Malware Monitoring Service Powered by StopTheHacker

Size: px
Start display at page:

Download "Malware Monitoring Service Powered by StopTheHacker"

Transcription

1 Technical Resources Malware Monitoring Service Powered by StopTheHacker StopTheHacker Dashboard User Guide

2 CONTENTS Introduction... 3 Account Activation... 3 How to Log into Your Account... 3 Type of Service... 4 Navigation Tab: Overviews... 5 Malware... 7 Vulnerabilities... 8 Reputation... 9 Performance Individual Monitored Domains Detailed Insights How to Interpret Reports Reputation Monitoring Malware Vulnerability Assessment Performance Upgrade Options Trust Seal GlobalSign Knowledge Base Submit a Support Ticket About GlobalSign

3 INTRODUCTION StopTheHacker is GlobalSign s preferred malware monitoring service provider and through a strategic partnership its range of services are available to GlobalSign SSL Certificate customers. StopTheHacker enables web hosters, website owners, administrators and web designers to detect malware and recover sites from damaging malware attacks. This guide provides an overview and stepbystep guide on how to use StopTheHacker s webbased dashboard to view, monitor and upgrade your website domains. ACCOUNT ACTIVATION Once you have purchased a GlobalSign SSL Certificate and it has successfully been issued, your domain will automatically be monitored by StopTheHacker. Within 2448 hours of issuance you will receive an welcoming you to the service, instructing you on how to activate your StopTheHacker account, prompting you to create a secure password. Please Note: The address used will be the address previously specified as the contact connected with the SSL Certificate order and it will be this address to which all StopTheHacker s will be sent. HOW TO LOG INTO YOUR ACCOUNT Visit in your web browser. Login Panel 3

4 Insert your address and password and click on Login. You will now be directed to your personal dashboard, showing an overview of all your domains under this account. Please Note: If you only have one domain you are brought directly to the specific view for this domain. TYPE OF SERVICE Depending on the type of SSL Certificate purchased will determine which level of malware monitoring service you will receive and have access to via your dashboard. The service levels per certificate can be seen in the table below. Functionality AlphaSSL DomainSSL OrganizationSSL ExtendedSSL Blacklist and Reputation Scan X X X X Scan of Known Malware X X X Scan of Unknown Malware X X Facebook Protection X Speed Monitoring X Uptime Monitoring X Annual Security Report X Pages Scanned All All All Scan Frequency Weekly Daily Daily Hourly Vulnerability Assessment Automatic Malware Removal Service Levels Please Note: If your SSL Certificate type does not include a service you would like to receive, upgrade options are available at an additional fee and can be managed directly via the dashboard by logging into your account at Alternatively you could upgrade your SSL Certificate type via GlobalSign. 4

5 NAVIGATION TAB: OVERVIEWS At the top of the dashboard you will see the navigation points available within the dashboard. When you login you will automatically start in the Overviews area. On the right hand side of the navigation bar you will also see if you have any notifications or important messages. Below the navigation bar, StopTheHacker provides you a link to their introduction video, in case you would rather watch then read. Please Note: This video is based on StopTheHacker direct services and therefore functions may vary slightly. Navigation Bar In the Overviews Section you will see all your domains on the left hand side with a little icon indicating the domains overall status: The red warning triangle means that something is wrong with your domain. The green shield indicates that everything is fine with you domain. The blue clock icon shows that the scan for this domain is currently in progress. 5

6 The large section is split into four security areas: Malware, Vulnerabilities, Reputation and Performance. In each area an overview for all monitored domains is provided. (Please refer back to the table on page 4 should you wish to know which services are included with your SSL Certificate). Dashboard Overview Multiple Domains The pie charts display the safety status of your websites/domains that are registered with StopTheHacker in the four different areas. The legend to the right of the pie charts explain what the different areas of the charts represent. The list shows all of the individual domains being monitored and where on the chart they are represented. If you have a website that is not being monitored by a particular service (marked in grey) upgrade options are available should you require these additional services. 6

7 MALWARE Malware Each nonintrusive scan checks all pages of your website for known viruses and web malware threats to see if hackers have injected malicious code into your website. StopTheHacker s notification system immediately informs you if any malware is found, so you can take all actions needed. The pie chart displays the safety status of your websites/domains that are using a GlobalSign SSL Certificate. The legend to the right of the pie chart explains what the different areas of the chart represent. Blue: Domains being scanned for malware for the first time Green: Domains found to be free of malware Red: Domains found to have malware Grey: Domains not being monitored for malware The list on the far right hand side shows all of the individual domains being monitored and where on the chart they are represented e.g. Safe Domains. Please Note: StopTheHackers Malware Monitoring Service is not available to AlphaSSL customers and should you wish to benefit from this service you will need to upgrade your SSL Certificate type to a DomainSSL or above. Please contact us directly by ing sales@globalsign.com. OrganizationSSL and ExtendedSSL Certificates also include advanced malware monitoring for detecting unknown malware. StopTheHackers artificial intelligence based engine with advanced selfadapting capabilities constantly monitor new strains of malware and protects your online business from these emerging threats. This advanced feature is available for DomainSSL Certificate customers as an upgrade option. You can upgrade by logging into your StopTheHacker account at 7

8 VULNERABILITIES Vulnerabilities The pie chart displays the safety status of your websites/domains for vulnerabilities. Vulnerability scans can prevent webbased intrusions and identify server and application security vulnerabilities that bots and hackers can use to attack you. StopTheHacker can check over 35,000 vulnerabilities on your servers, website and infrastructure, checking for web application vulnerabilities in most popular software like WordPress, Drupal, Django, Joomla, Ruby on Rails, OpenCMS and can uncover vulnerabilities in custom installations too. The legend to the right of the pie chart explains what the different areas of the chart represent. Blue: Domains being scanned for vulnerabilities for the first time Green: Domains found to have no vulnerabilities Red: Domains found to be vulnerable to attack Grey: Domains not being monitored for vulnerabilities The list on the far right hand side shows all of the individual domains being monitored and where on the chart they are represented e.g. Vulnerable Domains and First Scans. Please Note: Vulnerability assessment scans are not automatically included as standard with your SSL Certificates and malware monitoring service and the feature is available as an additional upgrade option. You can upgrade by logging into your StopTheHacker account at 8

9 REPUTATION Reputation The pie chart displays the safety status of your websites/domains for reputation including blacklist monitoring. Blacklist monitoring is a comprehensive daily check on the status of your website on the Google Safe Browsing List and other search engines including Yahoo, and Bing; malware blacklists like Malware Patrol and Malware URL; DNS Blacklists; phishing blacklists like PhishTank; spam blacklists like SpamCop; and many more. StopTheHacker will automatically notify you via if your website ends up on a blacklist and will help you to remove your site from the search engine blacklist. The legend to the right of the pie chart explains what the different areas of the chart represent. Blue: Domains being scanned for reputation for the first time Green: Domains that have a good reputation Red: Domains that have a poor reputation Grey: Domains not being monitored for reputation The list on the far right hand side shows all of the individual domains being monitored and where on the chart they are represented e.g. Poor Reputation. Please Note: This service is included as standard with all SSL Certificate types including AlphaSSL, DomainSSL, OrganizationSSL and ExtendedSSL. 9

10 PERFORMANCE Performance The pie chart displays the safety status of your websites/domains for performance including uptime and speed monitoring. Uptime Monitoring gives you an overview of the availability of your website including details on down time; in case the site goes down we will send you an alert. Speed Monitoring gives you realtime information on the page speed and response time of your website using detailed graphs. The legend to the right of the pie chart explains what the different areas of the chart represent. Green: Domains being monitored for performance Grey: Domains not being monitored for performance The list on the far right hand side shows all of the individual domains being monitored and where on the chart they are represented e.g. Monitored. Please Note: This service is included as standard only with ExtendedSSL Certificates. This advanced feature is available for DomainSSL and OrganizationSSL Certificate customers as an upgrade option. You can upgrade by logging into your StopTheHacker account at If you have an AlphaSSL Certificate and you wish to benefit from this service, you will need to upgrade your SSL Certificate type to DomainSSL or above. Please contact us directly to do this by ing 10

11 INDIVIDUAL MONITORED DOMAINS DETAILED INSIGHTS To get detailed information on any individual domain that is being monitored, simply find the domain you want to get the details for on the left side and click on the domain. This brings you to the detailed status overview of the selected domain. Overviews The detailed domain overview is spilt into the same four areas as the overall Overviews section and shows you the detailed status of the selected domain in each area. If an area is greyed out, this means that the specific service is not included as standard with your type of SSL Certificate. To activate these areas for your domain, you can upgrade to a more advanced service at an additional charge, by logging into your StopTheHacker account at To go into even more details within each area, you can click on the desired topic in the left hand sub- navigation, or you can hover over the Action+ button and click the link that appears. 11

12 Detailed View The subnavigation for each individual domain can be found on the left side and also includes the topics Service Settings (for this specific domain) and the Trust Seal. GlobalSign and StopTheHacker recommends that you display the Trust Seal on your website to reassure browsing visitors that your site is malware free. More information about the Trust Seal can be seen on page 17. HOW TO INTERPRET REPORTS REPUTATION MONITORING The Reputation section provides information to answer questions such as: How is your website perceived on the Internet? Is your website on any blacklists? Is your SSL Certificate expiring soon? Are any of the search engines blacklisting your website? This area is divided into three sections: 1. Blacklists: This section shows you the results of checking your domain name against various data sources, such as Google malware, Google Phishing, DNS blacklists, Phishing blacklists and much more. An alert red triangle icon lets you know if the particular data source has an unfavorable reputation about your domain. Hover your mouse over the icon to view further information. 2. Ecosystem: This section shows you the results of the reputation information regarding your IP, your hoster or whether your IP is listed in Botnets or not. Hover your mouse over the icon to view further information. 12

13 3. Web of Trust: This section shows you the results from our data partner Web of Trust. Please remember Web of Trust is an independent data provider. Hover your mouse over the icon to view further information. To improve your Web of Trust score please visit To get more detail about each source within these sections, please click on the grey question mark next to each source in the right hand corner. MALWARE The malware report for your domain will display only one of two messages, either green or red. Green messaging will inform you that everything is ok with your site. There was no malware found on xxxx domain. Red messaging will inform you that malware has been found. Malware has been detected on xxxx domain. No Malware Website Safe Malware Detected 13

14 Hover over the Action+ button and on Show More to see the entire malware code. Show More You can also click on View Source to try and view the malware present in the web page at real time. Please Note: This might not always work as some malware only appears intermittently and hence grabbing the html page when you click on View Source might not be able to grab the malware at the specific moment you click on this link. Source Code View 14

15 VULNERABILITY ASSESSMENT The vulnerability assessment report is divided into three sections. It starts with a short overview on all found vulnerabilities. These are grouped into three levels: Critical, Important and Informational. The overview shows you how many vulnerabilities in each group where found and if these are server or application vulnerabilities. Vulnerability Overview The second section is a detailed report on each individual server vulnerability that was found, including a recommendation for each vulnerability on what you should do. The last section deals with the application vulnerabilities found and also contains recommendations on what should be done to fix them. Application Vulnerabilities 15

16 PERFORMANCE The performance overview shows you the last 30 days statistics of your site load speed for the selected domain, as well as the last 30 days up time of your domain. You can hover over the graphs to get more detailed information of the site speed, date and more. Performance Overview UPGRADE OPTIONS GlobalSign s Malware Monitoring Service offers a number of upgrade opportunities via StopTheHacker, should you wish to extend the services within your account. Please refer back to page 4 to view the services which are included as standard with your SSL Certificate type. Please Note: There is an additional charge for each of these services on an annual basis and payment will need to be made directly via your StopTheHacker account. You can view manage your options and upgrade directly via logging into your account at 16

17 TRUST SEAL Adding the Malware Monitoring Trust Seal to your site is easy. To get the Trust Seal for your individual domain, simply select the domain you want to get the Trust Seal for, from the domain list on the left hand side of your account. Then click on the Trust Seal navigation point on the left hand side in the side menu below the selected domain. You can now view and copy the code for the Trust Seal and implement it in your website. Trust Seal How to Install Copy the HTML from the embed code text box above Paste the HTML into your web page or template Why use a trust seal? Show your visitors that you care about security Trust Seals have been shown to increase conversion rates by more than 10% 17

18 GLOBALSIGN KNOWLEDGE BASE If you require assistance during the ordering or installation process, you can search for help by consulting the GlobalSign Knowledge Base: SUBMIT A SUPPORT TICKET If you cannot find the answer to your question in our Knowledge Base, please submit your question via our Support Ticket Request Form: ABOUT GLOBALSIGN GlobalSign was one of the first Certification Authorities and has been providing digital credentialing services since It operates multilingual sales and technical support offices in London, Brussels, Boston, Tokyo and Shanghai. GlobalSign has a rich history of investors, including ING Bank and Vodafone. Now part of a GMO Internet Inc group company a public company quoted on the prestigious Tokyo Stock Exchange (TSE: 9449) whose shareholders include Yahoo! Japan, Morgan Stanley and Credit Suisse First Boston. As a leader in public trust services, GlobalSign Certificates are trusted by all popular Browsers, Operating Systems, Devices and Applications and include SSL, Code Signing, Adobe CDS Digital IDs, & Authentication, Enterprise Digital Solutions, internal PKI & Microsoft Certificate Service root signing. It's trusted root CA Certificates are recognised by all operating systems, all major web browsers, web servers, clients and Internet applications; as well as all mobile devices. Accredited to the highest standards As a WebTrust accredited public Certificate Authority, our core solutions allow our thousands of enterprise customers to conduct secure online transactions and data submission, and provide tamperproof distributable code as well as being able to bind identities to Digital Certificates for S/MIME encryption and remote two factor authentication, such as SSL VPNs. GlobalSign US and Canada Tel: sales-us@globalsign.com GlobalSign EU Tel: sales@globalsign.com GlobalSign UK Tel: sales@globalsign.com GlobalSign FR Tel: ventes@globalsign.com GlobalSign DE Tel: verkauf@globalsign.com GlobalSign NL Tel: verkoop@globalsign.com 18

Malware Monitoring Service Powered by StopTheHacker

Malware Monitoring Service Powered by StopTheHacker Technical Resources Malware Monitoring Service Powered by StopTheHacker StopTheHacker Dashboard User Guide End User Version CONTENTS Introduction... 3 Account Activation... 3 How to Log into Your Account...

More information

GlobalSign Integration Guide

GlobalSign Integration Guide GlobalSign Integration Guide GlobalSign Enterprise PKI (EPKI) and AirWatch Enterprise MDM 1 v.1.1 Table of Contents Table of Contents... 2 Introduction... 3 GlobalSign Enterprise PKI (EPKI)... 3 Partner

More information

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T.

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T. Reputation and Blacklist Monitoring Basic Professional Business Enterprise Reputation Monitoring Blacklist Monitoring Standard Malware Detection Scan for known Malware Scan for known viruses All pages

More information

GlobalSign Malware Monitoring

GlobalSign Malware Monitoring GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...

More information

Simplifying management and lowering total cost of ownership for SSL Certificates

Simplifying management and lowering total cost of ownership for SSL Certificates Simplifying management and lowering total cost of ownership for SSL Certificates Introducing the Managed SSL 2.0 platform by GlobalSign GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction...3

More information

Identity Relationship and Access Management for the Extended Enterprise

Identity Relationship and Access Management for the Extended Enterprise Identity Relationship and Access Management for the Extended Enterprise Benefits in External Identity Management CONTENTS Introduction... 3 Internal vs External identities... 3 Productivity vs Convenience...

More information

How To Encrypt Email With An Email Certificate On An Email From A Gmail Account On A Pc Or Mac Or Ipa (For A Pc) On A Microsoft Gmail (For An Ipa) Or Ipad (For Mac) On

How To Encrypt Email With An Email Certificate On An Email From A Gmail Account On A Pc Or Mac Or Ipa (For A Pc) On A Microsoft Gmail (For An Ipa) Or Ipad (For Mac) On S/MIME Compatibility Assessing the compatibility and best practices of using S/MIME encryption GLOBALSIGN WHITE PAPER Ben Lightowler, Security Analyst GMO GlobalSign Ltd Contents Introduction...3 Why S/MIME

More information

ZNetLive Malware Monitoring

ZNetLive Malware Monitoring Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers

More information

SSL CERTIFICATE INSTALLATION WITH HC. User Manual. Hosting Controller 1998 2010. All Rights Reserved.

SSL CERTIFICATE INSTALLATION WITH HC. User Manual. Hosting Controller 1998 2010. All Rights Reserved. SSL CERTIFICATE INSTALLATION WITH HC User Manual Hosting Controller 1998 2010. All Rights Reserved. Contents Proprietary Notice... 3 Document Conventions... 3 Target Audience... 3 Introduction... 4 About

More information

Does your Organization Need a Managed SSL Service?

Does your Organization Need a Managed SSL Service? MSSL Order Guide 1 Ordering Guide for Managed SSL -Product Overview -Ordering Process -Managing your Account Overview of Managed SSL (MSSL) MSSL allows you to manage the complete lifecycle of multiple

More information

GlobalSign Customers. Enterprise PKI Client Authentication User Guide. Employing authentication as an additional security layer to the EPKI platform

GlobalSign Customers. Enterprise PKI Client Authentication User Guide. Employing authentication as an additional security layer to the EPKI platform GlobalSign Customers Enterprise PKI Client Authentication User Guide Employing authentication as an additional security layer to the EPKI platform I. Background information... 3 II. EPKI administrator

More information

GlobalSign Security Services for Hosting Companies

GlobalSign Security Services for Hosting Companies GlobalSign Security Services for Hosting Companies Understanding the true opportunity for Hosting Companies and ISPs to resell Online Security Services GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS

More information

Extended SSL Certificates

Extended SSL Certificates Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is

More information

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

GlobalSign Partners. Digital Certificate Reseller Quick Start Guide. Using your GCC Partner Account to Resell SSL & Client Certificates Effectively

GlobalSign Partners. Digital Certificate Reseller Quick Start Guide. Using your GCC Partner Account to Resell SSL & Client Certificates Effectively Technical Resources GlobalSign Partners Digital Certificate Reseller Quick Start Guide Using your GCC Partner Account to Resell SSL & Client Certificates Effectively v3.1 TABLE OF CONTENTS Logging In...

More information

The Advantages of Certificate Based Network Authentication

The Advantages of Certificate Based Network Authentication Achieving a Comprehensive Information Security Strategy Using Certificate based Network Authentication GLOBALSIGN WHITE PAPER John Harris for GlobalSign 1 CONTENTS Introduction... 3 Finding the Right Path...

More information

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available

More information

WebSphere Business Monitor V6.2 Business space dashboards

WebSphere Business Monitor V6.2 Business space dashboards Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 What this exercise is about... 2 Lab requirements... 2 What you should

More information

Comodo Mobile Device Manager Software Version 1.0

Comodo Mobile Device Manager Software Version 1.0 Comodo Mobile Device Manager Software Version 1.0 End User Guide Guide Version 1.0.022614 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo

More information

GlobalSign Authentication

GlobalSign Authentication GlobalSign Authentication Achieving a comprehensive information security strategy using certificate based Network Authentication GLOBALSIGN WHITE PAPER John B Harris, Security Specialist On behalf of GMO

More information

Using the Educator Dashboard

Using the Educator Dashboard Reference Guide Using the Educator Dashboard What s Inside How to Create Accounts Get to Know the Educator Dashboard How to Manage Licenses and Create Educators How to Give Accommodations to Students First

More information

avast! Small Office Administration Console Small Office Administration Console User Guide

avast! Small Office Administration Console Small Office Administration Console User Guide Small Office Administration Console User Guide 1 2 Introduction to the Small Off ice Administrat ion Console The Small Office Administration Console provides central management capability for your installation

More information

Technical resources. OneClickSSL. Microsoft IIS (6.0, 7.0 & 7.5) SSL Installer (V2.1 GUI and CLI)

Technical resources. OneClickSSL. Microsoft IIS (6.0, 7.0 & 7.5) SSL Installer (V2.1 GUI and CLI) Technical resources OneClickSSL Microsoft IIS (6.0, 7.0 & 7.5) SSL Installer (V2.1 GUI and CLI) TABLE OF CONTENTS Introduction... 3 Vouchers... 3 Before you begin... 4 OneClickSSL Requirements... 4 Operation

More information

GlobalSign Solutions. Using a GlobalSign PersonalSign Certificate to Apply Digital Signatures in Microsoft Office Documents

GlobalSign Solutions. Using a GlobalSign PersonalSign Certificate to Apply Digital Signatures in Microsoft Office Documents GlobalSign Solutions Using a GlobalSign PersonalSign Certificate to Apply Digital Signatures in Microsoft Office Documents 1 TABLE OF CONTENTS Introduction... 3 Types of Signatures... 3 Non visible Signatures....

More information

WebSphere Business Monitor V7.0 Business space dashboards

WebSphere Business Monitor V7.0 Business space dashboards Copyright IBM Corporation 2010 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 7.0 LAB EXERCISE WebSphere Business Monitor V7.0 What this exercise is about... 2 Lab requirements... 2 What you should

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started

More information

Copyright 2015 http://itfreetraining.com

Copyright 2015 http://itfreetraining.com This video will install Active Directory Federation Services on Windows Server 2012. In a previous video, an enterprise CA was installed and configured. This video will use that enterprise CA to issue

More information

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4 GlobalSignEnterprisePKISupport GlobalSignEnterpriseSolutionEPKIAdministratorGuidev2.4 1 TABLE OF CONTENTS GETTING STARTED... 3 ESTABLISHING EPKI SERVICE... 3 EPKI ADMINISTRATOR/USER CERTIFICATE... 4 ESTABLISHING

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0 Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...

More information

Web24 Web Hosting Guide

Web24 Web Hosting Guide Web24 Web Hosting Guide Welcome Dear Web24 customer, We would like to thank you for choosing Web24 as your preferred web hosting provider. To make your experience as enjoyable as possible, we have prepared

More information

Quick Help Guide SAP CRMS Login, Navigation and Layout

Quick Help Guide SAP CRMS Login, Navigation and Layout Introduction This quick help guide provides details on the following features of the SAP Customer Relationship Management system (CRMS) Roles How to log on Screen layout Moving around Maximising/minimising

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

How To Set Up A Webhosting Website On Windstream.Com

How To Set Up A Webhosting Website On Windstream.Com E-commerce Web Hosting Package Welcome To Your Windstream Hosting Service! We are pleased you have chosen us as your solutions provider to help your business become even more successful. We recognize your

More information

Access Softek, Inc. Mobile Finance Manager (MFM)

Access Softek, Inc. Mobile Finance Manager (MFM) Access Softek, Inc. Mobile Finance Manager (MFM) User Guide for Windows Mobile Devices Table Of Contents 1. Introduction...1 1.1. Product Features - Convenient and Secure...1 2. Installing MFM...2 3. Using

More information

Accessing The Doctors Clinic Physician Connect

Accessing The Doctors Clinic Physician Connect Accessing The Doctors Clinic Physician Connect The Doctors Clinic s commitment to excellence in patient care presents healthcare providers in our community access to electronic health records. Here s how:

More information

Document Services Online Customer Guide

Document Services Online Customer Guide Document Services Online Customer Guide Logging in... 3 Registering an Account... 3 Navigating DSO... 4 Basic Orders... 5 Getting Started... 5 Attaching Files & Print Options... 7 Advanced Print Options

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

Website Security: What do I need to know? What do I need to do?

Website Security: What do I need to know? What do I need to do? Website Security: What do I need to know? What do I need to do? This document describes some of the emerging security issues for and threats to websites as well as some of the options to address them.

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

WebSphere Business Monitor V6.2 KPI history and prediction lab

WebSphere Business Monitor V6.2 KPI history and prediction lab Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

Vodafone Email Plus. User Guide for Windows Mobile

Vodafone Email Plus. User Guide for Windows Mobile Vodafone Email Plus User Guide for Windows Mobile 1 Table of Contents 1 INTRODUCTION... 4 2 INSTALLING VODAFONE EMAIL PLUS... 4 2.1 SETUP BY USING THE VODAFONE EMAIL PLUS ICON...5 2.2 SETUP BY DOWNLOADING

More information

Trend ScanMail. for Microsoft Exchange. Quick Start Guide

Trend ScanMail. for Microsoft Exchange. Quick Start Guide Trend ScanMail for Microsoft Exchange Quick Start Guide Trend ScanMail for Microsoft Exchange ScanMail for Exchange This Quick Start Guide provides a step-by-step guide to installing ScanMail for Exchange,

More information

Introduction: 1. Daily 360 Website Scanning for Malware

Introduction: 1. Daily 360 Website Scanning for Malware Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover

More information

SAM Brief Student User Guide

SAM Brief Student User Guide SAM Assessment, Training and Projects for Microsoft Office December 2015 SAM Brief Student User Guide Contents Introduction 1 How to Use SAM 2 Logging in the First Time as a Pre-registered Student 2 Profile

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

DSHS Secure FTP Instructions

DSHS Secure FTP Instructions DSHS Secure FTP Instructions NOTE: Screenshots are for illustration purposes only! Please follow written directions! Important directions will be in RED. Getting logged into the DSHS secure ftp server:

More information

white paper Malware Security and the Bottom Line

white paper Malware Security and the Bottom Line Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware

More information

Basics of SSL Certification

Basics of SSL Certification Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,

More information

ithenticate User Manual

ithenticate User Manual ithenticate User Manual Updated November 20, 2009 Contents Introduction 4 New Users 4 Logging In 4 Resetting Your Password 5 Changing Your Password or Username 6 The ithenticate Account Homepage 7 Main

More information

Instructions for using VPN and accessing your files remotely

Instructions for using VPN and accessing your files remotely Instructions for using VPN and accessing your files remotely Be sure that you have the latest version of JAVA installed on your computer. Go to https://sslvpn.uco.edu and sign in using your domain username

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Elementary Website Management December 2013

Elementary Website Management December 2013 Elementary Website Management December 2013 1 Table of Contents What is WordPress? 3 What is the Website Manager App? 3 What is Google Calendars? 3 What do I use for what? 3 WordPress 4 Logging into the

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

NJCU WEBSITE TRAINING MANUAL

NJCU WEBSITE TRAINING MANUAL NJCU WEBSITE TRAINING MANUAL Submit Support Requests to: http://web.njcu.edu/its/websupport/ (Login with your GothicNet Username and Password.) Table of Contents NJCU WEBSITE TRAINING: Content Contributors...

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

Edith Cowan University Information Technology Services Centre

Edith Cowan University Information Technology Services Centre Information There are three wireless networks on campus which give you access to the ECU website, the staff intranet, the internet and other ECU resources: ECU This is the easiest to use and safest wireless

More information

GlobalSign Solutions. PersonalSign Digital Certificates. Installation Guide

GlobalSign Solutions. PersonalSign Digital Certificates. Installation Guide GlobalSign Solutions PersonalSign Digital Certificates Installation Guide 1 TABLE OF CONTENTS Introduction... 3 Installing Your Certificate Using Internet Explorer... 3 Before You Install.... 3 Security

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

Using the BWSD Help Desk Website

Using the BWSD Help Desk Website Accessing the Help Desk Website Using the BWSD Help Desk Website Open your web browser and go to http://helpdesk.bwschools.net:8080/ The Help Desk login screen will be displayed. 1. You should not have

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

HackAlert Malware Monitoring

HackAlert Malware Monitoring HackAlert Malware Monitoring Understanding the reselling opportunity for Online Security Services GlobalSign. A GMO Internet Inc group company. Reselling Malware Monitoring The GlobalSign Partner Program

More information

GlobalSign Enterprise Solutions

GlobalSign Enterprise Solutions GlobalSign Enterprise Solutions SSL Managed Service Quick Start Guide version 4.6 Managing EV, OV and IntranetSSL Certificates Across our Organization Effectively Copyright 2011-2015 GlobalSign, Inc. All

More information

Rochester Institute of Technology. Finance and Administration. Drupal 7 Training Documentation

Rochester Institute of Technology. Finance and Administration. Drupal 7 Training Documentation Rochester Institute of Technology Finance and Administration Drupal 7 Training Documentation Written by: Enterprise Web Applications Team CONTENTS Workflow... 4 Example of how the workflow works... 4 Login

More information

ithenticate User Manual

ithenticate User Manual ithenticate User Manual Version: 2.0.2 Updated March 16, 2012 Contents Introduction 4 New Users 4 Logging In 4 Resetting Your Password 5 Changing Your Password or Username 6 The ithenticate Account Homepage

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

Managed Security Web Portal USER GUIDE

Managed Security Web Portal USER GUIDE Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

DOSarrest Security Services (DSS) Version 4.0

DOSarrest Security Services (DSS) Version 4.0 DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that

More information

PureMessage for Microsoft Exchange Help. Product version: 3.1

PureMessage for Microsoft Exchange Help. Product version: 3.1 PureMessage for Microsoft Exchange Help Product version: 3.1 Document date: June 2015 Contents 1 About PureMessage for Microsoft Exchange...4 2 Key concepts...5 2.1 Key concepts overview...5 2.2 Inbound,

More information

MyInterskill LMS Student Guide

MyInterskill LMS Student Guide MyInterskill LMS Student Guide Your Guide to Mainframe Training Expanding your knowledge anywhere, anytime! www.interskill.com Table of Contents Student Home Page...3 Changing your profile and password...6

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Recommended Browser Setting for MySBU Portal

Recommended Browser Setting for MySBU Portal The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,

More information

GlobalSign Enterprise Solutions

GlobalSign Enterprise Solutions GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...

More information

Comodo LoginPro Software Version 1.5

Comodo LoginPro Software Version 1.5 Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

AT&T Website Solutions SM Online Presence Portal your control panel

AT&T Website Solutions SM Online Presence Portal your control panel .0 AT&T Website Solutions SM Online Presence Portal your control panel Welcome to AT&T Website Solutions SM. We are focused on providing you the very best web products and services including all the tools

More information

BackupAgent Management Console 4.0.1 User Manual

BackupAgent Management Console 4.0.1 User Manual BackupAgent Management Console 4.0.1 User Manual May 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes

More information

SPC Connect Configuration Manual V1.0

SPC Connect Configuration Manual V1.0 SPC Connect Configuration Manual V1.0 I-200090-1 28.11.2014 Copyright Copyright Technical specifications and availability subject to change without notice. Copyright Siemens AB We reserve all rights in

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Installation & Configuration Guide Professional Edition

Installation & Configuration Guide Professional Edition Installation & Configuration Guide Professional Edition Version 2.3 Updated January 2014 Table of Contents Getting Started... 3 Introduction... 3 Requirements... 3 Support... 4 Recommended Browsers...

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Certificate Inventory Tool (CIT) Quick Start Guide

Certificate Inventory Tool (CIT) Quick Start Guide Certificate Inventory Tool (CIT) Quick Start Guide 1 v.1.2 Table of Contents Contents Introduction... 3 Logging On... 4 Certificate Inventory... 4 Main Menu... 5 First Steps - Overview... 6 Quick Scan...

More information

Old National offers both Mobile Web and a Mobile App, so you can choose the best fit for your device type. Either solution enables you to:

Old National offers both Mobile Web and a Mobile App, so you can choose the best fit for your device type. Either solution enables you to: Your bank. For your mobile life. Getting started You live life on the move, and Old National Mobile Banking goes right along with you. Whether you re at work, play, running errands or on vacation, you

More information

IST 195 Laboratory Session 8 - Privacy

IST 195 Laboratory Session 8 - Privacy IST 195 Laboratory Session 8 - Privacy In this lab, students will be asked to access a web-based content management cloud storage system. As learned in class, cloud computing is that allows files to be

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green).

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). You will be presented with a dialog box asking for you to enter an ad-hoc

More information

Quick Start Guide. www.uptrendsinfra.com

Quick Start Guide. www.uptrendsinfra.com Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your

More information

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information