6ERSIONS
License Information
Contents
Administrative menu and tasks
Using Vssetup
Update computers where no user is logged on
Access online features and functions
Specify who configures firewall protection settings
Enable spyware protection Select a spyware protection mode
Install the firewall protection service via policy
Enable firewall protection
Configuring browser protection from the SecurityCenter
How safety ratings are compiled
Installing via policy
Update your MX records
Introduction
Enforced Client overview
What is Enforced Client?
Protect against many kinds of threats
Select the right version of Enforced Client
Select the version that best supports your needs
Enforced Client Anti-Virus and Anti-Spyware Basic Advanced
Ensure continuous, automatic protection
New features
What is new in this release?
New feature Description
Changes in support
Updating process
How does the software work?
Methods for updating client computers
Retrieving updates
Uploading security information
Outbreak response
Rumor technology
Internet Independent Updating IIU
Online SecurityCenter
Managing with the online SecurityCenter
Enforced Client Product Guide Introduction
User groups
Policy Setting
Example Sales Team group and Sales policy
Customized policies
Who should read this guide?
Using this guide
This guide uses the following conventions
Conventions
Bold
Condensed
Getting product information
Contact information
Customer Service
Professional Services Enforced Client
Enforced Client Product Guide Introduction
Installing Enforced Client
Welcome
After you place your order
This email Contains
Servers
System requirements
Operating systems
Operating system support ending
Notifying users when support ends
Email server security application
Email security service
Terminal servers
Windows Control Panel, open Add/Remove Programs
Before you install
Uninstall existing virus protection software
Non-SonicWALL products automatically detected
SonicWALL products automatically detected
Configure your browser
Uninstall existing firewall software
Internet Explorer
Non-Microsoft browsers
Install the standalone installation agent
Standard URL installation
Installing Enforced Client
Install the client software in any of the following ways
Requirements
Installing on client computers
Sending an installation URL to users
Enforced Client installs automatically
Click Select Text and Copy to Clipboard
Continue
Internet URL installation
Advanced installation method
Advanced installation methods
Administrator Silent Push
Push Install utility
To use silent installation
Silent installation
On the Computers page, click Add Computer
Installation
Examples
How push installation works
Push installation
Considerations for scheduling push installations
Window displays a list of visible computers in your domain
Select target computers and protection services
Enabling relay servers
If you use a corporate firewall or proxy server
Using Vssetup
Completing the installation
Using the Push Install utility
Select Scan Tasks, then select Scan My Computer
Test virus protection
Scan the client computer
Scan the email Inbox
Set up the default firewall
What should I do after installing?
Enforced Client Product Guide Installing Enforced Client
Using Enforced Client
Enforced Client system tray icon
Using the client software
Removing and displaying the icon
Log off the computer
Client menu
Administrative menu and tasks
Updating client computers
Update during an outbreak
Update automatically
Update manually
Update computers where no user is logged on
Using the SecurityCenter
Setting up your account
When you are
Administrative features are divided among six pages
Access online features and functions
Getting started
Log on to the SecurityCenter
SecurityCenter tabs
Do this
Make the most of your online data
Customize listings and reports
Show Navigation
Using the online help
Previous and Next
Related Links
Set up your profile
Setting up your account
Change your SecurityCenter password
To configure your notification preferences
SecurityCenter
Viewing your security services at-a-glance
From the SecurityCenter page, you can
Install protection services
View and resolve action items
This color Indicates
Managing your computers
View security coverage for your account
Computers
Display details for a computer
Search for computers
Click the red action item
Save
Send email to computers
View detections for a computer
View user-approved applications for a computer
Creating groups to manage your site
Block computers from receiving updates
Delete computers from your reports
Move computers into a group
From the Groups + Policies page, you can
Default group
Delete a group
Designating group administrators
Create or edit a group
Site and group administrators
Create or edit a group administrator
Delete a group administrator
Setting up policies
SonicWALL Default policy
Assign a policy to a group
Restore default policy settings
Create or edit a policy
Delete a policy
Viewing reports
Unrecognized
Detections
Programs
Inbound Events
Duplicate Computers report
View duplicate computers
View computer profiles
Managing your correspondence
Update your account’s email address
Update user email addresses
Send email to users
Add your logo to reports
Click Cancel to return to the My Account
View your service subscriptions
Managing your subscriptions
Click Close Window
Purchase, add, and renew services
Update subscription information
To update information for a subscription
Subscription History
Request a trial subscription
Getting assistance
Receive subscription notifications
View printed and online documents
Contact product support
Download utilities
Accessing client features Scan Tasks menu
Service
Scan
Disable On-Access Scanner
Quarantine Viewer
View PUP Detections
Scanning client computers
Scan automatically on-access scans
View scan results
Scan manually on-demand scans
How detections are handled
Cleaned
Scanned
Detected
Scan email
Schedule on-demand scans
Scan for spyware
Under Tools, select Scan for Threats
Check the status of each item, then click Close
Select one or more detections, then select an action
Schedule on-demand scans
Configuring policies for virus and spyware protection
Set basic virus protection options
Click Add Exclusion
Exclude files and folders from virus scans
Click the Virus Protection tab
Enable optional protection
Select your update frequency
Click the Advanced Settings tab
Set advanced virus protection options
Zip, .rar, .tat, .tgz
Rar, .tat, .tgz
Set basic spyware protection options
Enable spyware protection
Protect
Select a spyware protection mode
Mode Behavior of protection service Report
100
Set advanced spyware protection options
Specify approved programs
Spyware
Password crackers
Dialers
Adware
102
Viewing reports for virus and spyware detections
View detections
Potentially Unwanted Programs
103
Buffer Overflow Processes
Details
Unrecognized Programs report
View unrecognized programs
105
Using the Unrecognized Programs report
Avert Labs Threat Library
Computer Details
Detection History report
View your detection history
Manage your protection strategy with best practices
Protect mode
Managing detections
108
Manage quarantined files
Clean failed
Disabling on-access scanning
Check the status of each item
Click OK to close the Quarantine Viewer
110
Accessing client features Firewall Settings command
Using the Firewall Protection Service
112
Configuring policies for firewall protection
113
Specify who configures firewall protection settings
Enable firewall protection
Install the firewall protection service via policy
Under Firewall Status, select On, then click Save 114
Click the Desktop Firewall tab
Learn mode
Select a firewall protection mode
115
Users notified about deleted or quarantined applications
Specify a connection type
Configure a custom connection
Select from three connection environments
116
Configure IP addresses for a custom connection
Configure system services for a custom connection
Open a service port
On the Desktop Firewall tab, click Save
119
Click OK
Set up allowed Internet applications
Configure IP addresses for a custom connection
121
Specify Internet applications in a policy
Specify whether to use SonicWALL recommendations
View unrecognized Internet applications
Viewing reports for firewall protection
Allow an Internet
View inbound events blocked by the firewall
Application
Policy
Events to display the Inbound Event List
Using the Inbound Events Blocked by Firewall report
Managing suspicious activity with best practices
Managing suspicious activity with best practices
126
Accessing site safety information
Using the Browser Protection Service
Staying safe during searches
How safety ratings are compiled
129
Staying safe while browsing
Viewing safety reports
Configuring browser protection settings
Configuring browser protection from the SecurityCenter
Installing via policy
131
Configuring browser protection on the client computer
132
Submitting feedback
133
Using the Email Security Service
Using the portal
Activating the email security service
135
Update your MX records
Customize your account settings
Do not delete the pdefault entry
Default settings
Recommended first steps
136
Optional customization
On the portal, click the Administration tab
Configure general administration settings
Under Your email protection, select Click here to configure
138
Use this feature
Access basic administration features on the Administration
General Settings
Viewing your email protection status
Viewing your email protection status
Viewing reports for the email security service
Configuring a policy for email security
Sender Lists Add email addresses to allow or block
Select Add Email Security Policy
View and manage quarantined user messages
Managing quarantined email
Check the Quarantine Summary
Select Quarantine
Getting more information
To restore a message, click Deliver
View quarantined mail deliveries
Open the Quarantine Summary
144
145
Uninstalling protection services
Installing
Frequently asked questions FAQ
Adding, renewing, and moving licenses
Configuring and managing policies
Reporting
Scanning
Updating
Firewall protection
General
Browser protection
152
Error messages
153
Security level of the browser is too high
Creation Date columns
Select Start Run
From the Windows Control Panel, open Add/Remove Programs
See If you use a corporate firewall or proxy server on
Contacting product support
161
162
Read & Modify Reports
163
164
165
166
Where the computer is placed
Untrusted connection
Network it considers them to be unsafe
167
Login
SecurityCenter tab
168
Computers tab
169
170
Reports tab
171
Groups + Policies tab
172
My Account tab
View subscription history
Try
173
174
Install Protection
Help tab
175
Install Protection New Computers
Install Protection New Computers Email Text
176
Install Protection Existing Computers
Install Protection Existing Computers Email Text
177
Install Email Security Service
Advanced Installation Methods
178
Product Purchase
Product Coverage
179
Use this feature
Computer Details
180
Detection List
User-Approved Application List
Type
Search Results
181
182
Detections report by computer
Detection type
Group by
183
Detections report by detection
Detected Objects
Last Detection Date
184
Unrecognized Programs report by computer
Shows the number of occurrences for this detection
Program type
Potentially Unwanted Programs Programs detected the by
Unrecognized Programs report by program
185
186
Duplicate Computers report
Inbound Event List
187
Attack Type
IP Address
Computer Profiles report
188
189
Detection History report
190
Edit Default Group
Edit Group
191
View Default Policy
Add Group
192
193
194
Edit Policy Virus Protection Settings
Reset to Defaults
Edit Policy Spyware Protection Settings
195
Value
196
Edit Policy Desktop Firewall Settings
197
198
Firewall Custom Settings
199
Add or Edit Incoming Connection
200
Edit Policy Browser Protection Settings
Edit Policy Advanced Settings
Advanced Virus Protection
201
202
Add Policy Virus Protection Settings
Any potentially unwanted programs
Spyware Programs that covertly gathers user information
Excluded Files and Folders
Add Policy Spyware Protection Settings
203
Prompt Ask the user how to respond when a potentially
Add Policy Desktop Firewall Settings
204
Unwanted program is detected
Them about threats and strategies for avoiding intrusions
205
206
Add Policy Browser Protection Settings
Detected Application
Policy
Their client computers
Add Policy Advanced Settings
207
208
209
Subscription History
210
Edit Subscription Information
211
Manage Group Administrators
Manage All Group Administrators
212
Notification Preferences
Manage Logo
Edit Profile
Utilities
213
Previous installation
Uninstall components from a
214
Download the standalone