6ERSIONS
License Information
Contents
Using Vssetup
Administrative menu and tasks
Update computers where no user is logged on
Access online features and functions
Enable spyware protection Select a spyware protection mode
Specify who configures firewall protection settings
Install the firewall protection service via policy
Enable firewall protection
How safety ratings are compiled
Configuring browser protection from the SecurityCenter
Installing via policy
Update your MX records
Introduction
What is Enforced Client?
Enforced Client overview
Select the right version of Enforced Client
Protect against many kinds of threats
Select the version that best supports your needs
Enforced Client Anti-Virus and Anti-Spyware Basic Advanced
Ensure continuous, automatic protection
What is new in this release?
New features
New feature Description
Changes in support
How does the software work?
Updating process
Retrieving updates
Methods for updating client computers
Outbreak response
Rumor technology
Uploading security information
Internet Independent Updating IIU
Managing with the online SecurityCenter
Online SecurityCenter
Enforced Client Product Guide Introduction
Policy Setting
User groups
Customized policies
Example Sales Team group and Sales policy
Using this guide
Who should read this guide?
Conventions
This guide uses the following conventions
Bold
Condensed
Getting product information
Customer Service
Professional Services Enforced Client
Contact information
Enforced Client Product Guide Introduction
Installing Enforced Client
After you place your order
This email Contains
Welcome
System requirements
Operating systems
Servers
Notifying users when support ends
Operating system support ending
Email security service
Email server security application
Terminal servers
Before you install
Uninstall existing virus protection software
Windows Control Panel, open Add/Remove Programs
SonicWALL products automatically detected
Non-SonicWALL products automatically detected
Uninstall existing firewall software
Configure your browser
Internet Explorer
Non-Microsoft browsers
Install the standalone installation agent
Installing Enforced Client
Standard URL installation
Install the client software in any of the following ways
Requirements
Sending an installation URL to users
Installing on client computers
Enforced Client installs automatically
Click Select Text and Copy to Clipboard
Internet URL installation
Continue
Advanced installation methods
Advanced installation method
Administrator Silent Push
Push Install utility
Silent installation
To use silent installation
Installation
On the Computers page, click Add Computer
Examples
Push installation
How push installation works
Considerations for scheduling push installations
Select target computers and protection services
Window displays a list of visible computers in your domain
If you use a corporate firewall or proxy server
Enabling relay servers
Completing the installation
Using the Push Install utility
Using Vssetup
Test virus protection
Scan the client computer
Select Scan Tasks, then select Scan My Computer
Set up the default firewall
Scan the email Inbox
What should I do after installing?
Enforced Client Product Guide Installing Enforced Client
Using Enforced Client
Using the client software
Enforced Client system tray icon
Removing and displaying the icon
Log off the computer
Administrative menu and tasks
Updating client computers
Client menu
Update automatically
Update manually
Update during an outbreak
Using the SecurityCenter
Update computers where no user is logged on
When you are
Setting up your account
Access online features and functions
Administrative features are divided among six pages
Getting started
Log on to the SecurityCenter
SecurityCenter tabs
Make the most of your online data
Do this
Customize listings and reports
Using the online help
Show Navigation
Previous and Next
Related Links
Setting up your account
Set up your profile
Change your SecurityCenter password
To configure your notification preferences
Viewing your security services at-a-glance
SecurityCenter
Install protection services
View and resolve action items
From the SecurityCenter page, you can
Managing your computers
View security coverage for your account
This color Indicates
Computers
Search for computers
Display details for a computer
Save
Click the red action item
View detections for a computer
View user-approved applications for a computer
Send email to computers
Block computers from receiving updates
Creating groups to manage your site
Delete computers from your reports
Move computers into a group
Default group
From the Groups + Policies page, you can
Designating group administrators
Create or edit a group
Delete a group
Site and group administrators
Create or edit a group administrator
Setting up policies
Delete a group administrator
SonicWALL Default policy
Restore default policy settings
Create or edit a policy
Assign a policy to a group
Viewing reports
Delete a policy
Detections
Unrecognized
Programs
Inbound Events
View duplicate computers
Duplicate Computers report
Managing your correspondence
View computer profiles
Update user email addresses
Update your account’s email address
Send email to users
Add your logo to reports
View your service subscriptions
Click Cancel to return to the My Account
Managing your subscriptions
Click Close Window
Update subscription information
Purchase, add, and renew services
To update information for a subscription
Subscription History
Getting assistance
Request a trial subscription
Receive subscription notifications
View printed and online documents
Download utilities
Contact product support
Service
Accessing client features Scan Tasks menu
Disable On-Access Scanner
Scan
Quarantine Viewer
View PUP Detections
Scan automatically on-access scans
Scanning client computers
Scan manually on-demand scans
View scan results
Cleaned
How detections are handled
Scanned
Detected
Schedule on-demand scans
Scan email
Scan for spyware
Under Tools, select Scan for Threats
Select one or more detections, then select an action
Check the status of each item, then click Close
Configuring policies for virus and spyware protection
Set basic virus protection options
Schedule on-demand scans
Exclude files and folders from virus scans
Click the Virus Protection tab
Click Add Exclusion
Select your update frequency
Enable optional protection
Click the Advanced Settings tab
Set advanced virus protection options
Rar, .tat, .tgz
Zip, .rar, .tat, .tgz
Enable spyware protection
Set basic spyware protection options
Select a spyware protection mode
Mode Behavior of protection service Report
Protect
Set advanced spyware protection options
Specify approved programs
100
Password crackers
Spyware
Dialers
Adware
Viewing reports for virus and spyware detections
View detections
102
103
Potentially Unwanted Programs
Buffer Overflow Processes
Details
View unrecognized programs
Unrecognized Programs report
Using the Unrecognized Programs report
105
Avert Labs Threat Library
Computer Details
View your detection history
Detection History report
Protect mode
Managing detections
Manage your protection strategy with best practices
Manage quarantined files
108
Disabling on-access scanning
Clean failed
Check the status of each item
Click OK to close the Quarantine Viewer
110
Using the Firewall Protection Service
Accessing client features Firewall Settings command
Configuring policies for firewall protection
112
Specify who configures firewall protection settings
113
Install the firewall protection service via policy
Enable firewall protection
Under Firewall Status, select On, then click Save 114
Click the Desktop Firewall tab
Select a firewall protection mode
Learn mode
115
Users notified about deleted or quarantined applications
Configure a custom connection
Specify a connection type
Select from three connection environments
116
Configure system services for a custom connection
Configure IP addresses for a custom connection
Open a service port
119
On the Desktop Firewall tab, click Save
Set up allowed Internet applications
Configure IP addresses for a custom connection
Click OK
Specify Internet applications in a policy
Specify whether to use SonicWALL recommendations
121
Viewing reports for firewall protection
View unrecognized Internet applications
View inbound events blocked by the firewall
Allow an Internet
Application
Policy
Using the Inbound Events Blocked by Firewall report
Managing suspicious activity with best practices
Events to display the Inbound Event List
Managing suspicious activity with best practices
126
Using the Browser Protection Service
Accessing site safety information
How safety ratings are compiled
Staying safe during searches
Staying safe while browsing
129
Configuring browser protection settings
Viewing safety reports
Configuring browser protection from the SecurityCenter
Installing via policy
Configuring browser protection on the client computer
131
Submitting feedback
132
Using the Email Security Service
133
Activating the email security service
Using the portal
Update your MX records
Customize your account settings
135
Default settings
Do not delete the pdefault entry
Recommended first steps
136
Optional customization
Configure general administration settings
On the portal, click the Administration tab
Under Your email protection, select Click here to configure
138
Access basic administration features on the Administration
Use this feature
General Settings
Viewing your email protection status
Viewing your email protection status
Configuring a policy for email security
Viewing reports for the email security service
Sender Lists Add email addresses to allow or block
Select Add Email Security Policy
Managing quarantined email
View and manage quarantined user messages
Check the Quarantine Summary
Select Quarantine
To restore a message, click Deliver
Getting more information
View quarantined mail deliveries
Open the Quarantine Summary
144
Uninstalling protection services
145
Frequently asked questions FAQ
Installing
Configuring and managing policies
Adding, renewing, and moving licenses
Scanning
Reporting
Updating
Firewall protection
Browser protection
General
Error messages
152
153
Security level of the browser is too high
Creation Date columns
From the Windows Control Panel, open Add/Remove Programs
Select Start Run
See If you use a corporate firewall or proxy server on
Contacting product support
161
162
163
Read & Modify Reports
164
165
Where the computer is placed
166
Untrusted connection
Network it considers them to be unsafe
Login
SecurityCenter tab
167
Computers tab
168
169
Reports tab
170
Groups + Policies tab
171
My Account tab
172
View subscription history
Try
173
Install Protection
Help tab
174
Install Protection New Computers
Install Protection New Computers Email Text
175
Install Protection Existing Computers
Install Protection Existing Computers Email Text
176
Install Email Security Service
Advanced Installation Methods
177
Product Purchase
Product Coverage
178
Use this feature
Computer Details
179
Detection List
User-Approved Application List
180
Search Results
181
Type
Detections report by computer
182
Detection type
Group by
Detections report by detection
183
Detected Objects
Last Detection Date
Unrecognized Programs report by computer
184
Shows the number of occurrences for this detection
Program type
Unrecognized Programs report by program
185
Potentially Unwanted Programs Programs detected the by
186
Inbound Event List
Duplicate Computers report
187
Attack Type
Computer Profiles report
188
IP Address
Detection History report
189
Edit Default Group
Edit Group
190
View Default Policy
Add Group
191
192
193
Edit Policy Virus Protection Settings
194
Edit Policy Spyware Protection Settings
Reset to Defaults
195
Value
Edit Policy Desktop Firewall Settings
196
197
Firewall Custom Settings
198
Add or Edit Incoming Connection
199
Edit Policy Browser Protection Settings
Edit Policy Advanced Settings
200
201
Advanced Virus Protection
Add Policy Virus Protection Settings
202
Any potentially unwanted programs
Spyware Programs that covertly gathers user information
Add Policy Spyware Protection Settings
203
Excluded Files and Folders
Add Policy Desktop Firewall Settings
Prompt Ask the user how to respond when a potentially
204
Unwanted program is detected
205
Them about threats and strategies for avoiding intrusions
Add Policy Browser Protection Settings
206
Detected Application
Policy
Add Policy Advanced Settings
207
Their client computers
208
Subscription History
209
Edit Subscription Information
210
Manage Group Administrators
Manage All Group Administrators
211
Notification Preferences
212
Edit Profile
Manage Logo
Utilities
213
Uninstall components from a
Previous installation
214
Download the standalone