AVIRA SERVER SECURITY 2012, SERVER SECURITY User Manual

Avira Server Security
User Manual
Introduction
Avira Server Security - User Manual (Status: 23 Sep. 2011) 2
Trademarks and Copyright
Trademarks
Copyright information
Code provided by third party providers was used for Avira Server Security. We thank the copyright owners for making the code available to us. For detailed information on copyright, please refer to "Third Party Licenses" in the Program Help of Avira Server Security.
Introduction
Avira Server Security - User Manual (Status: 23 Sep. 2011) 3
Table of Contents
1. Introduction .................................................................................... 8
1.1 Icons and emphases ............................................................................................................... 8
2. Product information ....................................................................... 10
2.1 Functionality ........................................................................................................................... 10
2.2 Delivery scope ........................................................................................................................ 11
2.3 System requirements ............................................................................................................. 12
2.4 Licensing ................................................................................................................................. 13
3. Installation and uninstallation .......................................................... 14
3.1 Installation .............................................................................................................................. 14
3.1.1 Installation types ......................................................................................................................................... 14
3.2 Uninstallation .......................................................................................................................... 16
3.3 Installation and uninstallation on the network ..................................................................... 16
3.3.1 Installation on the network ...................................................................................................................... 17
3.3.2 Uninstallation on the network ................................................................................................................. 18
3.3.3 Command line parameters for the setup program ........................................................................... 18
3.3.4 Parameters of the file setup.inf .............................................................................................................. 18
Introduction
Avira Server Security - User Manual (Status: 23 Sep. 2011) 4
4. User interface and operation ........................................................... 20
4.1 User interface: Avira Server Security Console .................................................................... 20
4.2 User interface: Tray icon ....................................................................................................... 23
4.3 Quickstart ................................................................................................................................ 24
5. System Scanner ............................................................................ 26
6. Updates ........................................................................................ 27
7. Viruses and more ........................................................................... 28
7.1 Viruses and other malware ................................................................................................... 28
7.2 Threat categories ................................................................................................................... 31
8. Info and Service............................................................................. 35
8.1 Contact address ..................................................................................................................... 35
8.2 Technical support ................................................................................................................... 35
8.3 Suspicious file ........................................................................................................................ 36
8.4 Reporting false positives ....................................................................................................... 36
8.5 Your feedback for more security ........................................................................................... 36
9. Reference: Configuration options .................................................... 37
9.1 System Scanner ..................................................................................................................... 37
9.1.1 Action on detection .................................................................................................................................... 40
9.1.2 Further actions ............................................................................................................................................ 42
9.1.3 Archives ........................................................................................................................................................ 43
9.1.4 Exceptions .................................................................................................................................................... 44
9.1.5 Heuristic ........................................................................................................................................................ 45
9.1.6 Report ............................................................................................................................................................ 46
9.2 Realtime Protection ............................................................................................................... 47
9.2.1 Action on detection .................................................................................................................................... 50
9.2.2 Further actions ............................................................................................................................................ 53
9.2.3 Exceptions .................................................................................................................................................... 54
9.2.4 Products ........................................................................................................................................................ 57
9.2.5 Heuristic ........................................................................................................................................................ 58
9.2.6 Report ............................................................................................................................................................ 58
Introduction
Avira Server Security - User Manual (Status: 23 Sep. 2011) 5
9.3 Variables: Realtime Protection and System Scanner exceptions ..................................... 60
9.4 Update .................................................................................................................................... 61
9.4.1 Product update............................................................................................................................................ 61
9.4.2 Proxy settings .............................................................................................................................................. 63
9.5 General ................................................................................................................................... 64
9.5.1 Threat categories ....................................................................................................................................... 64
9.5.2 Password ...................................................................................................................................................... 65
9.5.3 WMI ................................................................................................................................................................ 65
9.5.4 Events ............................................................................................................................................................ 65
9.5.5 Reports .......................................................................................................................................................... 66
9.5.6 Directories .................................................................................................................................................... 66
9.6 Alerts ....................................................................................................................................... 67
9.6.1 Realtime Protection network alerts ....................................................................................................... 68
9.6.2 System Scanner network alerts ............................................................................................................. 69
9.6.3 Acoustic alerts ............................................................................................................................................. 70
9.7 Email ....................................................................................................................................... 71
9.7.1 Realtime Protection email alerts............................................................................................................ 71
9.7.2 System Scanner email alerts .................................................................................................................. 72
9.7.3 Updater email alerts .................................................................................................................................. 73
9.7.4 Email template ............................................................................................................................................ 75
1. Introduction .................................................................................... 8
1.1 Icons and emphases ............................................................................................................... 8
2. Product information ....................................................................... 10
2.1 Functionality ........................................................................................................................... 10
2.2 Delivery scope ........................................................................................................................ 11
2.3 System requirements ............................................................................................................. 12
2.4 Licensing ................................................................................................................................. 13
3. Installation and uninstallation .......................................................... 14
3.1 Installation .............................................................................................................................. 14
3.1.1 Installation types ......................................................................................................................................... 14
3.2 Uninstallation .......................................................................................................................... 16
3.3 Installation and uninstallation on the network ..................................................................... 16
3.3.1 Installation on the network ...................................................................................................................... 17
3.3.2 Uninstallation on the network ................................................................................................................. 18
Introduction
Avira Server Security - User Manual (Status: 23 Sep. 2011) 6
3.3.3 Command line parameters for the setup program ........................................................................... 18
3.3.4 Parameters of the file setup.inf .............................................................................................................. 18
4. User interface and operation ........................................................... 20
4.1 User interface: Avira Server Security Console .................................................................... 20
4.2 User interface: Tray icon ....................................................................................................... 23
4.3 Quickstart ................................................................................................................................ 24
5. System Scanner ............................................................................ 26
6. Updates ........................................................................................ 27
7. Viruses and more ........................................................................... 28
7.1 Viruses and other malware ................................................................................................... 28
7.2 Threat categories ................................................................................................................... 31
8. Info and Service............................................................................. 35
8.1 Contact address ..................................................................................................................... 35
8.2 Technical support ................................................................................................................... 35
8.3 Suspicious file ........................................................................................................................ 36
8.4 Reporting false positives ....................................................................................................... 36
8.5 Your feedback for more security ........................................................................................... 36
9. Reference: Configuration options .................................................... 37
9.1 System Scanner ..................................................................................................................... 37
9.1.1 Action on detection .................................................................................................................................... 40
9.1.2 Further actions ............................................................................................................................................ 42
9.1.3 Archives ........................................................................................................................................................ 43
9.1.4 Exceptions .................................................................................................................................................... 44
9.1.5 Heuristic ........................................................................................................................................................ 45
9.1.6 Report ............................................................................................................................................................ 46
9.2 Realtime Protection ............................................................................................................... 47
9.2.1 Action on detection .................................................................................................................................... 50
9.2.2 Further actions ............................................................................................................................................ 53
9.2.3 Exceptions .................................................................................................................................................... 54
9.2.4 Products ........................................................................................................................................................ 57
9.2.5 Heuristic ........................................................................................................................................................ 58
Introduction
Avira Server Security - User Manual (Status: 23 Sep. 2011) 7
9.2.6 Report ............................................................................................................................................................ 58
9.3 Variables: Realtime Protection and System Scanner exceptions ..................................... 60
9.4 Update .................................................................................................................................... 61
9.4.1 Product update............................................................................................................................................ 61
9.4.2 Proxy settings .............................................................................................................................................. 63
9.5 General ................................................................................................................................... 64
9.5.1 Threat categories ....................................................................................................................................... 64
9.5.2 Password ...................................................................................................................................................... 65
9.5.3 WMI ................................................................................................................................................................ 65
9.5.4 Events ............................................................................................................................................................ 65
9.5.5 Reports .......................................................................................................................................................... 66
9.5.6 Directories .................................................................................................................................................... 66
9.6 Alerts ....................................................................................................................................... 67
9.6.1 Realtime Protection network alerts ....................................................................................................... 68
9.6.2 System Scanner network alerts ............................................................................................................. 69
9.6.3 Acoustic alerts ............................................................................................................................................. 70
9.7 Email ....................................................................................................................................... 71
9.7.1 Realtime Protection email alerts............................................................................................................ 71
9.7.2 System Scanner email alerts .................................................................................................................. 72
9.7.3 Updater email alerts .................................................................................................................................. 73
9.7.4 Email template ............................................................................................................................................ 75
Introduction
Avira Server Security - User Manual (Status: 23 Sep. 2011) 8
1. Introduction
Your Avira product protects your computer against viruses, worms, Trojans, adware and spyware and other risks. In this manual these are referred to as viruses or malware (harmful software) and unwanted programs.
The manual describes the program installation and operation. For further options and information, please visit our website:
http://www.avira.com
The Avira website lets you:
access information on other Avira desktop programs download the latest Avira desktop programs download the latest product manuals in PDF format download free support and repair tools access our comprehensive knowledge database and FAQs for troubleshooting access country-specific support addresses.
Your Avira Team
1.1 Icons and emphases
The following icons are used:
Icon /
designation
Explanation
Placed before a condition which must be fulfilled prior to execution of an action.
Placed before an action step that you perform.
Placed before an event that follows the previous action.
Warning
Placed before a warning when critical data loss might occur.
Introduction
Avira Server Security - User Manual (Status: 23 Sep. 2011) 9
Note
Placed before a link to particularly important information or a tip which makes your Avira product easier to use.
The following emphases are used:
Emphasis
Explanation
Italics
File name or path data.
Displayed software interface elements (e.g. window section or error message).
Bold
Clickable software interface elements (e.g. menu item, navigation area, option box or button).
Product information
Avira Server Security - User Manual (Status: 23 Sep. 2011) 10
2. Product information
2.1 Functionality
The Avira Server Security protection package includes the Avira Server Security service and the Avira Server Security Console. The Avira Server Security service protects your Windows Server from viruses and malware. The Avira Server Security Console is used for management, control and monitoring of the servers to be protected or of the Avira Server Security services on the servers to be protected. You can access any number of servers via the Avira Server Security Console.
The Avira Server Security service
... protects your servers against viruses and malware. You install the service on all Windows servers to be protected on the network.
The Avira Server Security service provides comprehensive functions to protect your system in one package with several program components and other help programs. Overview of the main components:
The System Scanner scans your computer system for viruses and unwanted programs
(on-demand scan). Affected files are deleted, repaired or moved to quarantine depending on the configuration. System Scanner scans are performed automatically. The interval and scope of scans can be configured.
The Realtime Protection runs in the background. It monitors and repairs files, if
necessary, during operations such as opening, writing and copying in real time.
The Scheduler supports you in planning regular tasks such as scans and updates via
the Internet or Intranet.
Product information
Avira Server Security - User Manual (Status: 23 Sep. 2011) 11
The Updater always keeps your program up to date via an Internet or intranet
connection.
The Quarantine manager conveniently manages and monitors the files placed in
quarantine.
Avira Server Security Console
... provides a desktop for Avira Server Security services with which you can control, configure and monitor Avira Server Security services. You install the Avira Server Security Console on at least one computer with a network connection to the servers to be protected. Avira Server Security Console can also be installed on the servers to be protected.
The Avira Server Security Console can be connected to any number of servers to be protected and provides access to components, reports, events and to the Configuration of the connected Avira Server Security service.
2.2 Delivery scope
Main features:
Console for monitoring, management and control of the whole program Simple, keyword-based configuration: support for configuration through integrated
wizard and context-sensitive help
Configuration and operation from separate computer possible: user interface (Avira
Server Security Console) can be installed separately from the Avira Server Security service
Network management via the Avira Management Console (AMC) System Scanner (on-demand scan) with profile-controlled and configurable scan for all
known types of viruses and malware
Resident virus guard (real-time scan or on-access scan) for constant monitoring of all
file accesses
Extremely high virus and malware detection via innovative scanning technology (scan
engine) including heuristic scanning method
Innovative AHeAD (Advanced Heuristic Analysis and Detection) technology for
detection of unknown or fast changing attackers for proactive security
Detection of all conventional archive types including detection of nested archives and
smart extension detection
Comprehensive filter functions and file caching to increase scanning speed "Multi-threading capability": simultaneous scanning of many files at high speed Configurable reactions to a detection: repair, deletion, moving to a quarantine directory,
blocking, renaming and isolation of programs or files; automatic removal of viruses and malware
Product information
Avira Server Security - User Manual (Status: 23 Sep. 2011) 12
Quarantine manager: infected files can be deleted in the quarantine directory or
restored at their place of origin
Integrated scheduler for planning one-off or recurring jobs such as updates or scans Automatable updating via the Internet or network-wide distribution (without system
interruption)
Comprehensive logging, warning and messaging functions for the administrator;
sending of warnings in Windows networks and by email (SMTP), SMTP authentication possible
Protection against modification of the program files as a result of intensive self-test Extended terminal server support Rootkits protection (not under Windows XP 64 bit, Windows 2003 64 bit, Windows
Server 2003 64 bit)
Support for Windows Management Instrumentation
2.3 System requirements
The Avira Server Security has the following requirements for successful use of the Avira Server Security service and the Avira Server Security Console:
Computer Pentium or later, at least 1 GHz Operating system
Windows XP, SP3 (32 or 64 bit) or Windows Vista (32 or 64 bit, SP1 recommended) or Windows 7 (32 or 64 bit) or Windows Server 2003, SP1 (32 or 64 bit) or Windows Server 2008 (32 or 64 bit) or Windows Server 2008 R2 (64 bit only)
At least 150 MB of free hard disk memory space (more if using quarantine for temporary
storage)
At least 512 MB RAM (dedicated to Avira Server Security only) under Windows Server
2003
At least 1024 MB RAM (dedicated to Avira Server Security only) under Windows Vista,
Windows 7, Windows Server 2008 and Windows Server 2008 R2
For installation of the Avira Server Security: Administrator rights
Internet access
For regular updates it is necessary for a server in your network to have Internet access. Alternatively, the updates can also be downloaded from a file or HTTP server in the Intranet. More information is available under Update.
Product information
Avira Server Security - User Manual (Status: 23 Sep. 2011) 13
2.4 Licensing
You require a license to use Avira Server Security. Activate your license for Avira Server Security with the license file hbedv.key. You can obtain the license file by email from Avira. The license file contains the license for all products that you have ordered in one order process. You thereby accept the license terms.
License models
You can use the many functions of Avira Server Security with the following license models:
Evaluation version: Complete range of functions, 30-day license. Full version
Licensing comprises a license for all platforms and depends on the number of users in the network who are to be protected by Avira Server Security. For further information on the licensing versions and the optional support offers, please go to our website: http://www.avira.com
The delivery scope of a full version comprises:
provision of Avira version to download from the Internet four weeks installation support from date of purchase newsletter service (by email) update service via Internet
Installation and uninstallation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 14
3. Installation and uninstallation
3.1 Installation
Before installing Avira Server Security, certain conditions must be met:
Please ensure that the system requirements are met (see System requirements),
and that the Windows Server used is running.
Ensure that you are logged in on the server as an administrator or as a user with
administrator rights.
Ensure that an Internet connection or network connection to a download server
exists for updating the Avira Server Security. If you use a fileserver, you may require a user name and a password for server login.
When installing the full version: ensure that a valid license file hbedv.key exists and
is stored in a local directory on the server.
When installing the service Avira Server Security: If you want to connect remotely to
the protected server with the Avira Server Security Console, ensure that the following ports are opened: 139 (NetBIOS SSN) 137 (NetBIOS NS) 138 (NetBIOS DGM)
Note When installing on a server operating system, the Realtime Protection and the files protection are not available.
3.1.1 Installation types
During installation you can select a setup type in the installation wizard:
Express
Avira Server Security is installed together with the Avira Server Security service, the
Avira Server Security Console and all recommended program components.
No destination folder can be selected for the program files to be installed.
User-defined
You can select whether you want to install the Avira Server Security service and/or the
Avira Server Security Console.
You have the option to select and install additional functions for the Avira Server
Security service: Avira Rootkits Protection: This function contains the rootkit scan profile, which you can use to look for hidden malware.
Installation and uninstallation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 15
VMware Offline System Scanner: This function contains the VMware-Image scan profile, which you can use to perform an offline scan of VMware images for viruses and unwanted programs. Shell Extension: This function generates an entry in the context menu of Windows Explorer that can be used to scan directories for viruses and unwanted programs.
A target folder can be selected for the program files to be installed.
Performing installation
Installing the Avira Server Security:
Start the setup by double-clicking the installation file that you have downloaded from the
Internet or insert the program CD. The installation wizard opens.
Follow the instructions of the installation wizard. Complete the following installation
steps:
Where appropriate, install Microsoft Visual C++ 2008 - Redistributable Kit, if the kit has
not already been installed.
Note
Avira Server Security uses the runtime libraries of the Microsoft Visual C++ 2008 - Redistributable Kit. To use the Avira Server Security, Microsoft Visual C++ 2008 - Redistributable Kit must be installed.
Confirmation of license agreements Selection of the type of setup (express installation or user-defined installation) Licensing of the Avira Server Security: Load the license file or select a 30-day test
license
Installation of Avira Server Security service and/or Avira Server Security Console
If you have installed the Avira Server Security service, a configuration wizard opens after the installation has been completed. You have the option of configuring the most important settings of the installed Avira Server Security service.
Defining AHeAD (Advanced Heuristic Analysis and Detection) technology
settings: The settings are defined for System Scanner and Realtime Protection.
Selection of extended threat categories: By selecting other extended threat
categories to be detected and reported by the Avira Server, you can adapt the protective function of the Avira Server Security to meet your needs.
Selection of product exceptions (Realtime Protection): You can select software
products to be exempt from monitoring by the Realtime Protection (on-access System Scanner). In this way you can avoid any loss of performance that the Realtime Protection may cause.
Installation and uninstallation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 16
Select email settings: You can define the server settings for sending email. Avira
Server Securityuses SMPT to send emails send email alerts to the Avira Server Security administrator.
Note
After installation, your own system is automatically added by the Avira Server Security Console (Local Host/127.0.0.1) as a server to be protected, even if no Avira Server Security service is installed.
Note
If you want to add or remove program components of the current Avira Server Security installation, use the Avira Server Security setup.
3.2 Uninstallation
Carry out uninstallation via the Control Panel of the operating system or via the setup of your Avira product.
During uninstallation, the Avira services are stopped, all report files and infected files (in quarantine) are deleted.
During uninstallation you can specify that the directories with the report files and the quarantine are not deleted.
You will be asked to restart your computer.
Click Yes to confirm.
Your Avira product is uninstalled now.
3.3 Installation and uninstallation on the network
To simplify installation of Avira products on a network of multiple client computers for the system administrator, your Avira product has a special procedure for the initial installation and the change installation.
For automatic installation, the setup program works with the control file setup.inf. The setup program (presetup.exe) is contained in the program’s installation package. Installation is started with a script or batch file and all necessary information is obtained from the control file. The script commands therefore replace the usual manual inputs during installation.
Installation and uninstallation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 17
Note
Please note that a license file is obligatory for initial installation on the network.
Note
Please note that an installation package for the Avira product is required for installation via a network. An installation file for Internet-based installation cannot be used.
Avira products can be easily shared on the network with a server login script or via SMS. For information on installation and uninstallation on the network:
see Chapter: Command line parameters for the setup program see Chapter: Parameter of the file setup.inf see Chapter: Installation on the network see Chapter: Uninstallation on the network
3.3.1 Installation on the network
The installation can be script-controlled in batch mode. The setup is suitable for the following installation:
Initial installation via the network (unattended setup)
Change installation and update
Note
We recommend that you test automatic installation before the installation routine is implemented on the network.
Note When installing on a server operating system, the Realtime Protection and the files protection are not available.
To install Avira product on the network automatically:
You must have administrator rights (also required in batch mode) Configure the parameter of the file setup.inf and save the file. Begin installation with the parameter /inf or integrate the parameter into the login
script of the server.
Installation and uninstallation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 18
Example: presetup.exe /inf="c:\temp\setup.inf"
3.3.2 Uninstallation on the network
To uninstall Avira products on the network automatically:
You must have administrator rights (also required in batch mode)
Example: presetup.exe /remsilent
/unsetuplog="c:\logfiles\unsetup.log"
Start the uninstallation with the parameters /inf and /AVUNINSTALL or integrate
the parameters into the login script of the server.
3.3.3 Command line parameters for the setup program
Use the following parameters for installation and uninstallation:
/INF=<Script name with path>
The setup program starts with the script mentioned and retrieves all parameters
required. Installation: PRESETUP.EXE /INF=e:\disks\setup.inf
Uninstallation: PRESETUP.EXE /INF=e:\disks\setup.inf /AVUNINSTALL
/SILENT
The setup script runs down completely without user interaction.
3.3.4 Parameters of the file setup.inf
In the control file setup.inf, you can set the following parameters in the [DATA] field for the automatic installation of the Avira product. The sequence of the parameters is unimportant. If a parameter setting is missing or wrong, the setup routine is aborted and an error message is displayed.
InstallPath
Destination path in which the Avira Server Security is installed. It has to be included
to the script. The environment variable cannot be used.
Example: InstallPath="%PROGRAMFILES%\Avira\AntiVir Server\"
LicenseFile=<Path and file name of the license file>
Avira Server Security is installed with the license. If you enter the file name only, the
license file will be searched in the source folder of the setup only.
Example: LicenseFile="A:\hbedv.key"
RestartWindows= 0 | 1
If a restart of the system is required after the installation, this can be performed
automatically (standard) or a message box is displayed. 0: Disabled (restart with Message Box) 1: Enabled (automatic restart)
Installation and uninstallation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 19
DeleteFolderOnUninstall=1
Deletes the configuration during uninstallation
Guard= 0 | 1
Installs the Avira Realtime Protection (on-access Scanner). 1: Install Avira Realtime Protection (default) 0: Do not install Avira Realtime Protection
RootKit= 0 | 1
Installs the AntiVir rootkit protection module. The module detects malware hidden in
the system. 1: Install AntiVir Rootkits Protection 0: Do not install AntiVir Rootkits Protection (default)
VMWare= 0 | 1
Installs the VMWare offline Scanner. The module performs an offline scan of
VMWare images for viruses and malware. 1: Install VMWare offline Scanner 0: Do not install VMWare offline Scanner (default)
ShellExtension= 0 | 1
Installs the Shell extension. Directories can be scanned directly for viruses and
unwanted programs using an entry in the Windows Explorer context menu. 1: Install Shell extension (default) 0: Do not install Shell extension
Systray= 0 | 1
Installs the Systray tool. An Avira Server Security tray icon is visible in the notification
area of the protected server. The Tray Icon lets you monitor the status of the Avira
Server Security and gives you access to other Avira Server Security functions. 1: Install Systray tool (default) 0: Do not install Systray tool
GUI= 0 | 1
Installs the Avira Server Security Console user interface, which allows you to
remotely manage and configure the Avira Server Security services running on
protected servers. 1: Installs the Avira Server Security Console (default) 0: Does not install the Avira Server Security Console
In the [FEEDBACK] section the setup enters error codes and error test which are reported by the setup:
Example: ErrCode=0
ErrMsg=Product was installed successfully
User interface and operation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 20
4. User interface and operation
4.1 User interface: Avira Server Security Console
The Avira Server Security service that is installed on the servers to be protected is managed via the Avira Server Security Console. The Avira Server Security Console is a snap-in of the Microsoft Management Console (MMC). You can create any number of servers to be protected on the Avira Server Security Console in order to configure and monitor them on the Avira Server Security Console.
Note
Please note that only the proprietary elements of the Avira Server Security Console are documented in this help. For information on the MMC and on manual integration of a snap-in, please refer to the user manual or the online help of the operating system.
Starting and closing the Avira Server Security Console
Start the Avira Server Security Console via the Avira Server Security user interface link in the Windows Start menu or under All programs. You can also load the Avira Server Security Console directly in the MMC. You will find the preconfigured Avira Server Security Console in the installation directory of the Avira Server Security Console. To close the Avira Server Security Console, you must close MMC.
Operation
Navigate via the console structure in the left-hand window of the MMC.
User interface and operation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 21
Navigation elements are also displayed as objects in the right-hand detail window of
the MMC. Open these objects in the detail window by double-clicking.
The Configuration is located under the node Settings. Expand the node and click
the module you would like to configure.
You can select various configuration sections in the detail window:
Commands and actions are available via icons in the detail window and via context
menus of the individual console nodes or of objects in the detail window.
When configuring a server, you must confirm information in the window Settings with
the button OK or Accept in order to accept the new settings. Your settings are
cancelled with the button Cancel.
Avira Server Security Console overview
Avira Server Security
Display of the created servers with connection status Actions: Add server
Note
The local Avira server and all Avira severs added by the registered user are displayed on the Avira Server Security Console.
Server
Display of server status Actions:
start product update update license file reload configuration display report file rename server disconnect server connect server delete server
Overview
system status (last system test, last update, license) statistical data of the on-access scan of the Realtime Protection and the on-demand
scan of the System Scanner
program version
User interface and operation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 22
contact and support addresses
Profiles
Display of the default profiles and of the profiles created for the on-demand scan Actions:
create new profiles rename profiles delete profiles
Quarantine
Display of the objects in quarantine Actions:
scan object again display object properties restore object add file to quarantine send object to Avira Malware Research Center delete object export all properties
Scheduler
Display of all created scanning and update jobs Actions:
insert new jobs display job properties edit job delete job
Reports
Display reports of scans of on-demand scan and updates Actions:
display report display report file print report delete report
User interface and operation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 23
Events
Display all events of the Avira Server Security service on the server to be protected Actions:
display events export events delete events
Settings
Configuration of the Avira Server Security service on the server to be protected Configuration sections:
System Scanner: Configuration of on-demand scan Realtime Protection: Configuration of on-access scan General: Extended risk categories for on-demand and on-access scans, password
protection for the server on the Avira Server Security Console, security alerts for
outdated Avira servers, directories used, restriction of reports and of event log
Update: Download via web server or file server, product updates, configuration of
connection to the download server
Alerts: Configuration of network alerts of the Realtime Protection and System
Scanner
Email: Configuration of email alerts via SMTP from the Realtime Protection, System
Scanner, Updater modules
4.2 User interface: Tray icon
After installation of the Avira Server Security service, the Avira Server Security tray icon is displayed on the protected server in the notification area. The tray icon displays the status of the Avira Realtime Protection:
Icon
Description
Avira Realtime Protection is enabled
Avira Realtime Protection is disabled
You can access the functions via the tray icon context menu.
To open the context menu, click the tray icon with the right-hand mouse button.
Start Avira: Opens the Avira Server Security Console for management of the
connected Avira Server. This option is only available if an Avira Server Security
User interface and operation
Avira Server Security - User Manual (Status: 23 Sep. 2011) 24
Console has been installed locally on the computer and if you are logged on to the computer with administrator rights.
Check My Documents: Starts the System Scanner scan profile My Documents: The
default My files location of the logged-in user is scanned for viruses and unwanted programs.
Help: opens the Online Help. Avira on the Internet: Opens the Avira web portal.
Note
The Avira Server Security Console can also be opened by double-clicking the tray icon.
4.3 Quickstart
Carry out these steps if you are using the Avira Server Security for the first time:
1. Installation
Install the Avira Server Security service on the servers that you want to protect against
viruses and unwanted programs. Install the Avira Server Security Console on at least one computer on your network. See chapter Installation.
2. Management on the Avira Server Security Console
Add server
Add all servers on the Avira Server Security Console that you want to manage on
the Avira Server Security Console. See Chapter Avira Server Security Console.
Carry out the following steps for every server added:
Configuration
Configure the Avira Server Security service on the server to be protected. Assign a
password for the server on the Avira Server Security Console. See Chapters Settings and Settings > General > Password.
Carry out update and system scan
First carry out an update. For this, create an update job in the Scheduler. Select
"Immediately" as the start time. Carry out a complete system scan. For this, create a scan job in the Scheduler. For the scan job, select "Local hard disks" as the profile
Loading...
+ 55 hidden pages