Seqrite Antivirus for Server

Similar documents
Seqrite Antivirus Server Edition

User Guide. Quick Heal Total Security Quick Heal Technologies (P) Ltd.

Endpoint protection for physical and virtual desktops

ESET SMART SECURITY 6

Quick Heal Exchange Protection 4.0

Endpoint protection for physical and virtual desktops

ESET SMART SECURITY 9

Get Started Guide - PC Tools Internet Security

Symantec AntiVirus Enterprise Edition

F-Secure Internet Security 2012

Antivirus. Quick Start Guide. Antivirus

McAfee Internet Security Suite Quick-Start Guide

Symantec Protection Suite Small Business Edition

The Key to Secure Online Financial Transactions

Symantec Protection Suite Small Business Edition

Symantec Endpoint Protection

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 8

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

Internet Security Suite

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Pro Security

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Desktop and Laptop Security Policy

Bitdefender Internet Security 2015 User's Guide

Symantec Endpoint Protection

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Total Defense Endpoint Premium r12

Kaspersky Total Security User Guide

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

This document provides information to install X-Spam for Microsoft Exchange Server

Kaspersky Small Office Security User Guide

High Speed Internet - User Guide. Welcome to. your world.

Kaspersky Internet Security User Guide

ESET NOD32 Antivirus 4

Kaspersky Internet Security

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

FortiClient dialup-client configurations

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Protegent 360- Complete Security Software

Shaw Secure Powered by McAfee Registration and Installation

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

contents 1. ESET Smart Security Installation Beginner s guide Work with ESET Smart Security...12

KASPERSKY LAB. Kaspersky Internet Security 7.0 USER GUIDE

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

Spyware Doctor Enterprise Technical Data Sheet

Contents. McAfee Internet Security 3

Ad-Aware Antivirus Overview

BitDefender Client Security Workstation Security and Management

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

ESET Endpoint Protection Advanced

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

User Documentation Web Traffic Security. University of Stavanger

User's Guide. Copyright 2013 Bitdefender

Keystroke Encryption Technology Explained

For Businesses with more than 25 seats.

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Bitdefender Total Security 2016 User's Guide

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Seqrite Mobile Device Management

Kaspersky Small Office Security USER GUIDE

Ten Tips to Avoid Viruses and Spyware

PGP Universal Satellite Version 2.7 for Windows Release Notes

How To Protect Your Computer From A Malicious Virus

Kaspersky PURE User Guide

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

Bitdefender Total Security 2015 User's Guide

AND SERVER SECURITY

AND SERVER SECURITY

Avira Small Business Security Suite. HowTo

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

CA Host-Based Intrusion Prevention System r8.1

How To Manage A System Vulnerability Management Program

Integrated Protection for Systems. João Batista Territory Manager

Spyware: Securing gateway and endpoint against data theft

Internet basics 2.3 Protecting your computer

NOD32 Antivirus 3.0. User Guide. Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware. we protect your digital worlds

ViRobot Desktop 5.5. User s Guide

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Sage Grant Management System Requirements

How to stay safe online

Transcription:

Enterprise Security Solutions by Quick Heal Seqrite Best server security with optimum performance.

Product Highlights Easy installation, optimized antivirus scanning, and minimum resource utilization. Robust and interoperable technology makes it one of the most dynamic antivirus software tools available. Reduced transfer time for updates guarantees that your server runs flawlessly under all circumstances. Enhanced user interface gives easy access to all four core areas of configuration. Features List Simpler and smarter security provides complete protection to your server. Low footprint of this suite ensures protection against latest threats without slowing your system. Optimized antivirus scanning engine Detects viruses before the system is infected. The antivirus engine is light on server resources and quick in detecting new and unknown threats. It scans critical system areas that are vulnerable to infection. The background scanning does not compromise server security and other popularly used applications. Browsing Protection This web security feature enables you to monitor and filter all virus-infected web traffic securing your online work environment. It is browser independent and has little impact on browsing speed.

Anti-KeyLogger Programs called keyloggers stealthily record what a user types on their computer keyboard, and share the stolen information with the malware author. Anti-Keylogger protects valuable and sensitive data from getting stolen by such programs. Vulnerability Scan Detects known security vulnerabilities in the Operating System settings and applications. The feature also helps fix vulnerabilities found in the OS settings. Virus Protection Protects your server from virus infection by continuously monitoring and blocking virus attacks. Blocks and prevents virus attacks from email attachments, Internet downloads, network, FTP, floppy, data storage devices, CD-DVD ROM file executable tools and during copying of suspected files. Displays virus warnings on a server system and notifies you only when a virus-infected file is found or a virus-like activity is detected. Data Theft Protection Confidential data on server is valuable but often vulnerable to theft. This feature blocks access to unauthorized removable drives such as USB drives, pen drives, and memory cards. This blocks transfer of data between the server and these drives thus ensuring strong network security.

Email Protection Because email is the most widely used tool for communication, attackers may use it as a medium to spread virus infection. The Mail Protection feature is redesigned to provide an effective countermeasure against such threats to servers. It ensures that only trusted or genuine email clients communicate on SMTP protocol and no worm uses the server as an infection spreading medium. AntiSpam The powerful spam filter identifies junk and unwanted emails as Spam. Phishing Protection This feature prevents you from accessing phishing and fraudulent websites. Phishing is a fraudulent attempt, usually made through email, to steal your confidential data such as banks details, user name and password, and personal information. As soon as you access a phishing website, it is blocked to prevent any phishing attempts. USB Drive Protection The autorun feature of removable devices is one of the ways through which malware is spread and hence your network security may come under threat. This feature secures removable devices such as pen drives, memory cards, and other USB devices and prevents spread of infection through autorun malware.

Autorun Protection A preventive security measure for server antivirus, it blocks Autorun malware from entering the server by disabling the Autorun feature of the server. Firewall Firewall offers multiple settings that you can configure depending on the level of protection you desire for your network. You can set protection levels to High, Medium or Low for Internet traffic and applications that try to connect to your network. It also comprises the Stealth Mode which prevents hackers from tracing your system and attacking it. Intrusion Detection and Prevention System (IDS/IPS) Advanced protection that proactively detects and prevents malicious activity which may exploit system vulnerabilities in the network. AntiSpyware, AntiMalware and AntiRootkit A comprehensive protection against spyware, malware and rootkits for best IT security management.

The AntiSpyware feature provides real-time protection by blocking programs that behave like spyware. It also scans registry entries, system files, and installed programs for spyware activity and lists out threats, if found on the system. The combined AntiMalware feature prevents installation of rogueware and other potentially unwanted applications (PUA). Detects and cleans rootkits proactively through a deep system scan. System Requirements To use Seqrite, your system must meet the following minimum requirements. However, we recommend that your system should have higher configuration to obtain better results. Note: The requirements are applicable to all flavors of the Windows-based server operating systems. The requirements are applicable to the 32-bit and 64-bit of Windows-based server operating systems unless specifically mentioned. General requirements» CD/DVD Drive» Internet Explorer 6 or later» Internet connection to receive updates» 2.8 GB hard disk space System requirements for various Microsoft Windows Server OS Windows Server 2012 R2 / Windows Server 2012» Processor: 1.4 GHz Pentium or faster» RAM: 2 GB Windows Server 2008 R2 / Windows Server 2008» Processor: 1GHz for 32-bit or 1.4 GHz for 64-bit» RAM: Minimum 512 MB (Recommended 2 GB)

Windows Server 2003» Processor: 550 MHz for 32-bit or 1.4 GHz for 64-bit» RAM: 256 MB for 32-bit or 512 MB for 64-bit Windows 2000 Server (Service Pack 4)» Processor: 300 MHz Pentium or faster» RAM: 512 MB Supported Terminal Servers for Microsoft Windows Server» Microsoft Windows Server 2012» Microsoft Windows Server 2011» Microsoft Windows Server 2008» Microsoft Windows Server 2003» Microsoft Windows Server 2000 POP3 email clients compatibility Seqrite supports» Microsoft Outlook Express 5.5 and later» Microsoft Outlook 2000 and later» Netscape Messenger 4 and later» Eudora» Mozilla Thunderbird» IncrediMail» Windows Mail Seqrite does not support» IMAP» AOL» POP3s with Secure Sockets Layer (SSL)» Web-based email such as Hotmail and Yahoo! Mail» Lotus Notes Note: The Email Protection feature is not supported on encrypted email connections that use Secure Sockets Layer (SSL).

Corporate Office Quick Heal Technologies Limited Marvel Edge, Office No.7010 C & D, 7th Floor, Viman Nagar, Pune - 411014, Maharashtra, India Email: info@seqrite.com Website: This document is current as of the initial date of publication and may be changed by Quick Heal at any time. Copyright 2016 Quick Heal Technologies Ltd. All rights reserved. All Intellectual Property Right(s) including trademark(s), logo(s) and copyright(s) are properties of their respective owners.