CORPORATE SOLUTIONS 4.07. RELEASE NOTES



Similar documents
SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

Remote Setup and Configuration of the Outlook Program Information Technology Group

ISAM TO SQL MIGRATION IN SYSPRO

Installation Guide Marshal Reporting Console

User Manual Brainloop Outlook Add-In. Version 3.4

Connecting to

Welcome to Remote Access Services (RAS)

MaaS360 Cloud Extender

ReCrystallize.com cviewserver Crystal Reports Scheduler Top Issues and Solutions Page 1

Setup PPD IT How-to Guides June 2010

TaskCentre v4.5 MS SQL Server Trigger Tool White Paper

Deployment Overview (Installation):

Installation Guide Marshal Reporting Console

TaskCentre v4.5 Send Message (SMTP) Tool White Paper

Recommended Backup Plan for SQL 2000 Server Database Servers

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway

Configuring an Client for your Hosting Support POP/IMAP mailbox

Service Desk Self Service Overview

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Safe PST Backup Enterprise Edition Administrator Guide

Learn More Cloud Extender Requirements Cheat Sheet

VMware View Windows XP Optimization

Using Identity Finder. ITS Training Document

STIOffice Integration Installation, FAQ and Troubleshooting

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

o How AD Query Works o Installation Requirements o Inserting your License Key o Selecting and Changing your Search Domain

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Avatier Identity Management Suite

Configuring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool

Setup O365 mailbox access on MACs

Lab 12A Configuring Single Sign On Service

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

MPDS Configuration Sheet Windows 2000

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

Fermilab Time & Labor Desktop Computer Requirements

NETWRIX CHANGE NOTIFIER

Meeting Minutes for January 17, 2013

Diagnostic Manager Change Log

EWS Calendar List Web Part Sharepoint 2010 Installation Instructions

Client: Cisco Software VPN Client Version: or higher Platform: Windows 2000/XP & VISTA-32bit( )

Optimal Payments Extension. Supporting Documentation for the Extension Package v1.1

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Software Update Notification

Ten Steps for an Easy Install of the eg Enterprise Suite

Table of Contents. About... 18

SQL 2005 Database Management Plans

FUJITSU Software ServerView Suite ServerView PrimeCollect

HP Archiving software for Microsoft Exchange

NASDAQ BookViewer 2.0 User Guide

Telelink 6. Installation Manual

A Beginner s Guide to Building Virtual Web Servers

Blue Link Solutions Terminal Server Configuration How to Install Blue Link Solutions in a Terminal Server Environment

MedNetwork Systems Impulse Database Management

CSC IT practix Recommendations

Aras Innovator Internet Explorer Client Configuration

Hardware Requirements

TaskCentre v4.5 File Transfer (FTP) Tool White Paper

Microsoft Certified Database Administrator (MCDBA)

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

Opendiem Suite ChangeLog and History

BASIC TECHNICAL FEATURE DESCRIPTION

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1

Technical Guide FAQ. Celcom Net Safe

Junos Pulse Instructions for Windows and Mac OS X

Customers FAQs for Webroot SecureAnywhere Identity Shield

Configuring and Monitoring SysLog Servers

BackupAssist SQL Add-on

Uninstalling and Reinstalling on a Server Computer. Medical Director / PracSoft

FAQs for Webroot SecureAnywhere Identity Shield

User Guide. Sysgem SysMan Remote Control. By Sysgem AG

CallRex 4.2 Installation Guide

Connector for Microsoft Dynamics Installation Guide

Phone support is available if you have any questions or problems with the NASP PRO software during your tournament.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE Savision B.V. savision.com All rights reserved.

Aras Innovator Internet Explorer Client Configuration

Your Outlook Mailbox can be accessed from any PC that is connected to the Internet.

Server 2008 R2 - Generic - Case

Getting Started Guide

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents

Outlook Plug-In. Send Conference Invites from Outlook. Downloading Outlook Plug-In CONFERENCING & COLLABORATION RESERVATIONLESS-PLUS

ABELMed Platform Setup Conventions

Using McAllister Payment Solutions and Updating to AVImark version

Fixes for CrossTec Enterprise Management System

Intelligent Monitoring Configuration Tool

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Helpdesk Support Tickets & Knowledgebase

Welcome to Microsoft Access Basics Tutorial

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

Provisioning Services Architecture Overview. User Account Context / Service Account Context

Getting Started Guide

Restricted Document. Pulsant Technical Specification

PBX Remote Line Extension using Mediatrix 4104 and 1204 June 22, 2011

1) Update the AccuBuild Program to the latest version Version or later.

HP Connected Backup Online Help. Version October 2012

Copyright 2013, SafeNet, Inc. All rights reserved. We have attempted to make these documents complete, accurate, and

The Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq.

Setup Instructions Glion Online

Configuring and Monitoring AS400 Servers. eg Enterprise v5.6

Sage 100 What s New in Tracey Brinkman Senior Consultant BKD Technologies tbrinkman@bkd.com

Organizing and Time with Outlook

Transcription:

CORPORATE SOLUTIONS 4.07. RELEASE NOTES CONTENTS 1. Centralized Administratin: AdminSecure... 2 1.1. Cmpatibility with previus versins f AdminSecure... 2 2. Panda fr Desktps (2000/XP/Vista/Win7) and Panda fr File Servers (2000/2003/2008): Changes cmmn t bth prducts... 2 2.1. Prtectin imprvements... 2 2.1.1. Clud-based scanning... 2 2.1.1.1. Disabling clud-based scans... 3 2.1.2. Checking trusted digital signatures in suspicius items detected... 4 2.2. Cmpatible with Micrsft Office 2010... 4 2.3. Detectin f malware run frm a pen drive (ExFAT file system)... 5 2.4. Bugs crrected... 5 3. Panda fr Desktps (2000/XP/Vista/Win7): New Features... 6 3.1. Micrsft Outlk 2010... 6 3.2. On-demand scans f email include Windws Live Mail messages... 7 4. ANNEX I: Versins table... 9

1. CENTRALIZED ADMINISTRATION: ADMINSECURE 1.1. Cmpatibility with previus versins f AdminSecure The functinal changes described here have been incrprated int the prducts Panda Security fr Desktps and Panda Security fr File Servers. These new prduct versins will be cmpatible with AdminSecure 4.04.XX and 4.05.XX. 2. PANDA FOR DESKTOPS (2000/XP/VISTA/WIN7) AND PANDA FOR FILE SERVERS (2000/2003/2008): CHANGES COMMON TO BOTH PRODUCTS 2.1. Prtectin imprvements 2.1.1. Clud-based scanning Panda Security fr Desktps and Panda Security fr File Servers incrprate clud-based scanning. These are the characteristics f this type f scanning: There will be a malware cache that will expire after 24 hurs. Clud queries wn t have a digital gdware signature cache. The clud scans will be able t classify items as suspicius. All cnfiguratin parameters must be btained frm ne r mre cnfiguratin files. Scheduled scans will als make use f lcal signatures. All executable files will be scanned frm the clud; there will be n limit n the types f files. Exclusins n the basis f reclassificatin f suspicius items will last fr ne mnth. It will be pssible t scan flders recursively (as at present), and nn-recursively (new feature). Memry scan The memry scan will scan the same items as at present. The scan will be launched every 2 hurs. Hwever, if the cmputer cannt send queries t the clud (either because it is disabled r there is n Internet cnnectin), it wn t be launched every 2 hurs. It will be launched with the frequency established prir t the inclusin f clud scans. Everything that exists in memry will be scanned using the cache knwledge s as nt t launch clud scans n items that are already identified. High-risk flder scan 2/9

By high-risk flders we mean thse flders that Panda Security has identified as typical malware cntainers. Panda Security cnsiders the fllwing high-risk flders shuld be scanned: The rt directry f all lcal drives The prfile f all lgged-in users The system temprary flder The Windws flder (nn-recursively) The System32 flder The scan will take place every 24 hurs. If the cmputer cannt send queries t the clud (either because it is disabled r there is n Internet cnnectin), the scans will be perfrmed every 48 hurs using the signature file. Exclusins. The fllwing wn t be scanned: Active users recycle bins On servers, these scans will wrk as fllws: They will be perfrmed nce a week. If the cmputer cannt send queries t the clud, they will be perfrmed nce every tw weeks. Shared drives wn t be scanned. 2.1.1.1. Disabling clud-based scans Yu can disable the clud-based scans using the registry keys. It is nt pssible, hwever, t d s frm the AdminSecure Cnsle. Yu can disable: Memry scans. Backgrund scans. Clud queries as a whle. 3/9

2.1.2. Checking trusted digital signatures in suspicius items detected We have imprved the sensitivity f the heuristic engine used by the file permanent prtectin and ndemand scans f Panda Security fr Desktps and Panda Security fr File Servers. On-demand scanning When, in an n-demand scan, a suspicius item is detected in a signed file, the signature will be cntrasted with the Panda Security trusted digital signature file. This checking is synchrnus (it takes place at the time f detectin): If the detected file has a trusted digital signature, it wn t be reprted as suspicius r sent t quarantine. If the detected file DOESN T have a trusted digital signature, it is reprted as suspicius and sent t quarantine. File permanent prtectin The prgrams als check the digital signature f suspicius items detected by the file permanent prtectin. The gdware cache will be cntinuusly used and fed with new data, if there is any, after each update f the signature file. 1:N signatures Bth prtectins include detectin f suspicius items using 1:N signatures. 2.2. Cmpatible with Micrsft Office 2010 Panda fr Desktps and Panda fr File Servers are cmpatible with all Micrsft Office 2010 extensins. The ptin t scan all Office dcuments, available in the antivirus settings fr Windws desktps and servers in the AdminSecure cnsle, lets yu scan Office 2010 dcuments: 4/9

2.3. Detectin f malware run frm a pen drive (ExFAT file system) Panda fr Desktps and Panda fr File Servers detect malware in any ExFAT frmatted drive, fr example, a pen drive. The file permanent prtectin detects malware accessed frm this type f drive. On-demand scans f ExFAT flders r drives detect all types f malware except rtkits. 2.4. Bugs crrected Incmpatibility prblems with the SecMaker NetID sftware Incmpatibility prblems installing the prducts shield n HP Prliant G6 servers. A blue screen was displayed after upgrading Panda fr Desktps t versin 4.05.10 Permanent prtectin cunters were nt restarted n clicking the Reset cunters buttn. Items were nt manually deleted frm the quarantine r when they exceeded the day limit t be autmatically deleted. 5/9

Memry blckage n launching an n-demand scan f All My Cmputer. Occasinally, n disabling the TruPrevent and NetwrkSecure prtectin, they kept n running. When Panda fr Desktps was updated t versin 4.05.10/15 the shared files culd nt be accessed. When a scan was scheduled the status was nt updated. File lading t an NLB server was very slw. Errr cde 2101 ccurred n updating the signature file n wrkstatins. Prblems ccurred n receiving a warning email with Curier Mail Server 2.08. TruPrevent and Netwrk Secure executin errrs. 3. PANDA FOR DESKTOPS (2000/XP/VISTA/WIN7): NEW FEATURES 3.1. Micrsft Outlk 2010 Even thugh Panda Security fr Desktps desn t include a specific mail interceptin technlgy versin fr Outlk 2010, if des have a number f features cmpatible with Outlk 2010: Mail received in Outlk 2010 under POP3 and SMTP will be scanned. Interceptin f these messages will take place at prtcl level. Yu can run n-demand scans frm the prtectin's pp-up menu: Yu can run n-demand scans frm the AdminSecure cnsle: 6/9

There are, hwever, the fllwing limitatins: There will be n ptin t scan messages frm the Outlk 2010 tlbar. The ptin Scan with Panda Security fr Desktps will nt be available in the 'Tls' menu f Outlk 2010. There will be n ptin t classify messages as spam r nt spam frm the Outlk 2010 tlbar. There will be n MAPI permanent mail prtectin; i.e. messages exchanged between Outlk 2010 and the Exchange server using MAPI will nt be scanned during the interceptin, but lcally. 3.2. On-demand scans f email include Windws Live Mail messages Panda Security fr Desktps will als scan messages stred lcally in Windws Live Mail. On-demand scans launched frm the prtectin s pp-up menu will scan Windws Live Mail messages. On-demand scans cnfigured frm the AdminSecure cnsle will scan Windws Live Mail messages. 7/9

8/9

4. ANNEX I: Versins table 4.1 Panda fr Business 4.07.00 MODULE AdminSecure VERSION 4.05.xx Panda fr Desktps (2000/XP/Vista/Win7) 4.07.10 Panda fr File Servers (2000/2003/2008) 8.07.10 9/9