Charter Business Desktop Security User Guide

1y ago
18 Views
2 Downloads
987.21 KB
77 Pages
Last View : 3d ago
Last Download : 3m ago
Upload by : Philip Renner
Transcription

Charter Business Desktop SecurityUser Guide

ContentsChapter 1: Getting started . 51.1 What to do after installation . 61.1.1 Set up my e-mail programs to filter spam . 61.2 How to make sure that my computer is protected . 71.2.1 What does the system tray icon indicate . 71.2.2 View the overall status of my protection . 81.3 How to run common tasks . 91.3.1 Open the product . 91.3.2 Open advanced settings . 91.3.3 How to use shortcuts . 91.4 How to see what the product has done . 121.4.1 View statistics . 121.4.2 What are flyers . 121.5 What is the Real-time Protection Network . 141.5.1 Privacy statement . 14Chapter 2: Protecting the computer against malware. 152.1 What are viruses and other malware . 162.1.1 Viruses . 162.1.2 Spyware . 162.1.3 Rootkits. 162.1.4 Riskware . 162.2 How to scan my computer . 182.2.1 Scan for malware . 182.2.2 Scan at set times. 202.2.3 Scan manually . 222.2.4 Select files that are scanned. 242.2.5 Select the action when something is found . 272.2.6 View virus and spyware history . 282.3 What is DeepGuard . 29

2.3.1 How does DeepGuard work. 292.3.2 How to turn DeepGuard on . 292.3.3 Allow programs that DeepGuard has blocked. 292.3.4 How to turn off advanced process monitoring. 302.3.5 Protect against harmful system changes . 302.3.6 How to see what DeepGuard has done . 312.4 How to use the quarantine . 322.4.1 View quarantined items . 322.4.2 Restore quarantined items . 322.5 How to use automatic updates. 342.5.1 Check the update status . 342.5.2 Change the Internet connection settings. 342.5.3 Check the status of Real-time Protection Network . 352.5.4 Turning automatic updates on . 352.6 Keeping your software up to date . 362.6.1 How to turn on Software Updater . 36Chapter 3: Securing network connections . 373.1 What is a firewall . 383.1.1 What are firewall profiles . 383.1.2 What are firewall rules and services . 393.2 How to allow or block network traffic through the firewall . 443.2.1 What to do if a firewall alert appears . 443.2.2 How to create firewall services and rules. 443.2.3 How to open a port through the firewall . 483.2.4 Examples of creating firewall rules . 483.2.5 Turn a firewall rule on or off. 523.2.6 Change a firewall rule . 523.2.7 Firewall settings . 523.3 How to control network applications . 553.3.1 What to do if an application control pop-up appears . 553.3.2 Allow or deny connections for programs . 563.3.3 Turn application control pop-ups on or off . 57

3.3.4 What to do if a program stops working . 573.4 How to prevent intruders . 593.4.1 Select how intrusion attempts are handled . 593.5 Where to find firewall alerts and log files . 603.5.1 View firewall alerts . 603.5.2 View the action log . 61Chapter 4: Using the Internet safely . 644.1 What is browsing protection. 654.1.1 How to turn browsing protection on or off . 654.1.2 Browsing protection safety ratings . 654.1.3 Protect against harmful content . 664.1.4 What to do when a web site is blocked . 674.1.5 Security summary for a web site . 674.2 Block spam. 684.2.1 Set up my e-mail programs to filter spam . 684.2.2 What if I receive a lot of spam . 734.2.3 Allow and block messages from specific e-mail addresses . 744.2.4 Protect against phishing attempts . 76

Chapter 1: Getting startedTopics:Information about how to get started with the product. This section describes how to get started with using the product. What to do after installationHow to make sure that mycomputer is protectedHow to run common tasksHow to see what the product hasdoneWhat is the Real-time ProtectionNetwork

1.1 What to do after installationAfter you have installed the product, you may need to configure your e-mail client and web browser to workwith the product.1.1.1 Set up my e-mail programs to filter spamYou can create a spam and a phishing folder and filtering rules in your e-mail program to filter spam.E-mail filtering creates a spam and a phishing folder and filtering rules automatically in Microsoft Outlook,Microsoft Outlook Express, and Windows Mail (in Windows Vista). If you use some other e-mail program,you have to create the folders and filtering rules manually. If you have multiple e-mail accounts, you have tocreate the filtering rules for each e-mail account separately.Note: Spam and phishing filtering supports only the POP3 protocol. Web-based e-mail programsor other protocols are not supported.How do my own e-mailfiltering rules work togetherE-mail filtering filters e-mail messages based on its own filteringrules. It does not filter e-mail messages that match a rule thatyou have created. If you have created, for example, a rule thatfilters all e-mail messages from a webstore to the Webstorefolder, both your order confirmation messages and advertisingmaterial from that webstore are moved out of your inbox andfiltered to the Webstore folder.See section 4.2.1 for instructions on how you can create the spam folder and the filtering rule for Microsofte-mail programs, Netscape, Mozilla Thunderbird, and Eudora. You can also use these instructions to createsimilar filtering rules in other e-mail programs.

1.2 How to make sure that my computer is protectedYou can check the status icon on your system tray and the product status in the Status page to make surethat your computer is protected.1.2.1 What does the system tray icon indicatePlace the mouse pointer over the product status icon on your Windows system tray to view a tooltip thatshows the current product status.Status icons and their meanings:IconStatusWhat to DoThe product is working properly. Your computer isprotected.You can use your computernormally.A product download is in progress and your computer isprotected as soon as the download is complete.The product is downloading andinstalling the latest updates. Waituntil the download is complete.An error has occurred and your computer is not fullyprotected.Place the mouse pointer over thestatus icon to see the reason forthe error. If necessary, restart yourcomputer.Warning, a product feature is turned off or the product isnot up-to-date. Your computer is not fully protected.Place the mouse pointer over thestatus icon to see the status tooltip.Turn on the feature that is currentlyturned off, or check for the productupdates.Note: You may see thisicon, for example, if youare defragmenting yourhard drive, as some systemfunctions may causedownloads to besuspended.Critical warning, the product is not up-to-date.The virus and spyware definitionshave not been updated lately.Update the virus and spywaredefinitions as soon as possible.The product has been unloaded and your computer is not Right-click the status icon andselect Reload to activate theprotected.product.No iconThe product is not installed or some error prevented theproduct to start.Restart your computer. If the icondoes not appear, reinstall theproduct.

1.2.2 View the overall status of my protectionThe Status page shows you a quick overview of installed product features and their current status.To open the Status page:On the main page, click Status.The Status page opens.The icons show you the status of the program and its security features.Status iconStatus nameDescriptionOKYour computer is protected.The feature is turned on, andworking properly.InformationThe product informs you abouta special status of a feature.This icon is shown, forexample, when a feature isbeing updated.WarningYour computer is not fullyprotected.In addition, the firewall maybe set to block all Internettraffic.For example, the virusdefinitions may be old, or thestatus of a feature requiresattention.ErrorYour computer is notprotected.In addition, the firewall maybe set to allow all traffic.For example, yoursubscription has expired, acritical feature is turned off, orthe product is in error state.OffA non-critical feature is turnedoff.

1.3 How to run common tasksYou can see what you can do with the product and run common tasks in the Tasks page.To open Tasks page:On the main page, click Tasks.The Tasks page opens.1.3.1 Open the productDouble-click the product status icon on your Windows system tray to open the product.To open the product:1. Select one of the following options: In Windows XP or Vista: click the Show hidden icons icon to show the system tray icons.In Windows 7: click the caret to show the system tray icons.2. Double-click theicon.The main view opens and shows the current protection status.Tip: You can open the product and help also from the Windows Start menu, or from the product'sdesktop icon.1.3.2 Open advanced settingsEdit advanced settings to change the way that the product works.To open advanced settings:On the main page, click Settings. The Settings window opens.The left pane lists product components grouped by their function. You can change the product settings in theright pane.1.3.3 How to use shortcutsYou can scan files and folders in Windows Explorer and run various tasks with the system tray icon menu.Scan in Windows ExplorerYou can scan disks, folders and files for viruses, spyware, and riskware in Windows Explorer.To scan a disk, folder or file:1. Place your mouse pointer on and right-click the disk, folder or file you want to scan.2. From the right-click menu, select Scan Folders for Viruses (the option name depends on whether youare scanning a disk, folder or file).The Scan Wizard window opens and the scan starts.If a virus or spyware is found, the Scan Wizard guides you through the cleaning stages.

Run tasks from the system trayYou can use the product status icon on Windows system tray to quickly run the most common tasks.To run the tasks:1. Select one of the following options: In Windows XP or Vista: click the Show hidden icons icon to show the system tray icons.In Windows 7: click the caret to show the system tray icons.2. Right-click the icon with your mouse.A menu with the most common tasks opens.3. Select the task you want to run from the menu.General tasks:OptionWhat it doesOpenOpens the product user interfacewhere you can see the status of allproduct components and accessproduct settings to change yourprotection level.Show flyer historyShows a list of informationalmessages that have been displayedas flyer messages at the bottomright-hand corner of the screen.Events in the list include, forexample, information that theproduct has blocked a potentiallyharmful program or results from ascheduled scan.If you are using an Internetconnection that you pay for by theamount data transferred, you cansuspend all downloads and updates.Suspend all downloads and updatesTasks in Virus and spyware scanning submenu:OptionWhat it doesChoose what to scan.Scans a specific file or folder for viruses, spywareand riskware. Select the target directory or file andclick OK to start the scan.Scan hard drivesScans all files on your hard drives for viruses,spyware and riskware .Virus and spyware scanScans the system for malware and riskware.Rootkit scanScans the system for rootkits and other suspiciousand hidden items.Full computer scanScans the computer forviruses, spyware and rootkits.

Tasks in Network connections submenu:OptionWhat it doesBlock all network trafficBlocks all network traffic. This option should be usedonly if you suspect that your computer is under anetwork attack.Allow all network trafficLets all network traffic through. This option disablesyour firewall completely and renders computervulnerable to all network attacks.Show alert logOpens the Firewall alerts dialog.Tasks in E-mail filtering submenu:OptionWhat it doesAllow senderOpens a dialog where you can add the address ofan e-mail sender to the Allowed Senders list. TheAllowed Senders list contains addresses which arenever filtered to the spam folder.Filter senderOpens a dialog where you can add the address ofan e-mail sender to the Denied Senders list. TheDenied senders list contains addresses which arefiltered to the spam folder.Configure E-mail filteringOpens the E-mail filtering settings.About submenu:OptionWhat it doesAboutShows product information, for example, the versionnumber.

1.4 How to see what the product has doneThe Statistics page displays what the product has done and you can view actions that the product has takento protect your computer in the flyer history.1.4.1 View statisticsYou can see what the product has done since its installation in the Statistics page.To open the Statistics page:On the main page, click Statistics.The Statistics page opens. Last successful update check shows the time of the latest update. Latest software updates scanning shows the latest time Software Updater scanned your computer formissing security updates. Latest software updates installation shows the latest time Software Updater installed an update. Virus and spyware scanning shows how many files the product has scanned and cleaned since theinstallation. Programs shows how many programs DeepGuard has allowed or blocked since the installation. Missing security updates shows the number of currently unpatched software installed on the computer. E-mail scanning shows the number of valid e-mail attachments and the number of attachments that theproduct has cleaned.1.4.2 What are flyersFlyers are small notifications that are shown at the bottom right-hand corner of your computer screen.The flyers inform you about the actions that the product has taken to protect your computer. The productinforms you with flyers, for example, when it blocks a potentially harmful program from starting. These flyersare informational and do not require any action from you.

1.5 What is the Real-time Protection NetworkReal-time Protection Network is an online service which provides rapid response againstInternet-based threats.The Real-time Protection Network uses reputation services to obtain information about the latest Internetthreats. You can help us develop the service further by contributing detailed information, such as sources ofintrusive programs or messages, and behavioral and statistical analysis of the use of the computer and theInternet.When the Yes, I want to participate in the Real-time Protection Network check box is selected on thePrivacy tab, you are submitting this information to the Real-time Protection Network.Submitting information to the Real-time Protection Network does not compromise your privacy. If you wantto know more about how the submitted information is processed, please read our privacy statement. To dothis, click Read our privacy statement.1.5.1 Privacy statementSubmitting information to the Real-time Protection Network does not compromise your privacy.Even though the submitted information may be considered personal under some jurisdictions, your privacyis protected during the process. We transfer the information securely, remove any unnecessary personalinformation, and process the information anonymously in an aggregate format. In this way, the informationcannot be connected to you in any way. No user account information, no IP address information, or no licenseinformation is included in the information submitted through the Real-time Protection Network. We protectyour privacy further by using encryption when transferring the information.The submitted information is used for improving the protection capabilities of our services and products.

Chapter 2: Protecting the computer against malwareTopics: What are viruses and othermalwareHow to scan my computerWhat is DeepGuardHow to use the quarantineHow to use automatic updatesKeeping your software up to dateVirus and spyware scanning protects the computer from programs thatmay steal personal information, damage the server, or use it for illegalpurposes.By default, all malware types are immediately handled when they arefound, so that they can cause no harm.By default, Virus and spyware scanning scans your local hard drives,any removable media (such as portable drives or compact disks) anddownloaded content automatically. You can set it to scan your e-mailsautomatically as well.Virus and spyware scanning also watches your computer for any changesthat may indicate malware. If any dangerous system changes, forexample system settings or attempts to change important systemprocesses are found, DeepGuard stops this program from running as itis likely to be malware.

2.1 What are viruses and other malwareMalware are programs specifically designed to damage your computer, use your computer for illegal purposeswithout your knowledge, or steal information from your computer.Malware can: take control over your web browser,redirect your search attempts,show unwanted advertising,keep track on the web sites you visit,steal personal information such as your banking information,use your computer to send spam, anduse your computer to attack other computers.Malware can also cause your computer to become slow and unstable. You may suspect that you have somemalware on your computer if it suddenly becomes very slow and crashes often.2.1.1 VirusesViruses are usually programs that can attach themselves to files and replicate themselves repeatedly; theycan alter and replace the contents of other files in a way that may damage your computer.A virus is a program that is normally installed without your knowledge on your computer. Once there, thevirus tries to replicate itself. The virus: uses some of your computer's system resources,may alter or damage files on your computer,probably tries to use your computer to infect other computers,may allow your computer to be used for illegal purposes.2.1.2 SpywareSpyware are programs that collect your personal information.Spyware may collect personal information including: Internet sites you have browsed,e-mail addresses from your computer,passwords, orcredit card numbers.Spyware almost always installs itself without your explicit permission. Spyware may get installed togetherwith a useful program or by tricking you into clicking an option in a misleading pop-up window.2.1.3 RootkitsRootkits are programs that make other malware difficult to find.Rootkits hide files and processes. In general, they do this to hide malicious activity on your computer. Whena rootkit is hiding malware, you cannot easily discover that your computer has malware.This product has a rootkit scanner that scans specifically for rootkits, so malware cannot easily hide itself.2.1.4 RiskwareRiskware is not designed specifically to harm your computer, but it may harm your computer if it is misused.Riskware is not strictly speaking malware. Riskware programs perform some useful but potentially dangerousfunctions.

Examples of riskware programs are: programs for instant messaging, such as IRC (Internet Relay Chat),programs for transferring files over the Internet from one computer to another,Internet phone programs, such as VoIP (Voice over Internet Protocol),Remote Access Software, such as VNC,scareware, which may try to scare or scam individuals into buying fake security software, orsoftware designed to bypass CD checks or copy protections.If you have explicitly installed the program and correctly set it up, it is less likely to be harmful.If the riskware is installed without your knowledge, it is most likely installed with malicious intent and shouldbe removed.

2.2 How to scan my computerYou can scan your computer for malware in real time, manually, or you can schedule a scan at set times.Deciding which method to use depends on how powerful your computer is and how high a level of protectionyou want. Turning on all the virus and spyware scanning features can have a noticeable effort on yourcomputer's speed if you have an older computer.2.2.1 Scan for malwareReal-time scanning protects the computer by scanning all files when they are accessed and by blockingaccess to those files that contain malware.Real-time scanning works as follows:1. Your computer tries to access a file.2. The file is immediately scanned for malware before access to the file is allowed.3. If malware is found in the file, real-time scanning removes the malware automatically before it can causeany harm.Does real-time scanning affect the performance of my computerNormally, you do not notice the scanning process because it takes a small amount of time and systemresources. The amount of time and system resources that real-time scanning takes depend on, for example,the contents, location and type of the file.Files that take a longer time to scan: Compressed files, such as .zip files.Note: These files are not scanned by default. Files on removable drives such as CDs, DVDs, and portable USB drives.Real-time scanning may slow down your computer if: you have a computer that is quite old, or you access a lot of files at the same time. An example of this is opening a directory that contains manyfiles.Turn real-time scanning on or offYou can turn real-time scanning on to stop malware before it can harm your computer.Note: Profile settings establis

1.3 How to run common tasks You can see what you can do with the product and run common tasks in the Tasks page. To open Tasks page: On the main page, click Tasks. The Tasks page opens. 1.3.1 Open the product

Related Documents:

OPSB Charter Lake Forest Elementary Charter School 478 A OPSB Charter Lusher Charter School 1709 A OPSB Charter New Orleans Charter Science and Mathematics HS 370 B OPSB Charter Robert Russa Moton Charter School 268 B-OPSB Charter Warren Easton Senior High School 881 A OPSB Charter (ACSA) Alice Harte E

KIPP NYC Washington Heights Academy Charter School KIPP STAR College Preparatory Charter School La Cima Charter School Launch Expeditionary Learning Charter School Lois and Richard Nicotra Early College Charter School Math, Engineering, and Science Academy Charter High School Mott Hall Charter School Neighborhood Charter School of Harlem (The)

NEW HEIGHTS ACADEMY CHARTER SCHOOL 18% EQUITY PROJECT CHARTER S CHOOL (THE) 0% INWOOD ACADEMY FOR LEADERSHIP CHARTER SCHOOL 1% GLOBAL COMMUNITY CHARTER SCHOOL 0% KIPP NYC WASHINGTON HEIGHTS ACADEMY CHARTER SCHOOL 0% Charter Average 4% District 6 Average 1% District 7 Suspensions, Charter vs. District CHARTER

ASPIRA Bilingual Cyber Charter School (07/01/2010) Education Plus Academy Cyber Charter School (07/01/2012) Esperanza Cyber Charter School (07/01/2012) Solomon Charter School Inc. (07/01/2012) Charter School Enrollment for 2011-12 72,761 o Special Education population 6,951 (state 268,466) Cyber Charter Enrollment for 2011-12 32,275 o .

Charter Business Portal (Overview) Charter Business Portal The Charter Business Portal is a website developed for you to manage your business services online. Below are the services you are able to manage using the Charter Business Portal: Voice - Manage phone line settings Webmail - Send and receive

Accessing Desktop Anywhere for Windows If the Desktop Anywhere client is installed, and you log in to Desktop Anywhere, you'll be prompted to run the Desktop Anywhere client. Dependent on the web browser you are using you will need click to run Desktop Anywhere in one of the following ways Chrome Click Open Secure G Desktop Client

charter activity as the twentieth century closes from new charters of brand new cities to charter revisions by older cities. This accounts for most of the current charter activity. Charter revision in these municipalities must take into account the accumulated changes in state legislation and intervening court decisions which have made many charter

This report focuses on the operational control of the 11 charter schools and one cyber charter school managed under the banner of the two education service provider organizations. Under their respective organizational umbrellas, ASPIRA operates four charter schools and one cyber charter school, and Universal manages seven charter schools.