You are on page 1of 98

RISING ANTIVIRUS 2009

User Manual

INDEX
END USER LICENSE AGREEMENT .......................................................................... 5 NEW FUNCTIONS ....................................................................................................... 8 QUICK START ............................................................................................................. 9 INSTALLATION AND UNINSTALLATION................................................................. 10
System Requirements and Languages...................................................................................................................11 Install Rising Antivirus .......................................................................................................................................... 12 Installation Wizard................................................................................................................................................. 13 Add, Remove, Repair and Uninstall Rising Antivirus........................................................................................ 14

MAIN WINDOW.......................................................................................................... 15 SCANNING FOR VIRUSES ....................................................................................... 17


Manual Scan............................................................................................................................................................ 18 Standby Scan ........................................................................................................................................................... 20 Startup Scan ............................................................................................................................................................ 21 Embedded Scan....................................................................................................................................................... 22 Virus Types .............................................................................................................................................................. 24

SMART ACTIVE DEFENSE....................................................................................... 25


Smart Active Defense ............................................................................................................................................. 26 System Reinforcement............................................................................................................................................ 28 Application Control................................................................................................................................................ 32 Malicious Behaviour Interceptor.......................................................................................................................... 33 USB/CD/DVD Monitor .......................................................................................................................................... 34 Self-Protection......................................................................................................................................................... 35 Web Trojan Defense ............................................................................................................................................... 36 Custom Whitelist .................................................................................................................................................... 37
Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
-2-

AUTOPROTECT ........................................................................................................ 38
File Monitor............................................................................................................................................................. 39 Email Monitor......................................................................................................................................................... 41

RISING TOOLS .......................................................................................................... 42


Rising Assistant ....................................................................................................................................................... 43 Latest Installer Creation Tool ............................................................................................................................... 44 Virus Quarantine .................................................................................................................................................... 45 Registration Wizard ............................................................................................................................................... 47 Rising Security Assistant........................................................................................................................................ 48 Virus Removal Tools............................................................................................................................................... 49 Rising Account Protection ..................................................................................................................................... 50 Linux Boot Disk Creator........................................................................................................................................ 51 Virus Definitions to USB........................................................................................................................................ 52

OTHERS..................................................................................................................... 53
Audit......................................................................................................................................................................... 54 Report Potentially Malicious Files........................................................................................................................ 56

SCAN SETTINGS....................................................................................................... 58
Manual Scan Settings ............................................................................................................................................. 59 Startup Scan ............................................................................................................................................................ 61 Rising Embedded Scan Settings............................................................................................................................ 62

AUTOPROTECT SETTINGS ..................................................................................... 66


File Monitor Settings .............................................................................................................................................. 67 Email Monitor Settings .......................................................................................................................................... 70

ACTIVE DEFENSE SETTINGS ................................................................................. 73


Active Defense Settings .......................................................................................................................................... 74 System Reinforcement Settings............................................................................................................................. 75 Application Control Settings ................................................................................................................................. 77 Malicious Behavior Interceptor ............................................................................................................................ 78
Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
-3-

USB/CD/DVD Monitor Settings............................................................................................................................ 79 Web Trojan Defense Settings................................................................................................................................. 80 Rising Self-Protection Settings.............................................................................................................................. 81 Custom Whitelist .................................................................................................................................................... 82

SMARTUPDATE ........................................................................................................ 84
Scheduled Smart Update ....................................................................................................................................... 85 Network Connection............................................................................................................................................... 89 User ID Settings ...................................................................................................................................................... 90

OTHER SETTINGS .................................................................................................... 91


Rising Password...................................................................................................................................................... 92 Rising Cloud Security............................................................................................................................................. 94

FREQUENTLY ASKED QUESTIONS........................................................................ 95 AFTER-SALES SERVICE.......................................................................................... 97 ONLINE KNOWLEDGEBASE ................................................................................... 97

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
-4-

End User License Agreement

This End User License Agreement (hereinafter referred to as "Agreement") is a legally binding agreement between you (either a natural person, a legal entity or an organization) and Beijing Rising Information Technology Corporation Limited (hereinafter referred to as "Rising"), the copyright owner of Rising software, including but not limited to Rising Antivirus Software, Rising Personal Firewall, hereinafter referred to as "Software". You must read this Agreement before using the Software. Any software, electronic file, etc. related to this Agreement and used by you shall be subject to the terms and conditions of this Agreement. Meanwhile, the Agreement applies to all subsequent releases and updates of this Software. You shall clearly understand that you have absolute freedom to agree or disagree with this Agreement, and your installation, copy, download, access or use in any other ways of this Software means that you agree to be bound by the terms and conditions of this Agreement. This Agreement is as effective as any written agreement signed by you and entered into through negotiations. If you do not agree, please do not use this Software and make sure the integrity of the product and its components. 1. Definitions 1.1 "Software" or "Software Product" refers to: (1) All contents accompanied by a disk, CD or other medium along with this Agreement, including but not limited to the computer information or software owned by Rising or a third party. (2) Related written illustrative materials, product packages and electronic files, as well as (3) Updates, modified versions, altered or added contents of this Software and any related tools (if any) released and licensed by Rising to you. 1.2 "Use" means access, installation, copy or functional use in any other way of the Software based on related documents. 1.3 "Purpose" means the limit and scope for you to use this Software. Your purpose to use this Software shall be determined by the Rising Software you have purchased. For example, Rising Personal Firewall can only be used for personal purpose and you shall not use this product for non-personal or commercial purpose unless a written authorization from Rising is obtained. 2. Intellectual Property Rights This Software and any copy reproduced by you under the authorization from Rising are Rising products. The intellectual property rights are owned by Rising. The structure, organization and codes are all valuable trade secrets and confidential information belonging to Rising. This Software is protected by Copyright Law of the People's Republic of China, related international treaties and applicable laws of the countries where the Software is used. This Software must not be copied beyond the license of this Agreement; otherwise an infringement to Rising's intellectual property right will be constituted. Without prior written permission by Rising, you also shall not reversely engineer, decompile, disassemble the Software, or try in any other way to find its source code. All information about the Software provided by Rising, and obtained by you, can only be used for the purposes licensed by this Agreement. This Software shall not be disclosed to any third party or used to fabricate any software with similar style. This Software shall not be used for any other commercial purpose without authorization. The use of trademark(s) including the logo(s) owned by their owners shall be in compliance with the Trademark Law of the People's Republic of China. The registered trademarks or trademarks owned by Rising include, but are not limited to "Rising", "Rising Software", "Rising Antivirus Software", "Rising Antivirus" and "Rising Personal Firewall", etc. Your use of this Software under the authorization of this Agreement does not imply that Rising transfers its intellectual property rights to you. 3. License for the Software Product This Software Product is protected by Copyright Law of the People's Republic of China and international treaties for copyright, as well as other Chinese laws and international treaties for intellectual property right. Rising grants you a non-exclusive license to use the Software based on this Agreement as long as you follow the terms and conditions of the Agreement. Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
-5-

3.1 Authorized Range of Usage For each copy of Rising's Software Product, Rising authorizes you to use it in one operating system on one PC only. Under the following conditions, however, you can use it in a multi-user environment or on a networked system: (a) Rising has explicitly authorized you in writing to use it in a multi-user environment or on a networked system; or (b) You have already purchased software licenses for each node or terminal you are using. 3.2 Duplicate, Distribution and Spread You shall use or duplicate the Software according to this Agreement. You must make sure that each copy you have duplicated, distributed and spread under the authorization from Rising is integral and veritable, including all information about software, electronic file, copyright and trademark relative to this Software as well as the Agreement. You can duplicate one copy of the Software for the purpose of backup or archive management. However, you shall not install and use it on any other PC. You shall not transfer this copy to any other person unless you are explicitly authorized in writing by Rising. 3.3 Transfer All or part of the Software must not be rented, leased, re-licensed or duplicated to other PC users unless an explicit written authorization is obtained. However, you can transfer your right to use this Software to others under the following assumptions: (a) You simultaneously transfer the Agreement, the Software, and all other software and hardware bundled to this product altogether to others (including all copies, updates and previous versions); (b) You no longer keep any copies, including the backups and updates saved on your PCs; and (c) The receiver accepts the terms and conditions of this Agreement, and any other terms and conditions you have accepted when you legally purchased the Software. 4. Warranty 4.1 Rising grants the warrant to entities/persons that have purchased the Software and are willing to follow the terms and conditions of this Agreement. Within one month since the purchase of this Software, Rising will exchange the software if the Software malfunctions due to error(s) in the storage medium of the Software, and after it is examined and checked by Rising. If the error is caused by misuse, manmade damage, unauthorized use, accident or and the medium is lost, the warranty cannot be covered. While requesting Rising for replacement based on above reason(s), you must return the Software and purchase voucher/invoice to the location of purchase within thirty (30) days after you purchased the Software. 4.2 Rising guarantees that the Software meets the performance requirements described in its instructions. 4.3 Rising makes no warranty on the merchantability and fitness of the Software for some special use in business purpose. 4.4 Rising does not guarantee that the Software is error-free or can function uninterruptedly. Rising makes no warranty that the Software can be effective on any PCs under any conditions. 4.5 You shall know and understand that due to the particularity of antivirus software, this Software may not be effective against each and all existing or future viruses. You agree that Rising is not liable for any loss caused by the use of or failure to use this Software, including but not limited to operating profit/loss, service interruption, loss of business information, document and data, or for other financial losses, even if Rising is notified of the possibility of such losses, unless these losses are caused due to Rising's fault or gross negligence. 5. Termination of License If you fail to follow any term and condition of the Agreement, Rising shall have the right to terminate at any time the license granted to you. After the termination, you shall immediately destroy the original and its copies of the Software, or return them to Rising. This Agreement is governed by the laws of the People's Republic of China. If there is any dispute on the Software with Rising, the lawsuit can be submitted to China International Economic and Trade Arbitration Commission for arbitration in Beijing. Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
-6-

For any question on this Agreement, or any information about Rising, please contact Rising at the following address: Address: Room 1305, Zhongke Building, No.22, Zhongguancun Street, Beijing, China ZIP: 100190 Website: http://www.rising.com.cn Tel: (010) 82678800 (Service Hotline)

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
-7-

New Functions

Rising Antivirus 2009 offers you new functions which will increase your protection significantly: Background Scan In Rising Antivirus 2009, most work is done in the background. You will only see the scan status and the scan result. After a manual scan or a standby scan is started, the task will continue, even if you close the main window of Rising Antivirus. Continued Scan When a scan is interrupted, Rising will "remember" the scan status and you can to continue this task when you use the scan function the next time. Asynchronous Scan In Rising Antivirus 2009, the detection and removal of malware is split into two separate tasks. When a virus is found, you can postpone the removal until the detection process is finished. Standby Scan Idle time of your computer can be used for malware scans. Application Control Application Control allows you to monitor the operational status of applications and block suspicious behavior of processes. Web Trojan Defense Web Trojan Defense automatically blocks malicious web scripts and viruses and prevents them from infecting your computer. USB/CD/DVD Monitor The USB/CD/DVD Monitor can automatically block viruses on USB Media, CD/DVD, and network drives. Boot Sector Backup Save your boot sector data. To restore the data, Rising Antivirus offers a "Restore Bootsector" function and a Linux start disc. Rising Password Activate the built-in password and protect your installation of Rising software against any unauthorized shutdowns and manipulations. Rising Cloud Security Rising Cloud Security users communicate with the Rising virus lab to form a rapid response network which quickly catches Trojans and other malware. Custom Whitelist Add known safe applications to the Custom Whitelist of Rising Active Defense. Programs on this list are not monitored by Rising Antivirus.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
-8-

Quick Start

Double click the icon of the Rising installation program and follow the instructions on the screen. For details, see "Installing Rising Antivirus" Rising Antivirus update: Confirm that the network settings and user ID are correct, then you can update by clicking the update button at the bottom of the main window. You can also use the default update settings. For details, see "Update" Virus scan: Go to "Scan" tab, select the target(s) you want to scan and click "Start". To scan a particular file for malware, just drag and drop it into the main window of Rising Antivirus. For details, see "Scanning for viruses" Complete Scan: When you have not scanned your computer completely for a certain period of time, you will be reminded in the "My Rising" box of the "Home" tab. Switching defense modules on / off: Right-click the umbrella icon in the system tray and choose "Enable All Defense / Disable All Defense" to activate / discativate the modules of Rising Active Defense. Program Mode: Rising Antivirus offers the Standard and the Silent Mode. To change the mode, go to the "Status" box of the "Home" tab and right-click the link next to "Mode". Account: Rising Antivirus offers the "Administrator" and the "User" Account. To change the account, go to the "Home" tab and right-click the link next to "Account". To prevent manipulations by malware, you are prompted to enter a confirmation code displayed on the screen whenever you try to disable all monitors or change the account. Log History: To view the program logs, click the button "Log History" on the "Home" tab of Rising Antivirus.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
-9-

Installation and Uninstallation

System Requirements and Languages Install Rising Antivirus Installation Wizard Add / Delete / Uninstall Rising Antivirus

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 10 -

System Requirements and Languages

Software Windows Operating System: Windows 2000/XP/2003/Vista Hardware Non-Vista standard

CPU: Pentium 500 MHz or higher RAM: 256 MB or above, up to 4GB Display: Standard VGA, 24-bit true color Other: CD-ROM drive, mouse

Vista standard

CPU: 1 GHz 32-bit (x86) or 64-bit (x64) RAM: 512 MB Display: Standard VGA, 24-bit true color Other: CD-ROM drive, mouse

Note: This software doesn't guarantee the full support of future hardware and software. Languages Rising Antivirus is available in Simplified Chinese, Traditional Chinese, English and Japanese. The English version can be applied in Windows of any language. More languages will be supported in the future.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 11 -

Install Rising Antivirus

1. Prior to the installation, close all other applications. 2. Double click the installation program of Rising Antivirus. 3. Three languages, i.e. Simplified Chinese, Traditional Chinese and English, are available. Click the language you want to use and "OK" to continue. 4. If during installation a conflict with other security software is detected, the installer will halt. You should uninstall the conflicting software before continuing the installation. Click "Next" to continue with forced installation of Rising Antivirus. 5. You are encouraged to read the "End User License Agreement". Select either "I Agree" to signify acceptance of the conditions within the agreement or to select "I Disagree" to reject the conditions. When you click "I Agree" and"Next" the installation will continue. If not, the installation will immediately halt. 6. Enter your Product Key and 12-digit User ID and click "Next" to continue. If you input the wrong ID, the Product Key will be cleared in the input box. You will have to make another attempt to enter the information correctly. The next step will only start when you input the correct ID. 7. At this point, you have three options for installation: You may select to have the full installation which will install the entire Rising Antivirus package with all tools. Minimal Installation will only install the components necessary for basic operation of the main functions. Custom installation is advisable only for experienced users who feel they have the knowledge to decide what is needed to give them the best protection they need. Click "Next" to resume installation or click "Finish" to install all components in the default mode. 9. Choose Destination, select the destination folder or accept the default and click "Next" to continue. 10. Select Program Folder, input the software name or accept the default and click "Next" to continue. 11. In the window Installation Information, confirm the installation path and component list. At the bottom, you can select "Scan memory for viruses before installation" to ensure a virus-free environment for installation. Confirm the information and click "Next" to continue. 12. If you select "Scan memory for viruses before installation" in the previous step, then a memory scan will be performed. This process may take 3-5 minutes. Any viruses discovered during this process will be cleaned. You may select to "Skip" to abort the scan and continue the installation. (Unadvisable) 13. After installation is complete,please restart your computer. 14.You are prompted to Run Settings Wizard, Run Rising Antivirus or Run Registration Wizard. Click "Finish" to complete the installation.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 12 -

Installation Wizard

The Installation Wizard helps you to configure your installation of Rising Antivirus. Usage Step 1: Rising Cloud Security Joing our rapidly growing Rising Cloud Security network which quickly catches Trojans and other malware. For details, see Rising Cloud Security. The Installation Wizard initiates a security Test which will speed up all further scans. Step 2: Rising Password Activate the in-built password protection and secure Rising Antivirus against unauthorized shutdowns and manipulations. Step 3: Activate Startup Scan and Embedded Scan For details, see Rising Password Step 4: Update Settings Configure update frequency and timing for Smart Update Setting. Click"OK" to finish your configuration and save the settings. For details, see " Smart Update Setting"

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 13 -

Add, Remove, Repair and Uninstall Rising Antivirus

You can adjust Rising Antivirus according to your needs by adding or removing components, or reinstalling components to repair the system. You can also uninstall Rising Antivirus when not needed. In the Windows Start menu, select Programs > Rising Antivirus > Add or Remove Components. The Rising Maintenance window will appear. Add or Remove Features Select this to add or remove Rising Antivirus components based upon your need for more flexible and effective use of resources Repair/Reinstall Select this to reinstall Rising Antivirus by checking the integrity of your Rising software installation and repairing problems. Uninstall Select this to uninstall and delete all Rising Antivirus files from your computer.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 14 -

Main Window

On the "Home" tab of the software, three pieces of information are displayed.

Information Last Update: The date and time the last online update or other update information. Virus Definitions: The latest virus definitions download date. Click Download to download our Rising Security Assistant Last Complete scan: The date and time of the last virus scan of the system or a reminder to conduct a scan ASAP. Security News To stop the display of security news, click Settings > Detailed Settings >Other Settings and unchecking the box marked "Display Security News". If there is no Internet connection detected, the screen will display the Rising lion trade mark. Buttons Appearing at the bottom of the page are four shortcut icons: Audit: This function is linked to a page that provides a security assessment of the current system configuration. Scan: Initiates a scan based on the current settings. Update: Initiates a manual update. Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 15 -

Service: When you click this button, a browser window will open and you will be directed to the Rising online knowledgebase.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 16 -

Scanning for Viruses

Manual Scan Standby Scan Startup Scan Embedded Scan Virus Types

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 17 -

Manual Scan

Usage: 1. Start Rising Antivirus. 2. Select the "Scan" tab. 3. In the scan window on the left hand side you see the "Targets" box. Select the files, folders or other objects to be scanned. 4. Click the "Start" button to initiate the scan of the targets you have selected. When the scan is complete, the "Progress" field will indicate 100%. Should you feel the need to suspend the scan for a moment, you may press the "Pause" button on this page. You can simply restart by pressing the "Continue" button. Should you wish to cancel the scan completely, press the "Stop" button. To get more information on the scan, it is possible to go to the "Details" page. The "Details" window contains two boxes. The first box is the "Scan Summary" and the second, "Results". "Scan Summary" is the summary of the number of "Objects" to be scanned from the first page (Devices/Files/Memory). The "Scan Level" which will be Low, Medium or High. There is also a link back to the previous page.

In the "Results Box", there are six items of information: Scanning: this indicates the current or last object being scanned by the scan engine. Information: is the itemized progress of the scan so far. It states "Files scanned:" as an integer, "Viruses detected:" as an integer and the time elapsed since the start of the scan in hours, minutes and seconds. A progress bar is also located in the centre of the screen to indicate the scan progress visually. (When the bar fills the box from right to left progress is 100%) At the bottom of this box is another text box which displays the information about any viruses that have been found during the current execution of the program.

This information will include: The "Filename" of the infected file on the system. The "Pathname" which is the location of the file within the directory structure. The "Virus Name" which is the technical name of the virus so that you can identify the virus during support calls, if needed. The "Result" indicates the results of performing the default action defined in the scan. Two additional buttons are located in the top right hand of this box: "Pause" and "Stop". These perform the same actions as defined on the first scan page. An icon will be displayed before each file name to indicate the virus type. Refer to "Virus Type" for details. Click "Back" to previous to return to the previous page. Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 18 -

You can also right click the infected file to take further actions. All scan results are saved in the log. You can view previous scan results in "Log History." Repeat Steps 2 through 4 to scan other files or disks. For details, see "Manual Scan Settings"

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 19 -

Standby Scan

Standby Scan uses the idle time of your computer to scan your computer for viruses.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 20 -

Startup Scan

Rising Startup Scan can scan your computer before the Windows logon. You can use this function to clean out certain kinds of viruses and spyware which are hard to remove once Windows is completely started. Click "Esc to exit startup scan.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 21 -

Embedded Scan

This function will automatically scan files when applied to instant messaging software, packers, download managers and other tools. Using Rising Embedded Scan to scan files prevents the spread of viruses to other files in your computer. Rising Antivirus Embedded Scan currently supports the following software:

MSN Messenger AOL Messenger FlashGet NetVampire WinZip WellGet WinRAR FlashGet 2

Usage Open the main window of Rising Antivirus. Click Embedded Scan in the "Tools" tab. Click "Run" When you enable "Display all supported programs" you will see all programs supported by Rising Embedded Scan. Click on the program you want to add Embedded Scan to and select "Enable" Close the window with a click on the "X" in the upper right corner.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 22 -

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 23 -

Virus Types

Rising Antivirus has different icons for specific virus types to make it easier for you to identify them. The corresponding virus type of each icon is as follows:

Unknown Virus com Virus in DOS exe Virus in DOS

Boot Sector Virus LE Virus in Windows Common Virus

Unknown Macro Virus Unknown Script Virus Unknown Email Virus Unknown Windows Virus Unknown DOS Virus Unknown Boot Sector Virus

PE Virus in Windows

elf file Virus in Unix

NE Virus in Windows

Email Virus Floppy Boot Sector Virus HDD Main Boot Sector Virus HDD Boot Sector Virus

Memory Virus

Macro Virus

Script Virus

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 24 -

Smart Active Defense

Smart Active Defense System Reinforcement Application Control Malicious Behavior Detection USB/CD/DVD Monitor Web Trojan Defense Self-Protection Custom Whitelist

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 25 -

Smart Active Defense

Rising Antivirus' Active Defense Technology provides real-time system monitoring and protection against a wide variety of cyber threats. It is common for virus writers to exploit system faults in operating system software to gain access to personal information or do damage to systems by capitalizing on these flaws. As a feature, Active Defense is highly customizable giving you the greatest scope for achieving the desired security level. For the non-technical user however, there are wizards and slide bars to provide default protection at the three levels of security: "Low", "Medium" and "High". The "Defense" Tab lists all functions, an "Enable/Disable" toggle button to set each feature off and on and a button to set the defaults for each function.

Note: Windows 9X, NT and all 64-bit operating systems do not support Rising Active Defense technology. The six functions of Rising Defense are: System Reinforcement System Reinforcement monitors and protects OS vulnerabilities against system attacks by malicious programs. Application Control Application Control allows you to monitor the operational status of applications and block suspicious behavior of processes. Malicious Behavior Interceptor Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 26 -

Monitors programsin the system for possible malicious behaviour and allows you to authorize or reject suspicious activities. USB/CD/DVD Monitor The USB/CD/DVD Monitor can automatically block viruses on USB media, CD/DVD and network drives. Web Trojan Defense Web Trojan Defense automatically blocks malicious web scripts and viruses and prevents them infecting your computer. Self Protection Self protection prevents malware from making unauthorized changes to the Rising software.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 27 -

System Reinforcement

System Reinforcement: monitors the security holes in the operating system that make it vulnerable to attack by malicious code. When suspicious activity is detected, you can allow or deny a certain action. You can add known safe programs to the Custom Whitelist whenever this choice is offered. For the settings, see System Reinforcement Setup. First Scenario: System monitoring rule triggerd When a system monitoring rule is triggered, you can decide whether to deny or allow the activity that triggered the rule. You can end a program or trust it permanently by adding it to the Custom Whitelist.

Second Scenario: Registry Rule triggered When a program is trying to change protected Registry keys, you will see a message similar to the window below. You can deny or allow the key change or terminate the program at once, which tries to change the Registry keys.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 28 -

Third Scenario: Sub process rule triggered When a sub process rule is triggered, you can allow or stop the execution of the process that triggered the rule. You can end the program or trust it permanently by adding it to the Custom Whitelist.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 29 -

Fourth Scenario: System file rule triggered When a program tries to access system files, a system file rule is triggered. You can allow or deny the access. You can end the program or trust it permanently by adding it to the Custom Whitelist.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 30 -

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 31 -

Application Control

Application control allows the user to monitor the operational status of applications and block suspicious behavior of processes. When suspicious behavior is detected, you can deny or allow it on a case by case base or add the particular program to the Custom Whitelist. Application control allows users to customize the level of security for each individual application.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 32 -

Malicious Behaviour Interceptor

Malicious Behaviour Interceptor monitors programs running in the system for possible malicious behavior. You can choose between "Quarantine and delete potential malware","Close potential malware but do not delete files" and "Trust program, add it to Custom Whitelist."

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 33 -

USB/CD/DVD Monitor

The USB/CD/DVD Monitor can automatically block viruses on USB Media, CD/DVD and network drives. When suspicious activity is detected, you can deny or allow the execution of the program that triggered the rule.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 34 -

Self-Protection

Rising Self-Protection prevents malware from making unauthorized changes to Rising software.

For the setup, see Rising Self-Protection Settings

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 35 -

Web Trojan Defense

Web Trojan Defense automatically blocks malicious web scripts and Trojans and prevents them from infecting your computer. When such malware is detected on a webpage, you are prompted and you can allow or block the access to the webpage that triggered the rule.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 36 -

Custom Whitelist

To reduce the number of alerts, you can add known safe programs to the Custom Whitelist. For settings, see Custom Whitelist Setup.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 37 -

AutoProtect

File Monitor Email Monitor

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 38 -

File Monitor

Rising File Monitor is used to monitor all operations in the file system and to scan and clean viruses during file access. When a virus is found, you have the following options:

"Clean infected file", "Delete infected file" "Ignore infection".

Scan Timeout: When the scanning of a file takes too long, you will see the message displayed below. You can: "Continue Scan" or "Stop Scan".

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 39 -

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 40 -

Email Monitor

Rising Email Monitor scans your incoming (POP3) and outgoing (SMTP) email for viruses. When you want to be informed about the mail scan progress, open the main window of Rising Antivirus. Click Settings > Detailed Settings > Auto Protect > Email Monitor and disable "Hide mail progress window". Click "Apply" and "OK" to save your settings. Whenever mail is sent or received, the window below will open up and show the progress.

When a virus is detected, you have the choice to "Remove virus from attachment", "Delete infected attachment" or "Ignore infection".

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 41 -

Rising Tools

Rising Assistant Embedded Tools Latest Installer Creation Tool Virus Quarantine Registration Wizard Rising Security Assistant Virus Removal Tools Rising Account Protection Linux Boot Disk Creator Virus Definitions to USB

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 42 -

Rising Assistant

The little cartoon lion is the mascot of Rising. Right-click the lion and select "Exit" to hide the lion temporarily. To hide the lion permanently, open the main window of Rising Antivirus. Click Settings > Detailed Settings > Other Settings and deselect "Show Rising Assistant"

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 43 -

Latest Installer Creation Tool

This will create a program that allows you to install the current version of Rising Antivirus if necessary. Launch Latest Installer Creation Tool In the Tools tab, select Latest Installer Creation Tool and click "Run Now" OR in the Windows Start menu, select Programs > Rising Antivirus > Rising Tools > Latest Installer Creation Tool. Choose where to save and click "Next" to begin. Once the operation is complete, you can run this file to install the current version of Rising Antivirus.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 44 -

Virus Quarantine

To launch Virus Quarantine: In the Tools tab, select "Virus Quarantine" and click "Run". OR in the Windows Start menu, select Programs > Rising Antivirus > Virus Quarantine If you have checked "Backup virus-infected files to Virus Quarantine" in Settings > Detailed Settings > Other Settings, Virus Quarantine will save a copy of infected files. Quarantined files will not cause further infection or damage. The backed up files can be recovered if necessary.

Quarantine space settings Virus Quarantine allows you to set the size of the quarantine space. This prevents the backup files from taking up too much space. When the quarantine area is full you can choose to:

Automatically expand Replace oldest file(s)

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 45 -

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 46 -

Registration Wizard

Please follow the instructions on the screen to register your product.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 47 -

Rising Security Assistant

Rising Security Assistant gives you additional protection against Trojans and other Internet threats.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 48 -

Virus Removal Tools

As a free service to computer users, Rising is releasing free virus removal tools. These tools do not require any installation. Just download a tool and run it directly.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 49 -

Rising Account Protection

Rising Account Protection provides additional protection for instant messenger programs such as Windows Live Messenger and over hundred popular software tools.

Usage Open the main window of Rising Antivirus and go to the "Tools" tab. Select "Account Protection" and click "Run". Select the program you want to apply account protection to and click "Start protection"

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 50 -

Linux Boot Disk Creator

Preparatory work: 1. Please download the Linux boot file(s) before using the tool. In the "Tools" tab, select "Linux Boot Disk Creator" and click "Run". In the popup window, Click "Download tool now ". The download will start momentarily. 2. After download, you first need to unpack the Linux boot files. 3. Create a folder "Linux" in the "RAV" directory. Before you can do this, you first have to switch off Rising SelfProtection. Open the main program of Rising Antivirus. Go to "Defense" tab and select "Active Defense" -> "Self-Protection" and click "Disable". Input the verification code displayed on the screen, and the self-protection switches off. When you activated the Rising password protection, you also need to input the right password. 4. Finally, you need to copy the files to the "Linux" directory. As a last step, please switch Rising Self-Protection back on. To easy ways to launch Linux Boot Disk Creator: In the "Tools" tab, select "Linux Boot Disk Creator" and click "Run". OR in the Windows Start menu, select Programs->Rising Antivirus or Rising Internet Security-> Rising Tools>Linux Boot Disk Creator. Usage 1. You can format your USB disk (FAT16), write a new MBR and DPT supporting LINUX. During this process, your USB disk will be formatted and data already on it will be lost. 2. Use the disk to start LINUX and access virus definitions on a previously prepared USB disk. 3. With such a USB disk you can scan for viruses with the latest virus definitions.(Please check if your motherboard supports USB disk boot.) 4. USB disks with a capacity of over 1 GB cannot be used for Linux boot.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 51 -

Virus Definitions to USB

Preparatory work This tool is optional. You need to download and install the tool before the first use: Create a folder "SO" in the "RAV" directory. Before you can do this, you first have to switch off Rising SelfProtection. Open the main program of Rising Internet Security. Go to "Defense" tab and select "Active Defense" -> "Self-Protection" and click "Disable". Input the verification code displayed on the screen, and the selfprotection switches off. When you activated the Rising password protection, you also need to input the right password. Go to the "Tools" tab of Rising AntiVirus, select "Virusdefinitions 2 USB" and click "Run". Click the link to download the files and save these in the "SO" directory. Switch the Rising Self-Protection back on. Usage Open the main window of Rising Internet Security and go to the "Tools" tab. Select "Virusdefinitions 2 USB" and click "Run".

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 52 -

Others

Audit Boot Sector Backup and Restore Report Potentially Malicious Files

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 53 -

Audit

Audit provides an utility that scans the computer's current security setting and evaluates the strength of the security based on predefined criteria. Immediately upon entry to the screen, a security scan takes place as indicated by the pulsing lights in the centre of the upper box. When the pulsing stops, the evaluation has taken place and the current security level is displayed at the center: Low, Medium or High.

At the bottom of the page are a group of links to various parts of the Rising Antivirus system where security levels can be changed that will affect the security level.

Joining Rising Cloud Security Update Rising Antivirus Scan All Drives Now Scan for Vulnerabilities/Updates Enable Auto Protect Enable Active Defense Submit Suspicious File(s)

System Vulnerability Scan You can only carry out a vulnerability scan when you have Rising Security Assistant installed.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 54 -

Boot Sector Backup and Restore

To backup the boot sector of your hard disk, open the main interface of Rising Antivirus Click Settings > Backup Boot Sector and follow the instructions on the screen. The saved data can be restored with the Restore Boot Sector function of Rising Antivirus. Alternatively, you can start the system with the Rising Linux Start CD and restore the boot sector.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 55 -

Report Potentially Malicious Files

WEB Upload You can upload potentially malicious files under the following address: http://mailcenter.rising.com.cn/uploadnew.aspx: Automatic Reporting Open the main window of Rising Antivirus Click Settings > Detailed Settings > Other Settings > Rising Cloud Security Enable "Join Rising Cloud Security" and select "Automatically send possible malware".

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 56 -

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 57 -

Scan Settings

Manual Scan Settings Standby Scan Settings Startup Scan Settings Embedded Scan Settings

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 58 -

Manual Scan Settings

On this page you can configure the default action to be taken when a virus is discovered. Furthermore, you can decide which file types you want to check for viruses. You may also use the slide bar to adjust the scan level in more general terms.

In "Custom Level", an experienced user can tailor the security level to his needs. Click "Restore Default" to restore the original Rising settings. Click "Apply" to save all settings and then the virus scan will be based on the selected level. Action Tab There are several conditions that have been identified that require specific actions to be taken when dealing with a virus:

When virus detected When failed to clean the virus When failed to quarantine the virus After scan

The options below indicate what each of the "Action" settings mean: "Ask me what to do" will result in the Rising program notifying you that a virus or malware has been found and then prompt them for a course of action. "Clean virus" will attempt to automatically remove the virus from the infected file or area. Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 59 -

"Delete infected file(s)" will result in the automatic deletion of the file from the system. "Ignore" will record the presence of the virus on the scan results screen and/or log but will take no action against the virus. When a virus is encountered, the normal action is to first quarantine the object so that no damage can occur. The "After scan" dropdown box is used to define what action should be taken by the program upon the completion of a scan. These options are: "Return to main screen", "Exit", "Restart the Computer" or "Shut Down the Computer". At the bottom of the "Action" tab is the checkbox "Hide scan result". When this checkbox is set, no scan result will be shown by the Rising Antivirus scan. Files to scan You have the following options to choose from:

Program Files Only (executable files, such as Exe, Com, Dll, Eml, etc.) Other Types of Files (English semicolon is needed between file extensions).

When you select "Hide scan result" no results will be displayed after a scan task is completed.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 60 -

Startup Scan

You can decide which objects to scan at Windows Startup: "All Hard Disks", "System Disk", "Windows System Directory", "All Services and Drivers"

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 61 -

Rising Embedded Scan Settings

Embedded Scan for Lotus Notes If Lotus Notes is installed on your computer, you can use Rising Antivirus to monitor Lotus Notes for viruses. Enable/Disable Embedded Scan for Lotus Notes Enable Lotus Notes scan: In the main window, select Settings > Detailed Settings > Scan Setup and check "Enable Embedded Scan for Lotus Notes" to enable or remove check to disable. Once checked and saved by clicking "OK", this feature will be enabled whenever Lotus Notes starts up and will scan email attachments in Lotus Notes for viruses.

Embedded Scan Settings for Lotus Notes In Lotus Notes settings, you can choose high, medium or low level, or customize the level. You can also set different actions, types of files to scan and scan modes. In Scan Mode select "Outbound email scan" and "Inbound email scan" to automatically scan for viruses when sending or receiving emails in Lotus Notes. In "Files to scan", you can specify the types of files in the attachment to scan. It is recommended that you select "All files" to minimize the possibility of virus infection. Prompts and alerts When a virus is detected, a message will appear displaying the virus name, email subject, attachment name and Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 62 -

action. Choose how to deal with this virus by selecting "Clean virus", "Delete infected file(s)" or "Ignore this time". Embedded Scan for Office/IE When you open an Office document or download Active-X plug-ins with Internet Explorer (IE), Embedded Scan can automatically protect your system. Note that this feature only works with Office 2000 (or above) and IE 5 (or above). Enable/Disable Embedded Scan for Office/IE In the main window, select Settings > Detailed Settings > Scan Setup and check Enable Embedded Scan for Office/IE to enable, or uncheck to disable. This function is enabled by default. Embedded Scan Settings for Office/IE In Office/IE, you can choose high, medium or low level security, or customize the level. You can also set different actions, or types of files to scan. In Embedded Scan for Office/IE, you can choose whether to "Ask me what to do". Choose how to deal with detected viruses by selecting "Clean virus", "Delete infected file(s)" or "Ignore".

Prompts and alerts If any viruses are found in the Office document, a message will appear. You can choose to "Clean virus", "Delete infected file(s)" or "Ignore". If virus cleaning fails, the program will ask you what action to take. Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 63 -

Embedded Scan for Outlook If Outlook is installed on your computer, you can use Rising Antivirus to monitor Outlook for viruses. Enable/Disable Embedded Scan for Outlook In the main window, select Settings > Detailed Settings > Scan Setup and check "Enable Embedded Scan for Outlook" to enable or remove check to disable. In Outlook, you can choose high, medium or low level security, or customize the level. You can also set different actions, or types of files to scan. Prompts and alerts When a virus is detected, a message will appear displaying the virus name, email subject, attachment name and action. Choose how to deal with this virus by selecting "Clean virus", "Delete infected file(s)" or "Ignore".

Other Embedded Scan Rising Other Embedded scan supports many other popular software tools such as Windows Live Messenger and Flashget. Enable/Disable Other Embedded Scan Open the main window of Rising Antivirus Go to the "Tools" tab and click "Embedded Scan" > "Run". Another window opens up and you can choose the program you want to protect with Rising Embedded Scan. Click "Enable" and click on the "X" in the upper right corner to close the window. Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 64 -

Other Embedded Scan Settings Open the main window of Rising Antivirus. Click Settings > Detailed Settings > Scan Setup > Other Embedded Scan. You can choose high, medium or low level security, or customize the level. You can also set different actions, or types of files to scan. You can choose whether you want to be prompted when a virus is detected. Choose how to deal with detected viruses by selecting "Clean virus", "Delete infected file(s)" or "Ignore". Prompts and alerts When a virus is detected, a message will appear displaying the virus name, email subject, attachment name and action. Choose how to deal with this virus by selecting "Clean virus", "Delete infected file(s)" or "Ignore this time".

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 65 -

AutoProtect Settings

File Monitor Email Monitor

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 66 -

File Monitor Settings

When "File Monitor" is selected, you will see the window displayed below:

Security Level Bar At the top of this box is a slider bar that allows you to set the security to three predefined levels of protection: Low, Medium (the default) and High. If the slider bar is missing and the words 'Custom Level' appear instead, you have previously entered this area and used the "Custom Level" function. Default LevelSettings This is a series of three drop down boxes that allow you to define specific actions in response to events that will be tried when dealing with a detected virus. All of the default settings are pre-set to "Ask me what to do" which means that you will be first queried as to what to do about the situation. So that a scan is not halted by waiting for you to respond to a query, a default action is set and a specific amount of time is entered in which you can over-ride the default action. If there is no response from you within the time as it counts down, the default action is taken and the scan continues. When a virus is detected: In addition to selecting "Ask me what to do", you may specify: "Clean virus", "Delete infected file(s)" or "Ignore". Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 67 -

The action of 'cleaning' a virus means that only the virus code will be removed from its location. The action of 'deleting' the file will result in the file itself being removed from the system. 'Ignoring' the file will allow the file onto the system but create an entry into the log files (if selected) and increment the 'number of viruses detected' in the scan results screen. If virus cleaning fails: In addition to selecting "Ask me what to do", you may specify: "Delete infected file(s)" or "Ignore". (The definitions for these actions are as above). If backup to Virus Quarantine Fails: As a part of the process for deleting or cleaning a virus, files are first placed into a predefined quarantine area. Again, you have the option of "Clean virus", "Delete infected file(s)" or "Ignore" however the action of sending a copy of the file to quarantine will be omitted. At the bottom of this tab box, you may set the number of seconds delay that you have to respond to the "Ask me what to do" query before the default action will be taken. It is also possible for you to set a checkbox on that will cause all activity within the file monitor function to be included in a log file to document the process. You may also decide to set another checkbox to force a display of the activity to the screen or suppress messages and work in a quasi-silent mode.

Advanced Settings Under the Advanced Settings tab, there are three main checkboxes: "Show Timeout Message", "Enable Smart Monitor" and "Use Forced File Deletion".

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 68 -

When the "Show Timeout Message" box is checked, you will be prompted when a timeout occurs if you wish to continue. If the box is not enabled, the scan will continue to run until the scan completes. When the "Enable Smart Monitor" feature is checked, you may specify additional monitoring functions for files including: "Monitor File Creation" and "Monitor File Modification". These will produce additional messages when either of these actions is taken on monitored files. Sometimes, files that are set to "read only" or those which are open and are being used will resist deletion. Setting the "Use Forced Deletion" check box will cause the file to be deleted by Rising Antivirus regardless of normal operating system restrictions. This prevents you having to reboot during virus cleaning or deletion which used to be used to 'free' a file for deletion.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 69 -

Email Monitor Settings

In this tab, you can adjust the scan options for the email scan (POP3, SMTP).

Security Level Bar At the top of this box is a slider bar that allows you to set the security to three predefined levels of protection: Low, Medium (the default) and High. If the slider bar is missing and the words "Custom Level" appear instead, you have previously entered this area and altered the security levels by pressing "Custom Level". There is a button entitled, "Port Settings".

Port Settings Box, The 'Port Settings' box is used to define email 'ports' which allow the passage of messages into and out of your computer system.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 70 -

An incoming port is normally referred to as a POP3 protocol port and an outgoing email port is normally referred to as an SMTP port. POP3 and SMTP both refer to the protocol or specific way in which messages are encoded, transmitted, received and decoded during transmission. You may also enable and disable specific ports from this location by setting the checkboxes off and on. What the checkboxes do is enable or disable the monitoring of the data passing through the ports. Below the security level bar, there is a box with two tabs: Default Settings and Advanced Settings.

Default Settings This is a series of three drop down boxes that allow you to define specific actions in response to events that will be tried when dealing with a detected virus. All of the default settings are pre-set to "Ask me what to do" which means that you will be first queried as to what to do about the situation. So that a scan is not halted by waiting for you to respond to a query, a default action is set and a specific amount of time is entered in which you can over-ride the default action. If there is no response from you within the time as it counts down, the default action is taken and the scan continues. "When virus detected": In addition to selecting "Ask me what to do", you may specify: "Clean virus", "Delete infected file(s)" or 'Ignore'. The action of 'cleaning' a virus means that only the virus code will be removed from its location. The action of 'deleting' the file will result in the file itself being removed from the system.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 71 -

'Ignoring' the file will allow the file onto the system but create an entry into the log files (if selected) and increment the 'number of viruses detected' in the results screen. If virus cleaning fails: In addition to selecting 'Ask me what to do', you may specify: "Delete infected file(s)" or 'Ignore'. (The definitions for these actions are as above). "If Backup to Virus Quarantine fails": As a part of the process for deleting or cleaning a virus, files are first placed into a predefined quarantine area only available to the Rising Antivirus program. Again, you have the option of "Clean virus", "Delete infected file(s)" or 'Ignore'. At the bottom of this tab box, you may decide how long the system will wait for you to respond to the 'Ask me what to do' query before the default action will be taken. It is also possible for you to set a checkbox on that will cause all activity within the file monitor function to be included in a log file to document the process. You may also decide to set another checkbox to force a display of the activity to the screen or suppress messages and work in a quasi-silent mode.

Advanced Settings On this tab, there is a single box that is used to hide or display the Rising Antivirus Mail Monitor Progress Box. This indicates the progress of the Rising Antivirus Monitor as it scans the incoming mail for viruses. It is a separate box from the mail application progress box.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 72 -

Active Defense Settings

Defense Settings System Reinforcement Settings Application Control Settings Malicious Behavior Detection Settings USB/CD/DVD Monitor Settings Trojan Web Defense Settings Self-Protection Settings Custom Whitelist Settings

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 73 -

Active Defense Settings

The "Active Defense" tab lists all of the functions covered under active defense. There is a check box beside each function to enable or disable each feature but only after a system reboot.

The six elements of Active Defense are:

System Reinforcement Application Control Malicious Behaviour Interceptor USB/CD/DVD Monitor Web Trojan Defense Rising Self Protection

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 74 -

System Reinforcement Settings

System Reinforcement monitors the security holes in the operating system that make it vulnerable to attack by malicious code. When the System Reinforcement selection is pressed on the navigation tree on the left, the window shown below is displayed.

On this screen are two areas. The left side of the page remains as a quick navigation box. At the top of this page is the System Reinforcement icon and a brief introduction to the function. Below this area is a slider bar that allows you to set the security to three predefined levels of protection: Low, Medium (the default) and High which enable or disable specific rules. Custom Level Button If the slider bar is missing and the word "Custom Level" appears instead, you have previously entered this area and altered the security rules for individual areas. "Restore Default" Button To reset to display the slider bar, simply press the "Restore Default" button. At the bottom of the page, a check box appears entitled "Create Log" that allows you to send all activity monitored by this setting to a log file for later viewing.

"Custom Level" Page Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 75 -

System Reinforcement rules can be set to: Monitor and alert you regarding rules violations against the system Protect the Registry Protect Critical Processes Protect System Files

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 76 -

Application Control Settings

On the Application Control settings window you can add programs you want to be monitored. For your convenience, Application Control provides model templates for the most popular software categories: entertainment, office software, online banking and tools. Each template has already preconfigured rules, which you can directly use or adjust according to your individual needs.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 77 -

Malicious Behavior Interceptor

Malicious Behavior Interceptor monitors programs running in memory for activity that appears to be malicious or performing actions similar to known viruses, Trojans and worms. You are then given the opportunity to either accept or reject the execution of the action.

On the right side of the screen, at the top, the icon for Malicious Behavior Interceptor is displayed beside a brief explanation of its function. Below that, there is a horizontal slider bar that sets the sensitivity of the detection based on a list of predefined 'default' criteria. You can set the default action to be taken when this type of activity is detected based on two actions: "Report Only" or "Ask me what to do". "Report only:" causes an information balloon to be sent to the screen when virus like activity is detected. "Ask me what to do:" sends a report to the screen and allows you to accept or reject the activity based on your judgment. At the bottom of the screen, there are two check boxes: "Create Log" and "Scan for Virus DNA Scan after process end". "Create Log:" causes any activity against this rule to be written to a log file for later reference. "Scan for Virus DNA Scan after process end": causes a virus scan to be initiated at the end or termination of a process.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 78 -

USB/CD/DVD Monitor Settings

The USB/CD/DVD Monitor blocks malware on USB storage media, CDs/DVDs and network drives. Usage Configure the monitoring range: "Removable drive(s)", "Network drives", "CD/DVD drive(s)" Decide what should happen, when an application is detected in the monitored area: "Refuse" and "Ask me" To keep track of USB/CD/DVD Monitor events, enable "Record in log"

Click "Apply" to apply your configuration and "OK" to save your settings.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 79 -

Web Trojan Defense Settings

To enter the settings of Web Trojan Denfense, please click Settings>Active Defense>Web Trojan Defense.

On this window you can find the following web defenses:

Enable Behavior Scan Enable Shellcode Defense Enable Smart Heuristic Scan

You can choose between "Deny" and "Ask me" when web viruses or malicious web scripts are detected. To record web defense incidents in the log, please enable "Create Log".

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 80 -

Rising Self-Protection Settings

To enter the settings of Rising Self-Protection, click Settings > Active Defense > Self Protection. When you enable "Prompt me when rule is triggered", a message will be displayed when a self-protection rule is triggered. To record such incidents in the log, enable "Create Log".

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 81 -

Custom Whitelist

Programs on this list are not restricted by Rising Smart Active Defense. You can Add, Delete, Clear, Import and Export by using the buttons on the border of the page. When you check "Allow signed applications", the Smart Active Defense will regard digitally signed applications as trusted applications.

When you click on "Add", the window displayed below will open up. You can select a program from the list of active processes or click "Browse" to locate the file on your hard disk.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 82 -

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 83 -

SmartUpdate

Setting up SmartUpdate Configure your network connection. Enter your User ID in Settings > User ID. Click the "Update" button in the main window to update. Further Information: Update Settings Network Settings User ID Settings

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 84 -

Scheduled Smart Update

Rising Antivirus can be configured to update in a variety of ways. By default, the system is set to update automatically.

You can set the system to update:

Manual Once a Cycle Weekly Daily Automatic

"Manual" requires that you periodically open the main program of Rising Antivirus, go to the "Home" tab and click on the "Update" icon. If you set "Once a Cycle", the grayed out box below under "Time" entitled "Every" becomes active as a drop down list and allows you to set an interval where the program will update from once every 2 hours to once every 12 hours. If the box is set to "Weekly", you can set the day of the week and the time of day that the update should occur. If the box is set to "Daily", you can select the time of day that the update will occur. Setting the box to "Automatic" resets the function to the default. This is handled by checking the system version numbers periodically and comparing them to the server versions. You can also decide if you want to only update the virus definitions or the whole system by setting the "Update Virus Definitions Only" checkbox to on. SmartUpdate can also be set to report its activities to you or to work in 'silent mode'. For this feature, enable Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 85 -

"Silent SmartUpdate" at the bottom of the window.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 86 -

Scheduled Smart Update

Rising Antivirus can be configured to update in a variety of ways. By default, the system is set to update automatically.

You can set the system to update:

Manual Once a Cycle Weekly Daily Automatic

"Manual" requires that you periodically open the main program of Rising Antivirus, go to the "Home" tab and click on the "Update" icon. If you set "Once a Cycle", the grayed out box below under "Time" entitled "Every" becomes active as a drop down list and allows you to set an interval where the program will update from once every 2 hours to once every 12 hours. If the box is set to "Weekly", you can set the day of the week and the time of day that the update should occur. If the box is set to "Daily", you can select the time of day that the update will occur. Setting the box to "Automatic" resets the function to the default. This is handled by checking the system version numbers periodically and comparing them to the server versions. You can also decide if you want to only update the virus definitions or the whole system by setting the "Update Virus Definitions Only" checkbox to on. SmartUpdate can also be set to report its activities to you or to work in 'silent mode'. For this feature, enable Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 87 -

"Silent SmartUpdate" at the bottom of the window.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 88 -

Network Connection

Prior to updating Rising Antivirus, you may need to configure your network settings. In the main window of Rising Antivirus, select Settings > Connection. Select your connection mode in the window shown below.

Use Internet Explorer connection settings. Access Internet via LAN or direct connection. Access Internet via proxy server.

Note: When selecting the last mode, the IP address and proxy server port must be entered manually. Click "Apply" and "OK" to save the settings.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 89 -

User ID Settings

Only with a valid User ID you have access to program and definition updates. Usage To input a User ID, open the main program of Rising Antivirus. Click Settings > User ID A window opens up in which you can type the User ID.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 90 -

Other Settings

On this tab, you can:

enable sound alerts, decide, how long you want to keep the log files, backup infected files to virus quarantine, display security news, display monitor status before login, show the Rising Assistant

With a click on "Exclusions" you open the Excluded directories/files setup window. Directories and files on this list are not monitored by Rising Antivirus.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 91 -

Rising Password

Enable the built-in password protection and secure your Rising software against unauthorized shutdowns and manipulation by malware. Usage Open the main window of Rising Antivirus 2009 Click Settings > Other Settings >Rising Password . Check Enable Rising Password, input a password and select what you want to protect. You can apply password protection to all offered features by selection "Select all" or select one ore more of the following:

"Modify scan settings" "Stop scan" "Empty Quarantine" "Switch mode "Disable all Defense" "Modify Defense" "Add/remove components,restore"

Before you can access a password protected function, you will see the window shown below. Input your password and click "OK". Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 92 -

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 93 -

Rising Cloud Security

We invite you to join our rapidly growing Rising Cloud Security project. Together with the Rising viruslab, our cloud security users form a rapid response network which quickly catches Trojans and other malware.

To join Rising Cloud Security, open the main window of Rising Antivirus Click Settings > Detailed Settings > Other Settings > Rising Cloud Security Select "Join Rising Cloud Security" and input your email address. We recoomend to enable "Automatically send possible malware", "Automatically report potentially dangerous sites" and "Automatically report scan result"

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 94 -

Frequently asked questions

1.

2.

3.

4.

5.

6.

7.

Q: How long can I update my version of Rising Antivirus? A: Generally speaking, this depends on the license you bought. Rising Antivirus is sold as 1 or 2 year license. Please check the email in which you received the original license key. During this time, you can update your installation of Rising Antivirus for free. Before your subscription expires, a window will open and remind you to renew your subscription in time. Q: On how many computers can I install Rising Antivirus? A: Generally speaking, this depends on the license you bought. Rising Antivirus is sold as single or multiuser license which can be installed on up to five (5) computers. Please check the email in which you received the original license key and make sure that you do not install Rising Antivirus on more computers than mentioned in this email. Q: Recently, I had to reinstall Windows several times. When I now click on [Update], I get the error message "The Product Key you are using has already reached the permitted number of updates." A: Rising Antivirus is sold as single or multiuser license which can be installed on up to five (5) computers. This error message is displayed when the total number of updates within a certain time period exceeds the number of computers your product key is licensed for. Please check the email in which you received the original license key and make sure that you do not install Rising Antivirus on more computers than mentioned in the original license email. This error message may also appear when Rising Antivirus is updated many times in a row due to repeated reinstallation of your operating system. After a short time, the update function will work again. Q: During the update of Rising Antivirus, I get the error message "An error occurred while reading the configuration file. Please try to repair the file using Add/Remove Programs in the Windows Control Panel and try again." A: This problem may be caused by corrupted program files. Please uninstall Rising Antivirus, reinstall it and then try to update again. If normal uninstallation is impossible, log onto the product update section of the Rising website and click the update link to download the Rising Antivirus installer. Run the installer with the overwriting option and then try to update again. Q: During the update of Rising Antivirus, I get the error message that the product key does not match the user ID, and an update is impossible. What can I do? A: This may be caused by a typo when you entered the serial number or the User ID during the installation of Rising Antivirus or Rising Personal Firewall. Solution: Open Rising Antivirus or Rising Personal Firewall click Settings -> User ID Please enter the correct User ID and click OK. Run update again. If the problem persists, uninstall Rising Antivirus or Rising Personal Firewall and then install it again. Q: When I click [Update] on Rising Antivirus, I get the error message "Network connection failed. Please check the network configuration and try again." A: The update problem may be caused by network errors or maintenance of the Rising update servers. Please try again later. Q: . During the update of Rising Antivirus, sometimes a blue screen occurs and the computer automatically restarts. What can I do?
Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 95 -

A: The problem may be due to a conflict between certain files of the system and programs invoked during the update process. The reason may be rather complicated and we would like to ask you to provide us with additional information about this incident: If a blue screen occurs to the system, a folder minidump will be created within C:\WINDOWS. Please zip that folder and send it to Rising for further analysis. Q: During the update of Rising Antivirus, I get the error message "Failed to download essential update files. Please try again later." What can I do? 8. A: The update problem may be caused by network errors or maintenance of the Rising update servers. Please try again later. Q: During the update of Rising Antivirus, I get the error message "Failed to obtain update files. Please try again later." How to solve it 9. A: This problem is usually caused problems with some temp files or Rising Antivirus. Click Start -> Run, and type in %temp%. Delete the files in the folder and try to update again.

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 96 -

After-Sales Service

If you encounter a problem with our software, please check the manual and our Frequently Asked Questions and Knowledgebase, before you contact our helpdesk.

Online Knowledgebase

For your convenience, our products provide shortcuts to our online knowledgebase. http://support.risingglobal.com) Open the main window of Rising Antivirus 2009 and click the "Service" button in the lower right corner of the window. A browser window will open up displaying our online knowledgebase.

Contact Adress Beijing Rising Information Technology Co.,Ltd. Beijing, Haidian District, Zhongguancun Nan Dajie 22, Zhongke Dasha 22, 1305 ZIP: 100190

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 97 -

Helpline: +86 (0)10-82678800

Lion-Strong Security 2008-2009 Beijing Rising Information Technology Co.,Ltd. All Rights Reserved
- 98 -

You might also like