Advanced Administration Guide – Endpoint Protection

Advanced Administration Guide – Endpoint Protection

Advanced Administration Guide – Endpoint Protection Advanced administration guide 1 Advanced Administration Guide – Endpoint Protection Tabla de contenidos 1. INTRODUCTION ..............................................................................................................12 1.1. WHAT'S NEW IN THIS VERSION ...........................................................................................13 1.2. WHAT IS ENDPOINT PROTECTION? ......................................................................................14 THE PROTECTION .................................................................................................................. 14 WHICH PROTECTIONS ARE AVAILABLE? ..................................................................................... 14 INSTALLATION ....................................................................................................................... 14 1.3. PROTECTION TECHNOLOGIES ..............................................................................................15 ANTI-EXPLOIT TECHNOLOGY .................................................................................................... 15 SECURITY FROM THE CLOUD AND COLLECTIVE INTELLIGENCE ......................................................... 15 1.4. INFORMATION, QUERIES AND SERVICES .................................................................................16 USEFUL LINKS ....................................................................................................................... 16 ENDPOINT PROTECTION SERVICES ............................................................................................ 17 OTHER SERVICES ................................................................................................................... 17 TECHNICAL SUPPORT .............................................................................................................. 17 TROUBLESHOOTING ............................................................................................................... 17 SUGGESTION BOX .................................................................................................................. 17 ICONS.................................................................................................................................. 17 1.5. REQUIREMENTS AND EXTERNAL URLS ..................................................................................18 REQUIREMENTS FOR WINDOWS SYSTEMS ................................................................................. 18 REQUIREMENTS FOR LINUX SYSTEMS ........................................................................................ 21 REQUIREMENTS FOR OS X SYSTEMS ......................................................................................... 23 REQUIREMENTS FOR ANDROID DEVICES .................................................................................... 23 EXTERNAL URLS ................................................................................................................... 24 2. CREATING PANDA ACCOUNT ..........................................................................................26 2.1. WHAT IS YOUR PANDA ACCOUNT? ......................................................................................27 2.2. HOW TO CREATE YOUR PANDA ACCOUNT .............................................................................27 2.3. HOW TO ACTIVATE YOUR PANDA ACCOUNT ...........................................................................27 3. LOGIN TO THE WEB CONSOLE .........................................................................................29 3.1. LOGIN TO THE WEB CONSOLE .............................................................................................30 OTHER OPTIONS AVAILABLE IN THE WEB CONSOLE ...................................................................... 30 3.2. PREFERENCES ..................................................................................................................30 DEFAULT VIEW ...................................................................................................................... 30 GROUP RESTRICTIONS ............................................................................................................ 31 REMOTE ACCESS ................................................................................................................... 31 AUTOMATIC MANAGEMENT OF SUSPICIOUS FILES ....................................................................... 31 ACCOUNT MANAGEMENT ....................................................................................................... 32 4. THE STATUS WINDOW....................................................................................................33 4.1. PROTECTION STATUS ........................................................................................................34 NOTIFICATIONS ..................................................................................................................... 34 UPGRADING TO A NEW PRODUCT VERSION ................................................................................ 34 PROTECTION STATUS .............................................................................................................. 34 2 Advanced Administration Guide – Endpoint Protection 4.2. LICENSE STATUS ...............................................................................................................35 4.3. VIEWING LICENSES ...........................................................................................................36 LICENSE LIST ......................................................................................................................... 36 HOW TO MANAGE EXPIRED LICENSES OR LICENSES ABOUT TO EXPIRE .............................................. 37 HOW TO RELEASE LICENSES AND MOVE COMPUTERS TO THE LIST OF COMPUTERS WITHOUT A LICENSE . 37 5. DETECTED THREATS ........................................................................................................39 5.1. DETECTED THREATS AND DETECTION ORIGIN ..........................................................................40 DETECTIONS ON LINUX COMPUTERS ......................................................................................... 40 DETECTIONS ON OS X COMPUTERS .......................................................................................... 40 DETECTIONS ON ANDROID DEVICES .......................................................................................... 40 DETECTIONS ON WINDOWS COMPUTERS .................................................................................. 40 5.2. FILTERED MESSAGES .........................................................................................................41 5.3. WEB ACCESS CONTROL ......................................................................................................41 WEB ACCESS CONTROL: RESULTS ............................................................................................. 41 5.4. DETECTION DETAILS ..........................................................................................................42 VIEWING INFORMATION ABOUT DETECTED THREATS .................................................................... 43 VIEWING INFORMATION ABOUT COMPUTERS WITH MOST THREATS ................................................ 43 VIEWING INFORMATION ABOUT THE MOST DETECTED MALWARE ................................................... 44 5.5. SCHEDULED SCANS ...........................................................................................................45 VIEWING SCHEDULED SCANS AND THEIR RESULTS ........................................................................ 45 RESULTS OF THE SCHEDULED SCAN TASKS .................................................................................. 46 6. LICENSE MANAGEMENT ................................................................................................. 47 6.1. LICENSE-RELATED WARNINGS .............................................................................................48 UPDATING THE NUMBER OF LICENSES ....................................................................................... 48 LICENSE EXPIRATION WARNINGS .............................................................................................. 48 EXCLUDED COMPUTERS .......................................................................................................... 48 COMPUTERS WITHOUT A LICENSE ............................................................................................. 49 6.2. RELEASING LICENSES .........................................................................................................49 AFFECTED COMPUTERS AND MANAGED COMPUTERS ................................................................... 49 6.3. ADDING LICENSES USING THE ACTIVATION CODE .....................................................................50 POSSIBLE ERRORS WHEN ADDING LICENSES FOR WINDOWS/LINUX/ANDROID COMPUTERS AND DEVICES 51 OTHER ERRORS ..................................................................................................................... 51 7. ACCOUNT MANAGEMENT ..............................................................................................52 7.1. INTRODUCTION TO ACCOUNT MANAGEMENT .........................................................................53 7.2. DELEGATING ACCOUNT MANAGEMENT .................................................................................53

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    239 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us