Home

IKARUS security.manager_Manual_en

image

Contents

1. HIKARUS EE security manager 41 9 Selecting the Installation Folder In this dialog you can choose the destination folder to install the IKARUS securi ty manager Server files to i My IKARUS security manager Server Select Installation Folder O The installer wil install IKARUS security manager Server to the following falder To instal inthis folder Se Neuf Ta metal toca different folder erter It below ar click Browse Folder E Program Files KEE MKAR HU S secunty manager Install IKARUS security manager Server far vourself or for anyone who uses this computer C Evenone Just me Figure 4 8 Server Installation Select Installation Folder 2012 IKARUS Security Software GmbH Page 19 HIKARUS EE security manager 4 110 Confirm Installation This is the final step before the IKARUS security manager Server files are actually in stalled Click Next to start the copy process i iy IKARUS security manager Server Confirm Installation gt The installer is ready to install KARUS security manager Server on your computer Chek Nest to start the installation Figure 4 9 Server Installation Confirm Installation 2012 IKARUS Security Software GmbH Page 20 HIKARUS EE security manager 4 111 Installation Complete Congratulations You successfully installed the IKARUS security manager Server If a different text is displayed in this dialog contact the IKARU
2. Je ze MH Figure 5 33 Configuration Add Scan Profile 2012 IKARUS Security Software GmbH Page 66 Profile Name Use Automatic Scan Time when scan is started Select when the auto matic scan will start daily weekly monthly Enter path here List of paths in Scan Profile HKARUS BEN security manager 5 212 IKARUS security manager Settings The IKARUS security manager Settings window Figure 5 34 shows settings for the IKARUS security manager Server The window is separated into three tabs General E Mail Notifications and Update Changes to the settings are committed upon clicking the OK or Apply buttons at the bottom of the window These two buttons will be disa bled when entries are missing or invalid Clicking the Cancel button will close the window and discard all changes clicking the OK button will save all changes and close the window 5 2 12 1 General HERE Open Browser Sets the directory where Opens a browser window ismxstartup exe is stored for choosing the shared for the IKARUS anti virus directory deployment Enforce Client Update IKARUS security manager Settings a Enable or disable deploy ep ea Over Ce General E Mail Notifications Update Enforce Client Update Shared directory for remote installation Port Enable deployment over specified TCP port JV Enforce Client Update i Administration Port The port the ISM Ul uses for Enforce Clien
3. OHKARUS I security manager 5 2 9 General Page on Clients The General Page Window Figure 5 19 of a Client displays detailed information on the currently selected client 2012 IKARUS Security Software GmbH Page 52 HKARUS Bal security manager 5 2 9 1 Layout CH I DESS D N n Chante General Page on Clients va at Fa CD Un I Na 2012 IKARUS Security Software GmbH Page 53 15 12 2011 13 20 03 UTC 15 12 2011 14 00 01 UTC Versions Displays the IKARUS anti virus database scan engine and update versions of this client Protection Displays the serial number scan status number of infections and protection mechanisms that are enabled or disabled HKARUS EE security manager 5 2 10 Notification Bar The Notification Bar control Figure 5 20 is hidden by default It will only be displayed if there have been changes to the virus list of a client If the IKARUS security manager Ul is not the active foreground application the IKARUS security manager Ul entry in the Windows taskbar will start flashing to inform you that there are virus list changes 5 2 10 1 Layout Hide Hides this notification bar Clients List of all clients whose virus list has changed Clicking on the client name will change to the Directory entry Figure 5 20 UI Notification Bar 2012 IKARUS Security Software GmbH Page 54 HIKARUS E
4. 5 ad ENE NNN 33 6 2 THESE NERE 35 ET ER 36 ET PENDON TA K ia So io Re dan ei EE 41 JOE NG T ae EE NE NE 44 EA IE EE EEE NE EG EN ENE 46 Es CHAN Be 47 BAO OVEREN eebe 48 6 4 E Ee E GE 49 5 2 8 GENERAL PAGE ON GROUPS eee 51 529 HEN PAGE SN CLUENT oie oe oe ee Ee Ee oe ee EO EG ae ee EG secs 52 2012 IKARUS Security Software GmbH Page 2 OIKARUS security manager 5 2 10 NOTIFICATION ENE 54 5 2 11 IKARUS ANTIVIRUS CONFIGURATIONS cccscccscccscccesccsccccccucccacecceccccaseusceusceuscensceuecensecenacs 55 5 212 IKARUS SECURITY MANAGER SETTINGS ccccscccscccsccccsccscccscccesceaceccececeeescusccusceusscusseuscensceeuacs 67 5 213 DIALOG CLEAN HOST ENTRIES FROM DATABASE ees ee ee ee ee ee ee ee ee ee ee ee ee ee ee 71 EO ee EEE EEE 72 5 2 15 THREE 73 52 16 METAN 76 6 THE SHARED DIRECTORY ee 77 S i e kee ee Ce ag e EE 78 FTP 78 AA MON EE 78 TA PRCT AION IRE EEE EE EE OIE 78 TN 79 8 SET DS GAEREN Nav 80 8 1 INSTALLING THE IKARUS ANTI VIRUS een ee KKK KEREN EN KN KKK EEN EN EN KKK EEN EN EN KKK Ee 81 8 2 UNINSTALLING THE IKARUS ANTIL VIRUS cccccccscscsccccccccccscscsccccccccccccscscsceccccccccccscscscsccccceeees 83 ONG ee EE eo Dee ie Ee Oe ee EN GE Ee 84 9 1 THE lt CONFIG gt SECTION issie ee sd ie ede de dd ed es ie ee de he Gee Ge id N n re ede 85 9 2 THE lt LDAP gt SECTION EEE ER 86 TO TABLE OF ERT EE 87 T OSV EE 89 2012
5. ene Server Iocalhost Request for Change ID 0815 Comment Login to administrate new clients status A comment is obligatory Leading and trailing white spaces are ignored Figure 5 3 UI Change Management 2012 IKARUS Security Software GmbH Page 32 HIKARUS BENN security manager 5 13 Set License If you not have chosen a valid license file during the setup of the IKARUS securi ty manager Server you will now be prompted again to either choose a license file or complete the registration using an Activation Key 5 1 4 License Violation If you are not a current IKARUS security manager A user you may skip this section if you are there are a number of reasons why there are more administered clients on your network than actually allowed This is a license violation which is handled in this new version of the IKARUS security manager You will be prompted to remove the excessive number of clients from administration to meet the requirements of the license you are using License violation License Information Displays the expiration date and how much of your license capacity is used and free Shows how many clients you need to remove from administration E Moves all clients to the epl bordocal se right hand list enr pm fr abor oral D d Moves selected clients to the right hand list Moves selected clients to the left hand list Moves all clients
6. programs procedures and associated docu mentation concerned with the operation of a data processing system Firewall A firewall is a device or set of devices de Signed to permit or deny network communica tion based upon a set of rules Firewalls are typically used for protecting networks from unauthorized access while permitting legiti mate communications 2012 IKARUS Security Software GmbH Page 92 lt HKARUS security manager 2012 IKARUS Security Software GmbH All rights reserved The information contained in this document represents the current view of IKARUS Se curity Software GmbH on the issues discussed as of the date of publication Because IKARUS Security Software GmbH must respond to changing market conditions it should not be interpreted to be a commitment on the part of IKARUS Security Software GmbH and IKARUS cannot guarantee the accuracy of any information presented after the date of publication This paper is for informational purposes only IKARUS Security Software GmbH MAKES NO WARRANTIES EXPRESS OR IMPLIED IN THIS DOCUMENT Other product and company names mentioned herein may be the trademarks of their respective owners IKARUS Security Software GmbH Blechturmgasse 11 in 1050 Vienna Austria 2012 IKARUS Security Software GmbH Page 93
7. security manager uration dialog 4 IKARUS St Figure 5 22 Configuration General tab 5 2 11 3 E mail Enables or disables system protection if disabled all other options will be disa bled too Enables or disables protection for Internet downloads Enables or disables spyware protection Enables or disables dialer protection On the e mail tab of the IKARUS anti virus Configuration e mail protection of the client can be enabled or disabled Additionally the administrator can configure various set tings such as where the scan report is placed in the e mail With incoming and outgoing e mails the e mail scan report can be positioned at the beginning or the end of the e mail or be omitted 2012 IKARUS Security Software GmbH Page 56 OHMKARUS rm security manager IKARUS vines ubiities Configurations Salg ER ME i Ge Enables or disables e Esseg e T NTE pe mail protection Specifies whether attachments should be saved on the client side Shows the scan status Sets the position of the scan report in Taletolnallafe MAI Sets the position of the scan report in outgoing mail Figure 5 23 Configuration e mail tab 5 2 11 4 Update All settings necessary for updates to the IKARUS anti virus are configured on the Up date tab In particular when using a proxy server you need to specify the correct set tings here 2012 IKARUS Security Software GmbH
8. 80017 VDB Date 14 12 2011 10 04 AntiSpam Version N A SDB Build number N A SDB Date N A Update Version 1 0 110 Figure 5 16 UI Overview Page 2012 IKARUS Security Software GmbH Page 48 CHKARUS security manager 5 2 Properties Page The Properties Page window Figure 5 17 provides a quick overview of the IKARUS anti virus Configuration a client or group uses and when and how updates are is sued for this client or group You can set these settings client wide or group wide and let a group s clients inherit settings from the parent level If you choose to inherit settings for a group you will be asked if you also want the clients in that group to inherit the settings on the contrary if you choose to remove the inheritance settings of a group you will be asked if you want to remove the inheritance settings from the clients in that group as well 5 2 7 1 Update Section In the Update Section you can specify when and how updates are performed If you disallow binary updates only virus and spam databases will be updated the IKARUS anti virus will not If you for any reason want to hide the IKARUS anti virus system tray status notifications e g on a computer used for presentations where pop up windows would otherwise distract the audience enable the Disable system tray Status Notifications checkbox 5 2 2 Rights Management The Rights Management section is useful for clients that are outside the domain of
9. Page 57 HKARUS Bam security manager KARUS virus utiities Configurations Il i Enables automatic p search Logs Extras Automatically installs product updates Ke S utormal cally Install product update automatically Enables disables use oe of a proxy server Proxy Settings Server Fort fa Useriame Pasword Proxu server port The password for the proxy server if need ed Proxy server address The username for the proxy server if need ed Figure 5 24 Configuration Update tab 5 2 11 5 Dial Up Connections If you still have a modem or dial up connection in place you can set the connection set tings on the Dial Up Connections tab The Modem connection tab allows for setting the autodial function for updating the IKARUS anti virus You can specify a period of time during which AutoUpdate will automatically connect to the Internet if dial up connection is selected 2012 IKARUS Security Software GmbH Page 58 CHKARUS E TR security manager KARUS virus utilities Configurations Enter the dial up or Exclusions Logs Extras Anti Spam Scans B modem connection General eMail Update Dial Up Connection name here Please enter the desired modem dial up connection Enables automatic dial T ing Activate automatic dialing Automaltizally estalh Internet tonnedinn between 15 On and reog 00 Se MIE Nie eie when the connection is automatically estab
10. User Settings EEN Figure 4 6 Server Installation Network SettiNGS EEN Figure 4 7 Server Installation Database Gettinges AE Figure 4 8 Server Installation Select Installation Folder ae Figure 4 9 Server Installation Confirm it te e Le Figure 4 10 Server Installation Installation Complete ss ss Figure 4 11 UI Installation Welcome EE Figure 4 12 Ul Installation License Agreement Figure 4 13 VI Installation Select Installation ee Figure 4 14 Ul Installation Confirm Installation esse EE EE ee Figure 4 15 Ul Installation Installation Complete ss ss ee ee ee TUE TU e EE VE UT N Figure 5 3 NNN Figure LIE SJ GERE EE Figure 5 5 U User Interface Kvernberg UNN Figure 5 UI Directory NT avden AVENUE FOUE UV NET TUE Ne AUTEN TN FNCU JE EE WIS IGT EE Figure VENN TUE NNN TENNE Figure 5 16 UI Overview PAAE ee Figure 5 1 7 Ul Properties Page EE Figure 5 18 UI General Page on Groups MR EE OE OE EE Figure 5 19 UI General Page on Clients hr ATEN TE Figure 5 21 Ul IKARUS anti virus Contfigurotions EEN Figire 5 22 e leie Le In rel Ba e EEN Figure 5 23 TEN Figure 5 24 COnMOURATION WOGOLS TAD EE Figure 5 25 Configuration Dial Up Connections WD DEE Figure 5 26 Configuration Exclusion tab File ele E Figure 5 27 Configuration Exclusion tab Process exclusion E er Figure 5 29 Oes elke ie ads TN EE EE EE Ed Figure E e ee Le Ee ele Ai Bar TO ass EE GR EE EG RE seas Figur
11. lished Download all available updates by dial up and exit dial up connection when finished For already established dial up connections there will be neither connection attempt initiated nor will any active connection be closed after download completion Figure 5 25 Configuration Dial Up Connections tab 5 2 11 6 Exclusions On the Exclusions tab you can select files and process that will be excluded from the IKARUS anti virus scan This is useful when you want to exclude a service from the scan that is already using a considerable amount of the system resources e g MP3 holiday photos etc or if you do not want to scan a specific directory If you have set environment variables for specific folders drives you want to exclude system wide use this function rather than specifying the path If the path is different on every host the IKARUS anti virus will exclude the correct path Use Ctrl Spacebar in the textbox to display all environment variables of your current system i e the system where the user interface is installed 2012 IKARUS Security Software GmbH Page 59 HKARUS EE security manager IKARUS virus utilities Configurations Enables or disables file scanning for files bigger than the specified size Please select which files processes are excluded from scanning L Do not scan files bigger than i Adds paths and envi ronment variables on File Exdusion s Process Exclusion s the
12. the IKARUS security manager Server Since the IKARUS security manager Server needs appropriate rights to establish a connection and execute binaries remotely you can specify credentials having the appropriate rights on this client to perform these operations 2012 IKARUS Security Software GmbH Page 49 HKARUS mar security manager 5 2 7 3 Layout Node Inherit Settings Shows the name and status icon Inherits disinherits settings from the of the current node parent node Inheritance is saved automatically e g you do not need to click the Save button Prope ties IKAURS anti virus Configu ration Sample Sets the configuration this client is using Please note that changes take effect only after the client fs successfully administrated Update Time Choose the time span in which I Inherit Settings updates are performed IKARUS virus utilities Configuration Allow Binary Updates Allows updates to the IKARUS Sample Configuration anti virus binaries Databases will still be updated if binary updates are disallowed Update 0000 00 00 Disable system tray Status Notifications Prevents the IKARUS anti virus T Allow Binary Updates tray status notifications to pop up I Disable system tray Status Notifications Get Updates from External Get Updates from External Servers Servers Allows IKARUS anti virus to down load updates from the Internet should the ISM be unable to provide updat
13. to the left hand list Applies all changes This button is only enabled when you choose an appropriate number of clients Renew License PE EE List of all clients that will Opens the registration window ea be removed from admin see section 71 istration Figure 5 4 UI License Violation 2012 IKARUS Security Software GmbH Page 33 HKARUS security manager You may cancel this process but will not be allowed to login to the IKARUS securi ty manager Ul until you solve this issue The clients will still be administered and pro tected by the IKARUS security manager Server if you cancel this process If you need to purchase new licenses or have any questions concerning your license please feel free to contact our sales team at sales ikarus at 2012 IKARUS Security Software GmbH Page 34 CHKARUS a security manager 5 2 The User Interface The layout of the IKARUS security manager UI can be customized Each window can be docked or undocked and moved anywhere on the screen The window layout will be stored upon closing the IKARUS security manager UI Figure 5 5 UI User Interface 2012 IKARUS Security Software GmbH Page 35 HKARUS BENN security manager 5 21 Directory The Directory Figure 5 6 is the center of almost all client related operations It holds the clients of your Active Directory and the clients you manually add e g clients that exist ou
14. 28 lt HKARUS security manager 4 3 Upgrading a Legacy IKARUS Security Manager X Version to the New IKARUS securi ty manager A legacy version of IKARUS Security Manager X will automatically upgrade to the new IKARUS security manager This requires to enable silent updates see section 5 2 12 4 After the upgrade is complete the installation path is unchanged but the directory struc ture contained in will have been rearranged and binary filenames will have changed Therefore you might need to create new firewall rules as appropriate When the upgrade has been completed successfully the database will assume the new Structure and layout During the upgrade a backup of your old database named ISMX_DATABASE_BACKUP bak will be created in the log folder of your installation 2012 IKARUS Security Software GmbH Page 29 OIKARUS security manager 5 The IKARUS security manager UI 5 1 Login When launching the IKARUS security manager Ul the first window to be displayed is the Login window Figure 5 1 You will be asked for credentials and the server to con nect to i e the server where the IKARUS security manager Server is installed The default CP port the connections are established with is 9887 for the IKARUS securi ty manager Server to IKARUS security manager Ul communication and 9888 for the communication between the IKARUS security manager Server and the IKARUS an ti virus clients You can chan
15. GB RAM e Screen resolution 1024 x 768 or higher e Approx 500 MB of disk space depending on the log volume and the down load cache size e Internet connection Software Requirements e Windows 2003 Server or later 32 bit 64 bit e Windows XP or later 32 bit 64 bit e MSSQL Server Express 2005 or later does not need to be installed on the target machine e Active directory Microsoft Windows Domain structure 2012 IKARUS Security Software GmbH Page 11 CHKARUS EE security manager 41 2 Welcome Click Next to read the license agreement i Fi IKARUS security manager Server Welcome to the IKARUS security manager Server P Setup Wizard lt gt The installer will guide you through the steps required to install IKARUS security manager Server on pour computer WARNING This computer program is protected by copprght law and international treaties Hirnant thorized duplicator ar distribution l this program or any portion of it man rezulti In Severs evil ot Criminal penalties and wl be proseculed t o the masimum extent possible under the ET Figure 4 1 Server Installation Welcome 2012 IKARUS Security Software GmbH Page 12 HIKARUS EE security manager 4 1 3 License Agreement The licensing conditions must be accepted to install the IKARUS security manager Server i ie IKARUS security manager Server License Agreement gt Please take mome
16. IKARUS Security Software GmbH Page 3 lt HKARUS security manager 1 About IKARUS As one of the first antivirus software providers IKARUS is both a pioneer and a vibrant fast growing company For more than 25 years IKARUS software has been a name you can trust to provide outstanding antivirus protection and content security The development team recruited UNIX and Microsoft specialists as well as former em ployees from universities and research institutes Through its numerous cooperation arrangements and special agreements with IT security experts IKARUS is able to pro vide up to the minute information and responses in all areas relating to security soft ware Our products range from simple yet highly effective antivirus protection IKARUS an ti virus to sophisticated software for networks and gateways IKARUS securi ty manager IKARUS security proxy all the way to IKARUS web security and IKARUS my mailwall a high end managed security product that protects your network from vi ruses before they strike 2012 IKARUS Security Software GmbH Page 4 HKARUS security manager 2 Introduction Thank you for choosing the IKARUS security manager the simple and inspired solu tion that always provides the computers on your network with the latest virus and spam database updates and IKARUS anti virus versions Basically IKARUS securi ty manager distributes the databases and updates from a central point to th
17. Updates the modification tion happened setting was modified change log list Ch nge Log X pa mes je dd Ed ED EE Ek CHANGE DB CONFIG ismx ITIL log changeprocess no 29 12 2011 11 44 07 UTC 2 CHANGE CONFIG FILE config serverport 9887 9886 29 12 2011 11 45 46 UTC Old Value New Volue Timestamp Comment Shows the value before the Shows the value after the Shows when the value Shows the modification modification modification happend comment en tered at the login process Figure 5 15 UI Change Log 2012 IKARUS Security Software GmbH Page 47 a MK AF RUS 1 security manager 5 2 6 Overview Page The Overview Page window Figure 5 16 aggregates general information on the IKARUS security manager Server and statistical information on the clients in the Di rectory 5 2 6 1 Layout Refresh Update information on this page Overview Page System Overview This section aggregates general information about the server and statistical data about the dients it administrates Server information Displays information about the ISM Server version and the host it is running on License Information Displays the expiration date and how much of your license capacity is used and free Update Overview This section provides an overview of the versions that the ISM Server has to its disposal for distribution IKARUS virus utilities Version 2 0 74 T3 Version 1 1 109 VDB Build Number
18. file exclusion tab Ch C Program Files x86 This is a list of already selected paths environment vari ables If you are not sure whether there is an Environment variable for a path click Generalize Paths C Program Files x86 ProgramFiles x86 Iv CH HOMEDRIVE v V Select All och Cancel Check if you want to apply the change The path you entered The path replaced with environment variables Figure 5 26 Configuration Exclusion tab File exclusion 2012 IKARUS Security Software GmbH Page 60 HKARUS E security manager IKARUS virus utilities Configurations 10 x General eMail Update Dial Up Connections Exclusions Logs Extras Anti Spam Scans Exclusions Please select which files processes are excluded from scanning V Do not scan files bigger than E MiB Add processes here File Exdusion s Process Exclusion s that should not be scanned Add explorer exe ism exe firefox exe Figure 5 27 Configuration Exclusion tab Process exclusion 5 2 11 7 Logs On the Logs tab the administrator defines actions that will be logged in the IKARUS anti virus KARUS virus ulilities Configurations General aMail Update Logs the system super Exclusions Logs Etras Anti Spam vision to the IKARUS anti virus main log 7 Record logs for scans se Enable if logs should be Fast daten sann geg written for the scans Record all data when sc
19. it man rezulti In Severs evil ot Criminal penalties and wl be proseculed t o the masimum extent possible under the ET Figure 4 11 UI Installation Welcome 2012 IKARUS Security Software GmbH Page 24 HIKARUS EE security manager 4 2 3 License Agreement The licensing conditions must be accepted to install the IKARUS security manager Ul i Fi IKARUS security manager UI License Agreement gt Ge take a moment to read the license agreement how Ik you accept the terme below click IKARUS SECURITY SOFTWARE LICENSE AND MAINTENANCE AGREEMENT Please read this agreement carefully By installingthe delivered software you agree to be bound by the terms and conditions of the acreem ent below If you do not agree ta these terms and conditions terminate the installation procedure and da nat use the dellveren Ed af Ef JR TAS Fi Lake EN be 4 dl es EF vd ra dT e Fag ak 2 Ae dm LE vs pa or ER de N ay arien va mm il ad ha C Do Not Agree Figure 4 12 UI Installation License Agreement 2012 IKARUS Security Software GmbH Page 25 HIKARUS EE security manager 4 2 4 Selecting the Installation Folder In this dialog you can choose the destination folder to install the IKARUS securi ty manager UI files to i My IKARUS security manager UI Select Installation Folder oe The installer wil install IKARUS security manager UI to the following folder To install
20. reli ably detected System Partition This preset scans the drive where your operating system is installed All archives directories folders and files on this drive will be scanned by IKARUS anti virus 2012 IKARUS Security Software GmbH Page 64 HIKARUS EE security manager Entire Host IKARUS anti virus will scan all drives on your computer Removable media All external drives such as USB sticks and CD ROM drives will be scanned KARUS virus utilities Configurations Generel smal JI Update DiskUp Connections Exclusions Logs Extras Anti Spam Scans List of scan profiles Please configure the scan profiles Profile Name FA Removable Media System Partition Fast System Scan RAA Edit scan profile Add a new scan profile Figure 5 32 Configuration Scans tab Click Add Scan Profile to configure a custom scan profile You can enter any name for the scan Click Browse to select the folders or files to scan You can also set the pro gram to perform an automatic scan where required The automatic scan can be scheduled for any time for example every Friday 12pm The scan will be performed only for those areas selected by the user 2012 IKARUS Security Software GmbH Page 65 HKARUS mm security manager IKARUS virus utilities Configurations Scans LA 2 e me TE gg mi r bi PI d We ope si ALI II TE teil e e fe Re LA ESE EIS ak RI TT Ee EE
21. will be deleted irrevocably Cleaning up the database from unused hosts licenses that were assigned to the se lected hosts may be given free This dialog is available under Tools gt Clean host entries from database 2012 IKARUS Security Software GmbH Page 1 HKARUS mm security manager 5 2 14 About Dialog 5 2 14 1 Layout About IKARUS security manager x Zukapuer security manager Renew License Renew License Opens the Registration window for choosing a new license Figure 5 38 UI About Dialog 2012 IKARUS Security Software GmbH Page 72 Verion iniornaiion Displays the ISM UI ISM Server and Updater versions License Information Displays the expiration date and how much of your license capacity is used and free HKARUS BEN security manager 5 2 15 The Menu Bar The menu bar Figure 5 39 is located at the top of the IKARUS security manager Ul main window The menu bar includes the following sub menus e File Menu Figure 5 39 e View Menu Figure 5 40 e Tools Menu Figure 5 41 e Help Menu Figure 5 42 5 2 15 1 File Menu File Update ISM F6 Logout Ctrl Alt F4 Exit Alt F4 Update ISM F6 Exit Ali F4 Invokes an update process of Ouits the current session and the ISM server the ISM Ul Figure 5 39 UI Menu Bar File Menu 2012 IKARUS Security Software GmbH Page 3 Logout Ctrl Alt F4 Quits the current sess
22. 1 Layout IKARUS security manager Registration Please renew your License by clicking on License File if you have an Activation Coda please click on Activation Key and fill out the form correctly For any further questions contact us vie supportitikarus at or under 43 01 589 95 D License File Opens a file browser where you K j License File can choose the IKARUS license file you want to use Ti Activation Key Activation Key Opens the activation window see section 7 2 Figure 7 1 UI IKARUS security manager Registration 7 2 Activation Key If you have an KARUS Activation Key rather than IKARUS license file you may obtain a valid license from the License Activation window Figure 7 2 Provide the information requested and submit your data Upon successful submission of your data you will get an e mail with your license file attached to the specified address 2012 IKARUS Security Software GmbH Page 8 HKARUS BENN security manager 7 21 Layout Obligatory information to be entered in order to complete the license activa l tion process a x IKARUS security SR er LL Aclivation of nf product is licensed Activation Key TTT Title mr Please fill in this form AE First Name del atnm en leg Street PT TT No Zip Code TT ee TTT Country United States v Cal iren Tdephaneamber T Fields marked with ar
23. 2 3 Virus List The Virus List window Figure 5 12 is useful for investigating the infections on your network You can view all infections found or just those on the node currently selected in the Directory 5 2 3 1 Layout Date The date the infection was found Client Specific Shows infections of all clients if enabled otherwise only those of the currently selected node in the Directory see Section 5 2 1 Virus List Client Specific Virus Description The name of the infec tion Clicking will open the virus dictionary for this particular infection Path The directory the infection Was found in Filename The filename of the infection The total amount of infections shown in the list BE ae ee EE Lee SUW PAAR ik local Shows the status of the client see Section SAAS Is Active Ignore this Select All De Selects all entries Virus Dictionary Opens the virus dic tionary entry for the infection Figure 5 12 UI Virus List 29 12 2011 09 41 11 UTC eicar_com Copy zip c b h e SUW PAAR ik local 29 12 2011 09 41 15 UTC eicar com zip EICAR ANTIVIRUS TESTFILE c b h EICAR ANTIVIRUS TESTFILE Temporary Unblock Save amp Delete g Purge System Hostname Shows the name ofthe len Purge System Deletes the se lected infections of the list Refresh the virus list Temporary Unblock Releases the file from quarantine Save amp Delet
24. 5 10 UI Pending Tasks 2012 IKARUS Security Software GmbH Page 42 HIKARUS Bal security manager 5 2 2 2 Task States Action on Resolving in progress only been processed yet soon Ed Waiting The action has been Will retry to reach target launched at least once clients but the target clients were not reachable Cl ties BZ cessfully processed only Not processed The action was not Evaluates the task state processed because only the user canceled the task Processed with an error The action was pro Evaluates the task state cessed but there was only an error during the action 5 2 2 3 Task Details Refresh Retrieves an updated host and task list Retrieves an updated host list hosts which are tar automatically based on the user geted in this task defined update Interval Shows the amount of JL Hostname geg Host State TA Cient domain Cancelled Update Inte rval Shows the status of Sets the update interval the target host see of the host list Section 5 2 1 3 Hostname Shows the name of the Host List target host J List of all target hosts Result TOLAS Shows the result of the Forces the completion task Right click will open of the task on this host the context menu Cancel Cancels the completion of the task on this host Figure 5 11 UI Task Details 2012 IKARUS Security Software GmbH Page 43 HKARUS mar security manager 5
25. Deployment Settings To distribute the IKARUS anti virus on your network the IKARUS security manager Server needs a place to store the binaries used for installing the IKARUS virus utilties For that purpose you will need to set up if you have not done so already a network share where all clients you want to install the IKARUS anti virus on have at least read access to For further information about the IKARUS anti virus deployment refer to the Software Distribution and Shared Directory sections i Fi IKARUS security manager Server Deployment Settings M gt The ISM Server needs anetwork share for holding the binaries which are used to deplay IKARUS vius utilities to it s clients Please select one of the already defined local shares or choose anew Location from Network z Local shares C Browse Figure 4 4 Server Installation Deployment Settings 2012 IKARUS Security Software GmbH Page 15 HKARUS E security manager 4 1 6 User Settings The IKARUS security manager Server is installed as a service Services can be in stalled with the local system accounts or a user account within your domain Since the IKARUS security manager Server needs appropriate rights to perform a binary execu tion remotely it is highly recommended to install the IKARUS security manager Server service with a user account which is allowed to administer the domain i Fi IKARUS security manager Serve
26. S support hotline i My IKARUS security manager Server Installation Complete IKARUS security manager Server has been successfully installed Click Chase bo eut Figure 4 10 Server Installation Installation Complete 2012 IKARUS Security Software GmbH Page 21 HKARUS security manager 4 2 Installing the IKARUS security manager UI To launch the installation of the IKARUS security manager Ul double click the Setup ISM Ul _xxxx file where xxxx represents the version number 2012 IKARUS Security Software GmbH Page 22 OHKARUS security manager 4 21 System Requirements Hardware requirements e x86 based PC with 2 GHz or better e 1 GB RAM e Screen resolution 1024 x 768 or higher e Approx 20 MB of disk space ef AN connection Software requirements e Windows 2003 Server or later 32 bit 64 bit e Windows XP or later 32 bit 64 bit e NET framework 4 0 2012 IKARUS Security Software GmbH Page 23 CHKARUS EE security manager 4 2 2 Welcome Click Next to read the license agreement i Fi IKARUS security manager UI Welcome to the IKARUS security manager UI v Setup Wizard The Installer wil guide you through the steps required to install IKARUS Security manager Ul on your computer WARNING This computer program is protected by copprght law and international treaties Hirnant thorized duplicator ar distribution l this program or any portion of
27. User manual for the IKARUS 2012 IKARUS Security Software GmbH OIKARUS security manager NEE ei Re KEE 4 2 NR PN NN 5 3 THEIKARUS SECURITY MANAGER EE 6 3 1 THE IKARUS SECURITY MANAGER SERVER sccscsccscsccsccccsccccccsccccsccccscccsccescecescccscccsscescesesccees 7 3 2 THE IKARUS SECURITY MANAGER UI sesse sees ese ses ese se se seed ee ee ee ese ee ee ee ee see ee ee ee ee ee Ge Ge ee ee 8 4 INSTALLING THE IKARUS SECURITY MANAGER sesse sesse sesse sesse sesse sees ese se ese se ee ee see ee ee 9 4 1 INSTALLING THE IKARUS SECURITY MANAGER SERVER sccccscsccccccscsccccccscsccccccscscescccecscesessecs 10 GE RENE KE 11 ON E sce EE gan cs ech EE EE EE EE 12 EE SNE EE EN 13 PETN Ee 14 MG PR VNR 15 ee VERN Re RE GE Oe E EE SE ee ee be ED EE ee 16 7 NETWORK NNN ee ee 17 2112 ENE ETTIN er 18 41 9 SELECTING THE INSTALLATION FOLDER sessvennnennvnnnnvnennnnnnnnnnnnnnnnnnnnenennnnnnnnnnnnnennnnennennnnnnenennnenenne 19 EE SSN INE TALA eege 20 4 1 11 NEER Ne E ON LET Ee OE AA 21 4 2 INSTALLING THE IKARUS SECURITY MANAGER Ul cscscsccscscsccccscscsccccccscsccssccscscescccscscssessecs 22 Al FAEN 23 TVEN 24 2 9 SEE EEE cease EG ee GEE EE ee 25 ADA SELECTING THE INSTALLATION eebe 26 NNN 27 A26 NTN ME 28 4 3 UPGRADING A LEGACY IKARUS SECURITY MANAGER X VERSION TO THE NEW IKARUS SECURITY E TEEN 29 5 THEIKARUS SECURITY Te CAE 30 ET ON 30 TL ENN 31 SA2 NNN 32 NE NE 33
28. a security manager 5 2 1 IKARUS anti virus Configurations The IKARUS anti virus Configurations window Figure 5 21 lists all available IKARUS anti virus configurations and the clients that use them You can edit a configuration by clicking the Edit selected Configuration button or double clicking the configuration you want to alter For further information about the IKARUS anti virus configuration and the various settings refer to the IKARUS anti virus manual 5 2 11 1 Layout Export se lected Con figuration Edit Delete se selected lected Con Configuration figuration Import Con figuration Add Configu ration IK RUS v rus utilities Configurations FT D X EG PE Sample Configuration 1 List of all available configurations Shows or A Cients that use this configuration hides a list of all clients that Sample Computer 1 det or ell ellis use the se ents that use the selected lected config uration configuration Figure 5 21 UI IKARUS anti virus Configurations 5 2 11 2 General On the General tab of the IKARUS anti virus Configuration dialog all necessary pro tection settings can be enabled or disabled The configuration can be saved by clicking the OK or the Save button and the changes can be discarded by clicking the Cancel button Clicking the OK or Cancel buttons will also close the IKARUS anti virus Config 2012 IKARUS Security Software GmbH Page 55 lt HKARUS rm
29. anning 7 Activate lag file overwrite Enable if all data Should be recorded An existing log will be overwritten when a new scan is started Figure 5 28 Configuration Logs tab 2012 IKARUS Security Software GmbH Page 61 HKARUS E security manager 9 2 11 8 Extras Use the Extras tab to restore the defaults of the IKARUS anti virus and to enable sys tem protection for the startup processes of your operation system IKARUS virus utilities Configurations SE E 1 jo dE Start system protection General aa Update Diakup Connections on startup Exclusions Logs Extras Anti Spam Scans Restore the IKARUS anti virus default con figuration fa sel see Figure 5 29 Configuration Extras tab 5 2 11 9 Anti Spam The IKARUS Anti Spam Module allows for filtering e mail received in Outlook Outlook Express or Windows Mail Click the Activate Anti Spam option in the settings of IKARUS anti virus to enable spam protection The Anti Spam Module will be enabled after the subsequent program restart For configuring spam evaluation click the yellow and red controls yellow indicates possible spam and red indicates spam At the bottom you can choose the action to perform when receiving spam mail Mark e mail with a Possible Spam label in the subject line or Move mail to the junk mail folder of your mail client E mail considered possible spam will always be labeled in the subje
30. are taken not taken from the parent node These actions will be applied to the currently selected node of the Figure 5 7 UI Directory Toolbar 2012 IKARUS Security Software GmbH Page 37 HKARUS EE security manager 2 The Group Client Tree pa Ze labor local E fr MANUAL E VI manual group f manual computer Group node Right click will open the context menu Client node Selected W Not selected Add Group Add Computern Becr i Rename 5 Add Group Start IKARUS anti virus Add d e W Delete Save IKARUS anti virus Configuration ai eae LA Start IKARUS virus utilities Administrate Exclude al Save IKARUS virus utilities Configuration from administration EE Allows prevents updates and dminetrate system protection GY Inherit Settings Administrate Exclude from o po not Inherit Settings Se eete forced NW NEE gnores administration from H Collapse another ISM ig Expand ss O Inherit Settings Do not l J Install virus utitities Inherit Settings Fa Update dient Settings are taken not taken from the parent node _ Uninstall virus utitities Collapse Expand Install IKARUS anti virus Update client Uninstall IKARUS anti virus These actions will be applied to the currently selected node of the tree These actions are only available on nodes within the Manual group see section 5 2 1 4 for more infor
31. ating the root cause of a problem Alternatively you may use the search field to step through the Log File 5 2 4 1 Layout Refresh Retrieves an updated log file from the ISM server Alert Shows or hides alerts Automatic Refresh Retrieves an updated log file from the ISM server automati Warn Shows or hides warnings eq erte On ine User 2 defined update interval Info Pie Seil Sh DEE Ges Scrolls to the bottom of the log ONE ONE ION file on automatic refreshes E Log File Aert i Warn 9 info 14 12 2011 16 03 23 info Done 14 12 2011 16 03 23 info Query directory service 14 12 2011 16 03 33 info Hosts structure rebuilt A Q O fase scat update weg EL oS Search field Find Update Interval Set a case insensitive Select and jump to Set the interval at which the search pattern the next match log file should be updated Select all Select all text in the log file Log file text Right clicking will open the context menu Copu to Clippoard Copy the current selec tion to the clipboard Figure 5 14 UI Log File 2012 IKARUS Security Software GmbH Page 46 HKARUS mar security manager 5 2 5 Change Log The Change Log window Figure 5 15 provides an overview of the changes a user made to settings and when they have occurred 5 2 5 1 Layout Id Category Field Id Refresh Identification number of the Shows where the modifica Shows which particular
32. bH Page 8 lt HKARUS security manager 4 Installing the IKARUS security manager In this chapter you will be guided through the installation process of the IKARUS secu rity manager The setup is split into two separate installation processes the IKARUS security manager Server setup and the IKARUS security manager UI setup Both set up processes will automatically check your target system for installed prerequisites needed for the application to run and will optionally install missing software require ments automatically before the actual installation of the IKARUS product is started Note that a restart of the target computer may be required during the installation of missing prerequisites In this case the setup process will automatically continue after a success ful restart of the computer Note To install the Server and the Ul you need administrative rights If the User Access Control feature is enabled launch setup using the Run as Administrator command 2012 IKARUS Security Software GmbH Page 9 HKARUS security manager 4 1 Installing the IKARUS security manager Server To launch the installation of the IKARUS security manager Server double click the Setup ISM server _xxxx file where xxxx represents the version number 2012 IKARUS Security Software GmbH Page 10 HKARUS I security manager 4 1 1 System Requirements Hardware requirements e x86 based PC with 2 GHz or better e 1
33. ct line but will re main in the inbox of your mail client 2012 IKARUS Security Software GmbH Page 62 lt IKARUS BE security manager Enable the Anti Spam module Spam assessment Anti Spam Action Mark Mail Move Mail Opens the Advanced di Spam Protection dialog Figure 5 30 Configuration Anti Spam tab Advanced Spam Protection This option allows for configuring your own spam filter You can define spam rules for senders recipients subjects and contents 2012 IKARUS Security Software GmbH Page 63 HKARUS HE security manager E mail Section Content to parse for Type of e mail Sender recipient subject Regular mail possible spam content spam Click to enable ad e vanced spam protection IKARUS virus stilities Configurations Advanced Spam Protection sende REGULAR MAIL ETE Es Te Panty Sender max mustermann REGULAR MAIL SI r List entry e mail type List entry e mail section List entry content Move to Bottom Delete Advanced Spam Protection Figure 5 31 Configuration Advanced Spam Protection 5 2 11 10 Scan You can configure the scan to be performed automatically or launch the scan manually in IKARUS anti virus You can manage and add as many scans as required Preset scans Fast System Scan Scans the Windows installation directory The majority of malicious programs such as viruses and Trojan horses are located in this directory and are quickly and
34. e Creates a backup of the infected file and deletes the original Right clicking an in fection entry will open the context menu BIENE Opens the detail view for this infection see Section 5 2 3 2 Send to IKARUS Virus Lab Sends the infection to IKARUS for analysis 2012 IKARUS Security Software GmbH Page 44 HIKARUS EE security manager 5 2 3 2 Virus Information The Virus Information window Figure 5 13 displays useful information about a particu lar infection You can copy the information to the clipboard by clicking the Copy to Clip board button Virus information Date Time 25 10 2011 13 22 53 UTC Filename 53141355 NS bk Source Path co Usersiloran ppDatalLocallTemp FindSigs 25 October 2011 15 22Vtmp scan Filesize 0 85 KIE Name TroianlS amp Agent Signature Id 63141356 Figure 5 13 UI Virus Information 2012 IKARUS Security Software GmbH Page 45 HIKARUS Bl security manager 5 2 4 Log File The Log File window Figure 5 14 provides useful information on the background actions performed by the IKARUS security manager Server If you encounter unusual behavior or any kind of problem the Log File window Figure 5 14 is an easy way to access the IKARUS security manager Server log from anywhere using the IKARUS security manager Ul In addition you can narrow the information to be displayed Alerts Warnings or just information This simplifies investig
35. e 5 31 Configuration Advanced Spam Protection E Figure 5 32 SO CIF scans ele ME EE IE EE EO EE EE EE AE TETTE ai N N E Figure 5 34 Ul IKARUS security manager Settings General esse ss ss O 2012 IKARUS Security Software GmbH Page 87 lt HKARUS security manager Figure 5 35 Ul IKARUS security manager Settings Figure 5 36 Ul IKARUS security manager Settings Figure 5 37 Ul IKARUS security manager Settings Figure 5 38 UI About Ee e Figure 5 39 Ul Menu Bar File Mem Figure 5 40 Ul Menu Bar View Menu Figure 5 41 Ul Menu Bar Tools Menu Figure 5 42 Ul Menu Bar Help Mem Figure 5 43 NTN Figure 7 1 UI IKARUS security manager Registration E Mail Notifications ese en EES EE Figure 7 2 Ul IKARUS security manager License Activation ees sesse see ee EE Figure 8 1 Software Distribution Installation process 2012 IKARUS Security Software GmbH Page 88 HKARUS security manager 11 Glossary IKARUS antivirus The IKARUS virus utilities will be renamed to IKARUS anti virus in 2012 This is why the new name of the product is already used in this document Windows service A Windows service is an executable designed for running in the background without user interaction Windows services can be set up to automatically start at boot time Windows ser vices can be installed either using a user ac count available on you
36. e IKARUS security manager and the IKARUS anti virus on your network is established via TCP using 9887 as the default port number That port can be modified in the Config File of the IKARUS security manager Server Since the IKARUS security manager Server needs to perform executional tasks re motely on computers on your network it needs appropriate rights Therefore we highly recommend installing the IKARUS security manager Server service using a user ac count with administrative rights for your domain This will ensure that the IKARUS secu rity manager Server is allowed to install and administer the IKARUS anti virus on com puters within the domain on your network For further information about this topic and the administration of computers outside your domain please read the Software Distri bution chapter 2012 IKARUS Security Software GmbH Page 7 lt HKARUS security manager 3 2 The IKARUS security manager UI The IKARUS security manager Ul provides the graphical interface to control the IKARUS security manager Server You can install the IKARUS security manager Ul on any computer you wish to control the IKARUS security manager Server from For more information about the layout and different windows of the IKARUS security manager Ul refer to section 5 2 Note You must run the Ul as an administrator otherwise the update of the Ul to a later version might fail 2012 IKARUS Security Software Gm
37. e comput ers on your network to save bandwidth download volume and above all administra tion time and costs 2012 IKARUS Security Software GmbH Page 5 lt HKARUS security manager 3 The IKARUS security manager The IKARUS security manager allows for installing updating uninstalling and configur ing the IKARUS anti virus on your network The IKARUS security manager consists of two separate applications the IKARUS se curity manager Server and the IKARUS security manager Ul Both can be installed and run on different computers separately from each other This separation allows you to control and maintain your network protection from anywhere you want anytime you want 2012 IKARUS Security Software GmbH Page 6 HKARUS security manager 3 1 The IKARUS security manager Server The IKARUS security manager Server is the core of the IKARUS security manager It is the part that actually does all the distributional and statistical work and also handles the communication between the IKARUS security manager and the IKARUS anti virus installed on the computers on your network The IKARUS security manager Server runs on a Windows server operating system as a service All of the settings and information the IKARUS security manager Server holds are saved in a MSSQL database which can but does not need to reside on the computer where the IKARUS security manager Server is installed The communication between th
38. e required for a successful registration Eed sd Submit Sends the information you entered to IKARUS Figure 7 2 UI IKARUS security manager License Activation 2012 IKARUS Security Software GmbH Page 79 HKARUS security manager 8 Software Distribution The installation and uninstallation processes for the IKARUS anti virus are subdivided into different steps To complete these steps successfully the following criteria must be met e The IKARUS security manager Server needs a shared directory Figure 5 34 set to place the binaries needed for a remote installation e The IKARUS security manager Server needs appropriate rights to remotely ex ecute binaries on the target client If the IKARUS security manager Server has been installed with a domain administrator account and the target client is on the Same domain as the IKARUS security manager Server no further adjustments need to be made for that client otherwise you need to specify credentials hav ing appropriate rights to launch executable files on the target client You can configure this on a clients Rights Management tab on the IKARUS securi ty manager UI e The target client needs at least read access to the user defined shared directory to retrieve the ismxstartup binary e The ICP communication ports need to be forwarded when using a firewall e The target client must meet the hardware and software requirements specified to operate the IKARUS anti
39. e the task 2012 IKARUS Security Software GmbH Page 41 HIKARUS mar security manager 5 2 2 1 Layout Pending Processed Shows or hides pending Shows or hides pro tasks cessed tasks Refresh Retrieves an updated task list Active Shows or hides active l 2 tasks Client specific Displays tasks from the currently selected Automatic Refresh Waiting node in the Directory if Retrieves an updated task list Shows or hides waiting enabled otherwise all automatically based on the user tasks tasks are displayed defined update Interval Pe iding Tasks x amp E Update interval 305 a w SET MANAGED FALSE 28 12 2011 13 08 10 UTC EI MANAGED FALSE 28 12 2011 15 26 58 UIC 60s G SET MANAGED FALSE 28 12 2011 13 15 29 UTC Neft Scheduled Resolve Time 28 12 2011 13 37 57 UTC ys Sub Task Selected NE EE NE SE Teele is Update Interval Shows the status of the Sets the update interval of the task list task see section 5 2 2 2 solve Time List of all available Double clicking an item will The date and time all tasks tasks open the detail view see will be resolved again Section 5 2 2 3 Right click will open Force Stop the context menu Forces the completion Stops the completion of of the task the task Restart All Restarts all subtasks Restart Incomplete Restarts only the in complete subtasks BIENE Opens the detail task view see Section Figure
40. er Sender The address from which the reports are sent Enable Authentication Enables or disables user authentication with the e mail server Username The username used to authenticate with the e mail server Password The password used to authenticate with the e mail server Available Reports Lists all available reports Add New Report Open the IKARUS securi ty manager Reports window see Section 5 2 12 3 HKARUS mm security manager 5 2 12 3 IKARUS security manager Reports On Virus Report Send report when a virus is found On Auto Add Report Send report when a computer is added to the LDAP automatically On Virus Report Day Report On Auto Add Report Report Type bene Sets the type of the report ISM Server Startup Report Send report on the set days Interval Report ISM Server Startup Report Send report as the server starts up Enable Report Interval Report Report Name Enables or disables Send report at the specified time Sets the name of the report sending of this report Scheduled Time IKARUS security manager Rep irts KS Sets the time the report is sent Report Name New Report Report Type Day Report Scheduled Time 00 3 00 Day Mask V Monday I Tuesday I Wednesday Thursday Enable Virus Report Friday J Saturday I Sunday Include virus information Day Mask Sets the days on which the report is sent Enable Version Report Report
41. es Rights Management The dient s connection credentials in case of the operation across Username Password domains Sets the credentials to be used for interaction with this client If the client is not in the same do Username main as the ISM server setting these credentials correctly is mandatory to ensure correct Password administrative behavior on this client The group the client must belong to in order to be allowed to alter Browse Directory Group the configuration and perform action on the virus list Opens the Directory Group If not specified no restrictions are made at all browser where you can choose the group the client will belong to Directory Group fai cl x to be allowed being administrat ed Delete restriction Removes a previously set Direc tory Group restriction save Cancel Discards any changes made Save Saves these settings Figure 5 17 UI Properties Page 2012 IKARUS Security Software GmbH Page 50 HKARUS BENN security manager 5 2 8 General Page on Groups The General Page window Figure 5 18 on groups displays statistical information about clients within the currently selected group node It provides you with an easy way to investigate the status of multiple clients in one place If you need to investi gate the status of multiple clients that are not in the same group you may use the Multi selection feature of the Directory 5 2 8 1 Lay
42. ge 17 HKARUS E security manager 4 1 8 Database Settings The IKARUS security manager Server needs a MSSQL database to store the settings configurations and the client information The database may reside on the computer where the IKARUS security manager Server will be installed If you want to specify a MSSQL database on a different computer click User defined connection and replace the SERVER string with SERVER SERVER_NAME Replace SERVER_NAME with the server name of the target computer where the MSSQL database resides If you already have at least one MSSQL instance installed setup will list the installed instances you can choose from If no MSSQL instances be installed locally you will be asked if you want to install Microsoft SQL Express 2005 or Microsoft SQL Express 2008 These programs are free of charge If the download process fails you may want to check the proxy server information you provided in the Network Settings dialog to ensure your Internet connection is working i ie IKARUS security manager Server Database Settings AA The SM Server needs a database Al already installed SQL Instances are listed in the box below You Can USE one of these instances or Vou Can define the connection string poursell oe ane EEN io Moe defined Se MSSULSERVER Standard Edition Figure 4 7 Server Installation Database Settings 2012 IKARUS Security Software GmbH Page 18
43. ge the ports in the Config File of the IKARUS securi ty manager Server IKARUS security manager IKARUS security manager Username root Password Server localhost D Port 5687 carca Has Logen to ISM Server Figure 5 1 UI Login 2012 IKARUS Security Software GmbH Page 30 HKARUS Ba security manager 5 1 1 Set Password At the initial login attempt you do not need to enter a password since you have not configured it yet Leave the Password field empty and click the OK button You will then be prompted to enter a new password for the specified user IKARUS security manager HKARUS E security manager Status Alo password cet Please spedity a password for the given user Figure 5 2 UI Set Password 2012 IKARUS Security Software GmbH Page 31 HIKARUS EE security manager 5 1 2 Change Management If Ask for Request for Change RIC ID is enabled in the IKARUS security manager Server settings see chapter 5 2 12 you will be asked to enter a request for change ID in the login window Figure 5 1 If Ask for comment on log in screen see chapter 5 2 5 is enabled you will be asked to enter a comment each time you try to log in This is useful if you want to track any changes made to settings and for indicating what you are going to do during that session IKARUS security manager 7 GIKARUS security manager Password
44. he IKARUS securi ty manager Server connects to to resolve the clients existing in your active directory If no lt dap gt section is found in the config file the IKARUS security manager Server will try to obtain the information from the domain controller The type of the LDAP configuration The name of the domain controller searchpath Specifies the domains to scan Domain levels are split with the dc Domain component keyword Example for a company local domain searchpath dc company dc local authmethod Describes the method used for authenticating with the domain controller If you do not want to authenticate with a specific user Specify anonymous here username Sets the username used for authenticating with the domain con troller Only required if the authentication method is not set to anonymous password Sets the password used for authenticating with the domain con troller Only required if the authentication method is not set to anonymous Sets the attribute to read Sets the criteria used on resolving the specified attribute 2012 IKARUS Security Software GmbH Page 86 HKARUS security manager 10 Table of Figures Figure 4 1 Server Installation Welcome Figure 4 2 Server Installation License Agreement Figure 4 3 Server Installation LDAP Settings ENEE Figure 4 4 Server Installation Deployment Settings ss ee EE ee Figure 4 5 Server Installation
45. in this folder click Next To install toca different folder enter it below op click Browse Folder E Program Files 28bVMEARUS secunty manager Diek Cost install IKARUS security manager LI for yourself or for anyone who uses this computer C Evemone Just me Figure 4 13 UI Installation Select Installation Folder 2012 IKARUS Security Software GmbH Page 26 HIKARUS EE security manager 4 2 5 Confirm Installation This is the final step before the IKARUS security manager Ul files are actually installed Click Next to start the copy process i iy IKARUS security manager UI Confirm Installation gt The installer is ready bo install IKARUS security manager Ul on your computer Chek Nest to start the installation Figure 4 14 UI Installation Confirm Installation 2012 IKARUS Security Software GmbH Page 27 HIKARUS EE security manager 4 2 6 Installation Complete Congratulations You successfully installed the IKARUS security manager Ul If a differ ent text is displayed in this dialog contact the IKARUS support hotline i My IKARUS security manager UI Installation Complete A IKARUS security manager l has been successfull installed Chick Close to exit Please use Windows Update to check for any critical updates to the NET Framework Figure 4 15 UI Installation Installation Complete 2012 IKARUS Security Software GmbH Page
46. ion and opens the Login window HKARUS Ea security manager 5 2 15 2 View Menu Overview Page Shows or hides the Overview Main toolbar Page see section 5 2 6 Shows or hides the Main toolbar see section Sene Directory Shows or hides the Directory see section 5 2 1 i General Shows or hides the General Page see section 5 2 8 5 2 9 Properties Shows or hides the Properties Page see section 5 2 7 Pending Tasks Shows or hides the Pending Tasks window see section ER 9 9 AS NS AS AS TEAS SS AS SS Virus List Shows or hides the Virus List see section 5 2 3 Log File Shows or hides the Log File see section 5 2 4 Change Log Shows or hides the Change Log see section 5 2 5 IKARUS anti virus Configurations Opens the VU Configurations Window see section 5 2 11 Restore Default Layout Restores the default window layout Figure 5 40 UI Menu Bar View Menu 2012 IKARUS Security Software GmbH Page 74 HKARUS BENN security manager 5 2 15 3 Tools Menu Options F12 Change Password Opens the Change Password window where you can set a new password for the ISM Opens the ISM Options win dow see Section 5 2 12 Change Language IKARUS Virus Dictionary Opens the Change Language Opens the default web brows window where you can select er and changes to the IKARUS a different ISM Ul language Virus Dictionary Changing the Ul language does not require a pr
47. mation Figure 5 8 UI Directory Tree 2012 IKARUS Security Software GmbH Page 38 HKARUS BEN security manager 3 The Filter Section Filter Applies a case insensitive filter by name Only nodes meeting the filter criteria will be dis played in the directory All active Infected inactive Overview of all clients that are infected Overview of all clients in your directory and all manually added clients Figure 5 9 UI Directory Filter 2012 IKARUS Security Software GmbH Page 39 Jump to Next Match Selects the next node match ing the filter pattern HKARUS security manager 5 2 1 3 Icons The icons of the nodes in the Directory provide a quick overview of the node statuses This node is a group This client is offline This client is online and has no IKARUS anti virus installed te This client is online has the IKARUS anti virus installed and is administered This client is online has the IKARUS anti virus installed and is not administered Overlaid This node inherits settings from its parent Overlaid This node or one of its children is infected 7 Overlaid This node or one of its children is outdated or administered but un reachable 5 2 1 4 Manual group The Manual group displayed as MANUAL in the directory is the bottommost group node in the root All node of the directory If you want to add computers from other domain
48. mbH Page 89 HKARUS security manager Network share Local Area Network Intranet Active Directory 7 Windows domain Directory Service Domain Controller 2012 IKARUS Security Software GmbH Page 90 In computing a shared resource or network Share is a device or piece of information on a computer that can be remotely accessed from another computer typically on a local area network or an enterprise intranet The access is transparent There is no difference between accessing a local or remote resource A local area network is a computer network that interconnects computers in a specific area such as a home a school a computer labora tory or an office building An intranet is a computer network that uses Internet Protocol technology for securely shar ing any parts of an organization s information or network operating system within that organ ization The Active Directory is a directory service de veloped by Microsoft for Windows domain networks It is part of the most Windows Server operating systems Server computers running Active Directory are referred to as domain controllers A Windows domain is a collection of security principals sharing a central directory database This central database known as Active Direc tory starting with Windows 2000 1 Active Di rectory Domain Services in Windows Server 2008 and Server 2008 R2 also referred to as NT Director
49. nt to read the license agreement how lEyou accept the terms below click Agree then Next Otherwise click Cancel IKARUS SECURITY SOFTWARE LICENSE AND MAINTENANCE AGREEMENT Please read this agreement carefully By installingthe delivered software you agree to be bound by the terms and conditions of the agreement below If you do not agree to these terms and conditions terminate the installation procedure and do not use the dellyered pe a ee ten i Fi Le nr bei 4 dl es E ee mf Eg ee dg Ed ae wa ae Pr ed dt N ey GE il ad Ka C Do Hat Agree Figure 4 2 Server Installation License Agreement 2012 IKARUS Security Software GmbH Page 13 HIKARUS EE security manager 4 1 4 LDAP Settings If the IKARUS security manager Server setup is unable to automatically read out and provide the necessary information about your LDAP configuration you may define the server name and credentials the IKARUS security manager Server should use for communicating with the LDAP server i Fi IKARUS security manager Server LDAP Settings eo The ISM Server needs Information about the LDAP itis connection to Please provide the following Information Server name llocalhost Credentials Username urarSdoman Password Conti Login annongmously Figure 4 3 Server Installation LDAP Settings 2012 IKARUS Security Software GmbH Page 14 HKARUS E security manager 4 1 5
50. ogram restart Figure 5 41 UI Menu Bar Tools Menu Note It is now possible to clean up the database from unused hosts by using the new dialog Clean host entries from database For further information on this dialog see section 5 2 13 5 2 15 4 Help Menu User Manual F1 Contact inormation i Opens the Contact Infor Opens this ISM User Manual EEN About IKARUS securi ty manager Opens the About dialog dis playing the ISM version and information about the license IN use General Business Terms Opens the General Busi ness Terms of the IKARUS security manager Figure 5 42 UI Menn Bar Help Menu 2012 IKARUS Security Software GmbH Page 5 HKARUS HE security manager 5 2 16 The Toolbar The Toolbar Figure 5 43 can be found at the top of the IKARUS security manager Ul main window right below the Menu Bar 5 2 16 1 Layout IKARUS security manager File View Tools Help IKARUS anti virus Configurations Opens the IKARUS anti virus Configurations window see section 5 2 11 for more information Figure 5 43 UI Toolbar 2012 IKARUS Security Software GmbH Page 6 lt HKARUS security manager 6 The Shared Directory The Shared Directory is the network share where the ismxstartup exe file will reside As this executable is required for installing the IKARUS anti virus on a client that par ticular client needs read access to that share and file Fur
51. out Node Total Number of Number of Cli Number of Cli Shows the name ee ents Online ents Guarded Administrated Shows the total and status icons Shows the total Shows the total Shows the total number of adminis of the current number of infections number of online number of guarded trated clients on the Cents on the cur Ceni en ine elle Current node node on the current node rent node rent node General xj Sample Group Total Number of Viruses 0 Number of Clients Online 0 Online Service Installed Number of Clients Guarded 0 Shows the Shows the service Administrated 0 online status installation status of of this client this client Clients TF name infections onfne service nstalled Administrated Last Update Last Time Online Sample Computer 1 0 D D N A N A KI N A N A Status Icon home Infections Administrated Last Update Shows the Shows the Shows the number Shows the admin Shows the date in status icons of name of of infections on this istration status of UTC of the last this client this client client this client update process on this client Last Time Online Clients Shows the date in Shows a list of UTC format of the clients in the current last time this client node was online Figure 5 18 UI General Page on Groups 5 2 8 2 Icons Red icon means No Green icon means Yes 2012 IKARUS Security Software GmbH Page 51
52. r User Settings Ar Please specify the user account the 15M Service will be installed with Altematively you can choose to install it with the local system account Install method E Local Sister Ce Credentials Username Administrator Password LT Tr Cortirn rosttpeesgeg Mote The user account the service will be installed with must have write access to the share path you specify to ensure the functionality of the IKARUS virs ublities deployment Figure 4 5 Server Installation User Settings 2012 IKARUS Security Software GmbH Page 16 HKARUS E security manager 4 1 7 Network Settings If you have set up a proxy server for your Internet connection you need to specify the correct settings for your proxy server to allow the IKARUS security manager Server to access the Internet The accuracy of the information you provide here is mandatory for an expedient use of the IKARUS security manager No Internet access means that no updates can be retrieved from the IKARUS update servers thus your network will be open to possible threats i Fi IKARUS security manager Server Network Settings A a Prosti Frou server Po cm MM I Usenciedennald Username Password Note Thel M service needs ta have access to the internet to ensure the update process functionality Figure 4 6 Server Installation Network Settings 2012 IKARUS Security Software GmbH Pa
53. r Windows network or a local service account Microsoft Structured Microsoft SQL Server is a relational database Query Language server developed by Microsoft Its primary function is to store and retrieve data as re quested by other software applications run ning on the same computer or a different computer on a network including the Internet Transmission Control The Transmission Control Protocol is one of Protocol the core protocols of the Internet Protocol Suite TCP is one of the two original compo nents of the suite and complements the nter net Protocol Therefore the entire suite is commonly referred to as TCP IP TCP provides reliable ordered delivery of a byte stream from a program on one computer to another pro gram on a different computer Internet Protocol The Internet Protocol is the principal communi cation protocol used for relaying datagrams packets across an internetwork using the IP Suite It allows for routing packets across net work boundaries and is the primary foundation of the Internet Lightweight Directory LDAP is an application protocol for accessing Access Protocol and maintaining distributed directory infor mation services over an Internet Protocol net work Proxy Server In computer networks a proxy server is a server i e a computer system or an applica tion acting as an intermediary for requests from clients seeking resources from other servers 2012 IKARUS Security Software G
54. read tion binaries in access to the the Shared Di Pooler Shared Directo JE ismxstartup E binary remotely as a service from the Shared Di rectory ismxstartup Retrieves the guardxup binaruy and executes it in the Windows temp folder Quardxup Retrieves and installs IKARUS anti virus bina ries Figure 8 1 Software Distribution Installation process 2012 IKARUS Security Software GmbH Page 81 security manager 2012 IKARUS Security Software GmbH Page 82 HKARUS security manager 8 2 Uninstalling the IKARUS anti virus To uninstall the IKARUS anti virus right click the client or group of the Directory In the opening context menu click the Uninstall antivirus item Figure 5 8 Note Uninstallation can be done administered clients only 2012 IKARUS Security Software GmbH Page 83 HKARUS security manager 9 Config File The Config File named ism conf exists in the conf directory of the installation destina tion selected chosen when installing the IKARUS security manager Server see sec tion 4 1 9 The MSSQL database connection information as well as the LDAP connec tion settings and the TCP ports used for the communication between the IKARUS an ti virus and the IKARUS security manager are configured using this file Sample Config file lt config gt dbconnstring DRIVER SQL Server SERVER localhost serverport 9887 clientupdateport 9888 l
55. s or from no domain at all this is the place to do so You can add rename re move and move nodes clients and groups 5 2 1 5 Multi selection You can select multiple nodes by holding the Ctrl key on your keyboard while click ing Consider multi selection a temporary group node which stops existing when multi selection is canceled e g by simply selecting a single item Actions and views availa ble for group nodes are also available for a temporary group 5 2 1 6 Administering Groups If you administer a group all children clients and subgroups will inherit from that group and binary updates will be automatically allowed for each client All clients within the group where the IKARUS anti virus are installed will be administered by your IKARUS security manager 2012 IKARUS Security Software GmbH Page 40 HKARUS security manager 5 2 2 Pending Tasks Actions such as installing the IKARUS anti virus or un administering clients are config ured as tasks on the IKARUS security manager Server Tasks are session specific and get lost when the IKARUS security manager UI login session is closed The Pending Tasks window Figure 5 10 displays all available tasks either client specific and for the whole Directory tree with their current states results and resolve times Consider the resolve time the date when the task state will be re evaluated Depending on the task State an action will be performed to resolv
56. s IV Enable Virus Report Enable Version Report Include version information Enable Client Report Enable Client Report a Sea Include client information Enable Server Report Add new Recipient Add Include server information Giele Add a recipient for the report Recipients Recipients List of all recipients of the report E Figure 5 36 UI IKARUS security manager Settings Reports 2012 IKARUS Security Software GmbH Page 69 security manager 5 2 12 4 Update IKARUS security manager Settings Xx Silent Update of the ISM TE Server Enables the automatic update of the ISM Server Proxy Server sets the proxy server through which the ISM Server is access ing the updates sie dU PROM Sets the port the connection is established through Username Sets the username for authenti cating with the proxy server if needed Password Sets the password for authenti cating with the proxy server if needed Figure 5 37 UI IKARUS security manager Settings Update 2012 IKARUS Security Software GmbH Page 70 HKARUS security manager 5 2 13 Dialog Clean host entries from database This dialog should only be used if hosts were manually deleted from the Active Directo ry In this case the deleted hosts may still be available in the database and this dialog provides a way to finally delete them from the database Please note that the selected hosts
57. stem that ac cesses a service made available by a server The server typically but not always exists on a different computer system In that case the client accesses the service over the network A fully qualified domain name sometimes also referred as an absolute domain name is a domain name that specifies its exact location in the tree hierarchy of the Domain Name Sys tem DNS The FQDN includes all domain lev els including the top level domain and the root zone A fully qualified domain name is distin guished by its unambiguity it can only be in terpreted one way A domain name is an identification string that defines a scope of administrative autonomy authority or control on the Internet Domain names are formed according to the rules and procedures of the Domain Name System DNS The Domain Name System is a hierarchical distributed naming system for computers ser vices or any resource connected to the Inter net or a private network It associates various pieces of information with domain names as Signed to each of the participating entities Most importantly it translates domain names meaningful to humans to the numerical identi fiers associated with networking equipment for the purpose of locating and addressing those devices worldwide A top level domain is a domain at the highest level in the hierarchical Domain Name System DNS Top level domain names are installed in the root
58. t config gt lt ldap gt type native servername esx 2k8 de srv labor local searchpath dc labor dc local authmethod simple username LDAP Connector password none attribute dNSHostName filter objectCategory computer lt ldap gt 2012 IKARUS Security Software GmbH Page 84 HKARUS security manager 9 1 The lt config gt Section In the lt config gt section you can provide information about the MSSQL database used by the IKARUS security manager Server for storing data and information and about the TCP ports used for communication dbconnstring The information used for establishing a connection to the target MSSQL database Includes the server name where the database resides and authentication methods needed for accessing the da tabase For more information about the syntax and available prop erties of the connection string refer to your MSSQL documenta tion serverport The TCP port used for the communication between the IKARUS security manager Server and the IKARUS security manager UI If you use a firewall make sure to forward this port clientupdateport The TCP port used for the communication between the update binaries and the IKARUS anti virus If you use a firewall make sure to forward this port 2012 IKARUS Security Software GmbH Page 85 HKARUS security manager 9 2 The lt dap gt Section The lt dap gt section includes information about the LDAP server t
59. t Update port 9888 communicating with the ISM server Administration Port 9887 i Automatically Add Automatically Add Clients no D Clients Specifies whether new clients in the LDAP are Change Management automatically added to the DIEA OLS Enable Change Management according to the IT Infrastructure Library E I Ask for comment at Log in screen Ep Enable Change Man I Maintain change log for server settings H agement according to the ITIL I Ask for Request for Change RFC ID Enables or disables change tracking Ask for comment at Log in screen If enabled the user must enter a comment on login attempts Cance apply Maintain change log for server settings If enabled logs all changes made to settings Ask for Request for Change RfC ID If enabled the user must enter an RfC ID on login attempts Figure 5 34 UI IKARUS security manager Settings General 2012 IKARUS Security Software GmbH Page 67 HKARUS BENN security manager 5 2 12 2 E Mail Notifications IKARUS security manager Settings x General E Mail Notifications Update Enable E Mail Reports ISMX Std Report ISMX Virus Report ISMX New Client Report EE Figure 5 35 UI IKARUS security manager Settings E Mail Notifications 2012 IKARUS Security Software GmbH Page 68 Enable E Mail Reports Enable or disable E Mail reports Mail Server The Mail server the reports are sent ov
60. ther the IKARUS securi ty manager Server needs write access to that network share to place the file on the share in the first place You can specify the Shared Directory in the General IKARUS security manager Settings dialog Figure 5 34 2012 IKARUS Security Software GmbH Page HIKARUS E security manager Licensing Information To secure your network and operate the IKARUS security manager you will need a valid license A license grants a defined amount of user licenses and should be se lected appropriately for the size of your company The IKARUS security manager li cense is shared with all clients you need to administer It is not possible to administer and run more IKARUS anti virus instances on your network than the license allows There may exist licenses for non administered clients if you previously have bought one or more licenses for them if not you will not be able to administer any more clients after reaching the client limit of your IKARUS security manager license In this case those particular clients will not be secured by the IKARUS anti virus and will thus be unsecure Remember that clients without a valid license are a possible threat to your entire network 7 1 Registration If there is no valid IKARUS security manager license the following dialog Figure 7 1 will show up asking you to provide a valid license using an IKARUS license file or an IKARUS Activation Key 7 1
61. tside your domain or in a different domain All clients in the Active Directory are automatically listed with their FQDN It is highly recommended to always specify the FQDN of manually added clients clients with the same name might exist in differ ent domains and there is no way to distinguish between them Toolbar See Figure 5 7 Ton S ot o Group Client Tree t MANUAL See Figure 5 8 Linadmynstrale me Filter Section See Figure 5 9 Figure 5 6 UI Directory 2012 IKARUS Security Software GmbH Page 36 HKARUS Ea security manager 5 2 1 1 Formatting Node names are formatted depending on their respective status Normal This client is online Italic This client is offline Bold This node is selected 5 2 1 2 Layout The Directory is separated into the following three sections 1 The Toolbar BELL LOG Refresh the DIAKON The clients are re enumerated Expand all group nodes Start IKARUS anti virus Fast System Scan Scans the windows directory and active processes System Partition Scans the system partition Entire Computer Scans the entire system Administrate Exclude from administration Allows prevents updates and system protection Administrate Exclude from administration forced Ignores administration from another IKARUS security manager Inherit Settings Do not Inherit Settings Settings
62. virus Refer to the requirements indicated in the IKARUS anti virus manual e The Enforce Client Update option in the IKARUS security manager Settings windows Figure 5 34 must be enabled 2012 IKARUS Security Software GmbH Page 80 HKARUS EE security manager 8 1 Installing the IKARUS anti virus To install and deploy the IKARUS anti virus right click a client or group in the Directory to open the context menu and click on the Install anti virus entry Figure 5 8 The instal lation of the IKARUS anti virus includes the below steps Figure 8 1 It can take a mo ment so please wait patiently e Step 1 The IKARUS security manager Server places the needed executable files in the Shared Directory e Step 2 The IKARUS security manager Server tries to install the ismxstartup service remotely from the Shared Directory The target client needs read access to the Shared Directory and to files in it e Step 3 The ismxstartup service retrieves the guardxup binary from the IKARUS security manager Server places it into the Windows temp directory of the tar get client and launches it e Step 4 The guardxup binary performs all further steps left for installing the IKARUS anti virus on the target client This includes retrieving the IKARUS an ti virus binaries from the IKARUS security manager Server and installing them on the target Shared Directory Places installa Needs
63. y Services on Windows NT operat ing systems or NTDS holds the user accounts and security information for resources in that domain Each person who uses computers in a domain gets a unique account or user name This account can then be assigned access to resources within the domain A directory service is the software system that Stores organizes and provides access to in formation in a directory In software engineer ing a directory is a map between names and values It allows for looking up values associ ated with a name this is similar to a dictionary On Windows Server systems a domain con troller is a server handling security authentica tion requests logins permissions checks etc in the Windows Server domain A domain is a concept introduced with Windows NT that lt HKARUS security manager Server Fully Qualified Domain Name FQDN Domain Name DNS Domain Name System TLD Top Level Domain 2012 IKARUS Security Software GmbH Page 91 grants a user access to a number of computer resources if he or she can provide a combina tion of a username and password In the context of client server architectures a server is a computer program serving the re quests of other computer programs named clients The means that the server performs computational tasks on behalf of clients The clients either run on the same computer or connect through a network A client is an application or sy
64. zone of the name space For all sub ordinate domains the top level domain is the SIKARUS security manager last part of the domain name that is the last label of a fully qualified domain name Root Zone A root zone is the top level DNS zone in a hi erarchical namespace using the Domain Name System DNS The term typically refers to the root zone of the largest global network the Internet DNS Zone A DNS zone is a part of a domain name space using the Domain Name System DNS for which administrative responsibility has been delegated Administer In the context of the IKARUS security manager administration means that a client with the IKARUS anti virus installed is managed by the IKARUS security manager The client gets up dates configurations licenses and settings from the IKARUS security manager If a client is not administered only status information will be displayed The limit of clients you are al lowed to administer is specified in the license you are using Application Software Application software also known as an appli cation or an app is computer software de Signed to help the user to perform specific tasks Computer Software Computer software or just software is a com puter programs with its related data providing instructions for telling a computer what to do and how to do it In other words software is a conceptual entity which is a set of computer

Download Pdf Manuals

image

Related Search

Related Contents

InsideBusiness Payments  Storage Area Network Monitoring & Troubleshooting  User Manual    Samsung ME86V-WW/XSG manual de utilizador  LESLIE CONSOLE CONNECTOR KIT 8253 INSTALLA TION  株 主 各 位 臨時株主総会招集ご通知  スマートハウスの暮らしには、スマイルがあります。    Operating Principles  

Copyright © All rights reserved.
Failed to retrieve file