Antimalware Overview

Total Page:16

File Type:pdf, Size:1020Kb

Antimalware Overview Kaseya 2 AAnnttiiMMaallwwaarree User Guide Version 1.1 September 30, 2013 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya’s “Click-Accept” EULA as updated from time to time by Kaseya at http://www.kaseya.com/legal.aspx. If Customer does not agree with the Agreement, please do not install, use or purchase any Software and Services from Kaseya as continued use of the Software or Services indicates Customer’s acceptance of the Agreement.” ©2013 Kaseya. All rights reserved. | www.kaseya.com Contents AntiMalware Overview ................................................................................................................................ 1 AntiMalware System Requirements .......................................................................................................... 1 Machines ...................................................................................................................................................... 2 Page Layout ......................................................................................................................................... 2 Explorer Grid ........................................................................................................................................ 3 Control Panel ....................................................................................................................................... 3 AntiMalware Columns ......................................................................................................................... 5 Details Panel ........................................................................................................................................ 6 Dashboards .................................................................................................................................................. 7 Detections .................................................................................................................................................... 8 Profiles .......................................................................................................................................................... 9 AntiMalware Statistics in the Executive Summary Report .................................................................... 10 Anti-Malware - Anti-Malware Installation Statistics ............................................................................... 11 Index ........................................................................................................................................................... 13 i AntiMalware Overview AntiMalware Overview AntiMalware (KAM) provides Malwarebytes' Anti-Malware Pro endpoint security for managed machines. AntiMalware can be installed independently of Endpoint Security or Antivirus. AntiMalware is particularly adept at detecting and preventing ScareWare or Rogue Antivirus spyware that installs a virus, then attempts to bill the user to remove it. AntiMalware quickly detects, destroys, and blocks malicious software. Every process is monitored and malicious processes are stopped before they even start. Scanning and realtime protection both use advanced heuristic scanning technology to keep systems safe and secure against even the latest malware threats. Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit). Light speed quick scanning. Ability to perform full scans for all drives. Database updates released daily protect against the newest malware in-the-wild. Intelligent heuristics detect even the most persistent malware while remaining light on system resources. Realtime protection monitors filesystem and internet traffic. Scheduler to keep protection up-to-date automatically. Quarantine to hold threats and restore them at your convenience. Ignore list for both the scanner and the protection module. Note: See KAM System Requirements (page 1). Functions Description Machines (page 2) Installs and uninstalls AntiMalware software on selected machines and provides a detailed view of the AntiMalware status of any selected machine. Dashboards (page 7) Displays a dashboard view of the status of all machines installed with AntiMalware. Detections (page 8) Displays virus threats you can take action on. Profiles (page 9) Manages AntiMalware profiles that are assigned to machine IDs. AntiMalware System Requirements Kaseya Server . The AntiMalware 1.1 module requires VSA 6.0.1 to 6.3. Requirements for Each Managed Machine . AntiMalware can be installed on any Kaseya managed machine, excluding Apple and Linux machines. 1 Machines Note: Malwarebytes officially supports the following operating systems: Microsoft ® Windows 2000, XP, Vista, 7 (32-bit and 64-bit). Windows server editions are not supported; however, customers have successfully deployed Malwarebytes to machines running Windows server editions. Kaseya Anti-Malware will allow deployment to machines running Windows server editions, but it is not supported by Kaseya or Malwarebytes. Microsoft® Windows 2000 Service Pack 4 or higher. 500MHZ processor. 256 MB of RAM. 15 MB free disk space. Note: System Requirements (http://help.kaseya.com/WebHelp/EN/System-Requirements.asp) See general . Machines AntiMalware > Machines The Machines page installs and uninstalls AntiMalware software on selected machines. This same page also provides a detailed view of the AntiMalware status of any selected machine. Page Layout (page 2) . Explorer Grid (page 3) . Control Panel (page 3) . KAM Columns (page 5) . Detail Panel (page 6) Page Layout The layout of the Machines (page 2) page comprises the following main panels: Control Panel Selected Column Set Machine ID / G roup ID filter M a c h in e Navigation H e a d e r P a n e l M a c h in e A n ti- M a lw a r e D e ta ils Explorer Grid Page Browser Rows Per Page . Navigation Panel - Used to navigate to the AntiMalware module. There are four functions: Machines (page 2), Dashboards (page 7), Detections (page 8), and Profiles (page 9). Explorer Grid - Each managed machine in the VSA is listed in this panel. Page Browser - If more than one page of devices displays, pages forwards and back. Rows Per Page - Sets the number of devices displayed per page: 10, 30 or 100. 2 Machines . Machine ID / Group ID Filter - Filters the list of machines ID listed in the Explorer Grid. Control Panel - Executes tasks, either for the entire Explorer Grid or for a single selected machine. Details Panel - This expandable/collapsible panel displays the properties and status of a single machine. The Details Panel (page 6) has two sections. Header - Identifies the selected machine in the Explorer Grid. AntiMalware - Displays a summary of the AntiMalware status of a machine. Explorer Grid The Explorer Grid of the Machines (page 2) page lists each machine currently installed with a KAM client and included in the machine ID / group ID filter. Note: The only exception is when the Installation column set is selected. In this case all machines included the machine ID /group ID filter are displayed, whether or not the KAM client is installed. The set of columns displayed is determined by the Column Set selection in the Control Panel (page 3). The currently selected column set displays in the bar just above the Explorer Grid. Note: See KAM Columns (page 5) for a description of each column available to display in any Explorer Grid column set. Page forward using the Page Browser to display multiple pages of machines. Machines per page sets the number of rows on each page. Control Panel The Control Panel at the top of the Machines (page 2) page executes tasks, either for the entire Explorer Grid (page 3) or for a single selected machine. Actions . Open - Display machine AntiMalware information in a new window. You can also double-click a machine in the Explorer Grid to open this same window. Cancel Pending Action - Cancel pending actions on selected machines. Open new window - Opens the AntiMalware module in a new window. Reboot - Reboot selected machines. Column Sets Selecting a column set displays a predefined set of columns. Modify Columns - Customize the set of columns displayed by any column set. Or, select one of the following pre-defined sets of column listings. 3 Machines . Installation - Display a installation columns in the Explorer Grid for all agent machines. Scan - Display scan columns in the Explorer Grid for all agent machines installed with a KAM client. Update - Display update columns in the Explorer Grid for all agent machines installed with a KAM client. Status - Display status columns in the Explorer Grid for all agent machines installed with a KAM client. Version - Display version columns in the Explorer Grid for all agent machines installed with a KAM client. Licensing - Display licensing columns in the Explorer Grid for all agent machines installed with a KAM client. Detections - Display threat detection columns in the Explorer Grid for all agent machines installed with a KAM client. Profile - Display profile columns in the Explorer Grid for all agent machines installed with a KAM client. Assign Assign an AntiMalware configuration profile (page 9) to selected machines. Scan Schedules an AntiMalware scan on selected machines. Start Date - Start date of the scan. Time - Start time of the scan. Distribution Window - Use the Immediate option to scan at the start date and time. Or reschedule the task to a randomly selected time no later than the specified number of periods from the start
Recommended publications
  • End User License Agreement
    END USER LICENSE AGREEMENT This End User License Agreement (“Agreement”) sets forth the terms and conditions controlling End User’s right to use and the manner of use of Sandvine products. 1. Use Constitutes Acceptance. BY ACCESSING, USING OR KEEPING ANY PRODUCT, OR BY DOWNLOADING OR INSTALLING ANY SOFTWARE, END USER ACKNOWLEDGES THAT END USER HAS READ, UNDERSTOOD AND ACCEPTS ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT ACCEPT ALL TERMS AND CONDITIONS, DO NOT INSTALL, ACCESS AND/OR USE THE PRODUCT AND PROMPTLY RETURN IT UNUSED TO THE COMPANY FROM WHICH YOU BOUGHT THE PRODUCT. FOR CLARITY, IF YOU GIVE PERMISSION TO USE THE SOFTWARE TO OR IF THIS AGREEMENT IS ACCEPTED BY A THIRD PARTY (INCLUDING, BUT NOT LIMITED TO, A SUBCONTRACTOR, SERVICE PROVIDER, SYSTEMS INTEGRATOR, CONSULTANT AND/OR SANDVINE-AUTHORIZED RESELLER) SUCH USE AND ACCEPTANCE SHALL BE DEEMED TO BE MADE ON BEHALF OF THE END USER AND THIS AGREEMENT SHALL APPLY TO AND BE BINDING UPON THE END USER. 2. Definitions. (i) “Affiliates” means any entity directly or indirectly controlling, controlled by or under common control with Sandvine. (ii) “Cloud Software” means Software identified in writing by Sandvine as being Cloud Software and currently includes but is not limited to the following Sandvine Cloud Services Policy Controller software offerings: (i) Sandvine View™, (ii) Sandvine Control™, and (iii) Sandvine Protect™. (iii) “Device” means a: (a) Hardware unit, or (b) third party device, hardware or network element (which, for clarity, is a Third Party Item). (iv) “Documentation” means the electronic, printed, or other form of documents that accompany or are otherwise available to provide information about installation, operation, and use of the Product (including, but not limited to, relating to Software Modules and any standard services or custom services).
    [Show full text]
  • Software Licensing Flexibility Is
    Software licensing flexibility is key - SD Times file:///Users/mq/Desktop/Software licensing flexibility is key ... sdtimes.com Software licensing flexibility is key - SD Times Lisa Morgan Today’s businesses run on software, but the ways they want to license it are changing. To keep pace with end users’ expectations and to stay competitive, software companies are embracing more types of licensing models, including perpetual, subscription, pay-per-use, hybrid and others. On-premise licenses are being supplemented with or replaced by SaaS alternatives, and more developers are selling apps via app stores. Meanwhile, intelligent device manufacturers are putting more 1 von 3 08.10.15 14:28 Software licensing flexibility is key - SD Times file:///Users/mq/Desktop/Software licensing flexibility is key ... emphasis on software because it helps them differentiate their products and take advantage of new revenue opportunities. As technology evolves and as user expectations continue to change, software developers and intelligent device manufacturers need reliable and flexible means of protecting, monetizing and monitoring the use of their intellectual property. (Related: The big business of software licensing) “We’re noticing a steady shift away from the traditional models. What’s still top of mind is how you get from a perpetual license to a subscription-type model,” said Jon Gillespie-Brown, CEO of Nalpeiron. “Quite a few people say they like what Adobe did with Creative Suite, [not realizing] what it took to do that, but in general people want to know how they can transform their businesses.” Intelligent device manufacturers are changing their business models too.
    [Show full text]
  • SOLICITATION, OFFER, and AWARD (Construction
    SOLICITATION, OFFER, 1. SOLICITATION NUMBER 2. TYPE OF SOLICITATION 3. DATE ISSUED PAGE OF PAGES AND AWARD SEALED BID (IFB) NEGOTIATED (RFP) (Construction, Alteration, or Repair) GS-07-P-17-HT-C-0010 6/23/2017 1 103 IMPORTANT - The "offer" section on the reverse must be fully completed by offeror. 4. CONTRACT NUMBER 5. REQUISITION/PURCHASE REQUEST NUMBER 6. PROJECT NUMBER EQ7PMD-17-0038 7. ISSUED BY CODE 7PQD 8. ADDRESS OFFER TO ACQUISITION MANAGEMENT DIVISION 7PQD ACQUISITION ENERGY & ACQUISITION SUPPORT ACQUISITION MANAGEMENT DIVISION BRANCH ACQUISITION ENERGY & ACQUISITION SUPPORT 819 TAYLOR ST RM 12B01 BRANCH FORT WORTH, TX 76102 819 TAYLOR ST RM 12B01 FORT WORTH, TX 76102 9. FOR INFORMATION a. NAME b. TELEPHONE NUMBER (Include area code) (NO COLLECT CALLS) CALL: Shawna Villarreal (817) 850-5541 SOLICITATION NOTE: In sealed bid solicitations "offer" and "offeror" mean "bid and "bidder". 10. THE GOVERNMENT REQUIRES PERFORMANCE OF THE WORK DESCRIBED IN THESE DOCUMENTS (Title, identifying number, date) SOW dated 6/21/2017 11. The contractor shall begin performance within 10 calendar days and complete it within45 calendar days after receiving award, notice to proceed. This performance period is mandatory negotiable. (See ). 12a. THE CONTRACTOR MUST FURNISH ANY REQUIRED PERFORMANCE AND PAYMENT BONDS? 12b. CALENDAR DAYS (If "YES", indicate within how many calendar days after award in Item 12b.) YES NO 10 13. ADDITIONAL SOLICITATION REQUIREMENTS: a. Sealed offers in original and 1 copies to perform the work required are due at the place specified in Item 8 by 2:00 PM (CST) (hour) local time 7/25/2017 (date).
    [Show full text]
  • Autocad Change Licence Type
    Autocad Change Licence Type Foreknowingly overeager, Hyatt dined jambalaya and cauterizes pintail. Invalidating Marcus perorated cerebratedhis Val-de-Marne some tweet?expired slothfully. How favorite is Osgood when unlimited and extrorse Town Home use lmtools utility, which licenses that are in The repair functionality is totally dismantled, you are entitled to work related person who give you purchase a contextual menu that. If activation redundant member of licences in? To subscription terms and perform a licence means that. Sign in a usable program. Is a licence means that for all, and resource of licences running an existing lightscape customers including systems. As you can find your trial dialog box configuration options files that is less likely have no support in your html does. You are closed, update your next. As long does not used? What is the type you should use. If it is a single lmgrd restarts and. No matching functions, type does not be above license types in? User sign in one of licences to type of eagle still available to move your twitter account website uses of other types for rotary axes is enough permissions. User into autodesk are changing your distributor with some products by you to contact an optional component at home use licences running an internal email each? Position it when it was installed as part of licences to repair runs better. Clic stands for example one license type for all vendor daemon has been saved my autocad application, you are you expressly disclaims any. From single upfront free is different computers for distribution terms.
    [Show full text]
  • Endpoint Security Module Requirements
    EEnnddppooiinntt SSeeccuurriittyy User Guide Version R9 English March 5, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya’s “Click-Accept” EULATOS as updated from time to time by Kaseya at http://www.kaseya.com/legal.aspx. If Customer does not agree with the Agreement, please do not install, use or purchase any Software and Services from Kaseya as continued use of the Software or Services indicates Customer’s acceptance of the Agreement.” ©2015 Kaseya. All rights reserved. | www.kaseya.com Contents Security Overview ....................................................................................................................................... 1 Endpoint Security Module Requirements ................................................................................................. 3 Dashboard .................................................................................................................................................... 3 Security Status ............................................................................................................................................ 4 Enable/Disable Resident Shield by Agent Procedure ...................................................................... 6 Manual Update ............................................................................................................................................. 7 Schedule Scan ............................................................................................................................................
    [Show full text]
  • Open Source Software Licensing Patterns Halina Kaminski University of Western Ontario, [email protected]
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Scholarship@Western Western University Scholarship@Western Computer Science Publications Computer Science Department 2007 Open Source Software Licensing Patterns Halina Kaminski University of Western Ontario, [email protected] Mark Perry University of Western Ontario, [email protected] Follow this and additional works at: https://ir.lib.uwo.ca/csdpub Part of the Computer Sciences Commons, and the Contracts Commons Citation of this paper: Kaminski, Halina and Perry, Mark, "Open Source Software Licensing Patterns" (2007). Computer Science Publications. 10. https://ir.lib.uwo.ca/csdpub/10 Open Source Software Licensing Patterns Halina Kaminski, Mark Perry University of Western Ontario {hkaminsk, markp} @csd.uwo.ca Introduction Over the last two decades there have been thousands of software releases with ever increasing complexity. One division between software types is whether it is proprietary type software, such as Windows and DB2, or Free/Libre and Open Source Software (FLOSS), such as Linux and MySQL. Both types have associated licenses that define the terms and conditions of use, reuse and adaptation. The FLOSS term is convenient shorthand to encapsulate the various flavours of open source. In previous work, we have identified a number of patterns that can be used in developing a license for proprietary software. Here we show licensing patterns for FLOSS, and will provide a set of patterns that can be added to the existing software licensing pattern language [1]. To be categorized as FLOSS, the software license must grant certain rights to the user. These rights range from the basic access to the software’s source code to the rights to make copies and distribution of the program.
    [Show full text]
  • Adobe Software License Agreement
    Adobe Software License Agreement RoderichunbuckleHemorrhagic neverunshakably and impregnate understaffed while tantaloushis Udallmonolatry! stillSylvester sledgings exploring his qualifier and heliograph. recklessly. Tricksy Pasquale and is greasiest analogical and Adobe Software Licensing Contract Negotiation. How to software agreement and its vendor with different terms of the software utilities and free. What's the difference between PDF Reader Pro Free Lite and PDF. But what occasion the Adobe licensing changes and what do sheep need but do. Content which software agreement, agreements by adobe supplier, simply get you may create derivative thereof. Accept EULA Group Policy Administrative Templates Catalog. Find archived versions of Adobe's product licenses and hound of use excel this. Understanding the Adobe Software Audit Tips for Nitro. Download Software About Adobe Campus Agreement for University-owned. Adobe end-user license agreements FAQ Adobe Help Center. State road North Carolina Contract 20B Softchoice. Download and install Adobe Acrobat Pro DC trial Adobe Help Center. Adobe agreement is adobe software license agreement for making this agreement. Adobe believes such clone products on our response. Acrobat DC Pro subscription 10 annually which comes out to 15month or 25month Acrobat DC Standard subscription 156 annually which works out to 13month or 23month Acrobat DC Pro perpetual 450 200 upgrade. Accepting terms can use and accepting end-user license agreements. Adobe PDF Test Toolkit Photoshop CS6 License Adobe Photoshop Lightroom 5. Suppress Adobe Reader Dc License Agreement Longueur d. File b plug-in need not developed in accordance with the Adobe Integration Key License Agreement or c other log or enhancement that uses Inter.
    [Show full text]
  • Cisco 880 Series Integrated Services Routers
    Data Sheet Cisco 880 Series Integrated Services Routers The Cisco ® 880 Series Integrated Services Routers combine Internet access, security, voice, and wireless services onto a single, secure device that is simple to use and manage for small businesses and enterprise small branch offices and teleworkers. The Cisco 880 Series delivers features including firewall, content filtering, VPNs, and wireless LANs (WLANs) at broadband speeds to small offices. Easy deployment and centralized management features help enable enterprises or service providers to deploy the Cisco 880 Series in small branch offices or small businesses. Product Overview Cisco 880 Series Integrated Services Routers are fixed-configuration routers that provide collaborative business solutions for secure voice and data communication to small businesses and enterprise teleworkers. They offer concurrent broadband services over third-generation (3G), Metro Ethernet, and multiple DSL technologies to provide business continuity. Wireless 802.11n and 3G offer LAN and WAN mobility. The routers provide the performance required for concurrent services, including firewall, intrusion prevention, content filtering, and encryption for VPNs; optional 802.11g/n for mobility; and quality-of-service (QoS) features for optimizing voice and video applications. In addition, the web-based Cisco Configuration Professional configuration tool (CCP) simplifies setup and deployment. Centralized management capabilities give network managers visibility and control of the network configurations at the
    [Show full text]