No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without
the written permission of NcAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN
(STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA),
INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN,
MCAFEE.COM, MCAFEE VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE,
PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN
KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the
US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are
the sole property of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE
CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU
HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU
DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF
APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE F OR A FULL REFUND.
SonicWALL Enforced Client Anti-Virus and Anti-Spyware, referred to in this guide as Enforced
Client, safeguards your computers automatically, and its advanced features let you customize
your business’s security strategy.
This section provides an overview of the product, its features, and how to use product resources
for additional assistance.
What is Enforced Client?
What is new in this release?
How does the software work?
Managing with the online SecurityCenter
Using this guide
Getting product information
7
Enforced Client Product GuideIntroduction
What is Enforced Client?
What is Enforced Client?
Enforced Client delivers comprehensive security as a service for all the computers on your
account. These services automatically check for threats, intercept them, take the appropriate
action to keep your data and your network safe, and track detections and security status for
reports.
Figure 1-1 Enforced Client overview
1
1
2
The Enforced Client client software runs on each computer where it is installed.
The client software updates itself — automatically and silently — by downloading the latest
detection definition (
DAT) files from your account’s administrative website, the SonicWALL
SecurityCenter.
3
4
The client software uploads security information about each computer to the SecurityCenter
for use in administrative reports.
As your account’s administrator, you can use a web browser to visit the SecurityCenter,
where you can access reports that detail the status of client computers and use tools for
customizing and managing security.
Select the right version of Enforced Client
Protect against many kinds of threats
Ensure continuous, automatic protection
8
Enforced Client Product GuideIntroduction
What is Enforced Client?
Select the right version of Enforced Client
Select the version that best supports your needs.
Enforced Client Anti-Virus and Anti-Spyware
Basic Advanced
Virus and spyware protection for desktop
computers and servers.
Firewall protection for desktop computers and
servers.
Browser protection for desktop computers.
Access to the SonicWALL SecurityCenter for
centralized management of your accounts.
This guide focuses on the Enforced Client services for desktop computers and servers, and also
contains instructions for setting up the email security service available in Enforced Client
Advanced. Refer to your product CD or the SonicWALL download center for information about
using the email server security application.
Virus and spyware protection for desktop
computers and servers.
Firewall protection for desktop computers and
servers.
Browser protection for desktop computers.
Access to the SonicWALL SecurityCenter for
centralized management of your accounts.
Email security:
Email security service to protect all inbound
email against virus, spam, and phishing attacks,
or
Email server security application for additional
virus protection at the server level.
1
Protect against many kinds of threats
Enforced Client protects against a broad range of threats:
The virus and spyware protection service checks for viruses, spyware, unwanted
programs, and other potential threats borne on removable media or brought in from your
network, including via email. Every time a file on your computer is accessed, your service
scans the file to make sure it is free of viruses and spyware.
The firewall protection service establishes a barrier between each computer and the Internet
or other computers on your local network. It silently monitors communications traffic for
suspicious activity and takes appropriate action, such as blocking.
The browser protection service displays information to safeguard client computer users
against web-based threats. Users can view website safety ratings and safety reports as they
browse or search with Microsoft Internet Explorer or Mozilla Firefox.
The email security service protects against email threats by scanning messages before they
are received. It blocks or quarantines detections of directory harvest attacks, spam, phishing
scams, viruses, and other email-borne threats in messages and attachments, to prevent them
from reaching client computers. The email security service is available with Enforced Client
Advanced.
The email server security application, SonicWALL GroupShield
and Lotus Domino, provides comprehensive virus protection for the email and other content
entering and leaving your Microsoft Exchange Server 2000/2003 environment. Proactive
anti-virus scanning and an automatic outbreak manager prevent malicious code from
disrupting the system, while advanced content filtering allows administrators to set up rules
for inappropriate content, sensitive information, and adding disclaimers to messages.
®
for Microsoft Exchange
9
Enforced Client Product GuideIntroduction
What is Enforced Client?
The email server security application is available with Enforced Client Advanced. Detailed
documentation on this application is available on the CD or in the downloadable installer
accessible from the SonicWALL download center.
Ensure continuous, automatic protection
Enforced Client safeguards your computers with:
Continuous protection — From the time a client computer is turned on until it is turned off,
Enforced Client silently monitors all file input and output, downloads, program executions,
inbound and outbound communications, and other system-related activities.
Instant discovery — When Enforced Client detects a virus threat, it attempts to clean the
item containing the threat before further damage can occur. If an item cannot be cleaned, a
copy of it is placed in a quarantine folder and the original item is deleted.
Customized threat response — By default, Enforced Client provides a high degree of
protection against threats. You can also configure the response to detections of potentially
unwanted programs and suspicious activity to suit the needs of your business: take immediate
action to clean, quarantine, or block the detection; prompt users for a response; or only log
the detection for administrative reports.
Automatic updates — Enforced Client checks for product updates at regular intervals
throughout the day, comparing security components against the latest releases. When a
computer needs a newer version, the client software automatically retrieves it.
1
Avert Early Warning system and outbreak response — Enforced Client uses the latest
information about threats and outbreaks as soon as they are discovered by SonicWALL Avert
Labs, a research division of SonicWALL. Whenever Avert Labs releases an outbreak
detection definition (
DAT) file, your network receives it promptly.
10
Enforced Client Product GuideIntroduction
What is new in this release?
What is new in this release?
New features
New feature Description
Browser protection
service
New policy options for
greater control
Auto-renewal option If your service provider has enabled this option, automatically renews your
Changes in support
Support for... Description
Operating systems Provides protection services for computers running Windows Vista.
Browsers
Languages
Protects client computers against web-based threats while searching and
browsing. Users can display a color-coded safety rating and detailed report
for each website. See Chapter 6, Using the Browser Protection Service.
Virus and spyware protection service: On-demand scans now scan all file
types by default, or administrators can select a policy option to scan only
certain types of files. See Enable optional protectionon page 97.
Firewall protection service: Select whether to use SonicWALL
recommendations for safe Internet applications or allow only those you
specify. See Specify whether to use SonicWALL recommendationson
page 121.
subscriptions before they expire.
Extends support to 64-bit versions of Windows XP and Windows Vista.
See Operating systemson page 27.
Computers running older versions of Windows will continue to be
supported against existing threats, but protection against new threats will
be phased out as
support ending on page 28.
Administrators can configure a policy option for displaying notifications
on client computers to remind users that support is ending. See Notifying
users when support ends on page 28.
Installs on computers using Windows Internet Explorer version 7. See
Chapter 2, Installing Enforced Client.
Adds browser protection for Mozilla Firefox. See Chapter 6, Using the
Browser Protection Service.
With Enforced Client Advanced, Quarantine Summary emails generated by
the email security service are now available in multiple languages.
Note: No localized version is available for Brazilian Portuguese.
DAT files are no longer updated. See Operating system
1
11
Enforced Client Product GuideIntroduction
How does the software work?
How does the software work?
Enforced Client implements a three-prong approach to security by:
1 Silently monitoring all file input and output, downloads, program executions, inbound and
outbound communications, and other system-related activities on client computers.
Detected viruses are deleted or quarantined automatically.
Potentially unwanted programs, such as spyware or adware, are removed automatically
unless you select a different response.
Suspicious activity is blocked unless you specify a different response.
2 Regularly updating detection definition (DAT) files and software components to ensure that
you are always protected against the latest threats.
3 Uploading security information for each client computer to the SecurityCenter, then using
this information to send emails and create reports that keep you informed about your
account’s status.
In addition, it provides tools for managing client computers and customizing your security
strategy.
1
The updating process
Outbreak response
Rumor technology
Internet Independent Updating (IIU)
The updating process
Regular updates are the cornerstone of Enforced Client.
Updates of its security components running on client computers. See Retrieving updates.
Updates to the security data maintained on the SecurityCenter website and used in
administrative reports. See Uploading security information.
12
Enforced Client Product GuideIntroduction
How does the software work?
Updates can occur in three ways, enabling you to use network resources efficiently.
Figure 1-2 Methods for updating client computers
1
In a simple scenario, each client computer on your account has a direct connection to the
Internet and checks for new updates.
Rumor technology enables all computers in a workgroup to share downloaded files, which
controls Internet traffic and minimizes expensive downloads.
Internet Independent Updating (IIU) enables any computer on the network to get information
from the update site, even if that computer does not have an Internet connection, as long as
at least one computer on the network is configured as a relay server.
Retrieving updates
Five minutes after a client computer starts, and at regular intervals throughout the day, the
Enforced Client client software checks if updates are available. If they are, the client computer
pulls them from another computer on the network (via
directly from the Internet site.
13
Rumor technology) or downloads them
Enforced Client Product GuideIntroduction
How does the software work?
The detection definition (DAT) files on the Internet site are regularly updated to add protection
against new threats. When the client software connects to the update site on the Internet, it
retrieves:
Regular DAT files, which contain the latest definitions for viruses, potentially unwanted
programs, and cookies and registry keys that might indicate spyware.
Outbreak DAT files, which are high-priority detection definition files released in an
emergency situation (see Outbreak response).
Upgrades to the software if a newer version exists.
Policy updates.
At any time, users can update manually by double-clicking in the system tray.
Update support for some operating systems is ending. After support ends, client computers
running those operating systems will no longer be protected against new threats. See Operating
Note
system support ending on page 28 for more information.
Uploading security information
Client computers upload detection and status data hourly to the SecurityCenter website. This
information is available to administrators in reports they can view on the SecurityCenter (see
Viewing reports on page 78).
1
Outbreak response
When an outbreak of a new threat is identified by Avert Labs, they issue an outbreak DAT, which
is a special detection definition (
encoded to inform the first computer receiving it to share the update immediately with other
client computers on the network. By default, client computers check for an outbreak
hour.
Rumor technology
When one computer shares updates with other computers on the local area network (LAN),
rather than requiring each computer to retrieve updates from the update website individually, the
Internet traffic load on the network is reduced. This process of sharing updates is called Rumor.
1 Each client computer checks the version of the most recent catalogfile on the Internet site.
This catalog file contains information for every component in Enforced Client, and is stored
in a digitally signed, compressed .
If the version is the same as the catalog file on the client computer, the process stops here.
If the version is different from the catalog file on the client computer, the client computer
attempts to retrieve the latest catalog file from its peers. It queries if other computers on
the LAN have already downloaded the new catalog file.
2 The client computer retrieves the required catalog file (directly from the Internet site or from
one of its peers) and uses it to determine if new components are available for Enforced Client.
DAT) file marked as Medium or High importance. It is specially
DAT every
CAB file format.
3 If new components are available, the client computer attempts to retrieve them from its peers.
It queries if computers on the LAN have already downloaded the new components.
14
Enforced Client Product GuideIntroduction
How does the software work?
If so, the client computer retrieves the update from a peer. (Digital signatures are checked
to verify that the computer is valid.)
If not, the client computer retrieves the update directly from the update site.
4 On the client computer, the catalog file is extracted and new components are installed.
Internet Independent Updating (IIU)
Internet Independent Updating enables computers to use Enforced Client when they are not
connected to the Internet. At least one computer on the subnet must have an Internet connection
to be able to communicate with the udpate site. That computer is configured as a relay server,
and computers without an Internet connection retrieve updates locally from the relay server.
1 When a computer without Internet access fails to connect directly to the update site, it
requests information from the relay server.
2 The relay server downloads a catalog of updates from the update site.
3 The computer with no Internet connection downloads the necessary updates from the relay
server.
For more information, see Enabling relay serverson page 46.
1
15
Enforced Client Product GuideIntroduction
Managing with the online SecurityCenter
Managing with the online SecurityCenter
To manage your account via the SecurityCenter, use the URL you received in an email message
from your service provider. From the SecurityCenter, you can view the status of your protection
services, access reports on client activity such as detections and suspicious activity, update your
account data, and configure security settings. You can manage client computers by customizing
how often they check for updates, changing the way they handle detections, and scheduling
regular scans.
Figure 1-3 The online SecurityCenter
1
16
Enforced Client Product GuideIntroduction
Managing with the online SecurityCenter
The SecurityCenter’s main page shows a status summary for all the protection services you have
purchased (except email server protection):
Security Status — Indicates whether any action is required to address security issues, and
links you to instructions for resolving them.
Your virus and spyware protection — Illustrates the number of computers that are up-to-date
and out-of-date, and where the virus and spyware protection service is not installed. Click a
color in the pie chart to display a list of computers in that category.
Your desktop firewall protection — Illustrates the number of computers where the firewall
protection service is and is not installed. Click a color in the pie chart to display a list of
computers in that category.
Your email protection — Illustrates the number of messages delivered by category (clean,
spam, virus detected). Click a color in the pie chart or select the
Click here to configure link to
open the email security service’s web portal and view reports about your email.
Your browser protection — Illustrates the number of computers where the browser protection
service is and is not installed. Click a color in the pie chart to display a list of computers in
that category.
See Using the SecurityCenteron page 55 for more information.
1
The SecurityCenter offers two powerful tools for displaying your computers in groups and
fine-tuning their security settings.
User groups enable you to effectively categorize and manage client computers that require
different security settings or special monitoring.
Customized policies allow you to specify security settings to meet the needs of your users and
effectively use your network resources.
17
Enforced Client Product GuideIntroduction
Managing with the online SecurityCenter
User groups
Each computer running the client software belongs to a group. A group consists of one or more
computers using the same security settings (called policies). By default, computers are placed in
the
Default group.
Groups help you manage different types of computers effectively. You can base groups on
geographic location, department, computer type, user tasks, or anything meaningful to your
organization.
For example, you might place all laptops used by traveling sales representatives into a single
group called Sales Team. You can then view details about this group of computers separately
from other computers in your account. You can easily check detections for these computers or
customize their security settings in a policy (see
for specific circumstances and risks of a remote user.
To create groups, use the Groups + Policies tab on the SecurityCenter website. See Creating
groups to manage your site on page 71 for more information.
The following example shows how an administrator might configure policies for three different
groups of client computer users in an organization. You should configure policies for your users
to meet your own company’s needs.
Use Smart Recommendations to automatically
approve common Internet
applications
Connection Type Trusted network Untrusted network Trusted network
Allowed Internet
Applications
AOL Instant Messenger None AOL Instant Messenger
No Enabled Enabled
Enabled No Enabled
GoogleTalk
18
Enforced Client Product GuideIntroduction
Managing with the online SecurityCenter
Customized policies
After installation, Enforced Client protects client computers from threats immediately using
default security settings. However, you might want to change the way some features are
implemented for some or all of your computers. For example, you might want the service to
check for updates every four hours or set up a list of programs you consider safe.
Policies are made up of security settings that define how protection services operate on client
computers. Policy management allows you to assign different levels and types of protection to
different users. If you have created groups, you can assign a unique policy to each group or one
policy to all groups.
For example, you can assign a Sales policy to your mobile Sales Team group, with security
settings that protect against threats in unsecure networks such as airports and hotels.
Figure 1-4 Example: Sales Team group and Sales policy
1
19
Enforced Client Product GuideIntroduction
Using this guide
1
1
2
3
4
5
6
Create a Sales Team group and a Sales policy.
Assign the Sales policy to the Sales Team group.
Client software running on computers in the Sales Team group performs the tasks defined in
the Sales policy:
Check for updates to software components and DAT files every 4 hours.
Check for outbreak DAT file every hour.
Scan for viruses and potentially unwanted programs daily.
Block communication from computers on local network (untrusted network).
Client software sends security data for each client computer to the SecurityCenter.
Administrator checks the security status for the Sales Team group in reports on the
SecurityCenter.
The administrator adjusts the Sales policy. The modified policy is downloaded automatically
to client computers in the Sales Team group the next time they check for updates.
To create your own policies and assign them to computers or groups, use the Groups + Policies
tab on the SecurityCenter website. See Setting up policieson page 75 for more information.
Using this guide
This guide provides information on installing, configuring, using, and troubleshooting Enforced
Client.
Who should read this guide?
Conventions
Who should read this guide?
This information is designed for:
System and network administrators who want to implement a proactive, hands-on approach
to their security strategy.
Partner Security Services (PSS) partners who remotely manage and monitor the
SecurityCenter on behalf of their customer base.
Hands-off administrators who do not need to customize security settings can read an overview
of basic features in the Quick Start Guide, which is available from the
SecurityCenter website.
Help page on the
20
Enforced Client Product GuideIntroduction
Using this guide
Conventions
This guide uses the following conventions:
1
Bold
Condensed
All words from the user interface, including options, menus, buttons, and dialog box
names.
Example:
Type the User name and Password of the desired account.
CourierThe path of a folder or program; text that represents something the user types exactly
(for example, a command at the system prompt).
Example:
The default location for the program is:
C:\Program Files\McAfee\EPO\3.5.0
Run this command on the client computer:
C:\SETUP.EXE
ItalicFor emphasis or when introducing a new term; for names of product documentation
and topics (headings) within the material.
Example:
Refer to the VirusScan Enterprise Product Guide for more information.
BlueA web address (URL) and/or a live link.
Visit the SonicWALL website at:
http://www.mcafee.com
<TERM> Angle brackets enclose a generic term.
Example:
In the console tree, right-click <SERVER>.
Note: Supplemental information; for example, an alternate method of executing the
Note
same command.
Tip: Suggestions for best practices and recommendations from SonicWALL for
Tip
threat prevention, performance, and efficiency.
Caution: Important advice to protect your computer system, enterprise, software
Caution
installation, or data.
Warning: Important advice to protect a user from bodily harm when interacting
with a hardware product.
Warning
21
Enforced Client Product GuideIntroduction
Getting product information
Getting product information
Several types of information are available to meet the specific needs of client computer users
and administrators.
Users — Client computer users can access online help from links in the client software.
Online User HelpAccess online instructions for performing security tasks in two ways:
Click help on any window displayed by the client software.
Click in the system tray and select Help.
Note:If the product’s built-in help system displays incorrectly on a client
computer, its version of Microsoft Internet Explorer might not be using
ActiveX controls properly. These controls are required to display the help
file. Make sure the latest version of Internet Explorer is installed with its
Internet security settings set to
Online Installation
Instructions
Administrators — Unless otherwise noted, these product documents are Adobe Acrobat .PDF files
available on the product CD or the
Product Guide Product introduction and features, detailed instructions for configuring the
Quick Start Guide A short “getting started” with information on basic product features, routine
Release Notes ReadMe. Product information, resolved issues, known issues, and
Online SecurityCenter
help
Online Push Install help
Avert Labs Threat
Library
Click the help link on any installation dialog box to display instructions for
installing Enforced Client using the URL method. Also contains instructions
for preparing for installation, testing, uninstalling, and troubleshooting
installation issues.
Help page of the SecurityCenter.
software, information on deployment, recurring tasks, and operating
procedures. Recommended for administrators who manage large
organizations or multiple accounts, and for hands-on administrators who
want to customize security settings and actively monitor client computers.
tasks that you perform often, and critical tasks that you perform
occasionally. Recommended for first-time customers who need an overview
of the product, and for hands-off administrators who plan to use the default
security settings and monitor security status through their weekly status
email.
last-minute additions or changes to the product or its documentation.
Available as a text document.
For information about any page of your SecurityCenter website, click the
help (
? ) link in the upper-right corner. You can access additional
information with the table of contents, index, or search feature.
While running the Push Install utility, click the help link on any dialog box
for information about deploying client software remotely to one or more
computers without user intervention.
After an update, click Avert Labs Threat Library on the Enforced Client
window to access the online SonicWALL Threat Library. This website has
detailed information on where threats come from, how they infect your
system, and how to remove them.
The Avert Labs Threat Library contains useful information on hoaxes, such
as virus warnings that you receive via email. A Virtual Card For You and
SULFNBK are two of the best-known hoaxes, but there are many others.
Next time you receive a well-meaning warning, view our hoax page before
you pass the message on to your friends.
Medium or Medium-high.
1
22
Enforced Client Product GuideIntroduction
Enforced Client Advanced — With Enforced Client Advanced, additional documents are available.
Email security service See Chapter 7, Using the Email Security Service for instructions on setting
up and using basic features of the email security service. Links are available
from the SecurityCenter website to the email security service’s web portal,
where you can configure the service, access its administration guide, and
view reports.
Email server security
application
Detailed documentation for the email server security application is available
on the product CD or in the downloadable installer accessible from the
SonicWALL download center.
Phone — US, Canada, and Latin America toll-free:
+1-888-VIRUS NO or +1-888-847-8766 Monday – Friday, 8 a.m. – 8 p.m., Central Time
Professional Services
Small and Medium Business: http://www.mcafee.com/us/smb/services/index.html
Enforced Client
Beta Site
http://betavscan.mcafeeasap.com
Beta Feedback
DL_ToPS_SMB_Beta@mcafee.com
23
Enforced Client Product GuideIntroduction
Getting product information
1
24
2
Installing Enforced Client
This section describes what happens after you purchase the hosted services in Enforced Client
and Enforced Client Advanced, provides system requirements, and explains how to install the
virus and spyware protection service, firewall protection service, and browser protection service.
If you purchased Enforced Client Advanced, refer to emails and materials from SonicWALL for
instructions on installing the email security service or email server security application. See
Note
Chapter 7, Using the Email Security Service for information about activating and setting up the
When you place an order for Enforced Client, you supply an email address, and your account is
associated with that email address. After you submit your order:
1 SonicWALL processes your order.
2 You receive three emails:
This email... Contains...
WelcomeThe download URL and instructions for installing the protection
services, accessing documentation, and contacting customer support.
Login credentials Instructions for logging on to the SonicWALL SecurityCenter
administrative website and changing your password.
2
Grant letter The grant number for the order, which is required for customer
support.
3 If you purchased Enforced Client Advanced, you also receive an email with instructions for
changing your MX (Mail eXchange) records. See
If you purchased Enforced Client from a SonicWALL partner who manages security for you, the
partner usually receives these emails. If you have questions about which emails you should
Note
receive, contact the partner.
Update your MX records on page 135.
Placing multiple orders
If you placed more than one order using different email addresses, you have more than one
Enforced Client account. To merge them so that all your security information and emails are sent
to a single email address, contact the SonicWALL partner from whom you ordered, or
SonicWALL customer support if you ordered directly from SonicWALL.
Enforced Client is designed for Microsoft Windows operating systems running on a PC
platform. It installs and runs on computers equipped with:
An Intel Pentium processor or compatible architecture.
Microsoft Internet Explorer 5.5 SP2 or later.
Operating systems
RAM
Email security service
Email server security application
Terminal servers
Operating systems
Protection services
Operating system Virus and spyware Firewall Browser
Client computers
Windows 2000 Professional
with Service Pack 3 or later
Windows XP Home
Windows XP Professional
(32-bit)
Windows Vista
(32-bit)
Windows XP
Windows Vista
(64-bit)
Servers
Windows 2000 Server
Advanced Server
Small Business Server
with Service Pack 3 or later
Windows 2003 Standard Server
Enterprise Server
Web Edition
Small Business Server
2
If you upgrade the operating system on a client computer (for example, from Windows 2000 to
Windows XP) and you want to leave your existing files and programs intact during the upgrade,
Caution
you must first uninstall Enforced Client, then reinstall it after the upgrade is complete.
Support for some operating systems is ending. After support ends, client computers running those
operating systems will no longer be protected against new threats. See Operating system support
Enforced Client supports terminal servers and the Windows fast user switching feature in most
scenarios, with these limitations:
Enforced Client must be installed on the server by someone with local administrator
privileges.
When an installation or update occurs on a terminal server, one session is designated as the
primary update session (see Update computers where no user is logged onon page 55 for
restrictions that apply to automatic updates).
For all user sessions, the Enforced Client icon is removed from the system tray during the
installation or update. The icon is restarted only for the user logged on to the primary update
session. All user sessions are protected, and other users can manually redisplay their icons
(see Removing and displaying the iconon page 52 for more information).
Detection notifications are not displayed on the desktop of all computer users if the fast user
switching feature is enabled.
If you use an authenticating proxy server, disable the policy option Update client computers
where users are not logged in
virus protection options on page 97).
on the SecurityCenter’s Advanced Settings tab (see Set advanced
2
30
Loading...
+ 182 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.