OPTENET PC Web Filter. Version 10.09
|
|
|
- Alicia Woods
- 10 years ago
- Views:
Transcription
1 OPTENET PC Web Filter Version 10.09
2
3 COPYRIGHT No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of OPTENET S.A., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS OPTENET, EDUNET, COTENET, E-OPTENET, OPTENET.BE, OPTENET.CL, OPTENET.CO.CR, OPTENET.COM.EC, EDUNET.COM.ES, OPTENET.COM.ES, EDUNET.ES, OPTENET.ES, OPTENET.US, OPTENET.FR, OBTENET.COM, OBTENET.NET, OPTENET.COM, OPTENET.NET, CAPITANNET.COM, CAPITANNET.ORG, CAPITANNET.NET, CAPITANET.COM, CAPITANET.ORG, CAPITANET.NET, OPTENET.BIZ, PROTEGELES.COM, PROTEGELES.NET, PROTEGELES.ORG, SURF-MATE.COM, SURF-MATE.NET, SURF- MATE.ORG, PROTEGELOS.COM, PROTEGEALOSNINOS.COM, SIFT-PLATFORM.ORG, OPTENET.COM.GT, OPTENET.COM.HN, OPTENET.COM.MX, OPTENET.COM.PA, OPTENET.COM.PE, PTENET.CO.UK (in process), OPTENET.COM.VE, are registered trademarks or trademarks of OPTENET S.A. and/or its affiliates in Spain and/or other countries. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION LICENSE AGREEMENT NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSE SOFTWARE. OPTENET 3
4 TABLE OF CONTENTS TABLE OF CONTENTS INTRODUCTION HIGHLIGHTS OPTENET PC WEB FILTER PROTOCOL FILTERING EFFECTIVENESS OPTENET PC LANGUAGES BROWSING SPEED WHEN USING OPTENET PC WEB FILTER SECURITY UNBLOCKING SERVICE FOR PAGES BLOCKED IN ERROR ACTIVATION OR DEACTIVATION OF THE SECURITY SUITE BLOCKING P2P FILE SHARING AND DOWNLOAD PROGRAMS BLOCKING INSTANT MESSAGING PROGRAMS BLOCKING UPDATES TECHNICAL REQUIREMENTS TECHNICAL KNOWLEDGE SYSTEM COMPATIBILITY INSTALLATION PROCESS CONFIGURATION GENERAL SERVICE STATUS CHANGE PASSWORD Changing the Administrative Password Changing Password Recovery Question/Answer and Address UPGRADING (SOFTWARE UPDATE) ADVANCED OPTIONS PROXY SETTINGS WEB FILTER CONFIGURATION Filter Status: Activate/Deactivate Internet blocked due to repeated attempts to access forbidden pages Selecting Web Categories to block SafeSearch File types to be filtered Browsing schedules PERSONAL URL LISTS (BLACK & WHITE LISTS) REPORTS (BROWSING HISTORY) FILTERING PROFILES Enabling/Disabling the use of Profiles Creating a new profile Configuring/Editing a profile Deleting a filtering profile CONTRIBUTION ADD WEBSITES TO THE FILTER ADVANCED CONFIGURATION PROTOCOL FILTERING P2P Instant Messaging OPTENET 4
5 6.7.4 Newsgroups Chat Virtual Worlds Other REINFORCING THE BLOCKING REPORTS CONTACT SUPPORT UNINSTALL OPTENET 5
6 Optenet PC. User Guide 1 INTRODUCTION 1.1 Highlights Filtering over 99% effective. Error rate less than 0.1%, eliminated completely through the Contributions service. The most advanced technology: databases of websites, Semantic Analysis Engine for online content blocking, heuristic analysis of executables, content-based protocol identification, etc. The filters do not affect communications; it takes less than a millisecond to analyze a web page. Automatic database and program updates. Reports on all filtering processes. 1.2 OPTENET PC Web filter The web filter prevents access to undesirable Internet content, such as pornographic websites, dangerous file downloads, instant messaging servers or P2P. The Web filter is responsible for capturing traffic entering and leaving the PC. In addition to identifying the type of traffic, it requests the relevant integrated service for analyzing, monitoring or tracing the content, ensuring that browsing is safe and based on the configured parameters. It is based on semantic analysis of website content and lists of sites that have been placed in various content categories. The lists are updated every ten minutes. Semantic analysis verifies, independently of whether the website is included on a list, whether the page contains any text with inappropriate content, in which case the user is blocked from accessing it. 1.3 Protocol Filtering Protocol filtering detects connections and identifies the protocol type, performing various actions depending on the configuration. This allows users to control applications like Instant Messenger, P2P, Chat, and Newsgroups. OPTENET 6
7 1.4 Effectiveness OPTENET PC possesses the most effective security service technologies. The combination of the semantic analyzer and the predefined lists gives the web filter an effectiveness of over 98%, the highest on the market. 1.5 OPTENET PC Languages OPTENET filters the main languages used on the Internet with over 98% effectiveness. The filter lists contain pages from all languages. Additionally, the Semantic Analyzer is trained periodically with pages from around the world, enabling it to detect pages in all languages. To achieve as high a level of effectiveness as possible (99%), for certain languages (e.g. English, Spanish, French, Dutch, Portuguese, German and Italian) a broad collection of pages is put together to train the Semantic Analyzer. 1.6 Browsing speed when using OPTENET PC The web filter is extremely fast and, as a result, the user does not notice it working. Both the list query and the content analysis process performed by the system take one thousandth of a second. It is effectively an instantaneous process. 1.7 Web filter Security If someone attempts to get around the filter, Internet access is blocked completely as a security measure. Access can only be reestablished using a password. Users should note that this is a feature intended to ensure that if the web filter is tampered with, users can not continue to browse the Internet without the filter. 1.8 Unblocking Service for Pages blocked in error The web filter has an error rate of around 0.1%, the lowest on the market. In addition, it has an unblocking service. If a page is blocked in error, the user can automatically send an to our Customer Care Center (CCC) explaining why the page should be unblocked. The user will be able to gain access to the page within 30 minutes. 1.9 Activation or Deactivation of the Security Suite The Security Suite is activated or deactivated using a password so that administrators can browse without restrictions. The password is requested from the user at the time of installation. If the user does not have the password or if someone attempts to deactivate the Security Suite, the system has selfprotection mechanisms that make it impossible to deactivate it Blocking P2P file sharing and download programs It is possible to block P2P file sharing and download programs through the protocol configuration of the Web filter. The P2P server category can also be blocked, providing a greater level of security. OPTENET 7
8 1.11 Blocking Instant Messaging Programs It is possible to block instant messaging programs through the protocol configuration of the Web filter. The instant messaging server category can also be blocked, providing a greater level of security Blocking It is possible to block through the protocol configuration of the Web filter. To block webmail, you must select the relevant category Updates The filter s list system is updated automatically via the Internet. This process requires no action by the user. OPTENET 8
9 Optenet PC. User Guide 2 TECHNICAL REQUIREMENTS 2.1 Technical Knowledge The program has been designed so that users with a basic knowledge of computers can install and configure the filters without difficulty. 2.2 System Compatibility The Web Filter is available for the following operating systems: Windows XP Sp2 Windows Vista (32 and 64 bits) Windows 7 (32 and 64 bits) OS RAM. Minumum: Free Hard Disk Space: Windows XP sp2 512 MB 200 MB Windows Vista 32 bits, 64 bits 1 GB 200 MB Windows 7 32 bits 1 GB 200 MB Windows 7 64 bits 2 GB 200 MB OPTENET 9
10 Optenet PC. User Guide 3 INSTALLATION PROCESS Download the software from the program to the computer s hard disk and follow these steps: 1) Double click on the file OPTENET (the name of the file is Optenet.exe) 2) The OPTENET interface is available in three languages: Spanish, English and Portuguese. Select the language and click Next. 3) End User Agreement. Accept license terms: OPTENET 10
11 4) Installation starts. 5) Select the folder where the software will be installed. By default, Program Files directory will be used. Click Next. OPTENET 11
12 6) Choose a password to be used to access the Optenet Administration Console (filter configuration). This password ensures that only the administrator can make changes to the setup and remove the program. It is recommended that you choose a password that only you know and keep it in a safe place. Remember that this password will be required to uninstall OPTENET at a later time! 7) Password Reminder: Enter a question and answer to be used in case you forget your password. Enter an address to send the password to in case you do not remember the answer to the security question you set up. The address entered here will be the only address where the password will be sent in case you have forgotten it! This will prevent unauthorized users from acquiring the administrative password in order to alter filter settings and/or uninstall the web filter. OPTENET 12
13 8) Installation starts 9) Enter license code (received via when you purchased the web filter). 10) Finally, it is highly recommended to restart the PC to complete the installation. The program might not work properly until your PC is restarted. OPTENET 13
14 11) Once your computer has been restarted, notice that a new icon appears in your Windows Status Bar. Right-Click on it to open the contextual menu (listed options might vary depending on installed product): This icon will indicate filtering status or additional operations being performed at a given moment: OPTENET 14
15 Optenet PC. User Guide 4 CONFIGURATION You can access the OPTENET Console: From the Windows Start menu. or right-clicking on the Optenet icon on the windows status bar and selecting [Optenet Web Filter Administration]. You will be asked to enter the administrative password to prevent unauthorized access (the password chosen at installation). Once the password has been entered correctly, the administrative console will be shown: OPTENET 15
16 OPTENET includes the following sections: General Web filter Reports OPTENET 16
17 Optenet PC. User Guide 5 GENERAL This section provides general information about the tool and the included services, and enables general configuration tasks such as: Enable/disable Services. Change administrative password. Configure software update. Change license code, configure a proxy (if required) etc. When you click on [General] tab, this menu appears on the left: 5.1 Service Status Select Service Status to activate or deactivate the web filter: OPTENET 17
18 An icon indicates whether the service is currently active or not. If the service is not active, the configured filtering restrictions will not be applied. Icon Status Service is active Service is inactive Remember to click on [OK ] button to apply changes. 5.2 Change Password This section enables: The change of the administrative password. The change of the Password Reminder question/answer to be used in case you forget the administrative password. The change of the session lifetime Changing the Administrative Password The password used to access the administration of the Optenet filter is the password you choose during the installation of the product. OPTENET 18
19 Remember that this password prevents unauthorized access, so that filtering configuration can only be done by the administrator. In order to change your password: Enter current password. Enter new password (and confirm it). As an additional security measure, in case this administrative console is open, you will be asked to reenter administrative password periodically (by default, each 30 minutes). This measure avoids the risk of leaving the administrative console open enabling unauthorized users to change the settings without your knowledge. Enter the session lifetime (period before asking to re-type the password to continue using the administrative console). Time expressed in minutes Changing Password Recovery Question/Answer and Address From [Change Password] window, Click on [View Details] button. A new window will be opened and you will be able to change: The security question and answer. Notice that the answer is case sensitive. And/or The address. OPTENET 19
20 Once these changes are saved, whenever you are requested to enter administrative password, if you have forgotten it, you just have to click on the link Have you forgotten the password? : A new screen will appear with the security question: OPTENET 20
21 When you answer correctly, a dialog will appear on-screen with your password. If you do do not answer correctly or have forgotten the answer, you can request that the password be sent to your address directly, without answering the security question by slecting Proceed in the second dialog box. 5.3 Upgrading (Software update) OPTENET can be updated automatically. If automatic updates are not configured, OPTENET notifies the user when a new version of the software is available. The user can also update the software manually and in real time. You can select what type of alert is used when a new version is available. 5.4 Advanced Options This section allows the user to change the license code for the program. OPTENET 21
22 5.5 Proxy Settings In case you do not have a direct connection to internet, this section enables the configuration of the proxy. In case the proxy requires authentication, type the user and password to be used. OPTENET 22
23 Optenet PC. User Guide 6 WEB FILTER This section enables configuration of the web filter. When you click on [WebFilter] tab, this menu is being shown on the left: 6.1 Configuration From the Web filter configuration screen, you can configure which Internet users will be able to access. The screen is divided into different sections: Filter status Unblock Internet access Categories to be filtered SafeSearch File types to be filtered Browsing schedules Filter Status: Activate/Deactivate You can activate or deactivate the filter as required: OPTENET 23
24 Inactive (Off): Users can access the Internet without restrictions. Active (On): Chosen categories are being filtered (restricted) Internet blocked due to repeated attempts to access forbidden pages It is possible to block access to the internet if the user tries to access forbidden pages. Mark the checkbox to activate this functionality and if the user tried to access 10 forbidden pages in a single session, internet access will be blocked. Only this user is blocked (not other potential PC users). To allow this user to browse again, select the [Unblock] button. It is possible to configure an address to receive a notification whenever this policy has been applied. The will include:» The user that has been blocked Selecting Web Categories to block Select the categories to block. Web pages classified under these categories will be blocked. By default, some categories are already marked: Alcohol & Tobacco: Websites that sell or promote the use of tobacco or alcohol for human consumption, as well as items and products specifically related with its intake. Gambling: Websites providing access to on-line casinos, bingo halls and on-line contests based on SMSs; this category includes websites where all kinds of bets can be placed and also offering training or actively promoting such activities OPTENET 24
25 Shopping: Websites for online shopping of products or services. Sites allowing the offering and purchasing of goods between individuals or between an organization and an individual. It includes automobile s shopping and real state agencies, even though no direct shopping is involved. It does not include gambling, travels and financial institutions. Forums: Websites with a themed nature that invite you to participate with your personal opinions. Adult games: Sites providing games of a violent, pornographic or erotic nature or content; also games related to hate, sects and racism. It includes multi-player open games where action might derive to such content. Personal Websites: Personal websites created by users all over the world in order to present themselves or present specific topics of interest to them. Social Networks: Websites specifically devoted to setting up online communities where users share information with each other. These sites might have a professional or entertaining purpose. This category excludes pages about dating and adult contacts. Sexuality: Articles about sex, sex aimed at teenagers, sexual education etc., that do not contain pornography. Online storage: Websites that offer users the ability to store a large number of files, either as personal storage or sharing platform. This category does not include P2P. Banners: Publicity or advertising banners inserted into websites. It includes sites serving them. Web-mail: Websites where you can send and receive s. Photo & Video: Websites that host and allow the publication and viewing of images and/or videos. This category does not include professional and artistic photography. Instant Messaging Servers: Websites from where you can download the programmes. It includes websites supporting SMS sending from the internet. Pornography: Websites with a pornographic or obscene content. It includes access to chat rooms where this type of material can be found. Society: Websites with contents relating to celebrities; also content on fashion, décor, etc. Spyware: Websites containing spywares. A spyware is a programme that recollects information from a PC to then transmit that information through the Internet to external sources. All this takes place without knowledge and/or consent of the PC owner. Anonymizers: Websites that allow users to browse the Internet and access Internet content without being registered by third parties. Bombs (& Weapons): Websites that explain how to prepare, make, build, distribute and use explosives and explosive devices. Also sites that provide information, promote or sell firearms and sharp weapons for sport, hunting or military use; it does not include pocket and kitchen knifes. In this category individuals or organizations that promote terrorism are also included. This category also includes pages related to the weapon, ammunition, and items for martial arts and personal defense (e.g. sprays, brass knuckles), including collector items. Drugs: websites that encourage the use of drugs or provide contacts / places where drugs can be bought. It include sites directly selling prescription drugs without the supervision of a health professional. It does not include information / preventive measures about drugs. Hackers: Websites where you can find illegal software as well as info in order to illegally gain access to information systems, hardware devices or personal equipments (cracking). Models: Websites containing models photographs; websites where this type of photograph shows models fully or partially naked are included in the pornography category. Racism: Websites with contents of an openly xenophobic nature or which incite racist behaviour because of culture, race, sexual orientation, religion, ideology, etc. Sects: Websites of dangerous sects, such as the so-called devil worshippers. Violence: Websites whose contents are openly violent, that incite violence or defend it. Anorexia and Bulimia: Websites devoted to promote and instigate eating disorders. Chat: Websites where you can communicate with other users in real time. Dating: Websites through which you can meet other people: match-making, find a partner, etc. Games: Websites where you can play on-line or download computer games. Music: Websites where you can acquire or download music or get information about singers and groups in general. Radio & TV Online: Websites of radio stations and TV channels. It includes those ones supporting on-line broadcasting. P2P Servers: Websites that contain P2P applications and programs OPTENET 25
26 6.1.4 SafeSearch Select whether Google SafeSearch (and other Search Engines Search) is enabled. If this option is activated, all Google searches will be done with the SafeSearch option enabled (overriding user settings for the Search Engine) File types to be filtered In addition to filtering web pages, OPTENET can place restrictions on the types of files that can be downloaded. The user can specify the file extensions to be blocked: There are two lists: Files whose download is permitted Files to block By default, all file types are permitted. In both lists, files are organized in families : Compressed Files Images Music Programs Video Custom extensions. Notice that at the bottom of the lists, there is a section where you can enter additional file extensions to block, making possible to filter all file types. Optenet filter uses Content Analysis to detect (for instance) MP3 files even if they have been renamed with a different extension. For instance, if someone has renamed file queen.mp3 to queen.gif, the filter will detect and block it. OPTENET 26
27 6.1.6 Browsing schedules In this section you can create additional restrictions to the internet: If schedules are not activated, navigation is always permitted (applying of course the defined restrictions based on forbidden web categories and file types that can be downloaded). If schedules are activated, you are allowed to establish time limits for the use of internet:» Define up to three time periods per day of the week. Note: if no time period is set for a given day of the week, browsing will be allowed for the whole day (or until the maximum number of hours per day is reached).» Maximum number of hours per day the user can navigate.» Maximum number of hours per week the user can navigate. These options (Max. number of hours/day, Max. number of days/week) work independently of the time shown on the PC s clock. You can activate or deactivate the schedules by checking the Active or Inactive options. OPTENET 27
28 6.2 Personal URL lists (Black & White Lists) It is possible to create a White list of trusted URLs and a black list of URLs to block regardless of the category they belong to: You can customize the filter so that specific pages from prohibited categories can still be viewed when the filter is active. These are known as Allowed Web Pages. In a similar way, you can prevent users from viewing certain pages, regardless of the category the pages belong to. If you only want to allow or block a single web page, check the option Only the exact address. If not, the whole domain is blocked.» Eg. If you type and do not mark only the exact address, the following subdomains would be blocked or allowed too: etc 6.3 Reports (Browsing history) You can view what pages users have tried to access and whether they were blocked or not. Reports only show information related to navigation while the filter has been active. In this section you can: Decide whether to save information about browsing attempts.» Mark the checkbox [Save reports] to log this information.» Decide when to delete the browsing history files (in order to save disk space). By default this is set to every 15 days. View navigation history (information available just in case [Save reports] option has been marked. OPTENET 28
29 Click on [view Reports] button to establish: Time range (from date to date) Number of lines to show (number of http requests to show): The report lines follow this format: profile name date time URL not blocked (0)/blocked (1) category file type 6.4 Filtering Profiles When different users use the same PC, you may want to define different rules for each user or set of users. Eg. Establishing different restrictions for your 10-year old child, your 16-year old child and for yourself. A filtering profile enables the filter to operate differently from the default settings and is only applied to the users you define. If no new profiles are created, the filter operates with the default configuration described above. The web filter administrator can provide each computer user with an individual filtering profile. OPTENET 29
30 If profiles are enabled, when users try to establish an Internet connection, they are required to authenticate one of the defined profiles Enabling/Disabling the use of Profiles Profiles are filtering modes customized according to who is browsing commonly used when a PC has more than one user. For example, in families it is normal to set up different profiles for children and adults. To activate filtering profiles: 1) Access the filter administration menu. 2) Select the Web filter tab. 3) Choose the Profiles option. 4) Click on [Activate Profiles]. If you do not want to set up any special measures and you want all users to be treated in the same way by the filter, you can disable existing profiles. This is of course only possible if you have previously enabled profiles. To disable filtering profiles: 1) Access the filter administration menu. 2) Choose the Profiles option. 3) Click on [Deactivate Profiles]. From now on all users will navigate using the default filter configuration OPTENET 30
31 6.4.2 Creating a new profile To create a filtering profile: 1) Access the filter administration menu. 2) Select the Web filter tab. 3) Choose the Profiles option. 4) Click on Activate Profiles. 5) Enter the profile name in the New Profile box. 6) The name of the profile created will appear in the bottom box Configuring/Editing a profile To configure or modify a filtering profile: 1) Access the filter administration menu. 2) Select the Web filter tab. 3) Choose the Profiles option. 4) Select the profile you want to modify or configure. 5) Click on Modify configuration. 6) A new screen appears with the name of the profile you are modifying shown at the top. 7) The profile appears empty if you have just created it. Otherwise the last saved configuration is displayed. When you create a new profile, you must configure it because by default it is empty. OPTENET 31
32 First, you need to select which users will be included in the profile. The list of available users in the computer is shown: Then, for the active profile you can configure the following: Web filtering restrictions (categories, files to block, navigation schedules etc). Protocol restrictions (restrictions based on application protocols: P2P, instant messenger, , Newsgroups, chat, virtual worlds, others). Specific Web Filter Restrictions: Click on [Web Filter] button. A new window is opened in order to configure the filtering restrictions for this profile. OPTENET 32
33 Click on [Use General Configuration] button to copy general settings. You can then configure this profile, adding or removing restrictions: Click on [Show Profile URL lists] to open a window where a specific white list and black list of urls can be established for this profile: Specific Restrictions based on application protocols: OPTENET 33
34 Click on [Protocols] button. A new window is opened in order to configure the filtering restrictions for this profile: Protocol restrictions will be described later in this manual Deleting a filtering profile To delete a filtering profile: 1) Access the filter administration menu. 2) Select the Web filter tab. 3) Choose the Profiles option. 4) Select the profile you want to delete. 5) Click Delete profile. OPTENET 34
35 6.5 Contribution Add Websites to the filter Yopu may come upon websites that you believe are not properly categorized or categorized at all. You have the opportunity to help keep Optenet PC the most accurate filter available by submitting these sites for review. Optenet s Review department checks the contributed addresses and assigns them to the appropriate category. When a page has been reviewed, it is placed in one of the filtering categories. Additionally, if users provide their address, they are informed of what action has been taken regarding their request. Use CNTRL/C to copy the URL and CNTRL/V to pate in in the contribution field. In contrast to the Personal Lists, the Contribution function is used to inform OPTENET of a page that should be filtered, to the benefit of all users of the filter. OPTENET 35
36 6.6 Advanced Configuration The web pages that you add to this list will not be filtered and will not appear in the browsing history. Access will always be allowed to these pages or servers. Simply add the names of the automatic update servers, for example the website used to update your antivirus. Once you have made your changes, you must restart the computer for them to come into effect. The pages entered in this section are completely excluded from filtering. They will not appear in the browsing history, they will never be blocked and they are exempt from browsing schedules. 6.7 Protocol filtering In this section you can configure how to filter the different application protocols by selecting the action that should be taken with each one: OPTENET 36
37 Allowed access to the programs and applications for that protocol category is permitted. Blocked access to the programs and applications for that protocol category is blocked. Scheduled access is regulated by time, depending on the timeframes specified in the Surf Schedule table:» In those days where a timeframe is specified, access will be permitted only on those timeframes.» In those days where a timeframe is not specified, access will be permitted the whole day. The defined protocols are: P2P Instant messaging Newsgroups Chat Virtual worlds Port configuration (others) P2P This option is used to control the use of P2P applications (e.g. Emule, Gnutella, Kazaa) used to share pictures, films, videos, software, etc. OPTENET 37
38 In case P2P protocols are set to be blocked, if the web category P2P Servers is not being blocked (see [WebFilter >> Configuration]), you will be asked to also block this type of web sites: Instant Messaging This option is used to control the use of instant messaging applications (e.g. Microsoft MSN Messenger, Yahoo Instant Messenger, ICQ 5.0, AIM), used to send messages and share files in real time. In case IM protocols are set to be blocked, if the web category Instant Messaging Servers is not being blocked (see [WebFilter >> Configuration]), you will be asked to also block this type of web sites: This option is used to control the use of accessed through the protocols POP3 (port 110), SMTP (port 25) and IMAP (port 143). To filter access to webmail, select this category when configuring which categories to filter. In case protocols are set to be blocked, if the web category Web Mail websites is not being blocked (see [WebFilter >> Configuration]), you will be asked to also block this type of web sites: Newsgroups This option is used to control the use of newsgroups (e.g. NNTP), used as discussion forums where users can exchange opinions Chat This option is used to control the use of chat applications (e.g. IRC), through which users communicate with each other. In case Chat protocols are set to be blocked, if the web category Chat is not being blocked (see [WebFilter >> Configuration]), you will be asked to also block this type of web sites: OPTENET 38
39 6.7.6 Virtual Worlds This option is used to control the use of Internet-based virtual world games (such as Second Life) where users can inhabit and interact via avatars. Additionally, by enabling the Advanced configuration checkbox you can configure a list of exceptions with URLs/addresses to which you want to allow or block access, as follows:» Use of virtual worlds is allowed and no addresses in the advanced configuration list: access is allowed to all addresses in the virtual world.» Use of virtual worlds is blocked and no addresses in the advanced configuration list: access is blocked to all addresses in the virtual world.» Use of virtual worlds is allowed and addresses present in the advanced configuration list: access is only allowed to the addresses in the list.» Use of virtual worlds is blocked and addresses present in the advanced configuration list: access is blocked to all addresses in the virtual world Other This option is used to establish the default behavior (blocked or allowed access) for all other ports not included in the configuration of the previous tabs. In either case you can establish exceptions to the above rule by entering specific ports or range of ports to be blocked or allowed, as applicable. OPTENET 39
40 6.8 Reinforcing the blocking Sometimes, there is a parallelism between web categories and families of protocols: Protocol P2P Instant Messanging Chat Web Category P2P Servers Instant Messaging WebMail Chat etc That is why, whenever you configure the filter to block any of those web categories, you will be asked if you wish to also block related protocols to reinforce the blocking (if those protocols are not set to be blocked yet). In a similar way, whenever you block a given protocol, if the analogous web category is not being blocked, you will be asked if you want to also block related websites. Eg. If you do not want that a given profile can use applications based on protocols, you will be asked to also block webmail sites for this profile. OPTENET 40
41 Optenet PC. User Guide 7 REPORTS In this section you can view a summary of the measures taken by OPTENET. You can view reports on the activity of the following services (list of services might vary depending on installed product): Web filter Antivirus Firewall. Antispam Antiphishing OPTENET 41
42 Optenet PC. User Guide 8 CONTACT SUPPORT Click on [Contact] button. A new window will be opened with the account where you can address: Customer support requests. Technical support requests. OPTENET 42
43 Optenet PC. User Guide 9 UNINSTALL To uninstall OPTENET, simply use the shortcut created in your computer s Start menu. During the uninstallation process, you will be prompted for the administrator password, preventing any other user from removing the program. IMPORTANT: Do not attempt to uninstall the program by deleting the program directories and files since this could result in irreparable damage to the installation, causing you to lose Internet access completely. Always use the shortcut on your computer to uninstall the software. If the OPTENET installation application executes on a machine where the software is already installed, the uninstallation process for the existing version will be initiated (once the administrator password has been entered) overwriting files. OPTENET 43
USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com
USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com 06-06-2008 1 2 CONTENTS 1. INTRODUCTION... 6 2. INSTALLATION STEPS... 7 3. SET-UP... 10 3.1. Filter status: Activating/ Deactivating...10
OPTENET Security Suite / OPTENET PC Web Filter
OPTENET Security Suite / OPTENET PC Web Filter Version 11.01 User Guide (rev 1.7) COPYRIGHT No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
Safe internet: Getting Started Guide
Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
Burst Technology. bt-webfilter User Guide
Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
User's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes
NAME OPTENET WEBFILTER PC Company Optenet S.A. Version 10.09.69 Type of product Devices supported Operating systems Client Computer Windows XP Sp2 Windows Vista (32 and 64 bits) Windows 7 (32 and 64 bits)
F-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
User s Manual. Management Software for ATS
ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.
BillQuick Agent 2010 Getting Started Guide
Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)
MailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Endpoint Security Console. Version 3.0 User Guide
Version 3.0 Table of Contents Summary... 2 System Requirements... 3 Installation... 4 Configuring Endpoint Security Console as a Networked Service...5 Adding Computers, Groups, and Users...7 Using Endpoint
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix
Standard Setup Guide 1 2 3 4 5 Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Read this manual carefully before you use this product and keep it
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29
Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your
Magaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.
Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it
IsItUp Quick Start Manual
IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: [email protected]
CyberPatrol SiteSURV Web Filtering User Manual
CyberPatrol SiteSURV Web Filtering User Manual Page 1 Table of Contents Table of Contents Overview... 3 Product Diagram... 3 How it Works... 3 Managing Internet Access... 4 Activating Your Account... 5
ViewPower. User s Manual. Management Software for Uninterruptible Power Supply Systems
ViewPower User s Manual Management Software for Uninterruptible Power Supply Systems Table of Contents 1. ViewPower Overview... 2 1.1. Introduction...2 1.2. Structure...2 1.3. Applications...2 1.4. Features...2
Image Assistant. User Guide. Image Assistant. Laplink Software, Inc. User Guide. The ONLY Way to Restore an Old Image to a New PC!
1 Image Assistant Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: [email protected] Laplink Software, Inc. 14335 NE 24th Street, Suite 201
Network Scanner Tool R3.1. User s Guide Version 3.0.04
Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,
PLEASE NOTE: The client data used in these manuals is purely fictional.
Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information
Norton Family Product Manual
Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual
Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
Web Filter SurfControl Web Filter 5.0 Installation Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company NOTICES NOTICES Copyright 2005 SurfControl plc. All rights reserved. No part
Configuring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Zimbra Connector for Microsoft Outlook User Guide 7.1
Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.
Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring
Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
Microsoft Outlook Setup With Exchange Server. Outlook 2007 2010 2013
Microsoft Outlook Setup With Exchange Server Outlook 2007 2010 2013 Revised 12/1/2014 CONTENTS SUMMARY... 3 I. OUTLOOK SETUP... 4 II. PERSONAL FOLDERS SETUP... 7 III. RULES SETUP... 9 Rule #1: Move Inbox
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
Avira Exchange Security Version 12. HowTo
Avira Exchange Security Version 12 HowTo Table of contents 1. General information... 3 2. System requirements... 3 3. Installation of Avira Exchange Security...4 4. Licensing... 5 5. Configuration of Email
Allworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
VMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
Sophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
Driver Updater Manual
Driver Updater Manual Keep your drivers up-to-date! Improve your system performance and stability by keeping your drivers updated. Automatically find, update and fix the drivers on your computer and turn
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01
Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written
Verizon Family Protection Powered by McAfee. User Guide
Verizon Family Protection Powered by McAfee User Guide ii Contents Welcome to Verizon Family Protection Powered by McAfee User Guide 3 Setting up Family Protection 5 Managing your family's protection...6
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
User Guide. Windows 8 Upgrade Assistant. Laplink Software, Inc. MN-PCM-UpgdAssist-EN-08 (REV. 10/2012)
1 Windows 8 Upgrade Assistant User Guide Laplink Software, Inc. For technical support issues or questions, please visit: http://www.laplink.com/contact For other inquiries, please see contact details below:
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
ZoneAlarm Parental Control User Guide
ZoneAlarm Parental Control User Guide 2011 Check Point Software Technologies Ltd. All rights reserved. Page 1 March 2011 Page 2 Check Point Software Trademarks Copyright 2010 Check Point Software Technologies
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes
Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes May 07, 2002 Thank you for choosing Ensim WEBppliance 3.0 for Windows. This document includes information about the following: About Ensim
Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism
Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,
How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)
CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES
CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Installation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
Email client configuration guide. Business Email
Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
FAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
Administrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
formerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
NETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
TELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE
1.1 Introduction 01 1.2 The Checklist 02 1.3 Business Mail Requirements 03 1.4 Downloading & Installing Outlook 2003 04 BEFORE YOU START 1.1 INTRODUCTION 1.1.1 Who this Guide is For 1.1.2 What s in this
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
WhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
NetBak Replicator 4.0 User Manual Version 1.0
NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email
Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2010 Installation Guide, product version 6.4. This guide is item number DOC-110, revision 1.045, May 2010 Copyright 1995-2010 Lenel Systems International, Inc. Information
User Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion
Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
VPOP3 Your email post office Getting Started Guide
VPOP3 Your email post office Getting Started Guide VPOP3 Getting Started Guide, version 2.1 1 Copyright Statement This manual is proprietary information of Paul Smith Computer Services and is not to be
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3
Contents 1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3 2.1. SERVER-BASED COMPONENTS:... 3 2.1.1. Interception Server... 3 2.1.2. Database server... 3 2.1.3. Data processing server... 3 2.1.3.1. Search
Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0
Zimbra Connector for Microsoft Outlook User Guide Network Edition 7.0 February 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
Installation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Topaz Installation Sheet
Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
Using. Microsoft Virtual PC. Page 1
Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC
ReadyNAS Duo Setup Manual
ReadyNAS Duo Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA February 2008 208-10215-01 v1.0 2008 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,
Backup Exec 15. Quick Installation Guide
Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
Desktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Frequently Asked Questions: Xplornet Internet Security Suite
Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my
