ACRONIS PRIVACY EXPERT CORPORATE - Скачать руководство пользователя страница 7

Introduction

Copyright © Acronis, Inc., 2000-2005 

7

 

Comprehensive Spyware Shield prevents spyware from being installed to 
networked computers 

 

Constantly monitors running processes and provides alerts due to any 
suspicious actions of programs, such as trying to change the Windows 
registry and to launch at startup 

 

Prevents the changing of settings of ActiveX components 

 

Prevents applications from making changes to Web browser settings, 
including home page, search page, etc. This ensures that employees 
go to the pages they select 

 

Pop-up ad blocker ensures that annoying pop-up ads do not interfere with 
Web browsing 

 

Internet updates service keeps spyware definitions up-to-date. Updates 
can be downloaded manually via a wizard or automatically downloaded as a 
scheduled task  

 

Acronis knowledge base, an online information resource, provides 
comprehensive details on topics such as where specific spyware threats 
come from, what has to be changed if one decides to remove spyware 
manually, and other useful information 

Acronis Privacy Expert Corporate Architecture 

Acronis Privacy Expert Corporate includes the following components: 

1. Acronis Privacy Expert Corporate Management Console — helps you 
install and manage the Acronis Privacy Expert Corporate Agent on a remote 
machine; removes spyware threats on the remote computers, schedules spyware 
removal tasks, browses logs and more  

2. Acronis Privacy Expert Corporate Agent — installs on a remote system to 
enable access from the Acronis Privacy Expert Corporate Management Console 

3. Acronis Spyware Shield — installs on a remote computers and monitors it 
for suspicious applications and components 

4.  Acronis Pop-up Blocker - installs on a remote computers and blocks 
unwanted pop-up windows there 

5. Acronis License Server allows you to manage your Acronis enterprise 
product licenses from a single location. 

Software use conditions 

The conditions for Acronis Privacy Expert Corporate software usage are 
described in the «License Agreement» (page 3 of this manual). A set of unique 
serial keys, supplied with the product, is the confirmation of the legal purchase 
and usage the suite. 

Содержание PRIVACY EXPERT CORPORATE -

Страница 1: ...Acronis Privacy Expert Corporate User s Guide www acronis com...

Страница 2: ...permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtained from the copyr...

Страница 3: ...or copies of any kind in the software except as specifically permitted above D Attempting to un assemble de compile or reverse engineer the software in any way E Granting sublicenses leases or other...

Страница 4: ...ate 13 CHAPTER 2 USING ACRONIS PRIVACY EXPERT CORPORATE MANAGEMENT CONSOLE 14 2 1 Getting started 14 2 2 Acronis Privacy Expert Corporate Management Console main window 14 2 3 Connecting to remote com...

Страница 5: ...ocker local options 33 6 3 1 Acronis Pop up Blocker general settings 34 6 3 2 Last visited pages 34 6 3 3 Blocked URLs 34 6 3 4 White URLs 34 6 3 5 Black URLs 35 CHAPTER 7 OTHER OPERATIONS 36 7 1 Crea...

Страница 6: ...PC performance Acronis Privacy Expert Corporate is more than just an anti spyware solution It also includes value added security tools that ensure your employee data and actions are secure Acronis Pr...

Страница 7: ...remove spyware manually and other useful information Acronis Privacy Expert Corporate Architecture Acronis Privacy Expert Corporate includes the following components 1 Acronis Privacy Expert Corporate...

Страница 8: ...and registered copies of Acronis Privacy Expert Corporate are entitled to free e mail and fax technical support from Acronis If you have installation or working problems that you cannot solve by yours...

Страница 9: ...t MS Windows 98 Me MS Windows NT 4 0 Workstation SP 6 2000 Professional XP Professional 1 3 Setting up security parameters for Acronis Privacy Expert Corporate 1 3 1 Usernames and passwords Acronis Pr...

Страница 10: ...enabled on the remote computer before the remote operation starts 1 4 License policy Acronis Privacy Expert Corporate licensing is based on the number of workstations on which the Acronis Privacy Expe...

Страница 11: ...ng Acronis Privacy Expert Corporate components You may want to save setup msi files for each Acronis Privacy Expert Corporate component separately on a local or network drive Then you will be able to...

Страница 12: ...ts onto remote computers connected to the corporate network Using the Acronis Privacy Expert Corporate Management Console you can install remotely Acronis Privacy Expert Corporate Agent Acronis Spywar...

Страница 13: ...Cs you specified If you checked Reboot the remote computer s box during the component installation the remote machines will reboot Otherwise you will see the corresponding message 1 9 Recovering Acron...

Страница 14: ...With the Acronis Privacy Expert Corporate Management Console you can Install Acronis components to remote computers Remove spyware and malicious programs from the remote computers workstations Turn of...

Страница 15: ...rts on remote operations for each computer and Delete button to delete scheduled tasks 2 3 Connecting to remote computer You need to connect your computer with the management console to the remote com...

Страница 16: ...mation on Web sites user visits user s PC configuration and other sources Other common sources of spyware include peer to peer networks gaming portals and other similar Web services Sometimes spyware...

Страница 17: ...in your local network To do this select and click Spyware removal in the main program window After that you can either initiate spyware removal with the Spyware Removal Wizard immediately or update sp...

Страница 18: ...te searches for spyware only in the most likely locations including system user profile and temporary files folders as well as in the system registry Select this mode for a quick PC check Deep Scannin...

Страница 19: ...cute the script click Proceed After the spyware removal operation is finished you can see logs for each remote computer with a summary that will state the number of spyware applications removed see se...

Страница 20: ...y according to the schedule with the ability to select only workdays or once every few days Weekly according to the schedule with the ability to select particular days such as Tuesday and Friday or on...

Страница 21: ...your selection click Next to set additional parameters on the next wizard page 3 4 4 Entering user name and password For the remote computers running Windows NT 2000 XP or Server 2003 you will have to...

Страница 22: ...ry keys etc deleted by spyware removal operations Besides it may be useful to look through the list of deleted objects and obtain the detailed information about Acronis Privacy Expert Corporate operat...

Страница 23: ...ings All Users Application Data Acronis PrivacyExpert8 SpywareQuarantine To see this folder the option Show Hidden Files and Folders in Folder Options must be enabled 3 6 Using the Log The Log keeps t...

Страница 24: ...ers 24 Copyright Acronis Inc 2000 2005 Log settings enable you to keep track with different degrees of detail You can select one of the following variants Everything Important information error and sp...

Страница 25: ...nstalling Acronis Privacy Expert Corporate components You can enable or disable it any time you want To enable or disable Acronis Spyware Shield on the remote computers select the Spyware Shield icon...

Страница 26: ...e the Acronis Spyware Shield Wizard by left clicking the icon in the system tray Having enabled Spyware Shield the user can change its settings 4 2 1 General options In the General options window you...

Страница 27: ...components Analyze running processes will constantly monitor running processes and warn you about any suspicious actions of unknown programs Advanced options window 4 2 3 Remembered events While Spyw...

Страница 28: ...Shield settings Having set up Spyware Shield you can browse the resulting settings in the final script and click Apply if everything is correct All Spyware Shield settings will be active until you cha...

Страница 29: ...oduct registration Remember that the Spyware definitions updates service is available only for registered users of Acronis Privacy Expert Corporate You can register you copy of the program at the Acro...

Страница 30: ...rs on which you are going to update spyware definitions Select computers window 5 2 3 Selecting update mode Having run the Spyware Definitions Updates Wizard you can select the update mode either manu...

Страница 31: ...he schedule with the ability to select particular days such as Tuesday and Friday or once every two or three weeks etc Monthly according to the schedule on the time and day set The suite supports clea...

Страница 32: ...update schedule Having made a selection click Next to set additional parameters on the next wizard page 5 2 5 Entering user name and password To finish scheduling automatic updates enter the user nam...

Страница 33: ...remotely using the Acronis Privacy Expert Corporate Management Console See section 1 8 Installing Acronis components onto remote machines of this Guide After that the local user can disable enable the...

Страница 34: ...e Microsoft Internet Explorer History In this list you can select Web sites to add to either the White or the Black list 6 3 3 Blocked URLs In this section you can see which Web sites contained pop up...

Страница 35: ...w 6 3 5 Black URLs Adding the site to the Black rejected list means that Acronis Pop up Blocker will prevent you from following any link available on this site and show a report in IE bar if enabled A...

Страница 36: ...to select from a number of data destruction methods depending on the importance of your confidential information Using the Acronis Privacy Expert Corporate you can create a bootable diskette or CD wi...

Страница 37: ...a destruction method Acronis Drive Cleanser utilizes a number of the most popular data destruction methods complying with national standards including U S Standard DoD 5220 22 M You may create your ow...

Страница 38: ...ting important system functions making these objects not only a threat to your security but also to your system s stability Browser hijackers Browser hijackers have the ability to change your Internet...

Страница 39: ...ransmitted unencrypted an intruder can easily gain access to a user s information by setting up sniffer filters and waiting for the victim to connect to a server Spyware Spyware are programs that secr...

Отзывы: