Home

G Data Business

image

Contents

1. Advanced ma Incoming POPS Geof Fano lee DiStosrdorl ar Sia Gaah Hop 125 G Data Software Received Check Process outgoing email to enable checking outgoing SMTP email for viruses Under IP addresses subnets for computers that send outgoing email you can specify from which IP addresses the email to be checked originates If there are several possible IP addresses use a comma to separate them This input is required so that the email gateway can distinguish between incoming and outgoing email In general port 25 is configured to accept outgoing emails If this standard port should not be used under particular circumstances you can define port and protocol settings for incoming email via the button Configure Forwarding Activate Use DNS to send email to send emails directly to the mail server that is responsible for the target domains If you want to send email via a relay e g a provider disable Use DNS to send email and specify the relay under Forward email to this SMTP server If multiple network cards are available you can specify which of these cards you would like to use in the Sender IP dropdown menu 9 2 1 3 Incoming POP3 On the Incoming POP3 tab you can configure virus scans for incoming POP3 email on your mail server Options __Vius check _Scanparemeters Queue Advanced _Loggng Incoming SMTP Outgoing SMTP Incoming POP3 Enquiries V
2. 2 1 3 1 G Data Bootmedium Wizard To create your own G Data boot medium you first have to install G Data Bootmedium Wizard This must be on a system on which a G Data Security Client with up to date signatures has been installed Insert the G Data installation medium and press the Install button then select G Data Bootmedium Wizard G Data Software Bootmedium Wizard Welcome The Bootmedium Wizard helps you to create a bootable CD or DVD Bootable USB sticks can also be created This medium runs automatically on system start up and checks your computer for malware without starting your operating system You can find details on using the boot medium in the instructions Goa Gl After finishing the installation navigate to Start gt All Programs gt G Data gt G Data Bootmedium Wizard and click G Data Bootmedium Wizard The wizard will lead you through the process of creating the G Data boot medium Make sure to let the wizard perform a virus signature update in order to add the latest virus signature files to the boot medium After updating the signatures the wizard offers to burn the boot medium directly to the selected CD or DVD burner to save it to a USB stick or to save it as an ISO image The ISO file can then be burned using external software or distributed to network machines digitally 2 1 3 2 Configure BIOS boot options If your system will not boot from CD DVD or USB stick you will need to enabl
3. Disable external references Name Extemal references Note Direction Incoming email X Cancel Help 9 3 2 4 Greylist filter Greylisting is an extremely effective method to reduce incoming spam emails As soon as an email comes into the system the greylist filter sends back a request to the sending server to resend the message As most spam senders do not maintain an email queueing system the message will not be resent by the spammer e Waiting times minutes The waiting time determines how long suspicious emails should be held back Once this time has elapsed the email will be passed through if it has been resent The sender will then be removed from the greylist and added to the whitelist Any emails from this sender will no longer be dealt with by the greylist filter and will be delivered immediately e Lifetimes days To keep the whitelist constantly up to date a sender address will only remain on the whitelist for a certain amount of time if no mail has been 141 G Data Software received from this sender After this the sender will be removed from the whitelist automatically Example in order to receive a monthly newsletter set lifetimes value TTL to 30 days to permanently keep the sender address on the whitelist The greylist filter is only available if G Data MailSecurity s spam filter is active and if a SQL database has been installed on the server Greylist filter Name Greylist
4. hi Severs Email checking 229 229 lt 24 hours hs Workstations i M lt 3 days OutbreakShield 229 229 EP awserveri3 alai ER oeezoozc Web protection 229 229 m gt 7 days No connection E oeez0zc S win2xevat Top 10 clients Neutralized infections 8 16 2013 8 29 2013 iB Report status 8 16 2013 8 29 2013 a E wvv Tin aoioanes 600 5 A Mi infections 7 Ml Errors Z M Requests Bwv M AD_NOTEBOOK14 500 E winxvati MAD _SERVERO3 400 gt sh Exchange M AD_SERVERO4 300 WIAD SERVERI2 E AD_WORKSTATION23 W DC_SERVER03 E WORKSTATION19 E WORKSTATION43 E WORKSTATION44 Sny ot Connected localhost Administrator Status as per 8 29 2013 4 30 23 PM The Client connections chart offers an overview of the connections that have been made to G Data ManagementServer Using the chart you can make sure that all clients are regularly connecting to G Data ManagementServer The clients that appear under Top 10 clients Neutralized infections should be monitored especially carefully The appearance of one or more clients can indicate that the client users should be notified of possible problems or that technical measures should be taken If infections are taking place as a result of usage behavior use of the PolicyManager module available as part of the G Data EndpointProtection solution might be advisable Report status offers visual representation of the number of infections queries and errors in your n
5. G Data MailSecurity Administrator In general email only reaches the queue after a virus check by G Data MailSecurity Email can be in the queue for a number of reasons For example the mail server to which they are to be forwarded may be overloaded or may have failed 131 G Data Software Undeliverable messages Under Repeat interval you can specify at which intervals G Data MailSecurity should attempt sending the email For example the entry 1 7 1 4means that G Data MailSecurity tries to send the email every hour for the first three hours and from then on at regular intervals of 4 hours Under Error waiting time you can specify when the sending of the email is to be terminated permanently at which point the message will be deleted You can Notify senders of messages in the queue every hours where must be a full hour value If you do not wish to inform the sender of an undeliverable message regularly simply enter 0 Even if you deactivate the regular notification of senders of non forwarded email the sender is of course still informed when the delivery of his email has finally failed and the email has been deleted from the server You can use the button Reset to default values to restore the default settings Size limit To protect your mail server from Denial of Service attacks you can limit the size of the queue If the size limit is exceeded no further emails are added to the queue 9 2 1 7 Ad
6. e Tray icon Displays the G Data Internet Security icon in the app tray e Save logs Saves scan logs to be viewed in the Logs module The Remote administration section can be used to configure server settings to manage the device remotely Allow remote administration Allow Internet Security to be managed by G Data ManagementServer e Server address Enter the IP address or server name of the G Data ManagementServer e Device name Enter a name to identify the device with e Password Enter the password that is used to authenticate the device with G Data ManagementServer defined in G Data Administrator s Server settings gt 161 G Data Software Mobile window 10 4 2 Periodic virus scan The section Periodic virus scan lets you configure settings for virus scans e Automatic scan also in Mobile settings gt General e Periodic virus scan also in Mobile settings gt General Battery save mode also in Mobile settings gt General e Scan during load process also in Mobile settings gt General Scan frequency also in Mobile settings gt General e Type of virus scan also in Mobile settings gt General 7 Internet Security General Settings Update Settings Web protection Settings INTERNET SECURITY Automatic scan Cd Automatically scan newly installed applications Periodic virus scan a The device will regularly be checked for viruses Battery save mode The background scan w
7. Restore on client AD_WORKSTATION14 Select a backup Drag a column header to this area to group by that column Backup time T Client 7 Type of backup T Number of files 7 Size in MB 7 8 30 2013 11 25 34 AM AWCLIENT14 Full backup 701 334 OK Cancel The Restore backup window shows some basic information about the selected backup job It contains one or more backups depending on how often the job was run For every backup the list shows Backup time Client Type of backup Number of files and Size in MB In the Restore on client dropdown you can select the client to which the backup should be restored this does not need to be the client from which the files were backed up Select the appropriate backup and click OK to open the Restore settings window The restore settings can be configured on two tabs File selection allows you to browse through the backup Click Only restore selected files from the archive to enable the folder tree in which you can select the files to be restored Click Restore all files within the archive to disable the folder tree and restore all files instead The Options tab lets you configure restore job settings You can add a descriptive title to the restore job under Job name Files can be restored to the directory they were backed up from if you select Restore files to original directory or to another directory if you select one under Target directory Finally you can de
8. Add planning IT security status o Language English Format HTML Execution Once Malware statistics o Language English Format HTML Execution Monthly Weekly malware statistics Language English Format HTML Execution Weekly Weekly client statistics o Language English Format HTML Execution Weekly Quarterly IT security status o Language English Format HTML Execution Quarterly Dashboard Reports Clients ReportMan To add a new job tap Add planning Existing reporting jobs are listed in the main view of ReportManager and can be edited by tapping them The job view lets you edit all aspects of the job Enter a Name define the Language and select Recipient groups or enter Additional recipients The job can be scheduled by selecting an Interval and defining time and date Under Selected module you can choose the reporting modules to be included in the report These are identical to the modules that are available through G Data Administrator Edit add or delete modules and tap Save to 108 G Data MobileAdministrator return to the job view If necessary Preview the report then Save it Redundant or unnecessary jobs can be deleted 109 G Data Software 7 G Data Security Client The client software provides protection and runs the G Data ManagementServer jobs allocated to it in the background The clients have their own virus signatures and scheduler so that virus analysis can also be run in offline mode
9. Info MailSecurity Status Current status display for G Data MailSecurity Double click left mouse key to edit the m individual functions Process incoming email SMTP L D w dJ virus scan for incoming email Enabled Status Process outgoing email Enabled m Virus scan for outgoing email Enabled D m OutbreakShield Enabled Q Queues Automatic updates G Data Security Client Activity Date of virus signatures 30 08 2013 p Spam filter Enabled E Virus results Spam OutbreakShield Enabled G Data MailSecurity is integrated into the data stream of incoming email and can process email before it reaches the server 137 G Data Software V As long as the G Data MailSecurity virus protection is optimally configured you will see a green icon to the left of the listed entries If a component is not optimally set e g obsolete virus signatures or switched off virus check a warning icon will alert you By double clicking the relevant entry or by selecting the entry and clicking the Edit button you can directly switch to the relevant module As soon as you have optimized the settings for a component with a warning icon the icon will turn green again The following entries are available 138 Process incoming email Processing incoming email ensures that email is checked by the MailGateway before being forwarded to the recipient If you double click this entry the corres
10. Note Waiting times minutes 30 0 Suspicious email Normal email Lifetimes days Without exchanging email 2 With email exchange 30 Cinca Chep 9 3 2 5 Filter attachments A large selection of filter choices is provided to filter email attachments Most email viruses are spread through attachments which usually have more or less hidden executable files This can be in the form of a standard EXE file which includes malware but also VB scripts which could be hidden behind an apparently safe image film or music files In general users should exercise extreme caution when opening email attachments If in doubt the sender of the email should be contacted before opening files that have not been expressly requested Under File extensions you can list the file extensions to which you would like to apply the filter This lets you list all executable files e g EXE COM in one filter and have another filter for other formats e g MPEG AVI MP3 JPEG JPG GIF if their file size would overload the mail server You can also filter archive files e g ZIP RAR or CAB Separate all file extensions in a filter group by a semicolon e g exe dll Under Mode indicate whether you would like to allow the file endings under File extensions Only allow specified attachments or prohibit them Filter specified attachments The function Also filter attachments in embedded email ensures that the fi
11. to protect against viruses that are copied from another possibly unprotected client or from the Internet On execution scans files only when they are executed Monitor network access Enable network access monitoring If your entire network is already being monitored by G Data software network access monitoring can be disabled Heuristics Through heuristic analysis viruses are not only detected on the basis of the constantly updated virus databases but also on characteristics typical of viruses This method provides additional security but may also produce a false alarm in rare cases Check archives Checking compressed data in archives is a very time consuming process and can generally be omitted if the G Data virus monitor is always enabled on your system The monitor can detect a previously hidden virus while the archive is being unzipped and can automatically prevent it from spreading To avoid decreasing performance with unnecessary checks of large archive files that are rarely used you can set a size limit number of kilobytes for archives that should be checked Check email archives This option should generally be disabled as scanning email archives takes a long time and if an infected email is found the entire mailbox is moved to quarantine or deleted depending on the virus scan settings Email in the mail archive may no longer be available in such a case As the monitor also blocks execution of email attachments disablin
12. 4 4 5 2 Policies By assigning each mobile device a phone type you can enforce policies This allows you to block certain device functions from being used on corporate devices and to protect the corporate network WD G Data Administrator Sex Admin Organization Options License management 1 gt Alax OR Dashboard Clients Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics Search for client 2 A a General BS Policies Ranier F o RP Prone book y Call fiter 4 3b All ManagementServers 4 localhost Policies pale Demo Gdata Phone type Corporate 7 Allow camera access Android 4 0 and higher Discard Encryption required Android 3 0 and higher Z Allow rooted devices ah MobileDevices dh Notebooks ah Servers ay Workstations E awserveri3 hd a AWANDROIDI3 bf2e85 E pee200zc ee201zc E win2kevaT E wnat B winz var3 winxevati a sb Exchange gt Q localhost Allow WLAN access if requirements are met SSID Encryption No encryption Connected localhost Administrator Status as per 9 16 2013 12 25 15 PM Policies Under Policies select the Phone type that the selected device s belong to For devices that have been issued by the company select Corporate This will lock down various settings of the mobile app so that the end user cannot inadvertently change them Regardless of the phone type some fun
13. 7 amp Help Pane 14 Allow Outbound Default rule B Je 3 v t Search Protocol Host 15 Allow Outbound Default rule The Advanced Rule Set Editor window resembles the Rule sets pane of G Data Administrator s Firewall module It can be used to create edit delete and rank rules within the rule set In addition to the options available in G Data Administrator the Advanced Rule Set Editor offers the following options e Action if no rule applies Specify what happens when no existing rule applies to a filtered communication type Allow Deny or Ask user e Adaptive mode The adaptive mode supports applications that use feedback 119 G Data Software channel technology e g FTP and numerous online games These applications connect to a remote computer and negotiate a feedback channel with it which the remote computer then uses to reverse connect to the application If the adaptive mode is enabled the firewall detects this feedback channel and permits it without querying it separately e Reset Delete all rule sets modifications as well as all auto learned rules By double clicking a rule or clicking the Edit button individual rules can be edited The individual rule editor corresponds to the Edit rule window in G Data Administrator 7 8 4 Log The Log module shows a detailed overview of all incoming and outgoing connections It can be used to check the connection protocol initiating application direction local port rem
14. C Automatically delete log entries C Automatically delete scan logs C Automatically delete reports C Automatically delete report history C Automatically delete clients following inactivity C Automatically delete patch files OK Cancel Email Enter the SMTP server and Port normally 25 that G Data ManagementServer should use to send email In addition a valid sender address is required so emails can be sent This email address will also be used for responses from G Data Security Labs If your SMTP server requires authentication click SMTP authentication to configure it You can set up SMTP AUTH to authenticate directly on the SMTP server or SMTP after POP3 if the SMTP server requires it UD Server settings Se settings BE synchronization Load limit Backup Software updates Mobile Settings Sender name email mms domain com SMTP server mail domain com Port 25 SMTP authentication Mail groups Drag a column header to this area to group by that column ManagementServer Y Recipient s 7 localhost Management management domain com controlling domain com localhost Technical technical domain com it domain com Add K Cancel Under Mail groups you can manage recipient lists such as Management or Administrators 36 G Data Administrator Synchronization In the Synchronization area you can define
15. Job scheduling A Job name for the backup job must be entered It is recommended that you use a self explanatory name to make it easier to identify individual backup jobs You can set up Full backups or Partial backups differential at defined times A partial backup only saves files that have been altered since the last full backup In this case the backup job will need less time but restoring a partial backup takes longer because it needs to be rebuilt from multiple backup files Enable Do not run backup when running on battery to prevent burdening mobile computers running in battery mode with a backup job The backup will be postponed until the client is connected to a power supply For Daily jobs you can specify under Weekdays on which specific days of the week the job should be carried out Server side backup storage paths as well as quota notifications can be configured under Server settings gt Backup 80 G Data Administrator WP Backup job ex Job scheduling MOG a kaana Group localhost Job name _ lt new backup job gt Full backup s Schedule Weekdays once weekly D daily monthly Time 8 29 2013 at 4 48PM gt Settings Do not run backup when running on battery Z Partial backup s Schedule Weekdays daily weekly Time 7 00PM every Thursday Z Do not run backup when running on battery File directory selection The File directory selection tab lets you select which fo
16. Using G Data WebAdministrator The interface of G Data WebAdministrator strongly resembles G Data Administrator After a successful login you will be presented with the central Dashboard which provides an overview of the G Data ManagementServer s in your network and the associated clients WP G Data Administrator x gt C D localhost gdadmin Admin Organization Options License management a Q AWSERVER13 7 G Data Security Client 229 229 Demo Gdata J Ora soe 22 250 gh MobileDevices Monitor 228 229 dh Notebooks 2L Email checking 229 229 a Servers OutbreakShield 229 229 gt ab Waikstetions Web protection 229 229 EJ AWSERVER13 BankGuard 229 229 ER vee200zc Firewall 0 229 pee201z SB ewinzxevat gwnn Broan E wnxevati bof Exchange M AD_NOTEBOOK03 W AD_NOTEBOOK14 MEAD _SERVERO3 E AD_SERVER04 BAD SERVERI2 E AD_WORKSTATION E OC_SERVER03 E WORKSTATION19 E WORKSTATION43 E WORKSTATION44 Connected AWSERVER13 Administrator Status as per unknown EJE PRESSE Clients Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics 2 4 All ManagementServers M lt 24 hours B lt 3days B lt 7 days B gt 7 days No connection Report status 8 13 2013 9 13 2013 a 500 ia E M infections E Errors E Requests Bny et The functionality of WebAdministr
17. blocked or allowed IP addresses You can also export the list of IP addresses as a text file or import a text file with IP addresses IP filter S Name IP filter Note Mode Filter specified IP addresses blacklist mode Only allow specified IP addresses whitelist mode IP addresses 159 226 0 1 l Delete Import Export tei nia 9 3 2 11 Language filter The language filter lets you automatically define email in specific languages as spam For example if you do not generally have email contact with German speaking persons then you can set German as a spam language which should be filtered out Simply select the languages in which you do not receive regular email contact and G Data MailSecurity will significantly raise the spam probability for such emails 151 G Data Software Language filter Name Language filter Note Direction Incoming email X Language recognition Undesired languages C Unknown languages German 4 Portuguese v Chinese v Italian v Spanish V Dutch v Japanese Turkish English 4 Klingon French Polish Minimum recognition quality 50 Reaction v Add spam warning to email subject and text V Reject mail Prefix in subject line J Notify message sender m XL P Send alert to the following persons Message in text Include original email Identifiers L language P percent
18. e g for notebooks that do not have a continuous connection to the G Data ManagementServer after the installation of the client software a system tray icon is available to the user of the client to carry out tasks independently of administrative schedules Which options are available needs to be approved and defined using the Client settings module of G Data Administrator Using the right mouse button click the G Data Security Client icon to open a context menu which offers access to all Security Client functions 7 1 Virus check With this option a user can carry out a targeted virus check on the computer using G Data Security Client even outside of the virus checking schedule specified in G Data Administrator 13 G Data Security Client Virus check Check computer l 2 8 Progress a Close C Windows System32 dxgi dll Checked 2061 Infected 0 Suspicious 0 Pause Status 4 Options Virus Switch off computer after virus check File mW Advanced view Archived files Directory Access denied Password protected archives The user can check removable devices CDs DVDs memory the Autostart area and individual files or directories In this way notebook users who only rarely connect their computers to the company network can prevent a virus attack in a targeted manner Clients can use the Options window to configure actions that should be taken when a virus is found such as
19. enemas E Trilian Gerson 30 or latei E msexcHanGE Information The settings have not yet been received by all selected dents Connected AW2008R2BASE AVIZO08R2BASEVAdmi Status as per 8 28 2013 2 24 52 PM 63 G Data Software If you choose not to check Internet content the Monitor will engage anyway when a user tries to access infected downloaded files That means that the system on the respective client is also protected without checking Internet content as long as the virus monitor is active Internet traffic HTTP The section Internet traffic HTTP covers scan settings for HTTP traffic Process Internet traffic HTTP HTTP web content is checked for viruses while browsing Infected web content is not run at all and infected pages are not displayed If the network is using a proxy to access the Internet the server port the proxy is using must be entered Web content control available in G Data EndpointProtection also uses these settings Avoid browser timeout Since G Data software processes web content before it is displayed in the Internet browser there will be a certain amount of latency depending on the data traffic It is possible for an error message to appear in the Internet browser because the browser does not receive data immediately This error message can be suppressed by enabling Avoid browser timeout As soon as all browser data have been checked for viruses they will be transmitte
20. 2013 1 562 E wean E worxstarionio AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 2 00 18 PM 13 0007 25 08 2013 8 28 2013 20 1 be change WORKSTATION11 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 1 56 22 PM 13 0 07 25 08 2013 8 28 2013 1 56 2 WORKSTATION12 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 2 00 18 PM 13 0 07 25 08 2013 8 28 2013 20 11 E workstarion13 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 2 00 19 PM 13 0 07 25 08 2013 8 28 2013 200 1 I worksTaToN14 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 1 5402 PM 1300 7 25 08 2013 8 28 2013 1 540 BD workstanonis AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 2 00 19 PM 1300 7 25 08 2013 8 28 2013 200 1 Number per page 1000 Page 1 gt from 1 Connected localhost Administrator Status as per 8 29 2013 4 30 23 PM Entries 98 Selected 0 When the Overview panel is selected an additional menu entry named Clients becomes available in the menu bar It reflects the options that are also available by right clicking one or more clients The following options are included e Install G Data Security Client e Install G Data Security Client for Linux 49 G Data Software e Uninstall G Data Security Client e Installation overview e Reset to default Reset the security settings for groups of clients e Move G Data Security Client to group This function allows you to move the se
21. 8 29 2013 Cancel 4 2 2 4 Server settings The Server settings window bundles configuration settings for ManagementServer functionalities such as synchronization email settings load limits and staged software updates Settings Under Rollbacks you can indicate how many of the updated virus signature updates you would like to hold as a reserve for engine rollbacks The default value here is the last five signature updates for each engine Automatic cleanup allows you to configure whether various items should automatically be deleted after a specified period of time O Automatically delete log entries Delete log files that are older than the set amount of days Automatically delete scan logs Delete scan log files that are older than the set amount of days Automatically delete reports Delete reports that are older than the set amount of months Automatically delete report history Delete generated ReportManager reports that are older than the set amount of months Automatically delete clients following inactivity Delete clients that have not logged on for a set amount of days Automatically delete patch files Delete patch files that have not been used for more than the set amount of days 35 G Data Software UD Server settings eak P Email Synchronization Load limit Backup Software updates Mobile Rollbacks Number of update rollbacks 5 gt Updates Automatic cleanup
22. Connected localhost Administrator Status as per 8 29 2013 4 30 23 PM Entries 98 Selected 98 All client computers or clients in a selected group are displayed in the overview This enables you to see at a glance how the client firewall has been configured and to make changes directly The list contains the following data e Client Client computer name You can use the icons being displayed to tell if the client software is installed on this client e G Data Firewall Here you can tell if the firewall on the client is installed enabled or disabled e Autopilot Rule set Shows which rule set has been applied to the client e Blocked applications Displays whether blocked applications are reported or not e Client firewall Shows whether users can enable and disable the firewall e Off site mode If you enable off site configuration the user can manage and configure the firewall settings on this client how he wishes as long as he is not connected to the G Data ManagementServer network The off site configuration can only be used if the firewall in the company network is not being operated in autopilot mode To change the firewall settings for the clients selected in the list right click on any client This will open a context menu with the following options e Create rule set Switch to the Rule sets area to define specific rules for your client firewall e Edit rule set Switch to the Rule sets area to modify e
23. Forward to the following persons to forward suspected spam emails e g to the system administrator Whitelist Certain sender addresses or domains can be explicitly excluded from suspected spam by putting them on the whitelist Simply enter the email address e g newsletter gdata software com or Domain e g gdata software com that you want to exclude from suspected spam in the Addresses Domains field and G Data MailSecurity will never classify messages from that sender or sender domain as spam You can use the Import button to insert predefined lists of email addresses or domains into the whitelist Each address or domain must be listed on a separate line A plain text file format is used for storing this list you can create this list using an editor like Windows Notepad You can also use the Export button to export whitelists as text files 146 G Data MailSecurity Administrator Filter spam Keywords subject Keywords mail text Content fiter Advanced settings Fiter Whitelist Blacklist Realtime blacklists F Use list A mail will not be scanned for spam if the sender or sender domain has been added to the whitelist Addresses Domains domain com i Hep OK Cancel Anny Blacklist Certain sender addresses or domains can be explicitly flagged as suspected spam by putting them on the blacklist Simply enter the email address e g newsletter m egas
24. Microsoft Exchange Server 2007 SP1 2010 2013 The plugin reports to G Data ManagementsServer If G Data ManagementServer has already been deployed to the network enter the server name Alternatively the installation wizard can set up a local installation of ManagementServer The Exchange plugin will automatically register itself with the network MMS or local MMS When using a local MMS the installation wizard will automatically set up a version of G Data Administrator with access to settings for the Exchange plugin The functions are identical to the full version of G Data Administrator but settings that do not apply to G Data MailSecurity for Exchange are not shown When using a network MMS an existing installation of G Data Administrator can be used Log in to the MMS using G Data Administrator to configure all protection settings on the Exchange settings module tab 2 7 2 As a gateway MailSecurity MailGateway can be installed on a dedicated server or on the mail server itself When installing MailSecurity MailGateway several configurations are possible depending on the PC in the network on which it will be installed Ideally it should be located directly behind your network firewall if you are using one That way the SMTP POP3 data stream from the Internet will be sent to MailGateway via the firewall To install MailSecurity MailGateway insert the MailSecurity installation medium and press the Install button Under Mail Gateway selec
25. Monitor settings e Allow the user to change email options If this function is enabled the client user has the option to change the Email and AntiSpam settings e Allow the user to change Web M options If this function is enabled the client user has the option to change the Web IM settings e Allowthe user to display the local quarantine If you allow the local quarantine to be displayed the user can if necessary disinfect delete or restore data that was moved into quarantine by the monitor In doing so note that a virus is not removed by restoring a file from quarantine This option should therefore only be made accessible to experienced users e Protect client settings with a password To prevent improper manipulation of local settings there is the option of only permitting options to be changed when a password is entered This allows you for example to prevent end users from changing settings The password is set specifically for the selected client or group and it should only be shared with authorized users Scan jobs You can define exceptions that are not to be checked during the execution of scan jobs Archives and restore partitions for example can be defined as exception directories You can also define file extensions as exceptions Exceptions can be defined for complete groups If the clients in a group have defined different exception directories new directories can be added or existing ones can be deleted The direct
26. Process POP3 enquiries Port 110 IPv4 All IP addresses Configure V Prevent email program timeout Collection Collect email from this POP3 server Port 110 Sender IP Standard LAN adapter X Filter Replacement text for rejected emails ok Cance Apy 126 G Data MailSecurity Administrator Enquiries Use Process POP3 enquiries to let G Data MailSecurity fetch your POP3 emails from a POP3 server check them for viruses and forward them to their recipients via your email server Where applicable you must specify the Port that your email program uses for POP3 enquiries normally port 110 Depending on the amount of email there can be a delay of several seconds when the user retrieves POP3 emails Tick Prevent email program timeout to prevent the recipient from getting a timeout error from their email software if POP3 retrieval is taking too long POP3 based email programs can be configured manually Use 127 0 0 1 or your email gateway server as the inbound POP3 server in your email program and separate the name of the external email server from your user name with a colon For example instead of POP3 server mail xxx net username Jane Q Public you write POP3 server 127 0 0 1 username mail xxx com JaneQ Public To perform a manual configuration please refer to the manual of your email program Collection Under Collect email from this POP3 server you must specify the POP3 server from whic
27. Recipient group s you can add groups of e mail recipients Click the cogs icon to the right to define a new recipient group if you haven t done so already in Options 100 gt Server settings gt Email settings separated by commas New Connection to server accumulated by period Bar chart 3D WP Report definition Se Name TT security status Language English M A Techenal m Additional recipients Execution Weekdays once quarterly E Monday daily half yearly A Testy weekly annual Z Wednesday monthly a 7 Thursday X Friday Time O Saturday 1 07PM Sunday Selected modules Content Type Reports by report type Line chart Preview Cancel G Data Administrator You can also enter Additional recipients To add a module to the report click New at the bottom of the screen to open the Module selection screen Availability of the modules depends on the product version that you are using The report modules have been divided into three categories Client general Client protection and PatchManager Select the appropriate module and define its settings at the bottom of the window An output format can be selected for each module Table Line chart 3D Bar chart or 3D Pie chart Not every module supports every output format For some modules you can also define a Limit to the amount of items to be included as well as a defined Period covered Click OK to add the sel
28. Share or block network services Controls access to specific network services and applications i File printer sharing Controls access to network sharing and printers ka Share or block domain services Permit or block access to a network domain A Shared use of the Internet connection Controls shared access to the Internet ee Share or block VPN services Specifies whether access to VPN services is permitted or blocked E Advanced Rule Set Editor expert mode Custom creating and editing of rule sets in detail The Rule wizard offers various rules All of them can be used to quickly allow or deny a specific type of traffic For most rules a specific Direction can be defined which governs whether the program is to be blocked for inbound connections outbound connections or both e Share or block applications Select a specific application on the hard disk to explicitly permit or deny it access to the network governed by the rule set e Share or block network services Blocking one or more ports is a quick way of eliminating vulnerabilities that could be used for attacks by hackers The wizard provides the option of blocking ports completely or for a particular application only 118 G Data Security Client e File printer sharing Allow or block file and printer sharing Share or block domain services Allow or block network domain services e Shared use of the Internet connection Allow or block Intern
29. Update Al Langue 3 Apple QuickTime E Apple Quicktime 7 13 Player fr Windows Update All Languages Gee Nete High Paich Apple QuickTime E Apple QuickTime 77 4 Player for Winsowe Update All Languages Gee Net High Pateh Apple QuickTime E Apple QuickTime 77 5 Player for Windows Update ll Language See Note High Patch 1277 2010 No No snno No 10 27 2011 No Ne N Ni 5 15 2012 11 5 2012 EEEEE 5 22 2013 2 25 2018 Number per page 1000 Page 1 from1 Connected localhost Administrator Status as per 6 2 2014 11 01 16 AM Entries 4804 Per patch several types of patching jobs can be planned Right click any patch and select one of the following options e Check patches for applicability Plan a job that checks if the selected patch es apply to client s using the Patch applicability job window Install patches Plan a job that installs one or more patches on client s using the Software distribution window e Put patches on the blacklist Put one or more patches on the blacklist e Remove patches from the blacklist Remove a patch from the blacklist 96 G Data Administrator e Properties View more information including a full description and license The Priority column displays the priority of every patch The default priority is based on the PatchManager database but can be edited Low Normal or High 4 4 10 Reports All G Data software notifications
30. _Blackist__ _Realtme biackists_ Keywords subject Keywords mail text Content fiter Advanced settings V Use list The list includes terms indicating spam in the subject Keywords adv al a adv aa j anal pada Change best rates blowjob Delte cash casin0 casino cock cock2 cum dick C dicks Import leash ae free cable Epot J Match whole words only recommended Cok cancer Arp Help Keywords mail text By defining a list of keywords you can identify suspected spam through the words used in the email body If at least one of these terms is included in the email body the spam probability increases You can change this list as you like by using the Add Change and Delete buttons You can add predefined lists of keywords to your list using the Import button Entries in such a list must be listed one below the other in separate lines A plain text file format is used for storing this list you can create this list using an editor like Windows Notepad You can also use the Export button to export such a list of keywords as a text file As in the example given earlier by selecting the Match whole words only option you can have G Data MailSecurity search the email text for whole words only So if cash has been defined as a keyword messages containing that word would be suspected as spam while messages containing cashew nuts in the text would
31. action to be taken if an infected file is detected There are various options that may or may not be suitable depending on what the respective client is used for 58 G Data Administrator o Block file access Neither read nor write access will be granted for an infected file o Disinfect if not possible block file access An attempt is made to remove the virus if this is not possible file access is blocked o Disinfect if not possible quarantine An attempt is made to remove the virus if this is not possible the file is moved to Quarantine o Disinfect if not possible delete file An attempt is made to remove the virus if this is not possible the file is deleted In the rare case of a false positive virus message this may lead to data loss o Move file to quarantine The infected file is moved to quarantine The system administrator can then try to manually disinfect the file o Delete infected file This function serves as a strict measure for effectively containing a virus In the rare case of a false positive virus message this may lead to data loss Infected archives Specify here how infected archives are to be treated When specifying these settings you should bear in mind that a virus in an archive will only be harmful when it is unpacked from the archive Scanning mode Define when files should be scanned Read access scans every file directly when it s read Read and write access adds a scan on writing
32. allows the disabled clients to be displayed If the software cannot be installed using the remote installation you can also perform a local installation using the G Data installation medium or a client install package Uninstall G Data Security Client Using the uninstall function G Data Security Client can be remotely removed Before the uninstallation procedure is initiated you can select the components that should be kept It is possible to uninstall the client software while keeping the jobs reports messages or backup archives that are associated with that client and have been saved 50 G Data Administrator on the server Select the components to be removed and click OK to initiate the uninstallation For a complete removal the client must be restarted WD Uninstall Client Actions 4 Uninstall G Data Security Client Delete jobs Delete reports ISON Delete messages Delete backup archives ox Cancel Alternatively it is possible to uninstall the client locally This requires a command prompt with administrator rights In the C Program Files x86 G DATA AVKClient directory enter the command unclient AVKUninstto start the uninstallation The computer should be restarted afterwards Manage EULAs The Manage EULAs window allows you to add edit and remove End User License Agreements EULAs for mobile devices Using the appropriate options in the Clients menu these EULAs can
33. and function it is very similar to the central control panel G Data Administrator but because it is browser accessible it can be accessed from virtually anywhere 5 1 Starting G Data WebAdministrator After completing the installation G Data WebAdministrator can be started by double clicking the desktop icon Alternatively start your browser and navigate to the URL that has been provided at the end of the installation process The URL consists of the IP address or computer name of the machine on which IIS is running and WebAdministrator has been installed and the folder suffix such as http 10 0 2 150 GDAdmin If you have not yet installed the Microsoft Silverlight browser plugin you will be prompted to download it GDATA Login Language English k Server 10 0 2 150 gt Authentication Windows authentication User name domain username x Password eseesooe Manage multiple servers E S The WebAdministrator login page is very similar to the full G Data Administrator software You will be prompted to enter language server authentication user name and password The server name should be filled in by default but can be altered if necessary Choose Windows authentication to log in with your Windows credentials or Integrated authentication to use credentials that have been defined within the Administrator s Manage users window Fill in your user name and password and click OK to log in 103 G Data Software 5 2
34. center Virus scan Lost Stolen Q Web protection Gi Incoming filter a DB Outgoing filter e Activate the Hide contacts option to see a list of currently hidden contacts To add a 160 G Data Internet Security for Android contact tap the button You can select any contact from your address book or call history After adding a contact tap its name to edit the protection options Incoming calls and messages can be intercepted by selecting Hide incoming communication To hide the contact from the address book select Hide contacts Intercepted messages can also be viewed in the contact screen by selecting Message history or Call history To unhide a contact and move it back to the regular address book select the contact and choose Delete entry 10 4 Settings Most of the settings for G Data Internet Security can be managed through the Mobile settings module of G Data Administrator However on the device itself there is also the possibility to configure some features 10 4 1 General The General section includes tray icon and scan log settings Internet Security Displays the Internet Security logo in the tray Periodic virus scan Settings for automatic scans Save logs z Web protection Open source licenses Settings Show license details for open source software G Data Software AG REMOTE ADMINISTRATION Allow remote administration z Enables remote administration of the device Server address Man
35. gh Notebooks 1 8 2013 1 08 08 PM gly Servers 2 25 2013 1 32 53 PM gt ah Workstations 2 25 2013 2 17 56 PM ED awserveri3 8 28 2013 2 13 28 PM 9 13 2013 1 14 55 PM EJ ves200zc Malware statistics localhost Html English monthly E vee201zc Weekly malware statistics localhost Html English weekly GB winzkevat Weekly client statistics localhost Html English weekly E wnan Quarterly IT security status localhost Html English quarterly Bwnz varz E wnxevati gt oh Exchange Number per page 1000 Page 1 from 1 Connected localhost Administrator Status as per 9 12 2013 3 17 50 PM Entries 5 Selected 0 To backup report definitions click Export to save them as a dbdat file Click Import to restore definitions Right click one or more report definitions to Delete them or click Execute immediately to run the reporting job immediately Click Properties to edit a report 4 4 11 1 Report definition The Report definition window allows you define a report containing one or more report modules each of which covers a specific set of statistics and information After selecting the appropriate modules a reporting job can be scheduled to regularly generate the report The Report definition window features scheduling options that resemble the ones used for most other scheduled jobs After defining a Name and Language select the interval with which the report should be generated once daily weekly monthly etc Under
36. have embedded themselves on your computer may prevent G Data software from being installed The G Data boot medium will help you fight these threats prior to installation of antivirus software by scanning your computer before the operating system is loaded 1 Using the installation medium Insert the G Data installation medium In the start window that opens click Cancel and turn off the computer 2 Using a G Data boot medium you have created yourself To create your own G Data boot CD DVD or USB stick you must first install G Data Bootmedium Wizard The wizard must be run on a system on which a G Data Security Client with up to date signatures has been installed After installing G Data Bootmedium Wizard follow its on screen instructions to create a G Data boot medium 3 Restart the computer The G Data boot medium s start menu will appear 4 Use the arrow keys to choose the appropriate language confirm your choice with Enter and then choose G Data AntiVirus A Linux operating system starts and the G Data AntiVirus boot medium interface appears If you are having problems with the program interface display restart your computer and choose the G Data AntiVirus alternative option 5 If you have created a G Data boot medium yourself the virus signatures are the latest ones that the G Data Security Client had available at the time the boot medium was created If the virus signatures are outdated the program will suggest updati
37. information for every filter e Log For the spam filter there is a log with a list of emails rated as potential spam The log also shows which criteria were responsible for the spam rating spam index values In the event of an incorrect spam rating you can inform the OutbreakShield server online that there has been a false detection false positive The mail is then rechecked by OutbreakShield and if it really was falsely detected as spam it is then reclassified as harmless In doing so only a checksum is transferred and not the content of this email Your network is continuously protected from virus infections irrespective of individual filter rules because G Data MailSecurity checks incoming and outgoing mail in the background Filter rules are designed to protect your email accounts from unsolicited mail spam and unsafe scripts and to minimize potential virus sources even before virus detection by G Data MailSecurity For all filter types you can enter a name for the filter under Name You can specify internal notes and comments for the filter concerned under Note Under Direction a filter rule can be defined to apply only to Incoming email only to Outgoing email or Both directions In the Reaction section you can specify how email should be handled when it meets the filter criteria as soon as it is identified as spam A message text can be customized for the options Notify sender and Send alert to the following persons T
38. install critical patches gly Notebooks Client functions Allow the dh Workstations Allow the Waweuennss Waweuentia ED Awservers3 Hj vesz00zc Information Miei The settings have been applied to all selected clients E wvzkevar wart Bwwz7 var3 gt hy Sewers SS winxevar bp exchange Connected AW2O08R2BASE AV 200BR2BASE Administrator Status as per 5 21 2014 5 05 33 PM Enable PatchManagement Enable or disable PatchManager o Automatically check critical patches for applicability Whenever a patch with critical priority is released PatchManager can automatically check its applicability This saves the effort of planning separate patch applicability jobs o Automatically install critical patches Whenever a patch with critical priority is released PatchManager can automatically install it if it is applicable This can cause compatibility problems It is recommended to 95 G Data Software test patches on a non production system before deploying them to production clients Allow the user to view and request patches Allow the client to view available patches and file a request for deployment Allow the user to refuse patch installation Allow the client to temporarily refuse patch installation You can select how many refusals are allowed until installation is forced and how often patch installation should be attempted 4 4 9 3 Patch configuration The Pat
39. message Send virus alert to the following persons F Attach report to outgoing uninfected email G Data ManagementServer F Report virus results to G Data Management Server Inbound In almost all cases you should enable Check incoming email for viruses and also check which option you want to use In the case of an infection e Log only e Disinfect if not possible log only e Disinfect if not possible rename e Disinfect if not possible delete Rename infected attachments e Delete infected attachments e Delete message Options in which incoming viruses are only logged should only be used if your network is permanently protected from viruses another way e g using the client server based virus protection G Data AntiVirus 128 G Data MailSecurity Administrator If a virus is found you have a wide range of notification options You can add a virus alert to the subject and text of the infected email in order to inform the recipient You can also send a virus discovery alert to inform certain persons e g system administrators that a virus has been sent to an email address in your network Separate multiple recipient addresses with a semicolon You can customize the text for the notification functions Wildcards can be used here to add information to the Subject and Email text fields the same wildcards as the ones that are used in the Incoming POP3 gt Filter settings Outbound In gene
40. next computer reboot If your system does not meet the prerequisites for remote installation of the G Data Client software or if remote installation fails repeatedly you can choose to install clients locally using the G Data installation medium or a client install package A manually generated client install package can also be distributed using logon scripts group policy objects 2 6 2 Local installation If a remote installation is not possible you can install G Data Security Client directly on the clients You can use the G Data installation medium to manually install the client software or create a client installation package that runs in the background which makes it ideal for distribution through logon scripts Installation 2 6 2 1 G Data installation medium Insert the G Data installation medium and press the Install button then select the G Data Security Client component During installation enter the server name or the IP address of the server on which G Data ManagementsServer is installed The server name is required so that the client can communicate with the server over the network 2 6 2 2 Install package The package is a single executable file GDClientPck exe which can be used to install a new client without any further user interaction The installation package can be used to install the client to all computers in a domain via a login script or to install locally and it always contains the current client v
41. on the status of the Clients not available if an Exchange server has been selected the Detection method the Virus hit list and the Hit list of neutralized infections WD G Data Administrator r Admin Organization Options License management 1 gt 33 4 Search for client a A All ManagementServers a B localhost By DemoGdata gt hh MobileDevices Notebooks gt 4 n Pie chart OutbreakShield D Email protection E f Update virus signatures a ah Servers 2 Workstations gh Development gt ght dh Sales E awserveri3 AWANDROID13 bf2e8520 E veszo0zc B Enabled 98 100 00 W Enabled 98 100 00 B Enabled 98 100 00 M Automatically 98 100 00 E oeezze M Disabled 0 0 00 M Disabled 0 0 00 M Disabled 0 0 00 E Manually 0 0 00 S winzkevat z ae EEE a Bwna weve gt A Exchange M Automatically 98 100 00 Up to date 0 0 00 Manually 0 0 00 E Outdated 98 100 00 E Outdated 1 1 02 E More than 24 hours ago 98 100 00 M Up to date 97 98 98 Within the last 24 hours 0 0 00 Connected localhost Administrator Status as per 9 16 2013 12 25 15 PM 102 G Data WebAdministrator 5 G Data WebAdministrator G Data WebAdministrator is the web based control panel for G Data ManagementServer It can be used to quickly edit and update settings through a web interface In interface
42. the menu bar The following options are included e View Select whether you would like to display all jobs or only specific types of jobs see above e Run now Re run single scan jobs which have already been run or canceled For periodic scan jobs this function runs the job immediately regardless of schedule e Cancel Cancel a running job e Delete Delete selected jobs e Restore backup Restore backups to clients or groups For more information about restoring backups see the chapter Restore jobs The Restore function is available as part of the optional Backup module e New Create a job see above 4 4 6 1 Scan jobs The New scan job window lets administrators define a single or periodic scan job A complete job configuration consists of three aspects Job scheduling Scanner settings and Analysis scope each covered by their respective window tabs Which options are available on the tabs depends on the type of client that the job is being planned for For example when planning a job for an Exchange server if MailSecurity has been installed options that deal with threats specific to desktop clients are not available Job scheduling Use the Job name field to specify which name the scan job should have You can enter meaningful names here such as Archive scan or Monthly scan to clearly label the job so that it can be found again in the table overview Enable Report scan progress to the ManagementServer every 2 minute
43. then be assigned to any mobile device to make sure the end user is informed about and has agreed with the deployment of G Data s Internet Security app UD Manage EULAs x Available EULAs Sales English Add Sales German Marketing English Marketing German Close The Edit EULAs window lists all available EULAs To add an EULA click Add In the Create EULA window enter a Name select a Language and add the Content of the agreement Clicking OK adds the EULA to the list 51 G Data Software To edit an existing EULA select it in the list and click Edit To remove an EULA select it and click Delete 4 4 2 2 Software The software inventory allows you to monitor software use across the whole network Software can be added to a blacklist or whitelist to serve as a base for decision making about network software management WD G Data Administrator 4 AE Al ManagementServers a O localhost Demo Gdata y MobileDevices S Notebooks ah Servers ah Workstations E awserveri3 S oeszoozc E vee201z SB winzkevat E wnan Bwnz var3 E winxevari H 4p Exchange Connected localhost Administrator Admin Organization Options License management Client V Installed Y Name blacklist Global whitelist Hardware Messages Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Sta
44. to enable disable the firewall or if the device is being used in off site mode Firewall gt Overview gt Allow user to change the off site configuration 4 Edit network Network info OR Name Local Area Connection a IPv4 address 10 202 3 41 a IPV6 address f80 2037 f282 e72c 8475 9610 Subnet mask 255 255 0 0 Default gateway 10 202 0 1 Preferred DNS server 192 168 10 41 Alternate DNS server 10 215 0 2 WINS server V Firewall enabled on this network Enable automatic configuration DHCP Rule set trusted networks Z Edit rule set e Network info Shows information about the network including IP address subnet mask default gateway DNS and WINS server e Firewall enabled on this network Enable or disable firewall protection Internet connection sharing Allow Internet Connection Sharing 116 G Data Security Client e Enable automatic configuration DHCP Allow DHCP configuration e Rule set Choose any of the defined Rule sets to be applied to this connection Click Edit rule set to open the Rule Wizard 7 8 3 Rule sets In the Rule sets module you can create and edit rule sets groups of firewall rules that can be applied to networks S G Data Personal Firewall Firewall D Status at Networks S Rule sets 9 Log an Settings Help Rule sets l S Create rules for individual security levels to protect your networks wit
45. use the arrow keys or the small arrow symbols to scroll up and down chronologically Internet update settings Access data Intemet update schedule Virus database Run Manual Weekly D Hourly 5 Monthly Daily Time 30 08 2013 135 G Data Software Internet settings If you use a computer behind a firewall or if you have other special settings for your Internet access configure the use of a Proxy server You should change these settings only in case the Internet update does not work If necessary ask your Internet Service Provider about the proxy address The Internet connection login data user name and password are especially important if the automatic Internet update is based on a schedule Without this information an automatic connection to the Internet cannot be established Be sure to enable automatic login in your general Internet settings for example for your mail program or web browser G Data MailSecurity can start the Internet update process without automatic dialling but it has to wait for you to confirm the Internet connection by selecting OK Additionally you can select the Update server region to optimize connection speed Internet update settings S i Access dala ee Intemet update schedule Virus database Intemet settings User account Proxy server Use proxy server Login data for Intemet connection User name Password U
46. version Virus news Scan options The Scan options section configures the scan parameters for incoming and outgoing emails 62 Use engines The G Data software works with two independently operating virus scanning engines Using both engines guarantees optimum results for preventing viruses Using just one engine may have performance advantages OutbreakShield OutbreakShield detects and neutralizes threats from malicious programs in mass emails before the relevant up to date virus signatures become available OutbreakShield uses the Internet to monitor increased volumes of suspicious emails closing the window between a mass mail outbreak and its containment with specially adapted virus signatures practically in real time Under Edit you can specify whether OutbreakShield uses additional signatures to increase detection performance In addition you can enter access data here for the Internet connection or a proxy server which allows OutbreakShield to carry out an automatic signature download from the Internet G Data Administrator Warnings The Warnings section configures warning messages for recipients of infected emails e Notify user when a virus has been found Recipients of an infected message will automatically be notified through a virus warning popup Outlook protection Outlook protection enables email scans using an integrated plugin e Protect Microsoft Outlook with an integrated plugin Activation of this function i
47. you to install it After the installation a reboot is required After the installation has finished the installer will provide you with a direct link to access MobileAdministrator through your mobile browser 16 Installation Using MobileAdministrator over the Internet without using a secure connection represents a potential security risk For optimal security enable an SSL Server Certificate in IIS 2 6 Installing G Data Security Client To protect and manage clients in the network G Data Security Client needs to be installed on each machine Depending on the deployment scenario you can choose a remote installation via G Data Administrator or a local installation using the G Data installation medium or a client install package Additionally it is recommended that you install G Data Security Client on your server When installing G Data Security Client on a server make sure that it does not interfere with existing server workflows For example for database and e mail servers monitor and scan job exceptions should be defined for some files and folders Consult the Reference Guide for more information 2 6 1 Remote installation The most convenient way to install clients is to initiate a remote installation through G Data Administrator The Server setup wizard and the Clients module allow you to automatically install G Data Security Client to all machines UD Install G Data Security Client x Enter a user accoun
48. 1 0 for Windows Update See Notes ooo E Mozilla Firefox en us 21 0 for Windows Full Upgrade See Notes E Mozilla Firefox en us 21 0 for Windows Update See Notes Mniemam a ren Oe Me nM enna amean 4 4 6 6 Rollback jobs The Rollback function is available as part of the optional Patch Management module To uninstall previously deployed patches you can plan a rollback job by right clicking on the respective distribution job in the Tasks overview and choosing Rollback Alternatively select the specific client and patch in PatchManager s Status overview panel and choose Rollback from the context menu 4 4 7 PolicyManager The PolicyManager module is available as part of the EndpointProtection solution PolicyManager includes application device and web content control as well as monitoring of Internet usage time These functions allow comprehensive implementation of company guidelines for the use of internal company PCs Using the PolicyManager a system administrator can define whether and to what extent external mass storage or visual media can be used Similarly one can also define which websites may be visited and which programs may be used on the company PCs 84 G Data Administrator 4 4 7 1 Application control Application control can be used to restrict the use of specific programs To do this under Status specify whether the limitations should apply to all users including administrato
49. 6 PM E WIN7 VAT3 12 20 2012 4 57 12 PM E WINXPVAT1 12 20 2012 4 57 12 PM WIN7 VAT3 12 20 2012 1 2241 PM E WINXPVAT1 12 20 2012 1 22 41 PM E WIN7 VAT3 12 20 2012 1 22 37 PM E WINXPVAT1 12 20 2012 1 2237 PM Connected localhost Administrator Status as per 8 29 2013 4 30 23 PM 12 20 2012 4 58 26 PM The Administrator has permitted the installation of the following patches 974431 Update for Windo 12 20 2012 4 58 26 PM The Administrator has permitted the installation of the following patches 974431 Update for Windo 12 20 2012 4 58 19 PM The Administrator has permitted the installation of the following patches 979306 Update for Windo 12 20 2012 4 58 19 PM The Administrator has permitted the installation of the following patches 979306 Update for Windo 12 20 2012 4 57 21 PM The Administrator has permitted the installation of the following patches 976098 Update for Windo 12 20 2012 4 57 21 PM The Administrator has permitted the installation of the following patches 976098 Update for Windo 12 20 2012 4 57 18 PM The Administrator has permitted the installation of the following patches 977074 Update for Windo 12 20 2012 4 57 18 PM The Administrator has permitted the installation of the following patches 977074 Update for Windo 12 20 2012 4 57 15 PM The Administrator has permitted the installation of the following patches 2633952 Update for Wind 12 20 2012 4 57 15 PM The Administrator has permitted the installation of the following patc
50. 7 B lt 3 days OutbreakShield 229 229 m EP Awservers3 B274 E oeezoozc Web protection 229 229 pee Titeys No connection E ves201z E winzksvar Top 10 clients Neutralized infections 8 16 2013 8 29 2013 Report status 8 16 2013 8 29 2013 E wnan M infections W Errors 7 B Requests E AD_NOTEBOOK03 Bwna M AD_NOTEBOOK14 E winxevari E AD_SERVERO3 400 gt b Exchange M AD_SERVER04 x M AD_SERVER12 E AD_WORKSTATION23 M DC_SERVER03 IE WORKSTATION19 E WORKSTATION43 E WORKSTATION44 ony 9T Connected localhost Administrator Status as per 8 29 2013 4 30 23 PM The Administrator interface is organized as follows the client management area on the left displays all clients which have been enabled and to which G Data Client software can be or has already been deployed To the right all modules are accessible via dedicated tabs The content of the module usually relates to the client or group of clients highlighted in the client management area Above the client management and modules areas there is a menu bar for global settings and client organization with additional menus that are only displayed when specific modules are selected When administering Linux clients which are installed on Samba servers some options are blocked For example functions which are involved in handling emails are not available because these are not required in the context of a file server Functions which canno
51. Alternatively click Start gt Run and enter the command inetmgr This command also works for Windows 7 users Select your server in the Connections panel In the middle of the screen navigate to the IIS category and double click on Server Certificates On the Actions panel click Create Self Signed Certificate After entering a friendly name for the certificate it will be created and listed in the Server Certificates panel Note that the default expiration date of the certificate is exactly one year ahead of the date of creation 169 G Data Software Internet Information Services IS Manager o 86 mm gO S4 AWSERVERI3 gt jaa File View Help Connections ite eJ AWSERVER13 Home e Manage Server E Start Page Restart a G4 AWSERVERL3 AWSERVERI3 Administrator fier Sousa Stow All Soup by z 2 Application Pools Stop IS E Sites Qi a O p View Application Pools Authentic Compression Default Directory Error Pages View Sites Document Browsing Change NET Framework gt i ESS i Version aT fF a Hep Handler HTTP Logging MIME Types Modules Online Help Mappings Respon fF 2 a Output Request Server Worker Caching Filtering Certificates Processes Management q 3 g E amp amp Configurat Feature Shared Editor Delegation Configurat Features View Content View El Ready g amp To apply the certificate to sit
52. Data Software 9 2 2 Update The Update window lets you configure G Data MailSecurity updates Virus signatures and program data of G Data MailSecurity can be updated manually or automatically Internet update Settings If you have deployed a G Data Business product and G Data Security Client has been installed on the computer the client s virus signatures can be used Use G Data Security Client virus signatures Run virus signature Internet update yourself Settings and scheduling Virus signatures Engine A AVA 22 12189 30 08 2013 Update vins datas Engine B GD 23 1983 30 08 2013 en Update status Date SS Status Program files MailSecurity 13 0 0 4 Software update Administrator 13 0 0 3 Close 9 2 2 1 Settings If MailGateway is being operated as part of a G Data business solution you can avoid duplicating the downloads by selecting Use G Data Security Client virus signatures and get them directly from the installed G Data Security Client If you choose Run virus signatures Internet update yourself G Data MailSecurity performs this operation autonomously The Settings and scheduling button takes you to the area where you can enter all the settings required for manual and automatic updates Access data Under Access data enter the User name and Password that you received when you registered G Data MailSecurity The G Data Server will use this data to recognize you so the vi
53. E wnxevarz Fite deleted WORKSTATIONG7 8 28 2013 2 01 01 PM Monitor HICAR Test File not a virus Engine A b th Exchange F File deleted WORKSTATION60 8 28 2013 2 01 00 PM Scanner EICAR Test File not a virus Engine A Virus found WORKSTATIONS 8 28 2013 2 01 00 PM Scanner EICAR Test File not a virus Engine A Web content blocked WORKSTATIONSS 8 28 2013 2 00 59 PM Web content control CD Application s blocked WORKSTATIONS2 8 28 2013 2 00 59 PM Application control Application s blocked WORKSTATIONS1 8 28 2013 2 00 59 PM Firewall blocked application E Virus found WORKSTATIONSO 8 28 2013 2 00 59 PM BankGuard ZeuS Fingerprint 04043737 Number per page 10000 Page 1 from 1 Connected localhost Administrator Status as per 8 29 2013 4 30 23 PM Entries 189 Selected 0 The Reports menu offers the following functions e View Indicate whether you would like to see all reports or only a subset of report types 97 G Data Software e Hide dependent reports If a virus alert or a report is displayed twice or more due to different jobs or jobs that were performed multiple times you can hide the duplicate entries using this option Only the most current entry is shown and can be edited e Hide read reports Hide reports that have already been read e Remove virus from file only for virus reports Attempt to remove the virus from the original file e Move file to quarantine only for virus reports
54. ERO Intel R Core TM i7 CPU 930 2 80GHz 2807 1668 5444 GB 5444 GB E wnan SERVEROB Intel R Core TM i7 CPU 930 2 80GHz 2807 1668 5444 GB 5444 GB Bwna SERVERO9 Intel R Core TM i7 CPU 930 2 80GHz 2807 1668 5444 GB 5444 GB E wnan SERVER10 Intel R Core TM i7 CPU 930 2 80GHz 2807 16GB 5444 GB 5444 GB gt Exchange SERVER11 Intel R Core TM i7 CPU 930 2 80GHz 2807 16GB 54 44 GB 54 44 GB SERVERI2 Intel R Core TM i7 CPU 930 2 80GHz 2807 16GB 54 44 GB 5444 GB Number per page 1000 Page 1 gt from 1 Connected localhost Administrator Status as per 8 29 2013 4 30 23 PM Entries 12 Selected 0 After a right click on the column headers click Select columns to choose additional categories to display in the list view 53 G Data Software Client CPU CPU speed MHz Internal memory Free system storage space System storage space statistics Free storage space Total storage space statistics System vendor System name System version System family CPU ID Mainboard vendor Mainboard Mainboard version Bios vendor Bios release date Bios version The hardware overview can be managed with the following toolbar buttons Refresh Refresh the hardware overview Print Print the hardware list In the selection screen that appears you can specify which details you would like to print a Print preview Preview the page s to be printed 4 4 2 4 Messages As anetwork administrat
55. G DATA SECURITY SOFTWARE BD mM E G G DATA TRUST IN GERMAN SICHERHEIT G Data Software Table of contents TSM COR U CUI OM a vacsscccudacsaucavsstshsed R ocsbecatacel cose A Ae 3 2 MenS tall eath OM ees nnna ga Shek ech Gude a Uns end te a thant iaa a a a eaa 6 3 G Data ManageMmentServel scscssscsessscecsscscsssssccscesscesescecesesssescecesescseseesessseeeeassseeeeseeseeeeeee 24 AG Data AAMINIStrAatOM 2s c cessescesccisasstsosscadenscaleoventeecselcnseddcnesastecdononsedessvsduastecknad deessbstesnesesnedeoes 25 5 G Data WebAdministrator es seesesessesecesessesecesecsesececcsesecececsesecesscsesesecucseseeeseeseseaeeeneneeeeeen 103 6 G Data MobileAdMinistrator esseecessssecececessesececscseeecescsesesesecseseeecscsesececscseseeeeseseseeeeneneees 105 7G Data Sec rity Client nesini areni e KE EEE E ara 110 8 G Data MailSecurity MailGateway ssesssesssessssssssssesssessseesstssseessroseessersstesseessrosssessroseesseess 122 9 G Data MailSecurity Administrator ssesssesssesssessssssesssesssesssessseessroseessessseesseessrosssessroseessesss 123 10 G Data Internet Security for Android ss ssssssssssssssssssesssessstesseessrossessessseesseessrosssessreseessess 154 Ts Troubleshooting FAQ sccccvecsssglasestavessssestscs ceevenencetagasutasadesucocseussdsenssrs consgaaansasens ATARAR 164 12 Legal MOtices nnie e S OEKE N KEI O 172 Introduction 1 Int
56. G Data Administrator Click on the New button then enter the User name the Permissions for this user Read only Read Write Read Write Restore backups define the Account type Integrated authentication Windows user Windows user group and enter a Password for this user UD Create user account x User name Spectator Account type Integrated authentication Permissions Read Password eecccccccoccs Confirm password eeecececccces OK Cancel 4 2 1 4 Manage server s Using the Manage Server s function you can assign clients or groups to individual subnet servers which then bundle the communication of these clients with the main server to optimize network utilization The allocation of clients or groups to subnet servers functions separately from the grouping of clients in the client management area That means that clients that have been assigned to different subnet servers can still be grouped together e Delete Remove one or more subnet server s from the list This does not remove the actual software from the subnet server e Assign clients Assign existing clients or groups to subnet servers Add subnet server Add a new subnet server In the following dialog window enter the Computer name of the prospective subnet server Next enter a user account with administrator permissions on the subnet server Confirm with OK to initiate the remote installation which can be tracked using the Installation overview
57. G Data Security Made in Germany eE 10 1 4 Web protection The Web protection module prevents phishing attacks It blocks phishing websites from being opened in the Android browser and in Chrome Since some data traffic is required to check the list of phishing websites the Web protection module can be configured to only look up websites when there is Wi Fi connectivity see Settings gt Web protection Internet Security Company 4 Web protection a9 Security center prot the Android and Chrome browser Please note that protection against Virus scan I Enable web protection Lost stolen Hig Protected apps SB ncoming fitter X utooing filter Se Hide contacts K Settings Web protection and its connectivity setting can be managed centrally using G Data Administrator under Mobile settings gt General 10 2 Apps The Apps modules let you monitor permissions for installed apps and block apps from being run G Data Software 10 2 1 Permissions The Permissions module provides an at a glance overview of permission usage across all installed apps To quickly check which apps have requested permissions for a specific action tap the action such as Calls SMS or Address book In the overview you can directly uninstall apps if you decide they form an unnecessary risk or add them to Protected apps Internet Security Company 4 Permissions TO Security center Virus scan Lost stolen Web
58. IES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Json NET Json NET is distributed under The MIT License MIT Copyright 2007 James Newton King Permission is hereby granted free of charge to any person obtaining a copy of this software and associated documentation files the Software to deal in the Software without restriction including without limitation the rights to use copy modify merge publish distribute sublicense and or sell copies of the Software and to permit persons to whom the Software is furnished to do so subject to the following conditions The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE A
59. ITHOUT WARRANTIES OR CONDITIONS OF ANY KIND either express or implied including without limitation any warranties or conditions of TITLE NON INFRINGEMENT MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License 8 Limitation of Liability In no event and under no legal theory whether in tort including negligence contract or otherwise unless required by applicable law such as deliberate and grossly negligent acts or agreed to in writing shall any Contributor be liable to You for damages including any direct indirect special incidental or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work including but not limited to damages for loss of goodwill work stoppage computer failure or malfunction or any and all other commercial damages or losses even if such Contributor has been advised of the possibility of such damages 9 Accepting Warranty or Additional Liability While redistributing the Work or Derivative Works thereof You may choose to offer and charge a fee for acceptance of support warranty indemnity or other liability obligations and or rights consistent with this License However in accepting such obligations You may act only on Your own behalf and on Your sole responsibil
60. MailSecurity Exchange plugin have not been fulfilled For an installation Microsoft Exchange 2007 with Service Pack 1 is required It must be installed before G Data MailSecurity See also Installation and System requirements 165 G Data Software 11 3 Using Linux 11 3 1 Linux file server clients No connection with the G Data ManagementServer has been made signatures are not being updated If Linux file server clients are not connecting to G Data ManagementServer or if their signatures are not being updated perform the following troubleshooting steps 1 Check whether both G Data Linux Client processes are running Enter the following in a terminal window linux ps ax grep av You should receive the following response Ssl 0 07 usr sbin avkserver daemon Ssl 0 05 usr sbin avclient daemon You can start the processes regardless of the distribution used with linux etc init d avkserver start linux etc init d avclient start and stop them with linux etc init d a vkserver stop linux etc init d a vclient stop To do this you must be logged in as administrator root on the Linux computer 2 View the log files In var log you will find the log file gdata_install log The remote installation process is logged in this file In the var log gdata directory the log file avkclient log can be found In this log file the scan results of the scanner avkserver and the output of the process avclient are l
61. Move the selected files into the quarantine folder The files will be encrypted and saved in the quarantine folder on the G Data ManagementServer and the original files will be deleted The encryption ensures that the virus cannot cause any damage For each quarantined file there is a corresponding report If you delete the report the quarantined file is also deleted You can send a file from the quarantine folder to the Security Labs service for examination Open the context menu of a quarantine report with a right click In the report dialog click the OK button after entering the submission reason e Delete file only for virus reports Deletes the original file on the client e Quarantine clean and move back only for virus reports An attempt is made to remove the virus from the file If this succeeds the cleaned file is moved back to its original location on the client If the virus cannot be removed the file will not be moved back e Quarantine move back only for virus reports Moves the file from the quarantine folder back to the client Warning The file will be restored to its original state and will still be infected e Quarantine send to G Data Security Labs only for virus reports If you discover a new virus or an unknown phenomenon always send us the file via the Quarantine function We will of course treat the data you have sent us with the utmost confidentiality and discretion e Quarantine delete file and repor
62. Sender address for system messages is the email address that is for example used to inform the sender and recipient of virus infected email or to inform them that their emails are in the queue G Data MailSecurity system warnings are independent of the general notifications for virus discoveries A system warning usually provides more general global information which is not related to an individual email For example G Data MailSecurity would issue a system warning if virus scanning was no longer guaranteed for any reason Settings You can save the program option settings as an XML file using the Import and Export buttons to make a backup and import them if necessary Change password You can change the administrator password that you assigned when you started G Data MailSecurity for the first time Enter the current password under Old password and then the new password under New password and Confirm new password When you click the OK button the password is changed 9 2 1 8 Logging On the Logging tab you can set options for a statistical assessment of the server s mail traffic Save in the database To view the statistics use the Statistics button in the Status panel of the main interface Alternatively select Save in the log file to save the logs in an external file maillog txt located in MailSecurity s installation folder By selecting Only junk mail or Limit number of emails you can limit the size of the log file 133 G
63. The settings have not yet been received by all selected clients Connected localhost Administrator Status as per 8 29 2013 4 30 23 PM pe A new rule can be defined using the New button Rules are categorised as one of three types Vendor Manufacturer information contained in program files can be used to allow or block use of these applications You can either enter the vendor s name here yourself or select a specific file via the button using which the manufacturer information can be read and imported File Block or allow specific program files for the particular client You can either enter the file name to generally forbid or allow access to files with this name or click the button Determine file attributes to define a file based on its properties If necessary you can use an asterisk as a placeholder at the start and or end of the File name Product name and Copyright properties Directory You can enable or block complete directories for clients if necessary including their subdirectories 85 G Data Software 4 4 7 2 Device control Device control can be used to restrict access to external storage media Users can be prevented from using USB sticks or other external storage media utilizing the USB port as well as CD DVD drives and even webcams UD G Data Administrator Admin Organization Options License management gt AAAA Dashboard Clients Client settings M
64. To undertake a classification behavior monitoring uses various criteria such as write access to the registry and the possible creation of auto start entries If sufficient criteria lead to the conclusion that a program is exhibiting suspicious behavior the action set under If a threat is detected will be carried out The options Log only Halt program and Halt program and move to quarantine are available here Whenever behavior monitoring carries out an action a report is added to the Reports module If a program has falsely been identified as a threat the corresponding report can be used to create a whitelist entry Whitelist entries can be viewed and removed by clicking Edit global whitelist 4 4 3 3 Email Virus protection for email can be set up on every G Data Security Client The default ports for the POP3 IMAP and SMTP protocols will be monitored Additionally a special plugin for Microsoft Outlook automatically checks all incoming email for viruses and prevents infected email from being sent WD G Data Administrator Eas Admin Organization Options License management EE AEA L Dashboard Clients EPITETI Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics oe oen vorio Oera Ges Pans 4 J All ManagementServers SE ia s Oat jia 4 localhost tis Settings Ee By demoGdata Email protection 7 Enabled recommended dh MobileDevices Incoming email bd Neate R
65. UTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE DotNetZip DotNetZip is distributed under the Microsoft Public License Ms PL This license governs use of the accompanying software If you use the software you accept this license 172 Legal notices If you do not accept the license do not use the software 1 Definitions The terms reproduce reproduction derivative works and distribution have the same meaning here as under U S copyright law A contribution is the original software or any additions or changes to the software A contributor is any person that distributes its contribution under this license Licensed patents are a contributor s patent claims that read directly on its contribution 2 Grant of Rights A Copyright Grant Subject to the terms of this license including the license conditions and limitations in section 3 each contributor grants you a non exclusive worldwide royalty free copyright license to reproduce its contribution prepare derivative works of its contribution and distribute its contribution or any derivative works that you create B Patent Grant Subject to the terms of this license including the license conditions and limitations in section 3 each contributor grants you a non exclusive worldwi
66. VER13 Error An error occurred connecting to the AD server Please try again later 9 16 2013 9 17 17 AM AWSERVER13 Error An error occurred connecting to the AD server Please try again later 9 16 2013 9 17 15 AM AWSERVER13 Error An error occurred connecting to the AD server Please try again later 9 13 2013 3 25 52 PM AWSERVER13 Update Internet update for the virus database executed successfully Version AVA_22 125 9 13 2013 1 33 16 PM AWSERVER13 Update Internet update for the virus database executed successfully Version AVA_22 125 Entries 8 Selected 0 Number per page 1000 Page 1 lt gt from 1 Refresh Print Export Close The log display can be filtered according to the following criteria e Log view Specify whether you would like to see a log of client or server actions e Client group Specify whether you would like to view a log for all clients a group or an individual client 28 G Data Administrator e Activity Define whether you would like to view all logged information or only notifications on specific topics e Time Specify the from to time range for which log information should be displayed Logs are displayed in chronological order and can be sorted according to specific criteria by clicking on the respective column header Log entries can be exported as an XML file printed or deleted 4 2 1 3 Manage users As system administrator you can authorize additional users to have access to
67. a Security Client quarantine e Windows XP Server 2003 Server 2003 R2 C Documents and Settings All Users Application Data G Data AntiVirusKit Client Quarantine e Windows Vista Windows 7 Windows 8 Server 2008 Server 2008 R2 Server 2012 C ProgramData G Data AntiVirusKit Client Quarantine G Data ManagementServer quarantine e Windows XP Server 2003 Server 2003 R2 C Documents and Settings All Users Application Data G DATA AntiVirus ManagementServer Quarantine e Windows Vista Windows 7 Windows 8 Server 2008 Server 2008 R2 Server 2012 C ProgramData G DATA AntiVirus ManagementServer Quarantine MMS databases Windows XP Windows Vista Windows 7 Windows 8 Server 2003 Server 2003 R2 Server 2008 Server 2008 R2 Server 2012 e C Program Files Microsoft SQL Server MSSQL 1 MSSQL Data GDATA_AntiVirus_ManagementServer mdf e C Program Files Microsoft SQL Server MSSQL 1 MSSQL Data GDATA_AntiVirus_ManagementServer_log df 11 4 5 How do enable an SSL Server Certificate in IIS 7 or 7 5 To facilitate secure communication between clients and WebAdministrator MobileAdministrator it is recommended to enable an SSL Server Certificate in Internet Information Services IIS To enable an SSL Server Certificate in IIS 7 and 7 5 Windows Vista Windows 7 and Windows Server 2008 R2 open Internet Information Services IIS Manager Using Windows Server 2008 IIS Manager can be found under Start gt All Programs gt Administrative Tools
68. able messages 132 update 31 32 33 114 134 135 136 137 update distribution 39 user account 136 user accounts 29 V virus check 110 128 129 virus database 31 virus scan 154 virus signatures 134 135 137 viruses 4 10 33 97 153 W w eb content control 87 web protection 157 w ebadministrator 15 103 104 w hitelist 31 34 114 85 146
69. alk through the most important settings of G Data Administrator and G Data ManagementServer and optimize them for the enterprise network This includes administrative tasks such as the Server setup wizard and User account management and server settings such as Alarms Update configuration and Email settings 26 G Data Administrator 4 2 1 Administrative tasks The administrative tasks can be accessed through the Admin menu in G Data Administrator s menu bar Most of the tasks should be carried out at least once before any further configuration and deployment is carried out 4 2 1 1 Server setup wizard The Server setup wizard enables you to select and enable clients in the network on which the G Data software should be installed It is automatically run the first time you start G Data Administrator but can also be started afterward through the Admin menu UD Server setup wizard x Enable all computers on which the G Data Client should be installed 0815CK SERKISTE SERSECBOOT eA ADEM PRODUKTIV ADEM PRODUKTIVX ADMIN ADMIN_ID ADMIN371 ADMIN PC1 ADMIN PC102 ADMIN THINK ADTEST AGVMWIN7 ALARM SERVER E Atex pc ALICE PCXX Enter computer name if it is not listed Computer Help lt Back Next gt Finish Cancel All clients that are to be managed by the G Data software must first be enabled To do this highlight the c
70. and change the parameter S 1 accordingly Accessing WebAdministrator and MobileAdministrator through a secure connection is now possible by replacing the http prefix in your browser with https for example https servername gdadmin Because of the self signed certificate your browser may issue a warning before allowing you to open WebAdministrator or MobileAdministrator The communication however will still be fully encrypted 171 G Data Software 12 Legal notices SharpSerializer SharpSerializer is distributed under the New BSD License BSD Copyright 2011 Pawel Idzikowski All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met e Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer e Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution e Neither the name of Polenter Software Solutions nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANT
71. antine upon the next contact with G Data ManagementServer Infected files can be disinfected in the quarantine folder If this doesn t work the files can be deleted from there and if necessary moved back to their original location from the quarantine Warning Moving back a file does not remove the virus You should only select this option if a program cannot run without the infected file and you nevertheless need it for data recovery The Quarantine system tray menu option can be enabled or disabled in G Data Administrator under Client settings gt General gt Client functions 7 5 Updates Patches The Updates Patches window reveals a patch update overview for the client pc divided over two tabs Gl G Data Security Client Update Patch Management S Installed Available Name Status 2552343 Update for Windows 7 for x64 KB2552343 Adobe APSB 13 02 Reader XI 11 0 1 for Windows Update All Languages Adobe APSB13 07 Reader XI 11 0 2 for Windows Update All Languages See Note Adobe APSB13 15 Reader XI 11 0 3 for Windows Update All Languages See Note Rev 2 Cumulative Security Update for ActiveX Killbits for Windows 7 x64 KB2820197 MS06 061 MSXML 6 0 RTM Security Update 925673 MS11 015 Security Update for Windows 7 for x64 KB2479943 MS11 019 Security Update for Windows 7 for x64 KB2511455 MS11 024 Security Update for Windows 7 for x64 KB2491683 MS11 024 Security Update for Windows 7
72. ar offers update settings for virus signatures and program files Like regular clients the Exchange plugin detects malware using virus signatures Select the option Update virus signatures automatically to update them automatically The Exchange plugin will then check for updated virus signatures every time it synchronizes with the ManagementServer A manual update can be initiated by clicking Update virus signatures now The same options also apply to the plugin s program files 65 G Data Software YD G Data Administrator Eram Admin Options License management 3 2 A apt General Z On access scan Discard J Idle scan enabled a Z Only run idle scan within the following time frame Start time 11 00PM gt End time 4 00AM Z Run idle scan all day on weekends Sat Sun C Perform idle scan only on files that have been modified after a certain time Maximum object age day s Scan settings Use engines Both engines optimized performance recommended Tf an infected file is found Disinfect if not possible quarantine File types All files Z Use heuristics Z Check archives Status Server Engine A Engine 8 Status as per Version G Data Exchange Client Last access Program update 8 AWEXCHANGE13 AVA 22 13106 10 10 2013 GD 23 2193 10 10 2013 10 10 2013 2 02 50 PM 13 0 0 34_ 17 09 2013 11 5 2013 3 49 26 PM Connected AWEXCHANGE13 AWDOMAIN14 Status a
73. are displayed in the Reports module This includes virus results PolicyManager requests PatchManager reports and firewall reports with G Data ClientSecurity or EndpointProtection as well as system messages about installations reboots etc The report type is displayed in the Status column e g Virus found or Quarantine file moved to quarantine Reports can be sorted according to different criteria by simply clicking on the respective column name The column according to which current sorting is carried out is indicated by a small arrow symbol If you have configured scan jobs to only log viruses you can execute virus countermeasures manually by selecting one or more entries from the list and choosing a command from the context menu right mouse button the Reports menu or the toolbar Countermeasures available include removing and quarantining infected files Some reports allow you to directly plan a job For example if a client has requested a patch rollback you can right click on the Rollback request report and select Details Actions In the Distribute software rollback window you can then directly plan a rollback job without having to open the PatchManager module to select the patch and client UB G Data Administrator Erc Admin Organization Reports Options License management gt RIAK iL Dashboard Clients Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistic
74. as not run The battery power may be too low Scan during load process The background scan will only run when the device is loaded Scan frequency Defines how frequently the device will be scanned in days Type of virus scan Specifies whether a quick scan of the installed applications or a full system scan will be run 10 4 3 Update The Update section covers settings related to virus signature updates and the update server region Automatic update also in Mobile settings gt General Update frequency also in Mobile settings gt General e Only via WLAN also in Mobile settings gt General e Server region Select the update server not used when Remote Administration is enabled When Internet Security requests updates for the first time the nearest update server is automatically selected 162 G Data Internet Security for Android Q Internet Security UPDATE one ener 3 ay s are regularly run in the background Update frequency Specifies how often to look for updates in days Only via WLAN z Only run updates when WLAN connection is available Web protection Settings Server region Select the nearest update server lt 25 8 10 4 4 Web protection The Web protection section includes the possibility to limit web protection to WLAN networks e Only with WLAN also in Mobile settings gt General T WEB PROTECTION al E Only with WLAN Only scan websites if a WLAN connec
75. as of the date such litigation is filed 174 Legal notices 4 Redistribution You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium with or without modifications and in Source or Object form provided that You meet the following conditions You must give any other recipients of the Work or Derivative Works a copy of this License and You must cause any modified files to carry prominent notices stating that You changed the files and You must retain in the Source form of any Derivative Works that You distribute all copyright patent trademark and attribution notices from the Source form of the Work excluding those notices that do not pertain to any part of the Derivative Works and If the Work includes a NOTICE text file as part of its distribution then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file excluding those notices that do not pertain to any part of the Derivative Works in at least one of the following places within a NOTICE text file distributed as part of the Derivative Works within the Source form or documentation if provided along with the Derivative Works or within a display generated by the Derivative Works if and wherever such third party notices normally appear The contents of the NOTICE file are for informational purposes only and do not modify the License You may add Your own attribution
76. ated to ManagementsServer s functioning Some of the options are configured when you run the Server setup wizard such as Internet update others should be configured manually 30 G Data Administrator 4 2 2 1 Internet update The Internet update function ensures that current virus signatures and the latest program files are always available During the update procedure the current virus definitions are downloaded from the G Data UpdateServer and saved on the G Data ManagementServer The Internet update window lets you configure this process Subsequent distribution of the virus signatures to the clients is managed through the Clients module Virus database All clients have their own local copy of the virus database so that virus protection is also guaranteed when no connection to the G Data ManagementServer or the Internet is available Updating the virus signatures on clients takes place in two steps which can both be automated In the first step the latest files from the G Data update server are downloaded to the G Data ManagementServer In the second step the new files are distributed to the clients see Client settings gt General U9 Internet update x Virus database garec hi a ee sode eR Eaa E Status Version engine A AVA 22 12163 Version engine B AVL 22 1930 GD 23 1978 Last program update 8 29 2013 4 30 23 PM Status Update loaded successfully Update status Run update now Automatic
77. ator is identical to G Data Administrator Please refer to the appropriate chapter for an in depth overview 104 G Data MobileAdministrator 6 G Data MobileAdministrator G Data MobileAdministrator is the smartphone accessible control panel for G Data ManagementsServer It can be used to quickly edit and update settings through an interface that has been optimised for mobile devices The most important and frequently used options are presented in a responsive design that adapts to various mobile environments 6 1 Starting G Data MobileAdministrator After completing the installation G Data MobileAdministrator can be started from any browser Start your browser and navigate to the URL that has been provided at the end of the installation process The URL consists of the IP address or computer name of the machine on which IIS is running and WebAdministrator has been installed and the folder suffix such as http 10 0 2 150 GDMobileAdmin G Data Administrator kooi J Login Server 10 0 2 150 Authentication Windows authentication o User name domain username Password Language English Bookmark user data Login The MobileAdministrator login page supports the same login methods as G Data Administrator and WebAdministrator You will be prompted to enter Language Server Authentication User name and Password Choose Windows authentication to log in with your Windows domain credentials or Integrated au
78. ay menu option can be enabled or disabled in G Data Administrator under Client settings gt General gt Client functions 7 2 Disable monitor Using the Disable monitor command the user can switch off G Data Monitor for a specified time from 5 minutes up to until the next computer restart Switching off the monitor temporarily may be useful during extensive file copying procedures as this would considerably speed the process up However extra care should be taken as real time virus checking is switched off during this interval The Disable monitor system tray menu option can be enabled or disabled in G Data Administrator under Client settings gt General gt Client functions 1B G Data Security Client Monitor x How long should the monitor be disabled Time 5 minutes x ox J cme 111 G Data Software 7 3 Options Using the Options window the user can configure security for the Monitor Email Virus check local Web IM filtering and Spam filter components In this way all client protection mechanisms of the G Data software can be disabled This option should therefore only be accessible to technically experienced users The settings on these tabs are explained in detail in the chapter Client settings BJ G Data Security Client Options Lo mS Monitor Email_ Virus check Web IM fitering Spam fiter Monitor status V Enabled recommended Use engines Both engin
79. be activated for all clients that use Internet Explorer Firefox and or Chrome 4 4 3 5 Antispam If you check the option Use spam filter client email traffic will be checked for possible spam mails You can define a warning that will be added to the subject line when an email is identified as spam or falls under suspicion of being spam You or the user can define a rule in the client s email software to automatically move mail that has Spam in the subject line to a special folder for spam and junk mail YD G Data Administrator Admin Organization Options License management PatchManager Reports ReportManager Statistics 2 Demo Gdata sib MobileDevices suspected spam emails subject line SUSPECTED SPAM H h Notebooks Warning in spam emails subject line SPAM gt aly Servers Information Gh Workstations The settings have not yet been received by all selected clients E Awserver13 E vee200zc E vee201z E win2ksvat E wnan Bwn7 vars E winxevati afb Exchange Connected localhost Administrator Status as per 6 29 2013 4 30 23 PM 4 4 4 Exchange settings G Data MailSecurity is available as an optional module The Exchange settings module offers access to settings for the Exchange plugin of MailSecurity The module becomes available as soon as the plugin is installed on Exchange Server 2007 SP1 2010 or 2013 and registers itself with the ManagementServer The toolb
80. bers dll PushSharp PhoneNumbers dll and PushSharp are distributed under the Apache License 2 0 www apache org licenses 1 Definitions License shall mean the terms and conditions for use reproduction and distribution as defined by Sections 1 through 9 of this document 173 G Data Software Licensor shall mean the copyright owner or entity authorized by the copyright owner that is granting the License Legal Entity shall mean the union of the acting entity and all other entities that control are controlled by or are under common control with that entity For the purposes of this definition control means i the power direct or indirect to cause the direction or management of such entity whether by contract or otherwise or ii ownership of fifty percent 50 or more of the outstanding shares or iii beneficial ownership of such entity You or Your shall mean an individual or Legal Entity exercising permissions granted by this License Source form shall mean the preferred form for making modifications including but not limited to software source code documentation source and configuration files Object form shall mean any form resulting from mechanical transformation or translation of a Source form including but not limited to compiled object code generated documentation and conversions to other media types Work shall mean the work of authorship whether in Source or Object form made availa
81. bile Device Management capabilities you can install a specially tailored business version of G Data Internet Security to your Android devices G Data Administrator offers installation capabilities for mobile clients in its client management area Click the icon Send installation link to mobile clients to send an e mail containing a download link for the Internet Security app You can enter multiple e mail addresses separated by line breaks or commas If you have not entered a password yet in the Server settings enter it under Mobile gt Authentication for mobile clients G Data mobile business client To conform with your company s security guidelines carry out the following steps on your mobile device Open the following link directly by clicking on it or by entering it in the browser on your mobile device Link http AWSERVER13 7184 gdata mms client file GD MobSec BUS apk Alternative link http 10 202 3 42 7184 gdata mms client file GD MobSec BUS apk For security reasons please enter the password below into the G Data MobileSecurity app Password If you have any questions please contact your system or network administrator Virus checked by G Data AntiVirus Open the e mail message on the mobile device and tap the download link to download the installer APK file Note that the option Unknown sources Allow installation of non Market apps needs to be enabled in order to install APK files This option is usually found in Android s
82. ble under the License as indicated by a copyright notice that is included in or attached to the work an example is provided in the Appendix below Derivative Works shall mean any work whether in Source or Object form that is based on or derived from the Work and for which the editorial revisions annotations elaborations or other modifications represent as a whole an original work of authorship For the purposes of this License Derivative Works shall not include works that remain separable from or merely link or bind by name to the interfaces of the Work and Derivative Works thereof Contribution shall mean any work of authorship including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner For the purposes of this definition submitted means any form of electronic verbal or written communication sent to the Licensor or its representatives including but not limited to communication on electronic mailing lists source code control systems and issue tracking systems that are managed by or on behalf of the Licensor for the purpose of discussing and improving the Work but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as Not a Co
83. book y Call fiter 4 A A ManagementServers 4 locathost Status E Enabled Tappy P DemoGdata Mode Blacklist Discard gt dy MobileDevices Password 3492 o h Notebooks Recovery email address administrator domain com gt db Servers gt gb Workstations Available apps E AWSERVER13 Drag a column header to this area to group by that column AWANDROID13 hare T Version F Size T Installed T M peie Qe Store 169 1728 E ves201zc Browser 4 03 eng dan20120130 124851 SB winzkevaT f Wo ansoinaoanoan B ww7 vars SE Calendar 403 eng dan 20120130 124851 wnvrvaT 4 Exchange Blacklist all apps on this list have been password protected blocked All others have been released locathost Drag a column header to this area to group by that column Enabled Name T Password protection T Version T Sze 7 oa G roo sore E 169 172 kB ae B Settings a 4 0 3 eng dan 20120130 124851 on oe o 40 3 eng dan 20120130 124851 Connected localhost Administrator Status as per 9 13 2013 3 25 54 PM Under Available apps all apps that have been installed on the currently selected device s are listed For each app you can see its Name Version and Size Using the arrow controls apps can be moved to the white blacklist For apps on the white blacklist you can enabled or disable Password protection 72 G Data Administrator 4 4 5 5 Phone book The Phone book panel allows for advanced contacts management Contacts can be ad
84. can for example generally forbid the use of floppy disks for selected user groups regardless of whether any particular computer has a floppy drive or not The following permissions can be defined Read write Full access to the device is allowed o gt Read Media can only be read saving data is not permitted a 3 Deny access Both read and write access to the device are not permitted The device cannot be accessed by the user By using the Whitelist settings you can allow access for a client with certain limitations to devices to which you had previously limited access in some way or another Read Deny access When you click the New button a dialog window opens in which devices with usage limitations are displayed If you then click on you can permit exceptions for specific devices e Use medium ID Specify that only certain CDs or DVDs can be used with a CD DVD drive such as company presentations on CD e Use hardware ID Specify that only certain USB sticks may be used With 86 G Data Administrator whitelisting based on hardware ID for individual storage devices the network administrator has the option to control which employees have the option to transmit data To determine a medium ID or hardware ID select the client from the Select source list The corresponding ID is then read automatically Using the local search you can read the ID of the medium or the hardware with the aid of the computer on whi
85. ch G Data Administrator is installed For this the medium must be connected with or inserted in the corresponding PC 4 4 7 3 Web content control Web content control is used to provide users with Internet access within the scope of their duties while preventing visiting non desirable websites or websites in particular subject areas You can select or block certain areas by checking or unchecking a checkbox for the client in question The categories cover a large number of subject areas and are constantly updated by G Data Network administrator costs associated with maintaining white and blacklists thus no longer apply Under Status you can specify whether the limitations should apply to all users of the client in question including administrators or only to users who do not have administrator rights on the client computer Using the Global whitelist it is possible to ensure that certain websites are allowed company wide across the entire network regardless of any settings that have been made under Allowed categories For example this may be the website of your own company To do this simply enter the address which you would like to enable under URLs then click on the Add button and the corresponding site is enabled UD G Data Administrator Llas Admin Organization Options License management AKI iL Dashboard Clients Client settings Mobile settings Tasks ESSENSE Firewall PatchManager Reports ReportManager Statis
86. ch configuration panel lists all available patches and lets you configure them A set of charts shows statistics about patches products and vendors By default the list of patches is grouped by Vendor Product and Priority allowing you to quickly find patches by product The default display filter settings exclude full software installers from the list as well as any blacklisted entries Click Reset all filters to reset the display filter WP G Date Administrator Sr Admin Organization Options License management Dashboard Clients Client settings Mobile cos me lonager Firewoll AEEA Reports ReporiManager Statistics Patches by priority at ESA D op 10 products i BP Patches by release date z E Microsoft Cor oft Corp B Windows M Cica Z E Normal lt 5 A 7 S BEBE EEE ul Apple M adote Ad ED awseavers3 miigh VMware Office 2002 Peer E Google Inc B Adobe Reader s vesz00zc E ves201zc S winzkevar E wnan Byanz vats 7 Vendor Microsoft Corp 1805 E onnxevars 7 Vendor Adobe Systems Inc 423 dp Exchange Vendor Apple 19 Product Apple Quicktime 7 Priory Hion T Appie QuickTime E Apple Quicktime 7 69 Player for Windows Update AII Language Gee Note Fin Patch Apple QuickTime Payer for Windows Update AllLangueges See Notes high Patch Apple QuickTime 1 Player for Windows Update Al Langua Apple QuietTime 2 Player for Windows
87. cide what should happen to file conflicts under Overwrite existing files Upon confirming the recovery settings a restore job will be added to the Tasks module It will be carried out immediately 4 4 6 4 Patch applicability jobs The Patch applicability function is available as part of the optional Patch Management module Patch applicability jobs can be planned to check if one or more patches are applicable to clients or groups The applicability job can be Scheduled or run As soon as available each time a new patch is released When planning a scheduled job it can be run Immediately Once or according to a specific schedule 82 G Data Administrator YD Patch applicability job lela Group Workstations Job name New patch applicability job Execution Scheduled O As soon as available Schedule Weekdays immediately weekly Z Monday once monthly hourly On Internet connection 5 daily Z Wednesday Z Tuesday Z Thursday Friday Saturday Z Sunday Time 745 PM Scope Specific patch Using attributes Attributes C urgency C Language Z Patches only ox ances You can select one or more patches by defining the Scope Select Specific patch to choose one or more patches from the list Alternatively use Attributes to scan for a range of patches using keywords To add a specific attribute Vendor Product name Urgency Language as a filter criterium tic
88. client EJ 4 h All ManagementServers Bover Cotar te Di nesase 4 localhost e Q E EA Bis By DemoGdata Drag a column header to this area to group by that column he MobileDevices Client T Engine A 7 Engine B Y Lastaccess T G Data Security Client version Y Statusasper hy Notebooks E workstariono1 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 1 5620PM 13 007 25 08 2013 8 28 2013 1 56 2 gly Servers I workstarionoz AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 1 56 21 PM 1300 7 25 08 2013 8 28 2013 1562 r BD workstariono3 AVA 22 11261 26 07 2013 AVL 22 1859 25 07 2013 8 26 2013 1 48 14 PM 12 0 0 239 11042013 8 28 2013 1 48 14 EP Awservers3 IE workstaTionos AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 26 2013 1 56 21 PM 13 0 7 25 08 2013 8 28 2013 1 56 2 E vesz00zc E workstaTionos AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 1 56 21 PM 1300 7 25 08 2013 8 28 2013 1562 E oee201z E workstationos AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 26 2013 1 56 21 PM 13 007 25 08 2013 8 28 2013 1 562 E win2xavat E workstationo7 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 26 2013 1 56 22 PM 13 007 25 08 2013 8 28 2013 1 562 gwna I workstanonos AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 1 54 01 PM 1300 7 25 08 2013 8 28 2013 1 540 Bww7 va BD workstarionos AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 28 2013 1 56 22 PM 1300 7 25 08 2013 8 28
89. computer YD Internet update Ve Seiki Access data and settings Access data Enter the access data you received from G Data Region Europe User name Username Password eecccee Settings Z Version check recommended Proxy settings Coo i caveat 4 2 2 2 Alarms If a new virus is found G Data ManagementServer can automatically send alarm notifications via email Enable email notification by selecting the appropriate reports Virus results PolicyManager requests etc Select the intended recipient under Recipient group s You can use the Limit to prevent an excessive amount of email 33 G Data Software traffic in the event of a massive virus attack With recipient selected click Trigger test alarm to send a test alarm Wy Alarms E Recipient s Recipient group s Technical v E Limit Not more than 1 gt mail s in 30 gt minutes Reports Z Virus results Status data older than 2 day s X Clients are reporting problems with their virus database or program files Z Applications blocked by firewall Z PolicyManager requests Trigger test alarm Cancel Click the cogs icon 3 to open the Email settings window and define recipient groups 4 2 2 3 Update rollback In rare cases a virus signature update can lead to a false alarm or similar problems It can make sense to block the lates
90. ctions can be blocked or enforced e Allow camera access allow access to the device s camera Android 4 0 and higher e Encryption required require full device encryption to be enabled Android 3 0 and higher 69 G Data Software e Allow rooted devices allow devices that have been rooted If disabled rooted devices are blocked using the remote maintenance password defined under Anti theft If disabled rooted devices cannot access the WLAN defined under Allow WLAN access if requirements are met Allow WLAN access if requirements are met For devices that have been rooted access to a specific WLAN network can be blocked This allows you to permit access to the corporate WLAN network only for devices that can be securely managed Enter the SSID for the corporate network for which access should be enabled Select the Encryption and enter the Password if the network is encrypted 4 4 5 3 Anti theft The Anti theft tab offers a range of functions that help protect devices and their data if they go missing Devices that are stolen or lost can be remotely locked wiped located or muted by sending an SMS from a trusted phone number Using Google Cloud Messaging these anti theft functions can also be triggered manually at any time WD G Data Administrator Eas Admin Organization Options License management 1 gt 33 4 KIS 1 Pee Me mee eg Mobile settings po emo sae es nem Search for client 2 7 5 General PRS P
91. d Aware Service Allow Outbound Pre defined rule amp Ad Aware Update Allow Outbound Pre defined rule tam Allow Outbound Pre defined rule Alcohol 120 Allow Outbound Pre defined rule t aol Allow Outbound Pre defined rule Wopple Bonjour Service Allow In outbound Pre defined rule Chrome For all users Allow Outbound Pre defined rule Chrome User based Allow Outbound Pre defined rule t Clone DVD Allow Outbound Pre defined rule Digital Locker Allow Outbound Pre defined rule DilHost Surrogate Allow Outbound Pre defined rule Eudora Allow Outbound Pre defined rule _ OK Cancel 91 G Data Software After entering the rule set basics the Rule set for trusted network window lets you pick one or more default rules to add to the rule set After confirming the selection with OK the rule set will be shown in the overview Using the Edit button the rule set s name note and stealth mode setting can be edited Click Delete to remove the current rule set Rule sets can be imported and exported as an XML file Depending on which rule set you have specified for the relevant network one rule set e g for untrustworthy networks may block an application while another e g for trustworthy networks could grant it full network access This means you can use a strategic combination of rules to restrict a browser in such a way that for example it can access websites available within your home network but cannot access content fro
92. d to the Internet browser Limit file size for downloads You can disable the HTTP check for web content that is too large The contents will still be monitored by the virus monitor to check if suspected malicious routines become active The advantage of enabling the size limit is that there are no delays caused by virus checks when downloading large files Global whitelist for web protection Exclude certain web sites from the internet traffic check Instant Messaging The section Instant Messaging covers scan settings for instant messaging traffic Process IM traffic G Data software can prevent infected viruses and other malware from spreading via Instant Messaging If the Instant Messaging applications are not using their standard ports enter the corresponding ports under Port s Instant Messaging integration into IM application if available If you use Microsoft Messenger version 4 7 or later or Trillian version 3 0 or later you can make an extra context menu available in the IM application in which you can directly check suspicious files for viruses BankGuard Banking trojans are becoming an ever greater threat The BankGuard technology secures online banking by checking the validity of network libraries to make sure the browser is not being manipulated by a banking trojan This proactive protection works 64 G Data Administrator in more than 99 of the cases and even protects from unknown trojans BankGuard should
93. dd and enable clients depending on network size and configuration For smaller networks adding clients through the Server setup wizard will suffice For larger networks the process can be streamlined and partly automated by using the Find computer s dialog window or the built in Active Directory support All enabled clients servers and groups in the network are listed in the client management area As in Windows Explorer groups that have subdivisions appear with a small plus symbol If you click on them the directory structure expands and enables the view of the structure below it Clicking the minus symbol collapses the list Depending 40 G Data Administrator on the type of node you select different modules and options are available For example for PCs the tab Client settings will be enabled which allows you to manage their options For mobile clients on the other hand you get access to the Mobile settings tab gt gt gt Search for clie O gt 2 4 KNN nt a Al ManagementServers a localhost f Demo Gdata ab MobileDevices ab Notebooks ay Servers 4 Workstations Ef AWSERVER13 EA DEB200zc la DEB201Z Using the client management area you can export and import settings Right click ona client and choose Export settings to export settings from the Client settings and PolicyManager modules to a dbdat file To import settings select a client or group choose Import settings a
94. de royalty free license under its licensed patents to make have made use sell offer for sale import and or otherwise dispose of its contribution in the software or derivative works of the contribution in the software 3 Conditions and Limitations A No Trademark License This license does not grant you rights to use any contributors name logo or trademarks B If you bring a patent claim against any contributor over patents that you claim are infringed by the software your patent license from such contributor to the software ends automatically C If you distribute any portion of the software you must retain all copyright patent trademark and attribution notices that are present in the software D If you distribute any portion of the software in source code form you may do so only under this license by including a complete copy of this license with your distribution If you distribute any portion of the software in compiled or object code form you may only do so under alicense that complies with this license E The software is licensed as is You bear the risk of using it The contributors give no express warranties guarantees or conditions You may have additional consumer rights under your local laws which this license cannot change To the extent permitted under your local laws the contributors exclude the implied warranties of merchantability fitness for a particular purpose and non infringement PhoneNum
95. ded to a phone book within the Internet Security app and they can be hidden from the device s built in phone book In combination with the Apps feature the Phone book can be configured as a centrally managed replacement for the Android phone book creating a managed contacts environment for scenarios where the communication possibilities of a mobile device should be limited to a pre approved subset of contacts The main list shows all contacts that have been added to Internet Security s phone book For each contact the First name Last name Phone number s and Address are listed Using the Visibility dropdown menu you can decide whether the contact should be Visible in the Android phone book Hidden from the Android phone book or if its calls and SMS messages should be hidden Communication hidden T Phone numberis Y Adcress T vistiiy T awcuennis ej awseavent2 E veszoozc E oaze F wnzcevat Ewan E wnrvars E wnevan bh bechange No data available Add contact Show contact database Connected localhost Administrator Status as per 8 30 2013 1 2838 PM To add a contact to the phone book click Add contact The Contact database window will show all contacts that have been defined Select one or more contacts and click Choose to add the contacts to the phone book To remove a contact from the phone book click Remove contact To add a contact to the contact database click the b
96. dividual functions v Process incoming email SMTP Virus scan for incoming email Enabled JD Status Process outgoing email Enabled F Virus scan for outgoing email Enabled nee es OutbreakShield Enabled Q Queues Automatic updates G Data Security Client Activity Date of virus signatures 30 08 2013 Spam filter Enabled ED Virus results Spam OutbreakShield Enabled G Data MailSecurity is integrated into the data stream of incoming email and can process email before it reaches the server 9 1 Starting G Data MailSecurity Administrator You can use Administrator to control the mail gateway by clicking on the entry G Data MailSecurity in the program group Start gt All Programs gt G Data MailSecurity When you start Administrator you will be asked for the server and password In the Server field enter the computer name or the IP address of the computer on which MailGateway has been installed At the first login no password has been assigned yet Simply click the OK button without entering a password A password entry window now opens in which you can enter a new password Confirm the password by typing it again and click OK On the Advanced tab of the Options menu you can change the password at any time by clicking the Change password button 123 G Data Software 9 2 Configuring G Data MailSecurity Administrator The menu bar at the top of G Data MailSecurity Administra
97. double click this entry the corresponding settings window appears menu bar Update and you can configure the update frequency Date of virus signatures Your virus protection is only secure with the most recent updates You should update the virus signatures as often as possible and automate this process If you double click this entry the corresponding settings window appears menu bar Update and you can also perform an Internet update directly regardless of possible update schedules Spam filter The Spam filter offers extensive settings options which effectively block email with unwanted content or email from unwanted senders e g mass G Data MailSecurity Administrator email senders e Spam OutbreakShield The Spam OutbreakShield can detect and eliminate mass email quickly and safely Before email is retrieved from the Internet Soam OutbreakShield gets info on particular increased volumes of suspicious email and does not allow them to reach the recipient s inbox If you installed the option for Statistical assessment the Status panel will also show a Statistics button It will show statistical information about the mail server and can be configured through Options gt Logging 9 3 2 Filter In the Filter area you can use convenient filters to block incoming mail or automatically remove potentially dangerous content from email The respective filters are shown in the list under Filters and can be enabled or disabled as req
98. ds to the ampersand amp Shift 6 Content filter a Name Content filter Note Direction Incoming email X Regular expression Search scope Reaction E Header F Reject mail E Subject F Notify message sender fa 7 Mail text E Send alert to the following persons HTML text Embedded email Include original email 9 3 2 7 Sender filter You can use the sender filter to block email coming from certain senders To do this under Addresses Domains simply enter the email addresses or domain names which G Data MailSecurity should filter Use a semicolon to separate multiple entries You can also automatically filter out email with no sender Sender filter Name Sender filter Note Direction Incoming email X Addresses Domains separate multiple entries with a semi colon spamdomain com 4 Filter out email with no sender Reaction 7 Reject mail 7 Notify message sender 3 F Send alert to the following persons Include original email OK Cancel Help 144 G Data MailSecurity Administrator 9 3 2 8 Recipient filter You can use the recipient filter to filter emails for certain recipients To do this under Addresses Domains simply enter the email addresses or domain names which G Data MailSecurity should filter Use a semicolon to separate multiple entries You can also automatically filter out emails with a blank recipient
99. dule Patch applicability job List software and patches that have been installed on clients For more information about software recognition jobs see the chapter Patch applicability jobs The Patch applicability function is only available as part of the optional PatchManagement module Software distribution job Schedule software and patch distribution For more information about software distribution jobs see the chapter Software distribution jobs The Software distribution function is only available as part of the optional PatchManagement module Run now Re run single scan jobs which have already been run or canceled For periodic scan jobs this function runs the job immediately regardless of schedule Logs View the logs relating to a particular client s jobs All jobs Only scan jobs Only backup jobs optional Backup module Only recovery jobs optional Backup module Only patch applicability jobs optional PatchManagement module Only software distribution jobs optional PatchManagement module Only rollback jobs optional PatchManagement module Only single scan jobs G Data Administrator Only periodic scan jobs Only pending scan jobs Only completed scan jobs DA e amp Display group jobs in detail Displays all associated entries with group jobs The option is only available if a group is selected in the computer list When the Tasks module is selected an additional menu entry named Tasks becomes available in
100. e F Lastname Y Phone number s Y Address Y E AWSERVER13 E veB200zc No data a I E oee201z No data available SB winzkevat E wnan Add contact Show contact database SB win7 vars Outgoing calls E wanxevars 7 Allow phone book contacts all other numbers will be blocked if they are not on the whitelist gt dh Exchange Filter mode Whitelist Entries for explicit filter Drag a column header to this area to group by that column Enabled Firstname Y Lastname Y Phone number s Y Address T No data available Add contact Show contact database Connected localhost Administrator Status as per 9 12 2013 3 17 50 PM Incoming calls SMS Under Incoming calls SMS you can define how Internet Security should treat incoming communication Uncheck Allow anonymous calls despite filter to block all anonymous incoming calls Enabling the additional filter Allow phone book contacts will only allow contacts with an entry in the Android or Internet Security phone books through the filter as well as any whitelisted contacts Under Filter mode you can define specific measures for incoming calls and SMS messages Select Blacklist to allow all communication except from the contacts that are on the list Select Whitelist to block all communication except from the contacts that are on the list By clicking Add contact you can add any contact from the contact database to the list Click Remove contact to remove a contact fr
101. e certificate if the product was obtained as MediaPack or in the order confirmation When in doubt contact your reseller or distributor Before contacting the ServiceCenter please check the configuration of your computer and network The following information is of importance e The version number of G Data Administrator and G Data ManagementServer which can be found in the menu of G Data Administrator e The serial number or the Internet Update user name e The exact Windows version number Client Server e Additional hardware and software components Client Server e Any errors that may have occurred error messages including error codes in their exact wording By providing these details contact with our Support staff will be easier quicker and more successful If possible please make sure that you can readily access a pc on which G Data Administrator is available G Data Software 2 Installation Start Windows and insert the G Data installation medium An installation window will open automatically If you obtained a digitally distributed version of the software extract all files and launch Setup exe To ease installation on other machines the extracted files can be burned to a DVD or copied to a USB stick Close all other programs before you start installing the G Data software to avoid problems with files that need to be accessed by the G Data setup wizard After you have clicked on the Install button a screen appears whe
102. e communication select the appropriate site in the Connections panel On the Actions panel at the right choose Bindings Click Add to add a new binding Select https as Type and select the certificate you just added in the SSL certificate dropdown Click OK to add the binding Add Site Binding 2 fee Type IP address Port https gt All Unassigned 43 SSL certificate G Data certificate z View SS Gas Accessing WebAdministrator and MobileAdministrator through a secure connection is now possible by replacing the http prefix in your browser with https for example https servernam e gdadmin Because of the self signed certificate your browser may issue a warning before allowing you to open WebAdministrator or MobileAdministrator The communication however will still be fully encrypted 11 4 6 How do I enable an SSL Server Certificate in IIS 5 or 6 To facilitate secure communication between clients and WebAdministrator MobileAdministrator it is recommended to enable an SSL Server Certificate in Internet Information Services IIS To enable an SSL Server Certificate in IIS 5 Windows XP or IIS 6 Windows Server 2003 you can use the Microsoft tool SelfSSL which is available in the IIS 6 0 Resource Kit Tools a free download from the Microsoft website By performing a Custom 170 Troubleshooting FAQ setup you can select the tools that you want to install Select SelfSSL 1 0 Aft
103. e this option in the BIOS the motherboard firmware that is launched before your operating system To make these changes proceed as follows 1 Shut down your computer and power off 2 Start your computer Usually you reach the BIOS setup by pressing the DEL key while the computer is booting up sometimes the F2 or F10 key will work as well The computer manufacturer s documentation will provide more information on this 3 You can check your motherboard manufacturer s documentation for information on how to change settings in your BIOS setup The result should be the boot sequence USB CD DVD ROM C meaning that the USB port becomes the first boot device the CD DVD ROM drive becomes the second and the hard disk partition with your Windows operating system on it becomes the third 4 Save the changes and restart your computer Your computer is now ready for a boot scan Installation 2 2 Installing G Data ManagementServer Insert the G Data installation medium and press the Install button then select G Data ManagementServer Ensure that you have closed all open applications as they may cause conflicts during installation Now read the license agreement for the use of this software Select accept the terms in the license agreement and then click Next if you accept the agreement in this form After choosing an installation folder the server type can be chosen You have the following options e Install a main server During an
104. eaction to infected files Disinfect if not possible log only bg Servers Z Check received email for viruses z z Z Check unread email at program startup Microsoft Outlook only as Z Attach report to received infected emails E AWSERVER13 Outgoing email E ee200zc Z Check email before sending E oee201z C Attach report to outgoing emails SB win2kevat wnat Scan options WIN7 VAT3 Manr Use engines Both engines optimized performance recommended E wnevat OutbreakShield gt ob Exchange Enabled _ Do not use a HTTP proxy server z Seting A tomati Sguatuve dowmiond Warnings Notify user when a virus has been found Outlook protection Protect Microsoft Outlook with an integrated plugin Port monitoring POP3 disabled Port 110 Edit IMAP disabled Port 143 SMTP disabled Port 25 Information The settings have been applied to all selected clients Connected AW2008R2BASE AW2008R2BASE Admi Status as per 5 21 2014 5 06 33 PM Incoming email The Incoming email section defines options for scanning incoming emails e Reaction to infected files Specify the action to be taken if an infected file is detected There are various options here that may or may not be suitable depending on what the respective client is used for 61 G Data Software Check received email for viruses By enabling this option all emails that the client receives will be checked for viruses Check unread e
105. ected module to the report In the Module selection screen click Edit or Delete to edit or delete modules If you ve finished selecting modules click Preview to see a sample report and OK to save the report definition YD Module selection Ste lt Module selection Category Client protection Antivirus reports Application control reports Device control reports Email protection Firewall reports Monitor Neutralized viruses computers Neutralized viruses security modules Computers with reports from the Antivirus module Settings Limit 10 Output format Table Period covered No limit OK Cancel 101 G Data Software When a reporting job has been run the resulting report will appear in the ReportManager overview and it will be sent to the defined recipients Expand the report definition to see the full report history Double click on an instance to open the associated report The Report history and Report preview functions require Internet Explorer 8 or higher to be installed on the machine from which G Data Administrator is run 4 4 12 Statistics In the Statistics module you can check statistical information about virus occurrences and client Exchange Server e mail infections as well as the security status of the managed network Various views are available the data can be displayed as text or shown graphically column or pie chart The relevant view can be selected under Display mode It contains data
106. ecurity Status shows all the basic security settings for the clients or groups that you have highlighted in the client management area and immediately deploy changes if necessary As long as your network is optimally configured for protection against computer viruses you will see a green icon to the left of all entries listed here ifa component is not optimally set e g the monitor is switched off or a client s virus signatures are out of date a warning symbol will alert you When the G Data program interface opens some settings may be displayed in info mode for a short time This does not mean that the network is not protected at that time G Data ManagementServer s database is simply being queried by G Data Administrator 46 G Data Administrator By clicking on the respective entry you can directly carry out configuration changes or open the respective module As soon as you have corrected the settings for a component with a warning icon the warning icon will revert to the green icon UD G Data Administrator 248 Admin Organization Options License management PEII Clients Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics ni P wo H G Data Security Status a Client connections a a All ManagementServers a Gainer G Data Security Client 229 229 i Demo Gdata Virus signatures ad dh MobileDevices i Notebooks Monitor 229 229
107. efresh the software overview Display all Display all software that has been installed on the clients Print Print the software list In the selection screen that appears you can specify which details you would like to print Print preview Preview the page s to be printed Display only software on the blacklist Only show software that you have blocked by adding it to the blacklist Display only software that is not on the whitelist Only show software that is installed on the network clients but has not been checked yet by the system administrator Using this view you can quickly add software to the blacklist or whitelist by right clicking on it G Data Administrator The list area lists installed software for all clients selected in the client management area To fill the blacklist or whitelist click the button Global blacklist or Global whitelist Click Add to add a new blacklist or whitelist entry The option Determine attributes lets you select the program you want to put on the blacklist or whitelist and enter its attributes To set an attribute as rule tick an attribute s checkbox This allows you to put software from specific vendors or specific program versions on the lists When you already know the program s attributes you can also directly add them to the blacklist or whitelist without using the Determine attributes dialog By default the Software inventory is filtered to only show currently installed applica
108. egistration form Enter the registration number for the product here Depending on the type of product you can find the registration number in the license document MediaPack or order confirmation In case of doubt contact your dealer or the relevant distributor On entering the registration number your product is activated The access data generated is displayed following successful registration Be sure to make a note of these access data Following successful registration it is no longer possible to re enter the license key If you have problems entering your registration number please check if you have entered it correctly Depending on the font used a capital I for India is often misread as the number 1 or the lowercase letter I for Lima The same applies to B and 8 G and 6 Z and 2 If you have purchased G Data ClientSecurity G Data EndpointProtection or PatchManager as add on module and did not activate it on installation the Firewall PatchManager and PolicyManager tabs are only enabled following successful activation Until then only the G Data AntiVirus Business functions are available 164 Troubleshooting FAQ 11 1 3 MailSecurity Exchange Server 2000 and AVM Ken If you are using AVM Ken and would like to install G Data MailSecurity on the same computer as the Ken server our support team can supply detailed instructions If you are using Exchange Server 2000 and would like to install G Da
109. em tray menu option can be enabled or disabled in G Data Administrator under Firewall gt Overview by checking Allow user to enable disable the firewall 114 G Data Security Client 7 8 Firewall The Firewall option loads the firewall s interface As long as the client is in the G Data ManagementServer network the firewall will be administered centrally by the server When the client connects to another network for example if a laptop is using a private network at home the firewall interface can be used to configure an off site configuration The Firewall system tray menu option can be enabled or disabled in G Data Administrator under Firewall gt Overview by checking Allow user to change the off site configuration 7 8 1 Status The Status module of the firewall shows information about the current status of the firewall By double clicking any of the entries you can carry out actions directly or switch to the respective program area g G Data Personal Firewall jke Settings Help Firewall Status Current status indication of the G Data Firewall The individual options can be n edited by double clicking left mouse button Security Firewall enabled Mode Automatic autopilot ay Status Networks All networks are protected m Prevented attacks 0 Networks Sp ae Application radar No applications blocked S Rule sets MX Log The security level determines how detailed the rules established for y
110. engines Both engines optimized performance recommended Discard gt dB Notebooks Reaction to infected files Disinfect if not possible quarantine il ceases Infected archives Block file access e Scanning mode Read and write access Monitor network EJ awserveri3 Z Monitor n access Z Heuristics E oee2o0zc Z Check archives Size limit 300 kB E E vee201z C Check email archives SB win2kevat Z Check system areas on startup waren Z Check system areas on media change ical Z Check for dialers spyware adware riskware win7 vat3 Z Notify user when a virus has been found E winxevati Exceptions gt sh Exchange Edit Behavior monitoring E Enabled Ifa threat is detected Halt program Edit global whitelist Information The settings have been applied to all selected clients Connected AW2008R2BASE AW2008R2BASE Admi Status as per 5 21 2014 5 06 33 PM Settings Monitor settings can be used to configure its scans and define exceptions e Monitor status Switch the monitor on or off In general you should leave the monitor switched on as it is the foundation of permanent and uninterrupted virus protection e Use engines The G Data software works with two independently operating virus scanning engines Using both engines guarantees optimum results for preventing viruses Using just one engine may have performance advantages e Reaction to infected files Specify the
111. er installation open the SelfSSL command prompt through Start gt Programs gt IIS Resources gt SelfSSL InstallShield Wizard Select Features Choose the features Setup will install Select the features you want to install and clear the features you do not want to install PllsState 3 0 ay p 2escniption m Log Parser 2 1 Use Web Capacity Analysis M Metabase Explorer 1 6 Tool to test different server 5 1 es and network configurations by Permissions Verifier 1 0 Using custom designed RemapUrl 1 0 content and workload SelfSSL 1 0 simulations You can test TinyGet 5 2 a servers with single or multiple Processors and servers that Web Capacity Analysis Tool 5 2 are connected to multiple WFetch 1 3 l networks Space Required on C 332K Space Available on C 5360100 K Next gt Cancel You can assign a self signed certificate to your website by entering a single command selfss N CN localhost K 2048 V 365 S 1 T Press Enter Confirm the certificate creation by pressing Y This will create a certificate for the default IIS site on the local server and add localhost to the list of trusted certificates The key length will be 2048 and the certificate will be valid for 365 days If your site is not the default site of IIS look up its Identifier in Start gt Programs gt Administrative Tools gt Internet Information Services IIS Manager
112. er Messages the app lists recent events such as scan reports and signature update reports Select a scan report to view its details Scan reports can be enabled or disabled in the Settings module Q Internet Security Company 5 a 4 A iG Virus scan Lost Stolen v Web protection Permissions Ht Protected apps 28 ncoming filter BP Outgoing filter S Hide contacts K Settings In the top right corner select the update icon to download the latest virus signatures The bin icon lets you remove all reports listed under Messages 10 1 2 Virus scan To carry out a comprehensive manual malware scan the Virus scan option allows you to choose between two scan methods 154 G Data Internet Security for Android Installed applications This scan analyzes installed applications to identify malware If any malware is found on your device Internet Security will offer you the possibility to remove it e System full scan The full scan checks your complete smartphone storage for malware This assists in the early detection of malware for example by detecting malicious apps on an SD card before they are even installed 7 Internet Security Company s PE E Security center Q Lost Stolen Web protection Permissions Hi Protected apps xe p X incoming filter X Outgoing filter Se Hide contacts K Settings Select the Settings icon in the top right corner to open the Virus scan set
113. er settings exclude full software installers from the list as well as any blacklisted entries Click Reset all filters to reset the display filter UD Date Aaministaxor 2 ess Admin Organization Options License management i OUT z Fawems Fawna EPI AWSERVERL3 ER veszooze E Dew201z a winzevar 7 Reset al fiters E kich mm AW2008R2BASE E Normal E wnan Nendor Y Product T Patch T Priority Y Client Y Release date Y Status Y Blackisted Y PatchFu Swin7 vas Status unknown 2395 E nxevart Priority High 2318 H db exchange Vendor Microsoft Corp 1708 Vendor Adobe Systems Inc 128 Vendor Appie if Vendan Cine Sytems Inc 01 2 Vendor Google In 12 Product Google Chrome m Gongle Chrome Google Chrome 320 1700 102 for Windows Update Langu High AAWZOORR2BASE 1 27 2014 unknown No Patch rnane Gengi Ceme Google Chrome 22 0 170076 for Windows Update Ali Languag High AWZO0ERZBASE 1 14 2014 unknown Ne Patch sete Gangle Chae Gongle Chrome 32 0 1750 117 for Windows Update All Langua High AWZOOERZBASE 2 20 2014 unknoum No Patch Google Inc Google Chrome Google Chrome 33 0 1750 146 for Windows Update All Lingua High AW200BR2BASE 3 3 2014 unknown No Patch Number per page 1000 7 Page 1 from Connected localhost Administrator Status as per 6 2 2014 11 01 16 AM Entries 4804 Selected 0 Per patch and client several types of patch
114. ersion available on the server To create an installation package start G Data Administrator In the menu Organization click the option Create G Data Security Client install package You will be prompted to select the ManagementServer with which the clients should register and an installation language After selecting a storage location G Data Administrator will create an installation package in the background The installation package can then be copied to the target computer and should be launched there with administrator rights It will install G Data Security Client without further user interaction 2 6 3 Installing Linux clients Like their Windows counterparts Linux clients can be linked with the G Data ManagementServer infrastructure centrally managed via G Data Administrator and supplied with signature updates As with Windows clients a file system monitor with a graphical user interface will be set up on Linux clients with functionality similar to the AntiVirus module for Windows For Linux computers that operate as file servers and provide Windows authorization to different clients via the SMB protocol a module can be installed manually This module controls access to the authorizations and carries out a file scan on every access so no malware can migrate from the Samba server to the Windows clients or vice versa For the Workstation client a kernel version equal to or greater than 2 6 25 is required included with distribut
115. es performance optimized recommended Zi In the case of an infection Disinfect if not possible quarantine x Infected archives Block access NA m Exceptions Advanced Cancel The various tabs of the options menu can be enabled or disabled in G Data Administrator under Client settings gt General gt Client functions 7 4 Quarantine Every client has a local quarantine folder into which infected files depending on the settings for the monitor scan job can be moved A file that has been moved into quarantine cannot execute any malware Infected files are automatically zipped and encrypted when they are moved to quarantine When quarantining files that are larger than 1 MB they are always automatically stored in the local client quarantine so that the network is not needlessly burdened in case of a massive virus attack All files that are smaller than 1 MB are transferred to the quarantine folder of G Data ManagementServer These settings cannot be changed The client quarantine is located in the directory ProgramData G DATA AntiVirusKit Client Quarantine The G Data ManagementServer quarantine is located in the directory ProgramData G DATA 112 G Data Security Client AntiVirus ManagementServer Quarantine If an infected file of less than 1 MB is detected on a client without a connection to G Data ManagementsServer it is saved in the local quarantine and only transferred to the central quar
116. et connection sharing ICS e Share or block VPN services Allow or block Virtual Private Network VPN services e Advanced Rule Set Editor expert mode Open the Advanced Rule Set Editor 7 8 3 2 Advanced Rule Set Editor The Advanced Rule Set Editor allows for the creation of highly specific rules It can be used to create all of the rules that are also available through the Rule Wizard but also supports custom settings S Rule set cse Close Rule set 2 U steathmode C Rest Action if no rule applies SR Ask user V Adaptive mode Rules Name Rank Access Direction Note Rules v t Media Player 64 Bit 1 Allow Outbound Default rule New iv t Media Player Setup 64 Bit 2 Allow Outbound Default rule 7 Q Internet Explorer 64 Bit 3 Allow Outbound Default rule z b 7 amp Remotedesktop 4 Allow Outbound Default rule Delete V Media Player 5 Allow Outbound Default rule J Media Player Setup 6 Allow Outbound Default rule Wizard v t IE RSS Feed 7 Allow Outbound Default rule T amp Internet Explorer 8 Allow Outbound Default rule View 7 amp Windows Problem Reporting 9 Allow Outbound Default rule e 7 Windows Reability Analysis 10 Allow Outbound Default rule Update _ V t Windows SQM Consolidator 11 Allow Outbound Default rule 7 amp Task Scheduler Engine 12 Allow Outbound Default rule Rank v t DilHost Surrogate 13 Allow Outbound Default rule m lt gt
117. etwork during a configurable time period 4 4 2 Clients The Clients module offers you client management functions such as information about whether the clients are running normally and if the virus signatures and program files are fully up to date 4 4 2 1 Overview From the Overview panel you obtain an overview of all managed clients and can also simultaneously carry out any client administration Using the Security status column you can easily keep track of every client s current security status By right clicking any of the column headers and selecting Select columns you can choose from a large number of properties to be displayed in the client overview 47 G Data Software Server Alias server Client Security status EngineA Engine B Status as per G Data Security Client version Language UPMS client Last access Virus signature update time Program update time Operating system Subnet server Domain Network card MAC address IPv4 address IPv6 address Subnet mask Default gateway DNS server DHCP server Primary WINS Secondary WINS EULA To manage the clients you can use the following options from the toolbar above the list 48 C Refresh x Delete Remove a client from the Clients list As this option does not uninstall G Data Security Client from the client it should only be used for client machines that have already been decommissioned or removed from the network If an active client
118. field i e emails that only have BCC and or CC recipients Recipient filter nee Name Recipient filter Note Direction Incoming email NA Addresses Domains separate multiple entries with a semi colon v Filter out email with just cc or Bec recipients empty recipient field Reaction V Reject mail v Notify message sender P Send alert to the following persons Include original email Cancel l Help 9 3 2 9 Filter spam The spam filter provides you with an extensive range of settings to effectively block email with undesirable content or from undesirable senders e g mass email senders MailGateway checks for numerous email characteristics that are typical of spam These characteristics are used to calculate a value reflecting the likelihood of the email being spam To configure this process multiple tabs are available Filter You can give an individual name to each filter by entering it in the Name field Add additional information that may be required in the Note field Under Reaction you can define how the spam filter should handle email that may possibly be spam You can use the spam probability value calculated for the affected email by G Data MailSecurity to define three different levels of filtering Suspected spam messages which contain only a few spam characteristics are not necessarily all spam but can also be email newsletters or part of a mass emailing that is of interes
119. for x64 KB2506212 MS11 025 Security Update for Microsoft Visual C 2008 Service Pack 1 Redistributable Package KB2538243 MS11 030 Security Update for Windows 7 for x64 KB2509553 MS11 037 Security Update for Windows 7 for x64 KB2544893 MS 11 043 Security Update for Windows 7 for x64 KB2536276 MS 11 048 Security Update for Windows 7 for x64 KB2536275 MS11 053 Security Update for Windows 7 for x64 KB2532531 MS11 059 Security Update for Windows 7 for x64 KB2560656 MS11 071 Security Update for Windows 7 for x64 KB2570947 MS11 075 Security Update for Windows 7 for x64 KB2564958 MS11 076 Security Update for Windows 7 for x64 KB2579686 m chede for updates __ Uninstal The Installed tab shows all patches and updates that have been installed on the system Double click a patch to view an extended description If a patch or update seems to be causing problems users can select it and click Uninstall to ask the administrator to remove it The Status will change to Waiting for response and the administrator will receive a report with a rollback request To perform a local check regardless of software recognition jobs planned on the ManagementServer click Check for updates Security Client will then check all patches for applicability on the local system The Available tab list patches updates and software packages that are applicable to 113 G Data Software the client s
120. ft corner 10 3 Calls SMS The Calls SMS module combines filtering options with contact management 10 3 1 Incoming filter The Incoming filter consists of two separate options You can choose to enable a Blacklist or Whitelist approach to block or allow incoming calls and SMS messages Separately you can enable the Telephone book option to allow all numbers in the telephone book regardless of black or whitelist Calls from unknown numbers can be allowed or blocked by ticking or unticking the checkbox Permit calls from unknown numbers despite filter GO Internet Security Company 4 Incoming filte 5 J eny conta Suppress unwanted calls and filter unwanted SMS Select how the filter should work Whitelist oF Wal Allow all numbers on the whitelist Blacklist ox 5 Block all numbers on the blac G2 Permissions ry Ep protected apps we see Telephone book oF Allow all numbers in the telephane book that are not on the blacklist Da X Outgoing fitter Permit calls from unknown numbers despite filter Sg Hide contacts 3K settings 5 Data Security Made in Germany To view the address book tap the address book icon For a log of suppressed calls and SMS messages tap the phone icon in the top right corner To view the black or whitelist tap the lock icon To add a number to the list tap the icon Phone numbers can be added from the address book or call history When entering a phone number manually you can use
121. fy the ports that you do or do not wish to use e Time frame Set up time related access to network resources to ensure for example that the network can only be accessed during a normal working day and is blocked at all other times e IP space It is advisable to regulate network use by restricting the IP address range especially for networks with fixed IP addresses A clearly defined IP address range significantly reduces the risk of attack from a hacker Rule wizard The Rule wizard allows you to define additional specific rules for the relevant rule set or to modify existing rules Using the Rule wizard you change one or more rules in the selected rule set YD Rule wizard SS What do you want to do Grant or deny access for a specific application Cancel The following actions are available in the Rule wizard e Grant or deny access for a specific application Select a targeted application and permit or prohibit access to the network as part of the selected rule set Simply use the wizard to select the desired program program path then indicate under Connection direction whether the program is to be blocked for inbound connections outbound connections or both This enables you for example to prevent your MP3 player software from forwarding data about your listening habits outbound connections or to ensure that program updates are not downloaded automatically inbound connections e Open or c
122. g this option does not create a security hole Moreover when using Outlook incoming and outgoing mails are scanned using an integrated plug in 59 G Data Software Check system areas on startup media change System areas boot sectors in your computer should be included in virus checks Here you can specify whether these should be checked on system start up and or whenever a media change occurs new DVD etc Generally you should have at least one of these two functions activated Check for dialers spyware adware riskware You can use the G Data software to check your system for dialers and other malware programs spyware adware riskware This includes programs that establish unrequested expensive Internet connections and are potentially every bit as damaging as a virus in terms of economical impact For example spyware can silently record end user surfing behavior or keystrokes including passwords and forward this to third parties via the Internet Notify user when a virus has been found If this option is enabled when a virus is found by the monitor a notification window is displayed informing the user that a virus has been found on the system The file that has been found its path and the name of the malware found are displayed Under Exceptions you can exclude specific directories from virus check for example to omit folders with archives that are seldom used in order to integrate them into a special scan job Fi
123. h are missing from your tablet Get Google Play s Web protection Permissions i WO Hi Protected apps Ss incoming filter PF Outgoing filter Se Hide contacts K Settings 10 1 3 2 Theft detection Thieves usually change a device s SIM card so that it can no longer be contacted on its original phone number When this happens remote commands sent by SMS will no longer work As a countermeasure using the Theft detection options you can specify what should happen to the device if the SIM card is changed e Lock phone on SIM change also in Mobile settings gt Anti theft e Locate phone on SIM change also in Mobile settings gt Anti theft If you need to change the SIM card yourself use the option Please press here if you are planning to change the SIM card It will temporarily disable the SIM change detection until the device is rebooted When the battery level is low the device will no longer automatically detect its location using GPS signals Select Locate device and send position data to the registered number email address to enable reporting of its last known location whenever the device enters power saving mode 156 G Data Internet Security for Android To eeey nae E Security center Virus scan lanning to change the SIM card amp web protection A Pleas ever the battery stat Hig Protected apps SB incoming fitter Outgoing filter Se Hide contacts K Settings
124. h the G Data Firewall Name IS Direct Internet connection S Rule set 1 IS Rule set 2 is blocked networks A trusted networks B untrusted networks 5 Delete 5 Edit e New Create a new rule set In the following dialog enter a Rule set name and decide if the rule set should be pre populated with rules from the default rule sets for untrusted trusted or blocked networks e Delete Delete the selected rule set The default rule sets cannot be deleted Edit Edit the selected rule set using the Rule Wizard The Rule sets module contains default rule sets for the following network types e Direct Internet connection This covers rules that involve direct Internet access e Untrusted networks This generally covers open networks with Internet access 117 G Data Software e Trusted networks Home and company networks are generally trusted e Blocked networks This rule set can be used if access to a specific network should be blocked 7 8 3 1 Rule Wizard The Rule Wizard allows you to define new rules for the selected rule set or to modify existing rules The Rule Wizard is especially suitable for users unfamiliar with firewall technology For a granular control over individual rules use the Advanced Rule Set Editor Rule Wizard x g The Rule Wizard helps you set up firewall rules Share or block applications Controls application access to the network da amp
125. h you retrieve email e g pop3 mailserviceprovider com Filter If POP3 email is rejected based on a content check or due to a virus infection the message sender can be automatically informed The default message for rejected email is The message was rejected by the system administrator However the notification can be changed You can use wildcards to copy the information relating to the rejected email into the notification text In the text you define for Subject and Email text the following wildcards defined using a percentage symbol followed by a lower case letter are available e v gt Virus e s gt Sender e r gt Recipient e c gt Cc e d gt Date e u gt Subject e h gt Header e ij gt Sender IP 127 G Data Software 9 2 1 4 Virus check The Virus check tab lets you set virus check options for incoming and outgoing email Options x l Incoming SMTP Outgoing SMTP Incoming POP3 Vius check Scan parameters Queue Advanced Logging Inbound F Check incoming email for viruses Inthe case of an infection Disinfect f not possible rename 7 Add a virus alert to the subject and text of the infected email Send virus alert to the following persons 7 Insert message in the text if a password protected aa archive has not been scanned _ Outbound V Check outgoing email for viruses F Do not send infected messages recommended V Notify sender of infected
126. he status or the results of a job displayed in plain text For example you can see whether the job has just run or has been completed and also find out if any viruses were found e Last execution When the respective job was last run e Interval This column shows the cycle with which the job will be repeated according to the defined schedule e Scope Find out which media e g local hard disks the analysis includes 75 G Data Software To manage tasks you can use the following options from the toolbar above the task list 76 x Q u HARE eEeeoR Refresh Delete Delete all highlighted jobs Single scan job Define a single scan job for individual computers or computer groups In the configuration dialog the time scope and additional scan settings can be defined on their respective tabs Double click on the entry to change the parameters for an available job or select the Properties command from the context menu by right clicking Periodic scan job Define a periodic scan job Backup job Define a backup job for individual computers or computer groups For more information about backup jobs see the chapter Backup jobs The Backup function is available as part of the optional Backup module Restore job This function allows you to restore backups to clients or groups For more information about backup jobs see the chapter Restore jobs The Restore function is available as part of the optional Backup mo
127. hes 2633952 Update for Wind 12 20 2012 4 56 55 PM The Administrator has permitted the installation of the following patches 2695962 Update Rollup fc 12 20 2012 4 56 55 PM The Administrator has permitted the installation of the following patches 2695962 Update Rollup fe 12 20 2012 1 22 40 PM The Administrator has permitted the installation of the following patches MS09 059 Security Updat 12 20 2012 1 22 40 PM The Administrator has permitted the installation of the following patches MS09 059 Security Updat 12 20 2012 1 22 36 PM The Administrator has permitted the installation of the following patches MS09 056 Security Updat 12 20 2012 1 22 36 PM The Administrator has permitted the installation of the following patches MSO9 056 Security Updab _ Number per page 1000 Page 1 gt from 1 Entries 18 Selected 0 4 4 3 Client settings The Client settings module manages settings for individual clients or groups of clients Using the General Monitor Email Web IM and AntiSpam options you can extensively configure protection for network clients 4 4 3 1 General The General tab allows you to set general settings for the selected clients U G Data Administrator 2 Anne 4 localhost gt DemoGdsta hy MobileDevices ahi Notebooks aly Servers al Workstations E awserveRr13 E Derzoozc E ves201ze E win2kavaT Ewan Bww7 vars wmevars ae eee Connected localhost Administrator ense management Data Secur
128. hield and firewall Engine rollbacks can be managed by opening the virus signatures subsection The status of ManagementServer itself can be viewed by expanding Server status G Data Administrator Time frame 1 month o Report status 8 13 2013 9 13 2013 MIM Infections MEN Requests ME Errors Dashboard Reports Clients ReportMan 106 G Data MobileAdministrator Statistics are available under Client connections and Top 10 clients Neutralized infections Tap Report status to check on infection request and error reports 6 2 2 Reports The Reports view presents virus firewall and PolicyManager reports It is a mobile optimized representation of the same information that is available in the Reports module of G Data Administrator G Data Administrator Time frame 7 days iv Max 100 entries will be queried Firewall reports 5 Dashboard Reports Clients ReportMan Select the period Time frame for which you want to view reports 1 day 7 days or 1 month MobileAdministrator will return the different categories for which reports are available Tap a category to view the individual reports available Reports can be filtered by name Any report can be opened to check on further details and take action if necessary 6 2 3 Clients MobileAdministrator offers a concise overview of all clients that are managed by G Data ManagementServer Per client in depth i
129. hould be carried out If a single scan job is created only the option Start at is available If a start time is not specified the scan job will be started immediately after creation Scanner The Scanner tab shows the settings with which the scan job will be executed The following options are available 78 Use engines The G Data software works with two independently operating virus scanning engines Using both engines guarantees optimum results for preventing viruses Using just one engine may have performance advantages We recommend the setting Both engines optimized performance In this scenario both virus scanners cooperate to achieve optimized detection with a minimized scanning duration If an infected file is found Specify what should happen if an infected file is detected These settings are identical to those found on the panel Client settings gt Monitor Infected archives Specify here how infected archives are to be treated Bear in mind that a virus in an archive will only be harmful when it is unpacked from the archive G Data Administrator e File types Here you can define the file types G Data should check for viruses Please bear in mind that checking all files on a computer can take considerable time e Priority scanner You can use the levels High Medium and Low to specify whether the virus check should have high priority on the client in which case the analysis is relatively quick and other application
130. i Cancel_ Help 9 3 3 Queues The Queues modules provides an overview of incoming and outgoing email accumulated in the MailGateway and being scanned for viruses and or content Email is usually forwarded immediately only delayed minimally by the MailGateway and then immediately deleted from the queue list If an email cannot be delivered or there are delays in the delivery e g because the respective server is not responding a corresponding entry is made in the queue list G Data MailSecurity then tries to resend the email at intervals that can be set under Options gt Queue An email delivery that did not take place or has been delayed is always documented Use the Incoming outgoing button to switch the list view between incoming and outgoing email The Repeat now button enables you to re deliver a selected email that could not be sent regardless of times that you have specified for the repeated delivery under Options gt Queue The Delete button lets you permanently remove email from the queue if it cannot be delivered 9 3 4 Activity The Activity module provides a summary of the actions carried out by G Data MailSecurity These are listed with the Time ID and Action in the activity list You can use the scrollbar on the right to scroll up and down in the log The Reset button allows you to delete the log With the function Deactivate scrolling the list will continue to be updated but the most recent activit
131. ia its IP address You can also replace the server name later through the IP address if the G Data ManagementServer has already been installed To do this alter the following registry entries HKEY_LOCAL_MACHINE SOFTWARE G DATA AVK ManagementServer ComputerName HKEY_LOCAL_MACHINE SOFTWARE Wow6432Node G DATA AVK ManagementServer ComputerName To make sure that the connection from the server to the clients can also be established via the IP address the clients must be enabled in G Data Administrator with their IP address This can be done either manually or by Active Directory synchronization If the clients are installed directly from the installation medium the installation program asks for both the server name and the name of the computer Enter the appropriate IP address here 11 4 4 Storage locations and paths G Data Security Client virus signatures e Windows XP Server 2003 Server 2003 R2 C Program Files Common Files G DATA AVKScanP BD or G Data e Windows Vista Windows 7 Windows 8 Server 2008 Server 2008 R2 Server 2012 C Program Files x86 Common Files G DATA AVKScanP BD or G Data G Data ManagementServer virus signatures e Windows XP Server 2003 Server 2003 R2 C Documents and Settings All Users Application Data G DATA AntiVirus ManagementServer Updates 168 Troubleshooting FAQ e Windows Vista Windows 7 Windows 8 Server 2008 Server 2008 R2 Server 2012 C ProgramData G DATA AntiVirus ManagementServer Updates G Dat
132. ication by scanning all incoming and outgoing e mail as an independent gateway MailSecurity MailGateway runs in the background but the installation wizard also installs G Data MailSecurity Administrator which gives you full access to the functions and options of MailGateway MailSecurity Administrator can be found under Start gt Programs gt G Data MailSecurity gt G Data MailSecurity If you close the administrator software MailGateway will remain active in the background You can also maintain MailGateway using any other computer as long as it meets the system requirements for MailSecurity Administrator To install MailSecurity Administrator on another PC without installing the full MailGateway simply start the setup and choose the G Data MailSecurity Administrator button 122 G Data MailSecurity Administrator 9 G Data MailSecurity Administrator G Data MailSecurity Administrator is the administration software for G Data MailSecurity MailGateway which protects all SMTP and POP3 based email traffic within your entire network Administrator can be started from any computer running Windows using password protection Remote configuration is possible for all virus protection and signature update settings EG AWSERVER13 G Data MailSecurity Administrator SE Options y Update ZH Spam filter Help Info MailSecurity Status Current status display for G Data MailSecurity Double click left mouse key to edit the PN in
133. ients Connected localhost Administrator Status as per 8 30 2013 10 25 59 AM Using the Global blacklist it is possible to ensure that certain websites are blocked 87 G Data Software company wide across the entire network regardless of any settings that have been made under Allowed categories To do this simply enter the address which you would like to block under URLs then click on the Add button to block the corresponding site 4 4 7 4 Internet usage time On the Internet usage time panel general use of the Internet can be restricted to certain times Setting up time quota for Internet usage is also possible Under Status you can specify whether the limitations should apply to all users of the client in question including administrators or only to users who do not have administrator rights on the client computer On the right side you can use the available controls to specify the quota available for Internet usage Daily weekly or monthly quotas can be issued for example the specification 04 20 05 corresponds to an Internet usage time of 4 days 20 hours and 5 minutes When there are conflicting settings for Internet usage the smallest value is used If you set a time limit of four days per month but a weekly limit of five days then the software will automatically limit Internet usage to four days If users try to access the Internet beyond their permitted amount of time an information screen appears
134. ies will not be directly shown as top priority You can then scroll in the list more slowly 152 G Data MailSecurity Administrator You can use the ID to discover multiple actions for one email Transactions with the same ID always belong together e g 12345 Download email 12345 Process email 12345 Send email 9 3 5 Virus results In the Virus results module you get detailed information about when G Data MailSecurity detected an infected email which measures were taken the type of virus that the email contained and the actual sender and recipient of the affected email Use Delete to remove the selected virus alert from the virus results list 153 G Data Software 10 G Data Internet Security for Android G Data offers a specially tailored business version of G Data Internet Security for Android devices to make use of G Data s Mobile Device Management features Installation takes place through G Data Administrator 10 1 Security The modules listed under Security bundle all preventive measures that Internet Security has to offer They can be managed centrally through G Data Administrator s Mobile settings module or initiated and configured manually if allowed by the administrator 10 1 1 Security center The Security center of G Data Internet Security for Android offers an overview of all essential security features Warnings such as virus signature update reminders are listed under the heading Security center Und
135. ing a secure connection represents a potential security risk For optimal security enable an SSL Server Certificate in IIS 2 5 Installing G Data MobileAdministrator To install G Data MobileAdministrator insert the G Data installation medium and press the Install button then select the G Data MobileAdministrator component The installation of G Data MobileAdministrator is fairly straightforward like its WebAdministrator counterpart After accepting the license agreement select a folder to install MobileAdministrator to It should be installed to the web server s HTTP folder such as inetpub wwwroot During the installation some extra software may need to be installed MobileAdministrator depends on the following prerequisites e Microsoft Windows 7 Microsoft Windows Server 2008 R2 MobileAdministrator requires at least Windows 7 or Windows Server 2008 R2 e Microsoft Internet Information Services IIS As MobileAdministrator is a web based product the server on which it will be installed should also be running a web server MobileAdministrator supports Microsoft Internet Information Services IIS Ensure you are running IIS before attempting to install MobileAdministrator For more information about installing IIS see the Reference Guide e Microsoft NET Framework MobileAdministrator depends on the Microsoft NET Framework If the server does not yet have Microsoft NET Framework installed the installation wizard will prompt
136. ing jobs can be planned Right click one or multiple patches and select one of the following options e Check patches for applicability Plan a job that checks if the selected patches apply to the selected client s using the Patch applicability job window 94 G Data Administrator e Install patches Plan a job that installs one or more patches on the selected client s using the Software distribution window e Rollback Plan a rollback job for patches that have already been deployed to the selected client s using the Rollback window e Put patches on the blacklist Put one or more patches on the blacklist e Remove patches from the blacklist Remove one or more patches from the blacklist e Properties View more information including a full description and license The Status column displays the status of every patch and its planned or running patching jobs e g Scanning while a job is being carried out or Notapplicable when the patch does not apply 4 4 9 2 Settings The Settings panel controls several options related to patch deployment PatchManager can be enabled or disabled by ticking or unticking the appropriate checkbox UD G Dats Administrator eae re 4 E localhost 19s Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics Settings ByDenoGdata Enable PatchManagement by MobiteDevices Automatically check critical patches for applicability Automatically
137. initial installation G Data ManagementServer must always be installed as the main server main MMS The main server represents the central configuration and administration entity of G Data s network based virus protection architecture G Data ManagementServer provides the infrastructure for network clients to be protected with the latest virus signatures and program updates In addition all client configuration is managed centrally by G Data ManagementServer e Install a secondary server When using an SQL database it is possible to run a second server secondary MMS which uses the same database as the main server If the main server is unavailable for more than one hour clients connect automatically to the secondary server and load signature updates from it They switch back to the main server as soon as it is available again Both servers load signature updates independently from one another to provide a safeguard against failure e Install a subnet server For large networks e g company headquarters with connected branch offices it can be sensible to operate an installation of G Data ManagementServer as a subnet server Subnet servers help to reduce the network traffic load between clients and the main MMS They can be used to manage a subset of clients allocated to them The subnet servers remain fully functional even if the main or secondary ManagementServer is inaccessible However they do not load any virus signature updates autonomo
138. interval Alternatively you can grant them the right to obtain updates from the G Data update servers For mobile workstations mixed mode is recommended when the client has a connection to the ManagementServer it gets the updates from there If there is no connection to the ManagementServer the virus signatures are automatically downloaded from the Internet The Settings and scheduling button can be used to schedule virus signature updates for the latter two options G Data Administrator Client functions Under Client functions you can set permissions for local users to change Security Client settings User rights can be very extensive or restrictive as your network policy demands e Allow the user to run virus checks In case of a suspected virus infection the user can run a local virus check independent of the ManagementServer schedule Results of this virus check will be transferred to the ManagementsServer during the synchronization Additionally this lets users change settings for local virus checks e Allow the user to download signature updates If you enable this function the user of the client computer is allowed to download virus signatures over the Internet without connecting to the ManagementServer This is especially important if the client has a laptop that is often used outside the network perimeter e Allow the user to change monitor options If this function is enabled the client user has the option to change the
139. inuxClient on the G Data installation medium e installer bin installer for the Linux client e uninstaller sh uninstaller for the Linux client You can copy these files to the client computer and start installer bin to install the client software In addition the G Data installation medium also features a file with the virus signatures The installation of this file is optional since the software automatically obtains the latest virus signatures from the server after the installation e signatures tar archive with virus signatures 2 7 Installing G Data MailSecurity The deployment type of G Data MailSecurity depends on the mail server that is used in the network For networks that are using Microsoft Exchange Server 2007 SP1 2010 2013 it can be installed as a plugin MailSecurity for Exchange registers itself with a local ManagementServer and is administered by G Data Administrator The stand alone gateway solution MailSecurity MailGateway can be used with all mail 20 Installation servers It can be configured using G Data MailSecurity Administrator which will be installed alongside it 2 7 1 As an Exchange plugin To install MailSecurity for Exchange insert the MailSecurity installation medium and press the Install button Under Microsoft Exchange AntiVirus Plugin select the MailSecurity Exchange component and follow the installation wizard The installation wizard of MailSecurity for Exchange adds a plugin to
140. ion no software or signature updates can be performed When G Data Administrator is first started on the server the Server Setup Wizard is run It can be used to install G Data Security Client remotely on the desired clients in your network All settings that are configured by the Server Setup Wizard can also be changed later If problems arise with the remote installation of the clients the client software can also be installed using Active Directory synchronization or locally with the aid of the G Data installation medium or a client install package Client install packages can also be distributed using group policy objects logon scripts To ensure that the server is protected against virus attacks installation of G Data Security Client is also recommended for the server After setup and installation of the client software has taken place on the connected machines virus protection and G Data client and server updates can be centrally managed G Data Administrator provides among other things options for real time protection through the G Data monitor and the option to define scan jobs that regularly inspect the network for virus attacks G Data Software If it becomes necessary to resolve a settings problem on a client on site G Data Administrator can be installed on every client within the network You use it to log in to G Data ManagementServer from any client If it becomes necessary to resolve a critical situation from outside you
141. ion to send the command to the device immediately e Locate device same functionality as the option under Allowed actions e Mute device same functionality as the option under Allowed actions e Trigger alarm sound same functionality as the option under Allowed actions Set lock screen to following PIN same functionality as the option under Allowed actions e Enable lock screen with PIN same functionality as the option under Allowed actions e Reset device to factory defaults same functionality as the option under Allowed actions 4 4 5 4 Apps The Apps panel lets you configure access to apps on managed devices To block or allow apps first decide whether the filter should work in Blacklist or Whitelist Mode In Blacklist mode all apps on the blacklist will be blocked or password protected all others will be accessible In Whitelist mode all apps on the list will be allowed or password protected all others will be blocked The Password a PIN code is used to access blocked apps You can also choose to enter a Recovery email address to which the password will be sent in case you forget it UD G Data Administrator Sn Admin Organization Options License management i gt 4 K S Dashboard Clients Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics Search for client P General amp Policies KP ance E Apps amp Phone
142. ion was carried out successfully 8 28 2013 11 31 58 AM The Installation overview window lists all clients that have pending and completed remote installation tasks The Type column shows the type of installation G Data Security Client and or G Data Firewall or Subnet server After a remote installation has been completed the Status column will be updated In most cases the client will need to be rebooted in order to complete the installation the installation procedure will add a report to the Reports module if a reboot is required 4 4 Modules Security settings and enterprise policies for the complete network and its clients can be configured using the various modules that you can select via the respective tabs Each module s settings always apply to the clients or groups highlighted in the client management area The various modules are explained in detail in the following sections For most modules there are general options to control layout and list contents For example to reduce the amount of items per page enter the maximum Number per page at the bottom right of the screen For free form text filtering click any of the filter icons in the column headers and enter your filter criteria An alternative to filtering list items is the use of groups Drag one or more column headers to the bar above the column headers to create a group based on those columns Groups can be nested in 45 G Data Software vario
143. ionality of all available G Data business modules In case you would like to use a module that is not included in your software version contact G Data Support to obtain information about software upgrades Copyright Copyright 2014 G Data Software AG Engine A The Virus Scan Engine and the Spyware Scan Engines are based on BitDefender technologies 1997 2014 BitDefender SRL Engine B CloseGap 2014 G Data Software AG Engine B Avast 2014 Alwil Software OutbreakShield 2014 Commtouch Software Ltd Patch management and remediation 2014 Lumension Security Inc DevCraft Complete 2014 Telerik All Rights Reserved G Data 02 07 2014 11 05 1 1 G Data Business solutions G Data software products offer complete comprehensive protection for end customers as well as medium to large sized enterprises Thanks to the latest cutting edge technology our customers enjoy the highest possible level of security and the best performance coupled with ease of use Our security modules are available as part of the following solutions G Data Software ANTIVIRUS CLIENT SECURITY ENDPOINT PROTECTION SMALL BUSINESS SECURITY BUSINESS BUSINESS BUSINESS Basic protection Network protection Complete protection For 5 10 PCs thenetwork for your network PLUS firewall and AntiSpam PLUS PolicyManager PLUS 3 non networked PCs AntiVirus n BankGuard e BE e e ReportManager m a n Mobile Device Management i a n LJ Firewall a a A
144. ions such as Ubuntu 8 10 Debian 5 0 Suse Linux Enterprise Desktop 11 and other vendor versions Customization is required in isolated cases with some Linux versions The file server client can be used on all prevalent versions of Linux 2 6 3 1 Remote installation To remotely install the software on a Linux client proceed as follows 1 Inthe Clients module of G Data Administrator open the Clients menu and G Data Software select the command Install G Data Security Client for Linux A dialogue window appears in which you can define the client that the software should be copied to The computer must be recognized in the network 2 Use the Computer name option if a Samba service is installed on the client computer or if the computer is registered with the network s name server If the name of the computer is not known use its IP address 3 Enter the computer s Root password A root password must be set in order to initiate a remote installation Not all vendors set a root password by default such as Ubuntu 4 Click the OK button Installation progress will be shown in the Installation overview window YP Install G Data Security Client for Linux x Client type Client for Linux workstations Access data Computer name IP address Computer name AD_NOTEBOOKi5 Root password eeccccce o canca 2 6 3 2 Local installation The following files can be found in the directory Setup L
145. is found _ Disinfect if not possible log only Infected archives Log only File types All files Priority scanner High short scan time Settings 4 Heuristics Archives 7 Email archives System areas Z Check for dialers spyware adware riskware 7 Check for rootkits Z Use all available CPUs short scan time high CPU load ok Cancel Analysis scope Using the Analysis scope tab you can limit the scan job to specific directories when planning a scan job for a client or mailboxes when planning a scan job for an Exchange server The folder selection window allows you to pick folders from both the local PC 79 G Data Software and network clients The Analysis scope can be used to exclude folders with rarely used archives which can then be checked in a separate scan job Special note for Linux file servers when selecting directory exceptions the root drive and all shares are listed This way drive directory and file exceptions can be created YD New scan job run once EO eee eam Analysis scope Check local hard drives Check memory and autostart Check the following directories OK Cancel 4 4 6 2 Backup jobs The Backup function is available as part of the SmallBusiness Security solution and as an optional module It lets administrators plan backup tasks for client data to centrally safeguard essential files
146. is inadvertently removed from the list it will reappear upon its next connection to ManagementServer group specific G Data Administrator settings however are lost Print Print the client list In the selection screen that appears you can specify which details you would like to print Print preview Preview the client s to be printed Install G Data Security Client i P f Uninstall G Data Security Client Update virus signatures now Updates the virus database on the client with current signatures from G Data ManagementServer Ss Ws Update virus signatures automatically Enables automatic updating of the virus database Clients periodically check whether updated virus signatures are available on G Data ManagementServer and run an automatic update i Update program files now Updates the program files on the client with the current files from G Data ManagementServer A client reboot may be necessary after updating the program files Sa Update program files automatically Enables automatic updating of program files Clients periodically check whether a new version is available on G Data ManagementServer and execute an automatic update Nl Installation overview UD G Data Administrator 2l Admin Organization Clients Options License management 0 gt KIAKIA Dashboard SPEA Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics Search for
147. ity not on behalf of any 175 G Data Software other Contributor and only if You agree to indemnify defend and hold each Contributor harmless for any liability incurred by or claims asserted against such Contributor by reason of your accepting any such warranty or additional liability 176 Index A access data 33 134 164 active directory 37 40 activity 152 addresses 144 145 administrator 15 25 123 124 alarms 33 android 154 antispam 65 application control 85 apps 158 assign clients 29 attachments 142 authentication 25 103 105 123 avmken 165 B backup 38 backup jobs 80 bios 12 blacklist 85 147 148 boot cd 10 11 browser 103 Cc calls 159 cleanup 35 client installation 17 27 45 50 client settings 55 clients 37 40 43 44 45 46 47 54 58 61 63 65 107 166 167 computer name 133 connection limit 133 content 143 content filter 150 corruption 165 D dashboard 46 106 137 database 13 delay 164 device control 86 exchange server external references 140 141 142 143 144 firew all rulesets forw arding email incoming email 6 7 9 13 15 16 instant messaging 63 internet traffic 63 internet usage time 88 inventory 52 53 75 77 80 82 83 local installation G Data Business M mail groups 36 mail queue 152 mailserver 20 mailgateway 20 122 mailsecurity 20 122 123 124 129 137 main server 13 29 37 managementser
148. ity Client Note ray icon Always display all sessions User account System recommended Updates Update virus signatures automatically Z Update program files automatically Reboot after update Open message box on client Client functions Allow the user to run virus checke Allow the user to download signature updates Allow the user to change monitor options Allow the user to change email options Z Allow the user to change Web IM options Allow the user to display the local quarantine L Protect cient settings with a password Scan jobs Exceptions tate scan Analysis scopes Information The settings have been applied to all selected clients Status as per 9 12 2013 3 17 50 PM Edit 55 G Data Software G Data Security Client The G Data Security Client section covers basic client functionality Note Enter any notes or remarks that apply to this client Tray icon For terminal servers and Windows versions with fast user switching you can select the sessions in which a client icon should be displayed in the task bar Never In first session only for terminal servers or Always The icon must be displayed if you want to enable the user to have access to client options and functionality such as Idle Scan User account The client software normally runs on the system account You can enter a different user account to
149. k the checkbox and enter a keyword This way you can look for software only from a specific publisher or only specific versions Wildcards like and can be used Enable the option Patches onlly if the job should not check full software packages and upgrades for applicability If the Patch applicability job is being planned from PatchManager s Status overview module the job applies to the patch and clients that were selected there If it is being planned from the Patch configuration module you need to select the client s for which applicability should be checked If it is being planned from the Tasks module you need to select the patch es for which applicability should be checked the job will be run on the currently selected group or client 4 4 6 5 Software distribution jobs The Software distribution function is available as part of the optional Patch Management module To distribute applicable patches to clients or groups you can define a software distribution job By ticking the option Only load at a specified time you can schedule the job Select one or more patches to be installed from the Selected patches list The actual software distribution can be carried out Immediately Immediately after the boot process or Immediately after logging in Additionally you can schedule a delay in starting the job That way the boot process and distribution job won t influence client performance at the same time If the Software distribution j
150. l The General tab offers settings for automatic updates web protection virus checks and synchronization as well as two general device management options e Note Enter any notes or remarks that apply to this mobile client e Device name The name of the mobile device G Data Software UD G Data Administrator Sa Admin Organization Options License management 1 gt KAKAN rd Clients Clientsettings VESPERE Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics Search for client P T ae z I Polici ti theft Apps Phone book Call filter a ee oe v a locathost Note amp Demo Gdata ae ae Device name Different se Ss gt ab MobileDevices Updates gt ay Notebooks 7 Automatically gt Bh Servers C Only when connected via Wi Fi vy Interval 1Day a hy Workstations E E Web protection 7 Enabled T Z Only when connected via Wi Fi gt ah Soles Virus check awcuentia Z Automatically be 7 Periodically EJ AWSERVER13 Baws Z Power save mode E vesz00zc Z While recharging pee201zc Interval 7 Days SB winzkevat Type All applications gwan Synchronization SS wnz7 vat3 Z When using mobile network data plan 12 gt hour s E wnxevarz When using Wi Fi 1 gt hour s 4 Exchange G localhost Connected localhost Administrator Status as per 8 30 2013 10 25 59 AM Updates The Updates section covers settings related to updates e Automatically You can config
151. lders from which clients or groups will be backed up Under Backup scope add folders from any of the clients Exclude files allows you to define files and folders to be excluded from the backup There are several general options such as Temporary internet Files and Thumbs db but you can also define custom file types by adding their extension to the file type list If the generated backup should be saved in a particular directory prior to transmission to the ManagementServer this can be indicated under Cache If the option Use client standard path is enabled and an absolute path is indicated the backup will be buffered in the specified directory If this option is not enabled the G Data Client will always save the backup on the partition containing the most free disk space The directory G Data Backup will be created in the root directory of the partition UD Backup job PEELE ile directory selection Backup scope User directories Edit Cache Z Use client standard path Directory 81 G Data Software 4 4 6 3 Restore jobs Restore jobs can be planned in several ways In the Tasks menu select New gt Restore job to plan a new restore job The Restore job toolbar button opens the same window allowing you to select a backup to restore Alternatively you can look up the backup in the list of backup jobs Right click a job and click Restore backup to open the Restore backup window UD Restore S
152. lected client to an existing group By selecting this function all existing groups are displayed in a new dialog window To move a client to a group select the group and click OK e Edit assigned EULA Assigns a previously defined EULA to the selected client s only available for mobile clients e Remove assigned EULA Removes an assigned EULA from the selected client s only available for mobile clients e EULA management e Assign G Data server While you have the option of assigning specific subnet servers to clients with the function Manage server you can also select a subnet server for individual clients e Update virus signatures now e Update virus signatures automatically Update program files now Update program files automatically e Reboot after program update Define what should happen after client program file updates Select Open message box on client to inform a user that they should restart his her client computer at a convenient time Create report will create a report in the Reports module or select Force reboot to automatically force a restart Install G Data Security Client Select the option Install G Data Security Client to initiate a remote installation of G Data Security Client on all selected machines To be able to access disabled clients they must be displayed as enabled in the client list When the function Install G Data Security Client is used the software informs you of this as necessary and
153. les with different spreadsheet formats e g xlr xls simply enter x For instance to check files of various types that have identical initial file names enter text for example e Heuristics In a heuristic analysis viruses are not only detected using the constantly updated virus signature databases but also by identifying certain features characteristic of viruses This method is an additional security benefit but in rare cases it may lead to false alarms e Check archives Checking of compressed files in archives should generally be activated e OutbreakShield OutbreakShield detects and neutralizes threats from malicious programs in mass emails before the relevant up to date virus signatures become available OutbreakShield uses the Internet to monitor increased volumes of suspicious email enabling it to close the window between the mass email outbreak and its containment with specially adapted signatures practically in real time If you want to use OutbreakShield use the Settings button to specify whether you are using a proxy server and if necessary the Login data for Internet connection to enable OutbreakShield to access the Internet at any time On the OutbreakShield tab you can define the text of the email that a mail recipient receives if a mass email addressed to him her has been rejected Due to its independent architecture OutbreakShield cannot disinfect rename or quarantine infected email attachments Hence the
154. les and file types can also be excluded from the virus check The following exceptions can be configured Directory Select a folder including any subfolder contained within it that you do not want to be checked by the monitor Drive Select a drive partition hard disk that you do not want to be checked by the monitor File Enter the name of a file that you do not want to be checked by the monitor You can also use wildcards Process If a specific process should not be monitored by the monitor enter the complete path and filename of the process e g C Windows system 32 cmd exe You can repeat this procedure as many times as you wish and you can delete or modify the existing exceptions in the Exceptions window Wildcards work as follows the question mark symbol represents individual characters The asterisk symbol represents entire character strings For instance in order to exclude all files with the file extension exe enter exe To exclude files with different spreadsheet formats e g xlr xls simply enter xI Or to exclude files of various types that have identical initial file names enter e g text This would involve files called text1 txt text2 txt text3 txt etc Behavior monitoring Behavior monitoring provides further protection against malicious files and processes Unlike the monitor it is not signature based but analyzes the actual behavior of a 60 G Data Administrator process
155. lete Details Click Delete to delete the selected log entry or Delete all to clear the log file completely The Details button shows additional information about the selected log entry Right click any log entry to access context sensitive options In addition to the Details view these options include creating a new rule based on the log entry editing the rule 120 G Data Security Client that led to the connection being blocked or allowed and setting a filter view for the Log module 7 8 5 Settings The Settings window can be used if the appropriate permissions have been enabled in G Data Administrator Firewall gt Overview gt Allow user to enable disable the firewall and Allow user to change the off site configuration g Settings j Settings Off site configuration Security Firewall enabled recommended 5 Firewall disabled The firewall protects the system from threats from the Internet Mode Autopilot enabled recommended Create rules manually user will be prompted The user will not receive any queries if the firewall operates in autopilot mode e Security Enable or disable the firewall e Mode The firewall can be operated in automatic autopilot mode or in manual rule sets mode 121 G Data Software 8 G Data MailSecurity MailGateway G Data MailSecurity MailGateway provides complete protection of your corporate email commun
156. lients to be enabled and click the Enable button Some computers may not be included in the list e g because the computers concerned have not been switched on for a long time or have not set up File and Printer Sharing To enable these clients enter the name of the computer in the Computer input field After clicking on Enable the computer will appear in the client list When all computers to be protected have been enabled click on Next to move on to the next step If you have enabled any clients in the next step the checkbox for Automatically install client software on the enabled computers is checked If distribution of the software on the client computers is to occur at a later time this option must be disabled by unticking it G Data ManagementServer downloads new virus signatures and program files over the Internet To automate the update process entering the access data created during the online registration is required Alternatively access data and update intervals can be configured afterward using the Internet update window A detailed description of 27 G Data Software update interval settings can be found in the section Internet update Click Next to configure e mail notifications In the event of a virus discovery or other critical situations on one or more clients the network administrator can be informed via email Select the Recipient group s or click the cogs icon to open the Email settings You can use the Limit to preven
157. list 1 2 and 3 Filter spam a Keywords subject Keywords mail text Content fiter Advanced settings Fiter Whitelist Blackiist Realtime blacklists V Use default settings recommended Realtime blacklists are blacklists of servers known to be used for broadcasting spam Do not use realtime blacklists for the following domains Gmc or Gated Keywords subject You can identify suspected spam messages through the words in the subject line by defining a list of keywords An occurrence of at least one of the listed terms in the subject line increases the spam probability You can change this list as you like by using the Add Change and Delete buttons You can add predefined lists of keywords to your list using the Import button Entries in such a list must be listed one below the other in separate lines A plain text file format is used for storing this list you can create this list using an editor like Windows Notepad You can also use the Export button to export such a list of keywords as a text file By selecting the Match whole words only option you can have G Data MailSecurity search the email text for whole words only So if cash has been defined as a keyword messages containing that word would be suspected as spam while messages containing cashew nuts in the text would not be affected 148 G Data MailSecurity Administrator Filter spam x Fiter__ __Whtetst
158. lose a specific port The wizard provides the option of blocking ports completely or enabling them for a particular application only e g CRM software e Add one or more default rules Add rules from the default rule set to the selected rule set e Copy an existing rule 93 G Data Software 4 4 9 PatchManager PatchManager is available as an optional module for users of the AntiVirus ClientSecurity and EndpointProtection solutions PatchManager allows you to control patch deployment for all managed machines from one single interface You can use PatchManager to list updates for software from Microsoft and other parties Each patch can be checked for applicability blacklisted distributed or rolled back grouped or individually 4 4 9 1 Status overview The Status overview panel provides a detailed view of patches and their deployment status within the network It lists all of the available patches alphabetically once for every client The extensive list lets you check whether clients have been provided with all relevant patches and allows you to directly schedule patch deployment A set of charts shows at a glance information about pending patches and can be used to quickly assess whether there are any important patches which need to be installed By default the list of patches is grouped by Status Priority Vendor and Product to quickly assess whether essential patches have been installed yet or not The default display filt
159. ltering performed under File extensions also applies to email messages that are themselves being forwarded as email attachments This option should be activated Choosing Only rename attachments has the effect that filtered attachments are not deleted automatically but only renamed This is not only recommended for executable files such as EXE and COM but also for Microsoft Office files that may contain executable 142 G Data MailSecurity Administrator scripts and macros Renaming an attachment makes it impossible to open it simply by clicking it Instead the user must first save and possibly rename the attachment before it can be used If Only rename attachments is not ticked filtered attachments are deleted directly Filter attachments Name Rename malicious attachments Note Direction Incoming email X Mode Filter specified attachments blacklist mode Only allow specified attachments whitelist mode File extensions use a semicolon to separate multiple extensions exe com bat reg ser vbs js pif cmd 7 Also filter attachments in embedded email v Only rename attachments Suffix danger V Insert message in mail text The message contains potentially dangerous attachments The attachments were rer Reaction E Reject mail E Notify message sender _ Send alert to the following persons Include original email Under Suffix you can enter a character st
160. ly cleaned up retaining the latest archive but removing all others if they have been uploaded to the ManagementServer When the amount of free disk space on the client or the server drops below the error threshold an error message will be added to the Reports module Server backup storage and client cache will be automatically cleaned up If there is still not enough free disk space on the server backups will not be carried out UD Server settings S Se eRe Backup Moir ail Disk space reports Create warning report when less than 0 gt MB free space remains on the client 5000 gt MB free space remains on the ManagementServer Create error report when less than 0 lt gt MB free space remains on the client 1000 gt MB free space remains on the ManagementServer Server backup paths Enabled Dicectory 7 Mobile Export backup password Import backup archives OK Cancel 38 G Data Administrator Under Server backup paths a path can be entered where all backups being generated are stored If no path is entered here all backups are stored under C ProgramData G DATA AntiVirus ManagementServer Backup or C Documents and Settings All Users Application Data G DATA AntiVirus ManagementServer Backup As all backups generated by the G Data software are encrypted there is also the option of exporting backup passwords and saving them f
161. ly firewall reports in case you are using a software version with firewall Only BehaviorBlocker reports Only application control reports in case you are using a software version with Application control Only device control reports in case you are using a software version with Device control Only web content control reports in case you are using a software version with Web content control Only Update Patch Management reports in case you are using a software version with PatchManager Only MobileDeviceManagement reports 99 G Data Software 4 4 11 ReportManager ReportManager provides you with an overview of client statuses protection and patch deployment Reports can be generated regularly and distributed among predefined groups of recipients Refresh refresh the list x Delete delete the selected report definition s Add new report schedule define a new report and schedule a reporting job UD G Data Administrator lelos Admin Organization Options License management 1 gt RAKAN Dashboard Clients Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports e portmanage Statistics P 3 K Import Export 4 E All ManagementServers Drag a column header to this area to group by that column 4 bcalhos Title T MonagementSerer Format F tanguage Execution T gt By DemoGdata gt hy MobileDevices sey aan ices Font El 1 8 2013 1 07 56 PM
162. m the Internet New rule Edit rule All rules for the current rule set are displayed in the list view Under Rules use the New or Edit buttons to add a rule to the current rule set or to edit an existing rule WD New rule x Name New rule 7 Rule enabled Note Connection direction Access t Outbound Deny E Protocol TCP UDP Assign application Assign port C Time frame from 12 00AM until 12 00AM CI IP space from ox Cancel e Name For pre defined and automatically generated rules this field displays the program name to which the rule applies e Rule enabled Disable a rule without actually deleting it e Note This indicates how the rule was created Pre defined rule is listed next to preset rules Generated in response to alertis listed next to rules that arise from the dialogue from the Firewall alarm and for rules that you generate yourself via the advanced dialogue you can insert your own comment e Connection direction Specify if the selected rule applies to inbound or outbound connections or both e Access Allowed or denied access for the program within this rule set 92 G Data Administrator e Protocol Select the connection protocols you want to permit or deny access You can universally block or enable protocols or link use of a protocol to one or more specific applications Assign application Similarly you can use the Assign port button to speci
163. mail at program startup Microsoft Outlook only This option is used to scan emails for viruses that the client may receive while it is offline All unread email in your Inbox folder and subfolders are checked as soon as you open Outlook Attach report to received infected emails As soon as one of the emails sent to the client contains a virus you will receive the following message in the body of this mail beneath the actual mail text WARNING This mail contains the following virus followed by the name of the virus In addition you will find a VIRUS notification before the actual subject If you enabled the option Delete text attachment you will also be notified that the infected part of the email was deleted Outgoing email The Outgoing email section defines options for scanning outgoing emails Check email before sending To make sure that you do not send out any infected emails the G Data software offers the option of checking outgoing emails for viruses before sending them If an email actually contains a virus the message The mail subject header contains the following virus virus name is displayed and the relevant email is not sent Attach report to outgoing emails A report is displayed in the body of each outgoing email below the actual mail text It reads Virus checked by G Data AntiVirus provided that you have enabled the Check email before sending option G Data engine version info and virus news can also be added Engine
164. mmand to remotely reset the maintenance password can only be sent from the Trusted phone number Some commands trigger a report or other notification Enter an Email address for notifications to which these messages will be sent 70 G Data Administrator Allowed actions Under Allowed actions you can define anti theft actions that can be triggered by SMS These actions can be triggered by sending the respective command to the device including the remote maintenance password e Locate device The device will send its location to the email address specified for notifications To activate this feature via SMS send an SMS containing the text password locate e Reset device to factory defaults The device will be reset to its factory settings All personal data will be wiped To activate this feature via SMS send an SMS containing the text password wipe e Trigger alarm sound The device will play a ringtone until Internet Security is started This will assist in locating lost devices To activate this feature via SMS send an SMS containing the text password ring e Mute device If you do not want the device to call attention to itself with ringtones or other signals it can be muted This does not include the ringtone that is used to locate lost devices To activate this feature via SMS send an SMS containing the text password mute e Enable lock screen The device screen can be locked to prevent the device from being used To acti
165. mmended Lear Lear Reset tables Cok cnca y Hep Advanced settings The Advanced settings tab can be used for very detailed changes to the G Data MailSecurity spam detection and to adapt it to the mail server environment We recommend using the default settings here Changes in the advanced settings should only be carried out if you know exactly what you are doing 150 Filter spam ets ter Whieit Backis _ Realtime biackists Keywords subject Keywords mailtext Content fiter Advanced settings J Use default settings ecommended Features included in individual parts of the mails are used to calculate a spam index which represents the probability of spam Criteria for spam Anti spam criteria klist V Mail size G Data MailSecurity Administrator Click Spam index values to edit values for the individual attributes that are used to classify emails as Suspected spam High spam probability or Very high spam probability It is recommended to leave the option Use default settings checked 9 3 2 10 IP filter The IP filter prevents the receipt of email sent from certain servers The filter can function in blacklist or whitelist mode Under Name and Note enter information about why you want to block or allow the respective IP addresses and then enter every individual IP address under IP addresses Click Add to add the IP address to the list of
166. moving virus infected files to a local quarantine folder 110 G Data Security Client The user can also easily check files or directories from Windows Explorer by selecting the files or directories and using the Check for viruses G Data AntiVirus option in the context menu While a virus scan is running whether it has been initiated locally or is part of a scan job the context menu is expanded with the following entries Virus check priority Set the priority of the virus check With High the virus check is carried out quickly but it can significantly slow down other programs on the computer With the Low setting on the other hand the virus check takes a comparatively long time but other applications on the client computer are not significantly slowed down only available for local scan jobs Pause virus check Pause a locally started virus check Scan jobs that are have been initiated by G Data ManagementServer can only be stopped if the administrator has enabled the Allow user to halt or cancel the scan job option when setting up the job Cancel virus check Cancel a locally started virus check Scan jobs that are have been initiated by G Data ManagementServer can only be cancelled if the administrator has enabled the Allow user to halt or cancel the scan job option when setting up the job Display scan window Display the progress and results of the virus check only available for local scan jobs The Virus check system tr
167. must be either disabled or moved to other groups as necessary Only empty groups can be deleted 4 3 2 6 Find computer s The Find computer s window can be used to add network clients to G Data Administrator s client management area and enable them Clients can be found by IP address and enabled directly from within the dialog window Wy Find computer s l oje IP range Start IP 10 202 4 0 End IP 10 202 4 255 or Subnet address Z Only search for available clients Ping IP address Computer Y path y 10 2024 8 WS PINGEL 10 2024 10 10334 12 10 2024 52 AndreG T W7 32 MJ 10 202483 DEB200ZC 10 2024 168 MMWin7x64QC 10 2024 174 10 2024 250 Rah Start search Close The Search computer window will contact all computers in a specified IP range The range can be defined using a Start IP and End IP such as 192 168 0 1 and 192 168 0 255 ora Subnet address in CIDR notation such as 192 168 0 0 24 To make sure that only available clients are listed select Only search for available clients Ping Click Start search to start the network search Computers will be listed as soon as they are found If the search process is taking too long it can be canceled by clicking Cancel search All computers that respond to the IP check are listed including their IP address and computer name Using the Enable button the respective clients can be added to the client ma
168. n for all shares is enabled If the line is in another section the protection only applies to the corresponding share You can comment out the line for test purposes by entering the symbol at the start of the line to see whether access functions without virus protection If not search for the error in your Samba configuration Linux workstation monitor Check whether the monitor process avguard is running linux ps ax grep avguard The monitor requires the redirfs and avflt kernel modules With Ismod you can check whether the modules are loaded Ism od grep redirfs and Ismod grep avflt The modules must be compiled for the kernel in use This is taken care of by the Dynamic Kernel Module System DKMS which must be installed together with the matching kernel header packages for your distribution If this is the case DKMS compiles and installs the modules automatically You will find the monitor log file under var log gdata avguard log 11 4 Other 11 4 1 How can I check whether the clients connect to G Data ManagementServer The Last access column in the Clients module contains the date on which the client last reported to G Data ManagementsServer In the default setting the clients report to G Data ManagementServer every five minutes if there are no scan jobs currently running The following reasons may cause a failed connection The client is disabled or disconnected from the network A TCP IP connection cannot be e
169. n takes place before the operating system is launched and uses up to date virus signatures G Data WebAdministrator G Data WebAdministrator is the web based administration software for G Data ManagementServer It can be used to create and edit settings for G Data ManagementServer through a web interface G Data MobileAdministrator G Data MobileAdministrator is a web based control panel for G Data ManagementServer that is optimized for mobile devices It can be launched from any mobile browser and offers access to the most important and frequently used functions of G Data Administrator G Data MailSecurity G Data MailSecurity centrally secures all SMTP and POP3 based email traffic It is available as a separate module and can be installed from its own installation medium Getting started In the event of an acute virus threat first run a boot scan on the affected computers before you proceed with the steps below 1 Install G Data ManagementServer on your server To guarantee optimal protection the computer should always be accessible switched on and able to automatically download virus signatures via an Internet connection To install G Data ManagementServer a server operating system is not required see System Requirements While installing G Data ManagementServer the wizard also installs G Data Administrator the administration software for G Data ManagementServer Complete the online registration Without online registrat
170. nagement area The search result includes enabled clients if applicable these can be disabled by clicking Disable 44 G Data Administrator 4 3 2 7 Create G Data Security Client install package This function can be used to create an installation package for G Data Security Client Use the package to install G Data Security Client locally without user interaction See the chapter Local installation for more details 4 3 3 Installation overview To keep track of the progress of the installation the Installation overview window can be used It opens automatically when a remote installation task is added or can be opened by clicking the Installation overview button in the client management area s toolbar WD Installation overview EES Client 7 Server Y Type 7 Status 7 Last update 7 AWANDROID13 localhost G Data MobileSecurity Self activation was carried out successfully 9 13 2013 3 40 38 PM SB AWSERVER13 localhost G Data Security Client G Data Firewall Installation completed successfully 9 2 2013 3 11 45 PM SB win2kevat localhost G Data Security Client Self activation was carried out successfully 8 28 2013 2 04 25 PM a DEB200ZC localhost G Data Security Client Self activation was carried out successfully 8 28 2013 11 32 43 AM WIN7VATL localhost G Data Security Client Self activation was carried out successfully 8 28 2013 11 32 22 AM a DEB201ZC localhost G Data Security Client Self activat
171. nd select the scope and the settings file Different client types are indicated by different icons such as a ManagementServer a group an Active Directory Group a desktop client or a mobile client The following types of icons are shown in the client management area Server ww Group i Client ae Wwsd Network Subnet server Group Active Directory link Linux client Laptop client Mobile client Linux server Non selectable devices Devices like network printers fall under this category 41 G Data Software In the toolbar you will see the most important client management commands some of which are also displayed in the Organization menu Refresh gt Expand collapse all Expand or collapse all items in the network tree 3 Show disabled clients wy Create new group XK Delete Enable client To enable a computer highlight it in the list and click the Enable button installation overview al Send installation link to mobile clients To deploy mobile clients from within G Data Administrator send them an installation link to the G Data Internet Security app This initiates the installation procedure for G Data Internet Security for Android 4 3 1 Active Directory G Data Administrator s Active Directory support imports computer objects from local domains organizational units Create a new group right click it and select the option Assign AD item to group In the dialog window that open
172. nformation is available and several security settings can be edited The Clients overview provides a list of all machines that are being managed by G Data ManagementsServer The list can be filtered by name By selecting an individual machine you can check several statistics about versions and updates Additionally several security settings can be edited Enable or disable monitor HTTP traffic processing idle scan or firewall by ticking or unticking the appropriate checkboxes Policy settings such as Application control Device control Web content control and Internet usage time can also be controlled from this view Tap Save to save the machine s settings 107 G Data Software G Data Administrator AWSERVER13 Engine A AVA 13 09 2013 Engine B GD 2 13 09 2013 Status as per 9 13 2013 2 24 45 PM G Data Security Client version 13 0 0 29 11 09 2013 Last access 9 13 2013 3 17 44 PM Update virus signatures Time completed 9 13 2013 2 10 Update program files Time Task allocated 9 12 2013 12 10 PM J Enable monitor 2 Process Internet traffic HTTP a J Idle scan enabled Enable firewall Application control enabled for users o Device control enabled for users o Dashboard Reports Clients Ea 6 2 4 ReportManager ReportManager is the mobile version of the ReportManager module in G Data Administrator It allows you to configure schedule and preview reporting jobs G Data Administrator
173. ng them Click Yes and perform the update Make sure to enter Installation your registration number or if you have already registered the G Data Software your access credentials 6 You will now see the program interface Click Computer to check your computer for viruses and malware Depending on the type of computer and size of the hard drive the scan can take an hour or more 7 If the G Data software finds any viruses use the option provided in the program to remove them Once the virus has been removed successfully the original file have been restored 8 After completion of the virus check click the Close button top right of the Linux program interface then select Exit gt Shutdown 9 Remove the G Data boot medium from the drive or USB port 10 Restart your computer It will boot your default operating system The G Data software can now be installed on a virus free system G Data AntiVirus AntiVirus Network info State Date of Virus Signatures Tue Aug 27 2013 Time of last check Not yet checked 5 Virus check Options Update Progress Checked none Start time J Infected Duration Suspicious Remaining time i File State Action Virus Path Virus check A Computer k Files and folders gs System areas Virus signatures update done Tuesday 27 August 2013 16 48 40 UTC G Data Security Made In Germany
174. ngle clients and for entire groups Select a server or group and then click the Create new group button After entering a group name clients can be assigned to the new group by dragging and dropping the desired client onto it To move a large number of clients into a group use the Clients gt Overview module Select the clients that should be moved right click and choose Move G Data Security Client to group 4 3 2 4 Edit group The Edit group option opens a window where the Add and Remove buttons can be used to add clients to groups or remove them from groups This option is only available when a group is selected in the client management area UD Edit group rem Clients Workstations J NOTEBOOKO1 g WORKSTATIONO1 NoTEBOOKO2 WORKSTATIONO2 NOTE800K03 WORKSTATIONO3 NOTE8OOK04 WORKSTATIONO4 NOTEBOOKOS WORKSTATIONOS NOTEBOOKO06 E WORKSTATIONO6 Add NOTEBOOKO7 a WORKSTATIONO7 notesooxos WORKSTATIONO8 NOTEBOOKOS WORKSTATIONO9 NOTEBOOK10 E WORKSTATION10 NOTEBOOKi1 WORKSTATION11 notesooxi2 WORKSTATION12 NOTEBOOK13 WORKSTATION13 NOTEBOOK14 E WORKSTATION14 OK Cancel 43 G Data Software 4 3 2 5 Delete Individual clients can be removed from the client list with the Delete command G Data Security Client is not uninstalled by removing the client from the list To delete a group all of its included clients
175. not be affected Filter spam x Fiter Whitelist Backlist Realtime blacklists Keywords subject Keywords mail text Content filter Advanced settings V Use list The list includes terms indicating spam in the mail text Keywords fedv a ee Add d bad credit best rates Delete blowjob cock cock2 cum dick dick2 fetish free cable Import free membership enone eet 7 Match whole words only recommended Cok cance Ay Hep 149 G Data Software Content filter The content filter has been designed as a self learning filter based on the Bayes method and it calculates spam probability based on the words that are used in the message body This filter not only works on the basis of predefined word lists but also learns from each new email received You can view the word lists that are used by the content filter for spam identification via the Query table contents button You can delete all saved content by using the Reset tables button after which the content filter will restart its learning process Filter spam x Fiter Whitelist Blacklist Realtime blacklists Keywords subject Keywords mail text Content fitter Advanced settings 7 Use setfJeaming content fiter Bayes Info Spam Omails leamed 0 entries No spam O mails leamed 0 entries Query table contents Options 7 Use default settings reco
176. notices within Derivative Works that You distribute alongside or as an addendum to the NOTICE text from the Work provided that such additional attribution notices cannot be construed as modifying the License You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use reproduction or distribution of Your modifications or for any such Derivative Works as a whole provided Your use reproduction and distribution of the Work otherwise complies with the conditions stated in this License 5 Submission of Contributions Unless You explicitly state otherwise any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License without any additional terms or conditions Notwithstanding the above nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions 6 Trademarks This License does not grant permission to use the trade names trademarks service marks or product names of the Licensor except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file 7 Disclaimer of Warranty Unless required by applicable law or agreed to in writing Licensor provides the Work and each Contributor provides its Contributions on an AS IS BASIS W
177. nserts a new function in the client s Outlook program under the Tools menu called Scan folder for viruses Regardless of the G Data Administrator settings an individual client user can scan the currently selected email folder for viruses In the email display window you can use Check email for viruses in the Tools menu to run a virus check of the file attachments When the process has been completed an information screen appears in which the result of the virus check is summarized Here you can see whether the virus analysis was completed successfully get information about the number of emails and attachments scanned and about any read errors as well as any viruses found and how they were dealt with Port monitoring By default the standard ports for POP3 110 IMAP 143 and SMTP 25 are monitored If your system s port settings are different you can customize the settings accordingly 4 4 3 4 Web IM The Web IM panel allows you to define in depth scan settings for internet traffic instant messaging and online banking UB G Data Administrator l le e sens Gromer Oo Eren Parser traffic HTTP raffic E oeszoozc E pep201z S wnzevar Instant Messaging Beam Process IM traffic Portis use Swn7 vas amma to separate multiple ports E wnat ion into IM application if available 5 Lf eachange LL Microsoft Messenger iverson 47 or late
178. ntiSpam n C n PolicyManager n MailSecurity ClientBackup o o Oo PatchManagement oO o o Available as a Managed Service Oo m included D 0ptional 1 2 Additional documentation Extensive information about how to use G Data software can be found in the context sensitive software help file which can be opened at any time by pressing F1 Additionally you can download a comprehensive manual in PDF format by visiting the G Data Support website e USA www gdata software com United Kingdom www gdatasoftware co uk e International www gdatasoftware com 1 3 Security Labs If you discover a new virus or an unknown phenomenon always send us the file via the Quarantine function The function can be found in G Data Administrator under Reports Right click on any reported file and choose Quarantine Send to G Data Security Labs We will of course treat the data you have sent us with the utmost confidentiality and discretion The return address for responses from G Data Security Labs can be defined in G Data Administrator under Options gt Server settings gt Email 1 4 Support Installation and use of G Data software is easy and self explanatory However if you encounter a problem just get in touch with the competent representatives in our ServiceCenter USA www gdata software com e United Kingdom www gdatasoftware co uk Introduction e International www gdatasoftware com The serial number can be found on the licens
179. ntribution Contributor shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work 2 Grant of Copyright License Subject to the terms and conditions of this License each Contributor hereby grants to You a perpetual worldwide non exclusive no charge royalty free irrevocable copyright license to reproduce prepare Derivative Works of publicly display publicly perform sublicense and distribute the Work and such Derivative Works in Source or Object form 3 Grant of Patent License Subject to the terms and conditions of this License each Contributor hereby grants to You a perpetual worldwide non exclusive no charge royalty free irrevocable except as stated in this section patent license to make have made use offer to sell sell import and otherwise transfer the Work where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution s alone or by combination of their Contribution s with the Work to which such Contribution s was submitted If You institute patent litigation against any entity including a cross claim or counterclaim in a lawsuit alleging that the Work or aContribution incorporated within the Work constitutes direct or contributory patent infringement then any patent licenses granted to You under this License for that Work shall terminate
180. o do so simply click the button to the right of the respective reaction Wildcards can be used to add information to the Subject and Email text fields the same wildcards as the ones that are used in the Incoming POP3 Filter settings 9 3 2 1 Filter read receipt This filter deletes requests for a read receipt for incoming and or outgoing e mails Filter read receipt Name Read receipt Note Direction Incoming email Zi Cancel Help 140 G Data MailSecurity Administrator 9 3 2 2 Disable HTML scripts This filter disables scripts in the HTML part of an email Scripts that make sense on a web page may be rather irritating when they are integrated into an HTML email In some cases HTML scripts are also used to actively infect computers while scripts even have the option of running in an email preview Disable HTML scripts rem Name Scripts Note Direction Incoming email Z tence Hep 9 3 2 3 Disable external references Many newsletters and product announcements in HTML format contain references which are only executed or displayed if the email is opened These can be images that were not sent with the email but are loaded automatically via a hyperlink Not all of these external resources are just harmless pictures they can also be malicious routines It makes sense to disable these references Disabling them does not affect the actual email text
181. o not overlap UD G Data Administrator Erc ion Tasks Options License management board Clients Client settings Mobile settings PS PolicyManager Firewall PatchManager Reports ReportManager Statistics Searhforcen PO KI QQ OH Az BOSaBSOSoUls 4 J All ManagementServers Drag a column header to this area to group by that column a C localhost T Client F Group T Status T Last execution T Interval T Scope 7 bh DemoGdata A Quickscan Group job localhost see Clients Details once gt dh MobileDevices A lt new backup job gt AWCUENTI4 see details 8 30 2013 11 25 34 AM daily User directories ah Notebooks A A New patch applicability job AWCLENTI4 not previously run once Vendor Microsoft Corp b dhia gt ah Workstations E awcuentia EJ awserveri3 E veB200zc E vee201z E winzkevaT wnan SS winz7 vat3 winxevati b th Exchange Connected localhost Administrator Status as per 8 30 2013 1 28 38 PM Entries 3 Selected 1 In the Tasks area jobs can be sorted according to the following criteria by clicking on the respective column header e Name The job name you entered You can enter a name of any length e Client You will find the name of the corresponding clients here You can only define jobs for enabled clients e Group If you assign a job to a group the group name appears in the overview list rather than the individual computers e Status The Status column shows t
182. ob is being planned from PatchManager s Status overview module the job applies to the patch and clients that were selected there If it is being 83 G Data Software planned from the Patch configuration module you need to select the client s on which the patch should be installed If it is being planned from the Tasks module you need to select the patch es that need to be installed they will be installed on the currently selected group or client YD Update distribution Sr Client WORKSTATIONO1 Job name New software distribution job Planning immediately immediately after the boot process immediately after logging in Z Only load at specified time 8 30 2013 fi 209PM C Load with delay 0 minutes Selected patches Drag a column header to this area to group by that column Verteilen V Title US Tor Windows Update AM Languages SEE NOTES REV Z o E Adobe Flash Player 10 3 183 86 Internet Explorer for Windows Full Upgrade All Languages Oo E Adobe Flash Player 10 3 183 86 Other Browsers for Windows Full Upgrade All Languages E Adobe Reader XI English 11 0 3 for Windows Full Upgrade E Adobe Flash Player 11 7 700 202 Internet Explorer for Windows Full Upgrade All Languages E Adobe Flash Player 11 7 700 202 Other Browsers for Windows Full Upgrade All Languages E Mozilla Firefox en gb 21 0 for Windows Full Upgrade See Notes E Mozilla Firefox en gb 2
183. obile settings Tasks AONYA Firewall PatchManager Reports ReportManager Statistics Search for client 2 a ee ar T F FSprricato control XZ Device control Web control et usage time 4 lecohos Si nated forse J ool ByDemo Gdata Z Allow user to report blocked devices gt uh MobileDevices gt dl Notebooks Device T Permission 7 gt lly Servers 2 covo D Read ah Workstations B Floppy disk Deny access EP Awserveri3 removable storage media 9 Deny access EJ vee200zc Webcam Deny access pee201z Whitelist SB winaxsvat pevice 7 Hardware 1D medium 10 Permission Note 7 wnan B lt gt removable storage media USB DES JetFlashMassStorageDevice VID 8564 PID 1000 REV 1075 SN 4159768253 Read Write WWIN7 VAT3 E winxevati gt b Exchange lt gt removable storage media US8 DESinnostorTechnologyCorpIS916EN VID 1F75 PID 0916 REV 0001 SN I Read Write Information The settings have not yet been received by all selected clients Connected localhost Administrator Status as per 8 29 2013 4 30 23 PM Under Status you can specify whether the limitations should apply to all users of the client in question including administrators or only to users who do not have administrator rights on the client computer The device classes for which use can be restricted for each client are displayed under Device These do not necessarily have to be present on each client You
184. ogged which establishes the connection to the G Data ManagementServer Look at the files and search for any error messages If you wish to see more messages then you can set the entries for LogLevel to value 7in the configuration files etc gdata gdav ini and etc gdata avclient cfg Warning A high LogLevel generates a lot of messages and causes the log files to quickly increase in size Under normal operating conditions always set the LogLevel to a low value 3 Test the scanner Use the avkclient command line tool to test the functioning of the avkserver scan server The following commands can be executed linux avkclient avkversion outputs the version and latest update date of the virus signatures 166 Troubleshooting FAQ linux avkclient avkversion outputs the version in short format linux avkclient scan lt file gt scans the file lt file gt and outputs the result Check the configuration file etc gdata avclient cfg is the configuration file for the remote client avclient Check whether the address of the ManagementServer was entered correctly If not delete the incorrect entry and enable the Linux client again via the G Data Administrator or enter the address of the G Data ManagementServer directly Test your authorization Virus protection for Samba authorization is enabled with the entry vfs objects gdvfs in the Samba configuration file etc samba smb conf If the entry is in section global protectio
185. ol Anti theft Apps Phone book Call filter E i recor eB rcs Benet aon Pb monte iy G AW2008R2BASE Remote maintenance password 546584 apes J By DemoGdata a Trusted phone number Discard 4 gh MobileDevices Email address for notifications _admin corporation com E a y Development Allowed actions a Z Locate device iuen Z Reset device to factory defaults ANDROIDO3 Z Trigger alarm sound ANDROIDO4 Z Mute device Z Enable lock screen ANDROIDOS Z Set lock screen password A anDRoID0s After SIM card change A ANpROIDO7 Z Enable lock screen Z Locate device ANDROIDO1 gt ght gt gh Sales gi Notebooks Taayi gb Servers Please choose the action that should be triggered on the device reese Locate device an email will be sent to the specified email address Mute device El vee200zc Trigger alarm sound E vee201zc Set lock screen to following PIN Enable lock screen with PIN if no PIN has been set the remote maintenance password will be used SB win2kevat Reset device to factory defaults E wn7varz Execute action Connected AW200BR2BASE AW2008R2BASE Admil Status as per 8 28 2013 2 24 52 PM Before specifying any anti theft measures some general settings should be entered The Remote maintenance password consists of numbers and functions as a PIN code When sending SMS commands to the device the password has to be included to ensure that only authorized users can send commands The co
186. om the list Outgoing calls Under Outgoing calls you can define how Internet Security should treat outgoing phone calls Enabling the additional filter Allow phone book contacts will only allow contacts with an entry in the Android or Internet Security phone books to be contacted as well as any whitelisted contacts Under Filter mode you can define specific measures for outgoing calls Select Blacklist to allow all communication except from the contacts that are on the list Select Whitelist to block all communication except from the contacts that are on the list By clicking Add contact you can add any contact from the contact database to the list Click Remove contact to remove a contact from the list If an attempt is made to call a blocked contact the user will be informed and offered 74 G Data Administrator the possibility to request the contact to be released This will add a report to the Reports module using which the administrator can directly add a blacklist or whitelist release for the contact 4 4 6 Tasks In the Tasks module you can define tasks for the clients All tasks generated on the G Data ManagementsServer are referred to as jobs There are two different job types single jobs and periodic jobs Single jobs are performed once at a specific time for the periodic jobs a schedule is defined You can define as many different jobs as you would like For performance reasons it generally makes sense that jobs d
187. omputer insert the G Data installation medium and press the Install button Then select the G Data Administrator component Ensure that you have closed all open applications as they may cause conflicts during the installation After clicking Next the installation will continue follow the installation steps with help of the installation wizard After the installation the entry G Data Administrator is available under Start gt All Programs gt G Data gt G Data Administrator 2 4 Installing G Data WebAdministrator To install G Data WebAdministrator insert the G Data installation medium and press the Install button then select the G Data WebAdministrator component The installation of G Data WebAdministrator is fairly straightforward After accepting the license agreement select a folder to install WebAdministrator to It should be installed to the web server s HTTP folder typically inetpub wwwroot During and after the installation some extra software may need to be installed WebAdministrator depends on the following prerequisites e Microsoft Internet Information Services IIS As WebAdministrator is a web based product the server on which it will be installed should also be running a web server WebAdministrator supports Microsoft Internet Information Services IIS Ensure you are running IIS before attempting to install MobileAdministrator For more information about installing IIS see the Reference Guide e IIS 6 Me
188. on G Data products use the TCP IP protocol for communication between the clients and ManagementServer Recommended system requirements When using G Data ManagementServer G Data MailSecurity MailGateway with a local SQL database or other demanding applications on the same computer the following recommended system requirements apply e RAM 4 GB e CPU multicore 2 1 2 Port configuration G Data products use several TCP ports for secure communication within the network Make sure your firewall configuration allows traffic through the following ports Main server MMS Port7161 TCP e Port7182 TCP Communication with G Data Administrator e Port7183 TCP e Port7184 TCP Communication with mobile clients distribution of mobile client installation files Communication with clients and subnet servers Communication with mobile clients Subnet servers e Port7161 TCP Communication with clients and subnet servers Clients e Port7167 TCP Communication with subnet servers e Port 7169 TCP Communication with clients peer to peer update distribution MailSecurity MailGateway server e Port 7182 TCP Communication with G Data MailSecurity Administrator MailSecurity Exchange plugin e Port7171 TCP Communication with G Data Administrator The port numbers have been chosen to minimise impact on existing software However if there happens to be a port conflict you can change the port assignments for G Da
189. ons in your network 9 2 1 5 Scan parameters On this tab you can optimize the virus detection performance of G Data MailSecurity and configure it to your individual requirements In general reducing the virus detection increases the overall performance of the system while increasing it might result in slight performance losses The following functions are available e Use engines The G Data software works with two independently operating virus scanning engines Using both engines guarantees optimum results for preventing viruses Using just one engine may have performance advantages 129 G Data Software e File types Under File types you can define the file types G Data MailSecurity should check for viruses G Data recommends automatic type recognition which checks only those files that might theoretically contain a virus If you want to define the file types to be checked for viruses yourself use the User defined function By clicking the button you can open a dialogue box in which you enter the file types you want into the upper input field and then use the Add button to add them to the list of user defined file types You can also use wildcards i e replace characters or strings of characters The question mark symbol represents individual characters The asterisk symbol represents entire character strings For instance in order to check all files with the file extension exe enter exe For example to check fi
190. or you can send messages to individual clients or client groups to quickly and conveniently inform users about changes to their status The messages are displayed as a small popup on the bottom right of the client desktop To create a message simply click the Send message button In the dialogue you can select the clients you want to send the message to If you want a message to be accessible only to certain users of a client computer or network enter their login names under User name Type your information in the Message field and click the OK button 54 G Data Administrator WY G Data Administrator Admin Organization Options Search for client 4 b All ManagementServers a C localhost By DemoGdata dh MobileDevices ih Notebooks dh Servers dh Workstations EJ AWSERVER13 E veB200zc E pes201zc SB winzkevat wnan Bwnz vars SB winxevats gt oth Exchange Or BIANA License management P Alx aa Client T Date Time T Message l le i Dashboard SPYS Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics E WIN7 VAT3 12 20 2012 4 58 28 PM E WINXPVATI 12 20 2012 4 58 28 PM E WIN7 VAT3 12 20 2012 4 58 21 PM E WINXPVATI 12 20 2012 4 58 21 PM E WIN7 VAT3 12 20 2012 4 57 22 PM E WINXPVATI 12 20 2012 4 57 22 PM E WIN7 VAT3 12 20 2012 4 57 19 PM WINXPVATI 12 20 2012 4 57 19 PM E WIN7 VAT 12 20 2012 4 57 16 PM E WINXPVAT1 12 20 2012 4 57 1
191. or later use The Import backup archives button enables access to backups that are stored in other folders Software updates Under Staged distribution you can set the distribution of software updates to be staged or to happen immediately Staged distribution ensures that software updates do not cause problems in the network environment and decreases the system load of simultaneous program updates UD Server settings Erm So S a T Software updates Staged distributior Distr wh Development gt go gt O dh Sales ED AWSERVER13 oO E ves200zc Number of stages 3 Release next stage after 3 days Coo E ce When you enable staged distribution you can choose to have the clients for the first group be defined automatically or manually pick the clients that should be the first to receive software updates You can also choose the total number of groups and the delay between distribution among the different groups Mobile The tab Mobile features some general settings for mobile device management If they have not been configured using the Server setup wizard authentication for mobile clients and Google Cloud Messaging should be configured here Under Authentication for mobile clients enter a Password with which mobile devices will have to authenticate with the ManagementServer To be able to use emergency actions you have to enter the Sender ID and API key of your Google Cloud Me
192. ories specially defined for individual clients are preserved The same procedure also goes for monitor exceptions To allow the client to perform a virus scan when the computer is idle tick Idle scan By clicking the Analysis scope button you can define the scan scope which includes all local hard drives by default G Data Software Special note for Linux file servers when selecting directory exceptions the root drive and all shares are listed This way drive directory and file exceptions can be created 4 4 3 2 Monitor The Monitor panel allows you to configure the most important aspects of client protection The monitor should not be disabled as it provides real time protection against malware It is therefore recommended that the monitor is only switched off if there is a justified reason for doing so e g error detection or troubleshooting It is possible to define exceptions for the monitor If an application suffers from performance loss due to use of the monitor exceptions can be added for the relevant program files or processes excluded files are then no longer checked by the monitor Setting up monitoring exceptions can represent a security risk W G Data Administrator Eas Admin Organization Options License management Dee Client settings foc eur Se ea en a ee Gra Oeae 4 localhost Settings Apply b Bh Demo Gdata Monitor status Z Enabled recommended b gh MobileDevices Use
193. ote host remote port and reason for the decision about allowing or blocking the connection a G Data Personal Firewall lelak Settings Help Firewall Log N All Internet and network connections including allowed and blocked connections Last action Protocol Application Local port Direction 2 21 2014 3 25 55 PM svchost exe Ilmnr 5355 lt A 2 21 2014 3 25 55 PM UDP svchost exe Ilmnr 5355 lt Status oo 2 21 2014 3 25 50PM_UDP svchost exe Imnr 5355 lt oo 2 21 2014 3 25 50 PM UDP svchost exe Ilmnr 5355 lt En Networks 2 21 2014 3 25 48 PM UDP svchost exe Ilmnr 5355 lt S 2 21 2014 3 25 48 PM UDP svchost exe Imnr 5355 lt S Rule sets oo 2 21 2014 3 25 39 PM UDP svchost exe limnr 5355 lt K E v 2 21 2014 3 25 39 PM UDP svchost exe Ilmnr 5355 lt U Log 2 21 2014 3 25 28 PM UDP svchost exe limnr 5355 lt E J o 2 21 2014 3 25 28PM_UDP svchost exe limnr 5355 lt v 2 21 2014 3 25 16 PM UDP svchost exe Ilmnr 5355 lt oo 2 21 2014 3 25 16 PM UDP svchost exe Ilmnr 5355 lt A 2 21 2014 3 25 12 PM UDP svchost exe 52235 gt oo 2 21 2014 3 25 12PM_ UDP svchost exe 59037 gt A 2 21 2014 3 25 12PM_ UDP svchost exe 60525 gt oo 2 21 2014 3 25 12 PM UDP svchost exe Ilmnr 5355 lt S 2 21 2014 3 25 12 PM UDP svchost exe Imnr 5355 lt of 2 21 2014 3 25 07 PM UDP svchost exe Ilmnr 5355 lt S 2 21 2014 3 25 07 PM UDP svchost exe Ilmnr 5355 lt pe 4 m r Delete all De
194. ou get an overview of all enabled computers in the network You can also manually add and enable computers by name Alternatively the Clients module allows you to install G Data Security Client by selecting one or more machines in the client list right clicking on them and choosing Install G Data Security Client After selecting the machines both procedures carry on similarly An input window appears in which you should enter the User name Password and Domain with access rights on the clients After selecting a display language for the client you will be asked if G Data Firewall should be installed on the client PCs at the same time The firewall is only available with G Data ClientSecurity G Data EndpointProtection and G Data SmallBusiness Security solutions After initializing a remote installation the Installation overview window is automatically opened After a successful installation the client needs to be rebooted When using Active Directory integration you can choose to automatically attempt to install G Data Security Client on newly added computers The same prerequisites apply Remote installation can be completed in two ways If the clients meet the necessary prerequisites the files are copied directly and entries are made in the registry If the server can only access the hard drive and not the registry or if other system prerequisites are not met the entire setup program is copied to the client and started automatically at the
195. our firewall will be and how often the firewall will prompt you e Security Enable or disable the firewall This option is only available if it has been enabled in G Data Administrator Firewall gt Overview gt Allow user to enable disable the firewall e Mode The firewall can be operated in automatic autopilot mode or in manual rule sets mode Changing this option client side is only possible if the client is being used outside the ManagementServer network and if it has been enabled 115 G Data Software in G Data Administrator Firewall gt Overview gt Allow user to change the off site configuration e Networks Open the Networks panel which shows the networks that your computer is connected to as well as the rule sets that are used e Prevented attacks When the firewall registers an attack on your computer it is prevented and logged here e Application radar Show which programs are currently being blocked by the firewall If you want to allow one of the blocked applications to use the network select it and then click the Allow button 7 8 2 Networks The Networks module lists all networks to which your computer is connected as well as which rule set is protecting the respective network Select a network and click Edit to view details and to configure the settings for this network Network settings can only be edited if that has been specifically allowed Firewall gt Overview gt Allow user
196. pam com or domain e g megaspam com that you want to mark as suspected spam in the Addresses Domains field and G Data MailSecurity will process messages from that sender and or sender domain as emails with very high spam probability You can use the Import button to insert predefined lists of email addresses or domains into the blacklist Each address or domain must be listed on a separate line A plain text file format is used for storing this list you can create this list using an editor like Windows Notepad With the Export button you can export blacklists as text files Filter spam ex Key Advanced settings Whitelist Blacklist Realtime blacklists Keywords mail text Content fiter Keywords subject Riter F Use list A mail will always be treated as spam if the sender or sender domain has been added to the blacklist Addresses Domains baddomain com i Ji ok Cance ay Hep 147 G Data Software Real time blacklists You can find blacklists on the Internet that contain the IP addresses of servers known to send spam G Data MailSecurity uses DNS enquiries to the real time blacklists RBLs to determine whether the sending server is listed If it is this increases the probability that it is spam In general we recommend that you use the default setting here although you can also add your own Internet addresses for blacklists under Black
197. pdate server region Europe St Gta gt Cn User account Under User account please enter a user account on the MailGateway computer that has access to the Internet Warning Do not mix up the entries you make on the Access data and User account tabs Internet update settings x a Access data _Intemet update schedule Virus database Intemet settings User account Please specify a user account with intemet access on the gateway computer User account Password Domain Aa 136 G Data MailSecurity Administrator 9 2 2 2 Virus signatures The Update virus database and Update status buttons enable you to start a virus signature update regardless of the scheduled update checks 9 2 2 3 Program files The Software update button lets you update the G Data MailSecurity program files as soon as changes or improvements have been made 9 3 Modules Using G Data MailSecurity is generally self explanatory and clearly structured Using the various tabs on the left hand side of the Administrator interface you can select the relevant module where you can carry out different actions configure settings or review processes 9 3 1 Status In the Status module you will find basic information about the current status of your system and MailGateway 5 AWSERVER13 G Data MailSecurity Administrator cy Options y Update f Spam filter Help
198. ponding settings window appears menu bar Options gt Incoming SMTP and Options gt Incoming POP3 and you can configure incoming email processing Virus scan for incoming email Scanning incoming email stops infected files from reaching your network If you double click this entry the corresponding settings window appears menu bar Options gt Virus check and you can configure incoming email scanning Process outgoing email Processing outgoing email ensures that email is checked by the MailGateway before being forwarded to the recipient If you double click this entry the corresponding settings window appears menu bar Options gt Outgoing SMTP and you can configure outgoing email processing Virus scan for outgoing email Scanning outgoing email stops infected files from being sent out from your network If you double click this entry the corresponding settings window appears menu bar Options gt Virus check and you can configure outgoing email scanning OutbreakShield OutbreakShield lets you detect and neutralize malware in mass mails before updated signatures are available OutbreakShield uses the Internet to monitor increased volumes of suspicious email enabling it to close the window between the mass email outbreak and its containment with specially adapted signatures practically in real time Automatic updates Virus signatures can be updated separately but you should enable the automatic updates option If you
199. portManager Statistics Search for client P eic a localhost Settings E Aiii Z Enable G Data Firewall Run in internal network Apply aa Z Report blocked applications C Allow user to enable disable the firewall P ah MobileDevices Run outside internal network pean gt gh Notebooks Autopilot rule set Z Use off site configuration for mobile clients gt dh Seners B Internal Rule set _ amp External 5 C Allow user to change the off site configuration pan The off site configuration can only be used if the firewall does not run in autopilot mode when connected to the EJ awserveri3 internal network J oeezoozc Woe Ea a column header to this area to group by that column SB wnzkevar Z client T G Data Firewall Y Autopilot ruleset F blocked applications 7 Client firewall Ye E wnan W workstanonoi Notinstaled Internal report blocked B wmwvan z E WORKSTATIONO2 Not installed Internat report blocked E winxevatz a E WoRKSTATIONO3 Not installed E internat report blocked eee W workstaTioNos Notinstalled Internal report blocked Z Ww worKstaTIonos Not installed Internal report blocked W workstaTioNos Not installed Internal report blocked Z worksTaTIONo7 Notinstalled Internal report blocked W Wa workstaTIONos Notinstaled Internal report blocked zl E wORKSTATIONO9 Not installed E Internat report blocked a E worksTATION10 Not installed BD Intemat report blocked
200. protection Hig Protected apps SB incoming fitter Dutgoing filter s permitted to request the telephone s precise location Se Hide contacts s permitted to read system log files K Settings 10 2 2 Protected apps App protection allows you to block certain apps from being used on the device Using password protection apps like Play Store can be blocked The first time you open the App protection module you will be prompted to enter a Password and Email address if they have not already been defined in G Data Administrator under Mobile settings gt Apps and a Security question Internet Security Company 4 Pratected apps W Security center Internet Security mE 3G virus scan Lost Stolen B Settings amp Web protection 2 Permissions ne Z ncoming filter SP Outgoing filter Se tide contacts K Settings 158 G Data Internet Security for Android Check Enable app protection to activate the option The settings can be changed at any time by tapping the Settings icon in the top right corner The main panel of Protected apps shows you the list of protected apps To add an app tap the button in the top right corner You can select apps using different views Recommended Downloaded and All Select an app to add it to the list It is automatically protected and will ask for the password when it is launched To remove an app from the list select it and tap the Done button in the top le
201. provide the client with different permissions for example to allow checking of network shares This account needs to have administrator permissions on the client Updates The Updates section lets you define virus signature and program file update settings 56 Update virus signatures automatically Enables automatic updating of the virus signatures The clients periodically check whether new virus signatures exist on the G Data ManagementServer If new virus signatures are available they are automatically installed on the client Update program files automatically Enables automatic updating of the program files The clients periodically check whether updated program files exist on the G Data ManagementsServer If updated program files are available they are automatically installed on the client A client reboot may be necessary after the update Dependent on the setting under Reboot after update the client user has the option of postponing the completion of the update Reboot after update Select Open message box on client to inform a user that they should restart their client computer at a convenient time Create report will create a report in the Reports module or select Force reboot to automatically force a restart Update settings Define where clients obtain their virus signature updates There is the option to download virus signatures directly from the ManagementServer clients will then check for updates every synchronization
202. ption is only available if the client is inside the company network and should only be enabled for competent users e Use off site configuration for mobile clients In the off site configuration firewall rule sets for your company network are automatically replaced by default off site rule sets This enables mobile computers to be optimally protected whenever they are outside of the G Data ManagementServer network As soon as the mobile computer is reconnected to the G Data ManagementServer network these default rule sets are automatically replaced by the rule sets that apply to that particular client within your network e Allow user to change the off site configuration Allow users to configure their firewall when they are outside of the network As soon as the mobile computer reconnects to the G Data ManagementServer the changes made will be replaced with the rules put in place by the network administrator for this client The off site configuration can only be used if the firewall in the company network is not being operated in autopilot mode If a client in the company network uses autopilot settings for the firewall the autopilot settings can also be used when the client is not connected to the network 89 G Data Software UD G Data Administrator Se Admin Organization Firewall Options License management 1 gt RLA Dashboard Clients Client settings Mobile settings Tasks PolicyManager ESN PatchManager Reports Re
203. r network G Data WebAdministrator can be used with every desktop web browser With G Data MobileAdministrator you can even configure the software on the road using a mobile web browser 2 1 1 System requirements The following system requirements apply to the G Data range of products Minimum system requirements G Data ManagementServer G Data MailSecurity MailGateway e Operating system Windows 8 Windows 7 Windows Vista Windows XP SP3 32 bits Windows Server 2012 Windows Server 2008 R2 Windows Server 2008 or Windows Server 2003 e RAM 1 GB G Data Administrator G Data WebAdministrator G Data MailSecurity Administrator e Operating system Windows 8 Windows 7 Windows Vista Windows XP SP3 32 bits Windows Server 2012 Windows Server 2008 R2 Windows Server 2008 or Windows Server 2003 G Data MobileAdministrator e Operating system Windows 8 Windows 7 Windows Server 2012 or Windows Server 2008 R2 G Data Security Client e Operating system Windows 8 Windows 7 Windows Vista Windows XP SP3 32 bits Windows Server 2012 Windows Server 2008 R2 Windows Server 2008 Windows Server 2003 or Linux kernel 2 6 25 or higher e RAM 1 GB G Data Internet Security for Android e Operating system Android 2 1 or higher e Disk space 14 MB G Data MailSecurity for Exchange 64 bits Exchange plugin e Mail server Microsoft Exchange Server 2013 Microsoft Exchange Server 2010 or Microsoft Exchange Server 2007 SP1 Installati
204. ral you should enable Check outgoing email for viruses and also have Do not send infected messages activated by default This way viruses cannot leave your network and won t cause any damage to your business partners If a virus is found you have a wide range of notification options You can choose Notify sender of infected message and under Send virus alert to the following persons notify a system administrator or responsible employee of the fact that a virus was about to be sent from your network Please separate multiple recipient addresses with a semicolon You can customize the notification texts To do this simply click the button to the right Wildcards can be used here to add information to the Subject and Email text fields the same wildcards as the ones that are used in the Incoming POP3 gt Filter settings In addition under Attach report to outgoing uninfected email you have the option of sending email checked by G Data MailSecurity with a note at the end of the email text pointing out explicitly that this mail has been checked by G Data MailSecurity You can customise this report or leave it out entirely G Data ManagementServer If MailGateway is being operated as part of a G Data business solution you can enable Report virus results to G Data ManagementServer to make sure that G Data ManagementsServer is informed of MailGateway virus discoveries so that it can provide you with a comprehensive overview of virus infecti
205. re defined rule Pet C explorer exe ssdp UDP 8 Allow Outbound Pre defined rule C 2 FireFox 9 Allow Outbound _ Pre defined rule C Wc Data AntiVirus Proxy Service 10 Allow In outbound Pre defined rule C amp G Data Management Database Configuration 11 Allow Outbound Pre defined rule C UG Data Management Server Service 12 Allow In outbound Pre defined rule C amp G Data Management Server Update B Allow Outbound Pre defined rule C G Data Remote Client Installation 4 Allow Outbound Pre defined rule C Wc Data Security Client Service 15 Allow In outbound Pre defined rule C G Data Security Client Update 16 Allow Outbound Pre defined rule M A ennast as Alin P N Ren slnfinnd mln Connected localhost Administrator Status as per 9 12 2013 3 17 50 PM Entries 62 Selected 0 New rule set Under Rule set click New to open the New rule set window Enter a Name for the rule set and an optional Note or comment Select Stealth mode enabled to block requests to the computer that try to verify a port s accessibility This makes it difficult for attackers to obtain system information UD Rule set for trusted network Se Select default rules from default rule set Name T Access Y Direction Y Note 7 i NET Runtime Optimization Service Allow Outbound Pre defined rule Acrobat Reader Outbound Pre defined rule amp A
206. re you select which of the G Data software components you want to install G Data setup Select the components to be installed G Data Management Server G Data Bootmedium Wizard The ManagementServer supervises and controls all workstation notebook Using the Bootmedium Wizard you can create a bootable CD for virus and file server clients providing them with virus signature updates The analysis using current virus signatures installation includes the G Data Administrator Sa G Data Administrator G Data WebAdministrator G Data Administrator is the graphical front end for the ManagementServer It WebAdministrator is a web based control panel for the ManagementServer It can be installed on and started from any computer on the network can be started using a web browser G Data Security Client The client software provides virus protection for the clients and runs ManagementServer jobs in the background without a user interface G Data MobileAdministrator The MobileAdministrator is a web based control panel for the ManagementServer It can be started using a mobile web browser 2 A G Data IntemetSecurity The IntemetSecurity software protects non networked computers during Intemet access Close e G Data ManagementServer Install this component first G Data ManagementServer will be used to manage all G Data related settings and updates G Data ManagementServer lies at the core of the G Data architec
207. replacement text informs the user that a suspicious or infected email was not delivered If you have selected Delete message as action on the Virus check gt Inbound tab OutbreakShield will not send a notification for rejected email In this case all infected emails including those that have been only detected by OutbreakShield are deleted directly e Phishing protection Enable Phishing protection to filter out emails that try to obtain passwords credit card numbers or other personally identifiable information by posing as an email from a legitimate institution 130 Options Incoming SMTP Outgoing SMTP incoming POP3 penpe Scan parameters Queue Advanced Logging Scan parameters Use engines Both engines recommended x Fie types Allfiles F Heuristics V Check archives V Outbreak Shield Settings F Phishing protection 9 2 1 6 Queue On the Queue tab you can specify how often and at what intervals email that cannot be forwarded from MailGateway to the mail server should be resent Options ees Incoming SMTP Outgoing SMTP incoming POP3 Vius check Scan parameters Queue Advanced Logging Undeliverable messages Repeat interval hours 0 25 0 5 1 4 Eror waiting time hours 24 Notfy senders of messages in the queue every 4 hours O off Reset to default values Size limit Limit the size of the queue i i i
208. ring with which the file extension should be extended exe_danger for instance In this manner the execution of a file by simple clicking is prevented Under Insert message in mail text you can inform the recipient of the filtered email that an attachment was deleted or renamed based on a filter rule 9 3 2 6 Content filter You can use the content filter to easily block email that contains certain subjects or text To do this under Regular expression simply enter the keywords and expressions that G Data MailSecurity should respond to Under Search scope specify which parts of an email are to be scanned for these expressions You can use the New button on the right to enter text that triggers a filter action It is possible to use the logical operators AND and OR to link text components with each another If you enter alcohol AND drugs the filter would be activated with an email that for instance has the terms alcoholand drugs but not with an email that only has the term alcohol or only the term drugs The AND logical operator requires that all components that have been linked with AND be present while the OR 143 G Data Software operator requires that at least one of the elements be present You can also combine any search terms of your choice without the input help under Regular expression To do so simply enter the search terms and link them using a logical operator Or corresponds to the vertical line Shift And correspon
209. rmation In case of doubt contact your G Data reseller or the relevant distributor Upon entering the registration number your product is activated The access data generated user name and password are displayed immediately following successful registration Be sure to make a note of your user name and password and save them somewhere Following successful registration it is no longer necessary to re enter the license key If you have problems entering your registration number verify that you have entered it correctly A capital I for India is often misread as the number 1 or the letter I for Lima The same applies to B and 8 G and 6 Z and a Enter access data If the G Data software has already been installed before you will have received access data user name amp password To reinstall the G Data software enter the access data here Activate later If you just want to look over the software first or if the access data are temporarily unavailable the installation can take place without entering the data However if you do so no Internet updates will be downloaded The G Data software can only effectively protect your computer if it is completely up to date Using the software without activating it will protect you insufficiently You can enter your registration number or access data subsequently at any time See also the notes on subsequent activation of the G Data software in the FAQ section Please note if
210. roduction In these days of global networking and the massive security risks it incurs virus protection is no longer just for IT specialists It has to be considered within the context of a comprehensive company wide risk management strategy at the highest level of management Computer network downtime caused by malware strikes a company where it is most vulnerable The result downtime for business critical systems loss of data and loss of important communication channels Computer viruses can cause damage to a company that it can never recover from G Data provides high end virus protection for your entire network For many years G Data products leading security capabilities have been awarded excellent scores in numerous tests G Data business software is based on central configuration and administration plus as much automation as possible All clients whether workstations notebooks or file servers are controlled centrally Client processes run invisibly in the background and automatic Internet updates enable extremely fast reaction times in the event of a serious virus attack Central control via G Data ManagementsServer facilitates installation configuration updates remote control and automation for the entire network This reduces system administration workload and saves time and money We wish you successful secure work with your G Data business software Your G Data Team Software upgrades This documentation describes the funct
211. rs of the client in question or only to users who do not have administrator rights on the client computer Under Mode specify whether the application control list should be a whitelist or a blacklist Whitelist Only the applications listed here can be used on the client computer Blacklist Applications listed here cannot be used on the client computer UD G Data Administrator gt 8 Admin Organization Options License management gt 4 4 lt N Sid Dashboard Clients Client settings Mobile settings Tasks ZOTE Firewall PatchManager Reports ReportManager Statistics Searc P E a pu SJ Application control Soevice cont Gwe ntent control Rreme time a L All ManagementServers P RSE it Be Status Different settings Appy eee Mode Blacklist only block listed applications z dh Mobik ens a tiahi 7 Allow user to report blocked applications gt sa Notebooks soii Drag a column header to this area to group by that column Reset all filters gt a Servers Ruletype Content T Note T ab Workstations Vendor Blizzard Entertainment World of Worcraft EJ awserveri3 Vendor BitTorrent Inc BitTorrent Inc E veB200zc File Crysis exe Crysis Shooter a AE File Annol70Lexe Anno 1701 BB wnacevar File emuleexe eMule wnan File wireshark exe Wireshark Bwin7 var3 Directory C Program Files Games Microsoft Games E winxpvati gt Exchange New Default rules Edit Delete Information
212. rus signature update can be executed completely automatically Click the Register with server button if you have not yet registered yet Simply enter the registration number that can be found on your purchase certificate and your customer data and click Login The login data user name and password will be displayed immediately You should write down this data and keep it in a safe place Of course you need an Internet connection to log on to the server and also for updating virus signatures via the Internet 134 Internet update settings So _ Intemet update schedule Virus database Intemet settings User account Access data Enter the access data you received when registering with the update server User name Register with server Password F Version check Internet update schedule Virus database The Internet update schedule Virus database tab allows you to specify when the automatic update should run and how often You set up the default schedule under Run by selecting a schedule and entering a Time G Data MailSecurity Administrator For Daily updates you can use the Weekday setting to specify if MailGateway should only carry out the update on working days or just every other day or specifically on weekends only when it is not being used for work To change the time and date under Time simply highlight the item you wish to change e g day time month year with the mouse and
213. s Search for client P K SQls Isle POSOBEBS926 38 3 2 27213 8 29 2013 4 J All ManagementServers Drag a column header to this area to group by that column 4 Biocathost Status T cient T Date Time F Reported by 7 virus a H Bh Demo Gdats W File deleted WORKSTATIONS 8 28 2013 2 01 04 PM Monitor EICAR Test File not a virus Engine A ah MobileDevices 1D Virus removed WORKSTATION92 8 28 2013 2 01 03 PM Monitor EICAR Test File not a virus Engine A gt gh Notebooks E virus found WORKSTATION91 8 28 2013 2 01 03 PM Monitor EICAR Test File not a virus Engine A dh Servers Quarantine file moved to quarantine WORKSTATIONS9 8 28 2013 2 01 03 PM Scanner EICAR Test File not a virus Engine A gt ab Workstations 3 File deleted WORKSTATION8S 8 28 2013 2 01 03 PM Scanner EICAR Test File not a virus Engine A By awservers3 FE Virus removed WORKSTATIONS3 8 28 2013 2 01 02 PM Scanner EICAR Test File not a virus Engine A E vee200zc Web content blocked WORKSTATIONSO 8 28 2013 2 01 02 PM Web content control E vee201z D Application s blocked WORKSTATIONS 8 28 2013 2 01 02 PM Application control SB winzxevar Application s blocked WORKSTATION73 8 28 2013 2 01 01 PM Firewall blocked application E wnan virus found WORKSTATION71 8 28 2013 2 01 01 PM BankGuard ZeuS Fingerprint 04043737 BS w7 varz 83 Quarantine file moved to quarantine WORKSTATION70 8 28 2013 2 01 01 PM Monitor EICAR Test File not a virus Engine A
214. s select Assign to AD group and choose the LDAP server The Select button will provide a list of available servers It is also possible to connect to another domain by clicking Add The option Automatically install G Data Security Client on newly added computers will initiate a remote installation of G Data Security Client for every computer that is added to the Active Directory domain as long as it meets the remote installation requirements Enter User name and Password for a domain account with sufficient permissions on clients as well as the installation Language By default G Data ManagementServer compares its data status to Active Directory every six hours This value can be changed under Server settings gt Synchronization 4 3 2 Organization Clients can be managed in the client management area on the left side of the interface Additional options are available through the Organization menu 4 3 2 1 Refresh The Refresh function updates the client list in the client management area 42 G Data Administrator 4 3 2 2 Show disabled clients Using the option Show disabled clients clients that have not yet been enabled can be shown Disabled clients are shown as greyed out icons Client enabled Client disabled 4 3 2 3 Create new group Clients can be combined into groups to apply settings to multiple clients at once Easily distinguishable security zones can be defined since all settings can be made for both si
215. s to report the status of a scan process to the server Permissions can be granted to the users for pausing or aborting the job via the system tray context menu Shut down client after scan job if no user is logged on provides another way to help reduce your administrative load If a computer is not switched on at the scheduled time of a periodic scan job the scan job can be started 77 G Data Software later by ticking Run scan job later if a client is not powered up at the scheduled time UD New scan job run periodically Job scheduling SESTER Gees Client AW2008R2BASE Job name lt new scan job gt Schedule Weekdays hourly monthly daily On system startup weekly Time 13 minute s past the hour C Use start date Ente Settings C Allow the user to halt or cancel the scan job Z Notify the user when a virus has been found Z Report scan progress to the ManagementServer every 2 minutes C Shut down client after scan job if no user is logged on Z Run scan job later if a client is not powered up at the scheduled time oK Cancel For periodic scan jobs this tab also specifies when and at what intervals the virus check should occur If you select On system startup the scheduling defaults no longer apply and the G Data software will run the scan each time your computer is restarted For Daily jobs you can specify under Weekdays on which specific days of the week the job s
216. s which can both be automated In the first step G Data ManagementsServer downloads the latest files from the G Data update server In the second step the new files are distributed to the clients see Client settings gt General 32 U9 Internet update uE Program files Eeee Eae Program files Client Current version Last program update 8 29 2013 5 25 31 PM Status Update started Update status Run update now Automatic updates Update interval hourly Automatic updates Program files Server To update the ManagementServer program files access Internet Update via the Windows menu of the ManagementServer OK Cancel Update status Check the status of program file update Run update now Carry out an immediate update of the program files The current program files are downloaded to be distributed to the clients afterwards Automatic updates Configure Internet updates to be run automatically Check Run update periodically and specify when the update is to be carried out To enable automatic updating your G Data ManagementServer must be connected to the Internet and you must have entered the user name and password that you have received upon registration If the server connects to the Internet via a proxy server your proxy credentials must be entered under Access data and settings gt Proxy settings G Data Administrator To update
217. s may run more slowly during the analysis or low priority the analysis requires more time so that other applications can continue to run relatively unaffected Which priority to choose mostly depends on the point of time at which the virus check will be carried out e Settings Specify the additional virus analyses you want the G Data software to perform The default options are the recommended ones but depending on the type of application the time gained by omitting these checks may outweigh the slightly reduced level of security Most of the settings are identical to those found on the panel Client settings gt Monitor but the following ones are specific to scan jobs o Check for rootkits A rootkit attempts to evade conventional virus detection methods You can use this function to specifically search for rootkits without checking all hard drives and files o Useall available CPUs With this option you can distribute the virus checking load on systems with multiple processor kernels over all the processors with the result that the virus checking runs considerably quicker The downside to this option is that less processing power is available for other applications This option should only be used if the scan job is executed at times when the system is not regularly used e g at night YB New scan job run once CESTI Scanner MEI vere Use engines Both engines optimized performance recommended II If an infected file
218. s per unknown 4 4 4 1 General The General section lets you set up malware protection There are two scan modes that can be enabled and configured The On access scan checks all e mails attachments and other objects for malware as soon as they are accessed If any malicious content is found the measures defined under Scan settings are carried out In addition to or as replacement for the On access scan you can enable the Idle scan Using specific parameters it will scan Exchange objects only when Exchange Server is idle to avoid decreasing Exchange performance If Exchange is being run on a multi purpose server the Idle scan should be limited to certain time slots to make sure that the performance of other server processes is not affected e Only run idle scan within the following time frame Define a Start time and an End time to run Idle scan only at a specific time of the day for example at night e Run idle scan all day on weekends Run Idle scan the whole day on Saturday and Sunday e Perform idle scan only on files that have been modified after a certain time Only objects that have been used recently will be scanned by the Idle scan 4 4 4 2 Scan settings The scan settings for on access and idle scan are similar to those used for Monitor and Scan jobs 66 G Data Administrator e Use engines Define whether both scan engines should be used or only one The recommended setting is to use both scan engines in optimi
219. s to main server 1 gt minute LZ Send new reports to the main server immediately Active Directory Z Synchronize Active Directory regularly Last automatic synchronization 8 28 2013 11 32 44 AM Interval 6 hour s OK Cancel Load limit If the checkbox next to Enable load limit is ticked you can specify how many clients can simultaneously perform the actions listed The load can be distributed so that simultaneous updates or reports do not cause an increase in network latency 37 G Data Software Server settings w ng crm Y Enable load limit Maximum number of clients Simultaneous reading Simultaneous synchronization Simultaneous update download Simultaneous sending of reports Simultaneous upload of large files Simultaneous download of large files Settings Email Synchronization Load limit Backup Softwareupdates Mobile 8888 8 8 OK Backup To make sure that backups are carried out successfully enough free disk space needs to be available on the client backup cache and on the server backup storage For server and clients you can define threshold values for warning messages and error messages When the amount of free disk space on the client or the server drops below the warning threshold a warning message will be added to the Reports module and the client cache will be automatical
220. shed G Data ManagementServer has a central Quarantine folder Suspicious files can be encrypted and secured deleted disinfected or forwarded to the G Data Security Labs if necessary G Data ManagementServer is managed using G Data Administrator When you exit G Data Administrator G Data ManagementServer continues to be active in the background and manages the processes you have set up for the clients 24 G Data Administrator 4 G Data Administrator G Data Administrator is the administration software for G Data ManagementServer It enables management of settings and updates for all G Data clients in the network G Data Administrator is password protected and can be installed to and launched from any Windows computer in the network Scan jobs backup jobs security monitoring and many more settings can be managed through Administrator Automatic client installations and software and virus signature updates are also defined using Administrator UD G Data Administrator 2 8 Admin Organization Options License management 1 gt KIAIN ETIE Clients Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics Se ient P a gt All ManagementServers 4 C localhost G Data Security Client 229 229 Fa Demo Gdata Virus signatures 22 250 hy MobileDevices ly Notebooks Monitor 229 229 P dh Servers Email checking 229 229 M lt 24 hours dh Workstations
221. ssaging account Free accounts for this push notification framework can be registered at code google com apis console Consult the Reference Guide for more 39 G Data Software information about registering a Google Cloud Messaging account UD Server settings l o 8 Settings Email Synchronization Load limit Backup Software updates Mobile Authentication for mobile clients Password eeeccceccsce Edit Google Cloud Messaging Sender ID API key L OK Cancel 4 2 3 License management Using the License overview you can have an overview of the amount of G Data software licenses that have been installed in your network If you need additional licenses you can get in contact with the G Data UpgradeCenter at any time by clicking Extend licenses UD License overview Se The following licenses are in use Number of licenses Product 212 Licenses G Data EndpointProtection PatchManagement Enterprise On 212 Total licenses LI Extended view Extend licenses Export Close Using the button Export you can export the overview to a text file By selecting Extended view you get specific information about the servers on which the licenses are being used 4 3 Managing clients Before clients can be managed using G Data Administrator they need to be added to its client management area and enabled There are several ways to a
222. stablished between the client and G Data ManagementServer Check the network and port forwarding settings The client cannot determine the IP address of the server i e the name resolution is not functioning The connection can be tested using the telnet command at the prompt Port 7161 must be accessible on the server and port 7167 7169 must be accessible on the client Check the connection using the 167 G Data Software telnet lt servername gt lt portnum ber gt command Note that under Windows Vista Windows 7 and Server 2008 R2 the telnet command is not available by default Enable the relevant Windows function or add it to the server as a new feature If the connection from the client to the server is intact an array of cryptic characters appears in the prompt If the connection from the server to the client is intact an empty input window appears 11 4 2 My mailbox was moved to the quarantine This can happen if an infected email is found in the mailbox To move the file back close the mail program on the affected client and delete any possibly newly created archive file Then use G Data Administrator to open the associated report and click on Quarantine move back Please contact our support team if moving back fails 11 4 3 Connect to the MMS via its IP address instead of its name The server name will be requested during the installation but must be replaced by the IP address if you want to connect to the MMS only v
223. system menu Settings gt Security gt Device Administration After opening the APK file and confirming its requested permissions G Data Internet Security will be installed and can be started from the Android app menu Through the Settings menu the app can be configured to allow remote administration Tick the checkbox Allow remote administration and enter the name or IP address of the ManagementServer under Server address Under Device name you can enter a name 22 Installation that will be used to identify the device in G Data Administrator Password should contain the password that you entered in G Data Administrator which is also listed in the installation e mail The device will be listed among the other clients in G Data Administrator s Clients module and can be managed from there If it does not appear automatically reboot the device to force it to check in with the G Data ManagementServer 23 G Data Software 3 G Data ManagementServer G Data ManagementsServer lies at the core of the G Data architecture it administers the clients automatically requests the latest software and virus signature updates from the G Data UpdateServer and controls the virus protection within the network G Data ManagementsServer uses the TCP IP protocol to communicate with the clients For clients that are temporarily disconnected from G Data ManagementServer jobs are automatically accumulated and synchronized when communication is re establi
224. t only for virus reports Delete the selected report and remove the file from the quarantine e Add URL to whitelist only for Web content control reports Add the requested URL to the global whitelist e Add URL to blacklist only for Web content control reports Add the requested URL to the global blacklist e Delete report Deletes the selected reports If reports to which a quarantine file belongs are to be deleted you must confirm the deletion once more In this case the quarantined files are also deleted e Delete dependent reports If a virus alert or a report is displayed twice or more due to tasks being performed multiple times you can delete the duplicate entries from the log file using this option The toolbar of the Reports module offers a wide array of options and filter settings 98 peuteuy EO TXO u A gagegage a G Data Administrator Refresh Delete Print Print report s In the selection screen that appears you can specify which details and areas you would like to print Print preview Preview the report s to be printed Remove virus Move to quarantine Delete file Move file back from quarantine Clean file amp move back from quarantine Hide dependent reports Hide read reports All reports Only errors and information Only email reports Only reports of non removed viruses Only quarantine reports Only quarantine contents Only HTTP reports Only BankGuard reports On
225. t an excessive amount of email traffic in the event of a massive virus attack To enable mobile device management some basic settings have to be configured In the next step enter a password with which mobile devices will have to authenticate with the ManagementServer To be able to use emergency actions you have to enter the Sender ID and API key of your Google Cloud Messaging account For more information about Google Cloud Messaging accounts or to change the mobile settings afterward see Server settings gt Mobile Click Finish to close the wizard If you checked the option Automatically install client software on the enabled computers the Server setup wizard will conclude by initiating the remote installation of G Data Security Client for all selected machines 4 2 1 2 Display log The log file offers an overview of the latest server and client side software actions W Log file Se Log view Client group Activity Period EM Server v 4 All servers An gt 23 3 17 2013 9 16 2013 Date Time Y Client V Activity Y Content 9 16 2013 12 25 15 PM AWSERVER13 Update Internet update for the virus database executed successfully Version AVA_22 125 9 16 2013 11 25 53 AM AWSERVER13 Update Internet update for the virus database executed successfully Version AVA_22 125 9 16 2013 10 28 51 AM AWSERVER13 Update Internet update for the virus database executed successfully Version AVA_22 125 9 16 2013 9 17 22 AM AWSER
226. t be adjusted for Linux clients are highlighted using a red exclamation mark 4 1 Starting G Data Administrator The administration tool for managing G Data ManagementServer is accessed by clicking on the G Data Administrator option in the program group Start gt All Programs gt G Data gt G Data Administrator 25 G Data Software YD G Data Administrator Server Password Language Authentication User name GDATA Login English localhost Windows authentication domain username eeccceee C Manage multiple servers OK Ce When starting G Data Administrator you will be prompted for the Server Authentication User name and Password In the Server field enter the name of the computer on which G Data ManagementServer was installed then select your authentication type e Windows authentication Log in using your Windows administrator credentials e Integrated authentication Log in using G Data ManagementServer s integrated authentication system Integrated authentication accounts can be set up using the function Manage users Click the arrow next to the question mark menu to reveal two additional options About G Data Administrator shows version information Reset settings allows you to reset all settings that Administrator has saved such as display options 4 2 Configuring G Data Administrator Before any clients are configured it is recommended to w
227. t on the server with access rights on the clients User name Administrator Password eeccccccoccce Domain DOMAIN OK Cancel In addition to the required port configuration the machines must meet the following prerequisites e Gdmms exe must be allowed network access firewall exceptions need to be set e Ina Windows Workgroup Simple File Sharing Windows XP or the Use Sharing Wizard option Windows Vista or Windows 7 must be disabled It is enabled by default in all Windows client installations and can be disabled by opening any folder in Windows Explorer clicking Organize gt Folder and search options gt View and unchecking the option Use Sharing Wizard e User Account Control UAC must be disabled e Access permissions for the UNC shares C and AdminS should be available This can be a local or domain administrator account For remote client installations the account does not necessarily need to have a password In that case G Data Software however the target machine needs to be explicitly configured to allow network logons for accounts without a password More information can be found in the Reference Guide To remotely install a subnet server an account password must be set an empty password field is not permitted e The Remote Registry service must be enabled in Services Using the Server setup wizard which is automatically run the first time you start G Data Administrator y
228. t the MailSecurity component and follow the installation wizard If you choose to install the components for statistical assessment G Data MailSecurity Administrator s Status panel will show a Statistics button It will allow you to view statistical information about the mail server and can be configured through Options gt Logging Whichever deployment is chosen several options IP addresses ports should be configured directly after installing MailSecurity on the mail server as well as on the computer where MailSecurity was installed Example port configurations for various deployment scenarios can be found in the Reference Guide Depending on how your network is set up MailGateway can use various nodes to check email for spam and virus infections e Ifyou receive your email directly from an external POP3 server MailGateway can 21 G Data Software be configured to check POP3 email messages for viruses before they are opened by the recipient This can be set up under Options gt Incoming POP3 e Ifyou are using a local SMTP server to receive e mail MailGateway can check incoming email even before it reaches the mail server This can be set up under Options gt Incoming SMTP e MailGateway can scan all your outgoing email for virus infections before sending anything to the recipient This can be set up under Options gt Outgoing SMTP 2 8 Installing G Data Internet Security for Android To make use of G Data s Mo
229. t to the recipient In such cases it is recommended that you inform the recipient that the email is suspected spam High spam probability covers emails that contain many spam characteristics and that are rarely of interest to the recipient Very high spam probability collects email that meets all the spam criteria Such emails are rarely wanted and rejecting email with these characteristics is recommended in most cases Each of these three reactions can be customized 145 G Data Software Filter spam Keywords subject Keywords mail text Content fiter Advanced settings Fitter Whitelist Blacklist __ Realtime blacklists v Use spam filter Name Spam filter Note Reaction Suspected spam Deliver email Insert spam waming chert High spam probability Reject email Change Very high spam probability F Reject email Change a Gere oy Ste The Reject mail option allows you to specify that the email does not even reach your mail server The recipient will never receive this email You can use Insert spam warning in mail subject and mail text to inform the email recipient that the email may be spam You can use the Notify message sender option to automatically send a reply to the sender of the email in which you can notify the sender that his her mail has been identified as spam Since many email addresses are only used once for spam you should think carefully about using this function Use
230. t virus signature update and use a previous one instead G Data ManagementServer saves the last few updates for each antivirus engine Should the latest update for one of the engines result in problems the network administrator can block it for a certain time interval and distribute a prior signature update to the clients and subnet servers The number of rollbacks to be saved can be specified in the Server settings By default the last five signature states are saved On clients that are not connected to G Data ManagementServer e g notebooks used in business travel no rollbacks can be carried out A block of new updates from the server to the client cannot be retracted without contacting G Data ManagementServer With the affected engine selected in the Engine dropdown list its most recent engine updates are listed under Blocked updates Select the update s that should be blocked and click OK Those updates will no longer be distributed and clients that have previously received them will be rolled back to the most recent non blocked update when they connect to the ManagementServer Optionally new updates can be included in the block tick Block new updates until and select a date 34 G Data Administrator YD Update rollback x Engine Engine B CloseGap Blocked updates Y Date Time y C GD 23 1977 8 29 2013 12 32 49 PM O 6D23 1978 8 29 2013 4 30 21 PM C GD 23 1979 8 29 2013 5 27 28 PM C Block new updates until
231. ta MailSecurity on the same computer as the Exchange Server or you would like to change the ports for incoming and outgoing mail on the Exchange server our support team can supply detailed instructions 11 2 Error messages 11 2 1 Client Program files were changed or are corrupt In order to ensure optimal virus protection the integrity of the program files is regularly checked If an error occurs the report Program files were changed or are corrupt is listed in the Reports module Delete the report and download the current update of the program files G Data Client from the G Data server Subsequently perform an update of the program files on the affected clients Please contact our support team if the error occurs again 11 2 2 Client The virus database is corrupt In order to ensure optimal virus protection the integrity of the virus database is regularly checked If an error occurs the report The virus database is corrupt is listed in the Reports module Delete the report and download the current update of the virus database from the G Data server Then perform an update of the virus database on the affected clients Please contact our support team if the error occurs again 11 2 3 Microsoft Exchange Server 2007 SP1 is required to install G Data MailSecurity If you receive the error message Microsoft Exchange Server 2007 SP1 is required to install G Data MailSecurity the minimum requirements for installing the G Data
232. ta ManagementServer Firstly open Services Control Manager Start Run services msq with administrative privileges and stop the G Data ManagementServer background service Navigate to the installation folder of your G Data product typically C Program Files G DATA G DATA AntiVirus ManagementServer and open the file G Data Software gdmms exe config in a text editor like Notepad Look for the following settings and change the ports number where necessary e AdminPort Enter any port number The default value is 0 which sets the port to the standard number of 7182 e ClientHttpsPort The default value is 0 which sets the port to the standard number of 7183 The ClientHttpsPort value should not be altered as mobile clients do not accept an alternative port e ClientHttpPort Enter any port number The default value is O which sets the port to the standard number of 7184 When changing the value for ClientHttpPort or ClientHttpsPort you have to reinitialise the HTTPS security configuration for the port Open a command prompt with administrative privileges and run C Program Files G DATA G DATA AntiVirus ManagementServer gdm msconfig exe installcert After changing the ports restart the G Data ManagementServer service Note that after changing the value for AdminPort you will always have to specify the port when logging on to G Data Administrator in the following format servername port 2 1 3 G Data boot medium Viruses that
233. tabase Compatibility Before you install WebAdministrator make sure that IIS 6 Metabase Compatibility is enabled on the IIS server If it is not enabled WebAdministrator cannot be installed Under Windows 7 navigate to Start gt Control Panel gt Programs and Features gt Turn Windows features on or off Under Internet Information Services IIS gt Web Management Tools gt IIS 6 Management Compatibility make sure IIS Metabase and IIS 6 configuration compatibility is selected When using a Microsoft Server operating system you will find a similar option on the Roles tab of Server G Data Software Manager Navigate to Web Server IIS gt Role Services and make sure IIS 6 Metabase Compatibility is installed e Microsoft NET Framework WebAdministrator depends on the Microsoft NET Framework If the server does not yet have Microsoft NET Framework installed the installation wizard will prompt you to install it After the installation a reboot is required e Microsoft Silverlight Running WebAdministrator requires the Silverlight browser plugin If it has not been installed beforehand the first time WebAdministrator is run you will be notified and offered a download link After the installation has finished you will find an icon on your desktop to start G Data WebAdministrator The installer will also provide you with a direct link to access WebAdministrator through your browser Using WebAdministrator over the Internet without us
234. telling them that they have exceeded their allotted time The area with time restrictions allows you to in addition to limiting Internet usage times block particular time periods The blocked time periods are shown in red the allowed time periods are shown in green In order to allow or block a time period highlight it using the mouse A context menu then appears next to the cursor in which you have two options Allow time and Block time If users try to access the Internet during the blocked periods an information screen will appear in the browser informing them that they do not have Internet access during that period W 6 Data Administrator S Admin Organization Options License management gt SAKAN Dashboard Clients Client settings Mobile settings Tasks AMYRA Firewall PatchManager Reports ReportManager Statistics Sear 7 P a Ea FSprrricaton control Boeve control Gwe content control inter 4 lt A ManagementServels LS dl Status enabled for users Beji Mon Tue wea mu sat sun a C Monitor internet usage time Discard aly MobileDevices li 1200 am M A D A E E why Notebooks a localhost amp Demo Gdata EJ awserveri3 oeezoozc 5 00 AM fi pee201z ana SB win2xevat 700 am SB winvvart 200 am A Bwna 200 am I SB winxpevati 10 00 AM m gt Exchange 11 00 am I The settings have not yet been received by all selected clients Connected localhost Administrator Stat
235. the G Data ManagementServer program files select the G Data ManagementServer program group then select the Internet update entry from the start menu G Data ManagementServer can only be updated via the Start menu as opposed to the G Data Client software which can also be updated via G Data Administrator Access data and settings With your online registration you received access data for updating the virus databases and program files Enter these under User name and Password Select the nearest Region to ensure optimal speed when downloading updates The Version check enabled by default should always be switched on because it improves update speed If however problems arise with virus databases switch off the version check During the next update the integrity of all virus database files will be checked and files will be redownloaded if necessary Proxy settings opens a window in which proxy server credentials can be entered You should only enter these if an Internet update cannot be executed without a proxy server G Data software can use the Internet Explorer proxy connection data from version 4 First configure Internet Explorer and check whether the test page of our update server is accessible http ieupdate gdata de test htm In the Proxy settings window switch off the option Use proxy server Under User account enter the account for which you have configured Internet Explorer the account with which you have logged in to your
236. the software has been installed without being activated only the G Data AntiVirus components are available even if you have purchased G Data ClientSecurity G Data EndpointProtection or any additional modules The additional components are activated and available as soon as you register the software If you chose the database type SQL Server instance a window will be opened to perform database configuration More information about database configuration can be found in the Reference Guide Usually it is sufficient to close the window by clicking Close Following the installation of G Data ManagementServer the G Data software is operational and ready to be configured A server reboot may be required G Data ManagementServer will automatically be started every time the system is booted up Installation To administer G Data ManagementServer go to Start gt All Programs gt G Data Administrator and select the G Data Administrator option This will start the administration tool for G Data ManagementServer 2 3 Installing G Data Administrator When installing G Data ManagementServer G Data Administrator will also be automatically installed Subsequent installation of the Administrator software on the server is not required However G Data Administrator can still be installed on any client computer In this way the G Data ManagementServer can also be serviced from any PC in the network To install G Data Administrator on a client c
237. the synchronization interval between clients subnet servers and servers e Clients Enter the time interval in which the clients connect to the MMS to check for new updates or settings The default value is five minutes If you tick Notify client if settings have been changed on the server client PCs are immediately notified of new settings regardless of synchronization interval e Subnet server Define the intervals for communication between server and subnet server If you tick Send new reports to the main server immediately reports will be transferred to the main server immediately independently of the settings made here e Active Directory define the interval with which G Data ManagementServer should synchronize Active Directory content If you select a daily interval you can define the exact time of the day at which the synchronization should take place Active Directory synchronization is only carried out if at least one group has been assigned an Active Directory Organizational Unit YD Server settings Sex lela Synchronization Mle A a r TT Mise iane Ts Ei Cos Clients Main server synchronization interval and checking for new updates 1 minute Z Notify clients if settings have been changed on the server Subnet server Interval for checking for changed settings and updates on main server 1 gt minute Interval for synchronizing all data with main server 5 gt minute Interval for sending changed setting
238. thentication to use credentials that have been defined within the Administrator s Manage users window If you want your credentials and language settings to be remembered next time tick the checkbox Bookmark user data Tap Login to log in 6 2 Using G Data MobileAdministrator After logging in to G Data MobileAdministrator the main menu is displayed Four branches of options are available Dashboard Reports Clients and ReportManager To log off tap Log off in the top right corner of the screen 105 G Data Software 6 2 1 Dashboard The Dashboard of G Data MobileAdministrator allows you to view the most important Statistics at a glance Comparable to the Dashboard of G Data Administrator it provides an overview of the status of G Data ManagementServer and its clients Additionally you can view Statistics about client connections and repelled infections G Data Administrator G Data Security Status Server status Status as per 9 13 2013 2 24 45 PM Version 13 0 0 28 11 09 2013 Client connections o Top 10 clients Neutralized infections gt Report status gt Dashboard Reports Clients ReportMan Select G Data Security Status to view extensive information about the status of server and clients MobileAdministrator will show you how many machines have the G Data Security Client installed as well as information about outdated virus signatures and program components such as monitor email checking OutbreakS
239. tics Search for client 2 es Ero o or a a Al MaragementServers boaaton Seip Eure fe DemoGdata Z Allow user to report blocked web content z Discard gt de MobileDevices Allowed categories a Notebooks Category T Description 7 h Servers F Uncategorized Websites that are not part of any category gt ah Workstations Abortion Information on abortion EJ Awserveri3 Adult content Sexual information not educational or scientific EB oeezoozc Advertising Internet advertising services e g pay per click search engine marketing pop up advertising E vee2012 C Alcohol Production and trading of alcoholic food and beverages pubs drinking games SB winzkevat 7 Anonymizer Sites which enable access to otherwise prohibited web content via CGI or PHP proxies g wnzvari Z Artand museums Galleries artists museums B wn7 vat3 7 Blogs Blog pages web diaries E wnvevatz M Business Corporate websites not assigned to any particular category e g aviation military textiles b sh Exchange Chat Chat sites A children Safe and interesting content for children under 12 years of age C Computer games Games producers MMORPGs games websites providers of online games 7 Criminal know how Information on theft fraud counterfeiting breach of law Z Cuitiem Ornanized modern relinious nrouns sects ea Hare Krishna Scientoloavl z Global whitelist Giobal blacklist Information The settings have not yet been received by all selected cl
240. ticular circumstances you can define other port and protocol settings for incoming email using the button Configure Forwarding To forward incoming email to your mail server you must disable Use DNS to send email and specify the desired server under Forward email to this SMTP server Also specify the Port through which email is to be forwarded to the SMTP server If multiple network cards are available you can specify which of these cards you would like to use in the Sender IP dropdown menu Protection prior to relaying To prevent your mail server from being abused you should specify the domains to which SMTP email may be sent under Only accept incoming email for the following domains or adresses This way your server cannot be misused for forwarding spam to other domains Warning If you do not enter any domains here no emails are accepted either If all email from all domains are supposed to be accepted you must enter asterisk dot asterisk here If you want you can also implement relay protection using a list of valid email addresses Email messages to recipients that are not on the list are not accepted To automate the maintenance of these email addresses these can be read automatically and periodically from Active Directory The Active Directory connection requires at least NET Framework 1 1 9 2 1 2 Outgoing SMTP On the Outgoing SMTP tab you can configure the scanning of outgoing SMTP email on your mail server
241. tings 10 1 3 Lost Stolen Under Lost Stolen two methods of protection lost devices can be configured The SMS commands allow you to configure which commands can be triggered by SMS Theft detection can be used to foil methods commonly used by thieves to evade detection The first time you open the Lost Stolen menu you will be prompted to enter a Password Telephone number optional and Email address optional if they have not already been defined in G Data Administrator under Mobile settings gt Anti theft Use the Settings icon in the top right corner if the settings need to be changed afterwards 10 1 3 1 SMS commands To protect lost or stolen devices Internet Security supports various measures that can be remotely activated by SMS Each security function can be activated by sending a specially crafted SMS message containing the password entered in the Settings window The following options are available 155 G Data Software e Locate telephone also in Mobile settings gt Anti theft e Delete personal data also in Mobile settings gt Anti theft e Play ringtone also in Mobile settings gt Anti theft Set phone to mute also in Mobile settings gt Anti theft e Lock screen also in Mobile settings gt Anti theft e Set password to lock screen also in Mobile settings gt Anti theft 7 Internet Security SMS COMMANDS THEFT DETECTION 9 Security center Virus scan t Google Play services whic
242. tion is available 163 G Data Software 11 Troubleshooting FAQ 11 1 Installation 11 1 1 After client installation some applications run significantly slower than before The G Data monitor oversees all file accesses in the background and performs virus checks This normally leads to a delay that is barely perceptible If an application opens many files or opens some files very often a significant delay can occur To avoid this first temporarily disable the monitor to find out whether the delays are being caused by it If the affected computer accesses files on a server you must also temporarily disable the monitor on the server If the monitor is the cause the problem can usually be resolved by defining an exception files that are not to be checked For this purpose the files that are frequently accessed must be identified You can identify this data with a program such as MonActivity If necessary contact our support team You can also increase performance by using just one engine rather than two for virus checks This primarily applies to older systems and can be defined in the Client settings 11 1 2 have installed the G Data software without registering it How can register the software To register the software after the installation open Internet update under Start gt All Programs gt G Data gt G Data ManagementServer There you will find the Online registration option Clicking on this button opens the r
243. tions To show all applications including those that were previously installed but are no longer present click Reset all filters to reset the display filter En Determine attributes Attributes C Vendor C Product O Version Description 0K cane 4 4 2 3 Hardware The Hardware inventory view shows you information about the hardware that is in use by clients UD G Data Administrator gt B Admin Organization Options License management 1 gt SAKRA Dashboard cient Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics Search for client P 3 a kunei Bomen eter Lyne 4 locathost 1 aQ gt h DemoGdata Drag a column header to this area to group by that column gt hy MobileDevices Client 7 cpu T CPUspeed MHz Internal memory T Free system storage space Y Free storage space T P h Notebooks SERVEROL Intel R Core TM i7 CPU 930 2 80GHz 2807 1668 5444 GB 5444 GB F ab Servers SERVERO2 Intel R Core TM i7 CPU 930 2 80GHz 2807 16GB 54 44 GB 54 44 GB gt dh Workstations SERVERO3 Intel R Core TM i7 CPU 930 2 80GHz 2807 16GB 54 44 GB 54 44 GB a AWSERVER13 SERVER04 Intel R Core TM i7 CPU 930 2 80GHz 2807 16GB 54 44 GB 54 44 GB a DEB200ZC SERVER05 Intel R Core TM i7 CPU 930 2 80GHz 2807 16GB 54 44 GB 54 44 GB vee201z SERVERO6 Intel R Core TM i7 CPU 930 2 80GHz 2807 16GB 54 44 GB 5444 GB GB win2kavat SERV
244. tistics Client AWSERVER13 16 Client DEB200ZC 126 Deszoozc ves DAEMON Tools Lite DEB200ZC Yes FreePDF Remove only DeB200zc Yes Microsoft Help Viewer 2 0 DEB200z Yes Microsoft Report Viewer Redistributable 2008 SP1 peb200zc Yes Microsoft SQL Server 2008 peez00z Yes Microsoft Visual Studio 2010 Professional ENU DEB200zC Yes Microsoft Visual Studio 2010 Service Pack 1 peBz00zc Yes Microsoft Visual Studio Macro Tools DeB200zc Yes Mozilla Firefox 21 0 x86 de eszoazc Yes Mozilla Maintenance Service DEB200z Yes Notepad pe8200z ves Microsoft Office Professional Plus 2010 DeB200zC ves Microsoft Visio Standard 2010 oeszoozc Yes Teamiewer DEB200zC Yes WinHex DEB200zC Yes WinPcap 4 1 2 DEB200ZC Yes Wireshark 1 6 1 Status as per 9 2 2013 33439 PM Entries 187 44540314 20 50727 100 30319 10 040219 90 30729 210 210 633 14 0 6029 1000 14 0 6029 1000 80 19045 4 10 2001 161 DT Soft Ltd Microsoft Corporation Microsoft Corporation Microsoft Corporation Microsoft Corporation Microsoft Corporation Microsoft Corporation Mozilla Mozilla Notepad Team Microsoft Corporation Microsoft Corporation TeamViewer CACE Technologies The Wireshark developer community http www wiresharkorg _ Number per page 1000 Page 1 from 1 Selected 0 The software overview can be managed with the following toolbar buttons 52 D PO FHS Refresh R
245. tor offers you the following options for configuration Options Change the basic settings for operating G Data MailSecurity Update Configure automatic virus signatures updates Schedule signature downloads and update the G Data MailSecurity program files settings of the Filter module E K Spam filter The Spam filter button provides a shortcut to the Spam filter B Help Access the online help for the product Info Information about the program version 9 2 1 Options The Options window allows you to configure a vast range of settings in order to adapt G Data MailSecurity optimally to the conditions in your network 9 2 1 1 Incoming SMTP On the Incoming SMTP tab you can configure the virus scan for incoming SMTP email on your mail server Options a Vius check Scanparameters Queue Advanced Logging Incoming SMTP Outgoing SMTP I Incoming POP3 Received Y Process incoming g email Port 25 IPv4 All IP addresses Configure Forwarding 7 Use DNS to send email Sender IP Standard LAN adapter EA Protection prior to relaying Only accept incoming email for the following domains or addresses meot Export Active Directory a Cae 124 G Data MailSecurity Administrator Received Under Received you can specify whether Incoming email should be processed This is generally done over port 25 If this standard port should not be used under par
246. ture it administers the clients automatically requests the latest software and virus signature updates from the G Data UpdateServer and controls the virus protection within the network When installing G Data ManagementServer G Data Administrator is automatically installed on the same machine e G Data Administrator G Data Administrator is the administration software for G Data ManagementServer and enables management of settings and updates for all G Data clients on the network G Data Administrator is password protected and can be installed on and launched from any Windows computer that has a network connection with G Data ManagementServer e G Data Security Client The client software provides virus protection for the clients and runs the G Data ManagementServer jobs allocated to it in the background without the use of a separate user interface Installing the client software is generally carried out through G Data Administrator for all clients e G Data InternetSecurity When you are using a SmallBusiness solution you can use G Data InternetSecurity as a self sufficient security solution for computers that are not connected to your network such as notebooks for field personnel A complete manual for G Data InternetSecurity is included on the installation medium 2 1 Installation G Data Bootmedium Wizard You can use G Data Bootmedium Wizard to create a bootable CD DVD or USB stick for basic scanning of your computer This sca
247. uired by ticking the checkbox to the left of the respective entry 5 AWSERVER13 G Data MailSecurity Administrator balak Options y Update f Spam filter Help Info MailSecurity de Filter KD Current filters that block incoming and outgoing email or automatically remove dangerous n g L content from email as required Name Type Direction Note Rename malicious att Filter attachments incoming gt v Scripts Disable HTML scripts incoming W Status V Spam filter Filter spam RS Filter Q Queues Activity HE Virus results lt gt l Import New e Import Import filter XML files to restore a backup or reuse filters from other computers e Export Individual filters with your settings can be exported as an XML file to be backed up or to be reused on other computers To export multiple filters click them while holding the Ctrl key e New Create new filter rules When you create a new filter a selection window appears in which you can specify the basic filter type All of the other details about the filter can be created using a wizard which will guide you through that 139 G Data Software filter type This is a convenient way to create filters for every imaginable type of threat e Edit Edit existing filters e Delete To permanently delete a filter click the relevant filter once to highlight it and then click the Delete button e Statistics You can check statistical
248. updates Update interval hourly Automatic updates Update distribution Z Peer to Peer update distribution OK Cancel Update status Check the status of the virus signature update e Run update now Carry out an immediate update of the virus database The current virus signatures are downloaded to be distributed to the clients afterwards e Automatic updates As with virus checks you can also let the Internet updates run automatically To do this check the box next to Run update periodically and specify when and with what cycle the update is to be carried out To enable automatic updating your G Data ManagementServer must be connected to the Internet and you must have entered the user name and password that you have received upon registration If the server connects to the Internet via a proxy server your proxy credentials must be entered under Access data and 31 G Data Software settings gt Proxy settings Update distribution Updates can be distributed centrally MMS subnet server gt Clients or if you activate Peer to Peer update distribution decentralised MMS subnet server already updated client gt Clients Be sure to check the port requirements for this option Program files When there is a client program file update you can allow the clients to be updated automatically by G Data ManagementServer Updating the program files on clients takes place in two step
249. ure whether the mobile client should automatically check for software and virus signatures If updates are not downloaded automatically the user can still initiate a manual update If you choose automatic updates you can set the interval and limit the updates to happen only when there is Wi Fi connectivity Web protection The Web protection section includes the possibility to limit web protection to WLAN networks e Web protection Enable Web protection to protect mobile clients when they access the internet Web protection can be enabled for all web traffic or only when there is Wi Fi connectivity Virus check The Virus check section lets you define parameters for on demand and on access virus scans e Automatically Enable an automatic virus check for newly installed applications e Periodically Enable a periodic virus check Tick the checkbox Periodically and specify the Interval e Power save mode Postpone the periodic virus check if the device is in power save mode 68 G Data Administrator e While recharging Run the periodic virus check only when the device is being charged e Type Scan All applications or only Installed applications Synchronization The Synchronization option defines how often the mobile client synchronizes its data with the ManagementServer You can set an interval and configure synchronization to happen only when there is Wi Fi connectivity or also when using a mobile network data plan
250. us as per 8 29 2013 4 30 23 PM 88 G Data Administrator 4 4 8 Firewall The Firewall module is available as part of the ClientSecurity and EndpointProtection solutions The Firewall allows you to centrally administer the firewall for clients and groups Overview gives the system administrator an overview of the current status of the firewall on the installed clients Rule sets offers options for creating and managing rule sets 4 4 8 1 Overview There are two fundamentally different modes for operating the firewall When the firewall is running on Autopilot it is preconfigured by G Data and carries out its tasks in the background without interrupting the user In Autopilot mode the firewall optimizes its rule sets autonomously over time The second mode Rule sets allows you to define individual firewall rules and rule sets for different network zones Several general firewall settings can be configured Enable G Data Firewall Enable the firewall for the selected client or group If you uncheck the box the firewall is disabled e Report blocked applications If the client computer is connected to the G Data ManagementServer the system administrator will be notified in the Reports module when applications have been blocked by the client firewall e Allow user to enable disable the firewall As network administrator you can allow the user of the client computer to temporarily disable the firewall This o
251. us ways to create different views seal 5 a a a a a G Data Security Client version 21 G Data Security Client version 12 0 0 222 11 01 2013 1 G Data Security Client version 12 0 0 239 11 04 2013 28 G Data Security Client version 13 0 0 13 29 08 2013 1 G Data Security Client version 13 0 0 7 25 08 2013 197 Last access 11 Last access 8 21 2013 1 53 53 PM 5 Last access 8 25 2013 1 53 53 PM 6 a Last access 8 26 2013 1 48 01 PM 7 AD_NOTEBOOK14 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 26 2013 1 48 01 PM AD_NOTEBOOK15 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 26 2013 1 48 01 PM AD _NOTEBOOK16 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 26 2013 1 48 01 PM AD_NOTEBOOK17 AVA 22 12133 28 08 2013 AVL 22 1928 28 08 2013 8 26 2013 1 48 01 PM Changed client settings are only saved once the Apply button has been clicked Click the Discard button to use the current settings from the ManagementServer without accepting the changes If clients within a group have different settings for a specific option the option will be allocated an undefined status Undefined options are not saved during the transfer At the bottom of most modules the Information status field shows whether the settings have been successfully transferred to the clients 4 4 1 Dashboard The Dashboard module shows information about the current status of the clients in the network G Data S
252. usly Enter the server name of the main server under Main server name An alternative to installing a subnet server is using peer to peer update distribution By enabling this option server client network traffic during updates is greatly reduced For some networks this can eliminate the need for using a subnet server Select the database G Data ManagementServer should use You can choose between installing Microsoft SQL Server Express and using an existing SQL Server Express instance Choose the SQL Server Express installation if you are newly installing G Data ManagementServer for a network with less than 1000 clients For larger networks it is recommended to use an existing Microsoft SQL Server instance If you are reinstalling ManagementServer on a server that already has a SQL Server Express installation and a G Data ManagementServer database choose the option to use an existing instance After the installation you will be able to configure the connection to SQL Server G Data Software Express using database configuration tool GdmmsConfig Product activation occurs during installation This enables immediate update downloads upon finishing the installation Enter new license key If you are installing G Data software for the first time select this option and enter the registration number for the product Depending on the type of product you can find the registration number in the license document MediaPack or on the order confi
253. utton Create contact in the toolbar or Import contacts to import contacts from an Active Directory Organizational Unit OU When creating a contact you should at least enter a First name or Last name Additionally one or more addresses can be added as well as e mail addresses phone numbers fax numbers and organizations To remove a contact from the contact database select it and click the Delete icon in the toolbar or the option Delete in the context menu 4 4 5 6 Call filter The Call filter allows you to filter incoming calls and SMS messages as well as outgoing calls Using the same contact database as the Phone book panel you can easily add 73 G Data Software contacts to a blacklist or whitelist as well as defining general filters WP G Data Administrator Sa Admin Organization Options License management 1 gt AAKA Dashboard Clients Client settings Mobile settings Tasks PolicyManager Firewall PatchManager Reports ReportManager Statistics Search for client a rs er er ren en Tee a localhost Incomiog calls SMS lappy Ba Demo Gdata Z Allow anonymous calls despite fiter H Z Allow phone book contacts all other numbers will be blocked if they are not on the whitelist Discard MobileDevices 7 Filter mode _ Whitelist gt gb Notebooks Entries for explicit filter t dh Servers Drag a column header to this area to group by that column P ih Workstations Enabled Firstnam
254. vanced On the Advanced tab you can change the global settings for G Data MailSecurity Options S Incoming SMTP Outgoing SMTP incoming POP3 _ Virus check Scan parameters Queue Advanced Logging SMTP banner Domain AWSERVER13 T Show domain only Limit E Limit number of simultaneous SMTP client connections System messages Sender address for system messages postmaster Recipient address es for system wamings postmaster E Limit the number of system messages per hour W Use DNS to send email Sender IP Standard LAN adapter Settings Epot _ impor Change password 132 G Data MailSecurity Administrator SMTP banner By default the server s computer name is entered as Domain When sending outgoing mail using DNS the fully qualified domain name FQDN has to be entered here to enable reverse lookups Check Show domain only to suppress the publication of server version information in communication with other servers Limit To limit the number of SMTP connections that G Data MailSecurity processes simultaneously please check Limit number of simultaneous SMTP client connections and enter a maximum number of connections G Data MailSecurity then only permits the maximum number of connections that you specify Using this function you can adjust the mail filtering to the performance of the hardware that you are using for the mail gateway System messages The
255. vate this feature via SMS send an SMS containing the text password lock If no lock screen password has been set the remote maintenance password will be used e Set lock screen password Set a password to unlock the device if the lock screen feature has been enabled To activate this feature via SMS send an SMS containing the text password set device password devicepassword Make sure to send the lock command to lock the device after setting the password To remotely reset the remote maintenance password send an SMS from the phone number that you specified under Trusted phone number containing the text remote password reset newpassword After SIM card change When deploying Internet Security for Android it remembers which SIM card is in the device at that time If this card is changed at any time for example if the device was stolen and resold certain actions can be carried out automatically e Enable lock screen same functionality as the option under Allowed actions e Locate device same functionality as the option under Allowed actions Emergency action Using the internet based Google Cloud Messaging an emergency action can be triggered on a device This has the advantage of working even if the device is being used without a SIM card Google Cloud Messaging needs to be configured first enter Sender ID and API key under Server settings gt Mobile Select any of the following 71 G Data Software actions and click Execute act
256. ver 13 24 manual 4 messages 54 mobile clients 35 40 67 mobile device management 67 161 mobileadministrator 16 105 106 107 108 modules 45 137 monitor 58 111 O organization 42 outgoing email 125 126 129 P parameters 129 password 35 133 patch applicability jobs 82 patch management 3 82 83 94 95 96 113 patches 96 patchmanager 94 95 96 paths 38 168 phishing 157 policy 84 policymanager 84 85 86 87 88 pop3 126 pop3 enquiries 127 pop3 filtering 127 pop3 retrieval 127 ports 9 program files 32 137 protocols 122 proxy settings 33 136 quarantine 4 97 112 168 quota 38 177 G Data Software R rbl 148 read receipt recipient 145 registration 13 164 rejectmessage 145 relay 125 remote installation 17 report definition 100 reportmanager 100 108 reports 97 107 rollback 34 35 S scanjobs 77 scheduling 77 80 82 83 135 secondary server 13 security client 17 110 112 164 sender 144 server setup 25 27 settings 129 size limit 132 sms 159 smtp 124 125 smtp settings 36 140 software distribution jobs 83 solutions 3 spam 65 145 spamfilter 150 ssl certificates 169 170 statistics 46 100 102 133 status 137 subnet server 30 support 4 suspected spam 145 synchronization 37 system messages 133 system requirements 8 T tasks 75 theft protection 155 178 13 29 30 37 subnet server synchronisation U undeliver
257. wild cards to match multiple numbers at once Asterisks match multiple characters periods one For example entering 0180 will match all phone numbers starting with 0180 Entering 012 345678 will match phone numbers 012 3456780 through 012 3456789 but not 012 34567800 National and international number formatting are evaluated independently For example for an incoming or outgoing call with number 012 3456789 the international format 0049 12 3456789 is evaluated against the wildcard as well It counts as a match when either or both of the 159 G Data Software formats match the wildcard The Call SMS filter can be managed centrally in G Data Administrator under Mobile settings gt Call filter 10 3 2 Outgoing filter The Outgoing filter lets you define a whitelist and blacklist for outgoing calls Whitelist and blacklist can be defined using the same options as the Incoming filter TE O Secunty center 2 Permissions tected apps in the telephone book that are not on the blacklist Se ide contacts 3K settings 10 3 3 Hide contacts Contacts and their incoming communication can be hidden By moving them to a separate G Data phone book the Hide contacts module effectively blocks access to the contact and all its communication Advanced contact management can be carried out in G Data Administrator under Mobile settings gt Phone book 7 Internet Security Company 4 Hide contacts TE Securty
258. window A remote subnet server installation is subject to the same prerequisites as a remote installation of G Data Security Client 29 G Data Software e Uninstall server Initialize a remote deinstallation of the selected subnet server e Authorize server To prevent unauthorized access to server data locally installed subnet servers need to be authorized Only after authorization will the ManagementsServer start synchronizing data with the subnet server Subnet servers that are installed remotely using the function Add subnet server are automatically authorized Only locally installed subnet servers and subnet servers that have been upgraded to version 13 need to be authorized manually A remote deinstallation can only be carried out on authorized subnet servers WP Manage servers S inten l xK Ale vile Drag a column header to this area to group by that column EMAWSERVER13 Main server 2 12 8 2013 13 0 0 134 08 12 2013 awsuei3 Subnet server 0 12 9 2013 10 31 10 AM 4 2 1 5 Synchronize subnet server s now To carry out changes outside the regular communication between server and subnet server subnet server synchronization can be initiated manually 4 2 1 6 Exit This function closes G Data Administrator G Data ManagementServer will keep running in the background to carry out its tasks 4 2 2 Options In the menu bar the Options menu offers access to settings mostly rel
259. xisting rules for your client firewall e Install G Data Firewall Initiate a remote installation of G Data Firewall The system requirements for a remote installation must be met see G Data Security Client remote installation 90 4 4 8 2 Rule sets Uninstall G Data Firewall Uninstall the client s firewall G Data Administrator On the Rule sets panel you can create rule sets for various network zones Each rule set can contain any number of firewall rules WY G Data Administrator Sn Admin Organization Options License management 6 1 gt 2 4 RIS Search for client P a All ManagementServers a localhost Rule set gt amp y Demo Gdata Internal localhost 7 Eat D a E Apply bly MobileDevices Note Dia ily Notebooks Z Stealth mode enabled gh Servers Rules ve J Name Y Rank Access T Direction Y Note 7 EJ AWSERVER13 Eg NET Runtime Optimization Service i Allow Outbound Pre defined rule A ven2002c or luntime Optimization Se C amp Acrobat Reader a Allow Outbound Pre defined rule i E otez oe Chrome 3 Allow Outbound Pre defined rule E wwn2xevat lni C 28 Digital Locker 4 Allow Outbound Pre defined rule E wnan Rank C amp DitHost Surrogate 5 Allow Outbound Pre defined rule Bwna C explorer exe http TCP 6 Allow Outbound Pre defined rule Bwnevati C explorerexe idap TCP UDP 7 Allow Outbound _ P
260. ystem Double click an item to view an extended description To request installation click Install The Status will change to Waiting for response and the administrator will receive a report with a software distribution request The Updates Patches system tray menu option can be enabled or disabled in G Data Administrator under PatchManager gt Settings 7 6 Internet update G Data Security Client can be used to carry out virus signature updates from the Internet if no connection to G Data ManagementsServer is available Use the Settings and scheduling button to schedule virus updates locally The Internet update system tray menu option can be enabled or disabled in G Data Administrator under Client settings gt General gt Client functions 19 G Data Security Client Internet update pS Settings Load Internet update from the ManagementServer recommended for all computers on the local network Run Internet update yourself Run Internet update with obsolete virus signatures yourself if no connection to the ManagementServer can be created recommended for mobile workstations Virus signatures 7 7 Disable firewall Using the option Disable firewall end users can disable G Data Firewall completely even if they are connected to the enterprise network If the firewall has been disabled it can be re enabled by clicking the option Enable firewall in the system tray menu The Disable firewall syst
261. zed performance mode e Ifan infected file is found The Exchange plugin can take care of infected files in various ways The recommended option is Disinfect if not possible quarantine e File types To speed up the scanning process scans can be limited to program files and documents However it is recommended to check all files e Use heuristics Heuristics enable detection of malware based on typical malware characteristics as an addition to traditional signature based recognition e Check archives Archives can be checked for malware inside of them If malware is found the archive as a whole will be disinfected quarantined or removed possibly including clean files 4 4 4 3 Status The status area lists information for all currently selected Exchange plugin clients The information is similar to the Clients module s Overview list You can check version information for the plugin itself and for both engines as well as its last access date and time The overview can be manually refreshed by using the Refresh button in the toolbar 4 4 5 Mobile settings The Mobile settings tab offers easy access to G Data Administrator s mobile device management capabilities After having deployed G Data Internet Security to one or more Android devices they will show up in the client management area Selecting a mobile client or a group which contains mobile clients offers access to its settings on the Mobile settings tab 4 4 5 1 Genera

Download Pdf Manuals

image

Related Search

Related Contents

ZyXEL SMG-700 User's Manual    Guía del usuario  Eye-Fundus Camera EZ-Horus 45 Ezer  Multi-Dimensional Input Devices and Interaction  Tripp Lite SMART750 User's Manual  MANUAL DE INSTALAÇÃO E DE OPERAÇÕES  Peavey RTD 31 User's Manual  トラクターの点検  Otterbox HTC4-LEGND-20-C5OTR mobile phone case  

Copyright © All rights reserved.
Failed to retrieve file