Zemana Endpoint Security Administration Guide. Version

Size: px
Start display at page:

Download "Zemana Endpoint Security Administration Guide. Version"

Transcription

1 Zemana Endpoint Security Administration Guide Version

2 Introduction 4 What is Zemana Endpoint Security? 4 What is Zemana Control Center? 4 How do Endpoint Agents and Control Center communicate with each other? 4 Features 5 Support 6 Getting Started 7 Server Requirements for Zemana Control Center 7 Endpoint Requirements for Zemana Endpoint Security Agents 7 Installation 8 Step 1: Installing Control Center 8 Step 2: Deployment of Endpoint Agents 9 Manual Deployment 9 Deployment via Group Policy Object 9 Creating a Machine Startup Script for use with Active Directory 9 Registering the Machine Startup Script with a Group Policy Object 10 Mail Deployment 10 Remote Deployment 11 Optional Step 3: Installing Failover Server 11 Administration 13 Logging into Control Center 13 Modules 13 Dashboard 13 Network 13 Groups Pane 13 Endpoints Pane 14 Endpoints Pane Context Menu 14 Filters 15 Endpoint Actions Bar 15 Endpoint Details Dialog 15 Tasks 16 Policies 16 Quarantine 16 Reports 16 Deployment 17 Notifications 18 Audit Logs 18 Settings 18 Failover Servers 19 1

3 User Management 20 User Types 20 Roles 20 Update Servers 21 How to install an Update Server? 21 How to check the status of Update Servers? 21 How to uninstall an Update Server? 21 Policy 23 General Settings 23 Anti-Virus Settings 23 Content Control Settings 24 ID Theft Protection Settings 25 Frequently Asked Questions 27 How do I create a backup of Zemana Control Center? 27 How do I restore Zemana Control Center? 27 How do I create a support tool output? 27 How do I enable SSL on Zemana Control Center? 28 Enabling SSL in IIS Manager 28 Enabling SSL in Control Center 28 How do I migrate Zemana Control Center to a new server? 28 Migrating Control Center to a new server 28 Forwarding Endpoint Agents to New Control Center 28 What ports are used by Endpoint Agents and Control Center? 29 External URLs used by Endpoint Agents and Control Center? 29 How do I uninstall Endpoint Agents? 29 How do I uninstall a group of Endpoint Agents? 30 How do I send feedback about the product? 30 2

4 Introduction 3

5 Introduction Thank you for choosing Zemana Endpoint Security. This document will guide you through all the features of Zemana Endpoint Security and Control Center. What is Zemana Endpoint Security? Zemana Endpoint Security is a client-server solution which protects your physical or virtual machines against all types of threats including phishing, malware, cryptolocker while providing you with the best user experience on managing your entire network. What is Zemana Control Center? Zemana Control Center is a web-based management console for managing endpoint security agents installed on your network. How do Endpoint Agents and Control Center communicate with each other? Endpoint Agents connect to Zemana Control Center using a one-way communication channel over predefined ports which are automatically allowed by the installation packages. In case you are using different VLANs for Agents and Control Center, please make sure these ports are properly forwarded from Agent VLAN to Control Center VLAN. 4

6 Features Zemana Endpoint Security combines the following features and lets you manage these features through a web-based management console for ease of use: AntiMalware protection (On-Demand and On-Access scans) Zero-day malware protection Identity Theft Protection Cryptolocker protection Advanced rootkit and bootkit remediation Web Control for blocking access to harmful web sites Keyword filtering for blocking access to websites containing provided keywords Application blocking Search advisor for browsers Policy based centralized management Scheduled Scans Active Directory integration Out-of-box SIEM integration Advanced Reporting module Internal update mirrors for low-bandwidth usage 5

7 Support Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. In case you need technical assistance, please contact with the following information available: Product version Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description with the following information: Error messages and log files (located at C:\zemana_logs) Support tool output ( click here for more information about creating a support tool output) Recent software configuration changes and network changes 6

8 Getting Started Server Requirements for Zemana Control Center Supported operating systems: Minimum required server version is Windows Server 2008 R2 64bit Hardware requirements: 64 bit Intel 1 GHz or higher (or equivalent) 8 GB available RAM 20 GB free space on the hard drive Internet connection (required for product activation and some update features) Endpoint Requirements for Zemana Endpoint Security Agents Supported operating systems: Minimum required version is Windows XP Hardware requirements: Intel Pentium 300 MHz or higher (or equivalent) 1 GB available RAM 4 GB free space on the hard drive 7

9 Installation Installation of Zemana Endpoint Security is divided into two steps. The first step is the Control Center Installation, which provides you with the endpoint installation packages and continues on the second step of installation, which is Endpoint Agents Installation. Once the two steps are completed, you will be able to login to Control Center and start managing the computers in your network. Step 1: Installing Control Center 1. Download the latest version of Zemana Control Center Installer using the link below: 2. Double-click on the installer and accept UAC Prompt if prompted so, 3. Accept the User License Agreement and click Next, 4. Check Create Desktop Shortcut for easy access to Zemana Control Center from your desktop and click Next, 5. Wait for the installer to extract installation files, 6. Click Install Control Center option and click Next, 7. Choose either Direct Internet Connection option or Use Proxy for Connecting to Internet option, 8. Enter a valid license for Zemana Control Center. If you don t have one, please contact support@zemana.com, 9. Provide a Domain Name or a Static IP address for Control Center to use. This is the address you will enter into your browser s address bar. If you use an IP address here, make sure it is static. NOTE: For testing purposes, you can use as the IP address but you need to change it before starting the deployment of endpoint agents, 10. Enter Administrator and a password for managing Zemana Control Center. This account will be used for logging into the Control Center and it will also be set as the Control Center s System Administrator account (most privileged account type), 11. If you use Active Directory in your company, select Use Active Directory for managing computers in my network option or skip this step by choosing Skip Active Directory integration option. The account you provide in this step will *only* be used for synchronization purposes, 12. Wait for Setup to download packages and complete all the steps, IMPORTANT NOTE: This step could take a few minutes due to downloading of endpoint installation packages and other installation media. 13. Once this step is completed, setup will automatically open your browser and direct you to Login Page, 8

10 14. Click Finish to complete setup and use the Administrator and Password you have provided in the previous steps to login into Zemana Control Center. Step 2: Deployment of Endpoint Agents Deployment of endpoint agents can be performed in two alternate ways: Manual Deployment and Deployment via GPO. Manual Deployment a. Open the browser in the machine you would like to install endpoint agent to, b. Navigate to Deploy Page. This URL doesn t require authentication to make deployment of endpoint agents into your network as easy as possible, c. This page will provide you with 32bit and 64bit versions of Endpoint Setup Packages as ZIP files, d. Download the appropriate package and extract the ZIP archive to a directory. This will extract the contents of ZIP file which should contain installer exes and configuration files, e. Double click the installer32.exe or installer64.exe to start installation of Agent, f. Once installation is completed, you will be able to see the endpoint in Network Page. Deployment via Group Policy Object Deployment via GPO is composed of two steps. First, you need to create a deployment script using Control Center and then you should set this script as a machine startup script by the help of GPO. 1. Creating a Machine Startup Script for use with Active Directory a. Navigate to page, b. You will be provided with 32bit and 64bit versions of Endpoint Setup Packages as ZIP files, c. Download both ZIP files to your computer and extract them to separate directories, d. Create a shared folder either in one of your Domain Controllers or in a file server, e. Give Everyone read access to this folder and copy installer32.exe and installer64.exe into this folder, f. Copy the path of shared folder as a UNC path. As an example, if you have created a folder named Shared, the UNC path should be \\SomeServer\Shared g. Click Create Deployment Script button in Deployment Page, h. Paste the shared folder path into Shared Folder Path textbox in the dialog, i. Choose preference for removing competitor products, 9

11 j. Click Download Script button in the dialog and save the resulting BAT file into your computer. 2. Registering the Machine Startup Script with a Group Policy Object a. Open Group Policy Management Console in your Domain Controller, b. Create a GPO for deploying Endpoint Agent into your network, c. Right click on the created GPO and select Edit, d. In the opened Group Policy Management Editor window, select Computer Configuration > Policies > Windows Settings > Scripts (Startup / Shutdown) section, e. In the right pane, double click Startup item, f. In the opened Startup Properties page, click Show Files button. This will open the startup scripts directory in Explorer, g. Copy the Machine Startup Script you have created in the previous step into the folder, h. Close the Explorer window and click Add button in Startup Properties page. This will bring up Add Script dialog, i. Click Browse in the Add Script dialog and select the previously copied Deployment Script and click OK j. Machines using this GPO will automatically install Endpoint Agent after they are restarted. Mail Deployment a. Open the browser and access Control Center, b. Navigate to Deployment Page. c. Click Send via from left menu under Setup Packages, d. Add recipient addresses to List To Send box, e. Review mail content in the editor and click Send, f. Recipients will receive deployment mail which contains Endpoint Agent download links. WARNING: This feature requires a configured Server on Control Center Settings. 10

12 Remote Deployment a. Find Zemana Deploy Manager icon on the desktop of Zemana Endpoint Security Control Center installed machine, double click to execute (Default path : "C:\Program Files\Zemana Control Center\Zemana.EPS.Console.DeployManager.exe"), b. To target Active Directory computers click Deploy using Active Directory, or to target computers on your network using computer name or IP address click Deploy using Computer Name / IP Address, c. On current window a computer selection list or a text area to type computer names or IP addresses (each should be entered line by line) is displayed according to your previous choice. Select target machines or type computer name / IP address of target machines then click Proceed, d. Type local administrator credentials in order to start deployment on your target computers, e. Choose preference for removing competitor products, f. Click Start Deployment to start deployment process. g. Deployment will be initiated on target computers remotely. Deployment statuses will be displayed on current window. Deployment process will be conducted silently. WARNING: Administrative Share and File Sharing permissions should be allowed on target machines. Remote Deployment uses 135, 139 and 445 ports, these ports should be accessible as well. Optional Step 3: Installing Failover Server 1. Download the latest version of Zemana Control Center Installer to a server, which will be used as a Failover Server, using the link below: 2. Double-click on the installer and accept UAC Prompt if prompted so 3. Accept the User License Agreement and click Next, 4. Check Create Desktop Shortcut for easy access to Zemana Control Center from your desktop and click Next, 5. Wait for the installer to extract installation files, 6. Click Install Failover / Mirror Server option and click Next, 7. Failover server will be automatically installed, click Finish. Failover server management will be explained in detail in Failover Servers section of Administration chapter. 11

13 Administration 12

14 Administration Zemana Control Center is a web-based management console for administering Zemana Endpoint Security agents. This chapter will guide you through all the features of Zemana Control Center. Logging into Control Center You can log in to Control Center using one of the account types below: Local Accounts Active Directory Accounts At least one local account is created during the installation process but you are free to add any number of Local or Active Directory accounts after logging into the Control Center. On a fresh installation, login page only allows you to use Local Accounts. You can add Active Directory accounts by navigating to User Management by clicking the dropdown menu at the topmost right of Control Center. NOTE: Control Center logins have a session timeout limit which is 30 minutes by default. Modules Dashboard Dashboard is the first page you will see after a successful login. This page contains charts for endpoints, issues and licensing as well as a Threats Timeline and a list of Critical Endpoints. Threats Timeline lets you view the security events which take place on endpoints on a daily basis. You can click on a specific day to get a detailed Threat Report. Reports will be explained in detail in Reports section of this chapter. Network Network page is where you will see all of the endpoints in your network. It contains a Groups Pane for displaying custom endpoint groups and Active Directory domain groups, and a right pane which lists the contents of the selected group. If no endpoint group is selected, right pane displays all endpoints. Groups Pane This pane is located at the leftmost side of Network Page and contains a top level group named Computers which acts as the default container for individual endpoints which do 13

15 not belong to any Active Directory Domain. If Active Directory is not set up, this is the only top level group you will see in Network Page. After configuring Active Directory synchronization from Settings, each domain in Active Directory will be another top level group in this pane. Active Directory synchronization feature will mirror the exact same structure of your domains including organizational units and groups and computers. Endpoints Pane This is the pane which displays the contents of selected Group in your network. Endpoints are listed in a grid alongside some useful information such as the issues and online status of endpoint. At any given time, an endpoint could be in one of the three management states: 1. Managed : Endpoint is managed by the Control Center and it is ready to accept tasks and policies. 2. UnManaged : Endpoint is discovered through the Active Directory but it hasn t got Endpoint Security Agent installed yet. 3. Deploy Failed : Endpoint Security Agent installation failed on this endpoint. This could be due to a number of reasons such as the failure to uninstall a competitor AntiVirus solution and etc. These type of endpoints require manual installation and inspection. In normal cases, endpoint should not have any issues but in case something goes wrong in an endpoint, you will see the issues in this pane as well. Issue types for endpoints are as listed below: 1. Update Failed : Endpoint can not get product or signature updates. 2. Outdated : Endpoint s last update time is older than 3 days which can be changed in Settings. 3. Feature Status Mismatch : Status of protection modules on endpoint does not comply with the policy applied to the endpoint. 4. Infected : Endpoint is infected with a malware and it was not possible to clean the endpoint. 5. Scan Failed : Scheduled or on demand scan task failed to complete. 6. Reboot Required : Endpoint agent requires reboot to perform some tasks such as boot deleting malware or completing an update. 7. Unreachable : Endpoint didn t connect to Control Center for more than 7 days which can be changed in Settings. Endpoints Pane Context Menu This is the right click context menu which lets the Administrator perform endpoint related tasks and set labels for endpoints. Tasks listed here can also be found in Quick Actions bar in Endpoint Details Dialog. 14

16 Filters This buttons brings up a dialog in which you can change the settings related to viewing of endpoints in Endpoints Pane. Normal behavior of Endpoints Pane is displaying the contents of the selected group without including the endpoints which reside in sub-groups of the selected group. You can change this behavior by choosing a Group and then selecting All Groups Recursively option in Filter dialog. Default behavior of Endpoint Pane when no group is selected is displaying all endpoints in all groups including Active Directory domains and Computers top level group. This is why, when no group is selected, Filters dialog will not have All Groups Recursively option until you select a Group from the Groups Pane. You can also provide a computer name for filtering all computer names containing the provided string. After setting the required filter options, you should click Save for activating the filter options. Endpoint Actions Bar This bar is located at the upper side of Groups Pane and it lets the IT Admin perform endpoint and group related tasks such as creating a new group, renaming an already existing group and deleting an endpoint. Please note that, group related actions in this bar are only applicable to groups created beneath Computers top level group and they will be disabled when an Active Directory Domain group is selected. This is because Active Directory Domain groups are synchronized directly from the provided domain and IT Admin has to make changes in the domain itself (in domain controller) and click Sync Active Directory button in this bar to fetch updated domain structure. In order to use Sync Active Directory feature, you should configure Control Center to use Active Directory from Settings page. Endpoint Details Dialog Endpoints Pane displays a summary of information about each endpoint. In case you need to get more information about the endpoint, you should click on the name of the endpoint which will bring up Endpoint Details Dialog. This dialog contains detailed information about the selected endpoint and it also provides you with a Quick Actions bar for performing endpoint related tasks. Tabs in this dialog are as follows: 1. General Tab : Displays most of the information about the Endpoint. 2. Endpoint Tab : Displays the status of protection modules. 3. Policy Tab : Displays the last assigned policy of endpoint and assignment status / type of the policy. Assignment type of policy can either be Inherited or Direct. Inherited indicates that endpoint inherited its policy from its parent group so no direct assignment is made by the IT Admin. 4. Events Tab : Displays all type of events which was sent by the Endpoint Agent. 15

17 Tasks Tasks are the main unit of work for Endpoint Agents. Tasks are assigned to Endpoint Agents by the Control Center in response to Administrator's actions. They can be assigned to a single or multiple endpoint agents and lets the administrator view status of the task on each endpoint. Tasks module keeps a record of each assigned task and sets the status of task to Pending until the all the endpoints connects to the Control Center and gets the task. In this case, task status is switched to In Progress. After the task completes in all endpoints, task will be marked as Completed. For further inspection about the status of task on each endpoint, you can click on the numbers in the Status column. Policies Policy is a group of settings which can be applied to a single or a group of endpoints. Policies include all types of settings an endpoint should comply with. Control Center is shipped with a default / optimized policy which is called First Policy and this policy is set as Default Policy so any endpoint which joins into the managed group of computers receives this policy as their active policy. You can create any number of policies using Create Policy button in the actions toolbar and you can also create a copy of the policy by selecting the source policy and clicking the Clone Policy button. NOTE: Please refer to Policy Section for more information. Quarantine This module lists the files which are quarantined by Endpoint Agents and provides you with the following options: Restore : Restore the quarantined file to the endpoint. This is what Administrator should do to revert the quarantine action and let the user use the file in question. Delete File : This option deletes the file from quarantine. Delete Record : This options removes the quarantine entry from Control Center and doesn't do anything on the endpoint side. This is useful for deleting quarantine entries which are submitted from unreachable endpoints. Reports This module allows you to create instant or scheduled reports from the Control Center. 16

18 Main grid of this page lists the previously registered Scheduled Reports. You can edit or delete a previously created report by highlighting the report and clicking the appropriate action button in the action toolbar. Report types are: 1. Threat Report: Displays all detections including malware detections and content control detections. This report type is a merged view of "Malware Detection Report" and "Content Control Report". 2. Malware Detection Report: Displays malware detection events on all endpoints. 3. Content Control Report: Displays content control related detections on all endpoints such as blocked web pages and keywords. 4. Endpoint Protection Status Report: Displays the protection status of each endpoint with latest scan results. 5. Endpoint Feature Status Report: Displays the ON/OFF status of each protection module for endpoints. 6. Endpoint Update Status Report: Displays the update status of each endpoint. 7. Endpoint Policy Report: Displays the policy name of each endpoint. 8. Endpoint Issue Report: Displays all types of issues encountered on each endpoint. 9. Endpoint Management Status Report: Displays the management status of each endpoint. Specifying addresses while creating Scheduled Reports lets report content to be sent to specified addresses upon creation of periodic reports. Deployment WARNING: In order to receive scheduled reports with , Server should be configured on Control Center settings. Deployment page lets you download setup packages for Endpoint Agents and Update Servers. This page also has a separate tab named Update Servers which let s you view the currently in use update servers. This page is only for viewing active update servers for information purposes. Setup Packages Endpoint Agent and Update Server packages can be downloaded by clicking the appropriate link in this section. Setup packages are archive files which contain an installer and a configuration file. Update Servers This section lists the active Update Servers of Control Center for information purposes only. Uninstalling an Update Server will automatically delete its entry from this list. 17

19 Notifications This module lists the notifications about Control Center and informs the Administrator about important events. Currently supported notifications are: Active Directory Synchronization Failed Backup Failed Notification Failed due to SMTP settings New Control Center Update is available Update Server Capacity Exceeded License Related Notifications Audit Logs This module lets you view all of the important activities performed by Control Center users. It is viewable by Administrators and System Administrator only. Settings This module contains all configurations for Zemana Control Center to function properly and it is the most critical part of the system. Control Center General Control Center Address: Address of Control Center which should be either an IP Address or a domain name. Control Center Language: User interface language for Control Center management console. Endpoint Language: User interface language for endpoint agents. Timezone: Timezone information for the Control Center. All the information in Control Center database is saved in UTC+0 by default and converted to the timezone you provide in this field. Proxy: Proxy configuration for Control Center. Server: SMTP server settings which will be used for sending critical events to Administrators via . Advanced Use SSL: Endpoint agents will use HTTP by default. Enabling this option forces endpoint agents to use HTTPS for connecting to Control Center. IMPORTANT: You should add an SSL certificate to Control Center before enabling this option. Please check this section for more information. 18

20 Send error reports to Zemana: Submits error reports to Zemana automatically when enabled. Enable Debug Logging for trouble shooting: Reserved for Zemana support personnel's use. Threat endpoints as outdated after: Indicates how many days should pass before marking an endpoint as Outdated. Threat endpoints as unreachable after: Indicates how many days should pass before marking an endpoint as Unreachable. Backup: Options for automatic backup creation. Current version supports file system shares and FTP upload options. In order to create a manual backup, please refer to this section. Active Directory: When enabled, Control Center connects to the provided Active Directory domain and synchronizes the directory structure as well as computers directly into the network module. This is performed with a background job which fires twice in an hour. License: Provides information about the currently in use license. Event Notifications: Provides configuration for sending events to System Administrator via and SIEM and Syslog. When enabled, Control Center sends the selected events to System Administrator s and/or provided SIEM server. WARNING: In order to receive event notifications with , Server should be configured on Control Center settings. Failover Servers This module allows user to register, unregister and overview Zemana Failover Servers. If Control Center has one or more failover servers registered, Endpoint Agents will connect those servers in case their connection to Control Center fails. Failover Server Registration To register a failover server, navigate to Failover Servers Page, click Add Failover Server and type failover server address then click OK. If targeted failover server is eligible it will be added to failover servers list. IMPORTANT: Registration requires a server with Zemana Failover Server installed. Failover Server Unregistration To unregister a failover server, navigate to Failover Servers Page, hover over an existing failover server and click Delete then click Yes. Targeted failover server will be deleted from failover servers list. 19

21 User Management User Types Local Users : This account type is for customers who do not use Active Directory in their network. Active Directory Users: Active Directory provided users which will be used for managing Roles Control Center. Since, Active Directory user passwords are managed by Active Directory itself, Control Center doesn't need any password information for this type. Creating an Active Directory user only approves the user as a valid Control Center account. 1. System Administrator: This role can be applied to a single user only and defines the most privileged user in Control Center. This user is the sole owner of the system and there are no restrictions for this role. 2. Administrator: This is a less privileged administrator role which is capable of managing the Control Center. The only restriction is that this role cannot change the Control Center settings. 3. Report Manager: a. View only access to Network page, b. View only access to Tasks page, c. View only access to Quarantine page. d. Full access to Reports page. 4. Maintenance Manager: a. View only access to Network page, b. Ability to manage endpoints, c. View only access to Tasks page, d. View only access to Policy page, e. Full access to Quarantine page, f. Limited access to Reports page (can create instant reports and view scheduled reports) g. Full access to Deployment page, 5. Monitoring Engineer a. View only access to Network page, b. View only access to Reports page. In case a user forgets account password, Forgot your password? button on Login page can be used to retrieve user credentials to their address. 20

22 Update Servers Internal Update Servers are separate setup packages which can be used by Zemana Control Center to centralize delivery of signature and product updates. Control Center automatically loads balances update servers and distributes them to endpoints in a round robin manner. Each Update Server can handle endpoints. Once this limit is exceeded, Control Center notifies Administrator to install more update servers. How to install an Update Server? In order to install an internal update server, please follow the steps below: 1. Set a static IP address to the server which will be used as an update mirror, 2. Open your preferred browser and navigate to Deployment page, 3. Download the appropriate update server package by clicking either 32-bit or 64 bit links, 4. Extract the Update Server Setup Package contents to a directory, 5. Run installation file and follow the on-screen prompts. Upon installation, update server will automatically connect to Control Center and register itself as an active update server. How to check the status of Update Servers? 1. Navigate to Deployment page and click "Update Servers" tab, 2. You can see the active update servers and their statuses here. How to uninstall an Update Server? Update Servers are normal installation packages which can be uninstalled using "Control Panel > Programs And Features" panel. Upon uninstallation, Update Server entry will be removed from the Control Center automatically and endpoint agents will be notified to use other Update Servers by using this Update Server as their Update Source NOTE: If there are no update servers left in the Control Center, the system will automatically set Update Source settings to "Internet" in all policies. 21

23 Policy 22

24 Policy General Settings These are general settings which affect the way endpoints work. Details Policy Name : Name of the policy Product Settings Settings Display alert pop-ups : Displays alerts to a user and asks for user's decision. If unchecked, endpoint agents will automatically choose the best possible action without asking the user anything. Display notification pop-ups: Displays informational pop-ups such as update notifications. Show product icon in System Tray: Displays Endpoint Agent icon in Windows System Tray. Update Server Settings: Endpoint Agents require either an active Internet connection or an update mirror address for grabbing product and signature updates from. By default all endpoints use Internet for their update source but you can install an Internal Update Mirror anytime and instruct the endpoints to use this mirror. Control Center maintains a list of active update mirrors and distributes these to the endpoints in an optimized way. Uninstall/Repair Password: This is the password which will be asked from a user in case a manual repair or uninstall operation is initiated by the user manually. Remote tasks ignore this password and do not need any user interaction. Proxy Settings: Endpoint proxy settings for connecting to the Internet. Anti-Virus Settings Anti-virus related settings for endpoints. On-Access Settings: Enables or disables real time protection module of Zemana Endpoint Security Agent. This switch acts as a master switch for all of the settings below. Limit File Size: Sets the maximum size limit for real time malware scanning. Unchecking this option removes the size limit and enables real time scanning of all files. Scan Archives Archive maximum size limit: Enables or disables scanning or Archive files. Archive maximum depth: Level of recursion in archive content scanning. Miscellaneous Scan Boot Sectors: Enables/disables scanning of boot records such as MBR and VBRs. 23

25 Scan Network Traffic: Scans the network traffic against malicious files and blocks the content before it is delivered to the requesting application. Scan Potentially Unwanted Applications (PUA): Enabling this option activates scanning of not harmful but potentially unwanted applications such as sticky toolbars in browsers. On-Demand Settings: Enables or disables scan settings for removable devices such as USB drives, CD ROMs etc. as well as providing support for scheduled scans. Scan Tasks: Scheduled scans with Quick and Full scan options. Scan tasks registered here start at the provided time at endpoint's local time zone. Device Scan Settings Scan CD/DVD ROM: Enable/disable scanning of CD/DVD ROM devices. Scan Network Devices: Enable/disable scanning of network devices such as network file shares. Scan Removable Devices: Enable/disable scanning of removable drives such as USB sticks. Heuristics: Configures the level of Zemana Heuristic Threat Control. Currently 4 levels are supported: Paranoid, Aggressive, Default, Permissive. Setting this option to a level above Default will increase the heuristics based protection against unknown files but may lead to false positives. Exclusions: Excludes the specified Directory, File or Extensions from all AntiMalware modules including On-Access, On-Demand, Heuristic. Quarantine Settings: Configures the amount of days a quarantined file is kept on an endpoint. Content Control Settings Configures content based protection options such as URL filtering and keyword filtering. Settings General Enable Anti-Phishing and Anti-Fraud Protection: Enables/disables scanning of web content against possible phishing attempts. Scan SSL Traffic: Enables/disables scanning of SSL protected pages. Web Access Control: Functions as a master switch for enabling/disabling web access control related settings. Blocked Web Addresses: Blocks the access to provided web addresses on endpoints. Access blocking is not specific to browsers and covers all type of applications trying to access the blocked web site. Blocked Keywords: Blocks the web content which contains the provided keywords. Blocked Processes: Blocks the specified processes by name. Exclusions: Excludes specified URL, IP Address or Process Names from content control access restrictions. 24

26 ID Theft Protection Settings Settings for enabling/disabling ID Theft Protection Module. Settings Enable Identity Theft Protection : Enables/disables ID Theft Protection feature. 25

27 Frequently Asked Questions 26

28 Frequently Asked Questions How do I create a backup of Zemana Control Center? In order to create a manual backup of Zemana Control Center, please follow the steps below: 1. Open "Explorer" in the Zemana Control Center server machine, 2. Navigate to "C:\Program Files\Zemana Control Center\utils" folder, 3. Run "Backup Zemana Control Center" as Administrator, 4. Choose a folder for saving the backup file, 5. Click OK. This will create a snapshot of all the database and settings of Zemana Control Center and save them as a ZIP file to the selected folder. How do I restore Zemana Control Center? In order to restore Zemana Control Center from a backup, please follow the steps below: 1. Open "Explorer" in the Zemana Control Center server machine, 2. Navigate to "C:\Program Files\Zemana Control Center\utils" folder, 3. Run "Restore Zemana Control Center" as Administrator, 4. Choose a previously created backup file, 5. Click OK. How do I create a support tool output? Before contacting the support, please follow the steps below and create a support tool output which will be saved to your desktop: 1. Open Explorer in your computer, 2. Navigate to "C:\Windows\zestools" folder, 3. Run "SupportTool.exe" and follow the on-screen prompts. 27

29 How do I enable SSL on Zemana Control Center? Control Center uses HTTP as its default communication protocol but you can change this behaviour any time by adding an SSL certificate to the Control Center. Here are the steps you should follow for activating SSL on Control Center and Endpoint Agents: 1. Enabling SSL in IIS Manager i. Click "Start Menu", ii. Type "IIS" and click "Internet Information Services (IIS) Manager", iii. Expand the directory view at the left side of IIS Manager, iv. Right click to "Sites > ZemanaControlCenter" v. On the "Site Bindings" dialog, select second entry "HTTPS" and click "Edit", vi. On the "Edit Site Bindings" dialog choose an SSL Certificate, vii. Click OK to save changes. 2. Enabling SSL in Control Center i. Once SSL is enabled in IIS Manager, navigate to Settings > Advanced Settings, ii. Enable "Use SSL" feature, iii. Click "Save" to apply settings. How do I migrate Zemana Control Center to a new server? Migrating an already running instance of Control Center requires two steps: 1. Migrating Control Center to a new server i. Create a backup of Zemana Control Center by following the steps described in FAQ, ii. Install Zemana Control Center to a new server, iii. Navigate to "C:\Program Files\Zemana Control Center\utils" folder on the new server, iv. Run "Restore Zemana Control Center" as Administrator, v. Choose the backup file you have created in the step 1, vi. Click OK. 2. Forwarding Endpoint Agents to New Control Center i. Once migration is done, you will have an exact copy of old Control Center in your new server, ii. Make sure old instance can access the new Control Center. If not, configure Firewall settings to allow access from old instance's to new instance's address, iii. Disable Active Directory Synchronization on the old instance, iv. Navigate to Settings page on old instance, v. Set "Control Center Address" to new instance's IP or Domain name, vi. Save settings. 28

30 IMPORTANT NOTE: Disabling Active Directory synchronization is required to detect endpoints which are still using the old instance. Endpoints will report to the old instance that they started using the new server which will delete them from the endpoints list on the old instance. This way, you can see endpoints waiting for migration and once all the endpoints are migrated, you can shutdown the old Control Center instance. What ports are used by Endpoint Agents and Control Center? - TCP 55555: Default HTTP port for agent to control center connections. - TCP 55556: HTTPS port. Only usable if Enable SSL setting is ON. - TCP 7074: Signature and product update port , 139, 445 : Remote deployment - 80 : License check (HTTP) : License check (HTTPS) - 389, 636, 3268, 3269 : (LDAP) Active Directory authentication External URLs used by Endpoint Agents and Control Center? How do I uninstall Endpoint Agents? Setup packages are basically windows installation files and they can be uninstalled just like any other application. The important thing to note about the uninstallation is that each setup package may install a few other additional packages. Deciding which package to uninstall plays an important role for the complete uninstall. In order to completely uninstall an endpoint agent, please follow the steps below: 1. Click Start button and type Programs and Features, 2. Find Zemana Endpoint Security Agent entry in the list, 3. Right click on the entry and select Uninstall option, 4. Enter the uninstall password if requested so, 5. Follow the on-screen instructions. 29

31 How do I uninstall a group of Endpoint Agents? Please follow the steps below for uninstalling a group of computers: 1. Go to Network page, 2. Right click on the group you would like to uninstall, 3. Choose Tasks > Uninstall Agent from the context menu, 4. Assign a descriptive name to the uninstallation task, 5. Click OK. How do I send feedback about the product? In order to send a feedback about the product, please scroll down in any page and click Send Feedback link at the footer. 30

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Copyright 2017 Softerra, Ltd. All rights reserved

Copyright 2017 Softerra, Ltd. All rights reserved Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

User Guide. Version R95. English

User Guide. Version R95. English Anti-Malware (Classic) User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Installation Manual. and User Guide

Installation Manual. and User Guide Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information

More information

Symantec Endpoint Protection Installation Guide

Symantec Endpoint Protection Installation Guide Symantec Endpoint Protection 11.0 Installation Guide SYMANTEC ENDPOINT PROTECTION 11.0 TABLE OF CONTENTS A NEW SECURITY APPLICATION... 1 INTRODUCTION... 1 WHAT IS SYMANTEC ENDPOINT PROTECTION (SEP) 11.0?...

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 AntiMalware User Guide Version 7.0 English January 6, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Sophos Enterprise Console help. Product version: 5.5

Sophos Enterprise Console help. Product version: 5.5 Sophos Enterprise Console help Product version: 5.5 Contents 1 About Sophos Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7 2.2 Toolbar buttons...7

More information

Anchor User Guide. Presented by: Last Revised: August 07, 2017

Anchor User Guide. Presented by: Last Revised: August 07, 2017 Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

Sophos Enterprise Console

Sophos Enterprise Console Sophos Enterprise Console Help Product Version: 5.5 Contents About Sophos Enterprise Console...1 Guide to the Enterprise Console interface... 2 User interface layout... 2 Toolbar buttons...2 Dashboard

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1 Antivirus Solution Guide NetApp Clustered Data ONTAP 8.2.1 Contents Abstract... 4 Audience... 4 Purpose and Scope... 4 Introduction... 4 Antivirus Solution Architecture... 5 Components of the Vscan/AV

More information

User Guide. Version R93. English

User Guide. Version R93. English Anti-Malware User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

10.2 Running process checklist Contacting TEMASOFT Support... 30

10.2 Running process checklist Contacting TEMASOFT Support... 30 2018 User manual Contents Table of Figures... 3 1. Introduction... 4 1.1. About TEMASOFT Ranstop... 4 1.2. How TEMASOFT Ranstop works... 5 1.3. TEMASOFT Ranstop components... 5 2. Installing TEMASOFT Ranstop...

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Antivirus User Guide Version 1.1 June 29, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

BitDefender Enterprise Manager. Startup guide

BitDefender Enterprise Manager. Startup guide BitDefender Enterprise Manager Startup guide 1 Table of Contents Product installation... 3 Install BitDefender Enterprise Manager... 3 Install BitDefender Server add-on... 4 Protection configuration...

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

KYOCERA Net Admin Installation Guide

KYOCERA Net Admin Installation Guide KYOCERA Net Admin Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,

More information

Comodo SecureBox Management Console Software Version 1.9

Comodo SecureBox Management Console Software Version 1.9 6. Comodo SecureBox Management Console Software Version 1.9 Administrator Guide Guide Version 1.9.032817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to

More information

Proactive-CCTV Server Installation Guide v1.0

Proactive-CCTV Server Installation Guide v1.0 v1.0 For Support Email: michael@proactive-cctv.com www.proactive-cctv.com 1. Getting Started Welcome to the Proactive-CCTV. Please Read Before Starting Installation Initial Setup & Requirements Operating

More information

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support... Quick Start Guide Table of Contents Overview... 4 Deployment... 4 System Requirements... 4 Installation... 6 Working with AD360... 8 Starting AD360... 8 Launching AD360 client... 9 Stopping AD360... 9

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

ESET Remote Administrator v6 Getting Started Guide for MSPs January 2017

ESET Remote Administrator v6 Getting Started Guide for MSPs January 2017 ESET Remote Administrator v6 Getting Started Guide for MSPs January 2017 Table of Contents Table of Contents... 2 Environmental Pre-requisites... 3 Installing ESET Remote Administrator (ERA)... 4 Configuring

More information

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved. Install and upgrade Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

User Guide. Revised in Nov, AccessPatrol. Version Endpoint Security Software

User Guide. Revised in Nov, AccessPatrol. Version Endpoint Security Software User Guide Revised in Nov, 2018 AccessPatrol Version 5.3.2 Endpoint Security Software AccessPatrol User Guide - Table of Contents 1.0 Introduction to AccessPatrol... 4 1.1 CurrentWare Components... 5 1.2

More information

SOLUTION MANAGEMENT GROUP

SOLUTION MANAGEMENT GROUP InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

Endpoint Security Manager

Endpoint Security Manager Comodo Endpoint Security Manager Software Version 1.6 CIS Configuration Editor Version 1.6.010511 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Comodo Network Center Software Version 1.1

Comodo Network Center Software Version 1.1 Comodo Network Center Software Version 1.1 User Guide Guide Version 2.3.112311 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents Comodo Network Center - Introduction...

More information

Antivirus Solution Guide for Clustered Data ONTAP: Symantec

Antivirus Solution Guide for Clustered Data ONTAP: Symantec Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Symantec Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4304 Abstract An antivirus solution is key for enterprises

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 USER GUIDE MADCAP PULSE 4 Installation Guide for Pulse on Windows Server 2012 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

SonicWALL Security Software

SonicWALL  Security Software Email Security SonicWALL Email Security 7.2.4 Software System Compatibility SonicWALL Email Security 7.2.4 Software is supported on systems with the following: Operating Systems Windows 2003, SP2 Windows

More information

Automation Anywhere Enterprise 10 LTS

Automation Anywhere Enterprise 10 LTS Automation Anywhere Enterprise 10 LTS Document Version: 1.3 Installation Guide Date of Publication: 15 th November, 2016 Update(s) to this document edition: Table of Contents 1. Client Prerequisites Processor

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Kaseya 2. Installation guide. Version R8. English

Kaseya 2. Installation guide. Version R8. English Kaseya 2 Kaseya Server Setup Installation guide Version R8 English October 24, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

User Manual. www. K7Computing.com

User Manual. www. K7Computing.com User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the network and you

More information

This document provides instructions for the following products.

This document provides instructions for the following products. 1.1 Introduction 1.1.1 Purpose 1.1.2 Scope To install anti-virus software on the Brevera Breast Biopsy system with CorLumina imaging technology system. This document applies to all CorLumina systems with

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Barracuda Firewall Release Notes 6.6.X

Barracuda Firewall Release Notes 6.6.X Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that

More information

F-Secure Policy Manager Administrator's Guide

F-Secure Policy Manager Administrator's Guide F-Secure Policy Manager Administrator's Guide 17-10-25 TOC F-Secure Policy Manager Contents Chapter 1: Introduction...7 1.1 What's new...8 1.2 System requirements...8 1.2.1 Policy Manager Server...8 1.2.2

More information

Acronis Data Cloud plugin for ConnectWise Automate

Acronis Data Cloud plugin for ConnectWise Automate Acronis Data Cloud plugin for ConnectWise Automate USER S GUIDE Revision: 17.01.2018 Table of contents 1 Introduction...3 2 What s new in Update 3...3 3 What s new in Update 2...3 4 What s new in Update

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Comodo Endpoint Security Manager Business Edition Software Version 2.0

Comodo Endpoint Security Manager Business Edition Software Version 2.0 Comodo Endpoint Security Manager Business Edition Software Version 2.0 Administrator Guide Guide Version 2.0.020212 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents

More information

User Guide. Revised in March, AccessPatrol. Version Endpoint Security Tool

User Guide. Revised in March, AccessPatrol. Version Endpoint Security Tool User Guide Revised in March, 2018 AccessPatrol Version 5.2.7 Endpoint Security Tool AccessPatrol User Guide - Table of Contents 1.0 Introduction to AccessPatrol... 4 1.1 CurrentWare Components... 5 1.2

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5

VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5 VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE This manual provides a quick introduction to Virtual Iron software, and explains how to use Virtual Iron VI-Center to configure and manage virtual

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7 Administering vrealize Log Insight September 20, 2018 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Veriato Recon / 360. Version 9.0.3

Veriato Recon / 360. Version 9.0.3 Veriato Recon / 360 Version 9.0.3 1/3/2018 Upgrade Guide January 3, 2018 Table of Contents Before You Begin... 1 What's New... 1 How the System Works... 1 Upgrade Support... 6 Update Antivirus Exclusions...

More information

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Getting Started Guide This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Contents 2 Contents Introduction... 3 System Requirements... 4

More information

Sophos for Virtual Environments. startup guide -- Sophos Central edition

Sophos for Virtual Environments. startup guide -- Sophos Central edition Sophos for Virtual Environments startup guide -- Sophos Central edition Contents About this guide... 1 About Sophos for Virtual Environments...2 Key steps in installation... 5 Check the system requirements...

More information

ApplicationServer XG Version 11. Last updated:

ApplicationServer XG Version 11. Last updated: ApplicationServer XG Version 11 Last updated: 2013-10-09 Table of Contents Introduction to 2X ApplicationServer... 1 What is 2X ApplicationServer?... 1 How does it work?... 1 About This Document... 1 Introduction...

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 2 Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Dell Repository Manager Business Client Version 2.1 User s Guide

Dell Repository Manager Business Client Version 2.1 User s Guide Dell Repository Manager Business Client Version 2.1 User s Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

Installation on Windows Server 2008

Installation on Windows Server 2008 USER GUIDE MADCAP PULSE 4 Installation on Windows Server 2008 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 5.1 Program Overview Contents About the Program Ekran Server & Management Tool Database Management Licensing Client Installation Monitoring Parameters Client Protection Advanced User Authentication

More information

vcenter CapacityIQ Installation Guide

vcenter CapacityIQ Installation Guide vcenter CapacityIQ 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Accops HyWorks v3.0. Installation Guide

Accops HyWorks v3.0. Installation Guide Accops HyWorks v3.0 Installation Guide Last Update: 4/25/2017 2017 Accops Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

VMware Mirage Web Management Guide. VMware Mirage 5.9.1

VMware Mirage Web Management Guide. VMware Mirage 5.9.1 VMware Mirage Web Management Guide VMware Mirage 5.9.1 VMware Mirage Web Management Guide You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Installing the Cisco Unified MeetingPlace Web Server Software

Installing the Cisco Unified MeetingPlace Web Server Software Installing the Cisco Unified MeetingPlace Web Server Software Release 8.5 Revised: 2/19/13 : Install the Application Server (which includes the Software Media Server) : Install the Hardware Media Server

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

IBM Single Sign On for Bluemix Version December Identity Bridge Configuration topics

IBM Single Sign On for Bluemix Version December Identity Bridge Configuration topics IBM Single Sign On for Bluemix Version 2.0 28 December 2014 Identity Bridge Configuration topics IBM Single Sign On for Bluemix Version 2.0 28 December 2014 Identity Bridge Configuration topics ii IBM

More information

Acronis Data Cloud plugin for ConnectWise Automate

Acronis Data Cloud plugin for ConnectWise Automate Acronis Data Cloud plugin for ConnectWise Automate USER'S GUIDE Revision: 24.08.2018 Table of contents 1 Introduction...3 2 What's new in Update 4...3 3 What's new in Update 3...3 4 What's new in Update

More information

Platform Compatibility... 1 Enhancements... 2 Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 3 Related Technical Documentation...

Platform Compatibility... 1 Enhancements... 2 Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 3 Related Technical Documentation... SonicOS Contents Platform Compatibility... 1 Enhancements... 2 Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 3 Related Technical Documentation...7 Platform Compatibility The SonicOS

More information

SIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2

SIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2 SIMATIC Process Control System PCS 7 V7.0 SP1 SIMATIC Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software Security Information Note Preface 1 Using virus scanners

More information

User Guide For Version 4.0

User Guide For Version 4.0 User Guide For Version 4.0 Easy-to-use, Complete Cyber Cafe Management Software by icafe Manager User Guide Contents Chapter 1: Introduction 7 1.1 About the Manual 7 1.2 Intended Audience 7 1.3 Conventions

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Anti-Malware User Guide Version 1.1 July 11, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Management Console User Guide

Management Console User Guide Secure Web Gateway Management Console User Guide Release 10.2.0 Manual Version v 10.2.0.1 M86 SECURITY SECURE WEB GATEWAY MANAGEMENT CONSOLE USER GUIDE 2012 M86 Security All rights reserved. 828 W. Taft

More information

Mcafee epo. Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0

Mcafee epo.  Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0 Mcafee epo Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ McAfee MA0-100 McAfee Certified Product Specialist-ePO Practice Test Version: 4.0 Exam A QUESTION

More information

Migrating vrealize Automation 6.2 to 7.2

Migrating vrealize Automation 6.2 to 7.2 Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

FileCruiser. Administrator Portal Guide

FileCruiser. Administrator Portal Guide FileCruiser Administrator Portal Guide Contents Administrator Portal Guide Contents Login to the Administration Portal 1 Home 2 Capacity Overview 2 Menu Features 3 OU Space/Team Space/Personal Space Usage

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Overview... 3 Dashboard...3 Alerts...4 Logs & Reports... 10 People... 25 Devices... 34 Global Settings...50 Protect Devices...78 Endpoint

More information

EventTracker Manual Agent Deployment User Manual Version 7.x

EventTracker Manual Agent Deployment User Manual Version 7.x EventTracker Manual Agent Deployment User Manual Version 7.x Publication Date: Nov 12, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract EventTracker Agent deployment

More information

NETWRIX INACTIVE USER TRACKER

NETWRIX INACTIVE USER TRACKER NETWRIX INACTIVE USER TRACKER QUICK-START GUIDE Product Version: 3.0.106 March 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Online Backup Client User Manual

Online Backup Client User Manual Software version 3.21 For Mac OS X September 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or

More information