ACRONIS PRIVACY EXPERT CORPORATE - User Manual Download Page 3

 

 

3

END-USER LICENSE AGREEMENT 

BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE 
TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU 
MAY CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE 
SOFTWARE. 

The Acronis Privacy Expert Corporate (the software) is Copyright © Acronis, Inc., 2000-
2005. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use 
the software only, subject to the following restrictions and limitations. 

1.

 

The license is to the original purchaser only, and is not transferable without prior 
written permission from Acronis. 

2.

 

The original purchaser may use the software on a single computer owned or leased 
by the original purchaser. You may not use the software on more than one machine 
even if you own or lease all of them, without the written consent of Acronis. 

3.

 

The original purchaser may not engage in, nor permit third parties to engage in, any 
of the following: 

A.

 

Providing or permitting use of or disclosing the software to third parties. 

B.

 

Providing use of the software in a computer service business, network, timesharing or 
multiple user arrangement to users who are not individually licensed by Acronis. 

C.

 

Making alterations or copies of any kind in the software (except as specifically 
permitted above). 

D.

 

Attempting to un-assemble, de-compile or reverse engineer the software in any way. 

E.

 

Granting sublicenses, leases or other rights in the software to others. 

F.

 

Making copies or verbal or media translations of the users guide. 

G.

 

Making telecommunication data transmission of the software. 

Acronis has the right to terminate this license if there is a violation of its terms or default 
by the original purchaser. Upon termination for any reason, all copies of the software 
must be immediately returned to Acronis, and the original purchaser shall be liable to 
Acronis for any and all damages suffered as a result of the violation or default. 

ENTIRE RISK 

THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS 
WITH YOU THE PURCHASER. ACRONIS DOES NOT WARRANT THAT THE SOFTWARE OR 
ITS FUNCTIONS WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION OF THE 
SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE OR THAT ANY DEFECTS WILL 
BE CORRECTED. NO LIABILITY FOR CONSEQUENTIAL DAMAGES — IN NO EVENT SHALL 
ACRONIS OR ITS VENDORS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, 
WITHOUT LIMITATION, DAMAGES FOR THE LOSS OF BUSINESS PROFITS, BUSINESS 
INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) 
ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE, EVEN IF ACRONIS 
HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 

Summary of Contents for PRIVACY EXPERT CORPORATE -

Page 1: ...Acronis Privacy Expert Corporate User s Guide www acronis com...

Page 2: ...permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtained from the copyr...

Page 3: ...or copies of any kind in the software except as specifically permitted above D Attempting to un assemble de compile or reverse engineer the software in any way E Granting sublicenses leases or other...

Page 4: ...ate 13 CHAPTER 2 USING ACRONIS PRIVACY EXPERT CORPORATE MANAGEMENT CONSOLE 14 2 1 Getting started 14 2 2 Acronis Privacy Expert Corporate Management Console main window 14 2 3 Connecting to remote com...

Page 5: ...ocker local options 33 6 3 1 Acronis Pop up Blocker general settings 34 6 3 2 Last visited pages 34 6 3 3 Blocked URLs 34 6 3 4 White URLs 34 6 3 5 Black URLs 35 CHAPTER 7 OTHER OPERATIONS 36 7 1 Crea...

Page 6: ...PC performance Acronis Privacy Expert Corporate is more than just an anti spyware solution It also includes value added security tools that ensure your employee data and actions are secure Acronis Pr...

Page 7: ...remove spyware manually and other useful information Acronis Privacy Expert Corporate Architecture Acronis Privacy Expert Corporate includes the following components 1 Acronis Privacy Expert Corporate...

Page 8: ...and registered copies of Acronis Privacy Expert Corporate are entitled to free e mail and fax technical support from Acronis If you have installation or working problems that you cannot solve by yours...

Page 9: ...t MS Windows 98 Me MS Windows NT 4 0 Workstation SP 6 2000 Professional XP Professional 1 3 Setting up security parameters for Acronis Privacy Expert Corporate 1 3 1 Usernames and passwords Acronis Pr...

Page 10: ...enabled on the remote computer before the remote operation starts 1 4 License policy Acronis Privacy Expert Corporate licensing is based on the number of workstations on which the Acronis Privacy Expe...

Page 11: ...ng Acronis Privacy Expert Corporate components You may want to save setup msi files for each Acronis Privacy Expert Corporate component separately on a local or network drive Then you will be able to...

Page 12: ...ts onto remote computers connected to the corporate network Using the Acronis Privacy Expert Corporate Management Console you can install remotely Acronis Privacy Expert Corporate Agent Acronis Spywar...

Page 13: ...Cs you specified If you checked Reboot the remote computer s box during the component installation the remote machines will reboot Otherwise you will see the corresponding message 1 9 Recovering Acron...

Page 14: ...With the Acronis Privacy Expert Corporate Management Console you can Install Acronis components to remote computers Remove spyware and malicious programs from the remote computers workstations Turn of...

Page 15: ...rts on remote operations for each computer and Delete button to delete scheduled tasks 2 3 Connecting to remote computer You need to connect your computer with the management console to the remote com...

Page 16: ...mation on Web sites user visits user s PC configuration and other sources Other common sources of spyware include peer to peer networks gaming portals and other similar Web services Sometimes spyware...

Page 17: ...in your local network To do this select and click Spyware removal in the main program window After that you can either initiate spyware removal with the Spyware Removal Wizard immediately or update sp...

Page 18: ...te searches for spyware only in the most likely locations including system user profile and temporary files folders as well as in the system registry Select this mode for a quick PC check Deep Scannin...

Page 19: ...cute the script click Proceed After the spyware removal operation is finished you can see logs for each remote computer with a summary that will state the number of spyware applications removed see se...

Page 20: ...y according to the schedule with the ability to select only workdays or once every few days Weekly according to the schedule with the ability to select particular days such as Tuesday and Friday or on...

Page 21: ...your selection click Next to set additional parameters on the next wizard page 3 4 4 Entering user name and password For the remote computers running Windows NT 2000 XP or Server 2003 you will have to...

Page 22: ...ry keys etc deleted by spyware removal operations Besides it may be useful to look through the list of deleted objects and obtain the detailed information about Acronis Privacy Expert Corporate operat...

Page 23: ...ings All Users Application Data Acronis PrivacyExpert8 SpywareQuarantine To see this folder the option Show Hidden Files and Folders in Folder Options must be enabled 3 6 Using the Log The Log keeps t...

Page 24: ...ers 24 Copyright Acronis Inc 2000 2005 Log settings enable you to keep track with different degrees of detail You can select one of the following variants Everything Important information error and sp...

Page 25: ...nstalling Acronis Privacy Expert Corporate components You can enable or disable it any time you want To enable or disable Acronis Spyware Shield on the remote computers select the Spyware Shield icon...

Page 26: ...e the Acronis Spyware Shield Wizard by left clicking the icon in the system tray Having enabled Spyware Shield the user can change its settings 4 2 1 General options In the General options window you...

Page 27: ...components Analyze running processes will constantly monitor running processes and warn you about any suspicious actions of unknown programs Advanced options window 4 2 3 Remembered events While Spyw...

Page 28: ...Shield settings Having set up Spyware Shield you can browse the resulting settings in the final script and click Apply if everything is correct All Spyware Shield settings will be active until you cha...

Page 29: ...oduct registration Remember that the Spyware definitions updates service is available only for registered users of Acronis Privacy Expert Corporate You can register you copy of the program at the Acro...

Page 30: ...rs on which you are going to update spyware definitions Select computers window 5 2 3 Selecting update mode Having run the Spyware Definitions Updates Wizard you can select the update mode either manu...

Page 31: ...he schedule with the ability to select particular days such as Tuesday and Friday or once every two or three weeks etc Monthly according to the schedule on the time and day set The suite supports clea...

Page 32: ...update schedule Having made a selection click Next to set additional parameters on the next wizard page 5 2 5 Entering user name and password To finish scheduling automatic updates enter the user nam...

Page 33: ...remotely using the Acronis Privacy Expert Corporate Management Console See section 1 8 Installing Acronis components onto remote machines of this Guide After that the local user can disable enable the...

Page 34: ...e Microsoft Internet Explorer History In this list you can select Web sites to add to either the White or the Black list 6 3 3 Blocked URLs In this section you can see which Web sites contained pop up...

Page 35: ...w 6 3 5 Black URLs Adding the site to the Black rejected list means that Acronis Pop up Blocker will prevent you from following any link available on this site and show a report in IE bar if enabled A...

Page 36: ...to select from a number of data destruction methods depending on the importance of your confidential information Using the Acronis Privacy Expert Corporate you can create a bootable diskette or CD wi...

Page 37: ...a destruction method Acronis Drive Cleanser utilizes a number of the most popular data destruction methods complying with national standards including U S Standard DoD 5220 22 M You may create your ow...

Page 38: ...ting important system functions making these objects not only a threat to your security but also to your system s stability Browser hijackers Browser hijackers have the ability to change your Internet...

Page 39: ...ransmitted unencrypted an intruder can easily gain access to a user s information by setting up sniffer filters and waiting for the victim to connect to a server Spyware Spyware are programs that secr...

Reviews: