Home
IT Security Products for Corporate Users - AV
Contents
1. Client functions The user can run virus checks v The user can download signature updates The user can change email and monitoring options Display local quarantine Password protection for changes to Options Update settings Change parsiyord Exception directory for scan jobs a 4 It is of course possible to change these set tings later In this case we rely on G Data s default settings and don t make any changes After this we can change Internet update settings to optimise virus updates for the clients The default configuration is manual but can easily be changed to one s own re quirements Product Review Corporate Review 2010 Setup wizard E xj Intemet update Intemet update enables new virus signatures and program files to be Enter the login data you were given by G Data User name Password Region Europe d E CHR RENE RN When the wizard has finished we open the G Data Administrator which shows a status over view Entre network j MVOCLIENT Cs Dala AntiVirus status Entra motwork PT G Oma Chet installed ov de Curent dnis agus nu Se Montor ache tv c Emad check mire tu 24 CulbrpakSGiueld acte ut amp Firewall enabled 0 Fes Cees UIVAMD Eme Bee o In the left hand pane of the window we see a list of all the PCs in the network You can easi ly right click on a machine and activat
2. Creating intial configuration settings Policies Kaspersky Anti Virus 6 0 for Windows Workstations Kaspersky Anti Virus 6 0 for Windows Servers Kaspersky Anti Virus 6 0 for Windows Workstations 5can Computer Kaspersky AntiVirus 6 0 for Windows Servers Scan Computer Update l Administration Server tasks 67 Product Review Corporate Review 2010 The configuration wizard then downloads up dates to the administration server Quick Start Wizard z j xj Update Downloading updates to the Administration Server P You don t need to wait till update is complete Click Ned to continue the wizard Downloading will continue in background Ale downloaded bases av kdb A 385 base073c kde A great number of update files will be down loaded for the various systems but there is no need to wait for the update process to finish as it will run unattended in the background Like last year Kaspersky s configuration wizard is definitely one of the best we have tested as finishing one wizard leads to the start of the next so that no important tasks can be forgot ten Quick Start Wizard j xj Initial setup is complete V Start deployment In order to complete the wizard press the Finish button lt Back Next we start the deployment wizard x Welcome to the Deployment Wizard This wizard helps you to select computers for deployment and 2
3. Browser control Updating Web Reputation Can the customer define an unlimited number of locations 131 Product Review Corporate Review 2010 www av comparatives org Sophos Trend Micro Feature list AVIRA Bitdefender Kaspersky McAfee Which criteria can the customer use to define locations Client IP Configura tion By specifying IP addresses IP ad dress ranges over AD By specifying Gate way By IP address range AA The client must have the specified Gateway The client must not have the specified Gateway server By IP address range By MAC address The client must have the specified DHCP server The client must not have the specified DHCP server The client must have the specified DNS server The client must not have the specified DNS server over AD comparatives 132 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender G Data Kaspersky McAfee Sophos Trend Micro By checking whether a client can or can not resolve a DNS over AD host name Registry Can multiple criteria location When is location aa evaluated Periodically By specifying the type of network con nection used or not used by the client e g Ethernet Wire less VPN Dial up always the adapter that provides the gateway Immediately when a change in the net work configuration takes pl
4. IS served IIS virtual web site C Apache Web server 2 0 wil be installed if not pet installed HTTP port on v Enable SSL Certificate validity penod a years SSL port CET natal 5 hield me Corel Here we can choose whether the client should be located by its Windows hostname domain name or IP address Trend Micro OfficeScan Computer Identification D TREND WIcrRo Specily whether OfficeScan chents vall identify the server by its domain name or IP address Trend Micro recommends using an IP address when the computer has multiple network cards and using a domain name when Erben Tere change c iomann pew 0000 C IP address Trend Micro OfficeScan Product Activation Step 1 Register online gy TREN Actreation it a bwo shep process 1 Register eres Un D LEGE ae 2 Enter the Activation Use the Registration Ley that came wih your product and click the button below to register online An Activation Code wall be sent to you via emal 112 WWW av com paratives org Next we need to enter activation codes for the various services Trend Micro OfficeScan Product Activation Step 2 Enter the Activation Code s Dd TREND Type the Activation Codes for the Offices can services using the following format j Damage Cleanup Services Web Reputation and Ant spyware ie ooo retaliohreld we om TR ces At this point we have the chance to install a
5. Operating System Microsoft Windows Server 2008 Service Pack 1 Host name of this computer Host name AVCSRV AVLTEST local Internet Information Server Internet Information Server version 7 0 is installed eb Server List 1 Default Web Site IP address All unassigned Port nun Microsoft Data Access Component MDAC version is 6 0 6001 18000 Microsoft Message Queue Microsoft Message Queue version is 4 0 When we have confirmed that we wish to con tinue the Control Manager installer starts S of Near cancel Trend Micro Control Manager 5 5 Setup AP TREND Welcome to the InstallShield Wizard for Trend TREND MICRO Micro Control Manager 5 5 Control Manager We can then choose an installation folder The InstallShield Wizard wil install Trend Micro Men Manager 55 on your computer To continue click Next Select Destination Folder Pb meno Setup will install Trend Micro Control Manager in the following OS folder To install under a different folder click Browse and select TREND MICRO another folder Control Manager Click Cancel to abor this operation Next to continue Destination Folder ENProgram Files x86 Trend Micro Browse Required Disk Space 900 MB Available Disk Space 15530 MB ek Re een Trend Micro Control Manager 5 5 Setup License Agreement Please read the hollowing license agreement c
6. comparatives Product Review Corporate Review 2010 SOPHOS Sophos Product Review Corporate Review 2010 Installation Downloading the product The website impresses with its pleasant de sign It is simple clear and fast Registration is necessary to obtain a free trial key This gives an adequate 30 days to test the software The inexperienced user should take some time to understand NAC he or she may otherwise waste time trying to find the additional mod ule which may not be necessary By the time you come to download the prod uct it should be clear which component does what Endpoint Security and Data Protection Step 2 Optional download Sophos NAC Install an Step 3 Optional download Data encryption Install en Windows XPATLa Step 1 Download Enterprise Console Install on Windows Server 200320082008 R2 Windows Server 2003 2008 2008 437 MB v4 5 R2 Downoad Upgrading Oo Visit the Upgrade Center first Download Download A You will get SaleGuard Disk Encryption Saleisuard PivateCrypio You will get HAL Documentation Documentatian You will get Management console Ani virus Cheni firewall Data control Device control Application control MAC Documentation 81 Product installation The first task is to unpack the installation files to the local hard drive Sophos Endpoint Security and Control 9 5 Nebwork inst
7. E NAC Protection summary L mm San Shows any issues that affect installation of the security software k Application control E Data control If software cannot be installed automatically refer to the manual installation instrucbons in the Device control MEI Tamper protection The descriptions of the different policies are self explanatory and the default settings ap propriate ma Do cm The clear ordering with pre defined filters We now enter the credentials of a Windows makes administering even large networks very account with the necessary privileges to carry straightforward out the installation vem amp a comete 2 Ves eroe and bekges 1 See Computer Deisi A ee Sophos Enterprise Console Protect computers wizard l X Credentials Credentials used to install security software on network computers p Enter details of an account with sufficient rights to install software on network computers If this account is a domain account enter the username in the form domain user Lisername AVCTEST Administrator m he OO M dE d Computers with device control events over the past seven days Computers with firewal events over the past seven days Computers with application control events ower the past seven days 4 Computers with potential problems amp Managed computers with outstanding alerts Managed computers with outstanding Virus malware alerts Managed computers wit
8. Choose What to Import What do you want to import from Active Directory Computers and containers Select this option to import your Active Directory container structure and the computers in those containers C Containers only Select this option to import only your Active Directory container structure You can use Synchronize with Active Directory later to add computers into the groups created from the containers eme oe cms AV comparatives Product Review Corporate Review 2010 A summary is displayed and then the import process can proceed Import from Active Directory Wiza rd Confirm Your Choices O Import from Active Directory container LDAP JCN eComputers DC AVCTEST DC slo Import to Enterprise Console group Wlients Import the following objects alnew computer 0 containers View details The Protect Computers wizard starts Sophos Enterprise Console Protect computers wizard X Welcome to the Protect computers wizard The results of the import wizard are displayed at the end Import from Active Directory Wizard xl security software on the computers on your network Completing Import from Active Directory The following objects were successfully imported from Active Directory e new computer containers creating 0 new groups When you have set up polices use Synchronize with Ba zi c discover Active Directory to automatically containers create
9. InstallShield Wizard l Select Features files onto the local hard disk E E Select the features you want to install and deselect the features you do not wan lo install PureMessage for Microsoft Exchange 2007 A 2010 3 1 u Administrabon Console PureMessage Service E HANC Extracting Resources cay VW rP_RE515 ophosBootDrver inf Extracting Resources savin _lAB4 SophosBoolbrnver inf Extracting Fiesourcessau program files S ophos v utal palate aL on gma Extracting Resources sauprogram filess5 ophoss amp utolIpdalesAL svc exe Extracting Resources eau program files Sophos Autollpdate AL Update exe Extracting Resources sav program Fles Sophros S ophos AntiMirus Backgrounds canClent exe Extracting Resources sav ConliguresAy exe Extracting Resources dolnek aS exe wa Irrstallahretd FOR MICROSOFT EXC A4 puremessage Next we define the installation folder ce ee Sophos Pure Message InstallShield Wizard x Chooze Destination Location Sophos PureMessage Installshield Wizard es Select folder where setup will install files Welcome to the InstallShield Wizard for Sophos y nad Serine P rehi TET E ora Pureblastage Setup will install Sophos PureMessage in the following Folder To install to thes folder click Next To install to a different folder click Browse and select another folder The InstallShi
10. Now we come to the next dialog box it feels like the hundredth where we can decide on the folder to use for Trend Micro shortcuts in the Windows Start Menu Trend Micro OfficeScan OfficeScan Program Shortcuts gy TREND RUD UR SETS ERN Cone inna Aa DICES COUNTIES SLT mie ACER the default folder name or specify a new one You can also select an exiting folder to which the program shortcuts will be added Folder name Trend Micro OfficeS c an Server AV LS HV Microsoft Exchange Server 2007 M icrosoft SOL Serve 2006 comparatives Product Review Corporate Review 2010 At last the installer has enough information to proceed Trend Micro OfficeScan Installation Information Below is the summary of pour DffsceScan server installation Arians Web Fiepulabion and Antispyware The installation of OfficeScan takes rather longer than that of competing products Trend Micro OfficeScan Installation Complete You have successfully installed Trend Micro OfficeScan View the readme file Open the web console www av comparatives org The management interface OfficeScan 10 We are greeted by the login dialog of the con sole o iion Larret i gphorrr AB TREND OfficeScan WEB DDONSDLE LLE Type eur wie ramas asd Beaded lo cesa The Web nicit wer luec Piiimatd enanas na Log On Yiu Ob prireje pers the following cera iuter bri H Eee EA
11. Typical and Ad vanced installation methods ie ESET Remote Administrator Console Setup Select type of installation Choose typical recommended or advanced installation Select instalation type Installa5on type Typical Recommended for most users C Advanced Fully customized installation We can then choose the installation folder i ESET Remote Administrator Console setup Select Installation Folder This is the folder where ESET Remote Administrator Console will be installed To Fe His Fols o Wed rotat to a different folder enter it below or click owse Folder c Program Files x86 ESETIESET Remote Administrator Console Browse The installer has now collected enough infor mation and can begin the setup process 39 fs ESET Remote Administrator Console Setup Ready to Install The Setup Wizard is ready to begin installation Click Install to begin the installaton If you want to review or change any of your installation settings dick Back Click Cancel to exit the wizard ie ESET Remote Administrator Console Setup X ESET Remote Administrator Completing the ESET Remote Administrator Console Setup Wizard Click the Finish button to exit the Setup Wizard M Launch ESET Remote Administrator Console On completion of the installation we can open the console In the case of a Typical Installation the Mi crosoft Access Engi
12. tunity to view a tutorial on the next stages of the configuration process Download Security Software Wizard Ix Completing the Download Security software Wizard You have successfully completed the Download Security Software Wizard You may use Sophos Enterprise Console to install and Select the check box if you require further information on how to configure Sophos Endpoint Security and Control To dose this wizard dick Finish As we unfortunately don t know how long we will have to wait before we can start deploying the software to the clients investigate how easy it is to manually create new security groups AV comparatives Product Review Corporate Review 2010 Find New Computers E x Find new computers using Import from Active Directory recommended Import Select this option to import an existing group structure with or without computers You must then set up group policies You can use ize with Active Directory later to automatically discover and protect new groups and computers Select one of these options to add a list of networked You must create groups set up group policies and place the computers in the groups before you can protect and the discovered computers 9 ems The wizard above appears after we click on Find New Computers Again we see that So phos has the best Active Directory support of any of the products we have tested here Even importin
13. French Italian Ger man Chinese Japa nese Trend Micro Server Products English only Desktop Products all languages in which the products are available Server Products English only Desktop Products all languages in which the products are available AV comparatives Product Review Corporate Review 2010 www av comparatives org Feature List AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro ETS IS EE O O E o O o N For Business Products 24 7 365 phone we offer support For customers with support for SLA customers during business hours for SLA customers for SLA customers active support ac for SLA customers in US EST UK counts DACH Spain Roma nia Toll Free Numbers are Depends on location available in most Depends on location Depends on location and support agree Depends on location countries ment ESET has four region al offices US and Canada Slovakia Czech Republic Ar gentina all of the offices provide tech English German nical support in their Spanish Romanian local languages In French our partners addition ESET has offer Tier 1 support in exclusive distributors their local languages in 50 countries and They are more than value added resellers the languages speci in over 100 addition fied above al countries Support in those countries is provided in local language by the local distributor who in turn receives support directly from
14. OpenVMS Other supported OS supported OS TEAM SCO Solaris 10 Ubuntu NetApp DataONTAP vSphere 4 0m Hyper V 2008 Database 00 Does the product require a database For how many us ers clients is the free 20000 TOUR database recommend ed AV amgparatives 183 Product Review Corporate Review 2010 WWW av comparatives org System Requirements Sophos Sophos Sophos McAfee McAfee McAfee Trend Micro Trend Micro Trend Micro Bitdefender Bitdefender Bitdefender B m Ea Microsoft SQL Express in cluded free of charge can support SQL Server if the customer has a license for the database Which database is included i e Mi crosoft SQL Sybase MySQL etc Which additional databases are Spo ed eros Microsoft SQL Server _ 2000 Loo EM O 2005 eee 2008 2008 R2 pm Express Other 2005 and SQL Express 2008 Email Server Ty BEEN DEN BE D EE Microsoft Exchange E RBR L Domino Novell Netware Server E n w BEI Dell NAS END S O o qc o 9 C C A h 9 AV OM Parc wes 184 Product Review Corporate Review 2010 www av comparatives org Copyright and Disclaimer This publication is Copyright 9 2010 by AV Comparatives e V 9 Any use of the results etc in whole or in part is ONLY permitted with the explicit written approval of
15. dashes and underscores root accounts must be less than 32 characters long User ID po Full name Password Password confi Email address comparatives Product Review Corporate Review 2010 Now we can configure routing and notification settings and enter proxy server details if nec essary Specify Message Routing Path xj Visus Choose how the servers communication module recerves FB TREND commands logs and how it issues outgoing commands bo entities Moral you can use the defaut settings TREAD MICRO Control Manager Source of incoming messages Direct from registered agents I ET CIT puri unsers ume ITO server Lon gu aid C Proxy Server C IP port forwarding 8000 r Route for outgoing messages Direct to registered agents C Proxy Server When installation is complete we can begin configuration The management interface The login box appears in a browser window FB TREND Control Manager Please type your username and password to access the product console Username roct Password s Having logged in we see the dashboard which gives an overview of the state of the system AB Tes Control Manager CCI E CE gt 3 ET j DER m ERTs Phapa Danis Beni rg Thesar Directa Beaute I4 Trees ri Ma Tppm Epa Sree Orr a Sree Barcas Pernsstaqe de Ceiri a 1 Face IEN q
16. install Kaspersky Anti Virus on them Ta continue Ehe wizard click Mead Here we can select the installation packets that we want to distribute to the clients Any installation packet not in the default list can be added manually Deployment Wizard i X Name MI Kaspersky Anti Mrus 6 0 fer Windows Servers MP4 5 04 1424 Fa Kaspersky Anti Virus 5 0 for Windows Servers MP4 5 04 1424 1 ME Kaspersky Anti Virus 6 0 fee Windows Workstations MP4 6 0 4 14 or Windows Workstations MP4 6 0 4 14 Wa Network Agent 8 0 2090 Ma Network Agent 8 0 2090 1 Kaspersky Anti Virus 6 0 f Kaspersky Anti Virus 6 0 for Windows Workstations MP4 6 0 4 1424 _1 Anti Virus will be deployed along with Network Agent Network Agent 8 0 2090 1 which Cancel e If the wizard has already been used before there is a choice of installing software to new clients or additional packets to existing cli ents Deployment Wizard Computers Select target computers for deployment Deploy to a group of managed computers E kr ia at a dre eee Lema e AV comparalives Product Review Corporate Review 2010 As this is the initial configuration we have to select the client PCs to be installed Deployment Wizard Computers Select tanpet computers OS E E uf Unassigned computers AVCTEST HE AVCCLIENT lt Back Nee gt Cancel Hep The next poin
17. select an IP address ov a FQDN The selection will not change the IIS configuration 105 WWW av com paratives org Now we come to choosing a location for up dates and backups Trend Micro Control Manager 5 5 Setup Choose Destination Location Selec folder whee setup wil install files Speciy the location for Control Manager backup and authentication files Re use his key and keep it in the original location to retain control of the existing Agents Browse Instat ahield Back Next gt Ca The database settings are the next task If there is no SQL server available in the network SQL Express can be installed with the Trend Micro suite Setup Control Manager Database Select a databace for use with Control Manager al wails he eee When applicable specify the instance of the Server A TREND a idat TREND MICRO Control Manager retall Mieresoh SOL Epes SQL Server local SOLEXPRESS ex 10 231 5 1 or server trend com sqlsw1 Database authentication SQL Server Account Windows Account User name sa Password Trend Micro Control Manager database Database name db_ContiolManager lt Back Cancel After verification of the database we have to create a Root administrator Account Create Root Account E x fip TREND TREND MICRO Control Manager Trend Micro Control Manager 5 5 must have a root account Use letters numbers
18. ARTE Control Manager e rr Under Services we find components that were selected for installation during the setup process such as Outbreak Prevention Ser vices Additionally the latest messages from the manufacturer are displayed on the Trend Labs Message Board Next we take a look at the Logs Report area fete Control Manager uem di The enormous experience of Trend Micro is shown here The logging and reporting system can be precisely customised to suit the admin istrator s individual needs You have the choice of repeating queries which have already been made or running a so called Ad Hoc Query which runs a wizard that will extract the precise information you want WWW av com paratives org fmit Control Manager caged es oe Ll E hs siad loa E oa res T TT x Thus it is easy to create the most important queries and run these again when necessary using just a few clicks The other reporting functions are also very well designed For example there are 8 default templates for commonly used reports or more experienced users can create their own tem plates for customised reports In the area of reporting and log options the Control Manager has everything you could pos sibly want In the Updates category you will also find everything you need reese Control Manager Manual Download rip mesial deernisads k chi Pa epee poste Pla ceo
19. BitDefender Configuration Repair Tool i BitDefender On Demand Scan BitDefender Security for Exchange The Exchange server protection is also config 9 BitDefender Security for Exchange Help ured using a simple familiar console like the US BitDefender Security for File Servers MMC BitDefender Security for File Servers Help BitDefender Support Tool 5 Modify Repair or Uninstall Readme The monitoring section of the Exchange con sole is exemplary A very clear overview of the mail system and processed emails is presented which is very hard to fault AV comparatives une Product Review Corporate Review 2010 Summary Antrag Antispam Content Filenma Attachment Sienna pen beer ol a iem ache E ql ET that ad n or reumeh Eh nales ia Nome PD l rarena You can display detailed information from the various different areas and so easily track potential problems threats We were particularly pleased to see that BitDe fender gives us the opportunity to create our own SMTP groups a feature that we have very rarely seen elsewhere Group Properties SMTP Group Group name Testgroup Description Group for Bitdefender Test Specify the users that are part of this group Click Add to add a new user name or e mail address or click Browse to choose from the exist
20. By DNS Name By DNS Domain By Technology Type incl RDC VPN SSH SCP Terminal Services and Citrix TCP UDP ICMP comparatives 149 Product Review Corporate Review 2010 www av comparatives org IPv6 ICMP IGMP IGMP GGP GUP IDP GRE ESP SMP GRE Feature list AVIRA Bitdefender G Data Trend Micro Kaspersky McAfee Ability to control network traffic below the IP layer like EAP or PPP and legacy protocols like IPX and Raw Ethernet Other 128 protocols sup ported Which Actions can be taken when a PPTP firewall rule is trig gered traffic is blocked Include packet data in log End user Interaction Can end users be allowed to create firewall rules Can the administrator define rules that can not be overridden by end user rules Can the administrator define rules that can be overridden by end user rules Can the end user be allowed to disable the firewall Can the firewall au tomatically be ena bled after a defined time gt yo yo D Q N comparatives 150 Product Review Corporate Review 2010 www av comparatives org Feature list Bitdefender Kaspersky McAfee Can the number of times an end user can disable the firewall between reboots be limited easily block all net work traffic Can the end user be allowed to see the network traffic in real time Firewall Logs App Blocked and allowed with th
21. Exckaded computers Est 10 install the BitDefender Agent and create Groupe relrbonchipa ten Directory Eesur Previa i Exchaded Now comes step 2 in the Network Builder wiz ard After clicking on Apply Changes we immediately see the Deployment Wizard which allows us to configure various options for the installation After selecting the desired options we can begin with deployment AV comparatives Product Review Corporate Review 2010 Network Builder step 2 2 The bet belpa corts the paur of ihe deployment pegeri nepetbed Irom Hep pre bu nieg Dismiss page Configuration continues after successful instal lation of the clients Network Builder step 2 2 The list below contains the status of the deployment process resulted from the previous step Dismiss page The next point on our dashboard is quickly dealt with The standard password needs to be changed Change Password Change Password Changing your password is needed as a measure of security Also it is strongly recommended that you change your default password Old password New passwordfeeseeese Confirm passwordfeeseeese OK Cancel 28 www av comparatives org The next job is to bring the clients we have just installed into a group which we have called simply Clients This grouping function is as in other security suites the best way to create a security structure which can be modi fied to f
22. Mad Barua Wiigi Dic aria xc EREL Mail server security pandit os Ma por ie hepr Seres did barda no briti istapan preian setup Thiri decern debentur e della C te rabo Prema Ia pc rte yau Cie cre chek here in peste pour Retirar dram spass Via Me M Campi a Boer a ha ic toman ib the lol ye nen tha rendu aplaza bey el archant Canh Delo chiar bur has most sitate tmiimdim of seta for your retar ad fori ESET blii Gerry Puri beri Cop n si b Assur protection i Aria przizctxn Mail Security advises a restart which we carry out A The management interface is simply and ap propriately designed On the Protection Sta tus page we see what needs to be done next The first step is to enter the licence key lol ESET Mail Security 4 ihe Y Hen For M rrosaft Exchange Server L iter P Maximum protection ls not ensured Wh actrosts a Testis flail server security bosse rot stalled Q lec reali lxx rarer ctr E nod PHARM ec em MM e cirri Suatiad beca ra lcrram bm nibaded Y need a paw hrpa bun e Update miisi dan E bemar ma nager bud al TIN leeren Irene seit AS chek hber ae Dates proteica Sniper polen e e A vibes ol Herbed amacha n Byram datahaur Extended configuration options can be found by clicking on the Setup menu then Ad vanced Setup User interface ensured If the standard options available are insuffi cient fo
23. Show selected rows Systems in Selected Domain We import our server with a click on OK AV comparatives 82 Product Review Corporate Review 2010 My Organization gt Server Task Name Schq Broken Inheritance Install AntiSpyware Enterprise Client Run None Install Host IPS Client Run None Install McAfee Security for Lotus Domi Run None Install McAfee Security for MS Exchan Run None Install SiteAdvisor Enterprise Client Run None Install VirusScan Enterprise Client Run None New Task Run None On Demand Scan VSE 8 7 Wee None Update Client Protection Dail None Actions Y 5 New Task m m m m The wizard that then starts has a wide variety of tasks which can be applied to our selected computers This type of configuration is found throughout the interface and is very easy to get used to The individual areas are clear and easy to un derstand and laid out in a well structured manner The Interactive Learning Tour is intended to make using the suite easier for less experi enced users However it must be said that the suite is designed more for very large and com plicated networks which of course requires 83 more in the way of knowledge and experience from the user The query area is ideally prepared for analysis of the log files and offers a huge variety of pre configured queries which provide a con venient mea
24. Smart Security Business Edition ESET File Security for Windows File Server ESET Smart Security Business Edition and Messaging Bundle BitDefender Small Office Security a to 25 Clients and 1 Avira NetWork Bundle Fileserver up to 25 Clients and Fileserver and Mes saging Server more than 25 Clients more than 1 Fileserv er more than 1 Mes Saging server BitDefender Corporate Avira NetWork Bundle k Security ESET Smart Security Business Edition and ESET Mail Security Avira AntiVir Business Bundle BitDefender Corporate Security Features Management Server Recommended 1000 per single server Scales to 10000 if Master Slave is used 1 Master and 10 Slave Servers What is the maximum number of clients overall G Data Antivirus Business G Data Antivirus Business G Data Antivirus Enterprise G Data Antivirus Enterprise 123 www av comparatives org Kaspersky Kaspersky Small Office Security Kaspersky Business Space Security Kaspersky Enterprise Space Security Kaspersky Enterprise Space Security Trend Micro McAfee Trend Micro Worry Free Business Security Sophos Computer Security Small Busi ness Edition McAfee SaaS and Email Protection Trend Micro Worry Free Business Security Advanced Sophos Computer Security Small Busi ness Edition McAfee SaaS and Email Protection Trend Micro Worry Free Business Securit
25. Sophos Trend Micro By filenames of folder or location By filenames amp spe cific folder c MDirectory file txt By filename and windows Folder i e System32 hosts By referencing a value in the registry Which conditions can be specified for file existence File exists does not exist File has specified hash file fingerprint Directory exists Which conditions can be specified for file application versions File version is equal not equal to specified version File version is higher lower to specified version Conditions for regis try keys and values A specified registry key or registry value exists does not exist Conditions for nu meric DWORD registry values comparatives 214d Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data to specified number Is greater less than specified number Conditions for text String registry values Kaspersky McAfee Sophos Trend Micro Is case sensitive equal not equal to specified text Is case in sensitive equal not equal to specified text Contains does not contain specified text case sensitive Contains does not contain specified text case in sensitive ry registry values value value cesses running not running Conditions relating to the operating system system ing system the operating system Is equal not equal to
26. alphabetical order 11 Product Review Corporate Review 2010 www av comparatives org AVIRA Product Review Corporate Review 2010 Product Installation Download The layout of the manufacturers website is simple and logical and it is easy to find the product you re looking for If you already have a key you can download the setup files with out further ado Registration is necessary to get a test licence 30 days is long enough to test the product thoroughly The registration details are for warded to a certified Avira partner An improvement here is that the individual products of the suite no longer have to be downloaded separately as there is now a Small Business Suite installer as a single item This is very much better the previous version Another plus point is that the new Avira web site provides a very well organized overview on the complete range of Avira business products the SmallBusiness among them which makes it very easy to compare the features of the different product offerings Installation Avira has also worked hard on the installation process and there is no longer any need to consult the SMB product handbook during basic setup The installation starts by decompressing the setup files www av comparatives org Avira SmallBusiness Sete Avira SmallBusiness Suite Please use this dialogue to decompress the installation files of the program and to start the actual installation
27. be components Microsoft Windows Installer 4 5 this component may require a restart Microsoft SOL Express 2008 this component may require a restart Sophos Anti Minus Sophos AutoUpdate Install the following Sophos PureMessage components d k i Back Next gt Cancel When setup is completed the installer informs us that a restart is required Sophos PureMessage InstallShield Wizard InstallShield Wizard Complete Setup has finished one part of the installation and requies your computer lo be restated Setup vall continue again automalically alter you restart Yes want to restart my computer now C No vall restart my computer later gt Cek Finish to ext setup OF Immediately after the restart Sophos begins post installation tasks For example configura tion of SQL Server Express if this is used 4 Setup 18 00 2531 B0 D n Li ht La IIT CasPol 2 8 50727 3053 ration All right 2 060 587 All r ista MU Server 008 Please wait while SOL Server 2008 Seton process de cumert operation Setup Support Files Click last to install Setup Seppet files To install cewodabe SQL Sencer 2208 these files are regard Setup Support Files Pha fallos comparesta des quired Fes OO Denver Deter Feature hire pa Setup Support Files Ie eres Fesfznmng isos Deeley amans As soon as these automatic tasks are complet ed we can continue with our own configura tion Sopho
28. database CC Use available SOL Server instances Microsoft SOL Express required for large networks Next gt cae e Back As we don t have an SQL server in our test environment we use the integrated database for our test The next step is to confirm the hostname of the computer being installed via which it can be accessed by client PCs I G Data AntiVirus ManagementServer InstallShield Wizard Computername Please check the name of this computer This computer must be addressable by cients in the network via ths name Name AVCSRY AV comparatives Product Review Corporate Review 2010 The installer now has all the information it needs to begin the installation process When installation has successfully completed we have to decide whether to register li Register G Data EndpointProtection i Aroi aa i enon d ae j tes You can of course go through the registration process later Do you want to register G Data EndpointProtection now 51 Services and servers are then installed and configured The management interface When the administration console first starts we are asked for logon credentials and given a choice of integrated or Windows authentica tion AntiVirus Administrator Go ssie Con saber G Data Once we have entered the correct logon de tails the management console opens and the setup
29. de auk for use in US End User License Agreement NOTICE TO ALL USERS PLEASE READ THIS CONTRACT CAREFULLY BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE YOU EITHER AM INDIVIDUAL OR A SINGLE ENTITY AGREE THAT THIS AGREEMENT IS J ENFORCEABLE LIKE ANY WRITTEN CONTRACT SIGNED BY YOU IF YOU DO NOT AGREE TO ALL THE TERMS OF THIS AGREEMENT CLICK ON THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS CONTRACT AND DO NOT INSTALL THE SOFTWARE 1 Definitions a Software means a all of the contents of the files disk s CD ROM s or other media including electronic media with which this Agreementis provided or such accept the terms in the license agreement ok cei C de net accept the tarma ri the beanse agreement Following this we can choose the scope of functionality to be installed Hoite Policy orchestratbor 4 5 0 Patch 1 McAfee Choose Software to Evaluate Spied Ge componente bom Toad Probecton hor Endpori pou veant to check in ho thp aft prion BE Bass inctalanor Irta ePobey rchestiatoe checks n Moles Agent Vinuri can peobecis Imm wnet Anis paare proiect hom potentially urmarted programa and S edcdhinor web browring safety ES Hoa bento Prevention Secure deiige from infusion by combining sonahune and bebarnoral protector also include feral ore applkcahon protection E Moles Secusip lor Lota Dorno and MS Exchange aroupSFaek Priredet anta and anti snam prot
30. incompatible applications A I T lemoving incompatible applications from computers Kaspersky Anti Virus can not be installed on a computer running another antivirus or firewall To successfully install Kaspersky Anti Vinus all incompatible applications should be removed Configure automatic removal cto o cos The next step allows client computers to be assigned to administration groups De ploymen t Wizard Computer relocation Adding computers to the Managed computers Select the group info which computer wil be moved after installation Do not move computers automatically Move unassigned computers to the group Product Review Corporate Review 2010 We then choose the Windows account to be used for the installation Deployment Wizard Account Select accounts for accessing the target computers AVCTEST Administrator The wizard now has enough information to begin the deployment process Deployment Wizard xi Ready to star deployment Chick Meod to start deployment lt Back We c9 teo The wizard then informs us that the deploy ment task has been created and started Deployment Wizard x Starting the CHEO y Ter Deployment task created Deployment task started po Het for details e It seems impossible but Kaspersky is the first manufacturer to have created a real time in 70 stallation display that informs the user of
31. mails for viruses in combina tion with Crypt Scanning of existing Doo NN Ince scan DIN to the company s policies on prohibited not desir able or confidential content comparatives 165 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Trend Micro Blocking unwanted e mail senders spam senders mailing lists etc as well as to unwanted recipients e g competitors Analysis of images on undesirable content e g pornography Using current spam pattern for the fast detection of new Spammer tricks User Specific Man agement of White and blacklists on the server solely for effective blocking unwanted e mails Freely editable exclu sion list for addresses and content in sub ject and message text Flexible notifications of blocked e mails directly or schedule to administration or transmitter receiver email User specific access to e mails in the quarantine co B E M i tine management Formation of compa ny specific e mail categories YES to blocking un wanted senders NO to blocking unwanted recipients Automatic classifica tion of e mails to one or more categories comparatives 166 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Trend Micro Response Manage ment through defined class
32. modify this option later or you i e the roles on your Exchange Server you will have to run BitDefender instaler again v Hub transport V Mailbox Click Next to continue or Cancel to stop the installation The installer now has enough information to begin the installation process AV comparatives E Product Review Corporate Review 2010 www av comparatives org ie BitDefender Secunty for Windows Servers Setup Ready to Install Installing BitDefender Security for Windows Servers The Setup Wizard is ready to begin the instalation ee M Please wait while the Setup Wizard installs BitDefender Security for Windows Click Install to begin the installation If you want to review or change any of your Servers This may take several minutes installation settings dick Back Click Cancel to exit the wizard Status Generating script operations for action Er BitDefender Security for Window eM EE E Installation of the Exchange Protection com Completing the BHBefeB er ponent using the standalone installer is thus Security for Windows Servers complete Setup Wizard The management console for the Exchange Please run an on demand scan to check the threats on your 2007 protection current system Click the Finish button to exit the Setup Wizard When installation is complete we find the following program group in the Start Menu BitDefender Security for Windows Servers
33. one of the best products we have tested The administration console The administration console is certainly one of the simplest we have ever reviewed After the installation only administrative work remains to be done The numerous functions and configuration possibilities mean that the suite is lacking nothing in terms of functionality 60 Remote installation of clients is very well han dled and can be carried out very quickly The MailSecurity Administrator is no exception being very simple to use without lacking any thing in the way of functions Deployment areas Although the suite copes with all standard requirements the manufacturers see it as be ing appropriate for medium sized businesses The simplicity of the administration means that some sorting functions which would be valuable in larger networks have to be forfeit ed Antivirus clients The client software is very user friendly and easy to find your way around There is effec tively no configuration to be done and warn ing pop ups are infrequent The default set tings are ideal as is the ability to prevent the local user from making configuration changes Summary G Data has like last year succeeded in produc ing a suite that is very easy to use There is no lack of functionality and G Data sets the standard for intuitive user interfaces Particularly the Exchange suite and the remote installation are exemplary The manual is vi
34. qualified resellers in most countries The review and the table below contain our subjective appraisal based on the tests and the publicly available information on the vendors websites AVIRA Bitdefender ESET G DATA Kaspersky McAfee Sophos Trend Micro c Vee eee ae OKOKOROK DEKOR A ae se een A AAA EROR Installation Deployment on Client AA A A o Ak A AMA A X o Xo poe o ox o x x oe x xe x x KKK xx ox AAA xx PCs Usability D He HH I I KK KKK KKK KK KK KKK KKK AA AAA AA anage ment Default X X o oo xo x AAA ox ox x ook x X x fx ox x AA A alues Small Busi kkk Ak AAA 0 kkx x KIKI HK KKK IK P 772247540 AA AAA ness a I eee o o ee e usiness Enterprise kkk KIKI OK 44449 I KKK 222 4 db 46 KKK KKK User Manual X KKKK X x x x o x kk A Kk kk ko x kk MS AD Sup wt AA Ak A AA Ak ANA A Kamm AKA A 085 24 dEIP 4 64 KK AAA A SS oo XX XOT P KO n prec O ee Support Website 44000604640 db 4064 6 db 404 0 dE 4 4 A Ak AAA AAA Spam x o o oco AAA oco oe oe AAA AAA AA AAA AA KK oe oo AAA AA AAA AA Overall Assess KKK kK IKK AMA AA KKK KK AAA A kkk kk KK AV poo ment Padel cor orpo AV meri pete pd preis poer AV p Award comparatives comparatives comparatives AV comparatives comparatives AV comparatives nora er Pt ie Product Review Corporate Review 2010 WWW av comparatives org Tested Products The following vendors participated in the
35. remote computer or to multiple computers Hep lt Back Meu Cancel 111 www av comparatives org The option is provided of scanning the target computer for threats before installation Trend Micro OfficeScan Computer Prescan B TREND The Selup program vu poer a cnp Kr security nsks before A Would you like Setup to scan the tanget computer Scan the target computer C Do not scan the target computer Back Ha Next we choose the installation folder Trend Micro OfficeScan Installation Path 2 om na an Dr Please specify the OfficeScan installation path You may type a neve folder mame or browse to you preherned location C Program coy am Files 485 x85 Trend Miero0Oihe Back Now we have the chance to enter any proxy settings necessary Trend Micro OfficeScan TREND JA wICRO If you use a proxy server to access the iemet specify your proxy settings below OfficeScan will use this information when downloading updates hom the Trend Micro update server r Proxy setings IC eee Proxy type E HTTF C SOCKS 4 Server name or IP address 7 Poit comparatives Product Review Corporate Review 2010 Next we enter the web server that will be re sponsible for managing OfficeScan on this PC Trend Micro OfficeScan Web Server Please choose the Web server bo ube for lhe DOlhiceS can server
36. system configuration like logging and backup storage capacity Te Product Review Corporate Review 2010 Summary Manufacturer s website Kaspersky s website www kaspersky com con forms to normal Internet standards and is easy to find your way around There is also a security zone where you can find out about viruses and other types of mal ware The installation process There is a lot of information to be entered during the setup process However the clever ly designed setup wizards are a big help and SO even inexperienced users can carry out the installation quickly and easily The configuration is also made easy by the wizards The entire suite can be installed and config ured in minimal time without having to con sult the manual The administration console As with the product we tested last year Kaspersky knows how to make life easy for the user and so the entire configuration process is child s play The MMC compatible console with its graphical presentation in the functions pane is particularly pleasing Deployment areas Kaspersky is at home in networks of all sizes and the Active Directory integration is a big help It is only in very large networks that the product might be a little inconvenient 75 Antivirus clients The client software is as usual for Kaspersky very professionally produced and hard to find fault with Summary Kaspersky has as it did last ye
37. the current state of client installations Geog dale e ais oa a ma ed Esper Jai re E Di bran Weer ios MPA ATIS LEE IL Deploy Kaspersky Anti Virus 6 0 for Windows poa respirer t Hanning un daran ma ri LE es Bes ur CA Earra g we Bowe mirii ie D oceans ose ie IgE irs mem owe bo O ve ares De teta fr lask comina Aum the tok Simp the tok When the installation has been successfully completed a summary page is presented The only thing to be criticised here is the speed with which the clients are installed The console is designed in the accustomed clear and comprehensible manner All the nec essary functions are present and easy to find This simplicity means that even inexperienced users can find their way around easily without any need to consult the manual AV comparatives Product Review Corporate Review 2010 Exchange 2007 protection iis Kaspersky Security 6 0 for Microsoft Exchange Server 2007 5 xj We begin with the mail security setup ins fk iS Kaspersky Security 6 0 for Microsoft Exchange Server 2007 0 le xl 5n In subsequent windows you can edit additional anti virus parameters for Kaspersky Security 6 0 for Microsoft Exchange Server 2007 Click Next to proceed with the additional configuration Click Back to review or change any of your installation settings Welcome to the Setup Wizard Click Cancel to exit the wizard The Setup Wizard wil install Kaspers
38. the opportunity to enter pass words for the individual functions of the soft ware Using different passwords for different areas of access increases security although some administrators would surely prefer to use one password for all functions But as men tioned before it is more secure this way is ESET Remote Administrator Server Setup Password for Console Administrator Access Set Password for Console Read Only Access Set Remote installer password Agent Set Password for Clients ESET Security Products Set Password for Replication set You can define a password for these server clients The Console password is the password which users use to connect to the server By default a blank password is used You can set up more security options later in the Server Options in the Console _ Cae The next point concerns the update settings i ESET Remote Administrator Server Setup Liser account settings Update username Update password Set update parameters later The installer now has enough information to begin the setup process T ESET Remote Administrator Server Setup Ready to Install The Setup Wizard is ready to begin the Typical installation Click Install to begin the instalation If you want to review or change any of your installation settings chck Back Click Cancel to exit the wizard The next step is to install the Remote Adminis trator Console This can be in
39. the really exemplary choice of configu ration options the Exchange protection mod ule in the BitDefender suite is extremely flexi ble and can be adapted perfectly to the needs of your own network AV comparatives Product Review Corporate Review 2010 Manufacturer s Website The www bitdefender com is designed in an appropriately clear and simple way in ac cordance with current standards manufacturer s website Additionally the site offers a security zone where you can find out about viruses and other malicious programs The management console has been very well designed The installation process The installation procedure is very simple if the management server is used and can easily be performed by any user without resorting to the handbook However we were also pleased that the stand alone option is available as this allows the product to be installed on smaller networks without any need to worry about the many detailed configuration options The administration console The MMC Microsoft Management Console compatibility of the administration console makes it clear and easy to use Here too it can be said that after the installa tion only organisational tasks still need to be completed The opportunities to customise a security structure for your own network are excellent The available functions and configuration pos sibilities mean that the suite is intended pri mari
40. which product information to be displayed This example shows clearly the way the man agement console works In MMC compatible style the console shows the available areas to be selected and individual objects can be conveniently configured by means of a right click After using the Paste Client s command we immediately see the client we have just in Stalled appearing in our newly created group Computers Directory Ma Managed Computers Ay Not Grouped 1 t EH DH E b 3 Activity Log Clients new desenpltian 1 managed computer Right click on the list header to select which product information to be duplayed Last horns bon Verzon 1134 2010 0730 19 39 47 3 0 1100 0 Having completed this step we have already finished the initial configuration Now we can WWW av com paratives org take a look at the rest of the management console The Policies area gives us the opportunity to create various security policies whereby a number of preconfigured plans are available It is easy to create one policy for clients and another for the management server This policy management structure is the best means of realising complex security environments in corporate networks The various templates can be used to control the individual functions of the clients so there are specific templates for the firewall scan behaviour and other client functions T
41. wizard starts AV comparatives Product Review Corporate Review 2010 The next step is to select the computers in our network that we need to protect It is of course possible to manually add any computers that don t appear in the list Setup wizard x Enable all computers on which virus protection is to be installed Enter the name of the computer if it is not specified in the list ceo o tn cores tae The wizard then asks if we want to install the client protection automatically which we con firm iT x Automatically install client software on the enabled computers For remote installation you must specify a user account that has administrator rights on the ManagementServer and on the client The client software can be directly installed from the CD f you do not possess the required rights or f the clients are not appropriately configured The requirements described above are nol necessary for subsequent operation of the program The next part of setup is the opportunity to change the default settings for the client in stallation which can be done very easily 55 s Ix Setup wizard The default settings specify the configuration of newly installed clients Al aptions can be changed later Back Net gt Finish Cancel Help Settings Monitor Emai Web IM AntiSpam Application control TG Data Cent loon in the task bar User account updates
42. 00 0 EDU amo BEDAE Scenario D 2 Fileserver 1 Ex change server 1000 Clients ESET NOD32 Antivirus MERECE ETTR E Trend Micro Avira AntiVir Business BitDefender SBS ESET File Server G Data AntiVirus Kaspersky Enterprise E P Enterprise Security Email Protection Security and Data Bundle Security Suite Security ESET Mail Enterprise Space Security ntis GOLD remonte Protection for Endpoints and Server Security Mail Server Scenario E 10 Fileserver 10 Ex change server 10000 Clients recommended product ESET NOD32 Antivirus McAfee SaaS and TANE CT ac Trend Micro Avira AntiVir Business BitDefender SBS ESET File Server G Data AntiVirus Kaspersky Enterprise ae P Enterprise Security recommended product E Email Protection Security and Data Bundle Security Suite Security ESET Mail Enterprise Space Security i for Endpoints and with GOLD support Protection Server Security Mail Server The price for more The price for more The price for more than 10000 users is than 10000 users is than 10000 users is 1 year plan EURO 163400 negotiated case by 117100 192380 134930 166030 negotiated case by negotiated case by case Please see the case Please see the case Please see the reference price for reference price for reference price for 1000 users 1000 users 1000 users 3 year plan EURO 326800 Price is negotiated 245310 396790 303500 319630 Price is negotiated Price is negotiated case by case case by case case by cas
43. 10 Windows EN 1 s The Update Manager is now completely inte grated into the Security Management Center which means that it is now possible to have more than one update manager e g you can assign one update manager to one specific security environment group to speed up the distribution of updates In spite of these changes the update manager remains very user friendly and we found our way around it immediately PE FH A jorr ies Here user dere dryp Pepa creer 4 5 r EP d E IP jaa n M i ESL LI Hec ae ee ue Te AAA a Pe penu PUTEM ei i gue aA de wagesest Deme gem c Ad rae pm fies M oues g Lm P pud rud eee The update settings are diverse making the suite very suitable for complex networks WWW av com paratives org cn Bj e dm M r liti j E L 8 r bre U Der m mme d Bs been no eda nied gt E a PT diei a oP f ta ihe orar E ak rem Jl ia Wia ts ID REGUM ra T oer GIR DM is Se fame are d I 3 quebec NE Pet E E Ea aua mm m e Se ome ime de ai ro EA iar crt tgs FT V ha mm LLL l Pon af unm I r rg ol I i Rare Nelms et ae Ace a eo ae UD CEL E ojo Arm i M hore eza ta Har r T Bam ae rapa vi Tier Fa A an d Rae AM aj Joke Cees Seid El ra The Update Manager also provides very de tailed scheduling options a Nara ar isa bear a Mit uh i on Et nae ANDILEMT bore TL gems gt pre i lt 0 RAE E Say 7560 r
44. 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro emo be performed co REN EN a blocked dropped ua A 85 WEE logged Failover What if the AV Serv er local hang ups automat switching to a second local server updates from vendor server instead of local server any other network Quarantine Quarantine Folder No but administrator Is there a centralized console provides 2 1 centralized view of quarantine folder the quarantine on Is there a quarantine folder on the client can administrators specify the location of the quarantine folder anywhere rechecking quaran tine after a signature update is the quar antine folder SiL SSH mmy E e MEM DO O O AV amparatiwes 157 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro undo av action if false positive is de tected mE mI ne S Exchange Exchange Exchange Exchange Exchange Exchange Exchange Exchange Exchange Feature overview Messaging Special module for pes din ia Complete defense against spam phish a Exchange scans the M NONSE antimalware anti Modules and func whole Exchange pur ECT a DOM spam content filter tional areas store Manageable y E AN ing attachment
45. 32 Bit e Home Premium 64 Bit e Professional sene s Professional 64 Bit e ieee pee 1l1 1 dqebebRE 1 1 32 Bit a oO ee 64 Bit Windows Server 2008 Standard 32 Bit o AV comparatives 175 Product Review Corporate Review 2010 WWW av comparatives org System Requirements AVIRA AVIRA AVIRA ESET ESET ESET G Data G Data G Data Kaspersk Kaspersk Kaspersk persky persky persky Standard 32 Bit Core command line command line command line only KAV for Installation only only only WSEE Standard 64 Bit lll COC EA oe e Standard 64 Bit Core command line command line command line only KAV for Installation only only only WSEE Enterprise 32 Bit o Eee i T DLO Enterprise 64 Bit Oooo oe MIU Server R2 64 Bit Standard Enterprise foundation 32 Bit i ZA NN 93 23 o Foundation 64 Bit IS MM HPC 32 Bit mee ut Untested Uil MUN SA k ww HPC 64 Bit EM Unete Untested Untste FO J KJk ooo Windows Mobile Windows Mobile 5 0 Windows Mobile 5 0 Windows Mobile 6 0 Windows Mobile 6 0 KMS EE Professional Windows Mobile 6 1 Windows Mobile 6 1 KMS EE Professional Windows Mobile6 5 CCE CT O A A O E do Lo oo only KAV for Symbian EMEN a 00 MENU l O KMS EE 091 A CC JA S KMS EE comparatives 17
46. 6 Product Review Corporate Review 2010 www av comparatives org AVIRA AVIRA AVIRA ESET ESET ESET G Data G Data G Data Kaspersky Kaspersky Kaspersky System Requirements 0 E m KMS EE e 7 KMS EE Linux Redhat l Redhat Enterprise Linux 3 x 32 Bit Redhat Enterprise Linux 3 x 64 Bit Redhat Enterprise Linux 4 x 32 Bit Redhat Enterprise Linux 4 x 64 Bit Redhat Enterprise Linux 5 x 32 Bit Redhat Enterprise Linux 5 x 64 Bit SUSE SUSE Linux Enterprise Desktop 9 x 32 Bit SUSE Linux Enterprise Server 9 x 32 Bit SUSE Linux Enterprise Desktop 9 x 64 Bit SUSE Linux Enterprise Server 9 x 64 Bit SUSE Linux Enterprise Desktop 10 x 32 Bit SUSE Linux Enterprise Server 10 x 32 Bit SUSE Linux Enterprise Desktop 10 x 64 Bit SUSE Linux Enterprise Server 10 x 64 Bit Novell ii UE TN I i v HEIE INI Open Enterprise Server OES 32 Bit Open Enterprise Server OES 64 Bit z comparatives 177 Product Review Corporate Review 2010 WWW av comparatives org System Requirements AVIRA AVIRA AVIRA ESET ESET ESET G Data G Data G Data Kaspersky Kaspersky Kaspersky EM OES2 32 Bit ER NN RR RR OES2 64 Bit VMware ESX 3 0 x NENNEN Novell NetWare Other supported OS DOS Solaris NetBSD FreeBSD Database YES built in and supports some others For how many users clients is the free data unlimited unlimited EN base
47. A Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro By limiting the num ber of files unpacked By limiting the size of an unpacked ar chive By limiting the pro cessing time for unpacking archives o D sparse files Does the product allow administrators to define how files with the offline bit set should be han dled Skip offline files Skip offline and sparse files with a reparse point Scan resident por sparse fi les oe forcing demigration Scan all files touched within a defined timeframe without forcing demigratior provide preconfigured scan locations Can the administrator define when scans should take place z comparatives 137 Product Review Corporate Review 2010 www av comparatives org Feature list Bitdefender Kaspersky McAfee Trend Micro Can the system im pact vs scan speed be defined Can the administrator specify which Scan Locations should be included excluded On Access Scan Can the administrator define when a scan is triggered Can the administrator specify which Scan Locations should be included excluded Files Directories Log l ac logged The Date and time the infection was detected The name of the infection and the original location where the infection was found incl file The computer on which the infection was found The user who was logged on at the time the infection was de
48. Acknowledge outbreak prevention in the client product i client to another alerts Protect in configuration chang server On which systems can the actions be initiated A single computer A group of computers All computers match ing certain criteria partially outdated i e identified by clients firewall rules logs or reports AV comparatives 152 Product Review Corporate Review 2010 WWW av comparatives org Feature list Bitdefender Kaspersky McAfee Trend Micro Any set of computers task for a set of computers or accord ing to the administra tion group s hierar Computers with a specific user logged on policies per user Automatically deploy to discovered ma chines in AD Other Can the status of the actions be tracked No The console is windows based and can run from any computer on the network and access the server from there The console software is portable and can run from a thumb Is there a web based console Administrator Man agement Does the product One per server mas support multiple ter server slave administrators Does the product Support different access levels for administrators Access Control A SO O O RN Can access for admin istrators be limited Authentication mechanism Can administrators be U P for the adminis authenticated using olas an integrated authen Win
49. BitDefender has very high detection rate awarded the highest possible ADVANCED award and also very few false alarms for its anti virus engine 2 BitDefender pro vides a more exten sive set of Web based threat protection than any other ven dor 3 BitDefender deliv ers updates more frequently than most of its competitors 4 BitDefender is the only vendor providing Endpoint Auditing and Management scripts 5 BitDefender Client Security has more extensive system and user control features than other vendors ESET offers the best performance and requires the least resources on work station ESET is also the unmatched leader in proactive protec tion ESET holds the most AV Comparatives ADVANCED awards in Proac tive Retrospective tests Centralized management is easy effective and fits organizations of all sizes G Data security solu tions offer the high est malware detection by using the G Data Dou bleScan technology The G Data concept of easy administration saves time and money long term trainings are not any more necessary 171 www av comparatives org Kaspersky Our product was designed with large enterprise corporate networks in mind We do have multiple enterprise customers with 50K who have chosen our system due to its flexibility and manageability We do support server hierarchy with unlim ited nesting The same is also applica ble to user groups We stron
50. Console 5 8 There might be a new pattern file or scan engine available on the Trend Micro ActiveUpdate server It is highly recommended that you perform an update before starting using ServerProtect It seems that Trend Micro have adopted the motto Never change a running system as their company philosophy The ServerProtect man agement console has not changed at all in the last 5 years 110 WWW av com paratives org Fina irat Ferien m pir br ars P Dae Jai aen prr lg rp T Lu RAE ee Sd OR PODIA cns Sale Lal peral hor Pun dia br nn are A ATA sh To el Task tal cel Gude pits Pira he pap m Po 555 5c Nonetheless the console is straightforward and functional On the left are links to the individual areas that can be configured The ServerProtect system is structured simply There are Information Servers which are re sponsible for the updates and administration of ServerProtect branch servers This master slave method ensures that the system can be scaled appropriately The console is perfectly functional but a graphical facelift would definitely not hurt This would not affect functionality or use but would fit in better with modern operating sys tems imine imi am am x Be eS AV comparatives Product Review Corporate Review 2010 Installation of Trend Micro Of ficeScan 10 We begin the installation of OfficeScan Trend Micro OfficeScan Welcome to the OfficeSca
51. Data MailSecurity s G Data Mail ecurity scans incoming and outgoing email Installshon includes G Data MaiSecunty Administrator G Data MailSecurity Administrator The G Data MaiSecunty Administrator is the G Data MailSecunty control software It can be nun from any computar on the network The setup wizard starts after the installation files have been unpacked m G Data MailSecurity InstallShield Wizard Welcome to the InstallShield Wizard for G Data MailSecurity The Instalishseld R Wizard vall install G Data MalSecurity on your computer To continue dick Next WARNING This program is protected by copyright law and nternabonal treaties 12 G Data MailSecurity InstallShield Wizard License Agreement Please read the folowing cense agreement carefully Terms of Agreement 1 Subject of the Agreement The subject of this Agreement is the G Data MailSecurity and the program description stored on the CD ROM which are referred to in the following as the software G Data herewith informs users that it is not technologically possible to guarantee that computer software will function without error in all applications and in conjunction with other programs 2 Scope of use G Data herewith grants you the simple non exclusive and personal right also eni zl amd mend hom sum mom Eel mn dle om Ml ie momom 78 deum saam L accept the terms in the license agreement f do not accept the terms in the licen
52. E Report Anti Virus for the period OF okr 2010 UTC 14 Anti Virus report KAjPER KY October 2014 Server name ne Kaspersios Security 8 0 PADPH UTC 4 reported period TOt 2010 UTC 13 Det 2020 UTC for Megraf Exchange Serena And final License tab used for license man Clean objects D 0 Du Desinfected objects b om bus agement Hon disintected objects In ecbec objects D o 0 LE Saa obiecti 0 oF 05 Pratectad objects 0 0 0 Lis acus 18 lar Hicressit Cachan SEEN Eorrupted objects v 0 ou Unprocessed objects licere colat 0 5148 I caet Pesar doO Ae 5 A fb et i y Souri Vy A Econ od m qn Pecos lor Microsot Exchange Servers KA PER K Processing error D Os aug M ra T Bache Licenses i Ses Comers Tya Lrdaired eras pe pai Dare Meer Arama 15 Arancha Exwmheon Gel 25 Cu uU IExpeg on geb aaa Sol pure Sol nune Maag a Vebi Rmi mom aa Hotty abet onnsa pr TE gt hann Report Anti Spam for the penod OF ost 2010 UTC L ort 2016 UTC Spa nix 14 Anti Spam report KASPERSKY2 October 2010 serurnama DC Kagcersky Security 8 0 E302 PHIL UTC 4 Reported period 070ct 2020 UTC ta Oet 2050 UTC for Merosoft Exchange Servers Contar no soam 07 Ore m Sem 0 Ore Probabla pim 0 GMa Formal natiicaban 0 ove Slacksted 0 5 ore Trusted g 00 OMe Mol scared a 0 Gre Total Os OMB Settings tab used to set up some main
53. ESET Remote Desktop Control for ST Support over Email ns NEEEEEE BERE O RE Regular no addition Regular no addition al fees Dial Rates Depends on location al fees Ceman Poona Local in countries of Local in countries of French Italian Span h presence and English presence and English English Spanish French Italian Ger man Japanese Supported Support Local in countries of German English presence and English Languages AV comparatives 169 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Trend Micro Tiered based on the partner or client Tiered based on the partner or client level level Guaranteed E Mail Dependent on Sup i response within laa Ls is p Helsing E Gold 4h Gold 4h Silver 6h Silver 6h Bronze 8h Bronze 8h Romania For other regions the on site service is based upon issue severity On Site service Managed by Vendor this means can the whole management process be done as a service by the ven dor Possible by reseller AV comparatives 170 Product Review Corporate Review 2010 Feature list Why should users choose your product and not another AVIRA Best detection fast product 20 years of experience and conti nuity Proven protec tion Bitdefender 1
54. Enterprise Console groups and To continue dick Next e MED Next we can select the features to be installed Back Cancel on the client Sophos Enterprise Console Probect computers wizard At this point we still do not know how far the TEC NM downloader has progressed with obtaining the Select Um SAC Flori MAI NDA E dipl So iun corpua client software we can do little except wait Tt Select the features you would like to deploy to computers protected with Sophos Endpoint is hard to understand why an otherwise highly Security and Control for Windows The anti virus feature is always installed professional suite gives no information at all as to the status of the download la Antius Data Control Device Control Host In Windows 2000 Windows 2000 Serve O Firewall Windows 2000 Windows 7 Windows O Compiance Control Windows 2000 Windows 7 Windows v Third Party Security Software Detection Windows 2000 Windows 2000 Serve Once we have ascertained that the client soft ware is available we can proceed with the installation of the client PCs To do this we M right click on the computer we have just im xr OEA IB ported and select Protect Computers AV comparativas 93 Product Review Corporate Review 2010 Our client is immediately recognised and the deployment can proceed po P Anti virus and HIPS c 5553 Firewall Sophos Enterprise Console Protect computers wizard 22
55. G i Please wait while the Setup Wizard installs Kaspersky Security 6 0 for Microsoft Exchange Server 2007 Status An initial screen allows us to define what serv ers we want to manage with that console This can be useful for some administrators who by some reason do not want to use Administra tion Kit If you switch to managed server you can see installed components and basic license over view Chick the Next button to run the Qiuck Start Wizard There is a limited range of options here so it is an easy task to configure the available set tings These are notification reaction in the event of an infection backups and reports FE ingeri brey Bib leer Hira i cing Sonnen The upcoming Kaspersky Security Suite for Microsoft Exchange has fewer steps We will report in one of our next tests APT AV comparatives Product Review Corporate Review 2010 PP itaperlo Gecurnty BLO for Micreeolt Exchange Sereere Server protection menu have two tabs related to two main tasks the product is charged with Anti Virus and Anti spam protection KASPERSKY ecco od he Reed uate Database ited on Complened tated ly T4 00 X1 1328 Update scusa G Eaapersk Lot s update servers O HTTP mawr FTP pers local ot network folder Scan settings LI Periodas wer E run E Erkia im on do Pe os roe Er Ena ira pobedi dor a Hub Trip r be L ime J TT Dori Phi ufu
56. M ANY WAY YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT These Terms cover BitDefender Solutions and Services for for home users licensed to you including hall F Laccept the terms in the License Agreement caes x Back After this we can choose the installation method For the purposes of our test we chose the Custom Installation in order to better evaluate the functions of the installer The next step is to choose the scope of the installation 25 www av comparatives org re BitDefender Management Server Setup Custom Setup Select the way you want features to be installed The following point gives us an idea of the scalability of the security system The Mas ie BitDefender Management Server Setup Ready to Install The Setup Witard amp ready to begin the Custom installation ee Please enter the data base login information and credentials SOL Server instance name poms Database name En Password seseeeeseeens Confirm password TTT Click Next to continue or Cancel to stop the installation process ter Slave variant is ideally suited to large net works or those with remote sites BitDefender Management Server Setup Ready to Install The Setup Wizard is ready to begin the Custom instalation EE uu Choose the server type that best suits your needs Single represents the unique Managemen
57. ManagementServer InstallShield Wizard X Welcome to the InstallShield Wizard for G Data AntiVirus ManagementServer GDATA The Instalishield R Wizard will install 6 Data AntiVirus me er on your computer To continue click Next WARNING This program is protected by copyright law and international treaties AV comparatives Product Review Corporate Review 2010 As usual there s a licence agreement to accept im Data AntiVirus Ma nagementServer InstallShield Wizard License Agreement Please read the following icense agreement carefully Terms of Agreement a 1 Subject of the Agreement The subject of this Agreement is the G Data EndpointProtection and the program description stored on the CD ROM which are referred to in the following as the Software G Data herewith informs users that it is not technologically possible to guarantee that computer software will function without error in all applications and in conjunction with other programs 2 Scape of use G Data herewith grants you the simple non exclusive and personal right also Wine Bc im Kino dal lr mmo bam lira Bos ism FK Dim Piar Del mum opm accept the terms in the license agreement C donot accept the terms in the license agreement lt Back Next we choose the installation folder fa G Data Antivirus ManagementServer InstallShield Wizard Destination Folder Click Next to install to this folder or cick Change to install to a d
58. Message Administration Settings Configure PureMessage administration settings PureMessage val send administrator alerts bo the email address of pour choice Please enter a valid email address below Adnanistrator email address xdministr ator avctest local Back Next gt Cancel At this point it is possible to enter routing information for the email domain although this can of course be done later 96 AV comparatives Product Review Corporate Review 2010 There are a few details to be entered about the company size and location Sophos PureMessage InstallShield Wizard Company Information Enter compary information From the options below select what best descnbes pour company This information is used by Sophos to improve the quality of its products and services Size 30 33 Industry Other County rr gt Cese Once again a summary of the installation de tails is displayed before the installer begins Sophos PureMeszage Installshield Wizard Start Copying Files Review settings before copying Fez Setup has enough information to stat copying the program files IE pou want bo review or change ary settings click Back If you are satisfied with the settings click Next to begin copying files Current Settings Install the following prerequisites Microsoft Visual C Redistributable 64 bit components Microsoft Visual C Redisinbutable 32
59. Product Review Corporate Review 2010 www av comparatives org IT Security Products for Corporate Users Product Review Corporate Review 2010 www av comparatives org Contents Product Review Corporate Review 2010 www av comparatives org The Dangers of Malware Product Review Corporate Review 2010 www av comparatives org Target Group This report is aimed primarily at IT administrators in organizations of all sizes In order to present an overview we have depicted the installation procedure in detail This gives administrators an idea of what the program is like to use However this only represents the current state since software prod ucts are subject to ongoing development and are updated frequently Hardware and Software Organizations seldom use the latest hardware available in the market Based on a survey conducted of 50 organizations of various sizes which we carried out in the run up to the tests the hardware that we used is representative of equipment currently deployed The selection intentionally included the somewhat older configurations in order to reflect the real status of the IT environment in various organizations Server Configuration CPU Dual Core Xeon RAM 8 GB RAM Hard disk 2 x 160 GB Raid 1 Sysvol SAS Hard disk 2 x 500 GB Raid 1 Datvol SAS OS Windows Server 2008 64 bit Std incl Service Packs and Security Updates current as of July 2010 Server Role Domain controll
60. Smart Scan Server which runs a fast Cloud based scanning service Trend Micro OfficeScan Install Integrated Smart Scan Server dy re cm install an ay Smart eae computer nome this server from the D hiceS can Web console Aside from the integrated server a standalone server is available for installation on a VMware server Consider installing this server for Failover purposes Do you want to install the integrated server C Ho have installed a standalone server or plan to install it a later time C Yes Install the integrated server This server supports HTTP and HTTPS protocol F Enable 55l Certificabe validity penod a esr SSL port G5 nstal s held peo e Oe cmn We choose to install the Smart Scan Server and now we can choose additional functions AV comparatives Product Review Corporate Review 2010 There is of course the usual enquiry as to whether to join the manufacturers feedback mechanism Smart Protection Network Smart Protection Network D TREN Wig RO The Trend Micro Smart Protection Network is a next generation cloud client content security infrastructure designed to deliver proactive protection against the latest threats THER MICRO SMART PR ore I Las N ez e Enable Trend Micro Smart Feedback recommended When enabled Smat Feedback shares threat nfonnation bo the Smart anonymous Protection Mebwork for analysis You can d
61. Systems Mac OS Mac OS X Mac OS X Server iPhone OS iPod OS Windows 2000 Professional Server Advanced Server Advanced Server 64 Bit Intel Advanced Server 64 Bit Itanium Data Center Server Data Center Server 64 Bit Intel T Bes lil m M id AV amparatives 179 Product Review Corporate Review 2010 www av comparatives org System Requirements Sophos Sophos Sophos McAfee McAfee McAfee Trend Micro Trend Micro Trend Micro Bitdefender Bitdefender Bitdefender amu O O WM Bit Itanium WindowsXP Hoe M S S Cll lll NOUO e OO EEE Intel Media Center IS CN ll Media Center 2006 II O A Media Center 2005 AAA Tablet PC Edition A Embedded EMEN A SM 5 C N AUHSENiJlaiidodzd 14 Standard EE ND J Enterprise 32 Bit IN Enterprise 64 Bit ee pepe Data Center 32 Bit II Data Center 64 Bit e e e MEA E a AAA EAS 7o ESAS NAAA Web Edition e gt R2 Standard 32 Bit e e R2 Enterprise 32 Bit_ IE R2 Standard 64 Bit e e oo R2 Enterprise 64 Bit en A Windows Vista Home Basic 32 Bit e oe e Home Basic 64 Bit_ IN Home Premium 32 Bit e e HomePremum6 4Bit e e Business 32 Bit e e Business 64 Bit_ Enterprise 32 Bi
62. ace i e network adapter enabled disabled Can the end user be notified about a location change xo A a O NN logged Group Import amp Synchronization Can computers be imported from a text file Can computers be imported from Active Directory comparatives 133 Product Review Corporate Review 2010 www av comparatives org Feature list Bitdefender Kaspersky McAfee Keeping the OU struc Directory to assign computers to groups Can changes in Active Directory be synchro nized Can the synchroniza tion schedule be defined Can computers be imported from multi ple Active Directory servers Can computers users be imported from other LDAP server Can computers be imported by a GUI Can different actions be defined based on the malware catego ry Scan Location Can the eera exclude include files and folders from being scanned By file extension By predefined lists of extensions provided by the product By administrator defined lists of exten sions By filenames file txt regardless of folder or location comparatives 134 Product Review Corporate Review 2010 www av comparatives org McAfee Trend Micro Feature list AVIRA Bitdefender Kaspersky Sophos By filenames amp spe cific folder c MDirectory file txt By folder name Standard Windows folder i e WINDOWS SYSTEM32 re gardless of the oper ati
63. administering the suite There is a choice of using an existing account or creat ing a new one Kaspersky Administration Kit Administration Server Properties Sel Server aecouri F Assign 4 logon account to Administabion Serva service The account must obtain adminetrator permissions For editing Administration Server database Automatically created account KLK FDOOCDDS36A31C4 User Account Account Password NE Confirm password We then have to choose a database option from SQL Express or MySQL m spersky Administra tion Kit Database Server Select database server lype Select databace Server type to connect Adminisitabor Server Microsoft SQL Server SOL Express C MySOL lt Back Net Cancel The next point concerns the SQL parameters Kaspersky Administration Kit Administration Server Properties Set Microsoft SOL Server Parameters Select computer hosting SOL Server Install Microsoft SQL Server 2005 Express Edition recommended E Ci r a SUL Server name SVCSRAKAV CS ADMIN KIT Database name KAW Bui We select SQL Express for our test Kaspersky Administration Kit Installing Prerequisites Information about necessary applicaiorcs rou have chosen to install Microsoft SOL Server 2005 Express Edition Setup wall pestorn this action and also install the following necessary applications Microsoft Windows Installer 3 1 Microsoft Data Access C
64. agement Server is McAfee Trend Micro Unlimited 25000 20000 Web NOC Intel Pentium Pro cessor or compatible architecture 512Mb Ram 500MB Disk space OfficeScan server 1GHz CPU min 1 GB RAM min 3 5 GB free hard disc space 2GHz Pentium or equivalent 512 MB 300 MB HD AV comparatives Product Review Corporate Review 2010 www av comparatives org Feature list Bitdefender Kaspersky McAfee Does the product provide a mechanism to limit the data transferred over WAN Links when updating clients in remote locations By designating one client as local source for definition updates Super Agent Group Update Provider Does the product provide a mechanism to prevent updates over expensive net work connections like UMTS Does the product provide a delta up date mechanism Does the product allow customers to use 3rd party tools for virus signature distri bution Which options does the product provide to ensure that only Authentification Authentification authorized adminis username password username password trators can administer the product Password protection Administrator Authentification Username Password encrypted communi Authentification account username password requirements cation role based username password administration Password protection encrypted communi cation Require minimum password length Lock adminis
65. al time status Easy remote installation Good grouping functionality Quick and simple installation Excellent Exchange protection Deployment areas Small Networks 0 50 Users Medium Networks 50 500 Users Large Networks 500 Users KA Ak KA Ak AA A Summary AV comparatives 35 Product Review Corporate Review 2010 ESET Product Review Corporate Review 2010 Installation Downloading the product It is easy to find the products you re looking for as the website is clear and well designed ESET is the only manufacturer amongst those in this review to limit the availability of the test version It is only possible to download a trial of the corporate software after making contact with the company Like many other manufacturers ESET makes a separate installer for every individual product or tool The products can be bought online from the web store There is all information and user guides about them on the site ESET offers an online scanner as an additional service free of charge Installation of the products We start with the installation of the Remote Administrator Server 3 ESET Remote Administrator Server Setup X ESET Remote Administrator Welcome to ESET Remote Administrator Server 4 0 122 0 Setup Wizard The Setup Wizard wil install ESET Remote Administrator Server pn your computer Click Next to continue or Cancel to exit the Setup Wizard Next we
66. aller Estrachryg toot VAEAD best TXT Extracting readsec_45_eng himi Extracing Serveinetaller pre tegqs doel ramevecik dotniethci exe L w Cm We are then greeted by the install wizard e Sophos Enterprise Console 4 5 0 InstallShield Wizard Sophos Enterprise Console Setup is preparing the InstallShield E E AV comparatives Product Review Corporate Review 2010 Next the setup programs checks that its re quirements are met IE Sophos 5 Ente erprise Cons vole 4 3 D Installshield wizard Windows Installer 4 5 KB958655 must be installed before installation In this case we have to update to the newest Windows Installer it is worth checking before installation that this is up to date Having done this we can proceed with the installa tion and accept the licence agreement i 5 Sophos Enterprise Console 4 5 0 Installshield Wizard SOPHOS END USER LICENCE AGREEMENT ee read ro the aig legally binding End User Licence a BR e Next we can choose the installation folder ris Sophos Enterprise Console 4 5 0 InstallShield Wizard Sophos gives us the option of a Complete or Custom installation We choose the Complete option AV Product Review Corporate Review 2010 As in last year s test we can only applaud So phos optimal Active Directory support The next step allows us to choose an AD group which will be given adminis
67. also been con figured with the wizard The integration of additional clients or addi tional products can now be carried out directly from the Security Management Center or by using the configuration wizard again which can be started directly from the Avira Avira SmallBusiness Suite program group Especially the configuration wizard makes the initial configuration of Avira SmallBusiness 17 AV comparatives Product Review Corporate Review 2010 Suite child s play It is very nice to see a man ufacturer reacting to customer feedback and Avira has really succeeded in making the man agement center much more user friendly The general features have not been signifi cantly changed and so anyone familiar with Avira will still find their way around the set tings very easily It is of course possible to create an individual structure for complex networks so that differ ent configurations can be applied as necessary For example separate configurations could be assigned for local and remote computers Ti dea Security Hanayman Center Frzniend t e Sie Arpa Remote Installation remains unchanged Right clicking a client machine then Installation Avira SMC Agent allows installation of the agent Other software such as the client anti virus program can be installed in a similar way 1f 1t has not already been installed through the wizard www av comparatives org The authentication possibi
68. and ing and makes child s play of setting up ac counts etc The management console As with last year s product the current Sophos management console is a trend setting solu tion 100 The clear and simple design with strong report ing functions can cope with the most complex requirements and the configuration wizards are convincing throughout This console should serve as an example for many others Deployment areas The Sophos suite is suitable for all networks without exception Its strengths are particular ly suited to large and complicated networks Antivirus clients Endpoint Protection is based on the principles of Network Access Control NAC This is hardly noticeable to the user and the remote instal lation is very simple to carry out Summary This year as last Sophos has along with McAfee produced the best suite of those we have reviewed The consistent design of the product line and its installation is convincing throughout Almost no other suite offers the user more functionality with such ease of use and organi sational features AV comparatives Product Review Corporate Review 2010 Pros Cons Real time status of tasks Few Exchange functions Graphic design of administrator console No indication of download progress Simple remote installation Excellent setup wizards Quick and easy installation Deployment areas Small Networks 0 50 Users Medium Network
69. and Logon Script Inatalabons __Propertes i Enumerate On Server Exchange 2007 protection To start off with the Exchange protection com ponent has to be installed LN ils ESET Mail Security Setup ESET f Mail Security 4 Welcome to ESET Mail Security Setup Wizard For Microsoft Exchange Server The Setup Wizard will install ESET Mad Security on your computer Cid Next to continue or Cancel to exit the Setup Wizard Warning It is urgent that you uninstall any other resident security applications such as anti virus or anti spyware programs that may be running before continuing installation to avoid serious problems wes ca Once again there is a licence agreement to accept ie ESET Mail Security Setup End User License Agreement Please read the following boense agreement carefully IMPORTANT NOTICE Prior to download installation copy or use please read the 2 below terms of the product application BY DOWNLOAD INSTALLATION COPY OR USE OF THE PRODUCT YOU EXPRESS YOUR CONSENT TO THESE TERMS AND CONDITIONS End User License Agreement for Software Use This agreement on software usa the Agreement executed by and between ESET spol sr o with its seat at Einsteinova 24 851 01 Bratislava registered in the Commercial Register of the District Court Bratislava L Section Sro Insertion No I accept the terms in the License Agreement E Ido nat accept the
70. ar produced a very good corporate suite which can be rec ommended to everyone without reservation The setup wizards and administrator interface make working with the suite very easy It is of particular note that Kaspersky is one of very few manufacturers to produce a real time display of the status of client deployment It is actually mystifying that other software companies dont follow Kaspersky s excellent example and allow the administrator to keep up with the installation status of the clients AV comparatives Product Review Corporate Review 2010 Pros Cons Real time status of tasks Limited Exchange functions Graphic display in administrator console Simple remote Installation Excellent setup wizards Quick and easy installation Deployment areas Small Networks 0 50 Users Medium Networks 50 500 Users Large Networks 500 Users AA A XA Ak AAA Summary AV comparatives Product Review Corporate Review 2010 McAfee Product Review Corporate Review 2010 Installation process Downloading the products The layout of the McAfee website is simple It is however the least informative of all the manufacturers websites in this review You could be forgiven for thinking that it serves rather more as a storage area for developers documents and less as a source of information for customers Even after searching the website for hours it is still not clear to the c
71. are Wizard E xl Platform selection Select the platforms you vil be protecting on your network D windows 9x v Windows 2000 and above O mac os X 10 44 Ol solaris 3 10 SPARC O Solaris 9 10 INTEL O unux O ex 1464 11 234 O arx PowerPC 5 3 To make the initial download as quick as possible ls platforms for which you need software now You can change these settings later ma gt ome The necessary files are now downloaded to the hard drive It is not necessary to wait until the download has completed you can click on Next to go on to the next page However So phos unfortunately leaves you in the dark as to how fast the download is progressing and when it will finish Download Security Software Wizard Downloading software This shows you how downloading and preparation is progressing Sophos Enterprise Console will now download your software and prepare it for installation on your computers This may take a few minutes Downloading and preparing software Sophos Enterprise Console is waiting for the download to finish Click Next now to continue downloading in the background The next stage allows you to use AD to import computers into organisational groups 91 Download Secu rity Software Wizard Create groups and import computers from Active Directory Setup groups for your computers if you use Active Directory At the end of the wizard there is the oppor
72. arefully The licence key now needs to be entered Press the PAGE DOWN key to see the rest of the agreement IMPORTANT READ CAREFULLY USE OF TREND MICRO SOFTWARE AND SERVICES BY BUSINESS AND OTHER ENTITIES IS SUBJECT TO THE FOLLOWING LEGAL TERMS AND CONDITIONS Trend Micro License Agreement Trial and Paid Use License Enterprise and SMB Software and Services Date May 2010 English Multi Product Activation fip TREND You must activate your product to enable scanning and security aidas j les TREND MICRO Control Manager soles To obtain siete eras Key register the product 1 Scope This Agreement apples to all Trend Micro software Softwared services sold as 9 H EINE online using the supplied Registration Key standalone products Standalone Services and service components of Software Do you accept all the terms of the preceding License Agreement If you select No the setup will close To install Trend Micro Control Manager 5 5 Pim you must accept this agreement Instats held Control Manager 5 5 Required D PRU UD US e os Giuthreak Prevention seice Recommended y 7 104 comparatives Product Review Corporate Review 2010 Trend Micro also asks whether we wish to join their threat network and send feedback Trend Micro Smart Feedback The Micro Micro Smart Protection Network content is a next generation security infrastructure designed lo del
73. begin McAfee ePolicy Orchestrator Welcome to the Holes ePolcp Drcbezstalor setup los Total Protection for Erdporil suite Tros paie makat deplopra TOPS has Ersdescani sas and ec ll comes rath peecinztalled ToPS for Endpomni packages and a ToPS tour thet promdes vealibrough procedures dor the miia setup ol erokey DeFa Thee Inatal5 heel Winand well inita he PO and ToPS packages on your compulsi To continue cki led Hat Cancel AV comparatives s TM e Product Review Corporate Review 2010 Next we have the choice of entering a licence key or using a test version ePolicy Orchestrator im your ePokey Orchestration koense len If pou do not barre a licere hey select Evaluation do natal an evaluation vermon of scitum f License Key E Eya Mice Pokey rchegtrator d Fe pma mend back wanous pestem and rebai infoeruaticn including Hres information and bernie usage ba Haije as mora morron plane hind the FAC on cur doica site The next step is to enter the user credentials for the management console Hide Pol bestrator 4 5 0 Patch 1 McAfee ePolicy Orchestrator Enter the ePoboy Dichedestor admrssteahor umer name and paspeced Lipe this uses name and passicad the fret Gma you log on to ePokep Onchest ator Use ream 3 5 Prnt Corim parsed ewer License expiry date Sunday November 14 2010 Untied States
74. cess access rule applies Does the product provide selection criteria to specify processes e g by name Process Definition 2 How can processes i e applications amp services be specified that are al lowed disallowed to perform actions i e modify files read y keys load nu QE A hash By filenames amp spe cific folder c MDirectory applica tion exe A comparatives E 2142 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Sophos Trend Micro Using wildcards i e Limit by location i e local drive CD USB Stick By user authorization and by Behavioral Other Genotype based whitelisting identities produced by So phosLabs HIPS Actions Which actions can be Block allow allow RENE taken when a rule is once block once Block Block Block allow p y 1 terminate triggered ignore resource resource Terminate the process trying to access the resource Can the end user be notified when a rule is triggered Can a log entry be created when a rule is triggered Conditions Which conditions can be checked using the user inter face without using scripts Conditions for files and folder How can files be specified AV omparatives 143 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee
75. comcel During the installation 1t will be automatically be recognised that the AV client is installed on the server and the user is shown a message that 1ts virus database will be used by MailSe curity G Data MailSecurity InstallShield Wizard ve GData AntiVirus Client has already been installed G Data MailSecurity uses the installed client s virus signatures When the installation is complete we can start the administration console and start configur ing f G Data MailSecurity Installshield Wizard InstallShield Wizard Completed GDATA The InstallShield Wizard has successfully installed G Data MaiSecurity Click Finish to exit the wizard AV comparatives Product Review Corporate Review 2010 The MailSecurity management interface After the installation we start the administra tor console R AS G Dat MaiSecurity Here too a password has to be entered T G Data MailSecurity Administrator Please enter the name or IP address of the computer on which G Data MailSecurity is installed as the server Server aves RV Password As we have not yet set up a password for MailSecurity administration we have to do this now ad Please enter a password for future logins Once again it is clear here that G Data is at the forefront of simple user interface design All essential information is shown on the first page of the intuitive
76. components are started Please west urdil Instalstiend m AntiVir Avia SmallBusiness Sute is configurmg your neve sofbwane installation Instaling Avia Securty Management Center Frontend Here we see that the future security environ ment database is populated with AntiVir Pro fessional and the AntiVir Server so that the program can be remotely installed to client PCs Ayra ea iras tr Lonfuparabien Wirard Sai products bo recu en onaeent Tha llora prisiuctt vell ba added lo Bh secunhy error ariel vell be rrollo les rilaksi d Iceried properly Val A ga uri all oce abcecr haee Corre B dn era Mmi n Ir Avira 5mall amp usiness Suite InstallShield Wizard Ann era pairal EN Supoart InstallShield Wizard Complete The InstalSheeld Setup has succesul installed Ihe Avia Small usiness Sube Cicek Finish lo ea the setup and star the configuiahon wizard f pou cancel the configuration wizard at a Spectic pont you can reenter it through the specific start menu shoitcuts www avira com AntiVir T T iL The product now searches the network envi ronment for computers that are not already managed Computers are added to the man aged network simply by marking the tick box After successful installation the SmallBusiness Suite wizard starts this takes care of the next step in the setup AV comparatives Product Review Corporate Review 2010 www av comparati
77. ct allow administrators to assign different policies to different groups of computers regardless of the person logged in Does the product allow administrators to assign policies to users regardless of the computer they Tem the product support static groups i e user or computer are assigned manually to a group or are imported from a third party system Does the product support dynamic group assignment based on criteria like IP addresses Does the product support hierarchical groups with inher itance 130 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro Location Awareness Is the product capa ble of using different policies settings and rules depending on the location of the computer Which set tings policies can be changed depending on the location Protection technology BOMCIES i po qo poa pou Firewall policies O 1 A 1 Device Control poli cies Anti Spam Web Anti Spam Proactive Other protection Content filter Inter Defense Anti Banner technology policies net usage control Anti Dialer Anti prom control Hacker Updating User interface config uration tings When the client detects the notebook is running on battery scheduled scans are automatically delayed and updated program components are not downloaded Content update set AV tings comparatives
78. ct Review Corporate Review 2010 Downloading the product The website design is simple and logical There is no difficulty finding the products you want and they can all be downloaded in fully func tioning versions You have to register to get a test key for the software This allows an adequate 30 days in which to test the product With BitDefender trial registration you get an email message with downloadinstructions and links where you are pointed to videoturorials too Two possible installation methods are de scribed in the documentation The components can be installed individually with their own installers or by the management console The latter is significantly simpler but the individ ual components method may be useful in spe cial cases fics BitDefender Management Server Setup Choose Setup Type Choose the setup type that best suits your needs E S O Default Installs the most common program features Recommended for most users BitDefender Windows Servers support will not be installed Custom Allows users to choose which program features wil be installed Recommended for advanced users BitDefender Windows Servers support can be installed with this opton me ees 24 WWW av com paratives org In the business section of the website there is an overview of the functionality provided by different versions of the suite This is very simple and practical for the user B
79. curity for File MultiUser Office Security Servers for 5 users McAfee SaaS and Sophos Computer Trend Micro recommended product Email Protection Security Small Busi Worry Free Business with GOLD support ness Edition Security 1 year Euro Scenario B SMB 1 SBS 2003 Server 25 Clients ESET Smart Security E McAfee SaaS and Sophos Security Suite Trend Micro E G Data AntiVirus Kaspersky Business i i Client File Server i Email Protection Small Business Edi Worry Free Business Enterprise Space Security Security Security Advanced BitDefender Small Office Security Suite Scenario C 1 Fileserver 1 Exchange server 200 Clients ESET NOD32 Antivirus Avira AntiVir Business BitDefender SBS 4 ESET File Server G Data AntiVirus Kaspersky Enterprise Bundle Security Suite Security ESET Mail Enterprise Space Security Email Protection Security and Data Worry Free Business Server Security with GOLD support Protection Security Advanced 1 year plan EURO 8600 6880 4910 5575 5166 7407 7550 9700 3 year plan EURO 17200 13760 10311 11878 11622 14261 15100 15520 1 year plan USD 12050 8390 6380 7152 6210 10124 8600 13280 McAfee SaaS and Sophos Endpoint Trend Micro recommended product camparatives 172 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data AS ky McAfee AS Trend Micro 3 year plan USD 2400 16780 0260 0 39838 d2
80. deel Feb Connection settings ae o La A Cake Thap bee Cored obw DF Sieve i cbir oe the epee i che Beis Wales lor esciusbos Irem Ifa scam goose i Protection loa maine Notification settings allow us to set up notifi cation rules for main predefined event types Anti SPAM protection tab allows us to define rules for spam processing FE Rarperie Sremit 1 un br Microsc Lachangr rrr KASPERSKY unity A for Hirose Deceagpe Sucre Action a Sre cop Aide ibe Label i meppace header a s r Reports management allows us to create and view reports on virus and spam detection Updates management also allows setting up update source and frequency again as a sepa rate settings for Anti spam and Anti virus pro tection AV comparatives 73 Product Review Corporate Review 2010 napalo rcr dl ile Ha fever Geren e a We Pp arim m rece KASPLRIKY ie Kan prmky enrurfiy ED fer Herat Lxcharege terrena Fle kin View elo e sio Bl KASPER5KY Loga Hen dider Z Program Files B Kaapersiy Lab napa Secunty or Mercac Exchange Careers isga Dara storage E Fin rict the Backup nicraga use sckun se man nobexceed 5020 ME E Reena the dos of obpect storage in Backup Stove sben ns lorgar han 35 2 daya Re Presera Heia data hormona than TE Fens ee a
81. dows Domain tication mechanism es authentication can be i e username ne password AV amparatives 153 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender ESET Trend Micro G Data Kaspersky McAfee Does the product enforce minimum password lengths Does the product enforce maximum Depends on Windows Security Policy Depends on Windows Security Policy password age Can administrators be authenticated using Active Directory Can administrators be authenticated using RSA Secure 1D tech nology SEC uses AD NAC and Administrator ac Other Account Security Does the product lock an administrator account when a wrong password is provided multiple times prevent brute force attacks and can it be unlocked Encryption use sepa rate authentication count Depends on Windows Security Policy automatically after some time or manual ly by the administra tor Does the product log an administrator out after being idle for some time Administrator Audit ing Does the product logged Log in Log out comparatives 154 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender G Data Trend Micro Sophos Kaspersky McAfee Changes to policies Changes to system settings Changes to groups Change to administra tive accounts Which info
82. duct is a really well done software for enterprise environments AV comparatives Product Review Corporate Review 2010 Pros Cons Very simple installation Use of the manual is unavoidable when in Very good organisational features stalling ERA console Ideal for very large networks Partially complicated admin interface Deployment areas Small Networks 0 50 Users Medium Networks 50 500 Users Large Networks 500 Users Summary AV comparatives sA s Product Review Corporate Review 2010 G Data GDATA Product Review Corporate Review 2010 Installation Downloading the product It is easy to find your way around the website which is clear and simple There is no difficulty finding the products you want and all soft ware can be downloaded as a fully functional version Most modules come as an ISO file weighing in at 1 3 GB It s important to allow enough time to download this much Fortunately G Data s servers have high speed connections There is of course an overview of the functions contained in the different suites Produkt bersicht Nara Firewall AntiSpam Policy anager Malbeceribr G Data m Bari iren Dorie G Dala Anna boterpriee G Data ske G Data CIsrnbsecarity Business G Data Chenteecurity Enterprise G Dala EndpolntProteci n Business dee d ndpesintl riteciian Enterprise Product installation We begin with the insta
83. e 1 year plan USD 228820 Price is negotiated 152120 246800 207200 226850 Price is negotiated Price is negotiated case by case case by case case by case 3 year plan USD 457650 Price is negotiated 302225 APVT TVA TOUT Price is negotiated Price is negotiated case by case case by case case by case All prices are Manufactured Suggested Retail Prices of 2010 Actual retail prices may differ considerably esp for scenarios D and E as esp for large projects many factors and savings discounts may apply Please contact the vendors for actual project prices The here listed prices are just a rough estimation Furthermore some products may be more expensive as they include e g additional Support or Suites instead of AV clients only AV comparatives 173 Product Review Corporate Review 2010 WWW av comparatives org System Requirements Part 1 ESET ESET G Data G Data G Data Kaspersky Kaspersky Kaspersky System Requirements AVIRA AVIRA AVIRA ESET Protection Client Protection Client Management Server Management Server Management Console Management Supported Operating Console Systems Apple Mac OS Mac OS X Mac OS X Server iPhone OS iPod OS Windows 2000 Professional Server Advanced Server Advanced Server 64 Bit Intel Advanced Server 64 Bit Itanium Data Center Server Data Center Server 64 Bit Intel Data Center Server 64 Bit Itanium Windows XP Home Professional Pr
84. e reason automatically because of MD5 publisher or due game mode port scan Service started stopped FW enabled disabled Critical warnings Errors Warnings Informative records Network attacks Allowed in last 10 and or Diagnostic Banned hosts Appli mins Allowed today records For trouble cation activity Pack Blocked 10min today shooting all blocked et filtering Processes System log connections can be logged Which logs are pro vided Can the firewall rules be exported and imported Client Management Can the administrator limit or control con figuration changes by the end user Can different policies be applied for differ ent computers Depending on the location of the device 1 e Office Hotel Home etc amparatives 151 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro Depending on group computer Depending on group membership of the user 1 e administra tor vs normal user Which actions can be initiated in ad ministration con sole Update signatures seript Sencmpute Ft Enable On Access Scan Enable Disable Fire wall Change all aspects of Comply with policy connection verifica configuration includ mail scan Clean up Initiate tion uninstallation All actions available i Other ing handing off a on off software scans
85. e system www av comparatives org Summary The Avira Small Business Suite is very easy to install and fulfils all essential requirements The suite is ideal for small to medium net works although improvements for larger net works have been implemented The client software is light on system re sources and the remote installation runs very quickly and easily Unfortunately Avira is no exception to the general failure of security suites to provide real time status information The noticeable development and improvement of the product is particularly worthy of praise Even if there are small imperfections in the product now you can happily use it as there is every chance that even these will be im proved in the future 21 AV comparatives Product Review Corporate Review 2010 www av comparatives org Pros Cons Rapid client installation Only small imperfections that are well com pensated by the ease of use and clearly laid out structure Clearly structured management console Good configuration wizards Active Directory Support Automatic installation of Avira security products Active error reporting through filtering groups Deployment areas Small Networks 0 50 Users Medium Networks 50 500 Users Large Networks 500 Users Overview AV comparatives 22 Product Review Corporate Review 2010 www av comparatives org defender BitDefender Produ
86. e Wizard Sophos is one of very few manufacturers to have their own management console design This is very well thought out and structured This wizard will guide you through the process of and automatically updating the security software you need You will need the username and password supplied to you by Sophos Fm bh ve es a ues e fmm He Datla es N Waandmuc crea er l a T anima X 24 a To continue cick Next y ej ome 2e IW dE acu duse eaa HEIN PR A fan eee a ent al Esta aime Corera Cm Cee 1 41 8 Now we have to enter the username and pass word for the Sophos download account In the event that the system connects to the Internet via a proxy server this information can be added in the same dialog box We particularly like the dashboard with its Download Security Software Wizard overview of the state of all important security rri RM O aspects The experienced user will see the im mediate tasks at a glance Rates LR CU LL d Username ll 1 Create network organisation groups and ERE Em add computers to these 2 Configure updates 3 Remote installation of the client software 4 Changes to the central configuration comparativas 90 Product Review Corporate Review 2010 The next page of the wizard allows client soft ware for different operating systems including Mac and Linux to be selected Download Security Softw
87. e provided with your copy of Avira The path to the installation folder can now be selected We chose to install to the standard location www av comparatives org The first step is the local installation of the products belonging to the Suite i e the Anti Vir Workstation the AntiVir Server and op tionally AntiVir Exchange Avira SmallBusiness Suite InstallShield Wizard xj 2 AntiVir Select Features Select the feabures setup will install Ayia Anie Server Amions qa Avira AntiVir Workstation Windows A Avira AntiVir Exchange Server windows The next step is to enter the credentials of a Windows user account with administrator privi leges Avira Smalbusiness Suite Installshield Wizard 1 Administrative User4account You have lo enter an administrating user account which is requeed for the installation of the services n PME eomm A The installer now has the information it needs to begin AV comparatives Product Review Corporate Review 2010 www av comparatives org Avira SmallBusiness Suite Installshield Wizard X Ready to Install T Eg 2 P f Mou and a X ra to apio e talo AntiVir Tha ward heir you though the configuration process of fa era Selina Suba ick hast and imply fokoa the AntiVir Il pou click Install the setup vall install several components of the Avira SmallBusiness Sube to your computer Therefore the chid setups of these
88. e the G Data client software There is also the option of forming groups to make larger networks more manageable 53 de Enter niter G Dala AntiVirus slatus ll siccum m rw a EE ham matile mu v Deeply disabled viernes fus signatures hai A group Bure server ae ae wo pun fick actis wa Shield actes wo a nabled Now we are ready to carry out the remote instal lation of the clients To do this we click on the Clients tab and select Install G Data Client EXTTEDIUTUIUTMMTETS 8 30 ii gai Computer En Erre Ergeb 6 Data Ghent verson Last access Wam mes natacion U o4 Pesos pasci a se account on Poe peres hal hat soccer ghia foe thay een roger wach ater Pad reed PTT TTT Domainz pecresm 1 We notice that G Data is a leader with regard to user interface design and intuitive use of the software After the access credentials have been entered we are asked if the G Data client firewall should also be installed AASEN G Data Admunisirabut Pis Cisti Ves Oeti Debra arlok w a Bale a 5 Entre network j Ed nec 4 Decem zl ASR E P AI ale Tab ebl A AYCCLEENT G Data Adininietrabss Thaid fus rina dho be installed E PEA Unfortunately there is no real time progress display and the messages provided by the comparatives Product Review Corp
89. ection and conten Glenn Hor Hicaba Exchange and IBM Lotus Dore Servers ePolicy Orchestrator Here we can select the installation folder PER Pciralne 45 0 Pa o d xj McAfee ePolicy Orchestrator Oheste Deslinalien Locabo n Select rhe Polar vohis ostup citada Mes Setup vil natal Mises ePoley Dechwitiator in the hello folder Ta ira al to than kakis click Nest To rata to a diferent fodder click Brower and select ancrhes joida The access data for the database server is then entered Sel Database Infomation Identity the pps ol poomi and authenieshom dell hal the aP nerves user 1n access the dalsbae Product Review Corporate Review 2010 xjl This is followed by the choice of ports for LE Sy communication with the suite ePolicy Orchestrator bicis Polop rchestator ii confiar your new solis melallaton ePolicy Orchestrator Sel HTTP Configuration Enter the por numbers you aih lo use in the fest Bowes provided The Policy Dochestratos serves communicate valh the console and agent aang HTTP The HTTP ports must be free on managed atien and on the nrram that hosts the nerves Agent wake up communication pot m Agent broadcant communication por no SOL server TCP post Ew When installation is complete we start the Orchestrator to carry out the configuration Hcider Policy orchestrator 450 Patih The installer now has enough information to Policy Orchest
90. ed not desir able or confidential content comparatives 162 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Trend Micro Blocking unwanted e mail senders spam senders mailing lists etc as well as to unwanted recipients e g competitors Analysis of images on undesirable content e g pornography Using current spam pattern for the fast detection of new Spammer tricks User Specific Man agement of White and blacklists on the server solely for effective blocking unwanted e mails Freely editable exclu sion list for addresses and content in sub ject and message text Flexible notifications of blocked e mails directly or schedule to administration or transmitter receiver email User specific access to e mails in the quarantine Centralized quaran tine management Formation of compa ny specific e mail categories Automatic classifica tion of e mails to one or more categories comparatives 163 Product Review Corporate Review 2010 WWW av comparatives org Response Manage ment through defined classifications for example the custom er support automatic forwarding of e mails Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro to qualified employ i Em m mM Document protection Following categories may for example all outgoing e mails on company related conten
91. ed the options we then see from the overview page of the Administrator window that the system is now well protected AA GEV G Data HalSecuriby Sdmiembradnae SQ current siaus copia for G Data Macast De ik fe mouse hey to et he ca Anchors MailSecurity Peon EN numos di messages G Data hahen 1 integated mothe dala seam of incomng emad amd can proceda eea beloie d dha the pereer The Filter area allows us to use pre configured filters or create our own to deal with the most diverse requirements Filter Sen ae sable ae ae ee AA TA un IL We were also impressed with the various op tions for viewing the mail protection system such as the queue or processed mails The tabs have been arranged so as to show all the important options on one page without overwhelming the user with choices AV comparatives 58 Product Review Corporate Review 2010 Any malware found is clearly displayed in the Virus results section P Outgoing message queue amp Deere ef roma and nutgeex edad eh a collecting r the Malas Target host Sender Pander Sor men Ment repeat sts VECSEY G Data Malbecanty Aimee ior E Ober Pa MailSecurity Te Fiter d queues E Activity EN vrus resuts The last of the configuration options is found under Spam Filter This is structured in the Same way as
92. eld Wizard vall install Sophos PureMessage on your computer To continue click Next Destination Folder C Program Files Sophos PureMessage Browse Installshield Here we have to supply Sophos with the regis We accept the licence agreement tration information in order to be able to download updates Sophos PureMeszage Installshield Wizard X Licenze Agreement Please read the following license agreement carefully SOPHOS END USER LICENCE AGREEMENT Please read carefully the following legally binding End User Licence Agreement between Sophos and You for the Software defined below By selecting the accept option breaking the seal on the software package or installing copying or otherwise using this Software You acknowledge that You have read understand and agree to be bound by the terms of this End User Licence Agreement If You do not agree with the terms of this End User annnm nraarmant Aa mat incall tho Esfheara nr i IN S bono zl accept the terms of the license agreement Print C donot accept the tems of the license agreement NS UN Back Next gt Cancel InstallShield 95 AV comparatives Product Review Corporate Review 2010 Sophos PureMessage InstallShield Wizard Sophos Download Credentials Configure your download credentials Enter the download credentials provided to you by Sophos This account is used to fetch anti vinus and ii pour Beense permit
93. end Micra Senex NOTE UNC path format is not supported lt p mw cos Next we have to enter the web server settings Trend Micro ScanMail for Microsoft Exchange Setup Please specfy Web server information Microsoft hiema hiomaton Services 5 0 or above Port Humber and 55L Settings Port number Enable SSL Calico a d AU SSL Port 16373 16372 As we have so far sorely missed automatic detection in the setup process we are espe cially surprised to see the next dialog Trend Micro ScanMail for Microsoft Exchange Setup E Please wait while Setup checks the target server s for system requirements files and select a shared disk for cluster servers only Passed for new installation CA Chent Access UM Unified Messaging Passed for upgrade HT Hub Transport ET Edge Transport Failed MBX Mailbox comparatives Product Review Corporate Review 2010 www av comparatives org Now the installer confirms the information Again we are asked if we want to take part in which we have had to enter manually the manufacturers data sharing program called World Virus Tracking Program Trend Micro ScanHail for Microsoft Exchange Setup Checking Target Server em Requirements TREND Trend Micro ScanMail for Microsoft Exchange Setup E Wedd Vinis Tracking Program b TREND EJ Please wait while Setup checks the target server s for system requirem
94. ents Bj u reno Click the server link to configure SQL server settings for installing ScanMail data files and select a shared disk for cluster servers only T Computer Exchange Server Role Cluster Status real time statistics are depoye em o e Vs ap Tert eS TUE Exchange 2007 SP1 MBX HT CANO Fresh install each continent and Yes 1 would like to join the Wodd Virus Tracking Program EcL E a virus is detected on my system 3 d detection information i names and number of detections Soa Bari ig ic ill lt wil not send out company names individual names machine names sie names IP addresses pericli mure tr m understand that can disable this automatic reporting function at any time by y changing the configuration lo Ne within the product s management console Passed for new installation 1 CA Chent Access UM Unified Messaging Passed for upgrade HT Hub Transport ET Edge Transport C No dont want to participate Failed MBX Mailbox PESA ome The installer still needs more input from the user namely proxy settings Every detail is asked separately Now we have to decide what to do with spam mails Trend Hicro ScanMail for Microsoft Exchange Setup C lion Seiti ace aa settings f TREND Trend Micro ScanMail for Microsoft Exchange Setup Proxy Settings Uses a proxy server to connect to Intemet Proxy type HTTP SOCKSS w bcia End Us
95. er including Exchange 2007 SP1 DNS including forwarders Client Configuration CPU Intel Dual Core 3 GHz RAM 4 GB RAM Hard disk 80 GB SATA OS Windows 7 Business Security Updates current as of July 2010 Product Review Corporate Review 2010 Management Summary This year the participants were AVIRA BITDEFENDER ESET G DATA KASPERSKY MCAFEE SOPHOS and TREND MICRO Of these MCAFEE BITDEFENDER and TREND MICRO are new to the review having not been covered last year Both MCAFEE and SOPHOS impressed us with installers that do everything with a single click The installation of these products was particularly simple as was the configuration With ESET we noticed the ease of administra tion of the clients This works well and enables administrators of extremely large networks to find their way around and configure the sys tems easily However it should be noted that while installing ESET it is necessary to consult the manual But reading the manual should be done for every installation In the case of AVIRA we observed that the manufacturers have revised the design of the suite and incorporated our suggestions into the product The configuration and integration of the client PCs are both carried out using wizards It is good to see a manufacturer re sponding to the wishes of its customers BITDEFENDER KASPERSKY and G DATA stay with their respective existing proven interfac es www av comparativ
96. erent products and their functions By and large we had no complaints about the design of the website a63 Product installation We begin with the installation of the Ad ministrator Kit Aj Kaspersky Administration Kit InstallShield Wizard xj Welcome to the InstallShield Wizard for Kaspersky Administration Kit The InstallShield Wizard TM will help instal Kaspersky Administration Kit on your computer To continue cick Mext The first step is to choose the folder for the setup files Aj Kaspersky Administration Kit Installshield Wizard Location to Save Files Where would you kke to save your files Please enter the folder where you want these fles saved If the folder does not exist it will be created for you To continue dick Next m mot cm The installer then this folder unpacks the setup files to Product Review Corporate Review 2010 E Kaspersky Administration Kit Installshiekd Wizard Extracting Files The contents of this package are being extracted Please wait while the InstalShield Wizard extracts the Ales needed to install Kaspersky Administration Kit on your computer This may take a few moments Reading contents of package imtasi Welcome to the InstallShield Wizard for Kaspersky Administration Kit The setup wizard wil guide you through the instalation of the Karperty Administration Eit application itis strongly recommended that you ext all Mic
97. erns the creation of a pro gram group in the Windows Start Menu ServerProtect Setup Select Program Folder Please select a program Folder Setup wal add program icons lo the Program Folder irted below IEEE name of select one from Une existing folders list Dick Next to contra EIU Folder A The installer now has enough information to begin the setup process Start Copying Files Review seling before copying fles AX Setup has enough information to pora he progran Me l you want to review or change ary setings ciek Bak pipah eie seltings click Nest bo begin Instatishield On completion of the installation we start the ServerProtect Management Interface ServerProtect Setup E InstallShield Wizard Complete The InstallShield Wizard has successfully installed ServerProtect v5 90 Click Finch to exit the wizard V want to view the README file v Launch ServerProtect Management Console Product Review Corporate Review 2010 The ServerProtect management console The first step is to enter the password into the familiar logon dialog box Next we have to decide if we want tips for using the console to be displayed ServerProtect Management Console 5 8 View tips for using ServerProtect Management Console 9 Do not show this message again We were pleased to see that an update is im mediately recommended Trend Micro ServerProtect Management
98. erver and be applied to it clients respectively we add the machines to these My Organization gt Serwer Systems gt C System System Description mede eme e BS Mese ee c a arn a ep System Name d Managed State Tags Ip aa d 5 RM avesev Managed Server 1s Deploy Agents a Modify Policies on a Single System S Modify Tasks on a Single System ditm Choose Columns Sat Description IgG Create Time Based Password Set Policy amp Inheritance Export Table Show Agent Log VA 7 This very extensive form allows the administra nete imino Ta 2 i Now tor fine control over the process of adding pasaste Agent j Wake Up Agenta computers and also enables pre configuration a Directory Management of some important settings thus saving a lot Actions Y ised Wake Up Agents Ping of work later Having activated the Computer Browser service on the server and entered details of an admin istrator account you can select the computers and add them into the security structure The scope of the Orchestrator is very wide and the well designed web interface makes it very user friendly It is very easy to download the necessary software packets and store them in the Repository of the Orchestrator from where they can be distributed with just a few clicks Browse for Systems Domain AVCTEST zl To do this we go to the Client Tasks area and select New Task
99. erver instance called SOPHOS will be created and populated during the Space Required on C 1707MB Space Available on C 1868 ome Rm oce ur Inctetareld When installation has finished the installer informs us that the current user must log out of Windows to complete the installation ie Sophos Enterprise Console 4 5 0 InstallShield Wizard Enterprise Console runs correctly your le ed ot To log off automatically dick Finish If you want to log off later uncheck the box below and then dick Finish v Log off now Immediately after the user has logged on again the Sophos wizard appears and connects to the newly installed management server Sophos Enterprise Console Connecting to the server This might take a few seconds AV comparativas 89 Product Review Corporate Review 2010 The most important commands can be found as buttons with appropriate icons on the menu bar When the management console has started the configuration is checked SS ATEO US The second section is the configuration area where the organisational structures are created and configuration is assigned according to policies This layout is simple and convenient Our first task is to start the download wizard which will obtain the additional software needed to protect the clients Download Security Software Wizard i E x Welcome to the Download The management interface Security Sofwar
100. es Update Server is separate from the Slave Server It is possible to install and configure more Up date Servers in cas cade els they each have their own credentials for full access and for read only access Policies from upper server can be propa gated to lower serv Various product ver sions can be managed within a few clicks nested multiple lev Client Installation Which client de ployment methods does the product support Does the product include a mechanism that allows the ad ministrator to push the software to the clients amparatives 127 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro Can the installation of the clients be staggered over time to ensure that the network is not over utilized Can the administrator see the status of the deployment i e Transfer Installation in Progress Installa tion complete etc Does the product include a mechanism that allows the end user to download and install the software Can the admin sent a link which allows the user to download and install the software Does to product support the creation of MSI packages for deployment with 3rd party tools and Active Directory GPO Does the product support the creation of single file executa ble exe installer i e for logon scrip
101. es REO Banay ret pe Cem La aid P cogar emm M nar Poi o j s F a mun UD rues 7 Bora bere inte Mara p ki hona leds Mua m Aria Tri NISI Uo lau x Sd Mr Mos b o dud ML bona amo eee d caecum aro fee AM arc omms The user interface is as in the last version exemplary and configuration changes are largely made using convenient drop down menus The installation routine for the Exchange scanner remains unchanged as do the man agement console for mail and spam protection Manufacturer s website The website www avira com is designed in a suitably clear fashion AV comparatives 19 Product Review Corporate Review 2010 The home page gives an overview of current threats and warnings in the support virus lab area You can subscribe to various RSS feeds in order to keep up to date with the latest events There is also a Virus Lab area on the Support page where you can find out about viruses and other types of malware Avira has consolidated the various products into appropriate suites and the licence model is in contrast to the current trend very sim ple The trial versions of the products run for 30 days without any reduction of functionality The installation process This year as previously Avira s installation process stands out due to its simplicity and intuitive nature The manufacturer has evidently reacted to user feedback and produced opti
102. es on the tanget computer Somewhat confused we continue with the installation The next question is another we AV comparatives Product Review Corporate Review 2010 haven t seen before other manufacturers don t find it necessary Trend Micro ScanMail for Microsoft Exchange Setup Please specty the server version to which you want to install ScanMad FB TREND Hub Transport Mailbox Servers Clustered Mailbox Servers Edge Transport Server Raj Now we even have to state what the target server for installation Trend Micro ScanMail for Microsoft Exchange Setup Select Target Server s Please specify the server s to install to FB TREND Computer name Total server count 1 The login credentials for the target server have to be entered Trend Micro ScanMail for Microsoft Exchange Setup Log On Log on to tanget servers fip TREND An administrator account with Exchange Organizational Adminisirator privileges is required 116 WWW av com paratives org Here too we can state the path to the desired installation folder Trend Micro ScanlMail for Microsoft Exchange Setup Please spec y the shared directory and target directory A shared folder on the target server is used to stone suppod files during installation Default path lt Default Program Ales Path s Trend Moro Smer C Specify path C Program Files Tr
103. es org The TREND MICRO product is new to our corpo rate reviews During the tests an update was delivered that is now generally available We were particularly impressed with the manage ment console which manages to make a huge amount of information available to the admin istrator in a clear and simple manner Considering the products reviewed last year it can be seen that the manufacturers have stayed with proven technology The plus points of the previous version have been kept and administrators will immediately find their way around the new software You can find the prices in the feature list However we take the view that price should be a minor consideration and security should always be the top priority A new trend was observed among the manufac turers this year The licence models are becom ing ever more granular rather than simpler and the tendency is towards individual prod ucts rather than pre configured complete packages We do not understand why the man ufacturers are going in this direction as we believe it would be easier for customers to choose all in one packages that give them the protection they need Product Review Corporate Review 2010 For each individual product it can be difficult to decide exactly which version and which features are needed Advice from an expert either a representative of the manufacturers Or an independent IT security consultant is invaluable Unfortuna
104. es uerantine E Use default spam older name C Spec spam folder name A Number of days to keep spam messages day s Trend Micro Sear nl TI Microsoft Exchange Setup Product Activation Activate your product to enable scanning and updates FB TREND You must activate ScanMal lo enable scanning and security updates Feeder Crime T P Cade aaa prod Control Manager Server Seltrgs Seve Address 8 E U BM U U comparatives 117 Product Review Corporate Review 2010 www av comparatives org In this step we can use AD to select d group Trend Micro ScanMail for Microsoft Exchange Se up to manage ScanMail Our Exchange server is now protected by ScanMail Finally the installer has gathered all the neces Sary information Trend Hicro ScanlMail for Microsoft Exchange Setup AV comparatives 118 Product Review Corporate Review 2010 www av comparatives org The ScanMail management Here too the self explanatory descriptions interface used are extremely helpful so it is easy to find and use all the functionality The scope of the functions in ScanMail is very good leaving nothing to be desired AB TO ScanMall tor wicrosott Exchange e A Thus apart from the truly poor installer there im am m E sun is nothing here to criticise Dora A rere Pract Pur C x LEE ee The ScanMail management console uses the same des
105. f the next steps o Esgrotraicon need For BiDatander Maragenmanr Langer Meteo Guilder nat nas Driest paweword nct changed There are ho rra Cee Thara ara 2 unmanaged computers 2 El After successful registration of the manage ment console we proceed to the next stage of initial configuration We start the Network Builder in order to define networks rt WWW av com paratives org Metasrh Bustdes heks visu pbraarese your pee ue ele ierat ers drei sia us DespliDrop from the Detected Meteor Computer litt and tom the Acto Directory Cormpubun lint bo the Managed cr Exchuded compute GL by eilai the EaD ereer digest are ee apa velar Computer ra ec perg Eru Freee Detected Hebeork Computers Acto Derectory Computers Mi doeet TL ht Vr nmt 181 18 TL L a rusas hin DADA Check Fere to pra a race of comgsuters As soon as we Start with the Network Builder the simple handling of the suite is clearly demonstrated and we can make rapid pro gress In order to find the client computers more quickly and get around any network security barriers Network Builder enables us to use Active Directory to choose the clients Network Builder step 1 2 Hebwork Builder helps you ceganize your reetwork inbo manageable computers and groupe rag amp direg from the Detected Network Computers list and ram the Arive Directory Computers iret to Ehe Maraged or
106. g a member of their sales team Some users may regard this as an unnec essary hurdle although it does mean that users will be properly advised before installing the software The installation process The installation is in itself very straightforward and simple Hardly any information needs to be entered Any necessary configuration changes can be made afterwards We suggest that ESET should reconsider the Microsoft Jet Engine as the default database The administrator console The management console is very extensive and offers sometimes an too abundant choice of configuration possibilities for maximum cus tomization Thorough consultation of the manual is indis pensible or has to consult the in product help The icons are arranged so as to enable a good overview The system is well designed and allows individual systems to be found and con figured easily even in extremely big network environments 46 Deployment areas The ESET suite can scale for very large net works Antivirus clients There are no complaints about the client soft ware which is well designed and simple to use Summary The management console takes a lot of time and effort to investigate and understand but compensates for this with an abundance of configuration possibilities The management console shows the status at a glance The Exchange protection is very simple to configure and cannot be faulted All in all the pro
107. g complex AD forests is child s play Of course it s also possible to add computers that are not part of AD For our test we select Import from Active Directory Impo from Active Directory Wizard Import from Active Directory Wizard The wizard helps you to import Active Directory containers and use them as computer groups in Enterprise Console You can set up an Enterprise Console group structure that cor to your Active Directory organizational units or containers When you import the contents of an Active Directory container all chid containers will be imported with their structure preserved To continue cick Next e Bad cancel In the Sophos management console we create a new group called Clients and use it to im port our Client group from AD 92 Import from Active Directory Wizard Choose an Enterprise Console Group Which Enterprise Console group do you want to import from Active Directory to Create Group Loewe Next we look for the AD container with our client PC in Import from Active Directory Wizard 3 xj Choose an Active Directory container Which Active Directory container do you want to import from Enter the container name or select Browse to browse Active Directory Mew gt ae The container structure can be imported here as well making it the quickest and most con venient method of importing groups Import from Active Directory Wizard
108. g the client health check con nects to a network Which enforcement frameworks does the product support Admission Control Cisco Network Access Control comparatives 447 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Sophos Trend Micro Symantec Network Access Control OPSWAT DHCP 802 1X VPN Does the product have inbuilt en forcement capabili ties Host Based Enforce ment Self Enforce ment i e leveraging a desktop firewall to connections CE O E O A O A lS Behaviour detection Bw e o e poe LRL O e NC Is this technology by default ener capabilities Is the firewall state ful for TCP and UDP connections Can the firewall ana lyze VPN traffic Fi Firewall Rules Rules Does the nn come with default policies i BERE Which criteria can be used when defin ing rules AV amparatiwves gt 148 Product Review Corporate Review 2010 www av comparatives org Feature List AVIRA Bitdefender Kaspersky SEI McAfee mE Trend Micro By filenames Ca E cation exe By filenames amp Spe cific Folder Ce Directory applica tion exe By File Fingerprint Hash ro HR Network adapter type Ethernet Wireless VPN Dial up Local Remote Source Destination Remote Host By IP address IP range By MAC address
109. gly believe that in large corpo rate networks the only way to eliminate chaos is through properly designed structure of user groups McAfee McAfee Security as a Service solutions are designed to provide organizations of all sizes from small to large enterprises with a comprehensive set of security prod ucts built on a Soft ware as a Service model This strategy leverages McAfee s core strength in threat prevention our diverse SaaS portfolio and our industry leading global threat intelli gence powered by McAfee Labs Sophos and Sophos products are geared towards supporting businesses Offer Anti virus anti spyware data loss prevention device control application control network access control and encryption through a single product Sim ple to use products with low total cost of ownership Central management of Win dows Mac Linux Unix clients Broadest platform support Direct support 24 7 365 included in license Upgrades and updates are included within the license price no extra charg es Protection pro vided by global integrated So phosLabs 24 7 365 Trend Micro AV comparatives Product Review Corporate Review 2010 WWW av comparatives org Feature list Bitdefender Kaspersky McAfee Pricing Scenario A 5 cli ents server outlook as mail client BitDefender Internet Avira AntiVir Profes Security BitDefend G Data AntiVirus Kaspersky Small sional er Se
110. gure your firewall in order to have access to this port Click Next to continue or Cancel to stop the installation process Like many other management products BitDe fender Security Suite needs a database server running in the background As there is no SQL server in our test network we select the SQL Express option m BitDefender Management Server Setup Ready to Install The Setup Wizard s ready to begin the Custom installation The main element of Management Server is the database that contains all the necessary information Choose the setup type that best suits your needs Install SQL Server Express instals a new instance of Microsoft SOL Server 2005 Express Edition and uses this instance for managing the necessary information Use existing database connects to an existing instance of Microsoft SOL Server 2005 Express Edition and uses this instance for managing the necessary information Click Next to continue or Cancel to stop the installation process ET Tres _ We leave the database login credentials as the defaults 26 WWW av com paratives org The additional software components for SQL Server Express are now shown TA BitDefender Management Server Setup Ready to Install The Setup Wizard is ready to install BitDefender Management Server e The folowing products will be instaled on your computer Microsoft SOL Server 2005 Express Edition Crystal Reports for NET Framewor
111. h outstanding PUA Adware alerts Managed computers with outstanding HIPS SUS alerts Click Finish to dose the wizard and start installation on computers Sid Managed computers with potential policy problems Md Managed computers that differ from policy Loewe Password EI sel out of date computers The Report Manager for example hardly re quires any changes to be made to the standard report When installation has finished we can imme diately see that the policies are being pushed out to the client thus assigning it the config uration settings Report Manager Cenc cite Abert and event history Provides stabstics on alerts and events fro Alert summary Shows a summary of alerts by ilem rame ov Alerts and events by em name Provides stabstics on alerts and events fro Alerts and events by amp me Shows a summary of alerts and events from 5 Alerts and events per locaton Provides stabsbos on alerts and events fro The entire suite follows this principle Func Endant pokey non lt omplance Shaws numbers or percentages of nonam 2 Events by user Shows the number of events generated by n tions are configured using policies which are ee opti iiy distributed to the relevant PCs comparativas 94 Product Review Corporate Review 2010 Here we can select the features to be installed Exchange 2007 protection Again we Start by unpacking the installation Sophos PureMessage
112. have to confirm acceptance of the licence agreement ie ESET Remote Administrator Server Setup End User License Agreement Please read the following license agreement carefully IMPORTANT NOTICE Prior to download installation copy or use please read the below terms of the product application BY DOWNLOAD INSTALLATION COPY OR USE OF THE PRODUCT YOU EXPRESS YOUR CONSENT TO THESE TERMS AND CONDITIONS End User License Agreement for Software Use This agreement on software use the Agreement executed by and between ESET spol sr 0 with its seat at Einsteinova 24 851 01 Bratislava registered in the Commercial Register of the District Court Bratislava I Section Sro Insertion No I accept the terms in the License Agreement C Ido not accept the terms in the License Agreement sue we ow After this we can choose the installation method The Advanced Installation gives the option of Cluster Mode ilz ESET Remote Administrator Server Setup Select type of installation Choose typical recommended or advanced installation Typical Recommended for most users Advanced Fully customized installation coser Mode Instat stan e ree The next step is to locate the licence key file 3 ESET Remote Administrator Server Setup Select license key Choose license key file _ lt oox ees cora AV comparatives Product Review Corporate Review 2010 We now have
113. he next point the script manager is well known in corporate circles and is an essential component of every good security suite apro mm ACTED rwr csi ee Damn Cogen Desciony Pao P ii Current nta scm le B LA Hu i tvs reate new Whil Script di Perra Come a BE ras Create iras WRAL Sorge bichon Da pou ron WI Sarga accord lo your merda Delos acp ali thee WAA polery heted targia As with policies BitDefender provides a very good choice of pre configured templates This comparatives Product Review Corporate Review 2010 makes it very easy to configure the suite ac cording to the requirements of your own net work without needing to consult the manual The template based user interface is also used in the Report Center Again it is an optimal method and enables you to configure the system as you want in minimal time The Activity Log is the logging centre of the suite and very simple logs enable the adminis trator to maintain an overview of the system The Spartan nature of the information recorded in the logs is ideal for quickly checking the main functions of the suite but has the down side that it is only of limited use in trouble shooting procedures where detailed infor mation is needed Sess itss fits Ss All in all the management console is a very successfully designed tool for the central ad ministration of the suite The Dashboard in particular gives a
114. ifferent folder Install G Data AntiVirus ManagementServer to C Program Fikes 086 G DATAN DATA AntiVirus ManagementServer we coma lt Back Now we can decide on the type of server to be installed Compatibility mode for earlier client versions can also be selected here You can see that G Data also allows you to install second ary and local servers to enable easier distribu tion in large networks il G Data AntiVirus ManagementServer InstallShield Wizard X Select server type When installing a subnet server you must enter the name of the main server Server type Install a main server Install a secondary server Install a subnet server Main server name P Activate support for dents Version 8 Select this option if you use G Data AntiVirus dents with the previous version version 8 or older versions in your network cores 50 The next selection also allows for scalability of the security system Settings can be stored in an integrated database an existing SQL server instance or SQL Express The SQL Express op tion states that it is required for large net works which gives inexperienced users a completely false impression If you have a own SQL server there is no need for the Express version you can use your SQL server ny G Data AntiVirus HanagementServer Installshield Wizard Database server Select the database server you want to use Integrated
115. ifications for example the custom er support automatic forwarding of e mails to qualified employ ees Document protection Following categories may for example all outgoing e mails on company related content should be examined A content audit of e mail attachments is also possible if the same mail is delivered several times would it be blocked as spam AV comparatives 167 Product Review Corporate Review 2010 Feature list In which languages are your corporate products available In which languages are your help man uals available AVIRA English German Spanish Russian Italian Server German English Client German Eng lish Spanish Rus sian Italian Bitdefender English German French Spanish Chinese Simplified Japanese Chinese Traditional Brazilian Portuguese English German French Spanish Chinese Simplified Japanese soon to be released Chinese Traditional Brazilian Portuguese ESET Management Server and Console English Japanese Russian French Spanish Polish Chinese Sim plified Chinese Tradi tional Client Bulgarian Simplified and Tradi tional Chinese Croa tian Czech Danish Dutch English Esto nian Finnish French French Canadian German Hungarian Italian Japanese Kazakh Korean Norwegian Polish Portuguese Romani an Russian Slovak German English French Italia
116. ign as that of OfficeScan and so any one familiar with OfficeScan will find their way around easily The detailed summary page of the console is particularly good giving an overview of all important information ETRE ScanMail ia Microsoft Exchange imo El mm Esa meee APC Deia lar brze mmi ESI A ceras Corta A A da ad a um Lal Lts A f it Po rra pm 2 Mir cf ES haria ed LE SEIS 17 SO Lara Ma Lami pei arri Fori Fair DR ar A EE r AV comparatives 119 Product Review Corporate Review 2010 Summary Manufacturer s website The Trend Micro website www trendmicro com is suitably designed and easy to find your way around It conforms to normal Internet standards The site gives information about current threats and contains all the normal antivirus functions An online scanner is also available The installation process The installation of the individual products requires a lot of information to be entered manually Once you have worked your way through the installers for OfficeScan and ScanMail you will find a very useable interface which allows easy configuration 120 WWW av com paratives org The administrator console Despite the fact that the administration inter face of OfficeScan and ScanMail has hardly changed in recent years it remains very prac tical to use It was a very well designed inter face when it came out and proves that some designs a
117. indows Mobile 6 0 Saved po O O O O ET O Windows Mobile 6 0 Porson El Lo FO O EST O O Windows Mobile 6 1 EA E O ae P AV comparatives 181 Product Review Corporate Review 2010 www av comparatives org Trend Micro Bitdefender Bitdefender Bitdefender en IT System Requirements Sophos Sophos Sophos McAfee McAfee McAfee Trend Micro Trend Micro Windows Mobile 6 1 Professional Windows Mobile 6 5 O Symbian 0S 9 0 via plugin Oso via plugin 0S 9 3 EMEND a ee ee ee ee Series 60 E Tt via plugin A Redhat sasse ff Eure AAA Eur AAA uico O 5 tamsa O So ree O O CI IS SUSE A NN RNNN Severe s ER SUSE Linux Enterprise zc 1 1 ES l1 Smena espores o Smo LAA AV AM parati wes 182 Product Review Corporate Review 2010 WWW av comparatives org System Requirements Sophos Sophos Sophos McAfee McAfee McAfee Trend Micro Trend Micro Trend Micro Bitdefender Bitdefender Bitdefender SUSE Linux Enterprise Desktop 10 x 64 Bit SUSE Linux Enterprise Server 10 x 64 Bit DOT Open Enterprise OES 32 Bit Open Enterprise Server OES 64 Bit Open Enterprise Server OES2 32 Bit Open Enterprise Server OES2 64 Bit VMware ts so ESX3 x 1 y ESX 4 x ll ll J 9 NU e FreeBSD OpenBSD TurboLinux AIX HPUX Solaris
118. ing users on the server mm 7 Users in the group Administrator To save the existing users of this group forfuture use dick Export to import users from a previously saved group click Import OK Cancel The configuration options are diverse and comprehensive 33 www av comparatives org Aste dera EA Mio Dor HP Lat Soros Back Lint OF Marc Pian Backen Las E mair nena ers A A pegar mp Hiet Pachange Ser arta gt Sor e Pda ld Mren Tul ll A O E DAA ba paar merear iurat ide Aii e ope eem a Tj dapes P ms F lp Hane ue RR gag y gala aes EP Bos m pra ieee Rp ck RN Tuam Pe alar kis XL qm La preted oped bl iaa ee roin La Ugakale T hark 3 PL Pala kis XL E hada EMT LLL M E a F EA EEC Trag anb r Y pihat p Pp hae Du al o ni Hurts aude Ser For Eaha wena STS Y rm O Pou hs Dui bal ae al area Sena Ta or Excharaja c Virus s pam Kepcri nionmatsoe V frente reales epee ra amd ipae The pai diem cee setae pride recor o fe Beer L urn ar re e ln s Ea rabia Fes raton qma prm do Furio um ades rane Vm euo rium ua Vp Fue mors vmm anx mls dash jum te ee Minis D ol Ps rT ae Pad ae r a PA PE CA ein Pa A PE F res ua qum melee apa DOOR Dont TP ru OAY ub ba oF apum Ti mne hose ma i cmn E Jum Tha Anu eae gal ee AAA PA nach comarca iin nnd try Y ndi otis dicendo ru Ferd pere Due to
119. interface The warning indicators show the administrator immediately which areas need immediate at tention ANE G Dala IFLaibercurity amp drmira rater iG DAT Status ai Curent eta display for G Data Hal gt ecunty Double cdi fef mouse ry io exit the individual furcporn MailSecurity h Process incoming emei Disabled i Virus scan for istoming emad Disabled QM Status AP Process outgoing email Disabled A Virug scan for outgoing amail Disabled D Ogtbrenkthield Enabled AR Anormal upaates G Data Antivirus Client Ab Date of verus signatures 4 20 2010 12 00 d Spam fiber Ersbled Spam QutbreakShield Enabled Is Daa bl ai ots e ie ie is Pe rd in ee of oe praa aed esr preted eral bole dd E a wer To make configuration changes we click on Options The dialog box has tabs to show the different areas starting by default with incom ing security options j x Scan parameters Incoming SMTP Outgoing SMTP Port 25 IPv4 All IP addresses Forwarding fe Use DNS to send emal Fonjand emed to Ihre SM TE gener Protection prior to relaying Orly accept incoming emal from the following domains or addresses OK Cancel The Incoming tab allows groups etc to be imported from Active Directory which is a very useful feature AV comparatives Product Review Corporate Review 2010 57 Product Review Corporate Review 2010 Having configur
120. isable Smat Feedback angtine through Ie product console Your industry optional NotSpectied lt Back New gt Cancel Now we can enter administrator credentials for the OfficeScan management console Trend Micro OfficeScan Administrator Account Password D TREND MICRO CC ETRURIAE console or unloading uninstallng the OfficeScan iant Passwords prevent unauthonzed modihication of Web console settings or removal of the OfficeScan chent Web console password Account root Password instals ined Unfortunately there is no option here to use an existing AD account Next we have to state a source folder from which clients will obtain software update packets 113 www av comparatives org This is followed by the option of installing the Trend Micro client firewall Trend Micro OfficeScan Antivir Features v Enable firewall Back Next gt Next we can decide whether to use the as sessment mode which ascertains whether some potentially unwanted applications are legitimate or not Trend Micro OfficeScan Anti spyware Feature TREND Micro Assessment mode was designed to allow you to first evaluate whether spyware graysare legitimate or not and then take action based on your evaluation A cee Would you loe to enable assessment mode C Yes would like to enable assessment mode for la week s C Ho please do not enable assessment mode
121. it rales Benen rd Biter ji Bap de Dio AL LT Ww Leeporane 5 y ous n Security E BitDefender Management Sarwa e Po a NEM BitDefender Chant Security e a m Brbetender Security for Fla Servers e e e BitDefender Security for Samba e a BitDefender Security lor SharePom DB a BirDelender Security bor Mail Senor e oe MOM BitDefender Security For Exchange oS BirDelender Security for ISA Servers a AV comparatives Product Review Corporate Review 2010 Installation We begin with the installation of the manage ment server which will then be used to install the other components ja BitDefender Management Server Setup Welcome to the Setup Wizard of BitDefender Management Server The Setup Wizard vill install BitDefender Management Server Key benefits Lower costs and workload through the automation of all tasks Improved visib ty through detaded reports and statistics Reduced malware exposure through proactive workstation protecton Click Mext to continue or Cancel to stop the installation We then have to agree to the obligatory licence agreement ia BitDefender Ma nagement Server License Agreement End User License Agreement Please read the following icense agreement carefully License and Warranty IF YOU DO HOT AGREE TO THESE TERMS AND CONDITIONS DO HOT INSTALL THE SOFTWARE BY SELECTING I ACCEPT OR CONTINUE YES OR BY INSTALLING OR USING THE SOFTWARE I
122. it the individual requirements of the organisation s network Deployment Options Pease select the deployment optans General Opbons E Notify user before and after deploying the agent 9 Install agent without user interface E Ping target computers before deployment Enable Retry Deployment for this deployment job By checking this opBon this deployment job will attempt to run again in case it fads The number of attempts and ther schedule are Ehe same for all deployment jobs Click here to edit the global retry deployment options Restart Opbans Donotrestart after the instaliabon is complete Prompts the user for restart if necessary Always restart the computer after installation 30 seconds to wait before reboot Management Server Name or IP address of the Management Server mW Deployment Credken tals You have not configured your credentials Click here to configure them Ma Unmanag Be Exduded Create Group E 3 Policies Assign policy E xj WMI Scripts view policies El gly Reporting Cet amp fd Activity Log We remove our client from the Ungrouped PCs and add it to our new group AV comparatives Product Review Corporate Review 2010 Not Grouped Tha group conta the network computers managed by thet server which have not yet been placed mto a specihic group 1 managed computer Right click on the list header to select
123. iver MEN TREND MICRO PROTECTION kerone proactive protection agamst the latest threats v Enable Trend Micro Smart Feedback recommended When enabled Smart Feedback shares anonymous threal information to Ihe Smart Protection Network for analysis ou can disable Smart Feedback anytime through the product console You industry optional Ts _ ok Tie tens The next step is to choose the security level and IP or hostname of the Control Manager server Select Security Level and Host Address Select eser rt lalala the host address used by the Control Manager communication module Host address information wil be Used Es Lortrol Messager eni lb locate the server Fi TREND ida TREND MICRO Control Manager Security level Host address Median Strong enciyplior C Fully qualified domain name FOON or host name AVCSRV AVCTEST local P address LIEN eek o to We then enter details of the web server used for Trend Micro administration Specify Web Server Information Speciv the host address for the Control Manager server fiy TREND wes Web site information ontrol Manager 9 Web site Default Web Sie IP address 19216823 138 E TCP peut eo SSL Port 443 Web access security level Medium HTTPS primary The SSL Poit is requisite for Medium and High security level l no IP address is assigned in IIS
124. k 2 0 x64 Click Install to begin the installation If you want to review or change any of your installation settings click Back Click Cancel to exit the wizard After the installation of SQL Server Express and its additional components comes the setup of the management server T BitDefender Management Server Setup Installing BitDefender Management Server E LL _ Please wait while the Setup Wizard installs BitDefender Management Server This may taxe several minutes Status After the installation a summary report of the changes made is shown ie BitDefender Management Server Setup Completing the BitDefender Management Server Setup Wizard The following ports have been set pego Como o Prec E 7071 BitDefender Update Server 7074 Please make sure the above ports are not used by any other applications If you have a Firewall active on this computer please configure it to allow access to these ports Chick the Finish button to exit the Setup Wizard AV comparatives Product Review Corporate Review 2010 The Management Interface The first task is to provide authentication cre dentials The standard password has to be used here which requires delving into the user manual unfortunately We confirm the pass word without change and log in to the man agement console for the first time We are initially greeted by a very simple even Spartan dashboard which informs us o
125. ky Security 6 0 for Microsoft Exchange Server 2007 on your computer Click Next to continue or Cancel to exit the Setup Wizard Here we can choose whether to start protec tion immediately after setup completes im Kaspersky Security 6 0 for Microsoft Exchange Server 2007 iz oj xj Anti virus Protection E Anti Virus protection settings id K i End User License Agreement a P ee Ag v Enable anti virus protection immediately after installation Please read the following License Agreement carefully K Standard End User Licence Agreement NOTICE TO ALL USERS CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT AGREEMENT FOR THE LICENCE OF SPECIFIED SOFTWARE SOFTWARE PRODUCED BY KASPERSKY LAB KASPERSKY LAB YOU HAVE PURCHASED THIS SOFTWARE VIA INTERNET BY CLICKING THE ACCEPT BUTTON YOU EITHER AN INDIVIDUAL OR A SINGLE ENTITY MRT EAT TA DL DATTA OY ARTA DE AAA A DADTM Tf E accept the terms of the License Agreement Ege Core a Back Next gt Cancel We were pleased to note that the installer points out that some Microsoft services need There is the choice of Typical or Custom in to be restarted after the installation stallation LI Kaspersky Security 6 0 for Microsoft Exchange Server 2007 iz xj iis Kaspersky Security 6 0 for Microsoft Exchange Server 2007 inl xi Restart services Es Choose Setup Type roe The following services may be restarted d
126. lities for a push installation were already exemplary in last year s version Administrator Account y xj Login __ _______ 5 Please specify the account to be used to access the computers in your network Administrator privileges are required Use the Following account Username Administrator Password Use the server s current account C Use SSH public private key authentication Key file rmi Save FP Save password SSH key for the current session Always save settings except Password 55H key During the installation the hour glass symbol is displayed until the SMC announces that client installation is complete El gig Security Environment The function scope dialog box also remains unchanged AV comparatives Product Review Corporate Review 2010 Install E xj Installation directory LPROGRAMFILES W Components for installation i AntiVir Guard Antivir MadiGuar Antivir Prod amp ckis JAntivir Rootkit Detectior General settings E Program group in the Start mer a Cr eae des Lap icon E Enable Rollback Function IV Restart computer if necessary 7 Inherit configuration Send later Ee Abbrechen On successful completion of the installation the installed product can be seen under the individual client PC 3 dig Security Environment 3 Nee E Avira SMC Agent Avira AntiVir Professional
127. llation of the manage ment server which is then used to install the other products EndpointProtection 49 We were very pleased to see that G Data as one of very few manufacturers produces one installer that will install the whole suite The installation of the management server also includes the AntiVirus Administrator which will be used later to carry out the remote in stallation of the clients G Data EndpointProtection Setup Select the components lo be installed G Dala AntiVirus Management Server The ManagemeniSereer superemes and controls all eor station notebook and Me tener cheris providing them wath virus signature updates The alon includes the G Dala AntiVirus Aderashiator G Date AntiVirus Administrator The Adminithator is the operating software hor the MonagementServer t can be started from any computer in the network G Date AntiVirus Client The cheri solbeste provides virus pictecton for the chents and nuns ManapementServar jobs in the bsckoround valhoul a user mbelace Create bool CD Using the boot CO wizard you can cosale a bootable CD for base virus analysis The curent virus signatures are used for this G Daa AntiVirus WebAdminisirator Weblchunistrator is web based contol solbeans for the MansgementS ercer t can be stated wing a Web browser G Data Foewall sx Close We start at the beginning with the G Data AntiVirus Management Server 2 G Data AntiVirus
128. ly for up to 3500 endpoints 9 7 WWW av com paratives org The remote installation of the clients is in itself extremely simple Unfortunately it is necessary to configure the Windows Firewall on all client PCs to allow the remote installation to work The management console for the Exchange protection is extremely powerful but still very straightforward to use Deployment areas The BitDefender suite is suitable for networks of all sizes including complex environments Antivirus clients The antivirus software for clients is efficient very user friendly and easy to find your way around Once installed clients need virtually no configuration and do not present excessive pop up warnings Summary The entire suite impresses due to its simple installation routine and very convenient user interface Regardless of the size and complexity of your network the BitDefender suite offers you all the features you need The Exchange server protection must be par ticularly praised as it is possible to make very detailed configuration changes without feel ing overwhelmed by the possibilities The user interface is so simple that a manual is more or less redundant In conclusion the suite can be recommended to everybody AV comparatives Product Review Corporate Review 2010 www av comparatives org Pros Cons Rapid client installation Limited filtering options Simple and clear management console No re
129. mal solutions to the small problems that spoiled last year s product The installation wizard makes in unnecessary to consult the manual during installation The user friendly nature of the product means that it can be deployed quickly and easily without having to learn how to use it and the basic configuration is very simple Administrator Console The Administrator Console is due to its MMC compatibility clearly laid out and easy to un derstand It can be said that after the installation only organisational work remains to be done www av comparatives org In particular the opportunity to create one s own security structure is especially impressive We very much liked the possibility to import inventory lists for large networks this is very simple to do and saves a great deal of config uration If you use an Active Directory you can also import your AD directory directly into the security environment and synchronize it auto matically We have also noticed that the suite now offers a number of features that simplify its use in larger network environments The remote installation of clients is particular ly simple You only need to configure the login account to be used for the installation and choose a package to install No other prepara tion is necessary Unfortunately you do need to configure the Windows firewall on the client PCs in order to perform the remote installa tion A note from the manufacturers
130. n m ares AA kesri degns mi iac Rosana bum vum hani raa ced a eed ncm ri jha imina pr simsa Pm Agri ran fa de ds zampe QU Rma Ale ee SIE Cari mma mam Lied oo s lees uum aJ nilh imgsl a413 84 Alma feces preme t Tina ar Coen ema ct a eet MENT Wa 0 Tat mdi od pru e wid ui Lx Lud E ete uie Duro D I See pe be See i ia The OfficeScan console impressed us with its clear structures and self explanatory menus Chant Marne B eee El ee E BE MEE AE Trs a ii k WWW av com paratives org Exchange 2007 protection We begin the installation of Trend Micro ScanMail Trend Micro ScanMail for Microsoft Exchange Setup f TREND Welcome to Trend Micro ScanMail for Microsoft Exchange Setup Setup will instal or uninstall Scan Mad an your computer s Click Ment to continue or Cancel to ex WARNING This program is protected by copyright Trend Micro ScanMail for Microsoft Exchange Setup Please read the following icense agreement carefully Pa IMPORTANT READ CAREFULLY USE OF TREND MICRO SOFTWARE AND SERVICES BY BUSINESS AND OTHER ENTITIES IS SUBJECT TO THE FOLLOWING LEGAL TERMS AND CONDITIONS Trend Micro License Agreement Trial and Paid Use License accept the tems in the license agreement C do not accept the tems in the license agreement WARNING Installation will close all Microsoft Management Consol
131. n Span ish Russian Brazili an Turkish Polish Japanese Slovenian Spanish Swedish Turkish Ukrainian German English French Italian Span ish Russian Brazili an Turkish Polish Japanese All languages in which the products are available 168 www av comparatives org Kaspersky O E o E E O KAV for Windows Workstations KAV for Windows Servers 12 languages Eng lish Russian Estoni an French German Italian Japanese Polish Portuguese Portuguese Brazil Spanish Turkish Kaspersky Administra tion Kit 7 languages English Russian French German Spanish Polish Italian KAV for Windows Workstations KAV for Windows Servers 10 languages Eng lish Russian French German Italian Japanese Polish Portuguese Spanish Kaspersky Administra tion Kit 7 languages English Russian French German Italian Japanese Spanish McAfee English Danish German French Chinese Simplified or Traditional Dutch Hebrew Italian Japanese Korean Portuguese Brazilian or Iberian Spanish Russian Finnish Norwegian Swedish and Turkish English Spanish French Italian Ger man Chinese Japa nese English Danish German French Chinese Simplified or Traditional Dutch Hebrew Italian Japanese Korean Portuguese Brazilian or Iberian Spanish Russian Finnish Norwegian Swedish and Turkish English Spanish
132. n Kit Destination Folder Select folder where Setup wil install files Setup vl install Kaspersky Administration Fit ta the following folder To install bo this folder click Next To install to a different folder click Browse and select Back The next step is to choose the features we want to install Select Features 1 Choose the features Setup vell install Select the features you want to install and clear the features you do not want to install E Network Agent Kaspersky Lab Cisco NAC Posture Validation O SNMP agent 0 Mobde devices support Kaspersky Lab System Health Vabdator je Kaspersky Administration Console requires an installed Microsoft SQL Server MySQL or SQL Express Spacerequredon C 112028 K Space avaiable on C 20305184 E We particularly liked the next step which asks us to choose the expected size of the network Un fortunately there is no information as to how each of these options will be configured Product Review Corporate Review 2010 Kas persky ministration Kit Hetwork Size Select network size Select the approximate number of computers that you are planning to manage This information wil be used fot configunng Kaspersky Administrabon Ki You be able to edit settings later From 1 to 100 computers in the network C From 100 to 1000 computers in the network C More than 1000 computers in the network In the next step we can choose the user ac count for
133. n Setup program You are about to begin installing OfficeScan Please make sure you have Intemet connection to successfully complete the installation process Chek Nert to contmus or Cancel to ext WARNING This program is protected by copynght Llaves and ntemational besbes There s the usual licence agreement to accept Software License Agreement License Agreement Please read the following license agreement carefully By TREND IMPORTANT READ CAREFULLY USE OF TREND MICRO SOFTWARE AND SERVICES BY BUSINESS AND OTHER ENTITIES IS SUBJECT TO THE FOLLOWING LEGAL TERMS AND CONDITIONS Trend Micro License Agreement Trial and Paid Use License Enterprise and SMB Software and Senices Personal Use License Trend Micro Emal Encryption Cheni Date Februar 2009 English Multi country 1 Scope This Agreement applies to all Trend Micro software Software services sold as standalone products Standalone Services and service components of Software Service Components sold to small and medium business SMB and large enterprises v accept the tems of the license agreement C da not accept the terms of the licenze agreement nstalishield Back Next gt Next we can choose between a local installa tion and remote installation to one or more different computers Trend Micro OfficeScan Installation Destination val install upgrade the OfficeScan server On this compuber C Tao a
134. n excellent overview of the remaining tasks and little time is needed for the initial configuration 30 www av comparatives org Exchange 2007 Protection In order to demonstrate the second means of installation we also set up the Exchange Pro tection using the standalone installer To begin with the installer unpacks the instal lation files into a temporary folder and then displays the first page of the setup wizard Welcome to the BitDefender Security for Windows Servers Setup Wizard BitDefender Security for Windows Servers secures business servers File Mad Exchange ISA and SharePoint against the sophisticated threats of newly emerging malware and against attempts to steal confidential and valuable data Click Next to continue or Cancel to stop the installation End User License Agreement Please read the following license agreement carefully End User Software License Agreement IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO HOT INSTALL THE SOFIWARE BY SELECTING I ACCEPT OR CONIINUE YES OR BY INSIALLING OR USING IHE SOFIWARE IN ANY WAY YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT These Terms cover BicDefender Corporate Solutions E and Services for Companies licensed to you v Iaccept the terms in the License Agreement lt Back wet ce The screenshot below shows the choice of in stallation o
135. n quarantined and can download the files from the clients for further inspection delete them or restore them The list view with tabs at the bottom of the window for the individual areas is a good solu tion ama le the grid you can see Dema to shem sos HE cora 1m j ars Durmia Er pet hare AV comparatives Product Review Corporate Review 2010 tems todos 200 1 and ifi 1n r Cent Mare Li w o0 w rari ESET Remote Administrator Consola Leg jr Log Ever Log arii rmm iE om rire tiia ezo nm Lem bursa 4 The variety of functions is strength of the suite It offers very detailed configuration options and can thus cope with complex de mands Aside from clients on Windows based systems the console allows management and configuration of clients running product for Mac OS X servers running ESET Mail File Gateway security solutions or even mobile clients ESET Mobile Security for Win dows Mobile Symbian In other words it is possible to manage configure and update all ESET security solutions from a single console OS tetas Search EJE Server E BI Actes Drectory Search x E AYCTEST local FAL custom Ee apa Hide Selected Cris EY ERA Cens Hide Unselected Cell FAG hechos Search Manage Paduages Upgrade Clent Dieerostics of Push Installation Export to Folder or Lagan Script Set Default Logon for E mad
136. ne Jet Database is select ed by default as the database If you want to use an SQL server this has to be configured manually with the help of the manual Product Review Corporate Review 2010 The management interface defined at group creation The Active Directory Import Wizard is very helpful here ESET Remote Administrator Console x i i axi E Static Groups Parametic Groups Active Directory Synchronization O Note You are connected to trial version of ESET Remote Yeu can sel up tha Active radary synchronization on the Administrator Server Support provided for a limited number of server The synchronization may take few minutes A workstations 2 only Pameten By default two clients can be managed using ESET Remote Administrator If you import a test license obtained from ESET you will be able to manage as many clients as the license permits Once we have accepted the message the ERA console opens Pis daba in in pane The console needs a good deal of getting used to but offers the users a wide variety of op tions Studying the manual is unavoidable There is a help option within the product quick start guide and user manual for full fea ture explanation Our first task is to configure the security struc ture and the clients To do this we click on the Group Manager button on the taskbar and create the desired group s Aside from creating the security structure dynamic g
137. ng system lan guage Does the product provide preconfigured exclusions Microsoft Exchange Exchange 5 5 Exchange 2000 Exchange 2003 Exchange 2007 Exchange 2010 Network shares Is scanning of net work shares disabled by default Can a user or admin istrator scan network shares after entering a password Does the product scan processes in memory for malware Can the administrator define exceptions i e which processes to ignore comparatives 135 Product Review Corporate Review 2010 www av comparatives org McAfee Sophos Trend Micro following applica Thunderbird Email Messages rr tions po bolo boe BENE Sa XI Microsoft Windows Live Mail Does the product scan existing email in the Microsoft Outlook Microsoft Outlook VS Express Microsoft Windows ui A The Bat Feature list AVIRA Bitdefender ESET G Data Kaspersky Boot sectors message stores of the Does the product scan incoming and outgoing emails and attachments in the following protocols SMTP POP3 IMAP Archives chived installers how deep at on de Does the product protect itself against Zip of Death and similar attacks By limiting the recur sion depth E U1 100 unlimited AV comparatives 136 Product Review Corporate Review 2010 www av comparatives org Feature List AVIR
138. nother hurdle to get over The Control Manager cannot be installed on a server that is acting as a domain control ler Thus we decided to install the Control Manager on a client PC with Windows 7 in order to simulate an administration computer that is used to manage the Trend Micro security envi ronment We begin with the installation of the Trend Micro management console Installing Control Manager 5 5 requires Visual C 2005 SP 1 Redustributable Package Installing Visual C 2005 SP1 Redustributable Package may cause the system to reboot If the system reboots please restart Control Manager installation Click Yes to install Visual C 2005 SP 1Redustributable Package ve J The message above informs us that additional software packets are necessary and will be installed AV comparatives Product Review Corporate Review 2010 www av comparatives org There is also a message to let us know that The next step is the investigation of the envi installation will require Microsoft s IIS service ronment and a report on this is displayed to be restarted Check Local System Environment Question e A Installation of Control Manager 5 5 requires restarting your IIS y server Restarting your IIS server can result in some applications restarting Click YES to continue Control Manager installation Les Ab meno Local system environment analysis result TREND MICRO Control Manager
139. ns of finding out all important information about the system It is also very practical that the Exchange pro tection has been installed at the same time and everything can be controlled using the Orchestrator McAfee has definitely created one of the best all in one management con soles here AV comparatives Product Review Corporate Review 2010 Summary Manufacturer s website The McAfee website www mcafee com conforms to normal Internet design standards Unfortunately it is very easy to get lost on the website due to the confusing mass of different products For a corporate user it is practically impossible to find clear information about the available suites You are simply overwhelmed with information and cannot get any sort of overview This should be improved by McAfee as soon as possible either by simplifying their product line or finding a way of presenting their products more clearly The installation process When you have eventually managed to find the right suite you can look forward to a very easy installation The fact that the management console Ex change protection and intrusion prevention system are installed together by one setup program saves a great deal of time and effort Other manufacturers should see this as an ex ample and follow suit Too many suites come in the form of separate products with separate installers The administrator console The ePolicy Orchestra
140. nwanted unwanted recipients recipients recipients e g competitors Analysis of images on undesirable content e g pornography Using current spam pattern for the fast detection of new spammer tricks comparatives 159 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Trend Micro User Specific Man agement of White and blacklists on the server solely for effective blocking unwanted e mails Definition of trans mitter receiver channels on a dedi cated e mail commu nications Freely editable exclu sion list for addresses and content in sub ject and message text Flexible notifications of blocked e mails directly or schedule to administration or transmitter receiver email User specific access to e mails in the quarantine Centralized quaran tine management Formation of compa ny specific e mail categories Only for addresses Automatic classifica tion of e mails to one or more categories AV comparatives 160 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro Response Manage ment through defined classifications for example the custom er support automatic forwarding of e mails to qualified employ ees Document protection Following categories may for example all outgoing e mails on company related conten
141. ny pore imi Cbena Is Here again Trend Micro sticks with a familiar and proven interface ip OfficeScan See eee Ce rat a RB dl e A ARAN Re RE Razr Pipas OT pde A A tes de il a rues es Seg a T Eo Abe ee codo ld rr Alem lr teres VERA Bap pi quand BEN e quim i e e bees rn Miter teete i el MN ILE T Metered ome aud AR Cosemans fram mat cg ieee ba EE _ o a o E dam Tue ES Te A toe d LI n Tu accum Dom E Ern ill pitino Min I pa d Laid rarae aria Ha CO at VENTE t ui To protect a computer with OfficeScan we go to Networked Computers Client Installation Remote To select a client we have to enter the appropriate login credentials AV comparatives 114 Product Review Corporate Review 2010 Next we are informed that Remote Installation will not work with Windows XP Home or Vista Basic But these OS s lack of an enterprise networking stack prevents deployment using remote deployment There are other methods to deploy the software login script MSI packager exe web install etc Dm AR mainima Pere Ste A Iir A x There are various methods of installing the client software There is the choice of remote installation via the OfficeScan console send ing an email with a link to the installation files or using a login script Once the software has been installed the cli ent can be managed using the management console ferm Officesca
142. of the product To obtain a serial number please visit bo regeter the Registration Key that came in the software package E A A a Kv bos below and AV comparatives 108 Product Review Corporate Review 2010 After this we can choose the individual func tions of ServerProtect Select Components j E J xj Select the components that you want to instak gt ServerProtect Server and destination folder v Install server as a ServerProtect Information Server Waning An Information Server needs a Nomal Server to protect itself from infection v Install server as a ServerProtect Normal Server MAVCSRVACI S ATrendiSProlect Browse pene toca adis coin kie m v Install Management Console to local machine CA NTtend V SProtect Browse cwe Next we enter credentials of an administrator account to be used to manage ServerProtect Next we enter the Information Server pass word and the domain Input Logon Information Te AOA e O Seni you must enter the administrator account information of the target server ServerProtect yall run as this administrator account for network connection purposes Logon Information SserverProtect Setup Setup Type Sect the setup hype that best suts pour needs Select the program folder type that you want Personal program folder Common program folder Instat eld WWW av com paratives org The next point conc
143. ofessional 64 Bit Intel Media Center Media Center 2004 Media Center 2005 Tablet PC Edition Management Console Protection Management Management Client Server Console Em G Protection Management Client Server Untested Untested Untested Untested Untested Untested AV comparatives 1140 Product Review Corporate Review 2010 www av comparatives org System Requirements AVIRA AVIRA AVIRA ESET ESET ESET G Data G Data G Data Kaspersky Kaspersky Kaspersky Embedded Oooo MME le Windows Server 2003 _ oe c Standard EE Wl wl EE eee Enterprise 32 Cit MI 0 E Enterprise 64 Cit MI O O w 0 a e Data Center 32 Bit MEME Untested Untested Untested i o gt Data Center 64 Bit O Untested Untested Untestcd IM O 05 O 5 Small Business Server i A D Storage Server ENNIUS 59DmD 4 J Web Edition EE I B VF R2 Standard 32 Bit MI 2 ol c c DNE _R2 Enterprise 32 Bit _ t t NL e R2 Standard 64 Bit MS A t lA QNNM R2 Enterprise 64 Dit eo a A YyrZGGALUOLLu E uceeAL Windows Vista Home Basic 32 Bit_ ME t t JN 9 Home Basic 64 Bit e Home Premium 32 Bit HomePremum 4Bit 1 Business 32 Bit Pe Business 64 Bit E EIA bs AA Se ae Ss Ec Windows 7 7 Starter Edition Home Premium
144. omponent 2 8 C3 Microsoft NET Framework 2 0 Press Next in order bo shart the instalation Aesan of computer may be needed dung the installabon process Kaspersky Adminictralion KA installation wil continue after completing this Operation We now just need to choose the authentication method Kaspersky Administration Kit SQL Authentication Mode Choose Authentication Mode Choose the sulhenticati n mode vou want lo use for connection bo Microsoft SOL Server Il you select SOL Server Authentication you are prompted to enter the account and the passveord Microsoft Windows Authentication Mode SOL Server Authentication Mode User name SF Password YAA Confirm password o lt Back Ned Cancel Product Review Corporate Review 2010 Kaspersky uses a network share to distribute installation packets and updates You can choose between using an existing share and creating a new one Kaspersky Administration Kit Administration Server Properties Set Server shared folder Sa ses i re eae EEEE applications Create the folder on the curent machine or select the existing shar network resource Create new shared folder C Program Files B5 NK aspersky Lab Katpersky Administation KRAS Browse Shared folder name KLSHARE C Select existing shared folder An Administration Server port also needs to be defined Kaspersky Administration Kit Administration Server Propertie
145. orate Review 2010 Status windows can only be described as Spar tan Install G Data Client xj Installation on AYVCCLIENT The installation was successfully performed However the client installation completes very quickly and easily and in just a few moments the remote client is installed All further work can be carried out using the G Data Administrator be it generating reports with various criteria or changing client set tings An obvious plus point is that there is a preconfigured button for each standard action so there is no need to go searching through menus It is very convenient to be able to install the AV client software on the server itself using the Administrator It is exactly the same as installing the software on a client alt Ple Clients Vew Glerdectings Settings 7 AO ie 9 a Susu Takes Serm Glens PoicyMsnager Feet pm 4 Entre network SP B vencen mgl are ee ooh ich 3 E Compute Enpre A Enane B Database G Data Cent werden Lest mcer llosa ANA 19 13007 AD 19 55 AUI 12 9 10 7 1 107 4422 2010 2 14 2010 1 es n eae Exchange 2007 protection We start with the installation of Mail Security Here again it is pleasing to see one installer for all the mail products Installing G Data Mail Security also installs the Administrator alt hough the latter can also be installed sepa rately G Data MailSecurity setup Select the components to be installed G
146. orporate user which products to choose Having eventually reached the download area for the trial versions you are faced with a huge variety of products There is a filter func tion but the labelling of the filter options is just as mysterious as the naming of the prod ucts Registration is necessary to obtain a trial key This is valid for 30 days which is sufficient time to test the selected product thoroughly When we reviewed the beta release of McAfee s ePolicy Orchestrator management server we were pleased to see it bypasses this web site complexity ePO provides a Software Manager screen that presents the user a list of available evaluation and licensed software for download directly into the management server Product installation We begin the installation of the Total Protec tion Suite for Endpoint The first task is to confirm that additional software packets should be installed McAfee ePolicy Orchestrator 4 5 0 l x Setup needs to install additional software on your system Do you want to continue CDe we We confirm this installation We note that McAfee is one of very few manufacturers to demand a restart of the server after installing the C Redistributable Package McAfee ePolicy Orchestrator 4 5 0 x p The Microsoft Visual C Redistributable Package requires a reboot to update system files Please reboot this computer and run setup exe again Now the installation proper can
147. processes application and services a registry access rule applies amparatives 140 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET cess Rules Does the product allow monitoring and preventing access to specific files and folders G Data Kaspersky McAfee Trend Micro Does the product allow to de fine exclude for which process a file folder access rule applies Which selection criteria does the product provide to specify files and folders By Name By Filenames file txt regardless of folder or location By Filenames amp Spe cific Folder c MDirectory file txt By Filename and Windows Folder i e System32 hosts Using wildcards i e Using regular expres sions Limit by Location i e local drive CD USB Stick only if mounted as a removable drive removable drive Any Local Hard Drive Any CD DVD Drive AV comparatives AAT Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro Any Network Drive ES AS O O Any removable media omy ON STE ns USB firewire removable drive Does the product allow monitoring and preventing launching processes Does the product allow monitoring and preventing terminat ing processes Does the product allow to de fine exclude for which processes a pro
148. ptions As we have already installed the file server protection using the manage ment console we will deactivate this option in our installation AV comparatives Product Review Corporate Review 2010 is BitDefender Security for Windows Servers Setup Custom Setup Select the way you want features to be installed X gt BitDefender Security for Mail Servers x BitDefender Security for Sharepoint Is a data security solution dedicated to Windows based servers that offers world class Browse protection from viruses riskware and rootkits Installation location C Program Files BitDefender The next step is to choose the number of scanning processes The installer informs us that up to 24 instances can be selected but recommends 4 the minimum number for our own network 5 BitDefender Security for Windows Servers Setup Ready to Install The Setup Wizard is ready to begin the instalation pm M BitDefender Security for Windows Servers detected that the optimal number of the BitDefender scanning process instances for your system configuration is 4 It is recommended for you to keep the default configuration However if you wish to change it please enter a number between 4 and 24 below Number of scanning instances a Click Next to continue or Cancel to stop the installation e aa www av comparatives org In the next step you can decide whether to send repor
149. r tually redundant AV comparatives Product Review Corporate Review 2010 Pros Cons Rapid client installation Few filtering options Simple administration console No real time status Simple remote installation Misleading annotation in the database set Quick and easy installation up section Excellent Exchange protection Deployment areas Small Networks 0 50 Users Medium Networks 50 500 Users Large Networks 500 Users oo A Ak oo x KA KA Summary Installation Wizard Administrator console MS Active Directory Support Remote Installation abi Product Review Corporate Review 2010 KASPERSKY Kaspersky Product Review Corporate Review 2010 Installation procedure Downloading the product All the products can be downloaded in fully functioning versions from the manufacturer s website It is easy to find the products and the website design is simple and clear The trial versions of the software run for 30 days which is adequate time to carry out com prehensive tests It is necessary to register to obtain a trial licence Unfortunately Kaspersky conforms to the gen eral rule whereby there is no single installer for the whole suite This does however give you the opportunity to choose the individual products suitable for your own network We note that Kaspersky also produce security software for Linux networks There is a clear and simple diagram of the diff
150. r elect pos reir be reta De piahi AntiVir gis wwe sets The product is then installed on the marked computer s The completion status is also displayed very clearly Awra Sonali ess Sate i on kya tion Wierd fea fiis Servet 10 endows EM The produel sl be rahakad on blog computers Ww ust ull all oce hare Gor lo on enxd AntiVir E iE m sstrecion Once the whole installation process is finished we get a final summary listing the computers with their installed products that are now managed within the security environment Once the configuration wizard is finished we can start the Security Management Center www av comparatives org SMC and log on with the credentials used during the server installation fo aira tamaine sie all MA File Amos View Windee He slit i tab fim iM rr E dura Sali canas Scit zm a Ms a ees ee ree rid Avie Scary Flansgemrent Croesi rer renter x t Carrier perve Shey etal mache ot ot inch maint ri Pat ober brid Cirat iue loge eerste Pacman I Local Computer remate camp ft a Techy Erergeenent E enema reto al prir Reporter Ens Dimri Upa Flare At first glance not much has changed from previous versions so experienced Avira users will feel at home Thanks to the new installer it is no longer necessary to register the licence at this stage as it has already been done using the setup wizard Software packets have
151. r you you can use this advanced menu to find all available settings The choice of a simple or an advanced inter face is very convenient and makes it easy for less experienced users to configure the Ex change protection AV comparatives Product Review Corporate Review 2010 ena ated agate Update a Toda x Leer terete To enter the licence key we click on Miscella neous and then License As soon as we have entered a valid licence we can see that the status indicators in the Mail Security window have all turned to green Liber interfppe Li Tap Bepe ESET Mail Security 4 For Microsoft Exchange Server Protection stabus wd ees Maximum protection Watch actretty Ssiritirn Antriras prabecton Q Computer HAN Ant pywine pretertsenm af Anirpam protec s Lipdate M Humber of blocked miiia gt Setup Wersi n cf rut tignatuty databate 5140 2010003 a Toot o Heip and pupport Most users will be happy with the Standard view although the Advanced view is useful for Ue anyone needing to set up very complex config urations all kim iiertaces prup Toons epe UN d ESET Mail Securitv 4 For Micr soft Exchange Server Probebon cats ed Watch activity Watch acia aber miy pemanas X Q Computer wan Fle nyt aetivity graph um igual P Setup i 7 Help and poppor A mm T d lll Ronin of read data daro cedo imaad cf writers daa Pratection stat
152. rat complete its task McAfee ePolicy Orchestrator installs hield wizard Complete The Invita heeld Wired has suocerdluly called Motlee ePobey Dechais Chick Fett to tool the rzad Yen want to views the erdia fle Ye i want to launch M cfe ePolcp Orchesbator maw McAlee iPoley Orchlestrator 4 5 0 Patel McAfee ePolicy ONE rator Staal Copping Files Feeney salir balote copying Ies Setup has enough infomation to thst coping the program files SRE NE CT OED chick Back i geni are panied vath the velint chek Hei in begn copying Cunen Seinge AV comparatives 80 Product Review Corporate Review 2010 e F ePolicy Orcbevtrator 45 0 tek B55 Windows Intemet Explorer E iE The management interface erea Welcome Welcome After starting the ePolicy Orchestrator we are M en Th dekssan greeted by the login site of the web applica es ero Server a pn aa ti O n 1 Add Systems E ME TE 5 A ambar af c Ss E I ae a ey O ya chee pradpct E EEA Vr B Hi Sit i Ji 1 AE Endmini Taalk Hk E real aai pu 4 PYT T warp PEER FIT zu Ay TA d plar T Tr plata rra FT r r nf WI dosumintacion im swailatla zn tha eo knr EAT Winder Self fermita click Product Documentaten hia a v rd Than cocida b Sacre Product descriptions The first step is to create groups for network The first step is to authenticate yourself organisation and assign client PCs to these The s
153. re so effective that they do not need to be changed Deployment areas The Trend Micro suite is equally suited to both small and large networks Antivirus clients The OfficeScan client is certainly one of the simplest clients on the market It runs unno ticed on the client PC and with a well configured OfficeScan console no intervention is required Summary Trend Micro is a suite that fits the require ments of both large and small networks After a somewhat more demanding installation the administrator can expect a proven interface with a functional design The Control Manager can be customised easily to your own require ments AV comparatives Product Review Corporate Review 2010 www av comparatives org Pros Cons Proven interface for OfficeScan and ScanMail Long irritating installation Management console High degree of manual input required Functional web interface Deployment areas Small Networks 0 50 Users Medium Networks 50 500 Users Large Networks 500 Users KA Ak XA Ak KK AA Ak Summary AV comparatives 121 Product Review Corporate Review 2010 WWW av comparatives org Feature List AV comparatives 122 Product Review Corporate Review 2010 Bitdefender Feature list Recommended Prod uct for BitDefender Internet Security Avira AntiVir Profes sional up to 5 Clients 1 Server ESET Smart Security Business Edition ESET
154. recommended Which database is Microsoft included i e Mi Access jet eroso suk Sybase dense SQL Express SQL Express Microsoft SQL MySQL etc engine Which additional databases are support ed Microsoft SQL Server Microsoft SQL Server DRM BEEN DE LI BEEN pe 2000 Microsoft SQL Server 2005 mw a 2008 mec MEN 0 o 2008 R2 A comparatives Does the product require a database E 178 Product Review Corporate Review 2010 www av comparatives org System Requirements AVIRA AVIRA AVIRA ESET ESET ESET G Data G Data G Data Kaspersky Kaspersky Kaspersky MS Access Other any ODBC MySQL Oracle SQL Azure SQL Azure database Email Server Microsoft Exchange A C MOI AAA Domino Jc V E S y e Tobi A BM Linux o E wc NEN n A d c Novell Netware Server IE BUS DuvNsS MEME _ Kerio System Requirements Part 2 Protection Client Management Management Protection Management Management Protection Management Management Protection Server Console Client Server Console Client Server Console Client j i I l i ll i i Management Server Management Console Supported Operating System Requirements Sophos Sophos Sophos McAfee McAfee McAfee Trend Micro Trend Micro Trend Micro Bitdefender Bitdefender Bitdefender
155. redigiely gn deemed Component Calera E Panera files Cleanup templates Alis pam rules Engines Weiran Plug Programa t Product programs and midget pool Doentoad scElings hemme Hairy fie yi thee dceeLpad a baibain mr Peral Lid Aubomaler deploy ueliinga The update settings can be configured down to the last detail and the Control Manager is well AV comparatives Product Review Corporate Review 2010 suited to even complex network environments in this respect We were impressed to see that there is an indi vidual control with which you can precisely con trol how specific updates can be distributed The Administration area is responsible for the management of the Management Console itself You can add new Control Manager users or change settings for existing ones There is a convenient choice of using Trend Micro s inter nal user management or adding a user from Active Directory Active Directory user User name Domain Command Tracking can also be found in this area This gives an overview of which actions were carried out by which user at what time These functions in the Administration area are well thought out and make the Control Manag er suitable for use in large networks which have their own security teams The clear and simple web interface and clear structure mean that Control Manager is able to display a huge amount of data in a compre hensible manner We now move on to
156. rmation is logged Time of change The administrator who performed the action The action that was performed Device Control Does the product allow administrators to limit the use of external devices USB sticks printers etc Can the product identify devices by Device 1D Manufacturer ID Unique ID Can you exclude e g printer USB Ports from being scanned Can you lock DVD Floppy external media USB Block AV amparatives 155 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Trend Micro All ports and all WiFi IR Bluetooth removable media can Modems Firewire be locked but it s SATA PCMCIA other possible to add ex webcams Blueray CD Unen network resources ceptions for any crypted Encrypted individual ports or USB devices Network media bridging N IPS Can the product prevent computers from receiving Net BIOS traffic originat ing from a different subnet Prevent MAC spoofing by allowing incoming and outgoing ARP traffic only if ARP request was made to that specific host Does the product detect and prevent denial of service attacks Does the product provide a signature based network intru sion prevention sys tems Can a customer create tures include attack facing signatures include vulnerability facing signatures omparatives 156 Product Review Corporate Review
157. rosoft Windows programs before running this Selup program To continue click Next There is the usual licence agreement to accept DTTITCTCUDIA x License Agreement Please read the following License Agreement carefully KASPERSKY LAB END USER LICENSE AGREEMENT Kaspersky Lab ZAC is an owner of all nghts whether exclus or othenvice to ation Kat the Software BY CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW U CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS REEMENT SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE ere Te He ARE BECOMING 4 PARTY TO THIS REEMENT AND AGREE THIS AGREEMENT IS ENFORCEABLE LIKE ANY ITTEN NEGOTIATED AGREEMENT SIGNED BY YOU IF YOU DO NOT AGREE D T e i Cs eee EAEE nET o enoa a the setup wil close To install the application you must accept this Ems The next point allows us to choose between Standard and Custom installation To get an idea of the options available we select Custom 64 Kaspersky Administration Kit Select Installation Type Select necessary metalation type Select installation type most rrp eM un A features and modify configuration Standard recommended Standard installation is recommended for beginners Custom Custom metalation amp recommended for advanced users Back Next gt NN Now we have to choose the installation folder Kaspersky Administratio
158. roups can be created clients become members of these groups based on meeting certain criteria the synchronization type is AD groups synchronize all existing AD synchronized groups and ther chid groups will be deleted Otharmss new groups and chents in groups wil be added wide the existing ones wil be More information To make the software packets ready for a push installation we first have to create them or download them from the manufacturers web site with the help of a wizard Connected Avcsrv ESET Remote Administrator Console Set Default Logon for E mail and Logon Script Installations Properties F3 BEET IDEE mil LLL T e Hia ressalt ee ela EP PA de XR LL DER LN PLE mar Pe di Pi AA el ee onn FEET Smari hes uriy 4 Bere ide ree d fender E Wiese A elie ab 2 288 Pl Emad Geared imss ld rel fh Sindee Wale So EP pona een T ren DES s FEET Bersani A ri amas abide Fs ress d ELI CIE lm tic ll aT If the relevant MSI files for client installation are already available on the network these can naturally be used to form the installation packets AV comparatives dos Product Review Corporate Review 2010 Now we can distribute ESET Smart Security the client software to the clients The Remote Installation tab allows you to select the client machines to be installed Computers Logon Set
159. routine Please remember that you need a special license file if you want to install a full version of the product You can easily order a full version license at any time in our online shop ye a LJ ul ut e dar x e E For secunty reasons please make sure that the program archive that you are about to decompress is an onginal Avira file Copyright D 2010 Avira GmbH All rights reserved X Avira SmallBusiness Suite AntiVir Extrachmg cebup ira Extactng AntiVir Secun Management Cenber Frontend en exe Extactmg AntiVir Secunly Management Center Server en exe Extacting avwa animu exchange Jk 32b ese Exhactmg gwra anis exchange 2k bdbiexe MORE THAN SECURITY Once the installation files have been unpacked into a temporary folder we are greeted by the Welcome page of the installer Avira Smalli amp usiness Suite Installshield Wizard XI 3 LEN ie spel E ie T i zs Welcome to the InstallShield Wizard for Avira Smallfusiness Suite da lo le A Ss The InistalS haeld f Wizard vell install Avia SmalBusmesz Suite on your computer To continue cick Next wwWw avira com amp hAntiVir AV comparatives Product Review Corporate Review 2010 Next comes the obligatory licence agreement D Avira mallBusiness Suite Installshield Wizard The licence key file obtained at registration then needs to be located Select Licente Key Pase pai Pade key fil
160. s 50 500 Users Large Networks 500 Users KKKK KKKKK KK AA k Summary Installation Wizard User Navigation Administrator Console Default Values Database Support Remote Installation Website Manual AV comparatives 101 Product Review Corporate Review 2010 www av comparatives org TREND MICRO Securing Your Web World Trend Micro Product Review Corporate Review 2010 Installation process Downloading the product The manufacturers website offers everything you would expect from a commercial website and it is easy to find what you re looking for Unfortunately Trend Micro has adopted the practice of offering suites consisting of indi vidual products without offering an installer that will install them all in the nght order Download times SPNT58_en_repack1 zip 234 MB 05 36min 534kb sec OSCE 10 WIN ServicePack1 SinglePackage R4 en 481 MB 07 17min 489kb sec SMEX10 0 GM Build1412 R2 280 MB 04 4min 544kb sec TMCM5O GM repack2 zip 550 MB 08 10min 772kb sec 103 WWW av com paratives org Product installation Until recently only Version 5 Repack 2 was available which would only work with Win dows Server 2003 or earlier During our tests Trend Micro brought out Re pack 3 which also supports Windows Server 2008 A few days later version 5 5 of the Con trol Manager was released which we then used for our review Even then there was a
161. s Set Server posts Define the A drministrabon Server port The value must he in the range of 1 55535 Port number i4000 Define Administration Server 55L poit The value must he in the range of 1 65535 SSL port number 13000 NN The method of name resolution for the server can also be set Kaspersky Administration Kit Administration Server Properties Set Administration Server Address Set the Administralion Server address as one of the following variants amp DNS name It is used if DNS server is present and client computers can get server address via it b Nabis name lt is used if client computers can get address via Netbios server or if a WINS server E present c IP address It is used only if the server has static IP address which vall not be changed in the future Admirustrabon Server address AVLSRV T Back Next gt 66 The installer now has enough information to begin the setup process It must be noted here that the installation must be carried out using the main Administrator account any other user account even with administrator privileg es will not work We feel that the wizard should notify the user of this at the start Kaspersky Administration Kit Start Copying Files Review settings before copying files Setup has enough infotmaion to start coping the program files IE you want bo review or change any selime chck Back f you ate satehied wih the settings cick Nex
162. s anti spam updates from the Sophos website m User name Now we can choose a database for the storage of quarantined items and other data Sophos PureMessage InstallShield Wizard PureMessage Database Settings Select the database for storing quarantined items reporting data and PureMezsage settings Local C Remote If this option it selected then setup vil install the Microsoft SOL Express 2008 database Back Cancel If there is no SQL Express server available this can be automatically installed too Alternative ly a connection can be made to an existing SQL server The next step is to enter details of the service account to be used to run PureMessage Create Account El Enter the credentials of the account to be used for the PureMessage services Upe nane AVCTESTNSopho zPureless age Pleare supply a password that meets the system s complexity requiements as defined in securty policy Passed ese Confirm password C 9 m Here we can create a configuration group for PureMessage Sophos PureMessage InstallShield Wizard PureMessage Configuration Group Choose a PureMezsage configuration group This server needs to be added to a new or existing PureMessage configuration group Please enter the name of the group below PureMessage configuration yon PureMessage Server Group Sophos PureMessage InstallShield Wizard Pure
163. s PureMessage InstallShield Wizard InstallShield Wizard Complete Setup has finished installing Sophos PureMessage on your computer AV comparativas Product Review Corporate Review 2010 The management interface of Pure Mes It is the clearly ordered and professional de sage sign that makes working with the console a pleasure The management console for Sophos s mail protection is also very well designed and pro fessional Encore Qatar amd Lll dama prin A seers mai ed ir p mre uu eer im ee SS AA EN i D i less A EA is Jo oar re pee o O e The wide variety of functions can be clearly be _ _ _ _ _ _ _ _ ES seen and leaves nothing to be desired The MMC compatible format provides a clear functional structure with a good summary page Even the real time summary display called Activity monitor is a feast for the eyes p be 457101 dA ee an AV comparatives 98 Product Review Corporate Review 2010 The Exchange Server protection thus fits very well with the positive impression created by the entire suite With the Exchange Server protection too So phos comes up trumps with outstanding AD support Active Directory PureMessage can use Microsoft Active Directory to map message policies to Iuarantine specific users or groups and for recipient
164. se agreement comparatives Product Review Corporate Review 2010 The next step is to choose the installation folder 2 G Data MailSecurity InstallShield Wizard Destination Folder Click Mext to install to this folder or click Change to install to a different folder Install G Data MaiSecurity to C Program Files x86 G DATA G DATA MailSecurityl d ma me cm Of course a database will be necessary for statistics and reports in the background Once again there is a choice of using an existing SQL Server instance or installing SQL Express This time the misleading message about using SQL Express for large networks has gone ie G Data MailSecurity InstallShield Wizard Email statistics Statistical assessment of email traffic G Data MalSecurity provides a statistical assessment of your email traffic You need an SQL database for this feature C Disable statistical assessment Use an existing Instance of Microsoft SQL Server for the statistical assessment Install Microsoft SQL Express for the statistical assessment lt Back The installer now has all the information it needs to begin 55 if G Data MailSecurity Installshield Wizard Ready to Install the Program The wizard is ready to begin instalation Click Install to begin the installation If you want to review or change any of your installation settings dick Back Click Cancel to AAA PETG lt Back instal
165. specified value comparatives 145 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender Kaspersky Is higher lower than specified value How can conditions be combined If Then Else Logical AND OR Can the checks in teract with the end user McAfee Sophos Trend Micro Notify end user i e that an operation will take some time to complete e g by an assessment Query end user Does to product provide preconfig ured conditions rus Check Check Management Check Standard and Expert configuration Remediation AntiSpyware Does the product provide remediation capabilities Which remediation action can be de fined in the user interface without resorting to scripts Registry remediation MESS z comparatives 146 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro File remediation Delete files folders Download files Run application in user system security context security context tem security context tion Download software and patches Virtual Patching provided via the Alert user when OS is not up to date patched Intrusion Defense Firewall Install uninstall software and patches in user system security context Can the product prevent that a client failin
166. stalled on any PC on the network and serves as the interface for the Remote Administrator Server which we have already installed This distinction is not very clear to the new user without reading the manual i E ESET Remote Administrator Console Setup ESET Remote Administrator Welcome to ESET Remote Administrator Console 4 0 122 0 Setup Wizard The Setup Wizard vell install ESET Remote Administrator Console on your computer Chick Next to continue or Cancel to exit the Setup Wizard There is another licence agreement to accept AV comparatives 38 Product Review Corporate Review 2010 ie ESET Remote Administrator Console Setup End User License Agreement Please read the following loense agreement carefully IMPORTANT NOTICE Prior to download installation copy or use please read the a below terms of the product application BY DOWNLOAD INSTALLATION COPY OR USE OF THE PRODUCT YOU EXPRESS YOUR CONSENT TO THESE TERMS AND CONDITIONS End User License Agreement for Software Usa This agreement on software use the Agreement executed by and between ESET spol sr o with its seat at Einsteinova 24 851 01 Bratislava registered in the Comercial Register of the District Court Bratislava L Section Sro Insertion Mo accept the terms in the License Agreement C donot accept the terms in the License Agreement m Ces coma Again there is a choice of
167. t e e ntepise 4Dt MH OO NEUSS Ultimate 32 Bit_ MEME 3 MIU e Ultimate 64 Bit NNNM o LO MM A Windows 7 Starter Edition a NUUS w 2Q amparatives 180 Product Review Corporate Review 2010 WWW av comparatives org System Requirements Sophos Sophos Sophos McAfee McAfee McAfee Trend Micro Trend Micro Trend Micro Bitdefender Bitdefender Bitdefender Home Premium 32 Bit Home Premium 64 Bit Professional 32 Bit Professional 64 Bit Ultimate Enterprise 32 Bit Ultimate Enterprise 64 Bit Windows Server 2008 Standard 32 Bit mlmcc le i SE N OO O O MA OO Installation Standard 64 Bit MI C C UON p e nene O 0 M Installation Enterprise 32 B6 OOO 0 MUS O Enterprise 64 Bit MI DU U 1 ovevcepo E O O NENNEN OO 0 Standard Enterprise Data Center 32 Bit ME O J MA Data Center 64 Bit MI O 11g Web Edition 32 Bit lh Web Edition 64 Bit i IU e Foundation 32 Bit MEME TUTTI I Foundation 64 Bit MEME 9 A HPC32Bit ___ Dn k 0d O Hector ee Windows Mobile Windows Mobile 5 0 mener c d lI l1 BERI o Windows Mobile 5 0 i pace qol j ll in P W
168. t Server within a defined network C Master this type of server will only manage other servers within a multi server C Slave 8 server managed by a master server Click Next to continue or Cancel to stop the installation process me gt coma The next step is decisive for the communica tion of the individual components The ports used by the suite can be configured to suit your own network environment AV comparatives Product Review Corporate Review 2010 fis BitDetender Management Server Setup Ready bo Install The Setup Wizard amp ready to begin the Custom installation SS The setup requires the following port informabon recommended ports 1 65535 7073 a communication port between a master and a Slave server Server port Agent port 7072 4 communication port whereby the agents connect to the server Console port 7071 a communication port whereby the console connects to the server Please configure your firewall in order to have access to these ports Click Next to continue or Cancel to stop the installation process Back Even the port used to provide updates can be selected E s BitDe fender aL 31 agement Server Setup Ready to Install The Setup Wizard is ready to begin the Custom instalation EE u Please configure BitDefender Update Server port recommended ports 1 65535 Update Server part 7074 Please confi
169. t bo begin copying files Program Files x85 VK aspersko Lab Kaspessky Administration Kiti Posa Files x85 Common FilestKaspersky Lab Back Once the installation is complete we can open the administration console The management interface First use of the admin console conveniently starts a configuration wizard D vs pretation states Dl tat sota ie Getting started LAG AV comparalives Product Review Corporate Review 2010 The first step is to select a licence file Quick Start Wizard 4 E x License Choose how you want to add your license C Enter activation code Load from key file Add license later Quick Start Wizard Choose key file Iv Automateally deploy kcense to managed computers Next the installer carries out a thorough scan of the network Quick Start Wizard Network Discovery Initial network discovery is complete By clicking on View discovered computers you can see the client PCs that have been dis covered EE Discovered computers c UE aged computers tj AVCSRV fa Unassigned computers El a AVCTEST AVCCLIENT Next we can configure the notifications for the mail server Quick Start Wizard Notifications femen e SMTP server o SMTP server port e x Use ESMTP authorization Userr Password 7A Canfrm password TS We then see a summary of the completed tasks AA
170. t is the selection of options for the client installation We particularly liked the option for Active Directory integration Deployment Wizard i Settings Deployment task settings Ei v Using Network Agent Pv Using Microsoft Windows resources from shared folder fv Do not install application it is already installed Assign Network Agent installation in the Active Directory group policies eek me coa mo Now we have to select a licence for the client installations Deployment Wizard xj Select the kense r 2 4 Select one of the available licenses or add a new one using the Add button Kaspersky provide an exemplary choice of ac tions to be carried out on client computers when a restart is necessary Deployment Wizard Select one of the options to restart computer Select an action that will be performed f the application installation requires the operating system restait C De not restart the computer C Restart the Computer wil be restarted automatically Prompt user for action User will be prompted to restart computer Prompt wil appear every 5 minutes Computer wil be restarted after 30 minutes Modify Force closing the applications in blocked sessions lt Back Net gt Cancel Help The installer can be configured to remove any incompatible applications such as other anti virus or firewall programs Deployment Wizard I X Incompatible applications Removing
171. t should be examined A content audit of e mail attachments is also possible if the same mail is delivered several times would it be blocked as spam Feature overview Messaging General Linux General Linux General Linux General Linux General Linux LT T General Linux General Linux General Linux Linux Special product for Linux mail servers Includes Anti Spam web administration interface Manageable from the central ent Complete defense against spam phish ing malware and data leakage Modules and func tional areas Gateway Solution Malware detection Recursive scan of all e mails and file at tachments in real time event and time controlled AV amparatives 164 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Information Store scans on every server Support of automatic virus pattern updates Scanning of e mail message text and attachments Detecting file at tachments by means of clear non manipulable file patterns finger prints or by file type detects and blocks even manipu lated files Definition of file limitations by a combination of file name file extension and file size Application of the restrictions on file archives such as zip rar Automatic detection of new mailboxes Examination of en crypted e
172. t should be examined A content audit of e mail attachments is also possible if the same mail is delivered several times would it be blocked as spam Pisa General Windows General Windows General Windows General Windows General Windows General Windows General Windows General Windows tional areas Recursive scan of all e mails and file at tachments in real time event and time controlled EE with most Windows mail servers is possible through the command line scanner Complete defense against spam phish ing malware and data leakage Modules and func Gateway Solution Information Store scan on every server AV amparatives 161 Product Review Corporate Review 2010 www av comparatives org Feature list Bitdefender Kaspersky McAfee Support of automatic virus pattern updates Scanning of e mail message text and attachments Detecting file at tachments by means of clear non manipulable file patterns or by file type detects and blocks even manipu lated files Definition of file limitations by a combination of file name file extension and file size Application of the restrictions on file archives such as zip rar Automatic detection of new mailboxes Examination of en crypted e mails for viruses in combina tion with Crypt Scanning of existing mailboxes Anti Spam scan according to the company s policies on prohibit
173. tandard password has to be entered here which can only be found by reading the hand book We confirm without changing the password and log in to the management console for the first time k i amp ystem Tree il Wasgps gee op ees GM poir adem eh Syatema e Detected System has a very pleasing graphic design m gq See The management interface of the Orchestrator a a Tag Catalog r eee ard eee Gee t2 ee pour Hara al Sete bami or cere E cbr By clicking on System Tree we can begin creat ing our security structure McAfee is entering new territory here by offer ing the user an interactive tour of the suite in order to learn how to use it and what the next steps will be AV comparatives 81 Product Review Corporate Review 2010 How Lo al aeilaermrii ua agence and edd patea ce the ceres graup Sarvar Suk agents and plasegyirbsma in the Career Tres according ts doring enter Rud svete tz Era currant wrgug era but da net gunht gusta Crearte and deenlood agent incio gackaga lapor ayatams fam mar Fla into tha cambar greup Server but de not purih pamti Gyrrbimi bo add Sagarata dy vta AAA mith comma sppcesi and er rie linki ANOS El act TS z hidli izad A B ree ae Fibra Tres toi E Besable System Tree Bering om phapa py bm When the computer has been added into the mee a group there is a variety of actions which can Having created two groups for the s
174. tected comparatives 138 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Trend Micro The action and cur rent status of the infection i e cleaned deleted quarantined still infected The current location of the infected file i e local quarantine The scan that detect ed the infection i e On Access Manual Start up etc End user Interaction Let the end user choose the action Notify the end user By displaying a pop up or balloon Can the notifications be customized By adding a warning to an infected email body or subject email fected attachment be customized cation after detection Can a second or alternative action be defined i e if the first action fails Which file specific actions can the product perform comparatives 139 Product Review Corporate Review 2010 www av comparatives org Feature list Bitdefender Kaspersky McAfee Can the product create a backup of the file before at tempting to clean it local system Quarantine in a cen tral location i e management server quarantine server etc Access Scans Which processes specific actions can the product perform Terminate the process Registry Access Rules Does the product allow monitoring and preventing access to registry keys and values Does the product allow to de fine exclude for which
175. tely none of the manufacturers has made any progress with the development of real time reporting In all cases the software still leaves the administrator in the dark as to the progress of individual actions www av comparatives org It must be noted that there are still major differences between the suites in terms of functionality ease of use and installation It is therefore particularly important when purchas ing corporate security suites to consider the particular requirements of one s own network and staff However all the products in this review are sufficiently well designed and effec tive in protecting the network that they can be recommended without reservation We are happy to report that all products reviewed in this report received the AV Comparatives Seal of Approval The products performed well in their primary functions as it can be expected from established business security products IT Administrators may find some products fit their needs better than other products because they address a specific set of feature they are looking for APPROVED Corporate Product comparatives Product Review Corporate Review 2010 WWW av comparatives org Synoptic Table We present here an overview of the products which can be used to help make your decision Please try the products on your own system before making a purchase decision based on this review All vendors offer trial versions of their products and have
176. terms in the License Agreement eme mm ie ESET Mail Security Setup Installation mode Installation mode selection If you wish to reinstall the program preserving the current settings leave this check box To reinstall the program and adjust the settings uncheck the check box and select one of the installation modes instatation mode Typical recommended best settings custom tees Far more aid coroada ce cmm We have already entered all the information nec essary for the installer to begin AV comparatives Product Review Corporate Review 2010 E ESET Mail Security Setup Ready to Install The Setup Wizard is ready to begin installation VA a Click Install to begin the instalation od gel cg atl teak ead Back Chick Cancel to Setup is now complete and we can take a look at the configuration 7 ESET Mail Security Setup E xj ESET Mail Security 4 Completing the ESET Mail Fa Ds J Y LL E V Security Setup Wizard For Micresoft Exchange Server Click the Finish button to exit the Setup Wizard The Exchange 2007 management interface Starting the management console also opens the Help window for the initial configuration ESET h rit roges oss Change bareti Post Installation 5 Configuration H Protechen Miri Ar i B hamum p Thera me neral ophone that has do ba mun wd after tha podaci nidad tiig ESET
177. tests and review AVIRA www avira com Bitdefender www bitdefender com ESET www eset com G DATA www gdata de Kaspersky www kaspersky com McAfee www mcafee com Sophos www sophos com Trend Micro www trendmicro com Sbitdefender AVIRA GDATA eT KASPERSKY 2 Y McAfee a soPHos MEN Securing Your Web World Product Review Corporate Review 2010 WWW av comparatives org Spam Test Product Review Corporate Review 2010 WWW av comparatives org Results Spam Test Detected Spam gt 9h i Results Ham Test Very positive is the fact that none of the tested products classified any wanted mail Ham Mail of our Ham test set as SPAM The spam filters can be set at different levels the administrator has to find the best selection for his her own network Whitelisting and blacklisting are also possible 1 Kaspersky We have been asked to review the Kaspersky Security 8 for Exchange Server Release Candidate which will be available end of November 2010 TrendMicro If you use the MS Exchange Server direct as an MX you can use Scan Mail for Exchange or Worry Free Business Security if you use MS Exchange Server with a pop connector you should use Worry Free Business Security because Scanmail without ip reputation service would lead to significant lower spam detection IU Product Review Corporate Review 2010 www av comparatives org Product Review Section The products are reviewed in
178. the Management Board of AV Comparatives e V prior to their publication AV Comparatives e V and its appointed representatives carrying out the tests cannot be held liable for any damage or loss which might occur as a result of or in connection with the use of the information provided in this document We have taken every possible care to ensure the correctness of the basic data but no liability can be taken for the correct ness of the test results by any representative of AV Comparatives e V We do not give any guarantee for the correctness completeness or suitability for a specific purpose of any of the infor mation content provided at any given time No one else involved in creating producing or delivering test results shall be liable for any indirect special or consequential damage or loss of profits arising out of or related to the use or inability to use the services provided by the website test documents or any related data AV Comparatives e V is a registered Austrian non profit organization AV Comparatives e V October 2010 185
179. the Options dialog box which we have already seen Thus the whole configura tion interface of the G Data suite is very much self explanatory and the user can immediately find all necessary functions Filter spam Keywords subject Keywords email text Content filter Advanced settings Fiter Whitelist Blackist Realtime blackists V Use spam filter Cancel Apply Hep All the features one could want are present and so MailSecurity contributes to our overall very positive impression of the suite AV comparatives Product Review Corporate Review 2010 Summary Manufacturer s website The G Data website www gdata com is well designed and easy to find your way around being compatible with current standards The site offers everything that you would ex pect from an antivirus manufacturer There is information about current threats and a virus encyclopaedia The business section is appro priate to the needs of business users G Data makes it clear on the website that the suite is aimed primarily at medium sized busi nesses The installation process As with the version we tested last year the installation of the G Data suite is made very pleasant by the simple and intuitive user inter face which could be used even by inexperi enced users without any need to consult the manual The manufacturers have remained true to their philosophy of simple installation making this
180. the installation of the server protection software ServerProtect Anyone who has worked with Trend Micro cor porate products in recent years will find the installation process of the current version very straightforward as the layout has remained the same for the last 5 years WWW av com paratives org We begin with the installation of ServerPro tect ServerProtect Setup Welcome to the InstallShield Wizard for ServeciProlect v5 80 The InstallShield Wizard will mall ServerProtect v5 80 on your computer To continue click Next There is the usual licence agreement to accept serverProtect Setup License Agreement Please tead the following boense agreement careful Pu d Press the PAGE DOWN key lo see the resi of the agreement s Trend Micro licenses as products wordeade in accordance vath certain temi de and conditions By the seal on the CD jacket in the Software package or thet pou accepted may vary Use of the Software shall be deemed ta confirm nou agreement ta the terms and conditions of the onginal T rend Micro license agreement pou accepted Trend Micro License Agreement Do you accept all the terms of the preceding License Agreement If you select No the setup wil close To install ServerFrotect v5 80 you must accept this agreement lei peel Back ve we We then enter the registration data User Information i rou wal need a se al number to enable the full version
181. tings We choose the PCs we want and click on Push Installation A Eenmaa Avo 154 1 emote Administrator Console 1 L A P j SNE k TT M Ea H a 0 CCC CSCS ER We then need to enter the login details for these machines The next stage is to choose the package to be installed AV comparatives Ads Product Review Corporate Review 2010 tal Package Settings ESET Security Products package ESET Smat Security Name The installation can be carried out immediate ly or scheduled for a later time 2 Task Settinos As with almost all other suites there is no real time status but by clicking on Task De tails in the context menu and then Re fresh the degree of progress can be seen zii xi m er OSName Dae State StateTet Di Ho b AVCSRV AVC 18sec In Progr ESET Instaleris insta alles L9 ew After a short wait we are informed that instal lation is complete The push installation without interaction im proves the user friendliness of the software As in our test last year we found the filtering and organisational options very comprehensive and good With ERA 4 ESET has also added a centralized view of the quarantine on the cli ents i e files that are in quarantine remain on the clients but the administrator has a cen tralized view of what has bee
182. to this effect giving details of the relevant ports would be helpful here What is particularly helpful for your every day work with the system is that whenever you add a computer to the security environment you can define that it automatically gets an Avira security product installed What is also worth mentioning is the active reporting on errors and other security relevant issues by so called filtering groups that show clients that in one way or another need the attention of the administrator If you want to use your own SSL certificates you can generate deploy and use those certif icates with Avira s SmallBusiness Suite There is a convenient solution for licence ad ministration which is easy to configure 20 AV comparatives Product Review Corporate Review 2010 Deployment areas The Avira suite is ideally suited to small and medium sized business There have also been notable improvements for complex networks and enterprise environments It is possible to live without some other features that would be valuable in an enterprise environment given the extreme ease of installation and configura tion In the SMB field Avira remains a top player Antivirus Clients The message pop ups are pleasantly discreet After installation has completed the initial update must be started manually unfortunate ly The client software is otherwise clearly laid out and gives a good overview of the state of th
183. tor is currently one of the best and most powerful management consoles on the market 84 After just a short familiarisation period the user can carry out the most complex tasks easily The enormous functionality and organisational opportunities mean that the Orchestrator is very suitable for large and complex networks Deployment areas In short all networks Antivirus clients The client software is very user friendly and easy to find your way around with no obvious flaws Summary After the initial confusion on the website you will be very pleasantly surprised by the suite Installation is very simple The management console provides trend setting solutions in several areas and the degree of functionality is impressive Whether you need to protect a small network or a huge domain the McAfee suite will be ideally suited for all requirements AV comparatives Product Review Corporate Review 2010 Pros Cons Qutstanding administration console Very confusing website Simple configuration Very good grouping functions Quick and easy installation Deployment areas Small Networks 0 50 Users X ooo x Summary Installation Wizard User Navigation Administrator Console Default Values MS Active Directory Support Database Support Remote Installation Website Manual Medium Networks 50 500 Users Large Networks 500 Users KKKKK KK AA A x x 85 AV
184. trator account after enter Depends on Windows Security Policy ing a password multi ple times prevent brute force attack comparatives 125 Product Review Corporate Review 2010 www av comparatives org Feature list Bitdefender Kaspersky McAfee Sophos Trend Micro Log out administrator if idle for a specified time Communication thenticate the server thenticate the client Is the communication between the client and the server en crypted Depends on Windows Security Policy Does the product support a pull com munication mode Can the communica tion interval be modi fied What is the recom mended communica tion interval Does the product support a push com munication mode Does the product protect itself from being tampered with by the end user or malicious software Real Time Real Time Prevent files and folders from being modified or deleted Prevent product registry entries from being modified or deleted Pws S comparatives 126 Product Review Corporate Review 2010 www av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Can a proxy server be specified For HTTP For FIP Does the product support proxy server authentications Master Slave Server e O Multiple AV Servers rs Master server controls slave server in differ ent offices Slave server for dis tributing updates Slave servers can be Not
185. trator access to the suite ns Sophos Lc Console 4 5 0 Installshield Wizard Redi nnly Demain Controllers Sophos offers a service that sends information on installation and operation of the system to them in order to improve support Again we advise careful consideration as to whether to use this service in high security environments ie Sophos Enterprise Console 4 5 0 InstallShield Wizard If you agree pi le cal pericial pal wil show the number of managed and unmanaged computers on your network as well as anat bolt oer quisas wid Saline podra he rey ne Sophos will use your Sophos download username and or contact email address to provide a better support service and to increase our understanding of how you use our products The reports wil not identify individuals or specific computers Sophos will not use the reports to identify your company unless you provide us with your Sophos download username and or a contact email If you decide at any time that you want to stop sending reports you can do so by changing v Lagree Installed couse ms cmm The installer has now gathered sufficient in formation to proceed With the Complete in stallation SQL Server Express is installed ie Sophes Enterprise Console 4 5 0 Installshield Wizard Click Install to begin the installation If you want to review or change any of your installation settings click Back Click Cancel to NOTE A new SQL S
186. ts or CD distribution Which options can be set for the client installation in the user interface comparatives 128 Product Review Corporate Review 2010 www av comparatives org Feature list Bitdefender Kaspersky McAfee Does the product allow the administra tor to define the installation options i e silent interac tive installation folder etc in the user interface Which installation types can be defined in the user inter face Silent Installation no user interface is Unattended installa tion the end user sees the progress of the installation but can not modify the Interactive Installa tion user chosen the Can the installation folder be specified in the user interface Can the administrator define whether the program is added to the Start Menu Define if user is e NET OT powe Virtually all options define what modules l E i of the client can be Other installation to install or ena E Modules specified as a param options ble disable restart e eter of the push options scan before l E installation install set adminis trative password comparatives 129 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender ESET G Data Kaspersky McAfee Sophos Trend Micro Is the system Multi system Multi tenancy capable host multiple customers on the same infrastruc ture but separating the data Does the produ
187. ts to BitDefender This option should be deselected for high security envi ronments i BitDefender Security for Windows Servers Setup Ready to Install The Setup Wizard is ready to begin the instala tion ULL 2 BitDefender Security for Windows Servers contains an incident management module that allows for the creation of incident reports during product misfunctions By agreeing to send the incident reports to the BitDefender Lab you agree to help us in finding quick fixes Your contribution could be essential for developing a stable product that satisfies your needs The incident reports will be used for debugging purposes only and will never be used as commercial data or disclosed to the third parties V Iagree to submit incident reports to the BitDefender Lab Specify an e mail address that wil be used as the sender of the incident reports Chick Next to continue or Cancel to stop the installation lt Back Next gt Cancel At the start of the process we chose to install the Exchange scanner so now we are asked about the role of the Exchange Server i BitDefender Security for Windows Servers Setup Ready to Install The Setup Wizard is ready to begin the instalabon BitDefender detected the following roles on your Exchange Server and will install by default on all of them If you don t want to install BitDefender on certain roles you have to uncheck the corresponding checkboxes If you want to
188. uer ES a e Total Pu Peewee a gu f LAIT RAM B Kris Cream faizi mes Tarral Seber lie ero i Threat Gertie tier Belts dom 08m Three O ri E pees Tyee C Thren Tice oe Type LI ati Fire Perera WWW av com paratives org The Control Manager is very well designed and the clearly structured web interface makes it easy to find your way around We are pleased to note that the information is presented in a clear and comprehensible way allowing the user to keep an overview In the Dashboard category under the Threat Statistics tab information about the threats found on the network is displayed The Compliance tab shows relevant system infor mation that can be used to check if the con figuration complies with internal IT audit re quirements A very convenient feature is the ability to cre ate your own tabs which can be customised to display the information most important to you New Tab x Title Page 5 Layout a To Such a simple method of customising the tabs would not be out of place on some websites Ae Control Manager Ter ver s AAA i T 4 _ bainan teas Moras jla Euros manaaacasi en F p Cascading Fae EERIL Pod IERI AV comparatives 106 Product Review Corporate Review 2010 Under the Products category you can find installation packets and products which can be installed or distributed around the network
189. upcoming add on will DA from the central RATIS A blocking Url filtering management server Don yp Supports 64 bit Ex l change Malware detection Recursive scan of all e mails and file at tachments in real time event and time controlled scans on every server virus pattern updates Scanning of e mail message text and attachments Detecting file at tachments by means of clear non manipulable file patterns or by file type detects and blocks even manipu lated files AV amparatives 158 Product Review Corporate Review 2010 WWW av comparatives org Feature list AVIRA Bitdefender Kaspersky McAfee Trend Micro Definition of file limitations by a combination of file name file extension and file size Application of the restrictions on file only by file extension and by time such as Zip Automatic detection of new mailboxes Optionally possible Examination of en through integration crypted e mails for with email encryption viruses in combina server or as part of tion with Crypt upcoming on box encryption capability Scanning of existing a Anti Anti Spam R scan according to the company s policies on prohibited not desir able or confidential content Blocking unwanted e mail senders spam YES to blocking un YES to blocking un senders mailing lists wanted senders NO wanted senders NO etc as well as to to blocking unwanted to blocking u
190. uring installabon y Choose the setup type that suits your needs best T lttention The following services and all depending services will be restarted Typical during Kaspersky Security 6 0 for Microsoft Exchange Server installation lor deinstallation Installs the most common program features Recommended for most users Microsoft Exchange Information Store service deinstallation only Microsoft Exchange Transport Service if transport interceptor installed only Custom Allows users to choose which program features will be installed and LL NER NIT NEUE ED UE sj where they wil be installed Recommended for advanced users gek wet _ cancel Cancel Dm The installer now has enough information to The installer points out that additional param begin eters can be configured in the next stages AV comparatives ru ES Product Review Corporate Review 2010 The Exchange 2007 interface ir Kaspersky Security 6 0 for Microsoft Exchange Server xia Additional configuration is complete oy The additonal configuration of the application is complete E A The MMC compatible management console for the Exchange protection is very clear The additional configuration of Kaspersky Security 6 0 for Microsoft Exchange Server 2007 is complete To proceed press Next ilz Kaspersky Security 6 0 for Microsoft Exchange Server 2007 5 xj Application installation yr LA SEn een 1
191. us Watch actraty Vl Statistics S abistics antivirus and antispyware protection Satie Q Computer scan ta Update N Setup E Tools x Help and support Antivirus and antispyware statistics graph 8 17 2010 1 06 08 PM Bl Humber of infected chpects 00000 5 E Humber of cleaned objects 0 0 00 EB Humber of clean ebpects 239 100 00 Se Total 239 100 00 5 Scanmed object C Windows INTO edb chk Reset KA Protection status Q Computer scan ga Update A setup a Tools e Tools Log files Last record 8 17 2010 1 06 38 PM Events Quarantine Number of quarantined objects 0 Scheduler Number of scheduled tasks 6 inspector Log files Number of computer status snapshots 0 Quarantine Scheduler Submit file for analysis Sysinspector B Create rescue CD o Help and support Anyone who knows their way around the ESET Smart Security Client will feel at home with the interface of Mail Security Configuration can be carried out quickly and easily AV comparatives Product Review Corporate Review 2010 Manufacturer s website The website www eset com is suitably clear and simple and conforms to current standards The site gives basic information about ESET products and there is an online scanner avail able to download ESET is one of very few manufacturers to limit the functionality of their test software Addi tionally it is only possible to obtain a test li cence by contactin
192. validation foire AVCTESTbcad tt S Port feo Base DN for users andgroups DC AVCTEST 0C4ocal Name attribute hane Email attribute a Email alias attribute optional oxyAddresses ititit S Description attribute optional description y D ber mone peg Me Ciper ar cee peel a Range kempu i H ts tangia BE basmi paris a g e oe E a 8 1 Leer visite lid ETA 7 Synchronize with Active Directory v A i C Periodically every f hours The configuration possibilities with conven ient drop down menus work very well 2 ii Hd e alti e fic Got AnA j re 1 Anti virus M corri a alata gaa b amm AV comparativas 99 Product Review Corporate Review 2010 Summary Manufacturer s website The Sophos website www sophos com is pleasantly designed clear and conforms to current standards If you want to find out more about Network Access Control the Sophos website is an ideal starting point There is a lot of well presented information on the subject with appropriate references to suitable products The installation procedure The installation is quick and easy as is to be expected from Sophos A basic understanding of network security is desirable but the in staller leads you through the process well The single installer for the majority of the products is to be commended The Active Directory support is also outst
193. ves org Avra nehne as itr Londfiuracin Wirard Meteo ced ra T ha ranted arora of boro la c rnpulers bc ane rect cad aged The computa pau a ed othe cu li Add anar torpulers Por ca DA birahi dera een mui a ji R n I Ir eran ae eec mae alan the secunky errorem Check sfm ursi acci H pou Cans iens dall osempulers eth then ociet ocrebras acieanash aire wan iio n ie pen Pd wal or e re Charge Phe account dali as nesded by ckckrg tur eceei perds lid and gest li das n I ir PP oA AAA AR DAR VMTEST WMTEST Dial nc bue Fira devra C BIG HE EGM OvwuTEST VHIEST Ore Pe T BRL ELL xz AVAANHWARDBIG AMRAH SAREIHG Windows XP ob arken SUI Senet b UTC C CARL CARL D erer h vrreem e Pil Irre Stren rir E CAENTT CASA TT O HOSCHI HOCH ue Aiara E Pa FSE O Fil Foie ire imho UM C BiH Wo CHI Beast Cust TT inre drra LEY LENA r Lou LHJ Lior LT F Lum LT ore E oun LTI C H ODIKKEH MECHICIEN Mier MESS Y Run RUFUS F TED TED F rrDASD TED Cana AAN 5 Cea t Tuiki Abbrecken e Zurick atime 5 If the check was negative for certain comput ers the account data can be corrected on the spot Next the marked computers are added to the security environment There is also a feature which allows additional clients not found automatically to be manu ally added to the list of machines to be in ite Sones eee sra R MET Adding comgadere lo tecordy en
194. vispeaeni pou stalled The ability to name them individually PE EC MC cell 7 ur is particularly useful Next we can choose a user account for adding the marked computers to the managed security environment This is an ideal solution for larg er networks where there is a system adminis trator who looks after security issues Tonia acera wee user POCOS A emm ims eese G AntiVir In an up to date Windows environment with ae Windows Server 2008 and Windows 7 clients it is not possible to carry out a remote installa m tion without changing firewall settings How ever with centrally controlled means such as Group Policy this shouldn t be too much of a saa hurdle mE The installation then works very smoothly and especially quickly Products to be installed are chosen from a list O Thee idire cio adorar ce dece ems we J co The product then checks if the administrative account is valid for all marked computers and lists the result AV comparatives Product Review Corporate Review 2010 Avira anadir s4 tr 1 onli sien Ward Products bo mall Tha lola producti ana boarded tre ane avaiable lol retador Select thee Sr pou rent fo ridad ron AntiVir HR Then choose the computer s that the product is to be installed on Awr a Sanar sue ddr alien Worard fo fuis Serve TO windows EM Pieaie chozas Has conpulers o
195. y Advanced Trend Micro Enterprise Security for Endpoints and Mailservers Sophos Security Suite ll Small Business Edi Email Protection Sophos Endpoint Security and Data Protection McAfee SaaS and Email Protection B o unlimited unlimited AV ampoaratiwes Product Review Corporate Review 2010 AVIRA Feature list What is the maximum number of clients that can be managed from a single man agement server under the following condi tions All necessary components data base repositories update mechanisms reporting etc are installed on this server and the Clients communicate with the server either continuously or at least once per hour Server 128MB RAM 512MB HDFrontend 32MB RAM 16MB HDAgent 32MB RAM 16MB HD Required minimum hardware CPU Memory Disc Bitdefender Intel Pentium com patible processor e 800MHz 1 GHz recommended for Windows 2000 XP e 1GHz Core2 Duo or equivalent recom mended for Windows Vista 7 e 256MB 512 MB recommended for Windows 2000 e 512MB 1GB rec ommended for Win dows XP e 1GB RAM 1 5GB recommended for Window Vista 7 HDD 200MB 400MB for installation Hardware needs only to be strong enough to support the OS and only optionally the database Core 2 Duo 2 GB RAM 1 5 GB de WWW av com paratives org Kaspersky Intel Core 2 Duo E8400 3GHz 4GB RAM HDD SATA 300GB Man
Download Pdf Manuals
Related Search
Related Contents
Pour une bonne Hygiène alimentaire en accueil collectif de mineurs Zanussi GCF9621 Instruction Booklet GUÍA DOCENTE DE LA ASIGNATURA HP MP7001 Quick Setup Poster TDS 300 Seagate DiamondMax 21 22 1TB SATA 取扱説明書 [PDF形式] Copyright © All rights reserved.
Failed to retrieve file