Kaspersky Endpoint Security 10 for Mac

Size: px
Start display at page:

Download "Kaspersky Endpoint Security 10 for Mac"

Transcription

1 Kaspersky Endpoint Security 10 for Mac Administrator's Guide Application version: 10 Service Pack 1

2 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding the software. Attention! This document is the property of AO Kaspersky Lab (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal reproduction and distribution of this document or parts hereof incur civil, administrative, or criminal liability under applicable law. Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission of Kaspersky Lab. This document, and graphic images related to it, may be used for informational, non-commercial, and personal purposes only. Kaspersky Lab reserves the right to amend this document without additional notification. Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used in this document to which rights are held by third parties, or for any potential harms associated with use of the document. Document revision date: AO Kaspersky Lab. All Rights Reserved

3 Contents About this document... 9 Document conventions... 9 Kaspersky Endpoint Security overview Sources of information about the application Sources of information to research on your own Discuss Kaspersky Lab applications on the Forum Install and uninstall Kaspersky Endpoint Security Distribution kit Hardware and software requirements Prepare for installation Install Kaspersky Endpoint Security Prepare the application for use Uninstall Kaspersky Endpoint Security Kaspersky Endpoint Security interface Main application window Kaspersky Endpoint Security icon Application preferences window Notifications and banners About notifications About banners Set up notifications and banners Kaspersky Endpoint Security licensing About the End User License Agreement About the license About subscription About the license certificate About the key About the activation code About the key file About data provision... 37

4 View license information Renew a license Renew subscription Update subscription status Activate Kaspersky Endpoint Security Perform common tasks Start and quit the application View the status of computer protection Disable and resume computer protection Perform scan tasks Use Protection Center Configure the automatic start of a scheduled virus scan task What to do if file access is blocked Update application databases What to do if the application has quarantined a file What to do if you suspect that a file is infected with a virus Restore a file that has been deleted or disinfected by the application View the application operation report What to do if notification windows appear Advanced configuration of the application Computer protection scope File Anti-Virus Web Anti-Virus Network Attack Blocker Virus Scan Update tasks Quarantine and Backup Reports Participate in Kaspersky Security Network Manage the application from the command line Commands overview View Help Run virus scan Contents 4

5 Update the application Roll back the last update Start/stop a component or task View status and statistics of a component or task Export protection preferences Activate the application Return codes of the command line Quit the application Manage the application via Kaspersky Security Center Deploy Kaspersky Endpoint Security on a corporate network Prepare for remote installation of Kaspersky Endpoint Security Install the Kaspersky Endpoint Security administration plug-in Install Network Agent locally Install Network Agent using the SSH protocol Manage Network Agent from the command line Start/stop Network Agent on a remote computer Connect a remote computer to Administration Server manually. Klmover utility. 122 Check the connection between a client computer and Administration Server manually. Klnagchk utility Install and uninstall Kaspersky Endpoint Security Install the application using the SSH protocol Install the application using Kaspersky Security Center Step 1. Select the task type Step 2. Select the installation package Step 3. Install additional applications Step 4. Configure the installation settings Step 5. Select the operating system restart option Step 6. Select an administration group to add computers to after installation. 129 Step 7. Define how to select client computers for which the task will be created Step 8. Select client computers Step 9. Select an account to run the task Step 10. Configure the task schedule Step 11. Specify the task name Step 12. Finish creating the task Contents 5

6 Create an installation package Step 1. Select the task type Step 2. Select the application to uninstall Step 3. Configure uninstallation settings Step 4. Select the operating system restart option Step 5. Define how to select client computers for which the task will be created Step 6. Select client computers Step 7. Select a user account to run the task Step 8. Configure the task schedule Step 9. Specify the task name Step 10. Finish creating the task Start and stop the application via Kaspersky Security Center Create and manage tasks Create tasks Create a local task for a separate client computer Create a task for client computers in an administration group Create a task for an arbitrary set of computers Step 1. Specify the task name Step 2. Select an application and define the task type Step 3. Configure settings for the selected task type Step 4. Define how to select client computers for which the task will be created Step 5. Select client computers Step 6. Configure the task schedule Step 7. Finish creating the task Start and stop tasks manually Import and export tasks View tasks View tasks for a specific administration group View local tasks View non-local tasks Manage task-specific settings View task settings Create and manage policies Contents 6

7 Create a policy Step 1. Specify the name of the policy Step 2. Select an application Step 3. Specify protection settings Step 4. Configure File Anti-Virus settings Step 5. Configure Web Anti-Virus settings Step 6. Configure Network Attack Blocker Step 7. Configure update settings Step 8. Configure KSN settings Step 9. Configure user interaction settings Step 10. Configure network connection settings Step 11. Configure reports, Quarantine, and Backup settings Step 12. Select the policy status and complete the creation of a policy Configure policy settings Change the policy status Import a policy from a KLP file Export a policy to a KLP file View the list of policies Create and manage policy profiles Create a policy profile Modify a policy profile Change the priority of a policy profile Delete a policy profile Generate a report on detected objects Contact Technical Support How to get technical support Get technical support by phone Technical Support via Kaspersky CompanyAccount Use a trace file Create a trace file Collect information for Technical Support Appendices Warnings and restrictions List of objects scanned by extension Contents 7

8 Masks in paths to files and folders Glossary AO Kaspersky Lab Information about third-party code Trademark notices Index Contents 8

9 About this document Kaspersky Endpoint Security 10 for Mac (Kaspersky Endpoint Security) Administrator's Guide is intended for technical specialists who install and administer Kaspersky Endpoint Security, as well as for those who provide technical support to organizations that use Kaspersky Endpoint Security. Use this Guide to do the following tasks: Prepare for the installation of the application, install and activate the application. Configure and use the application. Remotely manage the application via Kaspersky Security Center. This Guide also lists sources of information about the application and ways to get technical support. Document conventions This document uses the following conventions (see table below). Table 1. Document conventions Sample text Please note that... Description of document convention Warnings are highlighted in red and boxed. Warnings show information about actions that may have unwanted consequences. We recommended that you use... Example: Notes are boxed. Notes provide additional and reference information. Examples are given on a light-blue background under the heading Example.

10 Sample text Update means... The Databases are out of date event occurs. COMMAND-A Description of document convention The following elements are italicized in the text: New terms Names of application statuses and events Names of keyboard keys appear in bold. Key names joined by a - (minus) sign represent key combinations. Click the Enable button. Names of application interface elements, such as entry fields, menu items, and buttons, are set off in bold. Configure schedule a task Introductory phrases of instructions are italicized and are accompanied by the arrow sign. kav update The following types of text content are set off with a special font: Text in the command line Text of messages that the application displays on screen Data to be entered using the keyboard <IP address of your computer> Variables are enclosed in angle brackets. Instead of the variable, insert the corresponding value, not including the angle brackets. About this document 10

11 Kaspersky Endpoint Security overview Kaspersky Endpoint Security protects computers running macos against viruses and other computer security threats. The application includes the following components: File Anti-Virus The File Anti-Virus component protects the file system of the computer in real time, by intercepting and analyzing any attempts to access files. You can configure the actions to be performed by the application on infected and probably infected files. Web Anti-Virus The Web Anti-Virus component protects information that is sent and received by the computer over the HTTP and HTTPS protocols in Safari, Google Chrome or Firefox browsers. Network Attack Blocker The Network Attack Blocker component protects the computer operating systems against intrusions. This component provides protection against the malicious activity of criminals themselves (such as port scanning and brute force attacks) and the activity of malware installed by criminals on the computer under attack (such as the transmission of sensitive information to criminals). The following functions are implemented in the application: Virus Scan Kaspersky Endpoint Security detects and neutralizes viruses and other computer security threats on demand in the specified scan scope. You can configure the actions to be performed by the application on infected and probably infected files. Kaspersky Endpoint Security runs a full scan of the computer, a quick scan of critical areas of the computer, and a scan of the specified scope.

12 Update Kaspersky Endpoint Security updates anti-virus databases and application modules from Kaspersky Lab update servers or from Kaspersky Security Center and creates backup copies of all updated files to allow a rollback of the last update. Kaspersky Endpoint Security lets you copy downloaded updates to a local source to be accessed by other computers on the corporate network as a way to reduce the amount of Internet traffic. Quarantine Kaspersky Endpoint Security moves probably infected files to Quarantine. You can scan them using the updated anti-virus databases and restore them from Quarantine. Backup Kaspersky Endpoint Security creates a copy of the infected file in Backup prior to attempting to disinfect or delete the file, so you can restore it. Reports Kaspersky Endpoint Security generates a report on the operation of the application. Notifications Kaspersky Endpoint Security notifies the user about certain events in the operation of Kaspersky Endpoint Security using notification windows and pop-up messages. Notification windows can be accompanied by sound alerts. Protection Center Kaspersky Endpoint Security displays protection status messages in the Protection Center window during its operation. Protection Center shows information on the current computer protection status and lets you act to eliminate computer security problems and threats. Remote management of the application via Kaspersky Security Center Kaspersky Security Center lets you remotely manage protection of computers with Kaspersky Endpoint Security installed: receive information on the current computer protection status, remotely fix issues, respond to computer security threats, enable or disable protection components (File Anti-Virus, Web Anti-Virus, Network Attack Blocker), run virus scan tasks, update application databases, and manage Kaspersky Endpoint Security licenses. Kaspersky Endpoint Security overview 12

13 Sources of information about the application In this chapter Sources of information to research on your own Discuss Kaspersky Lab applications on the Forum Sources of information to research on your own You can use the following sources of information about Kaspersky Endpoint Security to research on your own: Kaspersky Endpoint Security page on the Kaspersky Lab website Kaspersky Endpoint Security page on the Technical Support website (Knowledge Base) Help materials included with the application If you cannot find the solution to an issue on your own, we recommend that you contact Technical Support. An Internet connection is required for access to website resources.

14 Kaspersky Endpoint Security page on the Kaspersky Lab website On the Kaspersky Endpoint Security page ( you can view general information about the application and its functions and features. The Kaspersky Endpoint Security page contains a link to the online store, where you can buy or renew your license for the application. Kaspersky Endpoint Security page in the Knowledge Base The Knowledge Base is a section on the Kaspersky Lab Technical Support website. On the Kaspersky Endpoint Security page in the Knowledge Base ( you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install, and use the application. Articles in the Knowledge Base may provide answers to questions that relate both to Kaspersky Endpoint Security as well as to other Kaspersky Lab applications. Articles in the Knowledge Base may also contain news from Technical Support. Help materials included with the application The application includes full help and context help. Full help provides information on how to configure and use Kaspersky Endpoint Security. Context help provides information about Kaspersky Endpoint Security windows, describes Kaspersky Endpoint Security settings and contains links to task descriptions where those settings are used. Help can be included in the distribution kit or located on the Kaspersky Lab website. An Internet connection is required for viewing online help. Sources of information about the application 14

15 Documentation In the Administrator's Guide, you can find information on how to: Prepare for the installation of the application, install and activate the application. Configure and use the application. Remotely manage the application via Kaspersky Security Center. Discuss Kaspersky Lab applications on the Forum If your question does not require an immediate answer, you can discuss it with Kaspersky Lab experts and other users on our forum ( On the forum you can view discussion topics, post your comments, and create new discussion topics. Go to the forum 1. Open the main application window. 2. In the main application window, click the button. 3. In the window that opens, click the Forum button. Sources of information about the application 15

16 Install and uninstall Kaspersky Endpoint Security In this chapter Distribution kit Hardware and software requirements Prepare for installation Install Kaspersky Endpoint Security Prepare the application for use Uninstall Kaspersky Endpoint Security Distribution kit The distribution kit includes the Kaspersky Endpoint Security installation package which contains the following files: Files that are required to install the application in any of the available ways. The ksn.rtf file with the terms of participation in Kaspersky Security Network (see Section Participate in Kaspersky Security Network on page 99). The license.rtf file with the End User License Agreement (see Section About the End User License Agreement on page 32). The End User License Agreement specifies the terms of use of the application. Unpack the zipped installation package to access its files.

17 Hardware and software requirements Kaspersky Endpoint Security has the following hardware and software requirements: Mac with an Intel processor OS X 10.9, 10.10, 10.11, or macos operating system 1 GB of memory (RAM) 1.2 GB of free disk space Internet connection Supported browsers: Safari Google Chrome Mozilla Firefox Kaspersky Endpoint Security is compatible with the following virtualization tools: Parallels Desktop 11 for Mac Standard Edition Parallels Desktop 11 for Mac Pro Edition Parallels Desktop 11 for Mac Business Edition Parallels Desktop 12 for Mac Standard Edition Parallels Desktop 12 for Mac Pro Edition Parallels Desktop 12 for Mac Business Edition VMware Fusion 8 VMware Fusion 8 Professional VMware Fusion 8.5 VMware Fusion 8.5 Professional Install and uninstall Kaspersky Endpoint Security 17

18 You can manage Kaspersky Endpoint Security remotely via Kaspersky Security Center. The plugin for managing Kaspersky Endpoint Security via Kaspersky Security Center requires Kaspersky Security Center See also Prepare for installation Install Kaspersky Endpoint Security Uninstall Kaspersky Endpoint Security Prepare for installation Before installing Kaspersky Endpoint Security on your computer it is recommended to do the following: Make sure that your computer meets the hardware and software requirements (on page 17). Remove any other anti-virus applications to avoid system conflicts and maximize system performance. See also Hardware and software requirements Install Kaspersky Endpoint Security Uninstall Kaspersky Endpoint Security Install and uninstall Kaspersky Endpoint Security 18

19 Install Kaspersky Endpoint Security Kaspersky Lab experts recommend installing Kaspersky Endpoint Security only in the ways that are described in this guide. You can install Kaspersky Endpoint Security in one of the following ways: Locally, using the Kaspersky Endpoint Security distribution kit. You can perform default or custom installation of Kaspersky Endpoint Security from the distribution kit. Remotely via Kaspersky Security Center. Perform a standard installation of Kaspersky Endpoint Security 1. Open the Kaspersky Endpoint Security distribution kit in one of the following ways: Run the ISO file. Unpack the ZIP archive and run the DMG file. A window with the contents of the distribution kit opens. 2. In the window with the contents of the distribution kit, double-click Kaspersky Endpoint Security. A window opens in which you are asked to confirm the launch of the Installation Wizard. 3. In this window, click the Continue button to confirm the launch of the Installation Wizard. The Introduction window with information about Kaspersky Endpoint Security opens. 4. In the Introduction window, click the Continue button. The License window opens. 5. In the License window, read the Kaspersky Endpoint Security End User License Agreement and click the Continue button. The To continue installing the software you must agree to the terms of the software license agreement window opens. Install and uninstall Kaspersky Endpoint Security 19

20 6. In this window, do one of the following: If you accept the terms of the End User License Agreement, click Agree. Installation of Kaspersky Endpoint Security continues and the KSN window opens. If you don't accept the terms of the End User License Agreement, click Disagree. Installation of Kaspersky Endpoint Security is canceled. If you want to return to the License window, click Read License. 7. In the KSN window, carefully read the Kaspersky Security Network Statement and do one of the following: If you accept all the terms of participation in Kaspersky Security Network, select the I agree to participate in Kaspersky Security Network checkbox and click Continue. If you don't accept the terms of participation in Kaspersky Security Network, click Continue without selecting the I agree to participate in Kaspersky Security Network checkbox. When you participate in Kaspersky Security Network, Kaspersky Endpoint Security statistics are automatically sent to Kaspersky Lab to enhance protection of your Mac. Kaspersky Lab doesn't collect, process, or store any personal data. You can join or opt out of participation in Kaspersky Security Network at any time. 8. In the Installation type window, click Install. 9. In the prompt for administrator credentials, enter an administrator name and password and confirm that you want to install Kaspersky Endpoint Security. The installation of Kaspersky Endpoint Security continues. 10. When the installation is finished, click the Close button to quit the Installation Assistant. Kaspersky Endpoint Security starts automatically. You don't have to restart your computer. Install and uninstall Kaspersky Endpoint Security 20

21 Perform a custom installation of Kaspersky Endpoint Security 1. Open the Kaspersky Endpoint Security distribution kit in one of the following ways: Run the ISO file. Unpack the ZIP archive and run the DMG file. A window with the contents of the distribution kit opens. 2. In the window with the contents of the distribution kit, double-click Kaspersky Endpoint Security. A window opens in which you are asked to confirm the launch of the Installation Wizard. 3. In this window, click the Continue button to confirm the launch of the Installation Wizard. The Introduction window with information about Kaspersky Endpoint Security opens. 4. In the Introduction window, click the Continue button. The License window opens. 5. In the License window, read the Kaspersky Endpoint Security End User License Agreement and click the Continue button. The To continue installing the software you must agree to the terms of the software license agreement window opens. 6. In this window, do one of the following: If you accept the terms of the End User License Agreement, click Agree. Installation of Kaspersky Endpoint Security continues and the KSN window opens. If you don't accept the terms of the End User License Agreement, click Disagree. Installation of Kaspersky Endpoint Security is canceled. If you want to return to the License window, click Read License. Install and uninstall Kaspersky Endpoint Security 21

22 7. In the KSN window, carefully read the Kaspersky Security Network Statement and do one of the following: If you accept all the terms of participation in Kaspersky Security Network, select the I agree to participate in Kaspersky Security Network checkbox and click Continue. If you don't accept the terms of participation in Kaspersky Security Network, click Continue without selecting the I agree to participate in Kaspersky Security Network checkbox. When you participate in Kaspersky Security Network, Kaspersky Endpoint Security statistics are automatically sent to Kaspersky Lab to enhance protection of your Mac. Kaspersky Lab doesn't collect, process, or store any personal data. You can join or opt out of participation in Kaspersky Security Network at any time. 8. In the Installation window, click Customize and deselect checkboxes next to components that you don't want to install. 9. Click Install. 10. In the prompt for administrator credentials, enter an administrator name and password and confirm that you want to install Kaspersky Endpoint Security. The installation of Kaspersky Endpoint Security continues. 11. When the installation is finished, click the Close button to quit the Installation Assistant. Kaspersky Endpoint Security starts automatically. You don't have to restart your computer. See also Hardware and software requirements Prepare for installation Uninstall Kaspersky Endpoint Security Install and uninstall Kaspersky Endpoint Security 22

23 Prepare the application for use After Kaspersky Endpoint Security is installed, you can do the following: Activate Kaspersky Endpoint Security (on page 46). When the application is activated, Kaspersky Endpoint Security starts protecting your computer, you can regularly update anti-virus databases and software modules, perform virus scan tasks, and send requests to Technical Support. Assess the current status of computer protection (see Section View the status of computer protection on page 49). Update Kaspersky Endpoint Security (see Section Update application databases on page 57). Scan your computer for viruses and other malware (see Section Perform scan tasks on page 52). Uninstall Kaspersky Endpoint Security 1. Open the DMG file of the application distribution kit. 2. In the window with the contents of the distribution kit, double-click Uninstall Kaspersky Endpoint Security. The Kaspersky Endpoint Security uninstaller starts. 3. In the Introduction window, click the Uninstall button. Install and uninstall Kaspersky Endpoint Security 23

24 4. In the prompt for administrator credentials, enter an administrator name and password and confirm that you want to uninstall Kaspersky Endpoint Security. Uninstallation of Kaspersky Endpoint Security starts. 5. In the Completion window, read the information about completion of uninstallation and click the Finish button to quit the uninstaller. Kaspersky Endpoint Security is now removed from your computer. You don't have to restart your computer after removing the application. See also Hardware and software requirements Prepare for installation Install Kaspersky Endpoint Security Install and uninstall Kaspersky Endpoint Security 24

25 Kaspersky Endpoint Security interface In this chapter Main application window Kaspersky Endpoint Security icon Hide the application icon in the menu bar Application preferences window Main application window Open the main application window 1. In the menu bar, click the application icon. 2. In the menu that appears, choose Kaspersky Endpoint Security. Purpose of the main application window In the main window of Kaspersky Endpoint Security, you can view information about the status of computer protection, status of File Anti-Virus, Web Anti-Virus, and Network Attack Blocker, and progress of virus scan and update tasks. In the main application window, you can also do the following: Manage virus scan tasks and update tasks. Manage application keys. Open the Protection Center window.

26 Controls of the main application window The main application window includes the following controls: Protection status indicator (in the shape of a computer) Buttons at the top of the main application window Buttons at the bottom of the main application window The protection status indicator signals the current computer protection status (see Section View the status of computer protection on page 49). Green indicates that computer protection is at an optimal level. Yellow and red warn of the presence of various problems related to Kaspersky Endpoint Security configuration or operation. In addition to the protection status indicator, the right pane of the main application window describes the computer protection status and displays information Protection Center (see Section Use Protection Center on page 53) about the latest computer security issues and threats. If a virus scan or update task is running, information on their progress (percentage complete) is also displayed in the right pane of the main application window. You can perform the following actions by clicking the buttons at the top of the main application window: Open the window with reports on Kaspersky Endpoint Security tasks. Open the Kaspersky Endpoint Security preferences window. Open a window with information on how to contact Technical Support. Open the Kaspersky Endpoint Security Help system. Kaspersky Endpoint Security interface 26

27 You can perform the following actions by clicking the buttons at the bottom of the main application window: Open the virus scan tasks window: Quick Scan, Full Scan, and Custom Scan. Open the Update window. Open the Licensing (see Section View license information on page 42) window. Kaspersky Endpoint Security icon As soon as Kaspersky Endpoint Security is installed, the Kaspersky Endpoint Security icon appears in the menu bar. The application icon shows the status of the application. If the application icon is active ( ), it means that real-time protection is enabled. If the application icon is inactive ( ), then real-time protection is disabled. Open the application icon menu Click the application icon in the menu bar. The application icon is always displayed in the menu bar. You can hide the application icon in the menu bar (on page 28). When you open the application window, the application icon also appears in the Dock. From the application icon menu, you can access the main application window and perform the following actions: Disable computer protection. Resume computer protection. Open Protection Center. Start Quick Scan. Run an update. Open the application preferences window. Quit Kaspersky Endpoint Security. Kaspersky Endpoint Security interface 27

28 Hide the application icon in the menu bar 1. Open the main application window. 2. On the navigation panel in the upper pane of the main application window, click the button. The application preferences window opens. 3. On the Appearance tab, in the Application icon section, deselect the Show in menu bar checkbox. Application preferences window To open the Kaspersky Endpoint Security preferences window, do one of the following: In the main application window click the button. Select the Preferences item in the context menu of the Kaspersky Endpoint Security icon (on page 27). Application preferences can be accessed quickly using the following tabs in the upper part of the preferences window: Protection. On this tab, you can configure File Anti-Virus, Web Anti-Virus, and Network Attack Blocker preferences. Virus Scan. On this tab, you can configure the preferences of virus scan tasks and scheduled startup of virus scan tasks. KSN. On this tab, you can join or opt out of participating in Kaspersky Security Network. You can also configure Kaspersky Security Network use preferences. Threats. On this tab, you can select the categories of objects to be detected and create Trusted Zone. Kaspersky Endpoint Security interface 28

29 Update. On this tab, you can configure the preferences of application updates or roll back to the previous version of anti-virus databases. Reports. On this tab, you can configure preferences of Kaspersky Endpoint Security report, Quarantine, and Backup, and enable or disable the logging of debugging information in a trace file. Appearance. On this tab, you can configure the way Kaspersky Endpoint Security banners and the application icon are displayed. By using the button, you can block users without administrator rights from editing the preferences of Kaspersky Endpoint Security. This button is located in the lower part of the application preferences window. To edit the preferences, you must enter the administrator's credentials. Clicking the button opens the Kaspersky Endpoint Security Help which describes all of the preferences in the current application window. You can also open Help for the currently active application window by selecting Open Help for This Window in the Help menu. Kaspersky Endpoint Security interface 29

30 Notifications and banners In this chapter About notifications About banners Set up notifications and banners About notifications Kaspersky Endpoint Security displays notifications when the user needs to choose an action in response to an event. For example, when the application detects a malicious object, it prompts the user to delete or disinfect the object. A notification disappears from the screen only after the user selects one of the actions. Kaspersky Endpoint Security events are divided into three types according to their importance: Critical events that pose a dangerous threat to computer security (detection of malicious objects, vulnerabilities, Kaspersky Endpoint Security problems). Critical events require the immediate attention of the user. It is recommended not to disable notifications about critical events. Important events that do not require the immediate attention of the user, but may pose a threat to computer security in the future. Informational reference-type events. Banners can be accompanied by sound notifications. About banners Kaspersky Endpoint Security displays banners to inform you of events that do not require action from you. Depending on the version of the operating system installed on the computer, banners appear in the Notification Center of the operating system.

31 Set up notifications and banners By default, Kaspersky Endpoint Security displays banners about critical events only. You can disable displaying banners or select certain types of events for which you want banners to be displayed. You can also disable sound notifications for banners. Regardless of whether notifications are enabled or disabled, information about events that occur while Kaspersky Endpoint Security is running is logged in the application reports. Disable banners 1. Open the main application window. 2. On the navigation panel in the upper pane of the main application window, click the button. The application preferences window opens. 3. On the Appearance tab, deselect the Enable notifications checkbox. Select types of events that you don't want to be notified of 1. Open the main application window. 2. On the navigation panel in the upper pane of the main application window, click the button. The application preferences window opens. 3. On the Appearance tab, deselect checkboxes next to types of events that you don't want to be notified of. Disable sound notifications that accompany banners 1. Open the main application window. 2. On the navigation panel in the upper pane of the main application window, click the button. The application preferences window opens. 3. On the Appearance tab, deselect the Enable notification sound checkbox. Notifications and banners 31

32 Kaspersky Endpoint Security licensing In this chapter About the End User License Agreement About the license About subscription About the license certificate About the key About the activation code About the key file About data provision View license information Renew a license Renew subscription Update subscription status Activate Kaspersky Endpoint Security About the End User License Agreement The End User License Agreement (License Agreement) is a binding agreement between you and AO Kaspersky Lab that stipulates the terms on which you may use the application. Carefully read the License Agreement before you start using the application.

33 You can view the terms of the End User License Agreement using the following methods: During installation of Kaspersky Endpoint Security. By reading the license.rtf document in the application installation folder. By installing Kaspersky Endpoint Security, you confirm that you understand and accept the terms of the End User License Agreement. If you don't accept the terms of the End User License Agreement, cancel installation of Kaspersky Endpoint Security and don't use the application. About the license A license is a time-limited right to use the application, granted under the End User License Agreement. A license entitles you to the following kinds of services: Use of the application in accordance with the terms of the End User License Agreement Getting technical support The scope of services and validity period depend on the type of license under which the application was activated. The following license types are provided: Trial a free license intended for trying out the application. A trial license usually has a short term. When the trial license expires, all Kaspersky Endpoint Security features become disabled. To continue using the application, you need to purchase the commercial license. You can activate the application under the trial license only once. Commercial a paid license granted upon purchase of the application. When the commercial license expires, the application continues running with limited functionality (for example, Kaspersky Endpoint Security database updates are not available). To continue using all the features of Kaspersky Endpoint Security, you must renew your commercial license. We recommend renewing the license before its expiration to ensure maximum protection against all security threats. Kaspersky Endpoint Security licensing 33

34 About subscription A subscription for Kaspersky Endpoint Security is a purchase order for the application with specific parameters (expiry date, number of devices protected). You can order a subscription for Kaspersky Endpoint Security from your service provider (such as your ISP). You can manage your subscription in the member area on the service provider's website. For example, you can renew or cancel your subscription, reduce its term, or change the number of devices protected under your subscription. A subscription can be limited (for one year, for example) or unlimited (without an expiration date). To keep Kaspersky Endpoint Security working after expiration of a limited subscription term, you have to renew it manually. An unlimited subscription is renewed automatically as long as you have paid the service provider in advance. If you use the application under a limited subscription, when the subscription expires you will be given a grace period to renew your subscription. The application remains functional during the grace period. Service providers can offer two types of subscriptions for Kaspersky Endpoint Security: subscription to updates and subscription to updates and protection. If you have purchased a subscription to updates, after your subscription expires and after the grace period for subscription renewal ends, Kaspersky Endpoint Security remains functional but stops updating application databases. If you have purchased a subscription to updates and protection, after your subscription expires and after the grace period for subscription renewal ends, Kaspersky Endpoint Security doesn't perform any tasks. To use Kaspersky Endpoint Security under subscription, you have to apply the activation code received from the service provider. In some cases, the activation code can be applied automatically. When you use the application under subscription, you cannot use a different activation code for renewing your subscription. You can apply a different activation code only after the subscription expires or if you cancel the subscription. To cancel your subscription, contact the service provider from which you bought Kaspersky Endpoint Security. A different subscription activation code can be applied only when the active key is deleted. The subscription doesn't have a key file. You can't add the subscription as a reserve key. Kaspersky Endpoint Security licensing 34

35 If you are already using Kaspersky Endpoint Security under a valid license but want to use the application under subscription instead, remove the current active key so that you can activate the application using a subscription key. The activation code that was previously used to activate the application on this computer can be used on a different computer. Possible subscription options may vary with each service provider. Some service providers may also choose not to provide a grace period for renewing subscriptions. About the license certificate License certificate is a document that you receive along with a key file or an activation code. A license certificate contains the following information about the license provided: Order number Information about the user who has been granted the license Information about the application that can be activated under the license provided Limit of the number of licensing units (e.g., devices on which the application can be used under the license provided) License validity start date License expiration date or license term License type About the key A key is a sequence of bits that you can apply to activate and then use the application in accordance with the terms of the End User License Agreement. Keys are generated by Kaspersky Lab specialists. You can add a key to the application using one of the following methods: by applying a key file or by entering an activation code. The key is displayed in the application interface as a unique alphanumeric sequence after you add it to the application. Kaspersky Endpoint Security licensing 35

36 The key may be blocked by Kaspersky Lab in case the terms of the License Agreement have been violated. If the key has been blocked, you need to add another one if you want to use the application. A key can be active or reserve. An active key is a key that is currently used by the application. An active key can be added for a trial or commercial license. The application cannot have more than one active key. A reserve key is a key that entitles the user to use the application, but is not currently in use. The reserve key automatically becomes active when the license associated with the current active key expires. A reserve key can be added only if an active key has already been added. A trial license key can be added as the active key. A key for the trial license cannot be added as the reserve key. About the activation code An activation code is a unique sequence of 20 letters and numbers. You have to enter an activation code in order to add a key for activating Kaspersky Endpoint Security. You receive the activation code at the address that you provided when you bought Kaspersky Endpoint Security or requested the trial version of Kaspersky Endpoint Security. To activate the application with an activation code, you need Internet access in order to connect to Kaspersky Lab activation servers. If you have lost your activation code after installing the application, it can be recovered. You may need the activation code to register a Kaspersky CompanyAccount, for example. To recover your activation code, contact Kaspersky Lab Technical Support (see Section How to get technical support on page 178). About the key file Keyfile is a file with the.key extension provided to you by Kaspersky Lab. Key files are designed to activate the application by adding a key. You receive a key file at the address that you provided when you bought Kaspersky Endpoint Security or ordered the trial version of Kaspersky Endpoint Security. Kaspersky Endpoint Security licensing 36

37 You do not need to connect to Kaspersky Lab activation servers in order to activate the application with a key file. You can restore a key file if it has been accidentally deleted. You may need a key file to register a Kaspersky CompanyAccount, for example. To restore your key file, perform any of the following actions: Contact Technical Support ( Receive a key file through the Kaspersky Lab website ( by using your available activation code. About data provision Software means software including any Updates and related materials. Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means AO Kaspersky Lab, a company incorporated according to the laws of the Russian Federation. Computer(s) means hardware, including personal computers, laptops, workstations, personal digital assistants, smartphones, handheld devices, or other electronic devices for which the Software was designed where the Software will be installed and/or used. End User (You/Your) means individual(s) installing or using the Software on their own behalf or who are legally using a copy of the Software. If the Software is being downloaded or installed on behalf of an organization, such as an employer, You hereinafter means the organization for which the Software is downloaded or installed and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf. Partners mean organizations that distribute the Software under the agreement with the Rightholder. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies, additions or maintenance packs, etc. Kaspersky Endpoint Security licensing 37

38 Trace files mean data containing information on work of the Software or its components. System information files mean data containing information about Computer. In order to detect new data security threats and their sources, and increase the protection of the data stored and processed by the user with a computer, the User agrees to provide the following information: Information about the version of the operating system (OS) and service packs installed on the computer Information about the Right Holder's installed software and the anti-virus protection status, including the unique software identifier on the computer, the unique product type identifier, the full version of the Software, information about updates, and the unique user identifier in the KL services Information about all scanned objects and actions, including the name of the scanned object, the date and time of the scan, the URL and referer from which it was downloaded, the names and size of scanned files and the paths to them, a sign in the archive, the date and time of file creation, the name of the packer (if the file was packed), the file's entropy, the file's type, the file type code, sign of executable file, identifier and format, the URL from which the object is downloaded, the object's checksum (MD5), the type and value of the object's supplementary checksum, data about the object's digital signature (certificate), number of starts of the object since the last statistics sending the task identifier of the software that performed the scan, and the means of receiving information about the object's reputation For executable files: the size taken up by the file in the RAM, data from the structure of its PE-heading, entropy and statistical data of the file sections, sign of sending service information, reputation verification flag or file signature flag, name, type, ID, type, checksum (MD5) and the size of the application that was loaded by the object being validated, the application path and template paths, a sign of the Autorun list, date of entry, the list of attributes, name of the Packer, information about the digital signature of the application, including the publisher certificate, the name of the uploaded file in the MIME format Kaspersky Endpoint Security licensing 38

39 Information about the running applications and their modules, including checksums (MD5) of running files, size, attributes, creation date, and PE-file header information, names of packers (if the file was packed), code of the account under which the process has been started, command line parameters used to start the process, names of files and their modules If threats or vulnerabilities are detected, in addition to information about the detected object, information is provided about the identifier, version, and type of the record in the anti-virus database, the name of the threat based on the Right Holder's classification, the date and time of the last update of the anti-virus database, executable file name, the checksum (MD5) of the application file that requested the URL where the threat was detected, the IP address (IPv4 or IPv6) of the detected threat, the identifier of the type of traffic on which the threat was detected, the vulnerability identifier and its threat level, the URL and referer of the web page where the vulnerability was detected Information about network attacks, including the IP address of the attacking computer and the user's computer's port number at which the network attack is directed, the identifier of the protocol used to carry out the attack, and the name and type of attack The URL and IP address of the web page where harmful or unknown content was detected, the name, size, and checksum of the file that requested the URL, the identifier, weight and degree of the rule used to reach a decision, the objective of the attack Information about updates of the installed product and anti-virus databases, including the IP address (IPv4 or IPv6) of the update source being used, the type of the update task, the number and total size of files downloaded during an update, the average download speed for the update files, the average speed for network operations during the update, the completion status of the update task, the type of an error that may occur during an update, the number of unsuccessful updates, the identifier of the product component that performs updates Aggregated data from the results of scanning using the local and cloud KSN databases, including the number of unique unknown objects, the number of unique trusted objects, the number unique untrusted objects; the total number of decisions unknown object, trusted object and untrusted objects, the number of objects trusted based on validation of a certificate, designated as trusted based on a trusted URL, recognized as trusted based on the transfer of trust from a trusted process; the number of unknown objects for which no decision regarding trust has been made, the number of objects that the user Kaspersky Endpoint Security licensing 39

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide APPLICATION VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

Kaspersky Security Center 10 Web Console. User Guide

Kaspersky Security Center 10 Web Console. User Guide Kaspersky Security Center 10 Web Console User Guide Dear User, Thank you for your trust! We hope that this document will help you in your work and will provide answers regarding this software product.

More information

Kaspersky Anti-Virus User Guide

Kaspersky Anti-Virus User Guide Kaspersky Anti-Virus User Guide APPLICATION VERSION: 14.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this software

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide APPLICATION VERSION: 8.0 MAINTENANCE PACK 2 Dear User, Thank you for choosing our product. We hope that this documentation will help you

More information

Kaspersky Internet Security User Guide

Kaspersky Internet Security User Guide Kaspersky Internet Security User Guide APPLICATION VERSION: 15.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

USER GUIDE KASPERSKY MOBILE SECURITY 8.0 USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Kaspersky Administration Kit 8.0 GETTING STARTED

Kaspersky Administration Kit 8.0 GETTING STARTED Kaspersky Administration Kit 8.0 GETTING STARTED APPLICATION VERSION: 8.0 CRITICAL FIX 2 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

Kaspersky Security Center 10

Kaspersky Security Center 10 Kaspersky Security Center 10 Implementation Guide Application version: 10 Service Pack 2, Maintenance Release 1 Dear User, Thank you for your trust! We hope that this document will help you in your work

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Kaspersky Mobile Security

Kaspersky Mobile Security Kaspersky Mobile Security User Guide Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server Administrator's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document

More information

Kaspersky Safe Browser. User Guide

Kaspersky Safe Browser. User Guide Kaspersky Safe Browser User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.

More information

Kaspersky Endpoint Security 8 for Smartphone Implementation guide

Kaspersky Endpoint Security 8 for Smartphone Implementation guide Kaspersky Endpoint Security 8 for Smartphone Implementation guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will

More information

Kaspersky Embedded Systems Security

Kaspersky Embedded Systems Security Kaspersky Embedded Systems Security Administrator's Guide Application version: 2.2.0.605 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps

More information

Anti-Virus Interface of Kaspersky

Anti-Virus Interface of Kaspersky Anti-Virus 2012 Interface of Kaspersky Anti-Virus 2012 Table of Contents Interface of Kaspersky Anti-Virus 2012... 2 Application icon in the Microsoft Windows taskbar notification area... 2 Main window

More information

Kaspersky Administration Kit 8.0 REFERENCE GUIDE

Kaspersky Administration Kit 8.0 REFERENCE GUIDE Kaspersky Administration Kit 8.0 REFERENCE GUIDE P R O G R A M V E R S I O N : 8. 0 C R I T I C A L F I X 1 Dear User! Thank you for choosing our product. We hope that this documentation will help you

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Small Office Security 2. Scan PC for viruses and vulnerabilities

Small Office Security 2. Scan PC for viruses and vulnerabilities Small Office Security 2 Scan PC for viruses and vulnerabilities Table of content Table of content... 1 Scan PC for viruses... 2 What is Scan... 2 Starting scan... 2 Starting scan from the main application

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

Workstation Configuration Guide

Workstation Configuration Guide Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 12, 2017 - Version 9.4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product. Quick Start Guide ESET Cybersecurity provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the award-winning NOD32

More information

FOR macos. Quick Start Guide. Click here to download the most recent version of this document

FOR macos. Quick Start Guide. Click here to download the most recent version of this document FOR macos Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 15, 2017 - Version 9.3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Kaspersky Anti-Virus 8.0 for Linux File Server

Kaspersky Anti-Virus 8.0 for Linux File Server Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide A P P L I C A T I O N V E R S I ON : 8. 0 MP 2 C F 4 Dear User! Thank you for choosing our product. We hope that this documentation will

More information

Workstation Configuration

Workstation Configuration Workstation Configuration September 22, 2015 - Version 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

User Guide. Version R95. English

User Guide. Version R95. English Anti-Malware (Classic) User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Small Office Security 2. Mail Anti-Virus

Small Office Security 2. Mail Anti-Virus Small Office Security 2 Mail Anti-Virus Table of content Table of content... 1 Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/Disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus...

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Security Officer's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Security Officer's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Security Officer's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

ESET SMART SECURITY 10

ESET SMART SECURITY 10 ESET SMART SECURITY 10 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security software.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Install Kaspersky Endpoint Security for Mac Version b (This user guide is applicable to Mac OS X 10.9 macos )

Install Kaspersky Endpoint Security for Mac Version b (This user guide is applicable to Mac OS X 10.9 macos ) Install Kaspersky Endpoint Security for Mac Version 10.2.1.319b (This user guide is applicable to Mac OS X 10.9 macos 10.14.) Contents A. Download Kaspersky Endpoint Security 10 for Mac... 1 B. Install

More information

User Guide. Version R94. English

User Guide. Version R94. English Antivirus (Classic) User Guide Version R94 English July 19, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 AntiMalware User Guide Version 7.0 English January 6, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 Quick Start Guide Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Workstation Configuration

Workstation Configuration Workstation Configuration Version 8.2 May 2, 2014 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 3 1.1 Custom level Internet

More information

KASPERSKY LABS. Kaspersky Anti-Virus 5.1 for Microsoft ISA Server. Administrator s guide

KASPERSKY LABS. Kaspersky Anti-Virus 5.1 for Microsoft ISA Server. Administrator s guide KASPERSKY LABS Kaspersky Anti-Virus 5.1 for Microsoft ISA Server Administrator s guide KASPERSKY ANTI-VIRUS 5.1 FOR MS ISA SERVER Administrator s Guide Kaspersky Labs Ltd. http://www.kaspersky.com Edition

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Antivirus User Guide Version 1.1 June 29, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document QUICK START GUIDE Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011 Click here to download the most recent version of this document ESET NOD32 ANTIVIRUS PROVIDES STATE-OF-THE-ART PROTECTION

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Antivirus User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.5-8.1.3.10 NTBA Appliance Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Find

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Kaspersky Security 10 for Windows Server

Kaspersky Security 10 for Windows Server Kaspersky Security 10 for Windows Server Installation Guide Program version: 10 Dear User, Thank you for choosing our product. We hope that this documentation will help you in your work and answer your

More information

Kaspersky Anti-Virus 6.0 for Windows Servers MP4 USER GUIDE

Kaspersky Anti-Virus 6.0 for Windows Servers MP4 USER GUIDE Kaspersky Anti-Virus 6.0 for Windows Servers MP4 USER GUIDE A P P L I C A T I O N V E R S I O N : 6. 0 M A I N T E N A N C E P A C K 4, C R I T I C A L F I X 1 Dear User of Kaspersky Anti-Virus! Thank

More information

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011 QUICK START GUIDE Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011 ESET SMART SECURITY PREMIUM IS ALL-IN-ONE INTERNET SECURITY SOFTWARE. IT KEEPS YOU SAFE ONLINE AND OFFLINE - AND INCLUDES

More information

Small Office Security 2. License management in Kaspersky Small Office Security 2

Small Office Security 2. License management in Kaspersky Small Office Security 2 Small Office Security 2 License management in Kaspersky Small Office Security 2 Table of content Table of content... 1 License management in... 2 About License Agreement for... 2 About License for... 2

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

ESET NOD32 ANTIVIRUS 7

ESET NOD32 ANTIVIRUS 7 ESET NOD32 ANTIVIRUS 7 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Bitdefender Antivirus for Mac User's Guide

Bitdefender Antivirus for Mac User's Guide USER'S GUIDE Bitdefender Antivirus for Mac User's Guide Publication date 2018.04.24 Copyright 2018 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in

More information

User Guide. Version R93. English

User Guide. Version R93. English Anti-Malware User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

CounterACT Check Point Threat Prevention Module

CounterACT Check Point Threat Prevention Module CounterACT Check Point Threat Prevention Module Version 1.0.0 Table of Contents About the Check Point Threat Prevention Integration... 4 Use Cases... 4 Additional Check Point Threat Prevention Documentation...

More information

Internet Security Application Control

Internet Security Application Control Internet Security 2012 Application Control Table of Contents Application Control... 2 What is Application Control... 2 Operational algorithm of Application Control... 2 Enabling/disabling Application Control...

More information

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document QUICK START GUIDE Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011 Click here to download the most recent version of this document ESET INTERNET SECURITY IS ALL-IN-ONE INTERNET SECURITY SOFTWARE.

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Manual Removal Norton Internet Security Won't Open Or

Manual Removal Norton Internet Security Won't Open Or Manual Removal Norton Internet Security Won't Open Or Dec 3, 2014. Finally during the reinstall - I had to delete a key to get a new key other wise I would I have it shown on the prgrams and features -

More information

Product Guide. McAfee GetClean. version 2.0

Product Guide. McAfee GetClean. version 2.0 Product Guide McAfee GetClean version 2.0 About this guide COPYRIGHT LICENSE INFORMATION Copyright 2013-2017 McAfee, LLC. YOUR RIGHTS TO COPY AND RUN THIS TOOL ARE DEFINED BY THE MCAFEE SOFTWARE ROYALTY-FREE

More information

THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007

THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007 THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007 Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and answers your

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

Small Office Security 2. File Anti-Virus

Small Office Security 2. File Anti-Virus Small Office Security 2 File Anti-Virus Table of content Table of content... 1 File Anti-Virus... 2 What is File Anti-Virus... 2 Enabling/Disabling File Anti-Virus... 2 Operating algorithm of File Anti-Virus...

More information

Notification Template Limitations. Bridge Limitations

Notification Template Limitations. Bridge Limitations Oracle Cloud Known Issues for Oracle Identity Cloud Service Release 18.1.2 E55915-17 February 2018 Notification Template Limitations Note the following limitations with Oracle Identity Cloud Service notification

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

SecureTransport Version May Web Client User Guide

SecureTransport Version May Web Client User Guide SecureTransport Version 5.3.6 9 May 2018 Web Client User Guide Copyright 2018 Axway All rights reserved. This documentation describes the following Axway software: Axway SecureTransport 5.3.6 No part of

More information

Bitdefender Antivirus Plus 2017 User's Guide

Bitdefender Antivirus Plus 2017 User's Guide USER'S GUIDE Bitdefender Antivirus Plus 2017 User's Guide Publication date 09/15/2016 Copyright 2016 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Bitdefender Antivirus Plus 2016 User's Guide

Bitdefender Antivirus Plus 2016 User's Guide USER'S GUIDE Bitdefender Antivirus Plus 2016 User's Guide Publication date 09/05/2015 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

STAAR Alternate 2 and TELPAS Assessment Management System User s Guide

STAAR Alternate 2 and TELPAS Assessment Management System User s Guide 2017 2018 STAAR Alternate 2 and TELPAS Assessment Management System User s Guide TABLE OF CONTENTS Introduction...1 Signing in...1 Training Site...3 Infrastructure Trial...4 Create and Manage User Accounts...9

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

SECURITY SHIELD 2013 User's Guide

SECURITY SHIELD 2013 User's Guide SECURITY SHIELD 2013 User's Guide Published 2012.12.12 Copyright 2013 PCSecurityShield Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Kaspersky PURE 2.0. Mail Anti-Virus: security levels

Kaspersky PURE 2.0. Mail Anti-Virus: security levels Mail Anti-Virus: security levels Content Mail Anti-Virus. Security levels... 2 Operation algorithm of Mail Anti-Virus... 2 Security levels of Mail Anti-Virus... 2 Customizing security level... 4 Creating

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Using Windows Update. Tip:

Using Windows Update. Tip: This document contains information regarding Microsoft Windows updates. The information in this document consists of the literature released by Microsoft regarding Windows updates. Medford Medical Systems

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Welcome to Carbonite! Important Things to Know...4 Carbonite Features...5 Setting Up and Installing...6 Starting a Trial... 7 Installing Carbonite for the First Time... 7 Buying a Subscription...9 Subscription

More information

User Guide. Quick Heal Total Security Multi-Device. Quick Heal Technologies Ltd.

User Guide. Quick Heal Total Security Multi-Device. Quick Heal Technologies Ltd. User Guide Quick Heal Total Security Multi-Device Quick Heal Technologies Ltd. www.quickheal.com Copyright & License Information Copyright 2017 Quick Heal Technologies Ltd. All Rights Reserved. No part

More information

Installation Guide - Windows

Installation Guide - Windows Kony Visualizer Enterprise Installation Guide - Windows Release V8 SP3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Endpoint Protection...3 Dashboard...3 Alerts...4 Root Cause Analysis...9 Logs & Reports... 11 People... 24 Computers...33 Computer Groups...40

More information

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45 User Guide i Contents Introduction 5 McAfee SecurityCenter 7 Features... 8 Using SecurityCenter... 9 Header... 9 Left column... 9 Main pane... 10 Understanding SecurityCenter icons... 11 Understanding

More information

Bitdefender Antivirus Plus 2018 User's Guide

Bitdefender Antivirus Plus 2018 User's Guide USER'S GUIDE Bitdefender Antivirus Plus 2018 User's Guide Publication date 07/03/2017 Copyright 2017 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

ishipdocs User Guide

ishipdocs User Guide ishipdocs User Guide 11/8/2016 Disclaimer This guide has been validated and reviewed for accuracy. The instructions and descriptions it contains are accurate for ishipdocs. However, succeeding versions

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.7 28 February 2019 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

Managing SonicWall Gateway Anti Virus Service

Managing SonicWall Gateway Anti Virus Service Managing SonicWall Gateway Anti Virus Service SonicWall Gateway Anti-Virus (GAV) delivers real-time virus protection directly on the SonicWall security appliance by using SonicWall s IPS-Deep Packet Inspection

More information

Comodo Internet Security Software Version 11.0

Comodo Internet Security Software Version 11.0 Comodo Internet Security Software Version 11.0 Installation Guide Guide Version 11.0.080918 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States 1. CIS Installation Please read

More information

Guardian Total Security User Guide

Guardian Total Security User Guide Guardian Total Security User Guide Guardian Total Security http://www.guardianav.co.in Copyright & License Information Copyright 2018 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

CulinarE-Companion. Version 4.3 TABLE OF CONTENTS

CulinarE-Companion. Version 4.3 TABLE OF CONTENTS CulinarE-Companion Version 4.3 Copyright 2012 by John Wiley & Sons Ltd. All rights reserved. TABLE OF CONTENTS 1. ABOUT THE SOFTWARE 2. SYSTEM REQUIREMENTS 3. INSTALLING AND RUNNING THE PROGRAM 3.1. Installing

More information

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide Mission Control for the Microsoft Cloud 5nine Cloud Security Web Portal Version 12.o Getting Started Guide 2018 5nine Software Inc. All rights reserved. All trademarks are the property of their respective

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes AdwCleaner User Guide Version 7.2.4 26 September 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information