Small Office Security 2. File Anti-Virus

Size: px
Start display at page:

Download "Small Office Security 2. File Anti-Virus"

Transcription

1 Small Office Security 2 File Anti-Virus

2 Table of content Table of content... 1 File Anti-Virus... 2 What is File Anti-Virus... 2 Enabling/Disabling File Anti-Virus... 2 Operating algorithm of File Anti-Virus... 3 Security levels of File Anti-Virus... 3 Actions to be performed by File Anti-Virus on detected threats... 4 Default actions... 4 Actions that can be set by the user... 4 Actions for each object... 6 How to specify action on detected threats... 6 Configuring File Anti-Virus parameters... 7 Selecting file types scanned by File Anti-Virus... 8 Selecting location of files scanned by File Anti-Virus... 8 Scan methods of File Anti-Virus... 9 Optimization of files scan Setting scan of compound files Scan modes of File Anti-Virus iswift и ichecker scan technologies Pausing File Anti-Virus Rollback to default settings of File Anti-Virus

3 File Anti-Virus What is File Anti-Virus The file system may contain viruses and other malicious programs. Such malware may reside in your file system for several years having once intruded your computer and not reveal themselves. However once you open an infected file or, for example, try to copy it on the disk, the virus will reveal itself. The File Anti-Virus component monitors the computer file system and prevents infection of the computer's file system. The component starts upon startup of the operating system, continuously remains in the computer's RAM, and scans all files being opened, saved, or launched on your computer and all connected drives. Enabling/Disabling File Anti-Virus In order to enable or disable File Anti-Virus, perform the following actions: 1. Open the main application window 2. Select Protection Center tab 3. Click the Settings button. As a result the Settings window will open. 4. In the list of components on the left select File Anti-Virus. 5. In the File Anti-Virus Settings section Check the Enable File Anti-Virus box, if you wish to enable the component. Uncheck the Enable File Anti-Virus box, if you wish to disable the component 6. In the Settings window click Apply. 2 19

4 Operating algorithm of File Anti-Virus By default File Anti-Virus functions according to the following algorithm: 1. The component intercepts every attempt by the user or by any program to access any file. File Anti-Virus scans the ichecker and iswift databases (see details further) for information about the intercepted file and determines if it should scan the file, basing on the information retrieved. The scan includes the following steps: 2. The file is scanned for viruses based on the application databases. After the analysis you have the following available courses of action for File Anti-Virus: If malicious code is detected in the file, File Anti-Virus blocks the file, creates a backup copy, and attempts to perform disinfection. After the file is successfully disinfected, it becomes operable to the user. If disinfection fails, the file is deleted. If potentially malicious code is detected in the file (but the maliciousness is not absolutely guaranteed), the file proceeds to disinfection and then is sent to the special storage area called Quarantine If no malicious code is discovered in the file, it is immediately restored. Security levels of File Anti-Virus The security level is defined as a preset configuration of the File Anti-Virus component settings, which provide a protection level of files and the RAM. Different sets of the protection parameters (security levels) suit different working conditions. Kaspersky Lab specialists distinguish three security levels. The decision of which level to select should be made by the user based on the operational conditions and the current situation: If the computer has a high chance of becoming infected, it is necessary to select the high security level. 3 19

5 While working in a protected environment (for example, in a corporate network with centralized security management) or with resource-consuming applications, it is recommended selecting the low security level. Recommended level provides an optimum balance between efficiency and security, being suitable for most cases. In order to modify the security level of File Anti-Virus, perform the following actions: 1. In the right part of section File Anti-Virus set the security level by dragging the vertical slider to the necessary position. 2. In the Settings window click Apply. Actions to be performed by File Anti-Virus on detected threats Default actions By default program chooses the actions on detected objects itself. If as a result of scan the program failed to define whether the object is infected or not, the object is quarantined. Quarantine is a special storage, which contains objects that can be infected viruses. Objects in the quarantine cannot harm your computer. If as a result of the scan object is given the status of malicious software, File Anti-Virus will try to disinfect it. If the disinfection is impossible, the object is deleted. Before disinfecting or deleting of the object KSOS 2 creates its backup in case there is necessity to restore the object or in case the way to disinfect the object turns up. Actions that can be set by the user You can set the action to be performed on detected threats by yourself. File Anti-Virus can perform the following actions on detected threats: Disinfect; Delete; Delete if disinfection fails (appears if Disinfect option is enabled). 4 19

6 If the Disinfect variant is selected, the program functions the following way: If the object can be disinfected, it will be disinfected and will return to the user. If as a result of scan the program failed to define whether the object is infected or not, the object is quarantined. If the option to scan quarantined files after each database update is enabled, then when a new disinfection signature is received the quarantined object can be disinfected and returned to the user. If the virus status is assigned to the object and its disinfection is impossible, the object is blocked and is added to the report about detected threats. If you want infected objects which cannot be disinfected would be deleted check the Delete if disinfection fails box (the box appears if the Disinfect option is enabled). You can select only the Delete variant, but in this case all objects will be deleted, even if they could be available for the user after disinfection. In order to select the necessary action, check the box next to the action and click the Apply button to save the changes. Kaspersky Lab specialists recommend to select the following actions for the detected threats: Disinfect Delete if disinfection fails In this case the program will perform the following actions over an object: Disinfect, if disinfection is possible. After disinfection you can continue your work with the object. Quarantine, if the program failed to define if the object is infected or not. If the option to scan quarantined files after each database update is enabled, then when a new disinfection signature is received the quarantined object can be disinfected and returned to the user. Delete, if the virus status is assigned to the object and its disinfection is impossible. 5 19

7 Actions for each object You can also specify File Anti-Virus actions for every detected object individually. For this enable KSOS 2 interactive mode: 1. In the left part of the Settings window select General Settings. 2. In the left part of the window in the Interactive protection section clear the Select action automatically box. 3. Click the Apply button. Interactive mode can only be enabled for the whole program. When the mode is enabled you will have to select an action for every object detected by any KSOS 2 component. How to specify action on detected threats To specify an action on detected threats, please do the following: 1. In the left part of the Settings window select File Anti-Virus. 2. Make sure that the Enable File Anti-Virus box is checked in the right part of the window 3. In the Action section select an action over detected threats: Select action automatically Select action: o Disinfect o Delete (Delete if disinfection fails) 4. In the Settings window click the OK button. If the Select action option is enabled but no action is chosen, File Anti-Virus will block dangerous objects and quarantine them notifying the user about the quarantined objects. The Delete, if disinfection fails options appears only if the Disinfect box is checked. 6 19

8 Configuring File Anti-Virus parameters To fine-tune the File Anti-Virus settings, in the Security level section click the Settings button. The File Anti-Virus window will open. 7 19

9 Selecting file types scanned by File Anti-Virus In the File Anti-Virus window on the General tab you can set/ select file types to be scanned by File Anti-Virus. By default File Anti-Virus scans only potentially infected files (files into which a virus can penetrate), started on all hard, removable and network drives. You can select on your own the file types which should be scanned by File Anti-Virus for viruses. The following file types can be set for scan: All files File Anti-Virus analyzes all files irrespective of their name (for example, pressrelease ) or extension (for example, «.doc»). Files scanned by format File anti-virus analyzes only the file header (text, executable and etc). Files scanned by extension File Anti-Virus analyzes the file extension (doc, txt, exe and etc). When selecting the file type scanned by File Anti-Virus, consider the following peculiarities. For example, the cyber criminal can send a virus to your computer with a txt extension, though in reality such file can be executable, renamed into a txt-file. If the Files scanned by extension option is selected, then during scan such file will be skipped. If the Files scanned by format option is selected, then in spite of the extension File Anti-Virus will analyze the file header. In the result of scan it will become clear that the file has an exe-format. Such file will be scanned for viruses. Selecting location of files scanned by File Anti-Virus You can also specify location of the scanned files in the Protection scope section. In order to add a new object to the scan scope, perform the following actions: 1. Click the Add link. 8 19

10 2. In the Select object to scan window browse an object and click Add. 3. After you have added all necessary objects in the Select object to scan window click the OK button. Scan methods of File Anti-Virus By default, File Anti-Virus scans objects using signature analysis (bases with the description of known threats and their disinfection methods). The component compares the object under scan with the records in the base and defines whether the object is malicious. Since new malicious objects appear daily, there is always some malware which are not described in the databases, and which can only be detected using heuristic analysis. This method presumes the analysis of the 9 19

11 actions an object performs within the system. If its actions are typical of malicious objects, the object is likely to be classed as malicious or suspicious. In order to configure heuristic analysis, perform the following actions: 1. In the File Anti-Virus window select the Performance tab. 2. In the Heuristic analysis section move the slider bar to set the necessary scan level Click OK to save the changes. Optimization of files scan To shorten the scan time and to increase the program operation speed, configure scan of only new files and of files which were modified since the moment of the previous analysis. For this, 1. In the File Anti-Virus window open the Performance tab. 2. In the Scan optimization section check the Scan only new and changed files box. 3. Click OK. 1 The higher the detail level, the more resources the scan will require, and the longer it will take. On the other hand the more time scan will take, but the more meticulous the analysis will be performed

12 Setting scan of compound files Compound files for example, archives and OLE-objects are a structured storage for several other files. Cyber criminals often hide malicious objects by embedding them into compound files (archives). In order to detect such objects, File Anti-Virus unpacks an archive which considerably decreases the scan time. To enable scan of archives, perform the following actions: 1. In the File Anti-Virus window choose the Performance tab. 2. In the Scan of compound files section check the Scan archives box

13 Installer packages and installation packages (files to install different programs) files containing OLE objects (like images, texts, drafts, tables created in one program, but which can be opened with the help of other programs) are executed when they are opened, which makes them more dangerous than archives. In order to enable scan of installation packages and OLE-objects, perform the following actions: 1. In the File Anti-Virus window choose the Performance tab 2. In the Scan of compound files section check the corresponding boxes. 3. Click OK to save the made changes

14 During scan of large compound files their preliminary unpack may take some time. You can reduce the time by performing scan in the background mode (i.e. while user is working with some other programs). If a malicious object is detected in such file, File Anti-Virus will notify. To enable scan of compound files in background mode, perform the following actions: 1. In the File Anti-Virus window on the Performance tab in the Scan of compound files section click Additional. 2. In the Compound files window check the Extract compound files in the background box. 3. In the Minimum file size field specify the minimum file size for background scan in megabytes. Files of lesser size will be scanned in normal mode

15 To reduce the delay when accessing compound files, one may disable unpacking the files of a size, which is larger than the specified value. For this perform the following actions: 1. In the Size limit section specify the maximum size of the scanned files. This option does not cover files extracted from archives. 2. Click OK to save the changes. Scan modes of File Anti-Virus You can select one of four scan modes in File Anti-Virus: Smart mode. On access and modification (the application scans objects when they are opened or modified). On access (the application scans objects only when they are attempted to open). On execution (the application scans objects only when they are attempted to run). By default, KSOS 2 uses smart mode, which determines if the object is subject to scan, based on the actions performed on it. For example, when working with a Microsoft Office document, File

16 Anti-Virus scans the file when it is first opened and last closed. Intermediate operations that overwrite the file do not cause it to be scanned. To set the scan mode, perform the following actions: 1. In the File Anti-Virus window go to the Additional tab. 2. In the Scan mode section select the necessary scan mode. 3. Click OK to save the changes. iswift и ichecker scan technologies Intellectual technologies ichecker and iswift allow accelerating work of File Anti-Virus. Technologies achieve the highest efficiency some time after installation of the product. These technologies add to each other thus accelerating anti-virus scan of various objects in different file and operating systems. During the first scan with ichecker technology the check sum of an object is saved. Check sum is a unique digital signature of an object (file) that allows identifying this object (file). Check sum changes every time the object is modified. This information is saved in a special table. During the next scan of an object the previous and current check sums are compared. If the check sum is different the object should be scanned for a malicious code once again, if the check sum is the same, the object is not scanned. The ichecker technology works with limited number of formats such as exe, dll, lnk, ttf, inf, sys, com, chm, zip, rar and does not scan files larger than 4 GB, as in such cases it is quicker to scan the whole file, than to calculate its check sums. The iswift technology has been developed for NTFS file system. In this system NTFS-identifier is given to each object. This NTFS-identifier is compared with the values in the special iswift database. This algorithm considers the previous scan date. If from the moment of the first scan to the last scan the same period or more passed then the object will be re-scanned. The object will be also scanned in the case of the object settings were changed to stricter ones. The technology is connected to a definite file location in the file system. If the file was copied/relocated then it is scanned again

17 In order to enable the use of iswift and ichecker technologies, perform the following actions: 1. In the File Anti-Virus window choose the Additional tab. 2. In the Scan technologies section check the iswift technology and ichecker technology boxes. 3. Click OK to save the changes. Pausing File Anti-Virus When carrying out resource-intensive works, you can pause File Anti-Virus. To reduce workload and ensure quick access to objects, you can configure automatic pausing of the component at a specified time. For this perform the following actions: 1. In the File Anti-Virus window go to the Additional tab. 2. In the Pause task section check the By schedule box. 3. Click the Schedule button

18 4. In the pausing the task window in the fields Pause task at and Resume task at specify the time for which protection will be paused 5. Click OK. Besides pausing the component at a specified time, you can also configure pausing of File Anti- Virus when handling specified programs. For this perform the following actions: 1. In the File Anti-Virus window go to the Additional tab. 2. In the Pause task section check the At application startup box. 3. Click the Select button

19 4. In the Applications window click the Add link. Then perform the following actions: Select the program from the Applications list or Click Browse and select the program in the browser window. 5. Create the list of programs and in the Applications window click OK. Rollback to default settings of File Anti-Virus You can always roll back to default File Anti-Virus settings. For this perform the following actions: 1. Open the File Anti-Virus window. 2. In the Settings window in the Security level section click the Default level button

20 19 1 9

Small Office Security 2. Scan PC for viruses and vulnerabilities

Small Office Security 2. Scan PC for viruses and vulnerabilities Small Office Security 2 Scan PC for viruses and vulnerabilities Table of content Table of content... 1 Scan PC for viruses... 2 What is Scan... 2 Starting scan... 2 Starting scan from the main application

More information

Small Office Security 2. Mail Anti-Virus

Small Office Security 2. Mail Anti-Virus Small Office Security 2 Mail Anti-Virus Table of content Table of content... 1 Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/Disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus...

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

Kaspersky PURE 2.0. Mail Anti-Virus: security levels

Kaspersky PURE 2.0. Mail Anti-Virus: security levels Mail Anti-Virus: security levels Content Mail Anti-Virus. Security levels... 2 Operation algorithm of Mail Anti-Virus... 2 Security levels of Mail Anti-Virus... 2 Customizing security level... 4 Creating

More information

User Guide. Version R94. English

User Guide. Version R94. English Antivirus (Classic) User Guide Version R94 English July 19, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Internet Security Application Control

Internet Security Application Control Internet Security 2012 Application Control Table of Contents Application Control... 2 What is Application Control... 2 Operational algorithm of Application Control... 2 Enabling/disabling Application Control...

More information

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

USER GUIDE KASPERSKY MOBILE SECURITY 8.0 USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Antivirus User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Kaspersky PURE 2.0. Exclusions

Kaspersky PURE 2.0. Exclusions Exclusions Content Exclusions... 2 Trusted zone... 2 Creating the list of trusted applications... 3 Creating exclusion rules... 5 1 10 Exclusions Trusted zone Trusted zone is a list of objects created

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

User Guide. Version R93. English

User Guide. Version R93. English Antivirus User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

KASPERSKY LAB. Kaspersky Anti-Virus 6.0 for Windows Servers Enterprise Edition ADMINISTRATOR S GUIDE

KASPERSKY LAB. Kaspersky Anti-Virus 6.0 for Windows Servers Enterprise Edition ADMINISTRATOR S GUIDE KASPERSKY LAB Kaspersky Anti-Virus 6.0 for Windows Servers Enterprise Edition ADMINISTRATOR S GUIDE K A S P E R S K Y A N T I - V I R U S 6. 0 F O R W I N D O W S S E R V E R S E N T E R P R I S E E D

More information

Kaspersky Endpoint Security 10 for Mac

Kaspersky Endpoint Security 10 for Mac Kaspersky Endpoint Security 10 for Mac Administrator's Guide Application version: 10 Service Pack 1 Dear User, Thank you for choosing our product. We hope that this document will help you in your work

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Comodo Client - Security for Linux Software Version 2.2

Comodo Client - Security for Linux Software Version 2.2 Comodo Client - Security for Linux Software Version 2.2 User Guide Guide Version 2.2.091818 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Client

More information

Kaspersky Anti-Virus 6.0 for Windows Servers MP4 USER GUIDE

Kaspersky Anti-Virus 6.0 for Windows Servers MP4 USER GUIDE Kaspersky Anti-Virus 6.0 for Windows Servers MP4 USER GUIDE A P P L I C A T I O N V E R S I O N : 6. 0 M A I N T E N A N C E P A C K 4, C R I T I C A L F I X 1 Dear User of Kaspersky Anti-Virus! Thank

More information

Anti-Virus Interface of Kaspersky

Anti-Virus Interface of Kaspersky Anti-Virus 2012 Interface of Kaspersky Anti-Virus 2012 Table of Contents Interface of Kaspersky Anti-Virus 2012... 2 Application icon in the Microsoft Windows taskbar notification area... 2 Main window

More information

Comodo Antivirus Software Version 2.1

Comodo Antivirus Software Version 2.1 Comodo Antivirus Software Version 2.1 User Guide Guide Version 2.1.030515 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Small Office Security 2. License management in Kaspersky Small Office Security 2

Small Office Security 2. License management in Kaspersky Small Office Security 2 Small Office Security 2 License management in Kaspersky Small Office Security 2 Table of content Table of content... 1 License management in... 2 About License Agreement for... 2 About License for... 2

More information

Comodo Antivirus Software Version 2.0

Comodo Antivirus Software Version 2.0 Comodo Antivirus Software Version 2.0 User Guide Guide Version 2.0.010215 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Kaspersky Open Space Security

Kaspersky Open Space Security Kaspersky Open Space Security Flexible security for networks and remote users Kaspersky Open Space Security Kaspersky Open Space Security offers new flexibility to network security by extending beyond

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Antivirus User Guide Version 1.1 June 29, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

KASPERSKY LAB. Kaspersky Anti-Virus 7.0 USER GUIDE

KASPERSKY LAB. Kaspersky Anti-Virus 7.0 USER GUIDE KASPERSKY LAB Kaspersky Anti-Virus 7.0 USER GUIDE K A S P E R S K Y A N T I - V I R U S 7. 0 User Guide Kaspersky Lab http://www.kaspersky.com Revision date: December, 2007 Contents CHAPTER 1. THREATS

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide APPLICATION VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide APPLICATION VERSION: 8.0 MAINTENANCE PACK 2 Dear User, Thank you for choosing our product. We hope that this documentation will help you

More information

Real protection against real threats

Real protection against real threats Real protection against real threats Protection for any device For home and office For new purchases and renewals * PCs, Macs and mobile devices running OS supported by Dr.Web. www.drweb.com OOO Doctor

More information

Dell Data Protection Protected Workspace

Dell Data Protection Protected Workspace Dell Data Protection Protected Workspace End User Guide Dell Data Protection Protected Workspace v5 Created and Maintained by Invincea, Inc. Proprietary For Customer Use Only 2 Contents Purpose and Intended

More information

Kaspersky Anti-Virus 8.0 for Linux File Server

Kaspersky Anti-Virus 8.0 for Linux File Server Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide A P P L I C A T I O N V E R S I ON : 8. 0 MP 2 C F 4 Dear User! Thank you for choosing our product. We hope that this documentation will

More information

Guardian NetSecure User Guide

Guardian NetSecure User Guide Guardian NetSecure User Guide Guardian NetSecure http://www.guardianav.co.in Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication

More information

Kaspersky Anti-Virus 6.0 for Windows Workstations MP4 USER GUIDE

Kaspersky Anti-Virus 6.0 for Windows Workstations MP4 USER GUIDE Kaspersky Anti-Virus 6.0 for Windows Workstations MP4 USER GUIDE APPLICATION VERSION: 6.0 MAINTENANCE PACK 4 Dear User of Kaspersky Anti-Virus! Thank you for choosing our product. We hope that this documentation

More information

Seqrite Antivirus Server Edition

Seqrite Antivirus Server Edition Seqrite Antivirus Server Edition User Guide www.seqrite.com Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication may be reproduced,

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections:

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections: This chapter contains the following sections: Scanning Overview, page 1 Sophos Filtering, page 2 McAfee Filtering, page 4 How to Configure the Appliance to Scan for Viruses, page 6 Sending an Email to

More information

Guardian Internet Security User Guide

Guardian Internet Security User Guide Guardian Internet Security User Guide Guardian Internet Security http://www.guardianav.co.in Copyright & License Information Copyright 2018 Quick Heal Technologies Ltd. All Rights Reserved. No part of

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

AVG File Server. User Manual. Document revision ( )

AVG File Server. User Manual. Document revision ( ) AVG File Server User Manual Document revision 2015.07 (5.2.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

Ad-Aware. Anniversary Edition. User Manual

Ad-Aware. Anniversary Edition. User Manual Ad-Aware Anniversary Edition User Manual Table of Contents What Is Ad-Aware Anniversary Edition? 1 Ad-Aware Anniversary Edition Features 2 System Requirements 4 Install Ad-Aware 5 Registering Your Product

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

User Guide. Quick Heal Total Security Multi-Device. Quick Heal Technologies Ltd.

User Guide. Quick Heal Total Security Multi-Device. Quick Heal Technologies Ltd. User Guide Quick Heal Total Security Multi-Device Quick Heal Technologies Ltd. www.quickheal.com Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part

More information

Kaspersky Administration Kit 8.0 GETTING STARTED

Kaspersky Administration Kit 8.0 GETTING STARTED Kaspersky Administration Kit 8.0 GETTING STARTED APPLICATION VERSION: 8.0 CRITICAL FIX 2 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

KASPERSKY LABS. Kaspersky Anti-Virus 5.1 for Microsoft ISA Server. Administrator s guide

KASPERSKY LABS. Kaspersky Anti-Virus 5.1 for Microsoft ISA Server. Administrator s guide KASPERSKY LABS Kaspersky Anti-Virus 5.1 for Microsoft ISA Server Administrator s guide KASPERSKY ANTI-VIRUS 5.1 FOR MS ISA SERVER Administrator s Guide Kaspersky Labs Ltd. http://www.kaspersky.com Edition

More information

Guardian Total Security User Guide

Guardian Total Security User Guide Guardian Total Security User Guide Guardian Total Security http://www.guardianav.co.in Copyright & License Information Copyright 2018 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Installation Manual. and User Guide

Installation Manual. and User Guide Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

User Guide. Quick Heal Technologies Ltd.

User Guide. Quick Heal Technologies Ltd. User Guide Quick Heal Total Security Quick Heal Total Shield Quick Heal Internet Security Quick Heal Internet Security Essentials Quick Heal AntiVirus Pro Advanced Quick Heal AntiVirus Pro Quick Heal AntiVirus

More information

User Guide. Version R93. English

User Guide. Version R93. English Anti-Malware User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Zemana Endpoint Security Administration Guide. Version

Zemana Endpoint Security Administration Guide. Version Zemana Endpoint Security Administration Guide Version 1.9.290 Introduction 4 What is Zemana Endpoint Security? 4 What is Zemana Control Center? 4 How do Endpoint Agents and Control Center communicate with

More information

IceWarp Unified Communications. AntiVirus Reference. Version 10.4

IceWarp Unified Communications. AntiVirus Reference. Version 10.4 IceWarp Unified Communications AntiVirus Reference Version 10.4 Printed on 30 November, 2012 Contents AntiVirus 1 Anti-Virus... 2 Latest Avast! Engine... 2 Kaspersky Anti-Virus Support... 2 Support for

More information

TITLE FIELD OF THE INVENTION BACKGROUND OF THE INVENTION

TITLE FIELD OF THE INVENTION BACKGROUND OF THE INVENTION TITLE INFORMATIONAL SECURITY NETWORK FOR EXCHANGE OF RECORDED COMPUTER THREATS AND CONSECUTIVE INTERCEPTION OF VIRUSES AND OTHER COMPUTER ATTACKS ON THE USERS CONNECTED TO THIS NETWORK FIELD OF THE INVENTION

More information

ANNOYING COMPUTER PROBLEMS

ANNOYING COMPUTER PROBLEMS ANNOYING COMPUTER PROBLEMS And their solution Before you do this to your computer read this information. Feel free to print it out. This will make it easier to reference. Table of Contents 1. Computer

More information

Avira Free Mac Security Version HowTo

Avira Free Mac Security Version HowTo Avira Free Mac Security Version 2.0.4 HowTo Table of contents 1. Introduction... 3 1.1 Features... 3 1.2 System Requirements...4 2. Installation...4 2.1 Installation with the install wizard...4 2.2 Installation

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Chapter 5: Configuring ServerProtect

Chapter 5: Configuring ServerProtect Chapter 5: Configuring ServerProtect Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the types of ServerProtect tasks Describe which actions

More information

Step [2]: Hit on Create icon and Choose the "Create macos Profile" from the drop-down menu

Step [2]: Hit on Create icon and Choose the Create macos Profile from the drop-down menu This guide allows a user to configure Antivirus Settings through a profile. The settings include all low-level details to be parameterized from ITSM hence the Realtime Scan (at the time of threats encountered),

More information

Product Guide. McAfee GetClean. version 2.0

Product Guide. McAfee GetClean. version 2.0 Product Guide McAfee GetClean version 2.0 About this guide COPYRIGHT LICENSE INFORMATION Copyright 2013-2017 McAfee, LLC. YOUR RIGHTS TO COPY AND RUN THIS TOOL ARE DEFINED BY THE MCAFEE SOFTWARE ROYALTY-FREE

More information

Copyright 2004 ESET. ESET reserves the right to change any of the described application modules without prior notice.

Copyright 2004 ESET. ESET reserves the right to change any of the described application modules without prior notice. Copyright 2004 ESET All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording,

More information

Dr.Web KATANA. Kills Active Threats And New Attacks

Dr.Web KATANA. Kills Active Threats And New Attacks Dr.Web KATANA Kills Active Threats And New Attacks Doctor Web 2018 Dr.Web KATANA Kills Active Threats And New Attacks A next-generation non-signature anti-virus that operates in tandem with your traditional

More information

Kaspersky Administration Kit 8.0 REFERENCE GUIDE

Kaspersky Administration Kit 8.0 REFERENCE GUIDE Kaspersky Administration Kit 8.0 REFERENCE GUIDE P R O G R A M V E R S I O N : 8. 0 C R I T I C A L F I X 1 Dear User! Thank you for choosing our product. We hope that this documentation will help you

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

Kaspersky Internet Security User Guide

Kaspersky Internet Security User Guide Kaspersky Internet Security User Guide APPLICATION VERSION: 15.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

Even a non-technical user can even operate it with ease.the user can do any task in CCS with just a few clicks.

Even a non-technical user can even operate it with ease.the user can do any task in CCS with just a few clicks. The Comodo Client Security identifies all security risks and provides protection against it.now, the interface of the Comodo Client Security is made very simple. It is integrated with Firewall, Antivirus,

More information

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Getting over Ransomware - Plan your Strategy for more Advanced Threats Getting over Ransomware - Plan your Strategy for more Advanced Threats Kaspersky Lab Hong Kong Eric Kwok General Manager Lapcom Ltd. BEYOND ANTI-VIRUS: TRUE CYBERSECURITY FROM KASPERSKY LAB 20 years ago

More information

CompTIA Network+ Lab Series Network Concepts. Lab 11: Business Continuity - Disaster Recovery

CompTIA Network+ Lab Series Network Concepts. Lab 11: Business Continuity - Disaster Recovery CompTIA Network+ Lab Series Network Concepts Lab 11: Business Continuity - Disaster Recovery Objective 5.4: Explain common threats, vulnerabilities, and mitigation techniques Document Version: 2015-09-18

More information

Avira Premium Security Suite User Manual

Avira Premium Security Suite User Manual Avira Premium Security Suite User Manual Trademarks and Copyright Trademarks AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in the United

More information

AVG 9 Free. User Manual. Document revision 90.4 ( )

AVG 9 Free. User Manual. Document revision 90.4 ( ) AVG 9 Free User Manual Document revision 90.4 (14.9.2009) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This product uses

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

Kaspersky Mobile Security

Kaspersky Mobile Security Kaspersky Mobile Security User Guide Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Endpoint Security Manager

Endpoint Security Manager Comodo Endpoint Security Manager Software Version 1.6 CIS Configuration Editor Version 1.6.010511 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction

More information

Comodo Antivirus for Linux Software Version 1.0

Comodo Antivirus for Linux Software Version 1.0 Comodo Antivirus for Linux Software Version 1.0 User Guide Guide Version 1.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus for

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

Quick Heal for Novell Netware User Guide

Quick Heal for Novell Netware User Guide QUICK HEAL TECHNOLOGIES (P) LTD. Quick Heal for Novell Netware User Guide QUICK HEAL FOR NOVELL NETWARE User Guide Quick Heal Technologies (P) Ltd. 603, Mayfair Towers II, Wakdewadi, Shivajinagar, Pune-

More information

Notification Center...65 Ignored Notifications...67 Language...69 Notifications and Balloons...70 Tray Application...71 How To...

Notification Center...65 Ignored Notifications...67 Language...69 Notifications and Balloons...70 Tray Application...71 How To... Table of Contents Product Information... 4 Ad-Aware Features... 4 System Requirements... 5 Copyright... 6 Installation and Uninstallation... 7 Ad-Aware Install... 7 Ad-Aware Uninstall...18 Ad-Aware Overview...22

More information

Online Security Software Version 1.2

Online Security Software Version 1.2 Comodo Online Security Software Version 1.2 User Guide Guide Version 1.2 061118 Comodo Security Solutions 255 Broad Street Clifton, NJ 07013 1 Introduction to Comodo Online Security Comodo Online Security

More information

Kaspersky Anti-Virus User Guide

Kaspersky Anti-Virus User Guide Kaspersky Anti-Virus User Guide APPLICATION VERSION: 14.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this software

More information

Dataprise Managed Anti-Spam Console

Dataprise Managed Anti-Spam Console Dataprise Managed Anti-Spam Console The easy-to-use solution for managing junk and virus-infected email. Use this guide to get started using your personal dashboard. # WinningWithIT What is the Personal

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server Administrator's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document

More information

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management Seven Habits of Cyber Security for SMEs Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management Security Policy is an important

More information

Report on ESET NOD 32 Antivirus

Report on ESET NOD 32 Antivirus Report on ESET NOD 32 Antivirus CYBER SECURITY & PRIVACY FOUNDATION 1 Software: NOD 32 Antivirus for Windows Lab Setup: Oracle Virtualbox v4.3.6 r91406 Operating System: Machine 1: Windows 7 32-Bit. Processor:

More information

escan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks.

escan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks. This document provides information to install escan and serves as a quick reference to run key tasks. escan Quick Reference and Installation Guide escan Quick Reference Guide 1 escan User Guide The software

More information

SUMMARIES OF INTERACTIVE MULTIMEDIA

SUMMARIES OF INTERACTIVE MULTIMEDIA SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes

More information

escan Security Network From MicroWorld Technologies Anti-Virus & Content Security

escan Security Network From MicroWorld Technologies Anti-Virus & Content Security & Content Security Created on: 5th November, 2012 Document Version Number: ESN(14.0.0.1) From MicroWorld Technologies With the growing amount of malware in-the-wild, we realized it would be practically

More information

Quick Heal Total Security

Quick Heal Total Security For secure online banking, smooth Internet surfing, and robust protection for your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

10.2 Running process checklist Contacting TEMASOFT Support... 30

10.2 Running process checklist Contacting TEMASOFT Support... 30 2018 User manual Contents Table of Figures... 3 1. Introduction... 4 1.1. About TEMASOFT Ranstop... 4 1.2. How TEMASOFT Ranstop works... 5 1.3. TEMASOFT Ranstop components... 5 2. Installing TEMASOFT Ranstop...

More information

Comodo Rescue Disk Software Version 1.1

Comodo Rescue Disk Software Version 1.1 Comodo Rescue Disk Software Version 1.1 User Guide Guide Version 1.1.070912 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to Comodo Rescue Disk...

More information

Kaseya 2. User Guide. Version 1.2

Kaseya 2. User Guide. Version 1.2 Kaseya 2 Antivirus User Guide Version 1.2 February 13, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com KASPERSKY FRAUD PREVENTION 1. Ways of Attacking Online Banking The prime motive behind cybercrime is making money and today s sophisticated criminal

More information

Trend Micro Antivirus for Mac 2015

Trend Micro Antivirus for Mac 2015 H Trend Micro Antivirus for Mac 2015 Product Guide V1.2 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Free antivirus software download

Free antivirus software download Cari untuk: Cari Cari Free antivirus software download 3-11-2015 Avast has one of the most popular antivirus apps around, due in part to offering a free version, and it's one that performs respectably.

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 2 Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8

More information

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary. Security Solutions Our security suite protects against email spam, viruses, web-based threats and spyware while delivering disaster recovery, giving you peace of mind so you can focus on what matters most:

More information