ACRONIS PRIVACY EXPERT CORPORATE - Скачать руководство пользователя страница 1

 

 
 

 

 

Acronis Privacy Expert 

Corporate 

User’s Guide

 

 
 

 

 

 

 

 

 

 

 

 

 

 

 

www.acronis.com 

 

Содержание PRIVACY EXPERT CORPORATE -

Страница 1: ...Acronis Privacy Expert Corporate User s Guide www acronis com...

Страница 2: ...permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtained from the copyr...

Страница 3: ...or copies of any kind in the software except as specifically permitted above D Attempting to un assemble de compile or reverse engineer the software in any way E Granting sublicenses leases or other...

Страница 4: ...ate 13 CHAPTER 2 USING ACRONIS PRIVACY EXPERT CORPORATE MANAGEMENT CONSOLE 14 2 1 Getting started 14 2 2 Acronis Privacy Expert Corporate Management Console main window 14 2 3 Connecting to remote com...

Страница 5: ...ocker local options 33 6 3 1 Acronis Pop up Blocker general settings 34 6 3 2 Last visited pages 34 6 3 3 Blocked URLs 34 6 3 4 White URLs 34 6 3 5 Black URLs 35 CHAPTER 7 OTHER OPERATIONS 36 7 1 Crea...

Страница 6: ...PC performance Acronis Privacy Expert Corporate is more than just an anti spyware solution It also includes value added security tools that ensure your employee data and actions are secure Acronis Pr...

Страница 7: ...remove spyware manually and other useful information Acronis Privacy Expert Corporate Architecture Acronis Privacy Expert Corporate includes the following components 1 Acronis Privacy Expert Corporate...

Страница 8: ...and registered copies of Acronis Privacy Expert Corporate are entitled to free e mail and fax technical support from Acronis If you have installation or working problems that you cannot solve by yours...

Страница 9: ...t MS Windows 98 Me MS Windows NT 4 0 Workstation SP 6 2000 Professional XP Professional 1 3 Setting up security parameters for Acronis Privacy Expert Corporate 1 3 1 Usernames and passwords Acronis Pr...

Страница 10: ...enabled on the remote computer before the remote operation starts 1 4 License policy Acronis Privacy Expert Corporate licensing is based on the number of workstations on which the Acronis Privacy Expe...

Страница 11: ...ng Acronis Privacy Expert Corporate components You may want to save setup msi files for each Acronis Privacy Expert Corporate component separately on a local or network drive Then you will be able to...

Страница 12: ...ts onto remote computers connected to the corporate network Using the Acronis Privacy Expert Corporate Management Console you can install remotely Acronis Privacy Expert Corporate Agent Acronis Spywar...

Страница 13: ...Cs you specified If you checked Reboot the remote computer s box during the component installation the remote machines will reboot Otherwise you will see the corresponding message 1 9 Recovering Acron...

Страница 14: ...With the Acronis Privacy Expert Corporate Management Console you can Install Acronis components to remote computers Remove spyware and malicious programs from the remote computers workstations Turn of...

Страница 15: ...rts on remote operations for each computer and Delete button to delete scheduled tasks 2 3 Connecting to remote computer You need to connect your computer with the management console to the remote com...

Страница 16: ...mation on Web sites user visits user s PC configuration and other sources Other common sources of spyware include peer to peer networks gaming portals and other similar Web services Sometimes spyware...

Страница 17: ...in your local network To do this select and click Spyware removal in the main program window After that you can either initiate spyware removal with the Spyware Removal Wizard immediately or update sp...

Страница 18: ...te searches for spyware only in the most likely locations including system user profile and temporary files folders as well as in the system registry Select this mode for a quick PC check Deep Scannin...

Страница 19: ...cute the script click Proceed After the spyware removal operation is finished you can see logs for each remote computer with a summary that will state the number of spyware applications removed see se...

Страница 20: ...y according to the schedule with the ability to select only workdays or once every few days Weekly according to the schedule with the ability to select particular days such as Tuesday and Friday or on...

Страница 21: ...your selection click Next to set additional parameters on the next wizard page 3 4 4 Entering user name and password For the remote computers running Windows NT 2000 XP or Server 2003 you will have to...

Страница 22: ...ry keys etc deleted by spyware removal operations Besides it may be useful to look through the list of deleted objects and obtain the detailed information about Acronis Privacy Expert Corporate operat...

Страница 23: ...ings All Users Application Data Acronis PrivacyExpert8 SpywareQuarantine To see this folder the option Show Hidden Files and Folders in Folder Options must be enabled 3 6 Using the Log The Log keeps t...

Страница 24: ...ers 24 Copyright Acronis Inc 2000 2005 Log settings enable you to keep track with different degrees of detail You can select one of the following variants Everything Important information error and sp...

Страница 25: ...nstalling Acronis Privacy Expert Corporate components You can enable or disable it any time you want To enable or disable Acronis Spyware Shield on the remote computers select the Spyware Shield icon...

Страница 26: ...e the Acronis Spyware Shield Wizard by left clicking the icon in the system tray Having enabled Spyware Shield the user can change its settings 4 2 1 General options In the General options window you...

Страница 27: ...components Analyze running processes will constantly monitor running processes and warn you about any suspicious actions of unknown programs Advanced options window 4 2 3 Remembered events While Spyw...

Страница 28: ...Shield settings Having set up Spyware Shield you can browse the resulting settings in the final script and click Apply if everything is correct All Spyware Shield settings will be active until you cha...

Страница 29: ...oduct registration Remember that the Spyware definitions updates service is available only for registered users of Acronis Privacy Expert Corporate You can register you copy of the program at the Acro...

Страница 30: ...rs on which you are going to update spyware definitions Select computers window 5 2 3 Selecting update mode Having run the Spyware Definitions Updates Wizard you can select the update mode either manu...

Страница 31: ...he schedule with the ability to select particular days such as Tuesday and Friday or once every two or three weeks etc Monthly according to the schedule on the time and day set The suite supports clea...

Страница 32: ...update schedule Having made a selection click Next to set additional parameters on the next wizard page 5 2 5 Entering user name and password To finish scheduling automatic updates enter the user nam...

Страница 33: ...remotely using the Acronis Privacy Expert Corporate Management Console See section 1 8 Installing Acronis components onto remote machines of this Guide After that the local user can disable enable the...

Страница 34: ...e Microsoft Internet Explorer History In this list you can select Web sites to add to either the White or the Black list 6 3 3 Blocked URLs In this section you can see which Web sites contained pop up...

Страница 35: ...w 6 3 5 Black URLs Adding the site to the Black rejected list means that Acronis Pop up Blocker will prevent you from following any link available on this site and show a report in IE bar if enabled A...

Страница 36: ...to select from a number of data destruction methods depending on the importance of your confidential information Using the Acronis Privacy Expert Corporate you can create a bootable diskette or CD wi...

Страница 37: ...a destruction method Acronis Drive Cleanser utilizes a number of the most popular data destruction methods complying with national standards including U S Standard DoD 5220 22 M You may create your ow...

Страница 38: ...ting important system functions making these objects not only a threat to your security but also to your system s stability Browser hijackers Browser hijackers have the ability to change your Internet...

Страница 39: ...ransmitted unencrypted an intruder can easily gain access to a user s information by setting up sniffer filters and waiting for the victim to connect to a server Spyware Spyware are programs that secr...

Отзывы: