Professional Documents
Culture Documents
COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. License Attributions Refer to the product Release Notes.
Contents
Introduction to Total Protection Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
After you place your order. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Merging multiple orders or accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Installation environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Supported operating systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 RAM requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Requirements for email protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Requirements for the email server security application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Advanced network environments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Decide whether to set up relay servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 How firewall protection interacts with the Windows firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Support for corporate firewalls or proxy servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Terminal server support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Contents
Requirements for push installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Preparing the administrative computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Installing with push installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Removing the Push Install utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Processes for pre-installed and CD versions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 About pre-installed trial and full subscriptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 When you first turn on the computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Activating the copy of Total Protection Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Purchasing or renewing a full subscription. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Viewing or creating an account enrollment key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Activating your license key after installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Completing the installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Testing virus protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Scanning the client computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Scanning the email Inbox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Total
NOTE: Some types of protection managed by Total Protection Service do not reside as software on client computers. Therefore, they are not included in this guide. If your purchase included email protection, the email server security application, or vulnerability scanning, refer to emails and materials from McAfee for instructions on installing them. Contents After you place your order Installation environment Advanced network environments
Logon credentials
Grant letter
NOTE: If you purchase Total Protection Service from a McAfee partner who manages security for you, the partner usually receives these emails. If you have questions about which emails you should receive, contact the partner.
Task For option definitions, click ? in the interface. 1 From your web browser, log on to the SecurityCenter. Login credentials were sent to you in a Welcome email when you purchased Total Protection Service. NOTE: You must use Internet Explorer (version 6.0 or later) or Firefox (version 2.0 or later) to log on to the SecurityCenter. 2 3 4 On the My Account page, click the Accounts & Keys tab. In the Manage Accounts section, select Merge another account. Enter the email address and password for the account you want to merge into your main account, then click Next. The main account is the one that uses the email address where you want to receive status emails and messages regarding all your subscriptions. Verify that the licenses and computers listed for the account are the ones you want to merge. Click Merge Account.
5 6
Installation environment
Total Protection Service is designed for Microsoft Windows operating systems running on a PC platform. The client software installs and runs on computers equipped with: An Intel Pentium processor or compatible architecture. Microsoft Internet Explorer 6.0 or later. Check these topics for additional requirements and support guidelines: Supported operating systems RAM requirements Requirements for email protection Requirements for the email server security application
Operating system
Windows Vista (32-bit and 64-bit) Windows 7 (32-bit and 64-bit) Servers Windows 2000 Server Advanced Server Small Business Server with Service Pack 3 or later Windows 2003 Standard Server Enterprise Server Small Business Server (32-bit and 64-bit) Windows Server 2008 Standard Server Enterprise Server Small Business Server Essential Business Server (32-bit and 64-bit)
When upgrading the operating system If you upgrade the operating system on a client computer (for example, from Windows 2000 to Windows XP) and you want to leave your existing files and programs intact during the upgrade, you must first uninstall Total Protection Service. You can reinstall it after the upgrade is complete.
Installation methods described in this guide are not supported installation methods of the client software on a computer running Windows Home Server.
RAM requirements
Before installing Total Protection Service, use this table to verify that sufficient RAM is installed on client computers.
Operating system Minimum for single type of protection 512 MB 512 MB 512 MB 1 GB 1 GB Minimum for multiple types of protection 1 GB 1 GB 1 GB 1 GB 1 GB Recommended
1 GB 1 GB 2 GB 2 GB 2 GB
Operating system
Recommended
2 GB 2 GB
NOTE: When calculating the total RAM required, consider the memory requirements of other software applications running on client computers.
Microsoft Windows Server 2003 Enterprise Edition (32-bit). Minimum requirements for Microsoft Exchange Server 2000 with Service Pack 3: Intel Pentium or compatible 133MHz processor. 128 MB of RAM (256 MB recommended). 740 MB of free disk space. Microsoft Exchange 2000 with Service Pack 3. Microsoft Windows 2000 Server with Service Pack 4. Internet Explorer 5.5 or later. McAfee GroupShield for Lotus Domino, Windows edition Minimum requirement: Intel Pentium or compatible 133MHz processor. 512 MB of RAM (1 GB recommended). Internet Explorer 6.0 or later set as the default browser. One of these operating systems: Microsoft Windows 2000 or 2003 Server. Microsoft Windows 2000 Advanced Server with Service Pack 4 or later. Microsoft Windows Server 2003 Enterprise Server with Service Pack 2 or later.
Decide whether to set up relay servers How firewall protection interacts with the Windows firewall Support for corporate firewalls or proxy servers
Terminal servers or shared computers where the fast user Terminal server support switching feature is used
10
What is a relay server? The Internet Independent Updating (IIU) feature allows computers without an Internet connection to receive software updates through another local computer that has been designated as a relay server. Any computer with an Internet connection can be set up as a relay server at the time the client software is installed or at a later time. A relay server acts as a proxy for other computers by allowing them to use its connection to check for updates. How to set up relay servers Specify relay servers using these methods: Silent installation Designate a relay server during installation, or run VSSETUP at any time to reconfigure a client computer as a relay server. Push installation Perform a separate push operation to push files to computers that will serve as relay servers and computers that will not serve as relay servers.
11
12
13
Task 1 2 3 In the Windows Control Panel, open Add/Remove Programs. From the list of programs, locate any firewall software. Click Remove. NOTE: On computers running the Windows firewall, it is disabled automatically during installation of Total Protection Service.
14
Preparing to Install the Client Software Installing the standalone installation agent
2 3
Copy the installation file to a portable medium, such as a thumb drive, or email it to client computer users (optional). Install the agent with one of these methods, depending on your location: From the administrative computer Deploy and execute the file on client computers using your customary deployment tools. From the client computer Double-click the file to begin the installation process.
15
16
The administrator...
Advanced installation method Silent Push Administrative computer Push Install utility One or more computers Yes Yes (requires a separate installation for client computers and relay servers)
Performs the installation from Obtains this file from the SecurityCenter Installs the client software on Installs remotely Can designate relay servers (optional)
17
1 2 3
In your web browser, log on to your SecurityCenter website. From the Computers page, click Add Computer. Select the group where you want to place the client computers, and select the types of protection to install, and a language for the software, then click Next. A customized URL is displayed, along with simple instructions for users. Click Select Text and Copy to Clipboard. In your local email application, open a new message and paste the text you have copied. Revise the instructions as needed, then send the email to the users who need to install the software.
4 5 6
2 3
18
On the computer, open a DOS window and run the VSSETUP command using the appropriate parameters.
On the SecurityCenter, the Accounts & Keys tab of the My Account page. To deploy VSSETUP.EXE, you must have a method for installing executable files on your network computers. For example: A third-party deployment tool, such as Novell NAL, ZenWorks, Microsoft Systems Management Server (SMS) installer, or Tivoli IT Director. A login script. A link to an executable file in an email message. A portable medium, such as a CD or thumb drive.
19
4 5 6 7
Under Additional Installation Options, select Display advanced installation methods. Under method 1, click VSSETUP to save the VSSETUP.EXE file to your hard drive. Deploy the program to each client computer using your customary deployment tool, such as those listed under Requirements for silent installation. On each client computer, open a DOS window and run the following command.
VSSETUP.EXE /CK=<your company key> /<parameters>
As shown in this example, you must include your company key (CK) as a parameter. See VSSETUP parameters for a list of optional parameters you can add to your command line. NOTE: Your company key is included in the URL that you received when you subscribed to Total Protection Service. It is the hexadecimal value that follows the characters
CK=
at the end of the URL. Your company key is also listed on the SecurityCenter, on the Accounts & Keys tab of the My Account page. 8 If you are installing firewall protection, reboot the client computer.
During installation, specify a computer is a relay server. VSSETUP /RelayServer=1 NOTE: If you do not specify this parameter, the default is 0 and the computer is not a relay server. Modify an existing installation to specify a computer is a relay server. Modify an existing installation to specify a computer is not a relay server.
VSSETUP parameters
For a silent installation, use this command line and any of the following parameters (which are not case-sensitive):
VSSETUP.EXE /CK=<your company key> /<parameters>
Parameter Description Required. Launches Setup using the company key. Your company key is listed on the SecurityCenter, on the Accounts & Keys tab of the My Account page.
/CK=XYZ
20
Parameter
Description Identifies the users email address in administrative reports. NOTE: Despite its name, the email variable does not need to be an email address. Do not use a string containing non-standard characters, because they might be displayed incorrectly in reports.
/Email=x@y.com
Uninstalls Total Protection Service. Sets a computer with a connection to the Internet as a relay server. If the computer is not used as a relay server, set to 0. Reinstalls Total Protection Service, leaving the previous values for company key, email address, and machine ID intact. Places the computer into any group you have created. You can find the number associated with a group by checking the Computer Profiles report or by generating a customized URL. The group ID is at the end of the URL in the format G=xx. NOTE: If you designate a group that does not exist, users are placed in the Default Group.
b browser protection c content filtering f firewall protection v virus and spyware protection
NOTE: If you omit the /P parameter, only virus and spyware protection is installed.
Examples
VSSETUP.EXE /vfbc /CK=abcd /Email=joe@example.com /Groupid=3
Virus and spyware protection, firewall protection, browser protection, and content filtering are installed. The company key is abcd, the users email address is joe@example.com for reporting purposes, and this user is placed in an existing group represented by the number 3. Check the Computer Profiles report to find the correct numeric groupid.
VSSETUP.EXE /CK=abcd /Email=joe@example.com
Only virus and spyware protection is installed. The company key is abcd and the users email address is joe@example.com for reporting purposes.
21
Select the target computers, which are client computers on your network that will receive the software.
The Push Install utility is an ActiveX control that runs on an administrative computer. It installs client software on all target computers that are online when the push takes place. Use push installation to install client software on new network computers, or to install additional types of protection on computers with existing client software. The Push Install utility allows you to specify one or more network computers that have an Internet connection as relay servers. You must do so in a separate push operation, because you cannot push to relay servers and non-relay servers at the same time. See Decide whether to set up relay servers for more information. How push installation works 1 From the SecurityCenter, obtain the Push Install utility from one of these locations: As part of the Install Protection wizard. From the Utilities page. 2 Initiate a push to one or more client computers.
22
23
24
2 3 4 5 6
Select the type of computers to install software on, then click Next. If you are installing to new computers (where Total Protection Service is not currently installed), select the group where you want to assign the computers. Select the types of protection to install, select the language, then click Next. Under Additional Installation Options, select Display advanced installation methods. Under method 2, click Run Push Install utility. A window lists the visible computers in your domain.
7 8 9
Select the target computer(s) from the left pane, then click Add. Optionally, select Set as Relay Server(s) to configure all the selected computers as relay servers, which can distribute updates to other computers on the network. Select the type(s) of protection to install, then click Install Components. After installation is complete, a status for each target computer is displayed.
10 Click View Log to open a log file in Microsoft Notepad, which shows the status of the current session. The contents of the log file are deleted when you close the Push Install utility or perform another push installation. NOTE: The dialog box and log file indicate only whether the files were pushed to the target computers. It is important to review reports on the SecurityCenter or check the client computers to verify that the files were installed and the computers are updating successfully. 11 Save the log file or, optionally, click Back to return to the previous screen and push to more computers. 12 If you have installed firewall protection, restart the client computers.
25
Click Remove.
To install on additional computers: 1 2 3 Install using a CD. Activate the software. During the activation process, enter the account enrollment key.
See the instructions that came with the CD for more information. Pre-installed 1 2 Activate your copy of Total Protection Service. During the activation process, if a license key is required, enter the license key located on the McAfee license card shipped with your system. (Some PC makers do not require a license key. If no key is requested, skip this step.) During the activation process, enter the account enrollment key if prompted. If it is a trial subscription, purchase a full subscription by the end of the trial period.
3 4
26
scans to check all the files on the computer for threats. To continue receiving updates that protect against new threats, the copy of Total Protection Service must be activated. In most cases, a dialog box reminds users to activate. If they do not activate, their copy of Total Protection Service stops functioning at the end of the activation period. When they attempt to access a feature, a dialog box notifies them that the activation period has ended and offers them the opportunity to purchase a full subscription.
3 4
Enter information to identify the account by following the instructions in the Activation wizard. When creating a new account, save the account enrollment key to use while installing Total Protection Service on other computers. You will also receive an email with an installation URL for use when installing Total Protection Service on other computers. NOTE: If you are asked to enter a license key and you do not have one, you can set up a trial account, then activate the license key and convert to a full account after you obtain one.
27
email and attachments, monitoring of incoming communications for suspicious activity, and up-to-the-minute safety reports while browsing and searching the Internet. When a full subscription nears expiration, you can renew it to ensure uninterrupted protection. Use this task to purchase or renew a subscription. Task For option definitions, click ? in the interface. 1 On the client computer, click the Total Protection Service icon in the system tray, then select Buy or Renew this subscription. (You can also select these options from the notification dialog box.) When prompted, enter your contact and payment information. NOTE: If a trial or full subscription has expired, Total Protection Service is no longer protecting the computer. When users attempt to access a feature, a dialog box notifies them that their copy has expired and offers them the opportunity to purchase or renew a full subscription.
28
4 5
Contact your reseller or McAfee product support to obtain a valid license key. Enter the information requested in the form, then click Next. Once you activate your license key, your account becomes a licensed full subscription. Licensing information is also updated automatically for other computers installed under your account.
29
2 3
From the Action Menu, select Scan Tasks, then select Scan My Computer. In the Scan Completed dialog box, click Report to view scan statistics and check whether any threats were detected during the scan.
30
31
Do access protection or behavior blocking rules in other applications affect installation of the client software? Yes. If users are unable to install the client software and you have defined access protection or behavior blocking rules, such as those that would prevent binaries from executing from the Temp folder, disable them and try installing again. I want to update the Windows operating system on my client computer. Do I need to reinstall the Total Protection Service client software? Yes. If you upgrade a client computers operating system (for example, from Windows 2000 to Windows XP) and you want to leave your existing files and programs intact during the upgrade, you must first uninstall the client software, then reinstall it after the upgrade is complete.
32
Error messages
This section includes error messages that are related to installing and activating the Total Protection Service client software. Locate an error message to see details about causes and solutions.
Installation cannot proceed because you have selected not to accept a vital agent component.... The full text of the error message is Installation cannot proceed because you have selected not to accept a vital agent component, you dont have administrative rights to your machine, or other issues occurred. This error message can be caused by several different problems: The security level of the browser is too high. Set the browsers security level to Medium or Medium-high. The user doesnt have administrator rights. Users must have administrator rights to install protection on client computers. If they do not, you need to install the standalone installation agent.
33
A registry file is missing. The system file Regedit.exe might be missing. Search for that file in the client computers \windows folder. If the file is missing, replace it by using the original Windows install media or copy it from another computer that is running the same operating system. The browser cache is full. Empty the Internet Explorer cache: version 6.0 1 Open the Internet Properties dialog box, then either: Right-click the Internet Explorer icon on the desktop and select Properties. From Windows Control Panel, open Internet Options. 2 3 4 5 6 7 1 Under Temporary Internet Files, click Delete Files. Select Delete all offline content, then click OK. An hourglass appears while the files are being deleted. Under Temporary Internet Files, click Settings, then click View Files. Select Edit | Select All. Select File | Delete. It might take a while for all the files to be deleted. When the deletions are complete, you are returned to the Internet Properties dialog box. Click OK. Open the Internet Properties dialog box, then either: Right-click the Internet Explorer icon on the desktop and select Properties. From Windows Control Panel, open Internet Options. 2 3 Under Browsing history, click Delete. Under Temporary Internet Files, click Delete files.
version 7.0
Installation Declined. This message can appear after a failed installation or uninstallation of Total Protection Service. It indicates that leftover product files need to be removed from the client computer. Remove these components by downloading and running the MVSUninstall cleanup utility on the computer where you need to install. This utility is available on the Utilities page of the SecurityCenter. Installation Denied. Common causes and solutions: When you begin the installation, Internet Explorer displays a dialog box asking you to verify that you want to install Total Protection Service. You must click Yes. Users must have administrator rights to install protection services on client computers. If they do not, you need to install the standalone installation agent. Check to be sure the system drive has enough free space. When installing multiple types of protection, a maximum of 50 MB might be required. The Windows system file Regedit.exe must be present in the Windows directory. If it is missing, replace it by using the original Windows install media or copy it from another computer that is running the same operating system.
34
Invalid Entitlement Error. The installation URL in your email message might have been truncated or badly formatted. Make sure that you are using the entire URL with no spaces, and that the company key at the end of the URL is complete. (The company key is the value after the characters CK=. You can verify that your company key is correct on the Accounts & Keys tab of the SecurityCenter's My Account page.) You might need to paste the URL into your web browser if you cannot select it from your email message. This error can also indicate that the trial evaluation period or subscription has expired, or that you are attempting to install protection on more computers than you have purchased licenses for. Check the SecurityCenter for information about the status of your subscriptions and licenses. MyASUtil.SecureObjectFactory error message. The SecureObjectFactory Class program might have become corrupted. To verify this, check the status of the SecureObjectFactory Class program file. 1 2 3 4 5 Launch Internet Explorer. From the Tools menu, select Internet Options. In the Temporary Internet Files section of the dialog box, click Settings to display the Settings dialog box. Click View Objects to open the Downloaded Program Files folder. Find the entry for SecureObjectFactory Class. Make note of the information in the Status and Creation Date columns: If the status and dates are listed as Unknown, delete the SecureObjectFactory Class program file. Uninstall and reinstall Total Protection Service to reload the file. If the status is listed as Installed, with valid dates, the file is not damaged. If there is another comment in the Status column, contact product support with that information. NOTE: If you do not see a Status column, set your view options to Details. MyINX Error. The installer has detected other virus protection software on the computer, which you must uninstall. 1 2 3 From the Windows Control Panel, open Add/Remove Programs. In the list of programs, locate any virus protection software (other than Total Protection Service), then click Remove. Begin the installation process again.
If you have uninstalled Total Protection Service and still receive this error, some components might be installed but not visible, because the installation was only partially completed. Remove these components by downloading and running the MVSUninstall cleanup utility on the computer where you need to install. This utility is available on the Utilities page of the SecurityCenter. Unable to create Cab Installer Object. One possible cause is that the service MyAgtSvc.exe is no longer running on the computer. You must manually restart it. 1 Select Start | Run.
35
2 3
Type the path to MyAgtSvc.exe (you can use Browse to locate the file) and add the option /start. For example: C:\winnt\mycio\agent\myagtsvc.exe /start Click OK.
If that does not solve the problem, contact product support. NOTE: This is a Microsoft Internet Explorer error, and might require installing a Microsoft patch.
36
Index
A
access protection rules 31 account enrollment key defined 28 viewing or creating 28 accounts creating a new account 27 joining an existing account 27 merging multiple accounts 5 activation of client software advantages of 27 instructions for 27 ActiveX controls, push installation and 21, 24 Add/Remove Programs removing other firewall programs 13 removing other virus protection 13, 33 removing Push Install utility 25 admin$ share 33 administrative computers defined 21 removing Push Install utility 25 requirements for push installation 24 administrator rights client software installation and 14, 17, 19 terminal servers and 12 administrator rights, domain, push installation and 24 anti-virus applications, removal of 13 anti-virus applications, removing 33 authentication, support for 11 automatic updates activation and 26 proxy servers and 11 client computers protecting when license key unavailable 28 requirements for push installation 24 requirements for standard URL installation 17 scanning after installation 29 scanning Outlook Inbox after installation 30 client software deploying by push installation 21, 24 deploying by silent installation 18, 19 installation methods 16 testing installation of 29 company key installation and 19 locating 19 configuration of browser for installation 14 contact support 36 conversion of trial to full subscription 27 cookies, required for installation 18 create a new account 27 customized URL, creation of 17
D
default firewall 11 deployment tools for silent installation 19 for standalone installation agent 14 disk space requirements 33 download URL, obtaining 16
E
EICAR test virus 29 email addresses entering during installation 18 entering during order process 5 for identifying workstations in reports 31 multiple accounts and 5 email protection, requirements for setting up 9 email scans (virus and spyware protection), on-demand scan 30 email server security application, installation requirements 9 error messages 33
B
behavior blocking rules 31 block rules access protection rules 31 behavior blocking rules 31 browser clearing cache 33 configuring for installation 14 non-Microsoft 14 requirements for installing Total Protection Service 6 security settings 14 viewing the SecurityCenter 5, 14
F
fast user switching, support for 12 firewall corporate, support for 11 default 11 disabling 11 setting up 11 uninstalling existing firewall software 13 Windows 7 11, 13, 24 Windows Vista 11, 13, 24 Windows XP 11, 13, 24 Windows, and administrative computer 24
C
CD version of software activating 27 requirements for 26 CHAP proxy 11 clean, files from previous installations 33 cleanup utility 33
37
Index
firewall protection uninstalling existing firewall software 13 Windows firewall and 11, 24
O
on-demand scans client computers 29 email (virus and spyware protection) 30 operating systems admin$ share 33 File and Print Sharing 33 requirements for push installation 24 requirements for URL installation 17 support ending for 8 support for 6 upgrading 6, 31 upgrading, and Total Protection Service 31 Windows Home Server 7 orders, merging multiple 5 Outlook Inbox, scanning 30
G
grant number 5, 36 group ID, location of 20 GroupShield requirements 9
I
identification of workstations in reports 31 installation administrator rights 14 browsers supported 14 cookies and 18 corporate network firewall and 11 entering email address 18 free disk space required 33 methods of 16 proxy server and 11 push, overview 21 requirements 6 requirements for pre-installed or CD software 26 silent, overview 18 standalone installation agent 14 stops responding 31 support for Windows Home Server 7 testing 29 uninstalling existing firewall software 13 uninstalling existing virus protection software 13 URL, overview 17 User Account Control dialog box 18 users without administrator rights 14 without a license key 28 installation URL, obtaining 16 Internet Explorer cache, emptying 33 configuring security settings 14
P
parameters for VSSETUP 20 pre-installed software activating 27 requirements for 26 setting up 26 product support, contacting 36 proxy servers 11 purchase of full subscription 27 Push Install utility obtaining 24 uninstalling 25 push installation ActiveX controls 21, 24 administrative computers 21 diagram 21 enabling relay servers 24 overview 16, 21 procedure 24 proxy server and 11 requirements 24 restarting client computers after 24 scheduling considerations 23 target computers 21
J
join an existing account 27
R L
license key, activating 28 licenses protecting computers while purchasing licenses 28 renewing 27 logon credentials 5 RAM requirements 8 regedit.exe, system file 33 relay servers overview of 10 push installation and 24 silent installation and 20 removal of existing firewall software 13 existing virus protection software 13, 33 files from previous installations 33 Push Install utility 25 renewal of subscriptions 27 reports, identifying computers in 18 requirements browser, for installing Total Protection Service 6, 14 browser, for viewing the SecurityCenter 5, 14 CD versions 26 email protection 9 email server security application 9 free disk space 33 GroupShield 9 operating system 6
M
merge accounts and orders 5 Microsoft Enchange Server 2000 9 Microsoft Exchange Server 2003 9 Microsoft Exchange Server 2007 9 multiple accounts, merging 5 MVSUninst utility 33
N
non-Microsoft browsers 14 notifications, about operating system support 8 NTLM proxy 11
38
Index
requirements (continued) pre-installed software 26 push installation 24 RAM 8 silent installation 19 URL installation 17 Windows firewall and administrative computer 24 restart for client computers after push installation 24 after silent installation 19 rules for blocking access protection rules 31 behavior blocking rules 31
troubleshooting (continued) installation 31 installing without administrator rights 31 regedit.exe, missing system file 33 uninstalling existing virus protection software 33 uninstalling files from previous installation 33
U
uninstallation existing firewall software 13 existing virus protection software 13, 33 files from previous installations 33 Push Install utility 25 troubleshooting 33 updates activation and 26 first network detection and 26 proxy server and 11 upgrades for client operating system 6, 31 URL installation cookies and 18 creating a customized URL 17 obtaining the URL 16 overview 17 procedure 18 requirements for 17 sending URL to users 17 troubleshooting 31 User Account Control dialog box 18 User Account Control dialog box 18 utilities cleanup utility 33 MVSUninst 33 Push Install utility 21, 24 standalone installation agent, defined 14 VSSETUP, defined 18
S
scans client computers, after installation of client software 29 Outlook Inbox, after installation of client software 30 viewing results 29 security settings, Internet Explorer 14 SecurityCenter browser requirements 5, 14 logon credentials 5 servers requirements for client software installation on 6 requirements for email server security application 9 silent installation company key 19 deployment tools for 19 diagram 18 enabling/disabling relay servers 20 overview 16, 18 parameters for VSSETUP 20 procedure 19 proxy server and 11 requirements for 19 standalone installation agent deploying 14 downloading 14 subscriptions, purchase and renewal 27 support for operating systems 6 operating systems, ending 8 relay servers 10 Windows firewall 11 support, contacting 36
V
virus and spyware protection scanning client drives after installation 29 scanning Outlook Inbox after installation 30 testing virus protection 29 uninstalling existing virus protection software 13 VSSETUP utility command-line parameters 20 defined 18 downloading 19 enabling/disabling relay servers 20 requirements for 19
T
target computers defined 21 requirements for push installation 24 restarting after push installation 24 technical support, contacting 36 Temp directory, troubleshooting 31 terminal servers, support for 12 test for virus protection feature 29 trial subscription activating 27 converting to full subscription 27 creating when license key unavailable 28 requirements for 26 troubleshooting adding, renewing licenses 32 blocking rules and installation 31 free disk space 33
W
welcome email 5 Windows 2000 push installation, administrative computer and 24 support ending for 8 Windows 7 fast user switching support 12 firewall 11, 13 push installation, administrative computer and 24 Windows firewall File and Print Sharing 24 firewall protection and 11 Windows Home Server, support for 7
39
Index
Windows Vista fast user switching support 12 firewall 11, 13 push installation, administrative computer and 24
Windows XP fast user switching support 12 firewall 11, 13 push installation, administrative computer and 24 Windows XP Home Edition and push installation 24
40