Small Office Security 2. Scan PC for viruses and vulnerabilities

Size: px
Start display at page:

Download "Small Office Security 2. Scan PC for viruses and vulnerabilities"

Transcription

1 Small Office Security 2 Scan PC for viruses and vulnerabilities

2 Table of content Table of content... 1 Scan PC for viruses... 2 What is Scan... 2 Starting scan... 2 Starting scan from the main application window... 2 Creating a shortcut to start scan... 4 Starting scan under a different account... 4 Changing security level... 5 Changing an action performed on detected threat... 6 Default action... 6 Actions defined by the user... 7 Actions for each object... 7 How to specify an action on detected threats... 8 Creating scan schedule... 9 Scan scope Creating list of scan objects Changing the type of objects to scan Scan optimization Scan of compound files Selecting scan method Selecting scan technologies Scanning removable drives on connection Vulnerability scan What is vulnerability scan Starting vulnerabilities scan Starting Vulnerabilities scan task Creating shortcut Creating scan schedule Creating a list of scan objects for vulnerabilities scan Starting vulnerabilities scan task under different account

3 Scan PC for viruses What is Scan Scanning the computer for viruses and vulnerabilities is one of the most important tasks in ensuring the computer's security. In the result of scan the possibility of spreading malicious programs that have not been discovered by protection components, for example, because of a low security level set, is detected. Developers of malicious programs make a lot of efforts to hide malware activity, which is why you may not know that malware is present on your PC. During the installation of KSOS 2, the quick scan task is performed automatically. The aim of this task is to find and neutralize malicious programs in operating system startup objects. Kaspersky Lab specialists distinguish the following virus scan tasks: Object Scan. Any object of the computer's file system can be scanned. Full Scan. The following objects are scanned by default: system memory, programs run on startup, system backup, databases, hard drives, removable storage media and network drives. Quick Scan. Operating system startup objects are scanned. After the virus scan task starts, its progress is displayed in the Scan section of the main application window, in the field under the name of the started task. When searching for threats, information on the results is logged in a report. The Scan section also contains the information when the scan task was stopped or finished. The time reference is a link which opens a window with the task short report. Starting scan Starting scan from the main application window The tasks Full Scan, Quick Scan and Objects Scan can be started from the main application window. For this perform the following actions: 2. Select the Scan section. 3. In the right part of the window launch the necessary task by clicking the corresponding button. 2 25

4 The Scan tab displays information when the scan task was paused or finished, and how long the scan will take if the task is being executed at the moment. The time reference is a link which opens a window with the task short report. The tasks Full Scan and Quick Scan can be started using an existing shortcut. 3 25

5 Creating a shortcut to start scan The application provides the option of creating shortcuts for a quick start of full scan tasks and quick scan tasks. This allows starting the required scan task without opening the main application window or the context menu. To create a shortcut for scan task start, please do the following: 2. In the right upper part of the window click the Settings link. 3. In the upper part of the Settings window select the Scan section. 4. In the left part of the Settings window select General Settings. 5. In the right part of the window in the Scan tasks quick run section click the Create shortcut button next to the necessary task (Full Scan, Quick Scan). 6. In the Save as window browse the path to save the shortcut and its name. By default the shortcut is created with a name of a task on the Desktop of the current computer user. 7. Click the OK button. Starting scan under a different account By default scan tasks are started under an account you registered in the system. If you account does not have enough rights, you can specify a different account under whose rights each scan task will be started. To specify an account, perform the following steps: 2. In the right upper part of the window click the Settings link. 3. In the upper part of the Settings window select the Scan section. 4. In the left part of the Settings window select the necessary task (Full Scan, Quick Scan, Objects Scan). 5. For the selected task in the Run mode section click the Settings button. 4 25

6 6. In the opened window on the Run mode tab in the User account section check the Run task as box. In the fields below specify the user name and password. 7. Click the OK button. 8. In the Settings window click the OK button. Changing security level Security level is a predefined set of scan settings. Kaspersky Lab specialists distinguish three security levels. You should make the decision on which level is to select, based on your own preferences. You can select one of the following security levels: 5 25

7 High. It should be enabled if you suspect that your computer has a high chance of becoming infected. Recommended. This level is suitable in most cases, and is recommended for using by Kaspersky Lab specialists. Low. If you are using applications requiring considerable RAM resources, select the Low security level because the application puts least demand on system resources in this mode. If you are not satisfied with any preset security levels you can independently configure scan settings. As a result of your actions the name of the security level will change to Custom. In order to select one of the preset security levels, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the window select the necessary task ((Full Scan, Quick Scan, Objects Scan). 5. For the selected task in the Security level section set the required security level. 6. In the Settings window click the OK button. Changing an action performed on detected threat If infected or potentially infected objects are detected, the application performs the specified action. Depending on your current preferences you can configure virus scan settings or allow the program to select an action. Default action By default the application decides on its own what action to perform on a detected threat. If in the result of scan, the application failed to define whether the object is infected or not, then such object is quarantined. 6 25

8 If in the result of a scan KSOS 2 assigns the status of a malicious program to the object, the program will try to disinfect an infected object. If disinfection is impossible, the object is deleted. Before attempting to disinfect or delete an infected object, KSOS 2 creates a backup copy of it to allow later restoration or disinfection. Actions defined by the user You can also define an action to be performed for detected threats: Disinfect Delete Delete, if disinfection fails (this option appears if you checked the Disinfect box) If the Disinfect variant is selected, the program functions the following way: If the object can be disinfected, it will be disinfected and will return to the user. If as a result of scan the program failed to define whether the object is infected or not, the object is quarantined. If the option to scan quarantined files after each database update is enabled, then when a new disinfection signature is received the quarantined object can be disinfected and returned to the user. If the status of a virus is assigned to the object and its disinfection is impossible, the object is blocked and is added to the report about detected threats. You can select only the Delete variant, but in this case all objects will be deleted, even if they could be available for the user after disinfection. Kaspersky Lab specialists recommend to select the following actions for the detected threats: Disinfect Delete if disinfection fails In this case the program will perform the following actions over an object: Disinfect, if disinfection is possible. After disinfection you can continue your work with the object. Quarantine, if the program failed to define if the object is infected or not. If the option to scan quarantined files after each database update is enabled, then when a new disinfection signature is received the quarantined object can be disinfected and returned to the user. Delete, if the virus status is assigned to the object and its disinfection is impossible. Actions for each object You can also specify actions for every detected object individually. For this enable KSOS 2 interactive mode: 2. In the top right corner of the window click the Settings link. 3. In the top part of the Settings window select the Protection section. 4. In the left part of the Settings window select General Settings. 5. In the Interactive protection section uncheck the Select action automatically box. 7 25

9 7. Click the OK button. Interactive mode can only be enabled for the whole program. When the mode is enabled you will have to select an action for every object detected by any KSOS 2 component. How to specify an action on detected threats To specify an action over detected threats, please do the following: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window the necessary task (Full Scan, Quick Scan or Objects Scan). 5. In the Action section select an action over detected threats: Select action automatically Select action: o Disinfect o Delete (Delete if disinfection fails) 8 25

10 6. In the bottom right corner of the window click the OK button. If the Select action option is enabled but no action is chosen, the application will block dangerous objects and quarantine them notifying the user about the quarantined objects. The Delete, if disinfection fails options appears only if the Disinfect box is checked. Remember, when configuring scan settings you can always return to the recommended settings. These are optimal settings recommended by Kaspersky Lab experts and are grouped under the Recommended security level. In order to restore the recommended scan settings, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select the necessary task (Full Scan, Quick Scan or Objects Scan). 5. For the selected task in the Security level section click the Default level button. 6. In the bottom right corner of the window click the OK button. Creating scan schedule In KSOS 2 you can choose whether to start the full scan task manually or by schedule (automatically). If you select the Manually variant, then you can start the task at any time convenient for you. The scan process takes some time to be completed and you cannot use some applications installed on your computer during the scan process. Selecting the By schedule variant allows to configure the automatical start of the full scan task. If you select this variant, you can set the scan task frequency. In the schedule settings you can select one of the following frequencies: minutes, hours, days, every week, at a specified time, every month, after application startup, after every update. For every frequency you can specify the interval. For example, if you select Every month you can select a particular day to start the scan task (1, 2, 3...) and set particular time (05:00 p.m.). 9 25

11 To protect your computer, it would be optimal to perform full computer scan not less than one time a week. In order to schedule a scan task, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select the necessary task (Full Scan, Quick Scan or Objects Scan). 5. For the selected task in the Run mode section click the Settings button. 6. In the window on the Run mode tab in the Schedule section select By schedule and create a task launch schedule with the frequency and a definite time interval to start a scan task

12 You can configure the program to automatically start a skipped scan task as soon as it becomes possible. For example, the computer was not on at that time when a full scan task was scheduled. In this case the scan will start as soon as computer is enabled. To do so, in the Schedule section check the Run skipped tasks box. Scheduled tasks feature additional functionality, for example, you can pause scheduled scan when screensaver is inactive or computer is unlocked. This functionality postpones the task launch until the user has finished working on the computer. So, the scan task will not take up system resources during the work. 7. Click the OK button. 8. In the Settings window click the OK button. Scan scope Creating list of scan objects You can create your own list of objects for the Full Scan and Quick Scan tasks. For example, if you do not want to scan the whole system and all applications installed on your computer you can create your own list of applications, network and logical drives to scan. If no object is selected in the scan scope, full or quick scan task cannot be started. In order to add, modify or delete objects from the scan scope, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select the necessary task (Full Scan, Quick Scan or Objects Scan). 5. In the right part of the Settings window in the Objects to scan section click the Settings button. 6. In the Objects to scan window you can change the list of scanned objects. To add a new object, click the Add link, to change or delete an existing object Edit or Delete correspondingly

13 7. You can also enable scan of subfolders. For this, in the Select objects to scan window check the Include subfolders box, when adding or editing an object. 8. In the lower part of the Select objects to scan window click the OK button. 9. In the Settings window click the OK button. Changing the type of objects to scan You can specify the object types that will be scanned by the selected task when searching for threats. All files. With this option, all files will be scanned without exception. Files scanned by format. If you select this group, the program will only scan potentially infected objects, i.e. files into which a virus could infiltrate. Before searching for viruses in an object, its internal header is analyzed to determine the file format (.txt,.doc,.exe, etc.). When scanning, file extensions are also taken into consideration. Files scanned by extension. In this case, the application will scan potentially infected files only. At that, file format will be determined based on its extension

14 Extensionless files are always scanned, irrespective of the file type selected. When selecting file types please remember the following: Probability of penetration of malicious code into several file formats (such as.txt) and its further activation is quite low. At the same time, there are formats that contain or may contain an executable code (such as.exe,.dll,.doc). The risk of penetrating and activating malicious code in such files is quite high. The intruder can send a virus to your computer in an executable file renamed as txt file. If you have selected the scan of files by extension, such a file is skipped by the scan. If the scan of files by format is selected, then, regardless of the extension, File Anti-Virus will analyze the file header, and reveal that the file is an.exe file. Such a file would be thoroughly scanned for viruses. To change the type of scanned objects, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select the necessary task (Full Scan, Quick Scan or Objects Scan). 5. For the selected task in the Security level section click the Settings button. 6. In the opened window on the Scope tab in the File types section select the necessary variant. 7. Click the OK button. 8. In the Settings window click the OK button

15 Scan optimization You can shorten the scan time and speed up KSOS 2. This can be achieved by scanning only new files and those files that have altered since the last time they were scanned. This mode applies both to simple and compound files. You can also set a restriction on scan duration for an object. When the specified time interval expires, the object will be excluded from the current scan (except for archives and files comprised of several objects). To optimize scan, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select the necessary task (Full Scan, Quick Scan or Objects Scan). 5. For the selected task in the Security level section click the Settings button. 6. In the Settings window on the Scope tab in the Scan optimization section specify the necessary settings. 7. For the program to scan only new and changed files, check the Scan only new and changed files box. 8. To restrict scan duration, check the Skip objects scanned linger than box and specify the scan duration for a file. 9. Click the OK button. 10. In the Settings window click the OK button. Scan of compound files A common method of concealing viruses is to embed them into compound files: archives, databases, etc. To detect viruses that are hidden this way a compound file should be unpacked, which can significantly lower the scan speed. To modify the list of scanned compound files, perform the following actions:

16 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select the necessary task (Full Scan, Quick Scan or Objects Scan). 5. For the selected task in the Security level section click the Settings button. 6. On the Scope tab in the Scan of compound files section, select the required type of compound files to be scanned. For each type of compound file, you can select to scan either all files or only new ones. To make your selection, click the link next to the name of the object. It changes its value when you left-click it. If you select the scan new and changed files only mode, you will not be able to select the links allowing you to scan all or new only files. You can restrict the maximum size of the compound file being scanned. Compound files larger than the specified value will not be scanned. For this in the Scan of compound files section click the Additional button, in the opened Compound files window check the Do not unpack large compound files box and specify the maximum size of scanned objects

17 7. Click the OK button. 8. In the Settings window click the OK button. When large files are extracted from archives, they will be scanned even if the Do not unpack large compound files box is checked. Selecting scan method KSOS 2 uses various scan methods: Signature analysis. Signature analysis uses KSOS 2 databases, which contain descriptions of known threats and methods for eradicating them. Protection using signature analysis provides a minimal level of security. Heuristic analysis. The scan is based on the analysis of typical sequences of operations, allowing an almost definite conclusion about the nature of the file. The advantage of using this method is that new threats are detected before virus analysts have encountered them. Additionally you can set the detail level for scans: light scan, medium scan, or deep scan. Rootkit scan. If you are scanning for viruses, you can enable the deep scan for rootkits by checking the Deep scan box, which will scan carefully for these programs by analyzing a large number of various objects. These checkboxes are deselected by default, since this mode requires significant operating system resources. Rootkits are sets of tools that can hide malicious programs in your operating system. These utilities are injected into the system, hiding their presence and the presence of processes, folders and the registry keys of other malicious programs installed with the rootkit. The signature analysis method is always enabled in the application. To enhance the application efficiency, you can additionally enable other scan methods. For this perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select the necessary task (Full Scan, Quick Scan or Objects Scan). 5. For the selected task in the Run mode section click the Settings button. 6. In the opened window on the Additional tab in the Scan methods section the necessary values

18 7. Click the OK button. 8. In the Settings window click the OK button. Selecting scan technologies In addition to the scan methods you can use special technologies: ichecker is a technology that increases scan speed by excluding certain objects from the scan. An object is excluded from the scan with a special algorithm that uses the release date of Computer Protection databases, the date of the object's last scan, and any changes in the scan settings. There are limitations to ichecker: it does not work with large files and applies only to the objects with a structure that the application recognizes (for example,.exe,.dll,.lnk,.ttf,.inf,.sys,.com,.chm,.zip,.rar). iswift is a technology that builds on ichecker technology for computers using NTFS. There are limitations to iswift: it is bound to a specific file's location in the file system and can apply only to objects in NTFS. The technologies iswift and ichecker allow to increase the virus scan speed by excluding the files that have not been modified since they were last scanned. By default, both technologies are used. To change the set of scan technologies, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select the necessary task (Full Scan, Quick Scan or Objects Scan). 5. For the selected task in the Security level section click the Settings button. 6. In the opened window on the Additional tab in the Scan methods section the necessary values

19 7. Click the OK button. 8. In the Settings window click the OK button. Scanning removable drives on connection Nowadays, malicious objects using operating systems' vulnerabilities to replicate via networks and removable media have become increasingly widespread. KSOS 2 allows to scan removable drives when connecting them to the computer. In order to configure scan of removable drives on connection to the computer, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select the General Settings subsection. 5. In the right part of the Settings window in the Scan removable drives on connection section select an action and, if necessary, define the maximum size of a drive to scan in the field below

20 6.In the Settings window click the OK button. Vulnerability scan What is vulnerability scan Vulnerability scan performs the diagnostics of operating system and detects software features that can be used by intruders to spread malicious objects and obtain access to personal information. Vulnerability scan is a special tool which helps to search and eliminate security vulnerabilities of applications, installed on your computer, and in operating system settings. All the problems detected at the system analysis stage will be grouped based on the degree of danger it poses. Kaspersky Lab specialists offer a set of actions for each group of problems which help to eliminate vulnerabilities and weak points in the system's settings. There are three groups of problems distinguished, and, respectively, three groups of actions associated with them: Strongly recommended actions will help eliminate problems posing a serious security threat. You are advised to perform all actions of this group. Recommended actions help eliminate problems posing a potential threat. You are advised to perform all actions of this group too. Additional actions help repair system damages which do not pose a current threat but may threat the computer's security in the future. As a result of search of possible vulnerabilities in the operating system and in the applications installed on the computer direct links to critical fixes (application updates) are displayed. After the vulnerability scan task start, its progress is displayed in the Vulnerability Scan window, in the Finish field. Vulnerabilities detected when scanning the system and applications, are displayed in the same window, on the System vulnerabilities and Vulnerable applications tabs. When searching for threats, information on the results is logged in a Computer Protection report. By default, the applications already installed on the computer are selected as scan objects

21 Starting vulnerabilities scan Starting Vulnerabilities scan task Vulnerabilities scan can be started the following ways: From the main application window; Using an existing shortcut. To start a vulnerabilities scan task from the main application window, perform the following actions: 2. Go to the Scan section. 3. In the right part of the window click the Open Vulnerability Scan window button. 4. To start the vulnerabilities scan task in the Vulnerability Scan window click the Start Vulnerability Scan button. The scan results will be displayed in the Vulnerability Scan window in two tabs: System vulnerabilities Vulnerable applications

22 To start a vulnerability scan task with an existing shortcut, double-click a shortcut for vulnerabilities scan task. Progress of the task performance is displayed in the Vulnerability Scan window and in the main application window in the Scan section. To fix vulnerability in the system, highlight the object and click the Fix button. On the Vulnerable applications tab there are two variants to choose if you select an object: you can read the vulnerability description by clicking Details button; you can create an exclusion rule for the selected vulnerability by clicking Add to exclusions button. In the Vulnerability Scan window the information about when the scan task was stopped or completed is displayed. The time is also the link to open the detailed report. In the detailed report you can find information about start, stop or completion of the vulnerability scan task and the list of vulnerable objects with the link to open the description for them. Creating shortcut A vulnerabilities scan task can be started using an existing shortcut. To create a shortcut for the task, perform the following actions: 2. In the upper right part of the window click the Settings link. 4. In left part of the Settings window select the General Settings subsection. 5. In the right part of the window in the Scan task quick run section click the Create shortcut button next to Vulnerability scan. 6. In the Save as window browse the path to save the shortcut and its name. By default the shortcut is created with a name of a task on the Desktop of the current computer user. 7. Click the OK button. A shortcut for vulnerabilities scan will appear in the specified location:

23 Creating scan schedule In KSOS 2 you can choose whether to start the vulnerability scan task manually or by schedule (automatically). If you select the Manually variant, then you can start the task at any time convenient for you. The scan process takes some time to be completed and you cannot use some applications installed on your computer during the scan process. Selecting the By schedule variant allows to configure the automatical start of the vulnerability scan task. If you select this variant, you can set the vulnerability scan task frequency. In the schedule settings you can select one of the following frequencies: minutes, hours, days, every week, at a specified time, every month, after application startup, after every update. For every frequency you can specify the interval. For example, if you select Every month you can select a particular day to start the scan task (1, 2, 3...) and set particular time (05:00 p.m.). In order to schedule a scan task, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the window select Vulnerability scan. 5. For the selected task in the Run mode section click the Settings button. 6. In the window on the Run mode tab in the Schedule section select By schedule and create a task launch schedule with the frequency and a definite time interval to start a scan task. You can configure the program to automatically start a skipped scan task as soon as it becomes possible. For example, the computer was not on at that time when a full scan task was scheduled. In this case the scan will start as soon as computer is enabled. To do so, in the Schedule section check the Run skipped tasks box. Scheduled tasks feature additional functionality, for example, you can Pause scheduled scan when screensaver is inactive or computer is unlocked. This functionality postpones the task launch until the user has finished working on the computer. So, the scan task will not take up system resources during the work

24 7. Click the OK button. 8. In the Settings window click the OK button. Creating a list of scan objects for vulnerabilities scan You can create your own list of objects for the Vulnerabilities Scan task. For example, if you do not want to scan the whole system and all applications installed on your computer you can create your own list of applications, network and logical drives to scan. If no object is selected in the scan scope, full or quick scan task cannot be started. In order to add, modify or delete objects from the scan scope, perform the following actions: 2. In the upper part of the window click the Settings link. 4. In the left part of the Settings window select Vulnerability Scan. 5. In the right part of the Settings window in the Objects to scan section click the Settings button. 6. In the Objects to scan window you can change the list of scanned objects. To add a new object, click the Add link, to change or delete an existing object Edit or Delete correspondingly

25 7. You can also enable scan of subfolders. For this, in the Select objects to scan window check the Include subfolders box, when adding or editing an object. 8. In the lower part of the Select objects to scan window click the OK button. 9. In the Settings window click the OK button. Starting vulnerabilities scan task under different account By default scant tasks are started under an account you registered in the system. If you account does not have enough rights, you can specify a different account under whose rights each scan task will be started. To specify an account, perform the following steps: 2. In the right upper part of the window click the Settings link. 3. In the upper part of the Settings window select the Scan section. 4. In the left part of the Settings window select Vulnerabilities Scan. 5. For the selected task in the Run mode section click the Settings button

26 6. In the opened window on the Run mode tab in the User account section check the Run task as box. In the fields below specify the user name and password. 7. Click the OK button. 8. In the Settings window click the OK button

Small Office Security 2. File Anti-Virus

Small Office Security 2. File Anti-Virus Small Office Security 2 File Anti-Virus Table of content Table of content... 1 File Anti-Virus... 2 What is File Anti-Virus... 2 Enabling/Disabling File Anti-Virus... 2 Operating algorithm of File Anti-Virus...

More information

Small Office Security 2. Mail Anti-Virus

Small Office Security 2. Mail Anti-Virus Small Office Security 2 Mail Anti-Virus Table of content Table of content... 1 Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/Disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus...

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

Kaspersky PURE 2.0. Mail Anti-Virus: security levels

Kaspersky PURE 2.0. Mail Anti-Virus: security levels Mail Anti-Virus: security levels Content Mail Anti-Virus. Security levels... 2 Operation algorithm of Mail Anti-Virus... 2 Security levels of Mail Anti-Virus... 2 Customizing security level... 4 Creating

More information

Internet Security Application Control

Internet Security Application Control Internet Security 2012 Application Control Table of Contents Application Control... 2 What is Application Control... 2 Operational algorithm of Application Control... 2 Enabling/disabling Application Control...

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Antivirus User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

User Guide. Version R94. English

User Guide. Version R94. English Antivirus (Classic) User Guide Version R94 English July 19, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

User Guide. Version R93. English

User Guide. Version R93. English Antivirus User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Anti-Virus Interface of Kaspersky

Anti-Virus Interface of Kaspersky Anti-Virus 2012 Interface of Kaspersky Anti-Virus 2012 Table of Contents Interface of Kaspersky Anti-Virus 2012... 2 Application icon in the Microsoft Windows taskbar notification area... 2 Main window

More information

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

USER GUIDE KASPERSKY MOBILE SECURITY 8.0 USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Kaspersky PURE 2.0. Exclusions

Kaspersky PURE 2.0. Exclusions Exclusions Content Exclusions... 2 Trusted zone... 2 Creating the list of trusted applications... 3 Creating exclusion rules... 5 1 10 Exclusions Trusted zone Trusted zone is a list of objects created

More information

Small Office Security 2. License management in Kaspersky Small Office Security 2

Small Office Security 2. License management in Kaspersky Small Office Security 2 Small Office Security 2 License management in Kaspersky Small Office Security 2 Table of content Table of content... 1 License management in... 2 About License Agreement for... 2 About License for... 2

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Endpoint Security 1.1 Installation...3

More information

Kaspersky Endpoint Security 10 for Mac

Kaspersky Endpoint Security 10 for Mac Kaspersky Endpoint Security 10 for Mac Administrator's Guide Application version: 10 Service Pack 1 Dear User, Thank you for choosing our product. We hope that this document will help you in your work

More information

KASPERSKY LAB. Kaspersky Anti-Virus 6.0 for Windows Servers Enterprise Edition ADMINISTRATOR S GUIDE

KASPERSKY LAB. Kaspersky Anti-Virus 6.0 for Windows Servers Enterprise Edition ADMINISTRATOR S GUIDE KASPERSKY LAB Kaspersky Anti-Virus 6.0 for Windows Servers Enterprise Edition ADMINISTRATOR S GUIDE K A S P E R S K Y A N T I - V I R U S 6. 0 F O R W I N D O W S S E R V E R S E N T E R P R I S E E D

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Antivirus User Guide Version 1.1 June 29, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Comodo Antivirus Software Version 2.1

Comodo Antivirus Software Version 2.1 Comodo Antivirus Software Version 2.1 User Guide Guide Version 2.1.030515 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

Kaspersky Administration Kit 8.0 GETTING STARTED

Kaspersky Administration Kit 8.0 GETTING STARTED Kaspersky Administration Kit 8.0 GETTING STARTED APPLICATION VERSION: 8.0 CRITICAL FIX 2 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

Installation Manual. and User Guide

Installation Manual. and User Guide Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information

More information

User Guide. Version R93. English

User Guide. Version R93. English Anti-Malware User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Comodo Client - Security for Linux Software Version 2.2

Comodo Client - Security for Linux Software Version 2.2 Comodo Client - Security for Linux Software Version 2.2 User Guide Guide Version 2.2.091818 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Client

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

Kaspersky Open Space Security

Kaspersky Open Space Security Kaspersky Open Space Security Flexible security for networks and remote users Kaspersky Open Space Security Kaspersky Open Space Security offers new flexibility to network security by extending beyond

More information

Comodo Antivirus Software Version 2.0

Comodo Antivirus Software Version 2.0 Comodo Antivirus Software Version 2.0 User Guide Guide Version 2.0.010215 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Chapter 5: Configuring ServerProtect

Chapter 5: Configuring ServerProtect Chapter 5: Configuring ServerProtect Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the types of ServerProtect tasks Describe which actions

More information

ABF Software Issues Caused by Anti-Virus Programs

ABF Software Issues Caused by Anti-Virus Programs ABF Software Issues Caused by Anti-Virus Programs Downloading Problems: I) Check your browser settings: Copy and paste one of the following url addresses for support settings to prevent your browser from

More information

Seqrite Antivirus Server Edition

Seqrite Antivirus Server Edition Seqrite Antivirus Server Edition User Guide www.seqrite.com Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication may be reproduced,

More information

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections:

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections: This chapter contains the following sections: Scanning Overview, page 1 Sophos Filtering, page 2 McAfee Filtering, page 4 How to Configure the Appliance to Scan for Viruses, page 6 Sending an Email to

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

KASPERSKY LABS. Kaspersky Anti-Virus 5.1 for Microsoft ISA Server. Administrator s guide

KASPERSKY LABS. Kaspersky Anti-Virus 5.1 for Microsoft ISA Server. Administrator s guide KASPERSKY LABS Kaspersky Anti-Virus 5.1 for Microsoft ISA Server Administrator s guide KASPERSKY ANTI-VIRUS 5.1 FOR MS ISA SERVER Administrator s Guide Kaspersky Labs Ltd. http://www.kaspersky.com Edition

More information

AVG File Server. User Manual. Document revision ( )

AVG File Server. User Manual. Document revision ( ) AVG File Server User Manual Document revision 2015.07 (5.2.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

EXECUTIVE REPORT 20 / 12 / 2006

EXECUTIVE REPORT 20 / 12 / 2006 EXECUTIVE REPORT 20 / 12 / 2006 1 Executive summary Audit start date Audit end date 07 / 09 / 2006 19:12 08/ 09 / 2006 09:34 Licenses contracted: 300 Computers audited: 161 items scanned: 703499 Computers

More information

Guardian Internet Security User Guide

Guardian Internet Security User Guide Guardian Internet Security User Guide Guardian Internet Security http://www.guardianav.co.in Copyright & License Information Copyright 2018 Quick Heal Technologies Ltd. All Rights Reserved. No part of

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Getting Started with the Online Backup Software... 2 Installing the Online Backup Software... 2 Configuring a Device...

More information

Avira Free Mac Security Version HowTo

Avira Free Mac Security Version HowTo Avira Free Mac Security Version 2.0.4 HowTo Table of contents 1. Introduction... 3 1.1 Features... 3 1.2 System Requirements...4 2. Installation...4 2.1 Installation with the install wizard...4 2.2 Installation

More information

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 Quick Start Guide Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide APPLICATION VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

Avira Premium Security Suite User Manual

Avira Premium Security Suite User Manual Avira Premium Security Suite User Manual Trademarks and Copyright Trademarks AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in the United

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

ESET NOD32 ANTIVIRUS 7

ESET NOD32 ANTIVIRUS 7 ESET NOD32 ANTIVIRUS 7 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide APPLICATION VERSION: 8.0 MAINTENANCE PACK 2 Dear User, Thank you for choosing our product. We hope that this documentation will help you

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document QUICK START GUIDE Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011 Click here to download the most recent version of this document ESET NOD32 ANTIVIRUS PROVIDES STATE-OF-THE-ART PROTECTION

More information

Comodo Rescue Disk Software Version 1.1

Comodo Rescue Disk Software Version 1.1 Comodo Rescue Disk Software Version 1.1 User Guide Guide Version 1.1.070912 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to Comodo Rescue Disk...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Guardian Total Security User Guide

Guardian Total Security User Guide Guardian Total Security User Guide Guardian Total Security http://www.guardianav.co.in Copyright & License Information Copyright 2018 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 AntiMalware User Guide Version 7.0 English January 6, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

EICAR institute (European Institute for Computer Antivirus Research) to test the functionality of antivirus programs.

EICAR institute (European Institute for Computer Antivirus Research) to test the functionality of antivirus programs. ESET Cybersecurity As the popularity of Unix-based operating systems increases, malware authors are developing more threats to target Mac users. ESET Cybersecurity offers powerful and efficient protection

More information

User Guide. Version R95. English

User Guide. Version R95. English Anti-Malware (Classic) User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

User Guide. Quick Heal Total Security Multi-Device. Quick Heal Technologies Ltd.

User Guide. Quick Heal Total Security Multi-Device. Quick Heal Technologies Ltd. User Guide Quick Heal Total Security Multi-Device Quick Heal Technologies Ltd. www.quickheal.com Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part

More information

Guardian NetSecure User Guide

Guardian NetSecure User Guide Guardian NetSecure User Guide Guardian NetSecure http://www.guardianav.co.in Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication

More information

CompTIA Network+ Lab Series Network Concepts. Lab 11: Business Continuity - Disaster Recovery

CompTIA Network+ Lab Series Network Concepts. Lab 11: Business Continuity - Disaster Recovery CompTIA Network+ Lab Series Network Concepts Lab 11: Business Continuity - Disaster Recovery Objective 5.4: Explain common threats, vulnerabilities, and mitigation techniques Document Version: 2015-09-18

More information

FOR macos. Quick Start Guide. Click here to download the most recent version of this document

FOR macos. Quick Start Guide. Click here to download the most recent version of this document FOR macos Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based

More information

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product. Quick Start Guide ESET Cybersecurity provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the award-winning NOD32

More information

CityVault Client Manual

CityVault Client Manual CityVault Client Manual Contents Preface: Preface...4 Chapter 1: Overview...5 Chapter 2: Installing CityVault...6 Downloading the CityVault Client...6 Installing the CityVault Client...6 Configuring CityVault...8

More information

escan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks.

escan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks. This document provides information to install escan and serves as a quick reference to run key tasks. escan Quick Reference and Installation Guide escan Quick Reference Guide 1 escan User Guide The software

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Comodo Antivirus for Linux Software Version 1.0

Comodo Antivirus for Linux Software Version 1.0 Comodo Antivirus for Linux Software Version 1.0 User Guide Guide Version 1.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus for

More information

Comodo. Cloud Antivirus. User Guide. Software Version Guide Version

Comodo. Cloud Antivirus. User Guide. Software Version Guide Version Comodo Cloud Antivirus Software Version 1.14 User Guide Guide Version 1.14.111717 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Table of Contents 1. Introduction to Comodo

More information

AntiVirus 8.5 Update 2. User Guide

AntiVirus 8.5 Update 2. User Guide AntiVirus 8.5 Update 2 User Guide Notices Version Information Ivanti Endpoint Security: AntiVirus User Guide - Ivanti Endpoint Security: AntiVirus Version 8.5 Update 2 - Published: Apr 2018 Document Number:

More information

Schneider Electric Floating License Manager

Schneider Electric Floating License Manager Schneider Electric Floating License Manager EIO0000001078 11/2012 Schneider Electric Floating License Manager User Manual 12/2012 EIO0000001078.01 www.schneider-electric.com The information provided in

More information

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD.

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 20 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft

More information

Using BlueStep Backup

Using BlueStep Backup Using BlueStep Backup BlueStep Backup Your data is an invaluable resource. To protect and store critical digital documents and files, BlueStep Technologies offers the ideal technological solution - BlueStep

More information

Copyright 2004 ESET. ESET reserves the right to change any of the described application modules without prior notice.

Copyright 2004 ESET. ESET reserves the right to change any of the described application modules without prior notice. Copyright 2004 ESET All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Kaspersky Anti-Virus 6.0 for Windows Servers MP4 USER GUIDE

Kaspersky Anti-Virus 6.0 for Windows Servers MP4 USER GUIDE Kaspersky Anti-Virus 6.0 for Windows Servers MP4 USER GUIDE A P P L I C A T I O N V E R S I O N : 6. 0 M A I N T E N A N C E P A C K 4, C R I T I C A L F I X 1 Dear User of Kaspersky Anti-Virus! Thank

More information

KASPERSKY LAB. Kaspersky Anti-Virus 7.0 USER GUIDE

KASPERSKY LAB. Kaspersky Anti-Virus 7.0 USER GUIDE KASPERSKY LAB Kaspersky Anti-Virus 7.0 USER GUIDE K A S P E R S K Y A N T I - V I R U S 7. 0 User Guide Kaspersky Lab http://www.kaspersky.com Revision date: December, 2007 Contents CHAPTER 1. THREATS

More information

Kaspersky Administration Kit 8.0 REFERENCE GUIDE

Kaspersky Administration Kit 8.0 REFERENCE GUIDE Kaspersky Administration Kit 8.0 REFERENCE GUIDE P R O G R A M V E R S I O N : 8. 0 C R I T I C A L F I X 1 Dear User! Thank you for choosing our product. We hope that this documentation will help you

More information

Dr.Web KATANA. Kills Active Threats And New Attacks

Dr.Web KATANA. Kills Active Threats And New Attacks Dr.Web KATANA Kills Active Threats And New Attacks Doctor Web 2018 Dr.Web KATANA Kills Active Threats And New Attacks A next-generation non-signature anti-virus that operates in tandem with your traditional

More information

ESET ENDPOINT SECURITY

ESET ENDPOINT SECURITY ESET ENDPOINT SECURITY User Guide Microsoft Windows 8 / 7 / Vista / XP / 2000 / Home Server Click here to download the most recent version of this document ESET ENDPOINT SECURITY Copyright 2013 by ESET,

More information

User Guide. Quick Heal Technologies Ltd.

User Guide. Quick Heal Technologies Ltd. User Guide Quick Heal Total Security Quick Heal Total Shield Quick Heal Internet Security Quick Heal Internet Security Essentials Quick Heal AntiVirus Pro Advanced Quick Heal AntiVirus Pro Quick Heal AntiVirus

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003 / 2008

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003 / 2008 Quick Start Guide Microsoft Windows Vista / XP / 2000 / 2003 / 2008 ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning

More information

Typical Installation Guide. Installation Guide. Typical installation only. Standard version 2.5

Typical Installation Guide. Installation Guide. Typical installation only. Standard version 2.5 E s s e n t i a l S e c u r i t y a g a i n s t E v o l v i n g T h r e a t s Typical Installation Guide 2 Installation Guide Typical installation only Standard version 2.5 2 Copyright 1997 2005 Eset LLC.

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Anti-Malware User Guide Version 1.1 July 11, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Real protection against real threats

Real protection against real threats Real protection against real threats Protection for any device For home and office For new purchases and renewals * PCs, Macs and mobile devices running OS supported by Dr.Web. www.drweb.com OOO Doctor

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document QUICK START GUIDE Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011 Click here to download the most recent version of this document ESET INTERNET SECURITY IS ALL-IN-ONE INTERNET SECURITY SOFTWARE.

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

escan Security Network From MicroWorld Technologies Anti-Virus & Content Security

escan Security Network From MicroWorld Technologies Anti-Virus & Content Security & Content Security Created on: 5th November, 2012 Document Version Number: ESN(14.0.0.1) From MicroWorld Technologies With the growing amount of malware in-the-wild, we realized it would be practically

More information

Comodo. Cloud Antivirus. User Guide. Software Version Guide Version

Comodo. Cloud Antivirus. User Guide. Software Version Guide Version Comodo Cloud Antivirus Software Version 1.11 User Guide Guide Version 1.11.050317 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Table of Contents 1. Introduction to Comodo

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

Avira AntiVir Server

Avira AntiVir Server Avira AntiVir Server Support March 2010 www.avira.com Errors in design and contents cannot be excluded Avira GmbH Content 1. Setup Modes... 3 2. Configuration... 7 3. Jobs in the scheduler... 13 4. Different

More information

Kaspersky Mobile Security

Kaspersky Mobile Security Kaspersky Mobile Security User Guide Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Bitdefender Antivirus Plus 2016 User's Guide

Bitdefender Antivirus Plus 2016 User's Guide USER'S GUIDE Bitdefender Antivirus Plus 2016 User's Guide Publication date 09/05/2015 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007

THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007 THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007 Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and answers your

More information