BitRater Client. Version Rev. 1.00

Similar documents
Installation Manual. and User Guide

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

MailCore Pro User Guide

How to Configure ATP in the HTTP Proxy

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Comodo Antivirus Software Version 2.2

ForeScout Extended Module for Tenable Vulnerability Management

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

MOVE AntiVirus page-level reference

INSTALLATION AND USER S GUIDE AttachmentSecurity for Microsoft Outlook Take control of your Microsoft Outlook attachments

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Antispam Gateway Software Version 2.12

How to Configure ATP in the Firewall

ebackup 11.0 and 12.0 for Easy Dental

SharePointBoost Password Change Tutorial for SharePoint 2007

Comodo Unknown File Hunter Software Version 5.0

Company System Administrator (CSA) User Guide

Exchange Security Small Business Edition. User Manual

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Comodo Antivirus Software Version 2.0

End User Manual. December 2014 V1.0

USER GUIDE. EBMS SECURE MailGate

Question: How do I move my mobile account from the Corporate to my Personal Account?

F-Secure Client Security. Administrator's Guide

Movavi Mac Cleaner. Download PDF. Not sure where to begin? Read the Quick Start Guide!

Comodo Antispam Gateway Software Version 2.11

DSS User Guide. End User Guide. - i -

Security Task Manager User Guide

Sophos Enterprise Console Help. Product version: 5.3

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Creating Shift Offers to Help Fill Open Shifts

SecureAPlus User Guide. Version 3.4

Maintaining Computer. Disk cleanup, Disk Defragmenter Recycle bin, Security

escan Security Network From MicroWorld Technologies Anti-Virus & Content Security

Microsoft Office SharePoint Reference Guide for Site Owners

Using the Inbox to Manage Messages

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

Real Fast PC. Real Fast PC Win 7.


SmartAlert Free Mail Notifications

Cheat Sheet to Speed-Up a Slow PC

Antivirus Solution Guide for Clustered Data ONTAP: Sophos

Configuring Microsoft Outlook to Connect to Hosted Exchange Service

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.


Comodo APT Assessment Tool

Zillya Internet Security User Guide

Sophos Enterprise Console help. Product version: 5.5

ForeScout Extended Module for Carbon Black

Comodo Antivirus for Linux Software Version 1.0

Add Address User s Manual

Comodo Antispam Gateway Software Version 2.1

Sophos Enterprise Console

Anchor User Guide. Presented by: Last Revised: August 07, 2017

FOR macos. Quick Start Guide. Click here to download the most recent version of this document

Comodo Client - Security for Linux Software Version 2.2

T-SYSTEMS MULTIMEDIA SOLUTIONS. User Manual

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

FAQ. Safe Anywhere PC 12. Disclaimer:

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Installation Summary

Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies...

Cloud Services. Spam Manager. Quarantine Admin Guide

ReadyDoc Client Application Installation Instructions

CONTENTS. SysReturn_Manaual Updata 06/4/24. Chapter1 Introducing SysReturn Introduction to SysReturn Features and Functions...

ESET ENDPOINT SECURITY

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)

Sync User Guide. Powered by Axient Anchor

700 Fox Glen Barrington, Illinois ph: [847] fx: [847] Webmail System User Guide

User guide NotifySCM Installer

Product Guide. McAfee GetSusp

DiskBoss DATA MANAGEMENT

Kaspersky Security for Windows Server

The People in Dairy Generator

IBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31

Windows 10 v1809 Made Easy Bill James, VP, Computer Club of Oklahoma City APCUG Advisor, Region 8 APCUG VTC November 3, 2018

Ryan KS office thesee

Implementing and Supporting Windows Intune

Get Max Internet Security where to buy software for students ]

Monterey County Office of Education Quarantine (Spam ) System - User Guide

GRS Enterprise Synchronization Tool

CONTENTS. Features and Functions...3. Preparation...7. Proceed Installation (Hardware Version)...7. Proceed Installation (Software Version)...

Comodo Mobile Security for Android Software Version 2.5

Internet Security Mail Anti-Virus

esuite Administrator s Guide October 26, 2017

Comodo Antivirus Software Version 2.1

ESET NOD32 ANTIVIRUS 6

Doctor Web. All rights reserved

ForeScout Extended Module for Symantec Endpoint Protection

How to remove Adware from Mozilla Firefox

User Guide. Quick Heal Total Security Multi-Device. Quick Heal Technologies Ltd.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

User Guide. Version R93. English

Comodo. Cloud Antivirus. User Guide. Software Version Guide Version

Airtel PC Secure Trouble Shooting Guide

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008

Avira Ultimate Protection Suite. Short guide

Transcription:

BitRater Client Version 2015 Rev. 1.00 Page 1 of 15

WELCOME The BitRater Client takes a giant leap in PC protection. All you have to do is to install the BitRater Client and restart your PC to be effectively protected. When your PC connects to the Internet, BitRater Client connects to the BitRater Cloud and starts to identify and rate the programs that are installed on your computer. When everything is covered, why read this short instruction? If you want to get more value from BitRater Client, spend a moment to understand how it works. Simplicity is the Ultimate Sophistication (Leonardo da Vinci) BitRater - peer power BitRater offers a clever way of protecting your computer from malware and spyware. It works both independently and in collaboration with a large number of well-renowned anti-virus and internet security companies. On its own, BitRater isolates all new processes about to run on your computer until it is recognized. If the rating of the process falls below the threshold, it will not be allowed to run. When BitRater collaborates, it asks its peers whether a process is OK or not-ok. Each request lasts a few minutes. If the replies from the peers indicate that the process is unsafe, BitRater auto-quarantines it. Because unknown processes and programs never are allowed to run before they are validated, high-jacking, spyware and other malicious software will not be able to run. Page 2 of 15

INSTALL AND USE BITRATER CLIENT Install One-Click-Installation: Click Accept Terms and Install now and within a few minutes BitRater Client is installed and fully functional. Restart the computer after installation. If BitRater Client is installed already, this is what you will see Page 3 of 15

Registration Enter your Customer ID and the License Key and click OK. BitRater Client is ready and fully functional at once. Final steps For full protection you need to complete a few easy steps. In the Main screen, select Options > General. Page 4 of 15

With many computers on a network, you can connect the clients to a local server, where all information on programs and processes are gathered and controlled. Select Options > Cloud. When BitRater has been installed, all processes are blacklisted. Then the rating process begins. Every now and then, a status window informs you how many percent of the processes have been whitelisted. When the rating process ends, it is confirmed by a new status window. We recommend that you take advantage of the the full BitRater protection. Mark the Use Cloud box to have BitRater Cloud Service to check the processes on your computer. The processes will be checked against large databases over OK and not-ok processes and they will be evaluated by many anti-virus engines and other advanced technologies. NOTE: Port number may vary according to local setup. You will be notified about findings. For further information see www.bitrater.net. Page 5 of 15

Views The three screens basically are tables where processes and events are listed whenever they happen. NOTE: The three panes in the Main screen are customized in Options. Files This screen lists all the files on your computer. There are three things to pay attention to in the Files screen: 1. All running and selected processes are listed alphabetically and with its rating 2. Filter has four process type settings: Programs, Dynamic Linked Libraries (dll) and drivers NOTE: The filter does not delete the deselected processes. Select All, and the entire File view reinstates. Page 6 of 15

3. Select a file to see how it was rated by the BitRater peers. Below you ll see a blocked process: Log The Log allows you to see all events that on have happened on your computer. 1. Clear will delete the entire log 2. Export log allows you to save the log as a text file for further investigation in e.g. a spreadsheet 3. Filter has four event type settings: All, Notifications, Warnings and Errors NOTE: The filter does not delete the deselected events. Select All, and the entire log file reinstates. Task Manager The Task manager displays all files/processes currently running. 1. End task will kill the process NOTE: All processes can be stopped - also processes needed to make your computer run. Take care when using End task. 2. Add to database will add a process to the list of approved processes. If it is recognized by the Whitelist, it will start to run - if not, BitRater quarantines it 3. Filter has four process type settings: Programs, Dynamic Linked Libraries (dll) and drivers NOTE: The filter does not delete the deselected processes. Select All, and the entire File view reinstates. Page 7 of 15

Customize A number of options are available for you to customize BitRater Client to your personal liking. Click Options in the Menu line in the Main screen. Page 8 of 15

General Check Whitelist mode to ensure that no unknown processes can execute on your computer. It is a good idea when not connected to the cloud. NOTE: The Whitelist is a locally maintained list of processes with a rating above 80% Log Select how log events are presented - both in the Log View and as pop-up Message dialog boxes. Also, determine how far back you need to save log data: default is three months. Page 9 of 15

Task Manager Checkmark the file information you want to see in Task Manager View. Page 10 of 15

Password To maintain a good safety practice, you ought to protect BitRater from unauthorized access with a password. Page 11 of 15

BitRater Server When your computer is logged on to the BitRater Server, it is usually running in a network. The BitRater Server is by default connected to BitRater Cloud. On an hourly basis, all files are synchronized with the latest cloud-ratings. New files that are in the unconfirmed window and are known-good will be confirmed automatically. Page 12 of 15

Cloud Checkmark Use Cloud for BitRater to analyze and rate all processes before they are initiated. BitRater Cloud Service is a virtual analysis environment that handles and controls both good and harmful processes. It is always connected to your BitRater installation. The slider allows you to set the acceptance level. NOTE: Port number may vary according to local setup. If you check mark Auto quarantine files, the following screen will prompt you to decide if the newly installed program is allowed to run or not. Page 13 of 15

Filter Exclude all files/processes in defined folders from being rated. Generally, this feature is aimed at developers who have have non-rated files and processes in specific folders as part of their job. NOTE: The files/processes in this list will not get accessed by BitRater or BitRater s process control. Page 14 of 15

Cleanup To keep the database tidy and fast, it is recommended to automate the clean-up process. Click Cleanup now! if you do not want to wait for the automatic clean-up. Page 15 of 15