Chapter 3: Setting Up RealSecure Desktop Protector

Installing RealSecure Desktop Protector

Introduction

This topic gives instructions for installing Desktop Protector.

Local or remote

You can install RealSecure Desktop Protector locally at your agent computer or remotely

installation

from RealSecure ICEcap Manager. In most cases, you should distribute Desktop Protector

 

to network systems from ICEcap Manager. This allows centralized control of

 

configuration. However, in some cases it may be quicker to install an agent manually.

 

For information about installing remotely with RealSecure ICEcap Manager, see the

 

RealSecure ICEcap Manager User Guide.

Manual ICEcap

When Desktop Protector is installed directly on an agent computer, you must manually

configuration

configure the ICEcap settings. When Desktop Protector reports to ICEcap Manager, any

 

configuration and protection settings attributed to the agent’s account and group are

 

distributed to the agent.

 

Note: Manual installations of RealSecure Desktop Protector always include the local user

 

interface. Only ICEcap Manager can create and distribute agents without the local user

 

interface, known as “silent” agents. For information about installing silent agents, see the

 

RealSecure ICEcap Manager User Guide.

Prerequisites

Before you install RealSecure Desktop Protector, you must do the following:

 

Scan your system for viruses.

 

Disable the real-time scanning function of any anti-virus detection software on your

 

system to avoid unwanted interactions during the installation.

Procedure

To install RealSecure Desktop Protector, follow these steps:

4.Are you installing Desktop Protector from the CD?

If yes, go to Step 5.

If no, locate the directory to which you downloaded Desktop Protector, and then go to Step 6.

If you have lost your original copy of the software, you can download a new copy from the Internet Security Systems Web site at www.iss.net.

5.Insert the CD in the CD-ROM drive.

6.Double-click RSDPSetup.exe.

7.In the Install Wizard, click Next.

If the setup program detects an existing version of Desktop Protector, the program prompts you to uninstall or upgrade the existing version.

To update Desktop Protector, click Next.

To remove Desktop Protector from your hard drive, follow the instructions in “Uninstalling Desktop Protector” on page 28.

22

Page 30
Image 30
Internet Security Systems 3.5 manual Installing RealSecure Desktop Protector

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.