essentials Edition Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere User Guide for the Essentials Edition
User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection
User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot
How To Use Secureanything On A Mac Or Ipad (For A Mac)
User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete
Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.
Using Spy Sweeper for Windows Author: Jocelyn Kasamoto
WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription
Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.
Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.
Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware
MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files
Endpoint Protection Administrator Guide
Endpoint Protection Administrator Guide Copyright Endpoint Protection Administrator Guide June, 2013 2012-2013 Webroot, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is
System Administrator Guide
System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,
How to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
Bitdefender Internet Security 2015 User's Guide
USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
Trusteer Rapport. User Guide. Version 3.5.1307 April 2014
Trusteer Rapport User Guide Version 3.5.1307 April 2014 Contents About this Guide 1 Need More Information about Trusteer Rapport? 1 Sending us Feedback 1 1. What is Trusteer Rapport? 3 Antivirus: A False
Microsoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
CITRIX TROUBLESHOOTING TIPS
CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:
Ad-Aware Antivirus Overview
Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day
8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Frequently Asked Questions: Xplornet Internet Security Suite
Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my
ViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
Cox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
Getting Started with Vision 6
Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
Intelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3
Intelligent Office: Web Optimisation Guide Published Date: 06/11/2015 Version: 3.3 Table of Contents System Requirements:... 3 Introduction... 3 Difficulties Logging on to Intelligent Office (io)... 3
Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later
Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
Contents. VPN Instructions. VPN Instructions... 1
VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.
USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6
Sophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
Bitdefender Total Security 2015 User's Guide
USER'S GUIDE Bitdefender Total Security 2015 User's Guide Publication date 11/17/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
FAQ. Safe Anywhere PC. Disclaimer:
FAQ Safe Anywhere PC Version: 1.0 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch
How To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
Network Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
Sophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
F-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review
Sophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
STEP 1: INSTALLING WINDOWS DEFENDER
Office of Information Technology Secure your Windows XP Computer for Use on AU s Network Every member of the AU community has a shared responsibility for the safekeeping of our computer network. Since
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:
Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access
Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting
Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0
Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5
Using MioNet. 2006 Senvid Inc. User Manual Version 1.07
Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication
How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition
Quickstart Guide First Edition, Published September 2009 Remote Administrator / NOD32 Antivirus 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
Xythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
Basic Administration Guide
*Formerly Panda Managed Office Protection Copyright notice Trademarks Panda Security 2010. All rights reserved. Neither the documents nor the programs that you may access may be copied, reproduced, translated
How Spyware and Anti-Spyware Work
22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
NOTE: You may want to choose the Word Wrap option from Notepad Edit menu to make this text more readable.
------------------ Interactions/Gas Exchange Version 1.2, CD Version Copyright 2003 by John Wiley & Sons, Inc. All rights reserved. ------------------ NOTE: You may want to choose the Word Wrap option
KUB Website Troubleshooting
KUB Website Troubleshooting Are you having problems getting to the KUB website at http://www.kub.org/? If you type in your user ID and password and press the login button, are you routed right back to
F-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection
Introduction and Overview
Inmagic Content Server Workgroup 10.00 Microsoft SQL Server 2005 Express Edition Installation Notes Introduction and Overview These installation notes are intended for the following scenarios: 1) New installations
Cyber Security: Software Security and Hard Drive Encryption
Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright
Product Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with
Section 1.0 Getting Started with the Vālant EMR. Contents
Section 1.0 Getting Started with the Vālant EMR Contents Getting Started with the Valant EMR application:... 2 Hardware Requirements for the Vālant EMR:... 3 Software Requirements for the Vālant EMR:...
MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1
MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1 Quick Start Once installed MAXA Cookie Manager goes to work immediately to gather information about the cookies on your system and
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable
Norton Family Product Manual
Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual
Setting up VPN and Remote Desktop for Home Use
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...
Technical Guide for Remote access
Technical Guide for Remote access Frequently Asked Questions about using EZ Proxy to access Library resources off campus. Login Help Who is allowed access? I m having trouble logging in. Finding Articles
F-Secure Anti-Virus for Windows Servers. Administrator's Guide
F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
Vodafone PC Backup User Guide Version 1.16
Vodafone PC Backup User Guide Version 1.16 Contents Preface: Preface...v Chapter 1: Overview...7 Chapter 2: Installing Vodafone PC Backup...9 Downloading the Vodafone PC Backup Client...9 Installing the
Sophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete
Backups User Guide for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot
McAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Bitdefender Antivirus for Mac User's Guide
USER'S GUIDE Bitdefender Antivirus for Mac User's Guide Publication date 2015.09.10 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
