Advanced Administration Guide – Endpoint Protection Advanced administration guide 1 Advanced Administration Guide – Endpoint Protection Tabla de contenidos 1. INTRODUCTION ..............................................................................................................12 1.1. WHAT'S NEW IN THIS VERSION ...........................................................................................13 1.2. WHAT IS ENDPOINT PROTECTION? ......................................................................................14 THE PROTECTION .................................................................................................................. 14 WHICH PROTECTIONS ARE AVAILABLE? ..................................................................................... 14 INSTALLATION ....................................................................................................................... 14 1.3. PROTECTION TECHNOLOGIES ..............................................................................................15 ANTI-EXPLOIT TECHNOLOGY .................................................................................................... 15 SECURITY FROM THE CLOUD AND COLLECTIVE INTELLIGENCE ......................................................... 15 1.4. INFORMATION, QUERIES AND SERVICES .................................................................................16 USEFUL LINKS ....................................................................................................................... 16 ENDPOINT PROTECTION SERVICES ............................................................................................ 17 OTHER SERVICES ................................................................................................................... 17 TECHNICAL SUPPORT .............................................................................................................. 17 TROUBLESHOOTING ............................................................................................................... 17 SUGGESTION BOX .................................................................................................................. 17 ICONS.................................................................................................................................. 17 1.5. REQUIREMENTS AND EXTERNAL URLS ..................................................................................18 REQUIREMENTS FOR WINDOWS SYSTEMS ................................................................................. 18 REQUIREMENTS FOR LINUX SYSTEMS ........................................................................................ 21 REQUIREMENTS FOR OS X SYSTEMS ......................................................................................... 23 REQUIREMENTS FOR ANDROID DEVICES .................................................................................... 23 EXTERNAL URLS ................................................................................................................... 24 2. CREATING PANDA ACCOUNT ..........................................................................................26 2.1. WHAT IS YOUR PANDA ACCOUNT? ......................................................................................27 2.2. HOW TO CREATE YOUR PANDA ACCOUNT .............................................................................27 2.3. HOW TO ACTIVATE YOUR PANDA ACCOUNT ...........................................................................27 3. LOGIN TO THE WEB CONSOLE .........................................................................................29 3.1. LOGIN TO THE WEB CONSOLE .............................................................................................30 OTHER OPTIONS AVAILABLE IN THE WEB CONSOLE ...................................................................... 30 3.2. PREFERENCES ..................................................................................................................30 DEFAULT VIEW ...................................................................................................................... 30 GROUP RESTRICTIONS ............................................................................................................ 31 REMOTE ACCESS ................................................................................................................... 31 AUTOMATIC MANAGEMENT OF SUSPICIOUS FILES ....................................................................... 31 ACCOUNT MANAGEMENT ....................................................................................................... 32 4. THE STATUS WINDOW....................................................................................................33 4.1. PROTECTION STATUS ........................................................................................................34 NOTIFICATIONS ..................................................................................................................... 34 UPGRADING TO A NEW PRODUCT VERSION ................................................................................ 34 PROTECTION STATUS .............................................................................................................. 34 2 Advanced Administration Guide – Endpoint Protection 4.2. LICENSE STATUS ...............................................................................................................35 4.3. VIEWING LICENSES ...........................................................................................................36 LICENSE LIST ......................................................................................................................... 36 HOW TO MANAGE EXPIRED LICENSES OR LICENSES ABOUT TO EXPIRE .............................................. 37 HOW TO RELEASE LICENSES AND MOVE COMPUTERS TO THE LIST OF COMPUTERS WITHOUT A LICENSE . 37 5. DETECTED THREATS ........................................................................................................39 5.1. DETECTED THREATS AND DETECTION ORIGIN ..........................................................................40 DETECTIONS ON LINUX COMPUTERS ......................................................................................... 40 DETECTIONS ON OS X COMPUTERS .......................................................................................... 40 DETECTIONS ON ANDROID DEVICES .......................................................................................... 40 DETECTIONS ON WINDOWS COMPUTERS .................................................................................. 40 5.2. FILTERED MESSAGES .........................................................................................................41 5.3. WEB ACCESS CONTROL ......................................................................................................41 WEB ACCESS CONTROL: RESULTS ............................................................................................. 41 5.4. DETECTION DETAILS ..........................................................................................................42 VIEWING INFORMATION ABOUT DETECTED THREATS .................................................................... 43 VIEWING INFORMATION ABOUT COMPUTERS WITH MOST THREATS ................................................ 43 VIEWING INFORMATION ABOUT THE MOST DETECTED MALWARE ................................................... 44 5.5. SCHEDULED SCANS ...........................................................................................................45 VIEWING SCHEDULED SCANS AND THEIR RESULTS ........................................................................ 45 RESULTS OF THE SCHEDULED SCAN TASKS .................................................................................. 46 6. LICENSE MANAGEMENT ................................................................................................. 47 6.1. LICENSE-RELATED WARNINGS .............................................................................................48 UPDATING THE NUMBER OF LICENSES ....................................................................................... 48 LICENSE EXPIRATION WARNINGS .............................................................................................. 48 EXCLUDED COMPUTERS .......................................................................................................... 48 COMPUTERS WITHOUT A LICENSE ............................................................................................. 49 6.2. RELEASING LICENSES .........................................................................................................49 AFFECTED COMPUTERS AND MANAGED COMPUTERS ................................................................... 49 6.3. ADDING LICENSES USING THE ACTIVATION CODE .....................................................................50 POSSIBLE ERRORS WHEN ADDING LICENSES FOR WINDOWS/LINUX/ANDROID COMPUTERS AND DEVICES 51 OTHER ERRORS ..................................................................................................................... 51 7. ACCOUNT MANAGEMENT ..............................................................................................52 7.1. INTRODUCTION TO ACCOUNT MANAGEMENT .........................................................................53 7.2. DELEGATING ACCOUNT MANAGEMENT .................................................................................53
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages239 Page
-
File Size-