Frequently Asked Questions: Xplornet Internet Security Suite
|
|
|
- Esther Wood
- 10 years ago
- Views:
Transcription
1 Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my computer? Are two antivirus programs better than one? Is the Xplornet Internet Security Suite product compatible with Windows XP SP2 or SP3 Security Center and the internal firewall of the operating system? Which operating systems does the Xplornet Internet Security Suite product support? How can I check which version of the Windows operating system I have? How can I check if my computer meets the system requirements for the Xplornet Internet Security Suite product? How do I remove conflicting security programs manually? Installation: Why is the first Xplornet Internet Security Suite installation package so large? How do I install the Xplornet Internet Security Suite product? How do I know that Xplornet Internet Security Suite is properly installed and running? Can I install the Xplornet Internet Security Suite product on top of an evaluation version? I installed or upgraded the Xplornet Internet Security Suite product but cannot see the product icon on the system tray. What should I do? After installing the Xplornet Internet Security Suite product, I have no access to the Internet or my e- mail. What can I do? How do I uninstall the Xplornet Internet Security Suite product? Subscription and Registration: I have a shared Internet connection. Can I use the Xplornet Internet Security Suite product on all the computers? Can I give a copy of the software to a friend? I formatted my hard drive. Do I need to register the Xplornet Internet Security Suite product again? Can I install the product on several computers? How can I register a full version of the Xplornet Internet Security Suite on top of an evaluation version? I am experiencing technical difficulties with Xplornet Internet Security Suite. How can I proceed? Viruses: The second full scan of the computer was quite fast. Did the product really scan my whole computer? Should I manually scan my hard disks daily? The product shows that the virus definitions are out of date. What can I do? How can I exclude a file or folder from virus and spyware scanning? How can I exclude certain file types from virus and spyware scanning? How do I clean an infected System Volume Information folder or a System Restore folder?
2 How does the advanced process monitoring in DeepGuard protect my computer? I have received an message about a virus. The message says that the virus is dangerous. What should I do? I suspect that a file that was reported as malware is not actually malware. What can I do? Spyware: What is spyware? An application stopped working after I removed spyware from my computer. What can I do? Every time I scan my computer, I find a lot of spyware. Why? Firewall: What is a firewall? Can I use the Windows XP firewall with the Xplornet Internet Security Suite product? What is the difference between firewall profiles and firewall rules? How do I change the firewall profile in the Xplornet Internet Security Suite product? How do I add new firewall rules? When do I have to create a new firewall service for a rule? How can I create a rule using a service that is not listed? How do I change the firewall rules? How can I open a port through the firewall? Why is my FTP software not working after I installed the Xplornet Internet Security Suite product? I have a home office or home network. How can I get two computers to see each other's files? Can I use a digital TV card with the Xplornet Internet Security Suite product? How do I allow all network traffic temporarily? Filtering: How can I make sure that messages from a specific address are not considered spam? How do I block spam from a specific address? How do I edit the list of trusted addresses? Browsing Protection: How does browsing protection work? I do not want to see safety ratings for web sites anymore. How can I turn them off? I think that a web site is rated incorrectly. What can I do? Parental Control: How do browsing modes in Parental Control work? Why do I need the Parental Control password? How do I allow web pages for small children? How can I turn off Parental Control temporarily? I have forgotten my Parental Control password. How can I access the Xplornet Internet Security Suite settings? The Parental Control time lock is blocking the connection to the Internet. What can I do? I created a Small Child browsing mode and now Parental Control prevents me from accessing the Internet. What can I do?
3 Automatic Updates: How do I know that I have the latest updates? How can I check that my computer is protected and that automatic updates are working? Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my computer? No. You cannot have two antivirus or firewall products from different vendors installed on your computer. The Xplornet Internet Security Suite product automatically detects and removes most common antivirus and firewall products during the installation. You can also manually remove any other antivirus or firewall products before installing the product.
4 Are two antivirus programs better than one? No. It is best to have one good antivirus program. An antivirus program needs to open a file to scan it for malware. If another antivirus program is trying to open the same file at the same time, it has to wait for the file to become free. This may cause problems. For example, programs may not start correctly, or the whole system may crash. Is the Xplornet Internet Security Suite product compatible with Windows XP SP2 or SP3 Security Center and the internal firewall of the operating system? Yes, it is compatible. However, you cannot use two software firewalls on the same computer simultaneously. When you install the product, the internal firewall of Windows XP is automatically turned off. Which operating systems does the Xplornet Internet Security Suite product support? The product supports the following operating systems: Windows XP Windows Vista Windows 7 Mac OS X (version 10.5 and 10.6 on Intel platforms)* However, the product does not support the server versions of the operating systems mentioned above, or Windows XP 64-bit. *A separate version of Xplornet Internet Security Suite is available for Mac OS as a separate download. Please refer to the FAQ for the Mac OS version of Xplornet Internet Security Suite for additional information.
5 How can I check which version of the Windows operating system I have? You can check the operating system version in Windows system properties. To check your system properties in Microsoft Windows: 1. Click Start. 2. Select Control Panel. 3. In Windows XP and Vista: a. Select the Performance and Maintenance category. Note: This step may not be necessary in all computers. b. Double-click System. The System Properties window opens. c. Click the General tab. 4. In Windows 7, select System and Security > Security. You can view the properties of your computer, such as operating system version, processor information and the amount of memory (RAM). How can I check if my computer meets the system requirements for the Xplornet Internet Security Suite product? To check your system properties in Microsoft Windows: 1. Click Start. 2. Select Control Panel. 3. In Windows XP and Vista: a. Select the Performance and Maintenance category. Note: This step may not be necessary in all computers. b. Double-click System. The System Properties window opens. c. Click the General tab. 4. In Windows 7, select System and Security > Security. You can view the properties of your computer, such as operating system version, processor information and the amount of memory (RAM).
6 How do I remove conflicting security programs manually? During the installation, the program tries to remove conflicting security programs, such as other antivirus or firewall programs, automatically. If they cannot be removed, you will be asked to remove the programs manually through Windows Control Panel. 1. To remove a program: a. In Windows XP, click Start. b. Click Control Panel. c. Double-click Add or Remove Programs. d. Select the program and click Remove. e. In Windows Vista, click the Start button. f. Click Control Panel. g. Click Programs. h. Click Programs and Features. i. Select the program and click Uninstall. j. In Windows 7, click the Start button. k. Select Control Panel. l. Select Programs and Features. m. Select the program and click Uninstall. 2. Antivirus programs may have several related components, which have the same product name. Repeat the steps above to remove all of them. 3. Restart your computer. 4. Why is the first Xplornet Internet Security Suite installation package so large? The first package downloads a lot of files from the Internet (for example, all the virus definitions). The next updates are significantly smaller. How do I install the Xplornet Internet Security Suite product? To install the product, you need the following: A downloaded version of the product. A valid product subscription key. An Internet connection.
7 Note: If you have more than one user account, you have to log in as an administrator before the installation. When you start the installation, you can select how you want to install the product on your computer. You can use either automatic installation or step-by-step installation. If you select the automatic installation, the product is installed automatically. If you select the step-by-step installation, you are asked to make selections during the installation. This product cannot be installed on a computer that uses other antivirus or firewall products. Many common antivirus products will be removed automatically during the installation. 1. To install the downloaded product step by step: a. When you purchase the product online, you receive an message, which contains the download and installation instructions, and your unique product subscription key. b. Follow the instructions and download the software package to your computer. c. Double-click the package icon to run the installation wizard and follow the instructions on your screen. d. When asked, enter you subscription key (xxxx-xxxx-xxxx-xxxx-xxxx). How do I know that Xplornet Internet Security Suite is properly installed and running? The Xplornet Internet Security Suite product is properly installed and running if the Xplornet Internet Security Suite status is green and the status message says that Your computer is protected. Can I install the Xplornet Internet Security Suite product on top of an evaluation version? Yes. If you are using an evaluation version of the product, you can upgrade to a full commercial version. You can do this as follows: 1. To open the product, double-click the product icon at the bottom right corner of your screen. 2. On the main page, click Tasks. 3. Click My subscription. 4. If you have not yet purchased a full product version from Xplornet Communications Inc., select Buy online. This opens a web site where you can buy a full product version. Follow the instructions on that page.
8 5. When you have the subscription key for the full product version, click My subscription. 6. Select Enter new subscription key. 7. In the dialog box that opens, enter your new subscription key and click Register. Tip: If you received your subscription key by , you can copy the key from the e- mail message and paste it into the field. If you would like to upgrade your current version to a version with other or additional features, you need to purchase a new product subscription with a new subscription key. I installed or upgraded the Xplornet Internet Security Suite product but cannot see the product icon on the system tray. What should I do? You can try the following: 1. Check that the icons are not hidden in your operating system: a. In Windows XP or Vista: click the Show hidden icons icon to show the system tray icons. b. In Windows 7: click the caret next to the system tray to show the system tray icons. 2. Open Task Manager. Check that the fsm32 process is visible. 3. If the process is visible, use the Support Tool for generating an fsdiag file. Send the file to our technical support. 4. If the process is not visible, try to install the product again. After installing the Xplornet Internet Security Suite product, I have no access to the Internet or my . What can I do? You may have denied your web browser's network connections. To open the product, double-click the product icon at the bottom right corner of your screen. To check that the network connections are allowed for your browser: 1. On the main page, click Settings. 2. Select Network connections > Application control. 3. Click the Applications tab. You can view a list of denied or allowed applications. 4. Locate the browser that you are using. For example, if you use Internet Explorer, locate iexplore.exe. 5. Check that the connections are allowed for your browser.
9 How do I uninstall the Xplornet Internet Security Suite product? 1. To uninstall the product, do the following: a. In Windows XP, click Start. b. Click Control Panel. c. Double-click Add or Remove Programs. d. Select the Xplornet Internet Security Suite product and click Remove. e. In Windows Vista, click the Start button. f. Click Control Panel. g. Click Programs. h. Click Programs and Features. i. Select the Xplornet Internet Security Suite product and click Uninstall. j. In Windows 7, click the Start button. k. Select Control Panel. l. Select Programs and Features. m. Select the Xplornet Internet Security Suite product and click Uninstall. 2. When you are asked to restart your computer, restart it. I have a shared Internet connection. Can I use the Xplornet Internet Security Suite product on all the computers? Yes, you can use the license for 3 or 6 installations in the same network, depending upon the plan that you have subscribed to with Xplornet. Each subscription key will have 3 or 6 licenses depending upon the plan that you have subscribed to with Xplornet. Can I give a copy of the software to a friend? No, the license is meant for personal use.
10 I formatted my hard drive. Do I need to register the Xplornet Internet Security Suite product again? No, you do not need to register your product again. If you still have your product subscription key (xxxx-xxxx-xxxx-xxxx-xxxx), you can reinstall the product and use the same key. Can I install the product on several computers? You receive a subscription key with your product. You can install the product with the same subscription key on 3 or 6 computers, depending upon the plan that you have subscribed to with Xplornet. How can I register a full version of the Xplornet Internet Security Suite on top of an evaluation version? To register your subscription in an evaluation product, do the following: 1. Connect your computer to the Internet. 2. To open the product, double-click the product icon at the bottom right corner of your screen. 3. On the main page, click Tasks. 4. Click My subscription. 5. Select Enter new subscription key. 6. In the dialog box that opens, enter your new subscription key and click Register. Tip: If you received your subscription key by , you can copy the key from the e- mail message and paste it into the field. After registration, the full subscription is activated and in use. I am experiencing technical difficulties with Xplornet Internet Security Suite. How can I proceed? If you have technical difficulties with the Xplornet Internet Security Suite product, please see FAQ s on the following web site:
11 internet-security-suite.aspx The second full scan of the computer was quite fast. Did the product really scan my whole computer? The product detects which files were scanned and checks if they have changed since the last scan. If they have not changed, they are not scanned again. The same applies to archives. This may mean that a different number of files are scanned each time you scan your computer, and therefore, the scanning time may vary. Should I manually scan my hard disks daily? No, this is not necessary. Virus and spyware scanning includes real-time scanning, which means that your computer is scanned for viruses in real time. You can scan manually for viruses by using scheduled scanning. To open the product, double-click the product icon at the bottom right corner of your screen. To start a scheduled scan: 1. On the main page, click Settings. 2. Select Computer > Scheduled scanning. 3. Select Turn on scheduled scanning. 4. Select which days you would like to regularly scan for viruses and spyware. Option Description Daily To scan every day. Weekly To scan on selected days during the week. Select on which days to scan from the list to the right. Monthly To scan on up to three days a month. To select which days: a. Select one of the Day options. b. Select the day of the month from the list next to the selected day. c. Repeat if you want to scan on another day. 5. Select when you want to start the scan on the selected days.
12 Option Description Start time The time when the scan will start. You should select a time when you expect to not be using the computer. After computer is not used for Select a period of idle time after which the scanning starts if the computer is not used. The product shows that the virus definitions are out of date. What can I do? Usually, you do not have to do anything. The Xplornet Internet Security Suite product updates itself automatically when your computer is connected to the Internet. If the virus definitions are not automatically updated, you can do the following: 1. Check that your computer is connected to the Internet. 2. Check whether the time and date of the computer are correct. If they are wrong, updates may not be installed. 3. Check for updates manually. To do this, open the user interface of the product: a. In Windows XP and Vista, double-click the product icon in the bottom right hand corner of your screen. b. In Windows 7, click the caret and then click the product icon. c. On the main page, click Check for updates. 4. Check that automatic updates are on: a. On the main page, click Settings. b. Select Other settings > Automatic updates. 5. Make sure that your subscription is valid. 6. If you still do not receive updates, please call Xplornet Customer Care. How can I exclude a file or folder from virus and spyware scanning? To open the product, double-click the product icon at the bottom right corner of your screen. To exclude a file or folder from virus and spyware scanning: 1. On the main page, click Settings.
13 2. Do one of the following: o Select Computer > Virus and spyware scanning. o Select Computer > Manual scanning. 3. Click Open excluded items list. 4. To exclude a file, drive, or folder: o Select the Objects tab. o Select Exclude objects (files, folders,...). o Click Add. o Select the file, drive, or folder that you want to exclude from virus scanning. Note: Some drives may be removable drives, such as CD, DVD or network drives. Network drives and empty removable drives cannot be excluded. o Click OK. 5. Repeat the previous step to exclude other files, drives, or folders from being scanned for viruses. 6. Click OK to close the Exclude from scanning dialog box. 7. Click OK to apply the new settings. How can I exclude certain file types from virus and spyware scanning? To open the product, double-click the product icon at the bottom right corner of your screen. To exclude file types from virus and spyware scanning: 1. On the main page, click Settings. 2. Do one of the following: o Select Computer > Virus and spyware scanning. o Select Computer > Manual scanning. 3. Click Open excluded items list. 4. To exclude a file type: o Select the File Types tab. o Select Exclude files with these extensions. o Type a file extension that identifies the type of files that you want to exclude, in the field next to the Add button. To specify files that have no extension, type '.'. You can use the wildcard '?' to represent any single character, or '*' to represent any number of characters. For example, to exclude executable files, type exe in the field. o Click Add. 5. Repeat the previous step for any other extension you want to be excluded from being scanned for viruses. 6. Click OK to close the Exclude from scanning dialog box. 7. Click OK to apply the new settings.
14 How do I clean an infected System Volume Information folder or a System Restore folder? System Restore is a feature of Windows Vista, Windows XP, Windows 7 and Windows ME (Windows ME is not supported by the Xplornet Internet Security Suite product). If a virus infects the computer, it is possible that the virus is also backed up in the System Restore folder. To scan and clean the System Restore folder, you need to turn the System Restore feature off. By turning off System Restore, you lose your last system restore point. Unfortunately, there is no other way to remove infections from System Restore. If you want to continue using the System Restore feature, it is important to turn it on after removing the infected files. 1. To turn off System Restore in Windows XP: a. Close all open programs. b. Right-click My Computer, and select Properties. The System Properties dialog box opens. c. Click the System Restore tab. d. Select the Turn off System Restore on all drives check box. e. Click Apply. f. When the system asks if you want to turn off System Restore, click Yes. g. Click OK. h. Scan all hard drives and all files for viruses with your Xplornet Internet Security Suite product. 2. Once you have scanned and cleaned the files, turn on System Restore in XP as follows: a. Right-click My Computer, and select Properties. The System Properties dialog box opens. b. Click the System Restore tab. c. Clear the Turn off System Restore on all drives check box. d. Click Apply, and then click OK. 3. To turn off System Restore in Windows Vista: a. Close all open programs. b. Click Start. c. Select All Programs > Maintenance. d. Select Maintenance > Backup and Restore Center. e. Click Create a restore point or change settings. If asked, click Continue. f. Under Available disks, clear the checkboxes for all drives. g. Click Apply. h. When the system asks if you want to turn off System Restore, click Turn System Restore Off. i. Click OK. j. Restart your computer.
15 k. Scan all hard drives and all files for viruses with your Xplornet Internet Security Suite product. 4. Once you have scanned and cleaned the files, turn on System Restore in Vista as follows: a. Close all open programs. b. Click Start. c. Select All Programs > Maintenance. d. Select Maintenace > Backup and Restore Center. e. Click Create a restore point or change settings. If asked, click Continue. f. Under Available Disks, select all drives. g. Click Apply. h. When the system asks if you want to turn on System Restore, click Turn System Restore On. i. Click OK. 5. To turn off System Restore in Windows 7: a. Close all open programs. b. Right-click Computer, and select Properties. The View basic information about your computer dialog box opens. c. Click System protection. d. Click the System protection tab. e. Click Configure. f. Select Turn off System protection. g. Click Apply. h. When the system asks if you want to turn off System Protection, click Yes. i. Click OK. j. Scan all hard drives and all files for viruses with your Xplornet Internet Security Suite product. 6. Once you have scanned and cleaned the files, turn on System Restore in Windows 7 as follows: a. Right-click My Computer, and select Properties. The View basic information about your computer dialog box opens. b. Click System protection. c. Click the System protection tab. d. Click Configure. e. Select Restore system settings and previous versions of files. f. Click Apply. g. Click OK.
16 How does the advanced process monitoring in DeepGuard protect my computer? Advanced process monitoring checks if processes are changed while they are running. Infected files may try to do that and infect the whole computer through bugs in software. Advanced process monitoring also protects your web browser against infections, which makes it an important part of browsing protection. Advanced process monitoring may, however, cause issues with certain games which use anti-cheat mechanisms. The problem occurs because both DeepGuard and the game try to make sure that a process is not changed. DeepGuard checks for infections, and the game checks that no scores or similar are changed. Turning off advanced process monitoring resolves the issue. I have received an message about a virus. The message says that the virus is dangerous. What should I do? I suspect that a file that was reported as malware is not actually malware. What can I do? Please report the file as a false positive at the following web site: Most likely you have received a chain letter that spreads information about a non-existent virus, or a hoax. More information about viruses and hoaxes can be found at
17 What is spyware? Spyware are programs that collect your personal information. Spyware may collect personal information including: Internet sites you have browsed, addresses from your computer, passwords, or credit card numbers. Spyware almost always installs itself without your explicit permission. Spyware may get installed together with a useful program or by tricking you into clicking an option in a misleading pop-up window. An application stopped working after I removed spyware from my computer. What can I do? Applications that install spyware may stop working if you remove the spyware from the application. You have two options: 1. Stop using the application and uninstall it. 2. If you still want to use the application, do the following: a. Instead of removing the spyware, move it to the quarantine. b. When you want to use the application, restore the spyware from the quarantine. Note: Restored spyware starts to work again and can spy your computer and show advertising pop-ups. c. You may also want to deny the spyware from connecting to the Internet by using application control. Every time I scan my computer, I find a lot of spyware. Why? Most likely, the majority of found spyware items are so-called tracking cookies. Cookies are items in the web browser that web sites use to save some information on the user s computer. Such cookies can compromise your privacy.
18 What is a firewall? A firewall protects your computer by allowing safe Internet traffic and blocking unsafe traffic. Typically, a firewall allows all traffic from your computer to the Internet, but blocks all traffic from the Internet to your computer unless you specifically allow it. By blocking the inbound traffic, the firewall protects your computer against malicious software, such as worms, and prevents intruders from accessing your computer. Depending on your alerting settings, firewall alert pop-ups may be shown about the actions of the firewall. Can I use the Windows XP firewall with the Xplornet Internet Security Suite product? No. You cannot use the Windows XP firewall with the product. The Xplornet Internet Security Suite product already has a firewall. If you use two software firewalls simultaneously, your computer may freeze. However, you can use a hardware firewall (router) with the product. What is the difference between firewall profiles and firewall rules? The Xplornet Internet Security Suite product includes several firewall profiles that allow you to set more flexible or severe security policies. Firewall profiles allow you to instantly change your level of protection according to your needs. Firewall profiles are automatically updated to make sure that you are protected against the newest forms of malicious computer programs and Internet attacks. Every firewall profile is composed of a set of pre-configured firewall rules. Expert users may create their own firewall rules to modify the firewall profile.
19 How do I change the firewall profile in the Xplornet Internet Security Suite product? To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. To change the firewall profile: 1. On the main page, click Status. 2. Next to Firewall, click the link, which shows the current firewall profile. The Change firewall profile dialog box opens. 3. Read the firewall profile descriptions carefully. 4. Select the appropriate profile from the list and click OK. The Status page now shows the new firewall profile. The firewall rules and application control settings change according to the selected firewall profile. How do I add new firewall rules? Before starting to create a rule, select the firewall profile to which you want to add this rule. Note: You may not be able to add your own rules to all firewall profiles. To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. Start creating a rule Enter a name for the rule and select whether the firewall rule denies or allows traffic. To start creating a rule: 1. On the main page, click Settings. 2. Select Network connections > Firewall. 3. Click the Rules tab. 4. Click Add. The Add new rule dialog box opens. 5. In the Name field, enter a name for the rule. Use a name that you can easily identify. 6. To either deny or allow traffic, select either Deny or Allow. 7. To create a rule that is valid only when you have an active dial-up connection, select Use this rule only with dial-up connection. This option is relevant only if you use a modem or ISDN for your Internet connection. You may want to select this option, for example, if you use a laptop outside your home network and access the Internet through a modem or ISDN connection. Outside your home, your laptop is not protected by your router firewall (if you have one), and you may want to create a stricter rule that denies all unnecessary inbound traffic and use this rule outside your
20 home. Usually, you do not have to create a rule, and the default firewall profile protects your computer both inside and outside your home. 8. Click Next. Select the IP addresses Apply the rule to all network connections or specify the IP addresses and networks to which the new rule applies. Note: The IPv6-related options are only available if your operating system is Microsoft Windows Vista or Windows 7. To select the IP addresses: 1. Select one of the following options: o To apply the rule to both IPv4 and IPv6 addresses, select Any IP address. o To apply the rule to all IPv4 addresses, select Any IPv4 address. o To apply the rule to all IPv6 addresses, select Any IPv6 address. o To apply the rule to specific IP addresses and networks, select Custom and click Edit. The Addresses dialog box opens. a. In the Addresses dialog box, select one of the following options on the Type list: Type Address example IP address DNS name IP range IP subnet /29 MyDNS [mydns] MyNetwork [mynetwork] IPv6 address 2001:db8:85a3:8d3:1319:8a2e:370:733 IPv6 range 2001:db8:1234:: :db8:1234:FFFF:FFFF:FFFF:FFFF:FFFF IPv6 subnet 2001:db8:1234::/48
21 b. Enter the address in the Address field. c. To add the address to the addresses list, click Add to list. d. Repeat steps a-c to add all necessary addresses to the addresses list. e. Click OK. 2. Click Next. How can you define an IP subnet If you want to define an IP subnet, use Classless Inter-Domain Routing (CIDR) notation. It is a standard notation that consists of a network address and subnet mask. For example: Network address Subnet mask CIDR notation / / /32 Select the services and direction Select the services to which the firewall rule applies, and the direction of the traffic. To select the services and direction: 1. Select the services to which you want to apply the rule: o If you want to apply the rule to all IP traffic, select All IP traffic on the list. o If the service you need is not on the list, you need to create it first. The icon appears in the Direction column for the services you selected. 2. For every service, select the direction of the traffic to which the rule applies. The direction is from your computer to the Internet or vice versa. To select the direction, click the icon in the Direction column. Direction Explanation The service is allowed or denied in both directions. The service is allowed or denied if it is from the Internet to your own computer (inbound). The service is allowed or denied if it is from your own computer to
22 Direction Explanation the Internet (outbound). 3. Click Next. Select alerting options Select how the product notifies you when the firewall rule denies or allows traffic. To select the alerting option: 1. Select one of the following options: o If you do not want to be notified, select No alert. No alerts are generated to the alerts log, and no alert pop-ups are shown to you. We recommend that you select this option if you are creating a rule for allowing traffic. o If you want the product to generate alerts in the alerts log, select Log. o If you want the product to generate alerts in the alerts log and to show alert pop-ups to you, select Log and pop-up. Note that you have to turn on the alert pop-ups also in the Firewall alerts dialog box. o In the Alert text field, enter a description to be shown in the alerts log and pop-ups. 2. Click Next. Check and accept the rule Check and accept the new rule. To do this: 1. Check the rule summary. If you need to edit the rule, click Previous. 2. When you are satisfied with your new rule, click Finish. Your new rule is now shown on the rules list on the Rules tab, and it is automatically turned on. If you have created several rules, you can now define their priority order. When do I have to create a new firewall service for a rule? You may have to do this if you are creating a firewall rule for a program but there is no suitable firewall service available. To open the product, double-click the product icon in the system tray at the bottom right corner of your screen.
23 The service defines the protocols and ports the program uses. To find out this information, consult the documentation of the program. To create a firewall service: 1. On the main page, click Settings. 2. Select Network connections > Firewall. 3. Click the Services tab. 4. Click Add. The Add new service dialog box opens. 5. In the Name field, enter a name for the service. Use a name that you can easily identify. 6. From the Protocol list, select the protocol for the service: o ICMP (1) o TCP (6) o UDP (17) If you want to use another IP protocol, enter the protocol number (0-255) in the field. 7. If the service uses the TCP or UDP protocol, define the initiator ports for the service. If the program documentation does not include the initiator ports, you can usually use any port number above o Next to the Initiator ports field, click Edit. o Add the ports: To enter a single port, enter the port number in the Single field, for example, To enter a port range, add the lowest and the highest port number of the range to the Range fields, for example, o Click Add to list. o Repeat the steps a-c to add all necessary ports. o Click OK. 8. If the service uses the TCP or UDP protocol, define the responder ports for the service. The responder ports are usually mentioned in the program documentation. o Next to the Responder ports field, click Edit. o Add the ports: To enter a single port, enter the port number in the Single field. To enter a port range, add the lowest and the highest port of the range to the Range fields. o Click Add to list. o Repeat the steps a-c to add all necessary ports. o Click OK. 9. If the service uses the ICMP protocol, define the ICMP type and code for the service. Click Edit to enter the values in the Type and Code fields. The allowed values are If you will use this service for allowing inbound traffic, you can define whether you want to allow also broadcast and multicast traffic. This kind of traffic is created by streaming programs, such as web radio or television. To allow them, select the Allow broadcasts and Allow multicasts checkboxes. Usually, you can leave these checkboxes unselected.
24 11. In the Add new service dialog box, click OK. Your new service is now shown on the services list on the Services tab. To deny or allow the traffic that the service defines, you need to add the service to a firewall rule which allows outbound Internet connections. How can I create a rule using a service that is not listed? You may have to create a new firewall service and rule if you start playing peer-to-peer network games, or start using a service such as Virtual Network Computing (VNC) remote desktop. For example, for VNC you need to create two firewall services to open the following ports: TCP ports 5500, 5800, 5900, the initiator port is > 1024 UDP ports 5500, 5800, 5900, the initiator port is > Create a service for TCP with the following details: a. Service description: VNCTCP b. Protocol: TCP (6) c. Initiator ports, range: d. Responder ports, single: 5500, 5800 and Create a service for UDP with the following details: a. Enter a service description: VNCUDP b. Select the protocol: UDP (17) c. Enter initiator ports, range: d. Enter responder ports: 5500, 5800, and Create a firewall rule with the following details: a. Enter a rule name: VNC. b. Select the rule type: Allow. c. Select the IP addresses: Any IP Address. d. Select services: VNCTCP and VNCUDP. Click between the computer and globe icon until a double arrow is shown. e. Alert type: No alert. 4. To apply the firewall rule, define VNC as allowed in application control: a. Select Network connections > Application control. b. Click the Applications tab. c. Click Add. d. Click Browse and browse for vncviewer.exe. e. Under Outbound (client) connection, select Allow. f. Under Inbound (server) connection, select Allow. g. Click OK.
25 You should now see the new rule added to the rules list and it should be turned on. You can now close the product and retry your VNC. How do I change the firewall rules? You can only change a firewall rule that you have created yourself. To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. To change a rule: 1. On the main page, click Settings. 2. Select Network connections > Firewall. 3. Click the Rules tab. 4. Select the rule and click Details. The Rule details dialog box opens. 5. Make the necessary changes in each step and move to the next step by clicking Next. 6. In the Rule details dialog box, check the changes that you made. 7. If you are satisfied with the rule, click Finish. The changes that you made are applied to the rule. How can I open a port through the firewall? You can open a port through the firewall if you want to allow some Internet traffic and you know the port number that you want to open. You may not be able to add your own rules to all firewall profiles. Select the firewall profile to which you want to add the new rule before you open the port. When you open a port through the firewall, you create a new firewall rule and two new services. 1. On the main page, click Tasks. 2. Click Open firewall port. 3. In the Name field, enter a name for the new firewall rule. 4. In the Port number field, define the responder port for the rule. The responder port is usually mentioned in the product documentation. 5. Click OK.
26 The new rule is added to the firewall rules list and two new services are created on the firewall services list for both the TCP and UDP protocols with the specified port number. Why is my FTP software not working after I installed the Xplornet Internet Security Suite product? You have to add a new, outbound firewall rule to your firewall profile. To add a new rule for the FTP software: 1. To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. 2. On the main page, click Settings. 3. Select Network connections > Firewall. 4. Click the Rules tab. 5. Click Add. The Add new rule dialog box opens. 6. Follow the instructions in the dialog boxes. 7. In step 3, select the predefined FTP / File Transfer Protocol, active mode as the service. 8. Follow the instructions in the dialog boxes. 9. In the final step, click Finish. I have a home office or home network. How can I get two computers to see each other's files? You need to create a new firewall rule for Windows file sharing to share files between computers on your home network. To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. If you use a router on your network, check the Dynamic Host Configuration Protocol (DHCP) settings of your router to find out the IP address range allocated to your home network. For more information, consult the router documentation. The most usual IP address range for home networks is If you want to share files between all your computers, you have to create the same rule on all of the computers. To create the rule: 1. On the main page, click Settings.
27 2. Select Network connections > Firewall. 3. Click the Rules tab. 4. Click Add. 5. Enter a name and select the rule type: Step Example Enter a name for the rule FileSharing Select the rule type Allow 6. Select the IP addresses: Step Example a. Click Custom. b. Click Edit. c. Select IP range and enter the addresses of your computers in the field. d. Click Add to list. 7. Select the services and direction: Step Example Select the services that Windows file sharing uses a. SMB over TCP/IP (TCP) b. SMB over TCP/IP (UDP) c. Windows file sharing and network printers d. Windows network browsing e. ICMP / Internet Control Message Protocol Select the direction for both services (from the Internet to your computer) o Select the alerting type: Step Example Select the alerting type No alert o Check the summary of the rule and click Finish. Your new rule is now shown on the rules list on the Rules tab, and it is automatically turned on.
28 o Test that the rule works. To do this, use Windows file sharing to share a folder or file and check whether you can access the folder or file from all of your computers. Tip: If you want to share a printer on your home network, create a similar rule. In this case, you have to only create an inbound "allow" rule on the computer to which the printer is connected. Can I use a digital TV card with the Xplornet Internet Security Suite product? Yes, you can. If the TV picture freezes when you use a digital TV card with the Xplornet Internet Security Suite product, add the TV card as a trusted networking adapter. To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. 1. On the main page, click Settings. 2. Select Network connections > Firewall. 3. Click the Settings tab. 4. On the Trusted network adapter list, select the TV card. 5. Click OK. Your TV card should work now. *Note: Xplornet Communications Inc. currently does not offer digital TV services. How do I allow all network traffic temporarily? Note: Your computer is not protected when you allow all network traffic. To allow all network traffic: 1. Right-click the product icon in the system tray at the bottom right hand corner of your screen. 2. Select Unload from the menu. 3. To allow all Internet traffic, select Unload and allow all network traffic. 4. Confirm the unload when requested. To restore your security again, right-click the product icon and select Reload.
29 How can I make sure that messages from a specific address are not considered spam? To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. To allow messages from specific addresses, follow the instructions below. You can also do this through the Spam Control menu button in Microsoft Outlook, Outlook Express or Windows Mail, or by right-clicking the system tray icon for such program. You can add, edit or remove individual addresses or whole domains to your allowed senders list. For example, if you add *@example.com to your allowed senders list, all messages from the example.com domain are allowed. To edit your list of trusted addresses: 1. On the main page, click Settings. 2. Select Internet > filtering. 3. Click Allow senders. The Allow senders settings page opens. 4. Choose one of the following actions: o To add a new address: o Click Add. The Add sender/domain dialog box opens. o In the Address field, enter the address or domain name from which you want to allow messages. You can add a short description for the new address in the Description field. o Click OK. The new address is now shown on your allowed senders list. o To edit an address: o In the list, select the address you want to edit, and click Edit. The Edit sender/domain dialog box opens. o Edit the selected address, and click OK. o To remove an address from the allowed senders list: o In the list, select the address you want to remove, and click Remove. The address is removed from the list. How do I block spam from a specific address? To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. You can also do this through the Spam Control menu button in Microsoft Outlook, Outlook Express or Windows Mail, or by right-clicking the system tray icon for such program.
30 You can add, edit or remove individual addresses or whole domains to your blocked senders list. For example, if you add to your blocked senders list, all messages from the example.com domain are blocked. To edit your list of blocked addresses: 1. On the main page, click Settings. 2. Select Internet > filtering. 3. Click Block senders. 4. Choose one of the following actions: o To add a new address: o Click Add. The Add sender/domain dialog box opens. o In the Address field, enter the address or domain name from which you want to block messages. You can add a short description for the new address in the Description field. o Click OK. The new address is now shown on your blocked senders list. o To edit an address: o In the list, select the address you want to edit, and click Edit. The Edit sender/domain dialog box opens. o Edit the selected address, and click OK. o To remove an address from the blocked senders list: o In the list, select the address you want to remove, and click Remove. The address is removed from the list. How do I edit the list of trusted addresses? To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. To edit the list, see instructions in How can I make sure that messages from a specific address are not considered spam?. How does browsing protection work? Browsing protection protects your computer on several levels: Safety ratings for web sites: You can see safety ratings for web sites listed on search engine results and in web mail content. The safety ratings help you avoid web sites that contain security threats, such as malware (viruses, worms and trojans). They protect you against the
31 latest Internet threats that are not yet recognized by traditional antivirus programs. The safety rating for a site can be one of the following: safe, suspicious, harmful or unknown. Exploit shields: Exploit shields protect your computer against vulnerabilities that have been found in programs installed on your computer. Exploit shields identify and prevent malicious web sites from using such vulnerabilities to, for example, force an unauthorized download that contains malware. Process monitoring (in DeepGuard): DeepGuard monitors and blocks attempts to load malware into your web browser. If the browser becomes infected, the functionality of a trusted web site can change. For example, it may start asking for your password. I do not want to see safety ratings for web sites anymore. How can I turn them off? You can turn safety ratings off by disabling the browsing protection toolbar in your web browser. To do this: 1. In Mozilla Firefox: a. Select Tools > Add-ons. b. Next to Browsing Protection Toolbar, click Disable. 2. In Microsoft Internet Explorer: a. Select Tools > Internet Options. b. Click the Programs tab. c. Click the Manage Add-ons button. d. Select Browsing Protection Class. e. Select Disable and click OK. f. Select Browsing Protection Toolbar. g. Select Disable and click OK. I think that a web site is rated incorrectly. What can I do? You can suggest a new safety rating for the web site. If other browsing protection users agree with you, the rating of the site may eventually change. However, the decision is made
32 based on information from several sources, including F-Secure malware analysts and F- Secure partners. To suggest a new rating for a site: 1. Click Report on the toolbar. This opens the Notify us dialog box. 2. Select a rating to give your opinion of the web site's safety (It is safe to use, It is harmful to use or I have no opinion). 3. Click OK. This will open the Rating confirmation dialog box. Tip: Select Do not show this message again if you do not want to see the confirmation dialog box when rating web sites in future. 4. Click OK. How do browsing modes in Parental Control work? With the Parental Control browsing modes, you can define browsing times and web sites that are suitable for your teenagers and small children. You can give your teenagers more freedom to browse the Internet while having tighter restrictions on your small children's online activities. You can create and set up the Parent, Teenager, and Small Child browsing modes either with Start-up Wizard during the installation, or later on in the Parental Control page. Small Child browsing mode The Small Child browsing mode is active after you have installed the product, activated the feature and restarted the computer. When the Small Child mode is active: anyone using the computer can access only those web sites that you have specifically allowed. access to the Internet is allowed only during the scheduled time. All the web sites that you have allowed are listed on Parental Control Start Page that opens in the browser when the Small Child mode is active. Teenager browsing mode When the Teenager browsing mode is active: anyone using the computer can access all web sites, except those that contain restricted or unwanted content, for example on drugs or adult material. access to the Internet is allowed only during the scheduled time.
33 If you have created both Small Child and Teenager browsing modes on your computer, tell your teenagers the password you created for the Teenager mode. When they enter the password, they can browse web pages that: do not contain restricted material, and you have specifically allowed. Note: If you turn Web Page Filter off, your teenagers can visit web pages and sites regardless of their content. Parent browsing mode When the Parent browsing mode is active, anyone using the computer can access the Internet without any time or content restrictions. You are asked to create the Parent Control password when you are creating the browsing modes. You need the Parent Control password to: open the product user interface, view or change the product settings, connect to the Internet with a new application, or uninstall the product. Why do I need the Parental Control password? If Parental Control is turned on, you need the Parental Control password to change the Xplornet Internet Security Suite settings. The password prevents other computer users from making changes to the settings. Even the product user interface cannot be opened without the password. How do I allow web pages for small children? To allow web pages for your small children, follow the instructions below. To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. Tip: If you use Internet Explorer, you can allow (or block) new sites by using the Xplornet Internet Security Suite Webfilter button in the browser s toolbar. 1. On the main page, click Settings.
34 2. Select Internet > Parental Control. 3. Select the Small child tab. 4. Select Allow only selected sites. If this option is not selected, small children can browse all web sites and pages. 5. Click View web sites. 6. Select the Allowed tab. 7. Click Add. 8. In the Allow Web Site dialog box, type the address of the web page to which you want to allow access. o To allow access to the entire web site, type o To allow access to a part of the web site, type 9. Click OK. You can block or allow web pages for your teenagers in a similar way. How can I turn off Parental Control temporarily? Note: You need the Parental Control password for changing all Parental Control settings. To turn off Parental Control temporarily: 1. On the main page, click Settings. 2. Select Internet > Parental Control. 3. Clear the Turn on Parental Control check box. I have forgotten my Parental Control password. How can I access the Xplornet Internet Security Suite settings? If you have forgotten your password, you can access the Xplornet Internet Security Suite settings, and reset the password by using your product subscription key. To reset the password: 1. Open the product interface. A dialog box opens asking you to enter the Parent password. Note: To see a hint for your password, move the cursor to the Show password hint. This hint will hopefully remind you what your password is. 2. Click Forgot your password?.
35 3. Enter the first four digits of your subscription key, and click Next. You received the subscription key when you purchased the product. 4. Do the following: a. Enter a new password. Note: When creating passwords, keep in mind the following: Select a password that is easy to remember but hard to guess. A password can contain any characters. A password must have between 3 and 80 characters. Depending on how your product is set up, your password may need to be longer than a certain number of characters. b. Re-enter the new password to confirm it. c. Click Next. d. Enter your password hint. Your password hint should remind you what your password is. It should be something that tells you what your password is but does not let anyone else guess the password. Keep in mind that your children can also see this hint. e. Click OK. A message is shown telling you that you have successfully reset the password. 5. Click OK. The Parental Control time lock is blocking the connection to the Internet. What can I do? When the time lock blocks the connection to the Internet, the web browser shows a block page which says that the time lock is active and the Internet cannot be accessed. To extend the browsing time: 1. On the Time Lock Block Page that opens in your browser, click Extend Internet browsing time. 2. In the dialog box, enter your Parent password, and click OK. 3. In the Time Lock dialog box, schedule a time, and click OK. Tip: In Internet Explorer, you can also extend browsing time by using the Parental Control menu button.
36 I created a Small Child browsing mode and now Parental Control prevents me from accessing the Internet. What can I do? When the Small Child browsing mode is used, Parental Control blocks all web sites that you have not specifically allowed. When you try to open the Internet, the Parental Control Start Page opens. To access the Internet, switch to the Parent browsing mode by clicking Parent. You can also allow web sites for the Small Child mode by clicking Allow new web sites for small children. How do I know that I have the latest updates? When automatic updates are turned on, the product updates itself automatically when your computer is connected to the Internet. You can also check that you have the latest updates. To open the product, double-click the product icon in the system tray at the bottom right corner of your screen. To check for updates: 1. On the main page, click Settings. 2. Select Other Settings > Automatic updates. 3. Last update check displays the time of the latest update check. 4. Click Check now. The product connects to the Internet and checks for the latest updates. If the protection is not up-to-date, it retrieves the latest updates. Note: If you are using a modem, or have an ISDN connection to the Internet, the connection must be active to check for updates. How can I check that my computer is protected and that automatic updates are working? To open the main user interface, double-click the product icon in the system tray at the bottom right corner of your screen. To open the Status page: On the main page, click Status. The Status page opens. The icons show you the status of the program and its security features.
37 Status icon Status name Description OK Your computer is protected. The feature is turned on and working properly. Information The product informs you about a special status of a feature. This icon is shown, for example, when a feature is being updated. Warning Your computer is not fully protected. For example, the virus definitions may be old, the status of a feature requires attention, or the firewall is set to block all Internet traffic. Error Your computer is not protected. For example, your subscription has expired, the firewall has been set to allow all traffic, a critical feature is turned off or the product is in error state. Off A non-critical feature is turned off.
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Cox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
F-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
F-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
FAQ. Safe Anywhere PC. Disclaimer:
FAQ Safe Anywhere PC Version: 1.0 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
ViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
FAQ. F-Secure Online Backup 2.1
FAQ F-Secure Online Backup 2.1 Before installation... 4 Does the F-Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
FAQ. F-Secure Online Backup
F-Secure Online Backup Before installation... 3 Does the F Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs better
F-Secure Anti-Virus for Mac. User's Guide
F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
F-Secure Client Security. Administrator's Guide
F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main
F-Secure Anti-Virus for Windows Servers. Administrator's Guide
F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System
Ad-Aware Antivirus Overview
Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.
www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations
Using Spy Sweeper for Windows Author: Jocelyn Kasamoto
WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
F-Secure E-mail and Server Security. Administrator's Guide
F-Secure E-mail and Server Security Administrator's Guide TOC F-Secure E-mail and Server Security Contents Preface: Disclaimer...vi Chapter 1: About This Guide...7 1.1 Introduction...8 1.1.1 Product contents...8
User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1
User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego
User's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
Frequently Asked Questions
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender
Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should
Sophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
Network Setup Guide. Introduction. Setting up for use over LAN
Network Setup Guide This manual contains the setup information required to use the machine over wired LAN. If you use the machine with USB connection, refer to your setup sheet. Introduction To use the
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
How to set up popular firewalls to work with Web CEO
How to set up popular firewalls to work with Web CEO Contents How to set up popular firewalls to work with Web CEO... 1 Setting up Agnitum Outpost Firewall 2.5... 2 Setting up Black ICE 3... 6 Setting
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection
User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
2. Installation and System requirements
RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
Sophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware
MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files
Point of Sale 2015 Enterprise. Installation Guide
Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System
Overview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10
Overview... 2 Installing... 2 Step 1: Download... 2 Step 2: Install... 2 Step 3: Sign In... 3 Step 4: That's It!... 3 Minimum System Requirements:... 3 Using the Secure Desktop Agent... 4 Accessing & Login
Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later
Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Vodafone Text Centre User Guide for Microsoft Outlook
Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message
Installing the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
SMALL BUSINESS EDITION. Sophos Control Center startup guide
SMALL BUSINESS EDITION Sophos Control Center startup guide Product version: 4.0 Document date: September 2009 Contents 1 About this guide...3 2 System requirements...4 3 Installation...5 4 Protecting networked
How to Configure Windows Firewall on a Single Computer
Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and
WatchGuard Mobile User VPN Guide
WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Bitdefender Internet Security 2015 User's Guide
USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved.
www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations
Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29
Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Safe internet: Getting Started Guide
Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
Release 2.0. Cox Business Online Backup Quick Start Guide
Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.
How to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.
Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire
ReadyNAS Setup Manual
ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
How to Install Windows 7 software
Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
Magaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
Basic Administration Guide
*Formerly Panda Managed Office Protection Copyright notice Trademarks Panda Security 2010. All rights reserved. Neither the documents nor the programs that you may access may be copied, reproduced, translated
GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
Internet and Email Help. Table of Contents:
Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0.
User Guide for the Essentials Edition Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere User Guide for the Essentials Edition
PureMessage for Microsoft Exchange startup guide
PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: May 2010 Contents 1 About this guide...3 2 Planning your PureMessage deployment...4 3 Installing PureMessage...6 4 Starting
WebEx. Remote Support. User s Guide
WebEx Remote Support User s Guide Version 6.5 Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior notice. The reader should
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Microsoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
Use this guide if you are no longer able to scan to Sharpdesk. Begin with section 1 (easiest) and complete all sections only if necessary.
Use this guide if you are no longer able to scan to Sharpdesk Instructions: Begin with section 1 (easiest) and complete all sections only if necessary. 1 Section 1 Complete pages 3-5. Scan to the desired
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
AVG AntiVirus Free Edition
AVG AntiVirus Free Edition User Manual Document revision AVG.06 (16.10.2015 ) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review
Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X
Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos
Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727)
Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) If you are unable to resolve your issue using the Troubleshooting steps below, please contact Sprint Customer
www.agnitum.com User Guide Copyright 2010 Agnitum Ltd. All rights reserved.
www.agnitum.com User Guide Copyright 2010 Agnitum Ltd. All rights reserved. Abstract This is the complete and detailed reference to the Outpost Firewall Pro software. For an entry-level guide, please see
Welcome. Thank you for choosing Cogeco High Speed Internet.
Welcome Welcome Thank you for choosing Cogeco High Speed Internet. Welcome to the endless range of possibilities available to you with your new High Speed Internet service. When it comes to speed, you
