RESCUE CD. User s Guide



Similar documents
F-Secure and Server Security. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

AND SERVER SECURITY

AND SERVER SECURITY

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

P e r s o n a l E d i t i o n For Windows 95, 98, NT

Samsung Drive Manager User Manual

Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment

Diamond II v2.3 Service Pack 4 Installation Manual

BEST PROTECTION FOR DESKTOPS AND LAPTOPS. Client Security

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite

Avira Rescue System. HowTo

Also you need the C-MOR ISO file. This file you will find following this link:

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

Windows BitLocker Drive Encryption Step-by-Step Guide

SOFTWARE UPDATER A unique tool to protect your business against known threats

ez Agent Administrator s Guide

SecuraLive ULTIMATE SECURITY

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

How to Test Out Backup & Replication 6.5 for Hyper-V

2.8.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 16

Disaster Recovery Guide

What Is Ad-Aware Update Server?

F-Secure Mobile Security for Business. Getting Started Guide

Operating System Installation Guide

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

Activation Key usage and Windows 7 Professional installation guide

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server Version 1

This document provides information to install X-Spam for Microsoft Exchange Server

Avira Rescue System Release Information

Sophos for Microsoft SharePoint Help. Product version: 2.0

ViRobot Desktop 5.5. User s Guide

Table of Contents. Online backup Manager User s Guide

F-Secure Internet Security 2012

2. Installation and System requirements

Managed Antivirus Quick Start Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Citrix EdgeSight Active Application Monitoring Installation Guide

Release Notes for Websense Security v7.2

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)

UNCOMPROMISED SECURITY FOR ALL VIRTUAL ENVIRONMENTS. Security for Virtual and Cloud Environments

Operating Instructions - Recovery, Backup and Troubleshooting Guide

NETFORT LANGUARDIAN INSTALLING LANGUARDIAN ON MICROSOFT HYPER V

SafeGuard Enterprise Web Helpdesk

Recovery BIOS Update Instructions for Intel Desktop Boards

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

User Manual. HitmanPro.Kickstart User Manual Page 1

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

Getting Started. rp5800, rp5700 and rp3000 Models

SharpdeskTM R3.1. Installation Guide Version

Symantec AntiVirus Corporate Edition Patch Update

Installing Windows 98 in Windows Virtual PC 7 (Windows Virtual PC)

F-Secure Internet Gatekeeper Virtual Appliance

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

Getting Started User s Guide

Tutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD

Orange Apps UserLogonUSB V1.0

Avira Exchange Security Small Business Edition. Quick Guide

Windows 2003 Server Installation Guide

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

F-Secure Anti-Virus. for Windows Servers. Administrator s Guide

Sophos for Microsoft SharePoint Help

Sophos Computer Security Scan startup guide

User Guide Max Secure Recovery CD/USB creation

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

Plexxi Control Installation Guide Release 2.1.0

HP ProtectTools Embedded Security Guide

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

AccessData. Triage. Quick Start Guide. Published: December 2011

Sophos for Microsoft SharePoint startup guide

DOCUMENTATION MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS

ThinkServer RD350 and RD450 Operating System Installation Guide

PHD Virtual Backup for Hyper-V

Contents. McAfee Internet Security 3

Airtel PC Secure Trouble Shooting Guide

Dual-boot Windows 10 alongside Windows 8

SystemTech AntiSpyware Manual

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Ocster Backup - Rescue System

Intel Matrix Storage Console

WA1625 Web Services Development Using WebLogic Server v10. Classroom Setup Guide. Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc.

DP-313 Wireless Print Server

Intel Data Migration Software

Magic Card Plus User Manual

Network Installation Guide. WorkForce 610 Series Artisan 710 Series

Administering Windows-based HP Thin Clients with System Center 2012 R2 Configuration Manager SP1

Intel Data Migration Software

Network Installation Guide. Artisan 810 Series

Motorola Phone Tools. Quick Start

User Manual. Copyright Rogev LTD

HP EliteBook and ProBook Notebook PCs - Upgrading from Windows 7 to Windows 8

Attix5 Pro Storage Platform

WHITE PAPER. HP Guide to System Recovery and Restore

Data Collection Agent for Active Directory

Best Practice Document Hints and Tips

MAC/OSX - How to Encrypt Data using TrueCrypt. v

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

Network Attached Storage System Recovery Procedure

Polycom CMA System Upgrade Guide

Transcription:

RESCUE CD User s Guide

2 CONTENTS 1. When to use the Rescue CD 2 1.1 System Requirements 2 1.2 Using the Rescue CD 3 1.2.1 Using a USB drive 3 Recommended method 3 Alternative method 4 1.2.2 Automate the scanning process 4 Preparing the USB drive 4 1.2.3 Making a bootable USB drive 5 1.3 Disclaimer 5 1. WHEN TO USE THE RESCUE CD You can use the Rescue CD to scan your computer and quarantine harmful files. There are two main situations when you should use the Rescue CD: The computer no longer starts, as a harmful application has corrupted the operating system. In this case, you can use the Rescue CD to scan the computer and quarantine the application. This may allow the operating system to start properly again. If you suspect that a harmful application has compromised your security software. You can use the Rescue CD to check this, as it is independent of the operating system. If the computer cannot be recovered, you can also use Rescue CD and a USB drive to save your important files. Note that if you copy data from the computer to the USB drive, this data may contain viruses or other harmful content. The Rescue CD cannot scan encrypted disks. This includes, for example, disks that use Windows BitLocker Drive Encryption. Note: Using the Rescue CD on a working operating system may rename essential system files and so cause your operating system to no longer start. If this happens, you can use your system repair disk to reinstall the operating system. Note that this may reinstall a fresh operating system, which may remove any personal settings and files that you have. 1.1 SYSTEM REQUIREMENTS To use the F-Secure Rescue CD, the computer must meet the following minimum requirements. x86 compatible At least 1024 MB of RAM Startup from a CD or USB Connected to the Internet or be able to use a USB drive

RESCUE CD USER S GUIDE 3 1.2 USING THE RESCUE CD Follow these instructions to use the Rescue CD. Follow these instructions: 1. Place the F-Secure CD in your CD drive and switch the computer on. After a few seconds you should see a prompt that shows F-Secure Rescue CD. Note: If you do not see the F-Secure Rescue CD screen, check that the computer can start from CD. To do so: 1. Restart the computer. 2. Hold the BIOS options key while the computer starts, usually this is one of F1, F2, F10, F12 or DELETE. If none of these work, consult the documentation for the computer. 3. Change the option that chooses which device the BIOS tries to find the operating system from (the boot device), so that the CD drive is searched first. 4. Save settings and restart the computer. 2. Press ENTER within 15 seconds after you see the prompt to start Rescue CD. 3. Use the arrow keys to select Start scan and press ENTER. Note: If you connect to the Internet through a proxy, select Proxy settings before you start. 4. Wait for the latest virus definition database to be downloaded from F-Secure. This is finished when you see the End User License Agreement window. 5. Press PAGEDOWN to read the agreement and then select Next and press ENTER. 6. Select I Agree and press ENTER if you agree to the terms. 7. Select which drives you want to scan. Note: The Master Boot Record is a small section at the start of a disk that can be used to hide malware. We recommend that you scan Master Boot Records. 8. Select Proceed to scan and press ENTER. 9. When the scan is finished, press ENTER to see the scan report. 10. If the scan found any harmful files, it shows which files have been renamed. Select Next and press ENTER when you are ready to continue. 11. Select Restart and press ENTER. 12. Wait for 5 seconds for the computer to switch off. The computer restarts. 13. If you see the same screen as you did in step 1, wait for 15 seconds for the computer to start normally. 1.2.1 USING A USB DRIVE You can use the USB drive to fix a computer that cannot download the Rescue CD updates because it cannot connect to the Internet. You can download the Rescue CD updates to a USB drive using a healthy computer that has an Internet access. The USB drive must be more than 1024 MB and less than 16 GB in size for the Rescue CD to recognize it. In addition, the USB drive must have at least 400 MB of free space. Recommended method The Rescue CD can copy the database files to an USB drive automatically, if you prepare the USB drive beforehand. Follow these instructions to copy the latest databases to the USB drive: 1. Create a new directory called fsecure to the USB drive. 2. Go to the fsecure directory and create a directory called rescuecd under the fsecure directory. 3. Start the Rescue CD while the USB drive is still connected to the computer. When the Rescue CD starts, it finds the USB drive you have configured for it. 4. Select Next when the Rescue CD notifies you that the memory stick has been found. 5. The Rescue CD starts to download the latest databases. The Rescue CD has finished downloading databases when the end-user license agreement appears. 6. The memory stick is ready and you can remove both the CD and the memory stick. 7. Insert the memory stick to the computer you want to fix and use the Rescue CD to boot the computer.

4 Alternative method You can download and copy the latest databases to an USB drive manually. Follow these instructions to download the latest databases: 1. On a healthy computer with Internet access, Insert an empty USB drive. 2. Open http://download.f-secure.com/latest/ fsdbupdate9-packed.run with your web browser. Your web browser asks you what you want to do with the file in the web site. 3. Choose to save the file to your computer. 4. After the web browser has finished downloading the file, go to the directory where you downloaded the fsdbupdate9-packed.run file and copy it to the USB drive. 5. Insert this USB drive in the computer on which you want to use the Rescue CD. 6. Follow the basic instructions on how to use the Rescue CD. 1.2.2 AUTOMATE THE SCANNING PROCESS You can set up a USB drive to make the Rescue CD process almost automatic. You can: preload virus definition database updates to the USB drive to fix a computer without Internet access, define proxies that Rescue CD will use to download updates, and set Rescue CD to skip the wizard and automatically clean the computer. The USB drive must be 1024 MB or greater in size. Preparing the USB drive You need to prepare the USB drive for the automatic scanning tasks. To set up your USB drive: 1. Create a new directory called fsecure to the USB drive. 2. Go to the fsecure directory and create a directory called rescuecd under the fsecure directory. 3. Start the Rescue CD while the USB drive is still connected to the computer and follow the basic instructions on how to use the Rescue CD. This USB drive now contains a virus definition database and is ready to use. Scanning the computer automatically After you have prepared the USB for the Rescue CD, you can configure it to run through the scan process automatically. Follow these instructions: 1. Open the file fsecure/rescuecd/config with a text editor. 2. Add the text timeout=1 to the file. With this value, you have 1 second between each step of the Rescue CD process before the program selects the default option automatically.

RESCUE CD USER S GUIDE 5 3. If you can access the Internet from the computer that you want to fix only through a proxy, you can edit the proxy settings in the same config file. To download updates through predefined proxies, add the following line to the config file: http_proxies=http://user:password@ address:port Note: http://, user, password, and port are optional but the address field is mandatory. For example, the following is a valid proxy setting: http_proxies=sam:abc123@proxy.example.com:8090, http://sally@proxy.us.example.com, proxy.global.example.com. 4. To use the USB drive, insert it into the computer that you want to fix and use Rescue CD as normal. 1.2.3 MAKING A BOOTABLE USB DRIVE If you do not want to use the CD, you can make a bootable USB drive that has the whole rescue CD content. You need the UNetbootin application to make a bootable USB drive. Using Unetbootin: 1. Download the Unetbootin application from its homepage (http://unetbootin.sourceforge.net). 1.3 DISCLAIMER "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice. Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation. This product may be covered by one or more F-Secure patents, including the following: GB2353372, GB2366691, GB2366692, GB2366693, GB2367933, GB2368233, GB2374260 Copyright 2014 F-Secure Corporation. All rights reserved 2. Insert the memory stick that you want to use. 3. Run the Unetbootin application. 4. In the main window, choose Diskimage and then click "..." to browse for the rescue-cd ISO image file. 5. Click OK to install files from the image file to the memory stick. 6. When the installation is complete, click Exit. 7. Download the Rescue CD updates to the USB drive to make a fully self-contained drive that does not require any network access. Follow the instructions in the previous section for more information. 8. You can remove the memory stick now and use it in a computer that you want to scan.

SWITCH ON FREEDOM F-Secure is an online security and privacy company from Finland. We offer millions of people around the globe the power to surf invisibly and store and share stuff, safe from online threats. We are here to fight for digital freedom. Join the movement and switch on freedom. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd.