Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Size: px
Start display at page:

Download "Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit"

Transcription

1 . All right reserved. For more information about Specops Deploy and other Specops products, visit

2 Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All other trademarks used in this document belong to their respective owners. 2

3 Contents Key components 6 Managing policies 7 Create a new policy 7 Edit an existing policy 8 GPO settings 9 General settings 9 Advanced settings 12 Reporting 21 View predefined Reports 21 Create a new report 22 Edit an existing report 23 Export Report data 24 Delete a Report 25 template customization 26 Specops Deploy / Endpoint Protection registry settings 27 3

4 About this guide This guide is intended for administrators who are responsible for managing Forefront/System Center Endpoint Protection clients. Before you perform the tasks in this guide, please ensure you have correctly installed Specops Deploy / Endpoint Protection. You can find the Specops Deploy / Endpoint Protection Installation Guide at 4

5 About Specops Deploy / Endpoint Protection Specops Deploy / Endpoint Protection integrates Microsoft Forefront/System Center Endpoint Protection with Active Directory and Group Policy. Specops Deploy / Endpoint Protection will allow you to administer the Forefront/System Center Endpoint Protection client through Group Policy, without implementing the full System Center solution. Specops Deploy / Endpoint Protection is a component of the Specops Desktop Management suite. You can learn more about Specops Deploy and other Specops products at 5

6 Key components Specops Deploy GPMC-snap in: You can use the Specops Deploy GPMC-snap in to create new Specops Deploy / Endpoint Protection GPOs. You can also add settings to an existing GPO, and use security filtering to gain more granular control over which computers should have which settings. Specops Reporting: You can use Specops Reporting to view reports and monitor the status of your Endpoint Protection clients. Specops Reporting creates reports of the data contained in the Specops Deploy / Endpoint Protection feedback database. Specops Reporting contains several predefined reports, but also allows you to create your own report definitions. 6

7 Managing Policies The Specops Deploy GPMC snap-in can be used to manage GPOs. You can access the Specops Deploy GPMC snap-in from the Group Policy Management Editor. Create a new policy The Specops Deploy GPMC snap-in works within the context of one GPO. The scope of the GPO should contain all the computers and users that you want to manage software for. 1. In the GPMC, expand your domain node, and locate the GPO node. 2. Right-click on the GPO node, and select New. 3. Enter a name for the Group Policy Object, and click OK. 4. Right click on the new GPO node, and select Edit. 5. In the Group Policy Management Editor expand Computer Configuration, Policies, Software Settings, and select Specops Deploy / Endpoint Protection. 6. Click Edit. 7. Configure the policy, and click OK. 7

8 Edit an existing policy 1. In the GPMC, expand your domain node, and locate the GPO you want to edit. 2. Right click on the new GPO node, and select Edit. 3. In the Group Policy Management Editor expand Computer Configuration, Policies, Software Settings, and select Specops Deploy / Endpoint Protection. 4. Click Edit. 5. Configure the policy, and click OK. 8

9 GPO settings The table below provides an overview of available settings that you can use to determine the customization your organization will need. The hierarchal approach allows you to enable the specific settings you wish to modify at each level in Active Directory. Settings passed on from higher policies will be merged and the resulting configuration will be applied to the Endpoint Protection client. General settings Setting Schedule Scan Scan type When Around Daily quick scan time around Check for the latest virus and spyware definitions before running a scheduled scan Start the scheduled scan when my computer is on but not in use Limit CPU usage during scan to Default actions Description This settings sets the time when a scan should be ran on the computer. This policy setting allows you to specify the scan type to use during a scheduled scan. The scan type options are: Quick Scan Full Scan This policy setting allows you to specify the day of the week on which to perform a scheduled scan. The scan can also be configured to run every day or to never run at all. This policy setting allows you to specify the time of the day at which to perform a daily quick scan. Note: The schedule is based on local time on the computer where the scan is executing. This policy settings allows you to specify the time of day at which to perform a daily quick scan. This policy setting allows you to manage whether a check for new virus and spyware definitions will occur before running a scan. scheduled scans to start only when your computer is on but not in use. the maximum percentage CPU utilization permitted during a scan. This policy setting allows you to set a default action to take when System Center Endpoint 9

10 Real-time protection Scan all download Monitor file and program activity on your computer Enable behavior monitoring Enable Network Inspection System Exclude files and locations Exclude file types Exclude processes Advanced Scan archive files Scan removable drives Protection finds a potential or known threat based on alert level. There are four threat levels: Severe High Medium Low This setting will also allow you to set whether SCEP will Remove, Quarantine, or Allow a threat for the level. realtime protection. This setting controls all real-time protection components. This policy allows you to configure scanning for all downloaded files and attachments. monitoring for file and program activity. behavior monitoring. network protection against exploits of known vulnerabilities. This policy setting allows you to disable scheduled and real-time scanning for files under the paths specified or for the fully qualified resources specified. This policy setting allows you to specify a list of the file types that should be excluded from scheduled, custom, and real-time scanning. This policy setting allows you to disable schedule and real-time scanning for any file opened by any of the specified processes. N/A scans for malicious software and unwanted software in archive files such as.zip or.cab This policy setting allows you to manage whether or not to scan for malicious software and unwanted software in the contents of removable 10

11 MAPS Create a system restore point Allow all users to view the full History results Remove quarantined files after drives, such as USB flash drives, when running a full scan. This policy setting allows you to create a system restore point on the computer on a daily basis prior to cleaning. This policy setting allows all the users of the computer to see the history results for that computer (Not recommended to set this). This policy setting defines the number of days items should be kept in the Quarantine folder before being removed. This setting allows you to control what information is sent to Microsoft about the current potentially unwanted software, malware, and viruses. The recommended setting is Basic membership and is the default setting for Managed client users. 11

12 Advanced settings Setting General Settings Allow antimalware service to startup with normal priority Turn on spyware definitions Turn on virus definitions Configure local administrator merge behavior for lists Define addresses to bypass proxy server Define proxy server for connecting to the network Randomize scheduled task times Allow antimalware service to remain running always Description This policy setting controls the load priority for the antimalware service. Increasing the load priority will allow for faster service startup, but may impact performance. This policy setting allows you to manage whether spyware definitions are used during a scan. This policy setting allows you to manage whether virus definitions are used during a scan. This policy setting controls whether or not complex list settings configured by a local administrator are merged with Group Policy settings. This setting applies to lists such as threats and exclusions. This policy, if defined, will prevent antimalware from using the configured proxy server when communicating with the specified IP addresses. The address value should be entered as a valid URL. the named proxy that should be used when the client attempts to connect to the network for definition updates and SpyNet reporting. If the named proxy fails or if there is no proxy specified, the following settings will be used (in order): 1. Internet Explorer proxy settings 2. Autodetect 3. None This policy setting allows you to enable or disable randomization of the scheduled scan time and the scheduled definition update start time. whether or not the antimalware service remains running when antivirus and antispyware definitions are disabled. It is recommended that this setting remains disabled. 12

13 Client Interface Display notifications to clients when they need to perform actions Display additional text to clients when they need to perform an actions Network Inspection System Turn on protocol recognition Turn on definition retirement Define the rate of detections events for logging Specify additional definition sets for network traffic inspection IP address range exclusions Port number exclusions Process exclusions for outbound traffic Threat ID exclusions Quarantine whether or not to display notifications to client when they need to perform the following actions: Run a full scan Download the latest virus and spyware definitions Download Standalone System Sweeper whether or not to display additional text to clients when they need to perform an action. protocol recognition for network protection against exploits of known vulnerabilities. definition retirement for network protection against exploits of known vulnerabilities. This policy setting limits the rate at which detection events for network protection against exploits of known vulnerabilities will be logged. This policy setting defines additional definition sets to enable for network traffic inspection. Definition set GUIDs should be added under the Options for this setting. This policy, if defined, will prevent network protection against exploits of known vulnerabilities from inspecting the specified IP addresses. This policy setting defines a list of TCP port numbers from which network traffic inspection will be disabled. This policy setting defines processes from which outbound network traffic will not be inspected. This policy setting defines threats which will be excluded from detection during network traffic inspection. 13

14 Configure local setting override for the removal of items from Quarantine folder Configure removal of items from Quarantine folder Real-time Protection Turn on Information Protection Control Remediation Turn on raw volume write notifications Turn on process scanning whenever real-time protection is enabled Define the maximum size of downloaded files and attachments to be scanned Configure local setting override for turn on behavior monitoring Configure local setting override for scanning all downloaded files and attachments Configure local setting override to turn off Intrusion Prevention System Configure local setting override for monitoring file and program activity on your computer Configure local setting override to turn on real-time protection Configure local setting override for monitoring for incoming and outgoing file activity This policy setting configures a local override for the configuration of the number of days items should be kept in the Quarantine folder before being removed. This policy setting defines the number of days items should be kept in the Quarantine folder before being removed. Information Protection Control. This policy setting controls whether raw volume write notifications are sent to behavior monitoring. process scanning when real-time protection is turned on. This policy setting defines the maximum size (in kilobytes) of downloaded files and attachments that will be scanned. This policy setting configures a local override for the configuration of behavior monitoring. This policy setting configures a local override for the configuration of scanning for all downloaded files and attachments. This setting can only be set by Group Policy. This policy setting configures a local override for the configuration of network protection against exploits of known vulnerabilities. This policy setting configures a local override for the configuration of monitoring for file and program activity on your computer. This setting can only be set by Group Policy. This policy setting configures a local override for the configuration to turn on real-time protection. This setting can only be set by Group Policy. This policy setting configures a local override for the configuration of monitoring for incoming and outgoing file activity. 14

15 Configure local setting override for the time of day to run a scheduled full scan to complete remediation Specify the day of the week to run a scheduled full scan to complete remediation Specify the time of day to run a scheduled full scan to complete remediation Reporting Configure time out for detections requiring additional action Scan Configure time out for detections in critically failed state Configure Watson events Configure time out for detections in non-critical failed state Configure time out for detections in recently remediated state Configure Windows software trace preprocessor components Configure WPP tracing level Allow users to pause scan Specify the maximum depth to scan archive files This policy setting configures a local override for the configuration of the time to run a scheduled full scan to complete remediation. This policy setting allows you to specify the day of the week on which to perform a scheduled full scan in order to complete remediation. This policy setting allows you to specify the time of day at which to perform a scheduled full scan in order to complete remediation. This policy setting configures the time in minutes before a detection in the additional action state moves to the cleared state. This policy setting configures the time in minutes before a detection in the critically failed state moves to either the additional action state or the cleared state. whether or not Watson events are sent. This policy setting configures the time in minutes before a detection in the non-critically failed state moves to the cleared state. This policy setting configures the time in minutes before a detection in the completed state moves to the cleared state. This policy configures Windows software trace preprocessor (WPP Software Tracing) components. This policy allows you to configure tracing levels for Windows software trace preprocessor (WPP Software Tracing). This policy setting allows you to manage whether or not end users can pause a scan in progress. the maximum directory depth level into which archive files such as.zip or.cab are unpacked during scanning. The default directory depth level is 0. 15

16 Specify the maximum size of archive files to be scanned Scan archive files Turn on catch-up full scan Turn on catch-up quick scan Turn on scanning Turn on heuristics Scan packed executables Scan removable drives Turn on reparse point scanning Create a system restore point Run full scan on mapped network drives the maximum size of archive files such as.zip or.cab that will be scanned. scans for malicious software and unwanted software in archive files such as.zip or.cab files. catchup scans for scheduled full scan. A catch-up scan is a scan that is initiates because a regularly scheduled scan was missed. catchup scans scheduled quick scans. A catch-up scan is a scan that is initiates because a regularly scheduled scan was missed. scanning. When scanning is enabled, the engine will parse the mailbox and mail files according to their specified format, in order to analyze the mail bodies and attachments. heuristics. Suspicious detections will be suppressed right before reporting to the engine client. scanning for packed executables. This policy setting allows you to manage whether or not to scan for malicious software and unwanted software in the contents of removable drives, such as USB flash drives, when running a full scan. reparse point scanning. This policy setting allows you to create a system restore point on the computer on a daily basis prior to cleaning. scanning mapped network drives. 16

17 Scan network files Configure local setting override for maximum percentage of CPU utilization Configure local setting override for the scan type to use for a scheduled scan Configure local setting override for schedule scan day Configure local setting override for scheduled quick scan time Configure local setting override for scheduled scan time Turn on removal of items from scan history folder Specify the interval to run quick scans per day Signature Updates Define the number of days before spyware definitions are considered out of date Define the number of days before virus definitions are considered out of date Define file shares for downloading definition updates Turn on scan after signature update scanning for network files. It is recommended that you do not enable this setting. This policy setting configures a local override for maximum percentage of CPU utilization. This policy setting configures a local override for the configuration of the scan type to use during a scheduled scan. This policy setting configures a local override for the configuration of scheduled scan day. This setting can only be set by Group Policy. This policy setting configures a local override for the configuration of scheduled quick scan time. This policy setting configures a local override for the configuration of scheduled scan time. This policy setting defines the number of days items should be kept in the scan history folder before being permanently removed. The value represents the number of days to keep items in the folder. If set to zero, items will be kept forever and will not be automatically removed. This policy setting allows you to specify an interval at which to perform a quick scan. The time value is represented as the number of hours between quick scans. This policy setting allows you to define the number of days that must pass before spyware definitions are considered out of date. This policy setting allows you to define the number days that must pass before virus definitions are considered out of date. UNC file share sources for downloading definition updates. the automatic scan which starts after a definition update has occurred. 17

18 Allow definition updates when running on battery power Initiate definition update on startup Define the order of sources for downloading definition updates Allow definition updates from Microsoft Update Allow real-time definition updates based on reports to Microsoft SpyNet Specify the day of the week to check for definition updates Specify the time to check for definition updates Allow notifications to disable definition based reports to Microsoft SpyNet Define the number of days after which a catch-up definition update is required Specify the interval to check for definition updates Check for the latest virus and spyware definitions on startup SpyNet Configure local setting override for reporting to Microsoft SpyNet definition updates when the computer is running on battery power. definition updates on startup when there is no antimalware engine present. This policy setting allows you to define the order in which different definition update sources should be contacted. This policy setting allows you to enable download of definition updates from Microsoft Update even if the Automatic Updates default server is configured to another download source such as Windows Update. This policy setting allows you to enable real-time definition updates in response to reports sent to Microsoft SpyNet. This policy setting allows you to specify the day of the week on which to check for definition updates. This policy setting allows you to specify the time of day ay which to check for definition updates. antimalware service to receive notifications to disable individual definitions in reponse to reports it sends to Microsoft SpyNet. This policy setting allows you to define the number of days after which a catch-up definition update will be required. This policy setting allows you to specify an interval at which to check for definition updates. This policy setting allows you to manage whether a check for new virus and spyware definition will occur immediately after service startup. This policy setting configures a local override for the configuration to join Microsoft SpyNet. 18

19 Threat Id Default Action This policy setting customize which remediation action will be taken for each listed Threat ID when it is detected during a scan. 19

20 Removing settings Removing a setting will cause the Endpoint Protection client to revert to its default values, or use the settings applied to it from a GPO linked at a higher level. 1. In the GPMC, expand your domain node, and locate the GPO you want to remove settings from. 2. Right click on the new GPO node, and select Edit. 3. In the Group Policy Management Editor expand Computer Configuration, Policies, Software Settings, and select Specops Deploy / Endpoint Protection. 4. You can: Option Step Remove all the settings that apply to the GPO In the settings overview page, click Disable. Remove individual settings 1. Click Edit. 2. Navigate to the setting you want to remove. 3. Uncheck the Enabled button. 20

21 Reporting The Specops Reporting component is entirely web based and can be accessed from your browser. You can access Specops Reporting using your browser. The URL for Specops Reporting depends on where the component was installed. Endpoint Protection reports provide a good overview of the feedback gathered from your Endpoint Protection clients. View predefined Reports 1. Enter the URL for Specops Reporting. 2. In the navigation pane, expand Specops Reporting, and click Specops Endpoint Protection. 3. Select the report you want to view. The following is a list of the predefined reports you can view: Incident reports: Allow you to monitor any reported issues with malware or viruses: o Antimalware/Virus for a computer o Antimalware/Virus information o Antispyware status per computer o Antivirus status per computer Client status reports: Allow you to quickly find information of the client computer. o Client status per computer o Endpoint Protection Client Installation Status o Last full scan information per computer o Last quick scan information per computer o Missing Endpoint Protection Client Threat reports: Allow you to monitor a summary of the current threat status. o Threat outbreak last 24 hours o Threat outbreak last 7 days 21

22 Create a new report You can customize the view of the information gathered by creating a new report definition. 1. Enter the URL for Specops Reporting. 2. In the navigation pane, click create new report. 3. Specify the following fields: Field Report name Report category Report description Columns Groupings Filters Import report definition Export report definition Step Enter a report name Specify a report category Enter a report description Add Columns to the report. You will be able to specify the Column heading, Field, and Display name. To group data in the report, select a column and drag and drop it in the group panel. This will remove the column from the visible columns and display a grouping rectangle for the column in the group panel. Add any filtering of data by clicking on the Filters tab and selecting additional filter data field and values to filter by. You can import report definition from the import web page or from a file. You can export a report definition from the export web page. The export page displays a complete list of all reports in the database grouped by report categories. 4. Click Save. 22

23 Edit an existing report 1. Enter the URL for Specops Reporting. 2. In the navigation pane, expand Specops Reporting, and click Specops Endpoint Protection. 3. Click Edit next to the report you want to modify. 4. Make the necessary changes, and click Save. 23

24 Export Report data You can export report data in a PDF or a CSV format for further processing. 1. Enter the URL for Specops Reporting. 2. In the navigation pane, expand Specops Reporting, and click Specops Endpoint Protection. 3. Select the Report you want to export. 4. If required, select the client computer from the Computer drop box. 5. Specify the page size in the Page size drop box. 6. From the Export to drop box, select the report format. a. If you selected PDF, you will also need to specify the page layout from the drop box. 7. Click the green button. 24

25 Delete a Report 1. Enter the URL for Specops Reporting. 2. In the navigation pane, expand Specops Reporting, and click Specops Endpoint Protection. 3. Click Delete next to the report you want to delete. 4. Click OK. 25

26 template customization You can customize the template that is used to send s when new threats are detected. You can find the template file on the server hosting the Specops Deploy Server service at the following path: %ProgramFiles%\Specopssoft\Deploy\Server\SEP Template.xml To edit the template, open the file in an editor and modify the content of the following tags: <Subject> <Body> 26

27 Specops Deploy / Endpoint Protection registry settings Below you will find a list of the registry settings used by the components of Specops Deploy / Endpoint Protection. Registry key HKLM\SOFTWARE\Specopssoft\Specops Deploy\Endpoint Protection\Configuration\ClearLogFile HKLM\SOFTWARE\Specopssoft\Specops Deploy\Endpoint Protection\Configuration\Debug HKLM\SOFTWARE\Specopssoft\Specops Deploy\Endpoint Protection\Configuration\LogFilePath HKLM\SOFTWARE\Specopssoft\Specops Deploy\Endpoint Protection\Configuration\MaxMbFileSize HKLM\SOFTWARE\Specopssoft\Specops Deploy\Endpoint Protection\SnapIn\ClearLogFile HKLM\SOFTWARE\Specopssoft\Specops Deploy\Endpoint Protection\SnapIn\Debug HKLM\SOFTWARE\Specopssoft\Specops Deploy\Endpoint Protection\Mail HKEY_LOCAL_MACHINE\SOFTWARE\Micr osoft\windows NT\CurrentVersion\Winlogon\GPExtensions\ {A7A1D7A7-613D-4abf-8C6E- A427ADD2A200}\Debug Description Clears the log file when the server is initialized. Default value: 1 Enables or disables debug logging on the Specops Deploy Server Service. Default value: 0 Specifies the path where the debug log file will be stored. Default value: %LocalAppData%\Specopssoft\SEP.Configuration.log. Maximum size of a log file before a new log file is created. Note that only the two latest log files will be kept. Default value: 0x a (10) Indicates that the GPMC snap-in debug log file should be cleared when logging starts. Default value: 1 Enables or disables logging of the activity performed by the Specops Deploy / Endpoint Protection GPMC snap-in. Default value: 1 Holds the value for the mail configuration settings. Enables or disables debug logging of the activity performed by the Specops Deploy Client-Side Extension. Default value: 0x (0) 27

28 Support For helpful tips and solutions for troubleshooting the product, find the Specops Deploy / Endpoint Protection Troubleshooting Guide from If you are unable to resolve a product related issue, contact Specops Support for assistance. Online We recommend submitting your case directly on our website at: Telephone International Monday - Friday: 09:00-17:00 CET North America SPECOPS ( ) Monday - Friday: 09:00-17:00 EST 28

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Installation Guide. . All right reserved. For more information about Specops Command and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Command and other Specops products, visit . All right reserved. For more information about Specops Command and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Command is a trademark owned by Specops Software.

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.

More information

McAfee MVISION Endpoint 1808 Product Guide

McAfee MVISION Endpoint 1808 Product Guide McAfee MVISION Endpoint 1808 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Specops Password Policy

Specops Password Policy Specops Software. All right reserved. For more information about Specops Password Policy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Policy is a trademark

More information

McAfee MVISION Endpoint 1811 Product Guide

McAfee MVISION Endpoint 1811 Product Guide McAfee MVISION Endpoint 1811 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

Installation Guide. . All right reserved. For more information about Specops Password Policy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Password Policy and other Specops products, visit . All right reserved. For more information about Specops Password Policy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Policy is a trademark owned by Specops

More information

Security for Everyone - Reviewing Microsoft Security Essentials 2.0 & the Windows 7 Firewall By Chuck

Security for Everyone - Reviewing Microsoft Security Essentials 2.0 & the Windows 7 Firewall By Chuck Security for Everyone - Reviewing Microsoft Security Essentials 2.0 & the Windows 7 Firewall By Chuck Security Essentials was released in September 2009 to differing opinions. In a short amount of time

More information

Zemana Endpoint Security Administration Guide. Version

Zemana Endpoint Security Administration Guide. Version Zemana Endpoint Security Administration Guide Version 1.9.290 Introduction 4 What is Zemana Endpoint Security? 4 What is Zemana Control Center? 4 How do Endpoint Agents and Control Center communicate with

More information

Comodo Client - Security for Linux Software Version 2.2

Comodo Client - Security for Linux Software Version 2.2 Comodo Client - Security for Linux Software Version 2.2 User Guide Guide Version 2.2.091818 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Client

More information

Installation Manual. and User Guide

Installation Manual. and User Guide Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 AntiMalware User Guide Version 7.0 English January 6, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

Antivirus Solution Guide for Clustered Data ONTAP: Sophos

Antivirus Solution Guide for Clustered Data ONTAP: Sophos Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Sophos Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4309 Abstract An antivirus solution is key for enterprises

More information

Client Proxy interface reference

Client Proxy interface reference Reference Guide McAfee Client Proxy 2.3.2 Client Proxy interface reference These tables provide information about the settings found in the Client Proxy UI. Policy Catalog On the McAfee Client Proxy page

More information

Comodo Antivirus Software Version 2.1

Comodo Antivirus Software Version 2.1 Comodo Antivirus Software Version 2.1 User Guide Guide Version 2.1.030515 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

User Manual. www. K7Computing.com

User Manual. www. K7Computing.com User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the network and you

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Comodo Antivirus for Linux Software Version 1.0

Comodo Antivirus for Linux Software Version 1.0 Comodo Antivirus for Linux Software Version 1.0 User Guide Guide Version 1.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus for

More information

User Guide. Version R95. English

User Guide. Version R95. English Anti-Malware (Classic) User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Endpoint Protection...3 Dashboard...3 Alerts...4 Root Cause Analysis...9 Logs & Reports... 11 People... 24 Computers...33 Computer Groups...40

More information

Using Centralized Security Reporting

Using Centralized  Security Reporting This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the

More information

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business. Endpoint Protection Antivirus and Antispyware Eliminates all types of threats, including viruses, rootkits, worms and spyware. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers

More information

CounterACT Check Point Threat Prevention Module

CounterACT Check Point Threat Prevention Module CounterACT Check Point Threat Prevention Module Version 1.0.0 Table of Contents About the Check Point Threat Prevention Integration... 4 Use Cases... 4 Additional Check Point Threat Prevention Documentation...

More information

IBM Security SiteProtector System User Guide for Security Analysts

IBM Security SiteProtector System User Guide for Security Analysts IBM Security IBM Security SiteProtector System User Guide for Security Analysts Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 83. This

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Trend Micro OfficeScan XG

Trend Micro OfficeScan XG Trend Micro OfficeScan XG Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned herein

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

Step [2]: Hit on Create icon and Choose the "Create macos Profile" from the drop-down menu

Step [2]: Hit on Create icon and Choose the Create macos Profile from the drop-down menu This guide allows a user to configure Antivirus Settings through a profile. The settings include all low-level details to be parameterized from ITSM hence the Realtime Scan (at the time of threats encountered),

More information

Troubleshooting Guide

Troubleshooting Guide . All right reserved. For more information about Specops Reset and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Reset is a trademark owned by Specops Software.

More information

Tanium Protect User Guide. Version 1.9.3

Tanium Protect User Guide. Version 1.9.3 Tanium Protect User Guide Version 1.9.3 January 08, 2019 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is

More information

Integrate Viper business antivirus EventTracker Enterprise

Integrate Viper business antivirus EventTracker Enterprise Integrate Viper business antivirus EventTracker Enterprise Publication Date: June 2, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Overview... 3 Dashboard...3 Alerts...4 Logs & Reports... 10 People... 25 Devices... 34 Global Settings...50 Protect Devices...78 Endpoint

More information

Copyright and Trademarks

Copyright and Trademarks Copyright and Trademarks Specops Password Reset is a trademark owned by Specops Software. All other trademarks used and mentioned in this document belong to their respective owners. 2 Contents Key Components

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

McAfee Endpoint Security Threat Prevention Product Guide - Windows

McAfee Endpoint Security Threat Prevention Product Guide - Windows McAfee Endpoint Security 10.6.0 - Threat Prevention Product Guide - Windows COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

AntiVirus 8.5 Update 2. User Guide

AntiVirus 8.5 Update 2. User Guide AntiVirus 8.5 Update 2 User Guide Notices Version Information Ivanti Endpoint Security: AntiVirus User Guide - Ivanti Endpoint Security: AntiVirus Version 8.5 Update 2 - Published: Apr 2018 Document Number:

More information

Sophos Enterprise Console help. Product version: 5.5

Sophos Enterprise Console help. Product version: 5.5 Sophos Enterprise Console help Product version: 5.5 Contents 1 About Sophos Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7 2.2 Toolbar buttons...7

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Sophos Enterprise Console

Sophos Enterprise Console Sophos Enterprise Console Help Product Version: 5.5 Contents About Sophos Enterprise Console...1 Guide to the Enterprise Console interface... 2 User interface layout... 2 Toolbar buttons...2 Dashboard

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Comodo Antivirus Software Version 2.0

Comodo Antivirus Software Version 2.0 Comodo Antivirus Software Version 2.0 User Guide Guide Version 2.0.010215 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

ForeScout Extended Module for Bromium Secure Platform

ForeScout Extended Module for Bromium Secure Platform ForeScout Extended Module for Bromium Secure Platform Version 1.3.0 Table of Contents About the Bromium Integration... 3 Additional Bromium Secure Platform Documentation... 3 About This Module... 3 How

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

Trend Micro OfficeScan Client User Guide

Trend Micro OfficeScan Client User Guide Trend Micro OfficeScan Client User Guide Overview The purpose of this document is to provide users with information on the Trend Micro OfficeScan antivirus client. OfficeScan is the new anti-virus/anti-malware

More information

Microsoft Forefront Client Security

Microsoft Forefront Client Security Microsoft Forefront Client Security Operations Guide Prepared by Microsoft Thursday, 2 October 2008 First published 13 February 2008 Copyright This document and/or software ( this Content ) has been created

More information

Small Office Security 2. Scan PC for viruses and vulnerabilities

Small Office Security 2. Scan PC for viruses and vulnerabilities Small Office Security 2 Scan PC for viruses and vulnerabilities Table of content Table of content... 1 Scan PC for viruses... 2 What is Scan... 2 Starting scan... 2 Starting scan from the main application

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Anti-Malware User Guide Version 1.1 July 11, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Tanium Protect User Guide. Version 1.2.0

Tanium Protect User Guide. Version 1.2.0 Tanium Protect User Guide Version 1.2.0 September 20, 2017 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

CounterACT IOC Scanner Plugin

CounterACT IOC Scanner Plugin CounterACT IOC Scanner Plugin Version 2.0.1 Table of Contents About the CounterACT IOC Scanner Plugin... 4 Use Cases... 5 Broaden the Scope and Capacity of Scanning Activities... 5 Use CounterACT Policy

More information

Lead2pass.Microsoft v Q

Lead2pass.Microsoft v Q Lead2pass.Microsoft.70-162.v12.49.55Q Number: 70-162 Passing Score: 800 Time Limit: 120 min File Version: 12.49 ht t p:/ / w w w.gratisexam.com/ Vendor: Microsoft Exam Code: 70-162 Exam Name: TS: Forefront

More information

Threat Detection and Response. Deployment Guide

Threat Detection and Response. Deployment Guide Threat Detection and Response Deployment Guide About This Guide The Threat Detection and Response Getting Started Guide is a guide to help you set up the Threat Detection and Response subscription service.

More information

Specops Password Reset

Specops Password Reset Specops Software. All right reserved. For more information about Specops Password Reset and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Reset is a trademark

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

Endpoint Security Manager

Endpoint Security Manager Comodo Endpoint Security Manager Software Version 1.6 CIS Configuration Editor Version 1.6.010511 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction

More information

Annexure E Technical Bid Format

Annexure E Technical Bid Format Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

AVG File Server. User Manual. Document revision ( )

AVG File Server. User Manual. Document revision ( ) AVG File Server User Manual Document revision 2015.07 (5.2.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and

More information

What s New in Version 3.5 Table of Contents

What s New in Version 3.5 Table of Contents MARCH 2011 Table of Contents BitDefender Business Solutions v3.5 at a Glance:... 3 1. Why Network Defense, System Audit and Operational Management?... 4 2. Integrated Network Security, Audit and System

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

Even a non-technical user can even operate it with ease.the user can do any task in CCS with just a few clicks.

Even a non-technical user can even operate it with ease.the user can do any task in CCS with just a few clicks. The Comodo Client Security identifies all security risks and provides protection against it.now, the interface of the Comodo Client Security is made very simple. It is integrated with Firewall, Antivirus,

More information

ForeScout CounterACT. Configuration Guide. Version 2.2

ForeScout CounterACT. Configuration Guide. Version 2.2 ForeScout CounterACT Core Extensions Module: IOC Scanner Plugin Version 2.2 Table of Contents About the CounterACT IOC Scanner Plugin... 4 Use Cases... 5 Broaden the Scope and Capacity of Scanning Activities...

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control. For Microsoft Windows

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control. For Microsoft Windows Client Guide for Symantec Endpoint Protection and Symantec Network Access Control For Microsoft Windows Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Integrate Microsoft Antimalware. EventTracker v8.x and above

Integrate Microsoft Antimalware. EventTracker v8.x and above Integrate Microsoft Antimalware EventTracker v8.x and above Publication Date: September 6, 2017 Abstract This guide provides instructions to configure Microsoft Antimalware to send logs to EventTracker

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Antivirus User Guide Version 1.1 June 29, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

ESET CYBER SECURITY PRO for Mac

ESET CYBER SECURITY PRO for Mac ESET CYBER SECURITY PRO for Mac Installation Manual and User Guide Click here to download the most recent version of this document ESET CYBER SECURITY PRO Copyright 2012 by ESET, spol. s r.o. ESET Cyber

More information

Avira Free Mac Security Version HowTo

Avira Free Mac Security Version HowTo Avira Free Mac Security Version 2.0.4 HowTo Table of contents 1. Introduction... 3 1.1 Features... 3 1.2 System Requirements...4 2. Installation...4 2.1 Installation with the install wizard...4 2.2 Installation

More information

Small Office Security 2. Mail Anti-Virus

Small Office Security 2. Mail Anti-Virus Small Office Security 2 Mail Anti-Virus Table of content Table of content... 1 Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/Disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus...

More information

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide Mission Control for the Microsoft Cloud 5nine Cloud Security Web Portal Version 12.o Getting Started Guide 2018 5nine Software Inc. All rights reserved. All trademarks are the property of their respective

More information

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 Quick Start Guide Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning

More information

Chapter 5: Configuring ServerProtect

Chapter 5: Configuring ServerProtect Chapter 5: Configuring ServerProtect Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the types of ServerProtect tasks Describe which actions

More information

Anti-virus SCEP and Windows Defender. Common symptoms of an infection. How to Open SCEP or Windows Defender

Anti-virus SCEP and Windows Defender. Common symptoms of an infection. How to Open SCEP or Windows Defender Anti-virus SCEP and Windows Defender The University of Aberdeen uses System Center Endpoint Protection software (SCEP) and Windows Defender to protect servers and networked Windows PCs against viruses,

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Using CSC SSM with Trend Micro Damage Cleanup Services

Using CSC SSM with Trend Micro Damage Cleanup Services APPENDIXD Using CSC SSM with Trend Micro Damage Cleanup Services Trend Micro InterScan for CSC SSM works with Trend Micro Damage Cleanup Services (DCS) as part of an enterprise protection strategy. The

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

WorldSecure/Mail Getting Started Guide

WorldSecure/Mail Getting Started Guide WorldSecure/Mail Getting Started Guide Release 4.3 012-0068-43 The software described in this document is furnished under license and may be used or copied only according to the terms of such license.

More information

McAfee Endpoint Security

McAfee Endpoint Security Release Notes 10.5.3 Contents About this release What's new Resolved issues Installation information Known issues Getting product information by email Where to find product documentation About this release

More information

Configuring Symantec AntiVirus for BlueArc Storage System

Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System The software described in this book is furnished under a license agreement and may be

More information

Antivirus Solution Guide for Clustered Data ONTAP: Kaspersky

Antivirus Solution Guide for Clustered Data ONTAP: Kaspersky Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Kaspersky Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4445 Abstract An antivirus solution is key to enable enterprises

More information

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1 Antivirus Solution Guide NetApp Clustered Data ONTAP 8.2.1 Contents Abstract... 4 Audience... 4 Purpose and Scope... 4 Introduction... 4 Antivirus Solution Architecture... 5 Components of the Vscan/AV

More information

ZENworks 2017 Update 2 Endpoint Security Agent Reference. February 2018

ZENworks 2017 Update 2 Endpoint Security Agent Reference. February 2018 ZENworks 2017 Update 2 Endpoint Security Agent Reference February 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

: Administration of Symantec Endpoint Protection 14 Exam

: Administration of Symantec Endpoint Protection 14 Exam 250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks

More information