Kaseya 2. User Guide. Version 1.1

Size: px
Start display at page:

Download "Kaseya 2. User Guide. Version 1.1"

Transcription

1 Kaseya 2 Anti-Malware User Guide Version 1.1 July 11, 2011

2 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's IT Automation Framework allows IT Professionals to proactively monitor, manage and maintain distributed IT infrastructure remotely, easily and efficiently with one integrated Web based platform. Kaseya's technology is licensed on over three million machines worldwide. Copyright Kaseya International Limited. All Rights Reserved.

3 Contents Anti-Malware Overview... 1 Anti-Malware System Requirements... 1 Machines... 2 Page Layout... 2 Explorer Grid... 2 Control Panel... 3 Anti-Malware Columns... 5 Details Panel... 6 Dashboards... 7 Detections... 7 Profiles... 8 Anti-Malware Statistics in the Executive Summary Report... 9 Anti-Malware - Anti-Malware Installation Statistics Index i

4

5 Anti-Malware Overview Anti-Malware (KAM) provides Malwarebytes' Anti-Malware Pro endpoint security for managed machines. Anti-Malware can be installed independently of Endpoint Security or Antivirus. Anti-Malware is particularly adept at detecting and preventing ScareWare or Rogue Antivirus spyware that installs a virus, then attempts to bill the user to remove it. Anti-Malware quickly detects, destroys, and blocks malicious software. Every process is monitored and malicious processes are stopped before they even start. Scanning and realtime protection both use advanced heuristic scanning technology to keep systems safe and secure against even the latest malware threats. Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit). Light speed quick scanning. Ability to perform full scans for all drives. Database updates released daily protect against the newest malware in-the-wild. Intelligent heuristics detect even the most persistent malware while remaining light on system resources. Realtime protection monitors filesystem and internet traffic. Scheduler to keep protection up-to-date automatically. Quarantine to hold threats and restore them at your convenience. Ignore list for both the scanner and the protection module. Note: See KAM System Requirements (page 1). Functions Machines (page 2) Dashboards (page 7) Detections (page 7) Profiles (page 8) Description Installs and uninstalls Anti-Malware software on selected machines and provides a detailed view of the Anti-Malware status of any selected machine. Displays a dashboard view of the status of all machines installed with Anti-Malware. Displays virus threats you can take action on. Manages Anti-Malware profiles that are assigned to machine IDs. Anti-Malware System Requirements KServer The Anti-Malware module installs on VSA or later Note: See general System Requirements. Requirements for Each Managed Machine Anti-Malware can be installed on any Kaseya managed machine, excluding Mac and Linux machines. Microsoft Windows 2000 Service Pack 4 or higher. 500MHZ processor. 256 MB of RAM. 1

6 15 MB free disk space. Machines Anti-Malware > Machines The Machines page installs and uninstalls Anti-Malware software on selected machines. This same page also provides a detailed view of the Anti-Malware status of any selected machine. Page Layout (page 2) Explorer Grid (page 2) Control Panel (page 3) KAM Columns (page 5) Detail Panel (page 6) Page Layout The layout of the Machines (page 2) page comprises the following main panels: C o n tr o l P a n e l S e le c te d C o lu m n S e t M a c h in e ID / G r o u p ID filte r N a v ig a tio n P a n e l M a c h in e H e a d e r M a c h in e A n ti- M a lw a r e D e ta ils E x p lo r e r G r id P a g e B r o w s e r R o w s P e r P a g e Navigation Panel - Used to navigate to the Anti-Malware module. There are four functions: Machines (page 2), Dashboards (page 7), Detections (page 7), and Profiles (page 8). Explorer Grid - Each managed machine in the VSA is listed in this panel. Page Browser - If more than one page of devices displays, pages forwards and back. Rows Per Page - Sets the number of devices displayed per page: 10, 30 or 100. Machine ID / Group ID Filter - Filters the list of machines ID listed in the Explorer Grid. Control Panel - Executes tasks, either for the entire Explorer Grid or for a single selected machine. Details Panel - This expandable/collapsible panel displays the properties and status of a single machine. The Details Panel (page 6) has two sections. Header - Identifies the selected machine in the Explorer Grid. Anti-Malware - Displays a summary of the Anti-Malware status of a machine. Explorer Grid The Explorer Grid of the Machines (page 2) page lists each machine currently installed with a KAM client and included in the machine ID / group ID filter. 2

7 Note: The only exception is when the Installation column set is selected. In this case all machines included the machine ID /group ID filter are displayed, whether or not the KAM client is installed. The set of columns displayed is determined by the Column Set selection in the Control Panel (page 3). The currently selected column set displays in the bar just above the Explorer Grid. Note: See KAM Columns (page 5) for a description of each column available to display in any Explorer Grid column set. Page forward using the Page Browser to display multiple pages of machines. Machines per page sets the number of rows on each page. Control Panel The Control Panel at the top of the Machines (page 2) page executes tasks, either for the entire Explorer Grid (page 2) or for a single selected machine. Actions Open - Display machine Anti-Malware information in a new window. You can also double-click a machine in the Explorer Grid to open this same window. Cancel Pending Action - Cancel pending actions on selected machines. Open new window - Opens the Anti-Malware module in a new window. Reboot - Reboot selected machines. Column Sets Selecting a column set displays a predefined set of columns. Modify Columns - Customize the set of columns displayed by any column set. Or, select one of the following pre-defined sets of column listings. Installation - Display a installation columns in the Explorer Grid for all agent machines. Scan - Display scan columns in the Explorer Grid for all agent machines installed with a KAM client. Update - Display update columns in the Explorer Grid for all agent machines installed with a KAM client. Status - Display status columns in the Explorer Grid for all agent machines installed with a KAM client. Version - Display version columns in the Explorer Grid for all agent machines installed with a KAM client. Licensing - Display licensing columns in the Explorer Grid for all agent machines installed with a KAM client. Detections - Display threat detection columns in the Explorer Grid for all agent machines installed with a KAM client. Profile - Display profile columns in the Explorer Grid for all agent machines installed with a KAM client. 3

8 Assign Scan Update Install Assign an Anti-Malware configuration profile (page 8) to selected machines. Schedules an Anti-Malware scan on selected machines. Start Date - Start date of the scan. Time - Start time of the scan. Distribution Window - Use the Immediate option to scan at the start date and time. Or reschedule the task to a randomly selected time no later than the specified number of periods from the start date and time, to spread network traffic and server loading. There are three types of scan: Flash - A flash scan analyzes memory and auto-run objects. Quick - A quick scan uses fast scanning technology to scan systems for malicious software. Full - A full scan scans all files on the selected drives. A quick scan is recommended in most cases. Updates selected machines with the latest Anti-Malware definitions. Start Date - Start date of the update. Time - Start time of the update. Distribution Window - Use the Immediate option to scan at the start date and time. Or reschedule the task to a randomly selected time no later than the specified number of periods from the start date and time, to spread network traffic and server loading. Install - Installs the Anti-Malware client on selected machines. Uninstall - Uninstalls the Anti-Malware client on selected machines. Verify - Installs a KAM client when a standalone version of Malwarebytes' Anti-Malware is already installed on a managed machine. Auto Extend Enables and disables Auto-Extend for machines installed with Anti-Malware. Displays the total number of licenses purchased and expired, and the number of full and partial licenses available. When Auto-Extend is enabled and a KAM license expires, a new, full license is pulled from your license pool automatically. This ensures the endpoint does not go without antimalware protection at any point, as long as you have available licenses. Auto-Extend always uses a full license. In the event you uninstall KAM from an endpoint, that license goes into a partial license pool. When KAM is deployed to a new endpoint, Kaseya License Manager always checks the partial license pool first. If a partial license is available, the partial license is used on the endpoint with the new install. If no partial licenses are available, Kaseya uses a full KAM license. Licenses begin their clock ticking on the first day they are installed. If uninstalled, the clock continues to tick on that license. By deploying these partial licenses for new installations of KAM, you can get the most out of each 1-year license. 4

9 Anti-Malware Columns The following columns are available to select when modifying any column set in the Explorer Grid (page 2). Select Column Set in the Control Panel (page 3) to modify a column set. Anti-Malware Active Detections - If Yes, detections exist that could not be automatically disinfected or deleted and require user attention. Agent Guid Str - The unique GUID of the Kaseya agent, in string format. Auto Extend - If checked, Auto Extend is enabled. Auto Extend automatically extends licensed security protection for the managed machine. If Anti-Malware is uninstalled from the machine and its licensed time period partially used, its partially-used license is automatically assigned to the next machine installed with Anti-Malware instead of a unused license. Components - Identifies the status of Anti-Malware components installed on this machine. Database Date - The date and time of the Anti-Malware definition database currently being used by this machine. Database Version - The version of the Anti-Malware definition database currently being used by this machine. Date Installed - The date Anti-Malware was installed. FileExecutionBlocking Status - Running or Stopped. The Enable protection when windows starts checkbox must be checked to Enable File Execution Blocking in the Profiles (page 8) page. Flags - Possible flags include: Definitions out of date Id - The unique GUID of the Kaseya agent, in numerical format. Install Phase Icon - If checked, Anti-Malware is installed on the machine. Install Schedule Date - The date Anti-Malware is scheduled to be installed. Install Status - Not Installed, Script Scheduled, Installed Installed - If checked, the Anti-Malware client is installed. Kam Assign Completed - If Yes, a KAM profile is assigned to the machine. Kam Protection Enabled - If Yes, protection is enabled on this machine. Last Updated - The date the Anti-Malware definition database was last updated. License Date - The date Anti-Malware security is scheduled to expire. Log File - Click the View Log link to display the log file from the last scan. Login Name - The currently logged on user. Name - The machine ID.group ID.organization ID of the machine. No Action - The number of detections in the scan that required not user action. Online Status - These icons indicate the agent check-in status of each managed machine. Hovering the cursor over a check-in icon displays the agent quick view window. Online but waiting for first audit to complete Agent online Agent online and user currently logged on. Agent online and user currently logged on, but user not active for 10 minutes Agent is currently offline Agent has never checked in Agent is online but remote control has been disabled The agent has been suspended Other - Number of detections that cannot be classified under any other category. Applies when Malwarebytes creates a new detection category that Anti-Malware does not yet recognize. Pending Actions - Icons representing install, assign, update and scan. 5

10 Profile - The Anti-Malware profile assigned to this machine. Profile Assignment Status - If Yes, a Anti-Malware profile is assigned to the machine. Program Version - The Malwarebytes version number of the Anti-Malware client installed on this machine. Protect Service Status - If Yes, the Malwarebytes service is running. Protection Status - If checked, protection is enabled. Reboot Needed - If Yes, a reboot is required. Resolved - The number of detections resolved automatically by Anti-Malware. Scan Phase - Scheduled, Running, Error, Complete, Processing Result Scan Scheduled Date - The date the next scan is scheduled to run. Service Status - The status of the Anti-Malware client. Service Version - The version of the Anti-Malware client. Show Tool Tip - If 1, then Show Tool Tips is enabled. If 0, Show Tool Tips is not enabled. See Agent > Edit Profile. Time Zone Offset - Displays the number of minutes. See System > Preferences. Tool Tip Notes - Displays the notes assigned to an agent. See Agent > Edit Profile. Transition Time - (obsolete - this column is being removed) Uninstall Schedule Date - The date/time the Anti-Malware client is scheduled to be uninstalled. Update Phase - The status of the update. Update Schedule Date - The date/time the Anti-Malware database definitions are scheduled to be updated. WebSiteBlocking Status - Running or Stopped. The Enable protection when windows starts checkbox must be checked to Enable Web Site Blocking in the Profiles (page 8) page. Details Panel Header Name - The machine ID.group ID.organization ID of the machine. OS - The operating system of the machine. Network - The subnetwork the machine is on. Anti-Malware tab Anti-Malware Summary Install Status - If checked, Anti-Malware security is installed. Select view log to view the log for the machine. Last Updated - The date and time the Anti-Malware client was last updated. Auto Extend - If checked, Auto Extend is enabled. Auto Extend automatically extends licensed security protection for the managed machine. If KAM is uninstalled from the machine and its licensed time period partially used, its partially-used license is automatically assigned to the next machine installed with KAM instead of a unused license. Profile - The Anti-Malware configuration profile assigned to this machine. License Expiration - The date Anti-Malware security is scheduled to expire. Installed On - The date the Kaseya agent was installed. MalwareBytes Status Component Status - Identifies the status of Anti-Malware components installed on this machine. Database Version - The version number of the Anti-Malware definition database. 6

11 Database Date - The date and time of the Anti-Malware definition database currently being used by this machine. Program Version - The Kaspersky version number of the Anti-Malware client installed on this machine. Messages If a failure/error occurs during the installation of Malwarebytes, the message displays here. Dashboards Actions Anti-Malware > Dashboards The Dashboards page provides a dashboard view of the status of machines installed with Anti-Malware. New - Creates a new dashboard. Save - Saves changes to the currently displayed dashboard. Dashboard - Selects a dashboard to display. Add Parts - Add sections to currently displayed dashboard. Dashboard Parts Add or delete individual parts to create custom dashboard views. KAM Automatic License Extension - A bar chart displays the number of machines that have autoextend applied to their license in 30, 60, 90 or 91+ days. KAM License Count - A bar chart displays the number of Anti-Malware licenses used and the number of machines pending an install. KAM License Expiration - A bar chart displays the number of machines that have expired licenses or will have expired licenses in 30, 60, 90 or 91+ days. KAM License Summary - A chart displays the number of machines that are Available, Expired, In Use, Partials and Pending Install. KAM Machines Needing Attention - A bar chart displays the number of Anti-Malware managed machines needing attention, by category. Categories include No AM Installed, With Uncured Threats, Out of Date, Reboot Needed, Component Status. KAM Machines with Detections - A bar chart displays the number of detections. KAM Protection Status - A pie chart displays percentage categories of machines with Anti-Malware protection. Percentage categories include Not Installed, Out of Date, Not Enabled, and Up to Date. KAM Top Threats - Lists the machines with the greatest number of threats. Clicking a hyperlinked machine ID displays the threats belonging to that machine ID in the Detections (page 7) page. Detections Anti-Malware > Detections The Detections page displays malware threats not automatically resolved by Anti-Malware. Use the information listed on this page to investigate threats further and manually remove them. Machine - The machine ID. Name - The name of the threat. Time - The date and time the threat was detected. 7

12 Status - The status of the threat. Type - The category of threat. Path - The location of the threat on the managed machine. Profiles Actions Anti-Malware > Profiles The Profiles page manages Anti-Malware profiles. Each profile represents a different set of enabled or disabled options. Changes to a profile affect all machine IDs assigned that profile. A profile is assigned to machine IDs using Anti-Malware > Machines (page 2). Typically different types of machines or networks require different profiles. A sample profile is provided for you. New - Creates a new profile. Open - Opens an existing profile for editing and review. Delete - Deletes an existing profile. Save - Saves changes to the currently selected profile. Adding / Editing Profiles Click New to display the New Profile window, or click an existing profile, then click Open to display the Edit Profile window. Summary Name - The name of the profile. Description - A description of the profile. Protection Options Enable Protection When Windows Starts - If checked, start protection module with windows. Enable File Execution Blocking - If checked, start file execution blocking when protection module starts. Enable Website Blocking - If checked, start malicious website blocking when protection module starts. Show tooltip when IP blocked - If unchecked, a tooltip balloon does not display to the user when a when a malicious website is blocked. Scan Options Restart the computer if needed as part of threat removal - If checked, restarts the computer to complete the removal of threats, if necessary. Automatically remove threats - If checked, automatically removes threats. Wake from sleep - If checked, attempts to wake the computer from sleep to perform a scheduled scan. Enable Advanced Heuristics engine - If checked, adds another layer of protection to detect new and unknown malware. Schedule Enabled - If checked, schedules a recurring scan. Frequency - Hourly, Daily, Weekly, Monthly, Once, On Reboot. Starting On - Date to start recurring scans. Time - Time to start recurring scans. Scan Type Flash - A flash scan analyzes memory and autorun objects. 8

13 Quick - A quick scan uses fast scanning technology to scan systems for malicious software. Full - A full scan scans all files on the selected drives. A quick scan is recommended in most cases. Recover if Missed by - The number of hours to attempt to run the scan again if the machine was unavailable to scan at the scheduled time. Repeating every - The number of weeks to repeat Recovery if Missed by if the machine remains unavailable to scan. Update Options Download and install program update if available - If checked, updates are downloaded and installed, if available. Use proxy server to download updates - If checked, uses a proxy server to download updates. Proxy server - Enter a valid proxy server name or IP address. Port - Enter a port number. Use Authentication - If checked, proxy authentication is required. Username - If Use Authentication is checked, enter a valid username. Password - If Use Authentication is checked, enter a valid password. Schedule Enabled - If checked, schedules a recurring update. Frequency - Hourly, Daily, Weekly, Monthly, Once, On Reboot. Starting On - Date to start recurring updates. Time - Time to start recurring updates. Recover if Missed by - The number of hours to attempt to run the update again if the machine was unavailable to update at the scheduled time. Repeating every - The number of days to repeat Recovery if Missed by if the machine remains unavailable to update. Wake computer from sleep to perform task - If checked, the machine will be wakened, if necessary, to perform the update. Run flash scan after successful update - If checked, runs a flash scan just after the update. Anti-Malware Statistics in the Executive Summary Report Info Center > Reports > Executive Summary The Executive Summary report includes a section called Anti-Malware for the following statistics. If no filtering is selected, statistics are for all machines in all groups in all organizations. The number of days is specified in the report definition. Summary Statistics Machine Installation Ratio - The number of machines installed with Anti-Malware compared to the total number of machines. Machines with full scans last <N> Days - The number of machines with Anti-Malware installed that have performed a full scan within <N> number of days. Machines needing attention - The number of machine requiring attention. Reasons machines may require attention include Anti-Malware not installed, uncured threats, out of date, reboot needed, missing component. Machines with unhandled detections - The number of machines that have at least one unhandled threat displayed in the Detections page. 9

14 Datebase Version and Date - The latest date of Anti-Malware definitions uploaded to the set of machines specified by this report. Performance Statistics Last <N> Days Total Objects Scanned - The number of files and system objects scanned. Total Detections - The number of handled and unhandled threats. Total New Installations - The number of new Anti-Malware installations. Total Flash Scans Completed - A flash scan analyzes memory and auto-run objects. Total Quick Scans Completed - A quick scan includes operating system startup objects. Total Full Scans Completed - A full scan includes system memory, programs loaded on startup, system backup, databases, hard drives, removable storage media and network drives. Total Updates Completed - An update updates the Anti-Malware definitions on a machine. The Network Health Score of the Executive Summary includes an Anti-Malware category. The Anti-Malware rating is a composite score weighted as follows for each individual machine: Anti-Malware install percentage - 40% - Is Anti-Malware installed on the machine? Full scans run during the period - 40% - Has at least one Anti-Malware scan run during the period? Active threats - 20% - Has zero threats been detected during the period? After each machine Anti-Malware rating is determined, they are grouped into the following percentage buckets, which can be customized: 100%, 75%, 50%, 25%. You can adjust how heavily each category effects the total Network Health Score by adjusting the weight value for each category. Weights range from 0 to 100. Set the weight to zero to turn off that category. Anti-Malware - Anti-Malware Installation Statistics Info Center > Reports > Anti-Malware Displays only if the Anti-Malware add-on module is installed. The Anti-Malware Installation Statistics report definition generates reports for the following types of Anti-Malware data maintained by the VSA. Show Summary Table - Displays the number of machines installed with Anti-Malware per machine group. Installation details include the install date and version installed, per machine in each machine group. Show Installation Month Bar Chart - Displays a count of the number of machines installed with Anti-Malware, per month. 10

15 Index Index A Anti-Malware - Anti-Malware Installation Statistics 10 Anti-Malware Columns 5 Anti-Malware Overview 1 Anti-Malware Statistics in the Executive Summary Report 9 Anti-Malware System Requirements 1 C Control Panel 3 D Dashboards 7 Details Panel 6 Detections 7 E Explorer Grid 2 M Machines 2 P Page Layout 2 Profiles 8 11

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 AntiMalware User Guide Version 7.0 English January 6, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

User Guide. Version R95. English

User Guide. Version R95. English Anti-Malware (Classic) User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Antivirus User Guide Version 1.1 June 29, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Kaseya 2. User Guide. Version 1.2

Kaseya 2. User Guide. Version 1.2 Kaseya 2 Antivirus User Guide Version 1.2 February 13, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

User Guide. Version R93. English

User Guide. Version R93. English Anti-Malware User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Online Backup User Guide Version 1.0 August 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Antivirus User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

User Guide. Version R94. English

User Guide. Version R94. English Antivirus (Classic) User Guide Version R94 English July 19, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Kaseya 2. User Guide. for VSA 6.2

Kaseya 2. User Guide. for VSA 6.2 Kaseya 2 Audit User Guide for VSA 6.2 April 16, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Kaseya 2. User Guide. for VSA 6.0

Kaseya 2. User Guide. for VSA 6.0 Kaseya 2 Patch Management User Guide for VSA 6.0 July 19, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

User Guide. Version R92. English

User Guide. Version R92. English Policy Management User Guide Version R92 English June 23, 2016 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Kaseya 2. User Guide. Version 2.1

Kaseya 2. User Guide. Version 2.1 Kaseya 2 Endpoint Security User Guide Version 2.1 July 19, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

User Guide. Version R94. English

User Guide. Version R94. English Patch Management User Guide Version R94 English July 19, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

User Guide. Version R93. English

User Guide. Version R93. English Antivirus User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Imaging & Deployment User Guide Version 1.0 August 16, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

User Guide. Version 2.1

User Guide. Version 2.1 Kaseya Endpoint Security User Guide Version 2.1 February 23, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

User Guide. Version R93. English

User Guide. Version R93. English Endpoint Security User Guide Version R93 English April 7, 2016 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

User Guide. Version 2.1

User Guide. Version 2.1 Kaseya Backup and Disaster Recovery User Guide Version 2.1 August 11, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

User Guide. Version R95. English

User Guide. Version R95. English Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Desktop Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

User Guide. Version R94. English

User Guide. Version R94. English Cloud Backup User Guide Version R94 English March 30, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

User Guide. Version R95. English

User Guide. Version R95. English Data Backup User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

User Guide. Version R95. English

User Guide. Version R95. English Monitor User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

User Guide. Version R95. English

User Guide. Version R95. English Audit User Guide Version R95 English November 28, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Quick Start Guide. Kaseya 2

Quick Start Guide. Kaseya 2 LiveConnect Quick Start Guide Kaseya 2 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Audit Table of Contents:

Audit Table of Contents: Table of Contents: Collect Data View Group Data View Individual Data Protection 2 Chapter 3 - Sadjadi et al. Introduction Comprehensive accurate understanding of the configuration of every managed machine

More information

Kaseya 2. Installation guide. Version R8. English

Kaseya 2. Installation guide. Version R8. English Kaseya 2 Kaseya Server Setup Installation guide Version R8 English October 24, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Installation Guide. for 6.5 and all add-on modules

Installation Guide. for 6.5 and all add-on modules Kaseya Server Setup Installation Guide for 6.5 and all add-on modules February 11, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Monitoring Table of Contents:

Monitoring Table of Contents: Table of Contents: Dashboard Status Edit Agent External SNMP Log 2 Chapter 6 - Sadjadi et al. Introduction Proactive and preventive system maintenance is only possible with accurate and easily accessible

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

MALWAREBYTES PLUGIN DOCUMENTATION

MALWAREBYTES PLUGIN DOCUMENTATION Contents Requirements... 2 Installation Scenarios... 2 Existing Malwarebytes Installations... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens... 7 System

More information

Kaseya 2. User Guide. for VSA 6.3

Kaseya 2. User Guide. for VSA 6.3 Kaseya 2 InfoCenter User Guide for VSA 6.3 September 25, 2013 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA as updated

More information

Kaseya 2. Quick Start Guide. for VSA 6.1

Kaseya 2. Quick Start Guide. for VSA 6.1 Kaseya 2 Agent Configuration and Deployment Quick Start Guide for VSA 6.1 May 16, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

Comodo IT and Security Manager Software Version 6.6

Comodo IT and Security Manager Software Version 6.6 Comodo IT and Security Manager Software Version 6.6 End User Guide Guide Version 6.6.053117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

Comodo IT and Security Manager Software Version 6.4

Comodo IT and Security Manager Software Version 6.4 Comodo IT and Security Manager Software Version 6.4 End User Guide Guide Version 6.4.040417 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

User Guide. Version R9. English

User Guide. Version R9. English Discovery User Guide Version R9 English March 5, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Comodo IT and Security Manager Software Version 6.9

Comodo IT and Security Manager Software Version 6.9 Comodo IT and Security Manager Software Version 6.9 End User Guide Guide Version 6.9.072817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Quick Start Guide. Version R95. English

Quick Start Guide. Version R95. English Live Connect, Kaseya Remote Control, Quick View, User Portal Quick Start Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to

More information

Comodo IT and Security Manager Software Version 5.4

Comodo IT and Security Manager Software Version 5.4 Comodo IT and Security Manager Software Version 5.4 End User Guide Guide Version 5.4.090716 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Kaseya 2. Quick Start Guide. for VSA 6.3

Kaseya 2. Quick Start Guide. for VSA 6.3 Kaseya 2 LiveConnect, Portal Access and Quick View Quick Start Guide for VSA 6.3 September 24, 2013 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in

More information

Peplink SD Switch User Manual. Published on October 25th, 2018

Peplink SD Switch User Manual. Published on October 25th, 2018 Peplink SD Switch User Manual Published on October 25th, 2018 1 Table of Contents Switch Layout 4 Specifications 5 Hardware Overview 6 Quick Start Functions 7 Reset Switch 7 Connect Ethernet 7 Connect

More information

User Guide. Version R94. English

User Guide. Version R94. English Agent User Guide Version R94 English February 16, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Quick Start Guide. Kaseya 2009

Quick Start Guide. Kaseya 2009 Agent Configuration and Deployment Quick Start Guide Kaseya 2009 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

User Guide. Version R95. English

User Guide. Version R95. English Discovery User Guide Version R95 English September 18, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Comodo Unknown File Hunter Software Version 2.1

Comodo Unknown File Hunter Software Version 2.1 rat Comodo Unknown File Hunter Software Version 2.1 Administrator Guide Guide Version 2.1.061118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

Magic Card Professional

Magic Card Professional Magic Card Professional User Manual Table of Contents System Requirements... 2 1. Installation... 3 2. Magic Card Settings... 5 2.1 Set Protection... 6 2.2 Set Parameters... 8 2.3 Password... 10 2.4 CMOS

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Comodo APT Assessment Tool

Comodo APT Assessment Tool rat Comodo APT Assessment Tool Software Version 1.1 Administrator Guide Guide Version 1.1.102815 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo

More information

User Guide. Version R93. English

User Guide. Version R93. English Agent User Guide Version R93 English February 9, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Backup Table of Contents:

Backup Table of Contents: Table of Contents: Manage Tickets Configure Ticketing 362 Chapter 10 - Sadjadi et al. Introduction The need for an accurate, easy to use and secure backup and recovery system is well recognized. The success

More information

Product Summary. ActiveVisor

Product Summary. ActiveVisor ActiveVisor Product Summary 2 nd Edition November, 2018 Index Objective 3 Overview 4 Components of ActiveVisor 8 Main Features 10 Console 12 Site Settings 13 Backup 17 Schedule 20 vstandby 21 Client settings

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Backup User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Common Preventive Maintenance Techniques for Operating Systems

Common Preventive Maintenance Techniques for Operating Systems Common Preventive Maintenance Techniques for Operating Systems OS Preventive Maintenance Plan To ensure that an OS remains fully functional, you must implement a preventive maintenance plan. A preventive

More information

Comodo One Software Version 3.3

Comodo One Software Version 3.3 rat Comodo One Software Version 3.3 Patch Management Module Administrator Guide Guide Version 2.2.101316 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

Installation Manual. and User Guide

Installation Manual. and User Guide Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information

More information

Kaseya 2. Quick Start Guide. for VSA 6.0

Kaseya 2. Quick Start Guide. for VSA 6.0 Kaseya 2 Monitoring Configuration Quick Start Guide for VSA 6.0 August 5, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

Quick Start Guide. Version R92. English

Quick Start Guide. Version R92. English Monitoring Configuration Quick Start Guide Version R92 English April 11, 2016 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Remote Control Table of Contents:

Remote Control Table of Contents: Table of Contents: Desktop Control Configure Notification Policy Files/Processes Message with Users vpro 2 Chapter 4 - Sadjadi et al. Introduction System administrators frequently need to directly work

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide Mission Control for the Microsoft Cloud 5nine Cloud Security Web Portal Version 12.o Getting Started Guide 2018 5nine Software Inc. All rights reserved. All trademarks are the property of their respective

More information

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

How To Remove Virus From Computer Without Using Antivirus In Windows Xp How To Remove Virus From Computer Without Using Antivirus In Windows Xp How to remove a virus - how to clean PC and laptop of virus, spyware and other PC internet security software that includes up to

More information

DocAve for Salesforce 2.1

DocAve for Salesforce 2.1 DocAve for Salesforce 2.1 This document is intended for anyone wishing to familiarize themselves with the user interface and basic functionality of AvePoint s DocAve for Salesforce tool. System Requirements

More information

Comodo Unknown File Hunter Software Version 5.0

Comodo Unknown File Hunter Software Version 5.0 rat Comodo Unknown File Hunter Software Version 5.0 Administrator Guide Guide Version 5.0.073118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo

More information

Zemana Endpoint Security Administration Guide. Version

Zemana Endpoint Security Administration Guide. Version Zemana Endpoint Security Administration Guide Version 1.9.290 Introduction 4 What is Zemana Endpoint Security? 4 What is Zemana Control Center? 4 How do Endpoint Agents and Control Center communicate with

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Installation Guide. Version R94. English

Installation Guide. Version R94. English Kaseya Server Setup Installation Guide Version R94 English September 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

1. Initial Setting and Installation of ActiveVisor... 1

1. Initial Setting and Installation of ActiveVisor... 1 ActiveVisor Startup Guide 1 st Edition August, 2018 Contents 1. Initial Setting and Installation of ActiveVisor... 1 1.1 System Requirements... 1 1.2 Installation of ActiveVisor... 2 1.3 Initial Settings

More information

Online Backup Client User Manual

Online Backup Client User Manual Software version 3.21 For Mac OS X September 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or

More information

ZENworks 2017 Audit Management Reference. December 2016

ZENworks 2017 Audit Management Reference. December 2016 ZENworks 2017 Audit Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

KASEYA (LEGACY) CLOUD SOLUTION CATALOG 2014 Q1

KASEYA (LEGACY) CLOUD SOLUTION CATALOG 2014 Q1 KASEYA (LEGACY) CLOUD SOLUTION CATALOG 2014 Q1 UPDATED & EFFECTIVE AS OF: Jan 1, 2014 Kaseya Catalog - 1 - IMPORTANT: THIS KASEYA (LEGACY) CLOUD SOLUTION CATALOG, Q1 2014, IS FOR THE USE OF KASEYA S CUSTOMERS

More information

Internet Security Application Control

Internet Security Application Control Internet Security 2012 Application Control Table of Contents Application Control... 2 What is Application Control... 2 Operational algorithm of Application Control... 2 Enabling/disabling Application Control...

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Kaseya 2. User Guide. Version 6.0

Kaseya 2. User Guide. Version 6.0 Kaseya 2 Kaseya Server Installation User Guide Version 6.0 June 21, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

ESET REMOTE ADMINISTRATOR PLUG-IN FOR KASEYA. Technical Setup and User Guide

ESET REMOTE ADMINISTRATOR PLUG-IN FOR KASEYA. Technical Setup and User Guide ESET REMOTE ADMINISTRATOR PLUG-IN FOR KASEYA Technical Setup and User Guide ESET REMOTE ADMINISTRATOR PLUG-INFOR KASEYA Copyright 2014 by ESET, spol. s r.o. ESET REMOTE ADMINISTRATOR Plug-in FOR KASEYA

More information

Cox Business Online Backup Administrator Guide. Version 2.0

Cox Business Online Backup Administrator Guide. Version 2.0 Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

KASEYA On-Premise Perpetual SOFTWARE CATALOG 2014 Q1

KASEYA On-Premise Perpetual SOFTWARE CATALOG 2014 Q1 KASEYA On-Premise Perpetual SOFTWARE CATALOG 2014 Q1 UPDATED & EFFECTIVE AS OF: Feb 7, 2014 Overview of the Kaseya On-Premise Perpetual Software Solutions The Kaseya solution is designed for ultimate Customer

More information

System Table of Contents:

System Table of Contents: Table of Contents: User Settings Preferences User Security Orgs / Groups / Depts Customize Database Access 2 Chapter 9 - Sadjadi et al. Introduction True automated system administration is only possible

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 2 Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version 1.1.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo EDR...3 1.1 Purchase

More information

User Guide. Quick Heal Technologies Ltd.

User Guide. Quick Heal Technologies Ltd. User Guide Quick Heal Total Security Quick Heal Total Shield Quick Heal Internet Security Quick Heal Internet Security Essentials Quick Heal AntiVirus Pro Advanced Quick Heal AntiVirus Pro Quick Heal AntiVirus

More information

DocAve Content Shield v2.2 for SharePoint

DocAve Content Shield v2.2 for SharePoint DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2007 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary

More information

Manually Remove Of Xp Internet Security Protect

Manually Remove Of Xp Internet Security Protect Manually Remove Of Xp Internet Security Protect McAfee Family Protection McAfee Internet Security NOTE: To determine which McAfee Security software version you have installed, You must uninstall your McAfee

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

ProCurve Identity Driven Manager

ProCurve Identity Driven Manager ProCurve Identity Driven Manager Software Release 2.0 User s Guide Copyright 2004, 2005 Hewlett-Packard Company All Rights Reserved. This document contains information which is protected by copyright.

More information

MPX Server Software User Manual

MPX Server Software User Manual MPX Server Software User Manual Contents 1 Server Software Installation... - 3 - Initial Setup... - 6-2 Software Interface... - 10 - Login Page:... - 10-2.1 Homepage... - 12-2.2 Resources... - 13-2.3 Composer...

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Guardian Internet Security User Guide

Guardian Internet Security User Guide Guardian Internet Security User Guide Guardian Internet Security http://www.guardianav.co.in Copyright & License Information Copyright 2018 Quick Heal Technologies Ltd. All Rights Reserved. No part of

More information