INSTALLING NOD32. NOD32 Setup Tutorial. Page 1 of 76. Double clicking on the Nod32 executable file that has been downloaded begins the setup process.

Size: px
Start display at page:

Download "INSTALLING NOD32. NOD32 Setup Tutorial. Page 1 of 76. Double clicking on the Nod32 executable file that has been downloaded begins the setup process."

Transcription

1 INSTALLING NOD32 Double clicking on the Nod32 executable file that has been downloaded begins the setup process. 1. Click Extract. Page 1 of 76

2 1. It is recommended to initiate a Typical install unless one has previous experience with Nod32 and is comfortable navigating through the program's settings. 2. Click Next. Page 2 of 76

3 1. Click on the Radio Button that reads I agree. 2. Click Next. Page 3 of 76

4 Please LEAVE Server as <Choose automatically> for the following reasons: * If a particular server is down, Nod32 will NOT be able to roll on to the next server. * Experience shows that one will have fewer or no problems with updating using this setting. * Let Eset do their job and balance loads on the servers. 1. Place in the Username (UN) that the Partner/Distributor or Nod32 has provided. 2. Place in the Password (PW) that the Partner/Distributor or Nod32 has provided. ONLY a UN and PW provided by Eset will work. These are not personalizable entries created. 3. Click Next. Page 4 of 76

5 1. Leave this Radio Button as is, UNLESS one uses a modem that dials onto the internet. 2. Click Next. Page 5 of 76

6 Nod32 has been purchased for its ability to protect a computer. Help Eset to continue in its efforts by leaving Enable ThreatSense.NET Early Warning System checked. 1. Click here to see what information is sent to Eset. 2. Click Next. Page 6 of 76

7 1. Make a choice, we hope that one participates and chooses the middle or lower option. 2. The information sent is anonymous. One may want to add an address here in case Eset would like to have further contact regarding what is being sent. Page 7 of 76

8 1. Click on Next. Page 8 of 76

9 1. Leave this checked so the resident scanner (AMON) will start automatically upon booting one s system. 2. Click Next Page 9 of 76

10 1. Click Next. Page 10 of 76

11 1. Click this Radio Button to restart the system. 2. Click Finish to complete the installation. Page 11 of 76

12 Welcome to Nod32, this is the Nod32 splash screen that first appears upon bootup of your system (if this option is turned on). Page 12 of 76

13 The Nod32 Control Centre is located in the System Tray, at the bottom right hand corner of the desktop. Double Click on this icon. Page 13 of 76

14 AMON 1. Click on AMON 2. Click on Setup Page 14 of 76

15 1. Click on the Options tab. 2. Place a check in Potentially dangerous applications. WARNING: enabling this option may result in deletion of Remote Adminstrative programs such as those used by network administrators. Page 15 of 76

16 1. Click on the Actions tab. 2. Choose a Radio Button that suits one s needs. If one is new to Nod32 or a novice with a computer, one may want to have Nod32 Clean automatically, however, should AMON find a False Positive it will delete the file even if it proves to be non-viral at a later date. Though this remains a possibility, it is unlikely for the average user. Page 16 of 76

17 If one is having issues with a particular file or directory, one may be directed here in order to exclude such a file or directory. 1. Click OK Page 17 of 76

18 DMON 1. Click on DMON. 2. Click on Setup. Page 18 of 76

19 1. Click on the Setup tab. 2. Place a check in Potentially dangerous applications. Page 19 of 76

20 1. Click on the Actions tab. 2. Choose a Radio Button that suits one s needs. If one is new to Nod32 or a novice with a computer, one may want to have Nod32 Clean if a virus is found and Delete Uncleanable viruses, however, should a scan find a False Positive it will delete the file even if it proves to be non-viral at a later date. Though this remains a possibility, it is unlikely for the average user. 3. NOTE: ENSURE Quarantine is checked with EVERYTHING that is detected BEFORE one DELETES anything that is ever found. 4. Choose a Radio Button that suits one s needs. If one is not sure whether it is safe to delete an infected file, quarantine allows restoration of a file at a later time/date. If a Probable NewHeur_PE virus found, please do the following: 1. Place a check in the Quarantine check-box 2. Select Delete 3. Send the quarantined file to Eset: samples@nod32.com Files can be found here: C> Program files> Eset> Infected Note: this folder will only be displayed/made when one first receives an infected file and it is sent to Quarantine. NOTE: Quarantine ONLY copies the Virus or Trojan found so it can be sent to Eset for further analysis, it does NOT isolate the Virus or Trojan. 5. The actions chosen are for specific file types, in this instance Files. Clicking on the dropdown arrow reveals the next choice. Page 20 of 76

21 Page 21 of 76

22 1. Choose a Radio Button that suits one s needs. The same advice for each choice with 1, 2 and 3 can be found in the section that covers DMON> Actions tab. Clicking on the dropdown arrow reveals the next choice. Page 22 of 76

23 1. Choose a Radio Button that suits one s needs. The same advice for each choice with 1, 2 and 3 can be found in the section that covers DMON> Actions tab. Clicking on the dropdown arrow reveals the next choice. Page 23 of 76

24 1. Choose a Radio Button that suits one s needs. The same advice for each choice with 1, 2 and 3 can be found in the section that covers DMON> Actions tab. 5. Click on OK. Page 24 of 76

25 EMON Note: EMON is only used when Microsoft Office is detected. i.e. MS OUTLOOK 2000, 2002, 2003 etc. (not Outlook EXPRESS) 1. Click on EMON. 2. Click on Setup. Page 25 of 76

26 1. Click on Scanner 2. Place a check in Scan plain text message bodies. I know, but they said the same thing about jpeg files Page 26 of 76

27 1. Click on Detection. 2. Place a check in Potentially dangerous applications. WARNING: enabling this option might result in deletion of Remote Adminstrative programs such as those used by network administrators. Page 27 of 76

28 1. Click on Extensions. 2. Place a check in Scan extensionless files. Page 28 of 76

29 1. Click on the Actions tab. 2. Choose a Radio Button that suits one s needs. The same advice for each choice with 3, 4 and 5 can be found in the section that covers DMON> Actions tab. 6. Clicking on the dropdown arrow reveals the next choice. Page 29 of 76

30 2. Choose a Radio Button that suits one s needs. The same advice for each choice with 2, 3, 4 and 5 can be found in the section that covers DMON> Actions tab. 6. Clicking on the dropdown arrow reveals the next choice. Page 30 of 76

31 2. Choose a Radio Button that suits one s needs. The same advice for each choice with 2, 3, 4 and 5 can be found in the section that covers DMON> Actions tab. 6. Clicking on the dropdown arrow reveals the next choice. Page 31 of 76

32 2. Choose a Radio Button that suits one s needs. The same advice for each choice with 2, 3, 4 and 5 can be found in the section that covers DMON> Actions tab. 7. Click on OK. Page 32 of 76

33 IMON 1. Click on IMON. 2. Click on Setup. Page 33 of 76

34 1. Click on the POP3 tab. 2. Click on Compatibility Setup > Setup This is also where one will be instructed to go if one is having an issue with IMON. Page 34 of 76

35 1. IMON s compatibility setup can be adjusted by sliding this bar. It is best to leave as is, unless advised otherwise. 2. Click on OK. Page 35 of 76

36 1. Click on the HTTP tab. 2. Click on the Radio Button that reads Automatically deny download of file. 3. Click on the Client Compatibility button. This is where one will be instructed to go if one is having an issue with a particular program. It is recommended to change the compatibility level to "Higher Efficiency" unless one experiences problems with certain applications. NOTE: With Higher Compatibility mode it is possible that Trojans may slip through IMON. Page 36 of 76

37 Page 37 of 76

38 1. Click on the Miscellaneous tab. 2. do NOT click this unless you are advised to, or you are seeing a slow internet connection. This button repairs the LSP chain (Winsock). 3. Click on Scanner> Setup. Page 38 of 76

39 1. Click on the Setup tab. 2. Place a check in Potentially dangerous applications. WARNING: enabling this option might result in deletion of Remote Adminstrative programs such as those used by network administrators. Page 39 of 76

40 1. Click on the Actions tab. 2. Choose a Radio Button that suits one s needs. The same advice for each choice with 2, 3 and 4 can be found in the that covers DMON> Actions tab. 5. Clicking on the dropdown arrow reveals the next choice. Page 40 of 76

41 1. Choose a Radio Button that suits one s needs. The same advice for each choice with 1, 2 and 3 can be found in the post that covers DMON> Actions tab. 4. Clicking on the dropdown arrow reveals the next choice. Page 41 of 76

42 1. Choose a Radio Button that suits one s needs. The same advice for each choice with 1, 2 and 3 can be found in the post that covers DMON> Actions tab. 4. Clicking on the dropdown arrow reveals the next choice. Page 42 of 76

43 1. Choose a Radio Button that suits one s needs. The same advice for each choice with 1, 2 and 3 can be found in the post that covers DMON> Actions tab. 4. Clicking on the dropdown arrow reveals the next choice. Page 43 of 76

44 1. Choose a Radio Button that suits one s needs. The same advice for each choice with 1, 2 and 3 can be found in the post that covers DMON> Actions tab. 4. Clicking on the dropdown arrow reveals the next choice. 5. Click on OK. Page 44 of 76

45 NOD32 1. Click on NOD Click on Run NOD32. Page 45 of 76

46 1. Click on the Scanning Targets tab. 2. Ensure ALL Hard Drives are checked. Page 46 of 76

47 1. Click on the Scanning log tab. 2. Place a check in Scrolling. Page 47 of 76

48 1. Click on the Setup tab. 2. Place a check in everything found within Scan. 3. Place a check in Advanced Heuristics. A warning box will pop up regarding Advanced Heuristics and the use thereof, see the next post for further information. 4. Place a check in Potentially dangerous applications. WARNING: enabling this option might result in deletion of Remote Adminstrative programs such as those used by network administrators. Page 48 of 76

49 1. Click on the Actions tab. 3. Choose a Radio Button that suits one s needs. The same advice for each choice with 3, 4 and 5 can be found in the post that covers DMON> Actions tab. Clicking on 2. will reveal one s next settings choices. Page 49 of 76

50 2. Choose a Radio Button that suits one s needs. The same advice for each choice with 2 and 3 can be found in the post that covers DMON> Actions tab. Clicking on 1. will reveal one s next settings choices. Page 50 of 76

51 1. Click on More. 2. Read enough information to satisfy one s needs to make an informed choice and then close the popup Window. Page 51 of 76

52 PROFILES 1. Click on the Profiles tab. 2. Place a check in Run this profile in cleaning mode. 3. Place a check in Use this profile for scanning files/folders from with the context menu. 4. Click on Quit. 5. Save the changes that have been made. Each profile can have different scanning settings if desired, or Nod32 can scan exactly the same way in all profiles. Nod32 is just giving choices, and choices are good. It s like having many pizzas and on each a different topping can be chosen. Or one favorite topping can be placed on all pizzas. Page 52 of 76

53 Page 53 of 76

54 UPDATE 1. Click on Update> Update. 2. Click on Setup. Page 54 of 76

55 1. Please LEAVE Server as <Choose automatically>, for many reasons: * If a particular server is down, Nod32 will NOT be able to roll on to the next server. * Experience shows us that one will have fewer or no problems with updating using this setting. * Let Eset do their job and balance the load on the servers. 2. One s Username and Password will appear here if one has followed this tutorial from the beginning. Do not try to use a UN and PW that one has created, ONLY a UN and PW provided by Eset will work. 3. Click Change. Page 55 of 76

56 1. It is advised to choose the Radio Button that has Nod32 Perform program component upgrade if available and Offer computer restart if necessary. NOTE: Due to the size of some program component updates, one may NOT want this setting if on a Dialup Internet Connection. 2. Click on OK. Page 56 of 76

57 1. Click on Advanced. Page 57 of 76

58 1. This is where one can set one s type of connection if Nod32 has not already preconfigured it. 2. Click on Proxy server Setup. 1. This is where Proxy Server settings are placed. Click on OK until one is taken back to the next screenshot. Page 58 of 76

59 1. One should now see this. 2. Click on OK. Page 59 of 76

60 1. Various Log files can be found here. Should one need to, one can click on an entry in the right hand Window, then click on Copy selected. One can then paste what has been copied in to Notepad, or MS Word, etc. Page 60 of 76

61 1. This is one of the places where Quarantined files can be submitted to Eset. The actual storage folder for Quarantined files can be found in C Drive> Program Files> Eset> Infected Page 61 of 76

62 SCHEDULER / PLANNER NOTE: Adding a scheduled task and choosing one that has been configured with Run this profile in cleaning mode enabled will be a silent task (i.e. no user interaction or visible signs of the task being run except through the NOD32 Scanner Logs and the Hard Drive light flashing ) 1. Click on Scheduler/Planner. 2. Click on Add. Page 62 of 76

63 1. In the dropdown box, choose Nod32 Kernel Execution of an external application. 2. Click on Next. Page 63 of 76

64 1. Choose a name for your task. 2. Choose a Radio Button that suits your needs. 3. Click on Next. Page 64 of 76

65 1. Choose a time to run your task. 2. Place a tick in a day or days that you want to run your task. 3. Click on Next. Page 65 of 76

66 1. Choose a Radio Button that suits one s requirements. 2. This will prevent overlaps of a Scheduled Task if one chooses the Radio Button in the screenshot. 3. Click on Next. Page 66 of 76

67 1. Click on the Finish button. Page 67 of 76

68 1. Click on Browse. 2. Browse to where Nod32 is installed, typically where you see in this screenshot. 3. Click on the Eset folder. 4. Click on Nod32.exe. 5. Click on Open. Page 68 of 76

69 Page 69 of 76

70 1. This is what should be seen. 2. Place in the Command line all appropriate Switches that suit your requirements. In this screenshot you will see that I am using /local this will scan all of my drives. 3. Click on OK. Here are the switches that should give the greatest and maximum strength scan: /adware /ah /all /arch+ /clean /cleanmode /delete /heur+ /log+ /mailbox+ /pack+ /quarantine /quit+ /scanboot+ /scanmbr+ /scanmem+ /scroll+ /sfx+ /unsafe /wrap+ Your scan settings will start with: C:\ (single space) /switches go here - see screenshot Or Copy and Paste the following directly into the settings: C:\ /adware /ah /all /arch+ /clean /cleanmode /delete /heur+ /log+ /mailbox+ /pack+ /quarantine /quit+ /scanboot+ /scanmbr+ /scanmem+ /scroll+ /sfx+ /unsafe /wrap+ Or To scan ALL of the drives do NOT use C:\ use ONLY the following: /local /adware /ah /all /arch+ /clean /cleanmode /delete /heur+ /log+ /mailbox+ /pack+ /quarantine /quit+ /scanboot+ /scanmbr+ /scanmem+ /scroll+ /sfx+ /unsafe /wrap+ /local = Scan all local drives /adware = Enable detection of adware, spyware and riskware /ah = Enable advanced heuristics /all = Scan all files regardless of their extension /arch+ = Enable archives (ZIP, ARJ and RAR) scanning /clean = Clean infected objects (if applicable) /cleanmode = Enables cleaning mode (the actions taken will depend on the action Page 70 of 76

71 settings) /delete = Delete the infected file /heur+ = Enable standard heuristics /log+ = Enable Log file generation /mailbox+ = Enable scanning mailboxes /pack+ = Enable internal runtime packer files scanning /quarantine Copy infected file to quarantine before taking further action (clean/delete) /quit+ = Quit the program after scanning /scanboot+ = Enable boot sectors scanning /scanmbr+ = Enable MBS scanning /scanmem+ = Enable scanning memory /scroll+ = Enable scrolling of the Log /sfx+ = Enable scanning self-extracting archives /unsafe = Enable detection of potentially dangerous applications /wrap+ = Enable text wrapping in the Log file GENERAL /break- = Disable testing intermission /break+ = Enable testing intermission /expire- = Disable the program expiration notice /expire+ = Enable the program expiration notice /help = Display the list of program switches /list- = Include in the Log only the objects infected /list+ = Create the list of all tested objects in the Log /quit- = Do not quit the program automatically after scanning /quit+ = Quit the program after scanning /scroll- = Disable scrolling of the Log /scroll+ = Enable scrolling of the Log /selfcheck- = Self-test disable /selfcheck+ = Self-test enable /sound- = Sound warning disable /sound+ = Sound warning enable /subdir- = Disable the sub-directories scanning /subdir+ = Enable the sub-directories scanning DETECTION /adware = Enable detection of adware, spyware and riskware /all = Scan all files regardless of their extension /arch- = Disable archives scanning /arch+ = Enable archives (ZIP, ARJ and RAR) scanning /exclude=<list> = Excludes a single particular file from scanning, multiple files can be selected using wildcards /ext=<list> = Add a new extension into the list of tested files. (Multiple entries permitted, e.g., /ext=ext1,ext2 /heur- = Disable heuristic analysis /heur+ = Enable heuristic analysis /local = Scan all local non-removable media /mailbox- = Disable scanning mailboxes Page 71 of 76

72 /mailbox+ = Enable scanning mailboxes /network = Scan all network disks /pack- = Disable the runtime packer files scanning /pack+ = Enable internal runtime packer files scanning /pattern- = Disable testing using virus signatures/patterns /pattern+ = Enable testing using virus signatures/patterns /scanboot- = Disable boot sectors scanning /scanboot+ = Enable boot sectors scanning /scanfile- = Disable scanning of the files /scanfile+ = Enable scanning of the files /scanmbr- = Disable MBS scanning /scanmbr+ = Enable MBS scanning /scanmem- = Disable scanning memory /scanmem+ = Enable scanning memory /sfx- = Disable scanning self-extracting archives /sfx+ = Enable scanning self-extracting archives /unsafe = Enable detection of potentially dangerous applications HEURISTIC ANALYSIS /ah = Enable advanced heuristics /heur- = Disable standard heuristics /heur+ = Enable standard heuristics /heurdeep = Set deep heuristic sensitivity - technically Deep Heuristics no longer exists as it has a higher chance of producing False Positives. /heursafe = Set safe heuristic sensitivity (minimize false alarms) /heurstd = Set standard heuristic sensitivity PROTOCOL /log- = Disable Log file generation /log+ = Enable Log file generation /log=<filename> = Set the Log file name (e.g.: /log=nod.log) /logappend = Enable Log file append option /logrewrite = Enable rewriting of the Log file /logsize=n = Set Log file to the maximum size of N KB) /wrap- = Disable text wrapping in the Log file /wrap+ = Enable text wrapping in the Log file CLEANING /clean = Clean infected objects (if applicable) /cleanmode = Enables cleaning mode (the actions taken will depend on the action settings) /delete = Delete the infected file /prompt = Offer an action upon virus detection /quarantine Copy infected file to quarantine before taking further action (clean/delete) /rename = Rename the infected file Page 72 of 76

73 Note: If the switches: /prompt, /rename, /delete/ or /replace are used concurrently with the /clean switch, the corresponding action will be carried out only if the virus cannot be cleaned. The further a parameter is listed, the higher priority it has. For instance, using the "/clean /delete /prompt " parameters will result in that the "/prompt " parameter will supersede the "/clean /delete" parameters. TEST SCHEDULING /daily = Automatic testing on a daily basis /period=n = Automatic testing once in N days /weekly = Automatic testing on a weekly basis NETWORK (Windows versions only) /centralpath=<path> = Specifies the name of the directory for Centralized Update files /msg="<message>" = Specifies the message to be sent upon virus deletion. /recipient=<list> = Specifies the recipients of the network messages (server/s, group or workstation name). Multiple entries are permitted, e.g., /recipient=server1,server2 Page 73 of 76

74 1. The Scheduled scan just set up will now appear here. Page 74 of 76

75 1. Right Click on the new scheduled scan. This will pop up a small window as seen in the screenshot. 2. Click on Run now. If the settings are correct, the next screenshot is shown when the scan starts. Page 75 of 76

76 1. Using /local shows all local drives that are in the process of being scanned. 2. [4}Locked Files are password protected or Windows System Swap Files, and as such are locked by the Operating System and it is unlikely they will be infected. Page 76 of 76

Typical Installation Guide. Installation Guide. Typical installation only. Standard version 2.5

Typical Installation Guide. Installation Guide. Typical installation only. Standard version 2.5 E s s e n t i a l S e c u r i t y a g a i n s t E v o l v i n g T h r e a t s Typical Installation Guide 2 Installation Guide Typical installation only Standard version 2.5 2 Copyright 1997 2005 Eset LLC.

More information

Focus on the ESET NOD32 antivirus system

Focus on the ESET NOD32 antivirus system INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2006; 16: 375 379 Published online in Wiley InterScience (www.interscience.wiley.com).623 Focus on the ESET NOD32 antivirus system By Gilbert

More information

w e p r o t e c t d i g i t a l w o r l d s NOD32 for Novell Netware Server Installation

w e p r o t e c t d i g i t a l w o r l d s NOD32 for Novell Netware Server Installation w e p r o t e c t d i g i t a l w o r l d s NOD32 for Novell Netware Server Installation Copyright Eset, spol. s r. o. All rights reserved. No part of this document may be reproduced or transmitted in

More information

Copyright 2004 ESET. ESET reserves the right to change any of the described application modules without prior notice.

Copyright 2004 ESET. ESET reserves the right to change any of the described application modules without prior notice. Copyright 2004 ESET All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording,

More information

w e p r o t e c t d i g i t a l w o r l d s NOD32 for Novell Netware Server Installation

w e p r o t e c t d i g i t a l w o r l d s NOD32 for Novell Netware Server Installation w e p r o t e c t d i g i t a l w o r l d s NOD32 for Novell Netware Server Installation Copyright Eset, spol. s r. o. All rights reserved. No part of this document may be reproduced or transmitted in

More information

Standard Installation Guide. Installation Guide. Standard version 2.5

Standard Installation Guide. Installation Guide. Standard version 2.5 E s s e n t i a l S e c u r i t y a g a i n s t E v o l v i n g T h r e a t s 2 Installation Guide Standard version 2.5 2 Copyright 1997 2005 Eset LLC. All rights reserved. No part of this document may

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

EICAR institute (European Institute for Computer Antivirus Research) to test the functionality of antivirus programs.

EICAR institute (European Institute for Computer Antivirus Research) to test the functionality of antivirus programs. ESET Cybersecurity As the popularity of Unix-based operating systems increases, malware authors are developing more threats to target Mac users. ESET Cybersecurity offers powerful and efficient protection

More information

Guardian Internet Security User Guide

Guardian Internet Security User Guide Guardian Internet Security User Guide Guardian Internet Security http://www.guardianav.co.in Copyright & License Information Copyright 2018 Quick Heal Technologies Ltd. All Rights Reserved. No part of

More information

AVG File Server. User Manual. Document revision ( )

AVG File Server. User Manual. Document revision ( ) AVG File Server User Manual Document revision 2015.07 (5.2.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

Seqrite Antivirus Server Edition

Seqrite Antivirus Server Edition Seqrite Antivirus Server Edition User Guide www.seqrite.com Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication may be reproduced,

More information

Anchor User Guide. Presented by: Last Revised: August 07, 2017

Anchor User Guide. Presented by: Last Revised: August 07, 2017 Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

ANNOYING COMPUTER PROBLEMS

ANNOYING COMPUTER PROBLEMS ANNOYING COMPUTER PROBLEMS And their solution Before you do this to your computer read this information. Feel free to print it out. This will make it easier to reference. Table of Contents 1. Computer

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

Avira Premium Security Suite User Manual

Avira Premium Security Suite User Manual Avira Premium Security Suite User Manual Trademarks and Copyright Trademarks AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in the United

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

AVG INTERNET SECURITY 8.5 Installation, Configuration and Use for AARP Tax-Aide

AVG INTERNET SECURITY 8.5 Installation, Configuration and Use for AARP Tax-Aide The following pages show how to install and configure version 8.5 of the AVG Internet Security suite, including the Antivirus and Firewall components, for use on AARP purchased and donated computers used

More information

How To Remove Virus Without Antivirus In >>>CLICK HERE<<<

How To Remove Virus Without Antivirus In >>>CLICK HERE<<< How To Remove Virus Without Antivirus In Windows 7 Pdf Remove virus without antivirus, Here I have all necessary things and also I have steps to Few Effective Steps To Remove Virus Without Antivirus In

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Getting Started with the Online Backup Software... 2 Installing the Online Backup Software... 2 Configuring a Device...

More information

Quick Heal for Novell Netware User Guide

Quick Heal for Novell Netware User Guide QUICK HEAL TECHNOLOGIES (P) LTD. Quick Heal for Novell Netware User Guide QUICK HEAL FOR NOVELL NETWARE User Guide Quick Heal Technologies (P) Ltd. 603, Mayfair Towers II, Wakdewadi, Shivajinagar, Pune-

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

Comodo Antivirus Software Version 2.1

Comodo Antivirus Software Version 2.1 Comodo Antivirus Software Version 2.1 User Guide Guide Version 2.1.030515 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 2 Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

Comodo Antivirus Software Version 2.0

Comodo Antivirus Software Version 2.0 Comodo Antivirus Software Version 2.0 User Guide Guide Version 2.0.010215 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Full User Manual and Quick Start Guide

Full User Manual and Quick Start Guide Full User Manual and Quick Start Guide 2 W hile every precaution has been taken in the preparation of this manual, we assume no responsibility for errors or omissions. Neither, is any liability assumed

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari

Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari WIN9X009 March 2000 Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari Overview 1 Product Overview 1 System Requirements 2 Download Instructions 2 Installation

More information

Guardian NetSecure User Guide

Guardian NetSecure User Guide Guardian NetSecure User Guide Guardian NetSecure http://www.guardianav.co.in Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

Installation Manual. and User Guide

Installation Manual. and User Guide Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information

More information

Sun VirtualBox Installation Tutorial

Sun VirtualBox Installation Tutorial Sun VirtualBox Installation Tutorial Installing Linux Mint 5 LTS Guest OS By Dennis Berry Welcome to the world of virtualization and Linux. This tutorial is intended to help users who are new to the world

More information

Backup Tab. User Guide

Backup Tab. User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

Server Edition USER MANUAL. For Mac OS X

Server Edition USER MANUAL. For Mac OS X Server Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion are registered

More information

Backup Tab User Guide

Backup Tab User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

Panda Antivirus Server for Mac User Manual

Panda Antivirus Server for Mac User Manual Panda Antivirus Server for Mac User Manual !"#$%&'()*+,$-'*(& Use of this product is subject to acceptance of the Panda Security End User License Agreement enclosed. Panda Security is registered in the

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

ESET ENDPOINT ANTIVIRUS

ESET ENDPOINT ANTIVIRUS ESET ENDPOINT ANTIVIRUS User Guide Microsoft Windows 8 / 7 / Vista / XP / 2000 / Home Server / NT4 (SP6) Click here to download the most recent version of this document ESET ENDPOINT ANTIVIRUS Copyright

More information

Nortel Media Application Server 5.1. Installation NN

Nortel Media Application Server 5.1. Installation NN NN44450-300 Document status: Standard Document issue: 01.03 Document date: 15 October 2008 Product release: Release 5.1 Job function: and Commissioning Type: Technical document Language type: English All

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Installation guide. OS/2 single user

Installation guide. OS/2 single user Installation guide OS/2 single user Document date: February 2007 Sophos Anti-Virus installation guide Contents About this guide 3 1 Installing Sophos Anti-Virus 4 2 Using Sophos Anti-Virus via the GUI

More information

Legal Library. In this guide we will review how to download and use our Legal Library tool. Commercial Brokers Association May 2018

Legal Library. In this guide we will review how to download and use our Legal Library tool. Commercial Brokers Association May 2018 Legal Library In this guide we will review how to download and use our Legal Library tool Commercial Brokers Association May 2018 Downloading Legal Library The Legal Library provides both fast and easy

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

Comodo Client - Security for Linux Software Version 2.2

Comodo Client - Security for Linux Software Version 2.2 Comodo Client - Security for Linux Software Version 2.2 User Guide Guide Version 2.2.091818 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Client

More information

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

Server Edition. V8 Peregrine User Manual. for Microsoft Windows Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft

More information

How to Archive s: Windows PC

How to Archive  s: Windows PC To archive email items on a Windows computer you will need to create a Personal Folder file (PST) that is saved on your local hard drive. To avoid potential data loss, do not save the PST file in your

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Important Things to Know... 4 Carbonite Features... 5 Setting Up and Installing... 6 Starting a Trial... 7 Installing Carbonite for the First Time... 7 Buying a Subscription... 8 Subscription Pricing...

More information

User Guide. Version R93. English

User Guide. Version R93. English Anti-Malware User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

DOWNLOAD PDF MICROSOFT PUBLISHER 2003 NOTES

DOWNLOAD PDF MICROSOFT PUBLISHER 2003 NOTES Chapter 1 : Microsoft Publisher Tutorial theinnatdunvilla.com Free Tutorial Install Security Update for Microsoft Office Publisher (KB). To do this, follow these steps: Download theinnatdunvilla.com file

More information

Small Office Security 2. Mail Anti-Virus

Small Office Security 2. Mail Anti-Virus Small Office Security 2 Mail Anti-Virus Table of content Table of content... 1 Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/Disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus...

More information

ESET NOD32 ANTIVIRUS 6

ESET NOD32 ANTIVIRUS 6 ESET NOD32 ANTIVIRUS 6 User Guide (intended for product version 6.0 and higher) Microsoft Windows 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Click here to download the most recent version

More information

Cloud Compute. Backup Portal User Guide

Cloud Compute. Backup Portal User Guide Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8

More information

Guardian Total Security User Guide

Guardian Total Security User Guide Guardian Total Security User Guide Guardian Total Security http://www.guardianav.co.in Copyright & License Information Copyright 2018 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication

More information

User Guide. Quick Heal Total Security Multi-Device. Quick Heal Technologies Ltd.

User Guide. Quick Heal Total Security Multi-Device. Quick Heal Technologies Ltd. User Guide Quick Heal Total Security Multi-Device Quick Heal Technologies Ltd. www.quickheal.com Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part

More information

WinZip for Sending Files. Zipping a file

WinZip for Sending Files. Zipping a file WinZip for Sending Files You can use WinZip to decrease the space your files take up. This will allow you to send the files in an email, faster. WinZip compresses files by removing any extra space; squishing

More information

Avira Ultimate Protection Suite. Short guide

Avira Ultimate Protection Suite. Short guide Avira Ultimate Protection Suite Short guide 01 Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

IceWarp Unified Communications. AntiVirus Reference. Version 10.4

IceWarp Unified Communications. AntiVirus Reference. Version 10.4 IceWarp Unified Communications AntiVirus Reference Version 10.4 Printed on 30 November, 2012 Contents AntiVirus 1 Anti-Virus... 2 Latest Avast! Engine... 2 Kaspersky Anti-Virus Support... 2 Support for

More information

Sage 300 Construction and Real Estate. MyAssistant Upgrade Guide Version 17.1

Sage 300 Construction and Real Estate. MyAssistant Upgrade Guide Version 17.1 Sage 300 Construction and Real Estate MyAssistant Upgrade Guide Version 17.1 NOTICE This document and the Sage 300 Construction and Real Estate Software MyAssistant software may be used only in accordance

More information

Small Office Security 2. Scan PC for viruses and vulnerabilities

Small Office Security 2. Scan PC for viruses and vulnerabilities Small Office Security 2 Scan PC for viruses and vulnerabilities Table of content Table of content... 1 Scan PC for viruses... 2 What is Scan... 2 Starting scan... 2 Starting scan from the main application

More information

Sage 300 Construction and Real Estate Version MyAssistant Upgrade Guide

Sage 300 Construction and Real Estate Version MyAssistant Upgrade Guide Sage 300 Construction and Real Estate Version 15.1 MyAssistant Upgrade Guide Table of Contents NOTICE This document and the Sage 300 Construction and Real Estate Software MyAssistant software may be used

More information

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Comodo Rescue Disk Software Version 1.1

Comodo Rescue Disk Software Version 1.1 Comodo Rescue Disk Software Version 1.1 User Guide Guide Version 1.1.070912 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to Comodo Rescue Disk...

More information

BEST PRACTICES ARCHIVE in contentaccess

BEST PRACTICES  ARCHIVE in contentaccess BEST PRACTICES EMAIL ARCHIVE in contentaccess Use case: Email Archive configuration for companies with up to 2,000 mailboxes This section is intended to give an overview about how to configure email archiving.

More information

SECURITY SHIELD 2013 User's Guide

SECURITY SHIELD 2013 User's Guide SECURITY SHIELD 2013 User's Guide Published 2012.12.12 Copyright 2013 PCSecurityShield Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Welcome to Carbonite! Important Things to Know...4 Carbonite Features...5 Setting Up and Installing...6 Starting a Trial... 7 Installing Carbonite for the First Time... 7 Buying a Subscription...9 Subscription

More information

User Guide. Quick Heal Technologies Ltd.

User Guide. Quick Heal Technologies Ltd. User Guide Quick Heal Total Security Quick Heal Total Shield Quick Heal Internet Security Quick Heal Internet Security Essentials Quick Heal AntiVirus Pro Advanced Quick Heal AntiVirus Pro Quick Heal AntiVirus

More information

RedBeam Inventory Tracking User Manual

RedBeam Inventory Tracking User Manual RedBeam Inventory Tracking User Manual Contact us at www.redbeam.com. Page 1 Table of Contents Table of Contents... 2 Overview... 4 RedBeam Inventory Tracking... 4 PC Prerequisites... 4 Mobile Computer

More information

Access PayrollSE v5.50a

Access PayrollSE v5.50a Access PayrollSE v5.50a Installation Instructions for Windows Contents Introduction... 3 System Requirements... 3 Microsoft Visual C++ 2005 redistributable... 3 Microsoft.NET Framework 4... 3 Other considerations...

More information

DocAve Content Shield v2.2 for SharePoint

DocAve Content Shield v2.2 for SharePoint DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2010 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary

More information

Manually Update Kaspersky Virus Removal Tool

Manually Update Kaspersky Virus Removal Tool Manually Update Kaspersky Virus Removal Tool Database Obsolete Kaspersky Removal Tool 2015 contains articles on how to install, activate, and use "This version is obsolete" message in Kaspersky Virus Removal

More information

A weekly Spa Day for your Computer

A weekly Spa Day for your Computer A weekly Spa Day for your Computer To keep your PC running smoothly and clean, I recommend this procedure on a weekly basis: 1. ATF Cleaner Double Click on ATF Cleaner on your desktop, Check Select All

More information

Avira Endpoint Security. HowTo

Avira Endpoint Security. HowTo Avira Endpoint Security HowTo Table of contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode... 3 2.2 Scope of services... 3 2.3 Optimum protection. Fast updates. Efficient administration...4

More information

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45 User Guide i Contents Introduction 5 McAfee SecurityCenter 7 Features... 8 Using SecurityCenter... 9 Header... 9 Left column... 9 Main pane... 10 Understanding SecurityCenter icons... 11 Understanding

More information

Avira AntiVir Server

Avira AntiVir Server Avira AntiVir Server Support March 2010 www.avira.com Errors in design and contents cannot be excluded Avira GmbH Content 1. Setup Modes... 3 2. Configuration... 7 3. Jobs in the scheduler... 13 4. Different

More information

1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name, , and password in the appropriate

1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name,  , and password in the appropriate 1 4 9 11 12 1 1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name, email, and password in the appropriate blanks and click next. 4. Choose Allow

More information

ProMAX Platform Portable Quick Start Guide

ProMAX Platform Portable Quick Start Guide Version 5.0 Table of Contents Contents About this guide... 3 Getting Started... 4 Before You Begin... 4 Space and Cooling Requirements... 4 Network Settings and Connecting Computers to Your Platform Server...

More information

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved. Lasso CDP Client Guide August 2005, Version 1.6.8 Lasso CDP Client Guide Page 1 of 32 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication may be reproduced, stored

More information

DocAve Content Shield v2.2 for SharePoint

DocAve Content Shield v2.2 for SharePoint DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2007 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary

More information

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems Server Edition V8 Peregrine User Manual for Linux and Unix operating systems Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Red Hat is a registered trademark

More information

WINDOWS 8.1 RESTORE PROCEDURE

WINDOWS 8.1 RESTORE PROCEDURE Support website: MyDigitalTech Support email: hello@mydigitaltech.com Support phone number: 0845 450 6323 WINDOWS 8.1 RESTORE PROCEDURE This document describes how Windows system recovery works, in the

More information

ESET ENDPOINT SECURITY

ESET ENDPOINT SECURITY ESET ENDPOINT SECURITY User Guide Microsoft Windows 8 / 7 / Vista / XP / 2000 / Home Server Click here to download the most recent version of this document ESET ENDPOINT SECURITY Copyright 2013 by ESET,

More information

Sage 300 Construction and Real Estate. MyAssistant Installation Guide Version 18.1

Sage 300 Construction and Real Estate. MyAssistant Installation Guide Version 18.1 Sage 300 Construction and Real Estate MyAssistant Installation Guide Version 18.1 NOTICE This document and the Sage 300 Construction and Real Estate MyAssistant software may be used only in accordance

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Changing Settings for ViewMail for Outlook (Version 8.0 Only)

Changing Settings for ViewMail for Outlook (Version 8.0 Only) Changing Settings for ViewMail for Outlook Note This content applies to ViewMail for Outlook version 8.0 only. For later ViewMail versions, see the Quick Start Guide for Cisco ViewMail for Microsoft Outlook

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 AntiMalware User Guide Version 7.0 English January 6, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information