No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without
the written permission of NcAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN
(STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA),
INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN,
MCAFEE.COM, MCAFEE VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE,
PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN
KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the
US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are
the sole property of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE
CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU
HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU
DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF
APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE F OR A FULL REFUND.
SonicWALL Enforced Client Anti-Virus and Anti-Spyware, referred to in this guide as Enforced
Client, safeguards your computers automatically, and its advanced features let you customize
your business’s security strategy.
This section provides an overview of the product, its features, and how to use product resources
for additional assistance.
What is Enforced Client?
What is new in this release?
How does the software work?
Managing with the online SecurityCenter
Using this guide
Getting product information
7
Page 8
Enforced Client Product GuideIntroduction
What is Enforced Client?
What is Enforced Client?
Enforced Client delivers comprehensive security as a service for all the computers on your
account. These services automatically check for threats, intercept them, take the appropriate
action to keep your data and your network safe, and track detections and security status for
reports.
Figure 1-1 Enforced Client overview
1
1
2
The Enforced Client client software runs on each computer where it is installed.
The client software updates itself — automatically and silently — by downloading the latest
detection definition (
DAT) files from your account’s administrative website, the SonicWALL
SecurityCenter.
3
4
The client software uploads security information about each computer to the SecurityCenter
for use in administrative reports.
As your account’s administrator, you can use a web browser to visit the SecurityCenter,
where you can access reports that detail the status of client computers and use tools for
customizing and managing security.
Select the right version of Enforced Client
Protect against many kinds of threats
Ensure continuous, automatic protection
8
Page 9
Enforced Client Product GuideIntroduction
What is Enforced Client?
Select the right version of Enforced Client
Select the version that best supports your needs.
Enforced Client Anti-Virus and Anti-Spyware
Basic Advanced
Virus and spyware protection for desktop
computers and servers.
Firewall protection for desktop computers and
servers.
Browser protection for desktop computers.
Access to the SonicWALL SecurityCenter for
centralized management of your accounts.
This guide focuses on the Enforced Client services for desktop computers and servers, and also
contains instructions for setting up the email security service available in Enforced Client
Advanced. Refer to your product CD or the SonicWALL download center for information about
using the email server security application.
Virus and spyware protection for desktop
computers and servers.
Firewall protection for desktop computers and
servers.
Browser protection for desktop computers.
Access to the SonicWALL SecurityCenter for
centralized management of your accounts.
Email security:
Email security service to protect all inbound
email against virus, spam, and phishing attacks,
or
Email server security application for additional
virus protection at the server level.
1
Protect against many kinds of threats
Enforced Client protects against a broad range of threats:
The virus and spyware protection service checks for viruses, spyware, unwanted
programs, and other potential threats borne on removable media or brought in from your
network, including via email. Every time a file on your computer is accessed, your service
scans the file to make sure it is free of viruses and spyware.
The firewall protection service establishes a barrier between each computer and the Internet
or other computers on your local network. It silently monitors communications traffic for
suspicious activity and takes appropriate action, such as blocking.
The browser protection service displays information to safeguard client computer users
against web-based threats. Users can view website safety ratings and safety reports as they
browse or search with Microsoft Internet Explorer or Mozilla Firefox.
The email security service protects against email threats by scanning messages before they
are received. It blocks or quarantines detections of directory harvest attacks, spam, phishing
scams, viruses, and other email-borne threats in messages and attachments, to prevent them
from reaching client computers. The email security service is available with Enforced Client
Advanced.
The email server security application, SonicWALL GroupShield
and Lotus Domino, provides comprehensive virus protection for the email and other content
entering and leaving your Microsoft Exchange Server 2000/2003 environment. Proactive
anti-virus scanning and an automatic outbreak manager prevent malicious code from
disrupting the system, while advanced content filtering allows administrators to set up rules
for inappropriate content, sensitive information, and adding disclaimers to messages.
®
for Microsoft Exchange
9
Page 10
Enforced Client Product GuideIntroduction
What is Enforced Client?
The email server security application is available with Enforced Client Advanced. Detailed
documentation on this application is available on the CD or in the downloadable installer
accessible from the SonicWALL download center.
Ensure continuous, automatic protection
Enforced Client safeguards your computers with:
Continuous protection — From the time a client computer is turned on until it is turned off,
Enforced Client silently monitors all file input and output, downloads, program executions,
inbound and outbound communications, and other system-related activities.
Instant discovery — When Enforced Client detects a virus threat, it attempts to clean the
item containing the threat before further damage can occur. If an item cannot be cleaned, a
copy of it is placed in a quarantine folder and the original item is deleted.
Customized threat response — By default, Enforced Client provides a high degree of
protection against threats. You can also configure the response to detections of potentially
unwanted programs and suspicious activity to suit the needs of your business: take immediate
action to clean, quarantine, or block the detection; prompt users for a response; or only log
the detection for administrative reports.
Automatic updates — Enforced Client checks for product updates at regular intervals
throughout the day, comparing security components against the latest releases. When a
computer needs a newer version, the client software automatically retrieves it.
1
Avert Early Warning system and outbreak response — Enforced Client uses the latest
information about threats and outbreaks as soon as they are discovered by SonicWALL Avert
Labs, a research division of SonicWALL. Whenever Avert Labs releases an outbreak
detection definition (
DAT) file, your network receives it promptly.
10
Page 11
Enforced Client Product GuideIntroduction
What is new in this release?
What is new in this release?
New features
New feature Description
Browser protection
service
New policy options for
greater control
Auto-renewal option If your service provider has enabled this option, automatically renews your
Changes in support
Support for... Description
Operating systems Provides protection services for computers running Windows Vista.
Browsers
Languages
Protects client computers against web-based threats while searching and
browsing. Users can display a color-coded safety rating and detailed report
for each website. See Chapter 6, Using the Browser Protection Service.
Virus and spyware protection service: On-demand scans now scan all file
types by default, or administrators can select a policy option to scan only
certain types of files. See Enable optional protectionon page 97.
Firewall protection service: Select whether to use SonicWALL
recommendations for safe Internet applications or allow only those you
specify. See Specify whether to use SonicWALL recommendationson
page 121.
subscriptions before they expire.
Extends support to 64-bit versions of Windows XP and Windows Vista.
See Operating systemson page 27.
Computers running older versions of Windows will continue to be
supported against existing threats, but protection against new threats will
be phased out as
support ending on page 28.
Administrators can configure a policy option for displaying notifications
on client computers to remind users that support is ending. See Notifying
users when support ends on page 28.
Installs on computers using Windows Internet Explorer version 7. See
Chapter 2, Installing Enforced Client.
Adds browser protection for Mozilla Firefox. See Chapter 6, Using the
Browser Protection Service.
With Enforced Client Advanced, Quarantine Summary emails generated by
the email security service are now available in multiple languages.
Note: No localized version is available for Brazilian Portuguese.
DAT files are no longer updated. See Operating system
1
11
Page 12
Enforced Client Product GuideIntroduction
How does the software work?
How does the software work?
Enforced Client implements a three-prong approach to security by:
1 Silently monitoring all file input and output, downloads, program executions, inbound and
outbound communications, and other system-related activities on client computers.
Detected viruses are deleted or quarantined automatically.
Potentially unwanted programs, such as spyware or adware, are removed automatically
unless you select a different response.
Suspicious activity is blocked unless you specify a different response.
2 Regularly updating detection definition (DAT) files and software components to ensure that
you are always protected against the latest threats.
3 Uploading security information for each client computer to the SecurityCenter, then using
this information to send emails and create reports that keep you informed about your
account’s status.
In addition, it provides tools for managing client computers and customizing your security
strategy.
1
The updating process
Outbreak response
Rumor technology
Internet Independent Updating (IIU)
The updating process
Regular updates are the cornerstone of Enforced Client.
Updates of its security components running on client computers. See Retrieving updates.
Updates to the security data maintained on the SecurityCenter website and used in
administrative reports. See Uploading security information.
12
Page 13
Enforced Client Product GuideIntroduction
How does the software work?
Updates can occur in three ways, enabling you to use network resources efficiently.
Figure 1-2 Methods for updating client computers
1
In a simple scenario, each client computer on your account has a direct connection to the
Internet and checks for new updates.
Rumor technology enables all computers in a workgroup to share downloaded files, which
controls Internet traffic and minimizes expensive downloads.
Internet Independent Updating (IIU) enables any computer on the network to get information
from the update site, even if that computer does not have an Internet connection, as long as
at least one computer on the network is configured as a relay server.
Retrieving updates
Five minutes after a client computer starts, and at regular intervals throughout the day, the
Enforced Client client software checks if updates are available. If they are, the client computer
pulls them from another computer on the network (via
directly from the Internet site.
13
Rumor technology) or downloads them
Page 14
Enforced Client Product GuideIntroduction
How does the software work?
The detection definition (DAT) files on the Internet site are regularly updated to add protection
against new threats. When the client software connects to the update site on the Internet, it
retrieves:
Regular DAT files, which contain the latest definitions for viruses, potentially unwanted
programs, and cookies and registry keys that might indicate spyware.
Outbreak DAT files, which are high-priority detection definition files released in an
emergency situation (see Outbreak response).
Upgrades to the software if a newer version exists.
Policy updates.
At any time, users can update manually by double-clicking in the system tray.
Update support for some operating systems is ending. After support ends, client computers
running those operating systems will no longer be protected against new threats. See Operating
Note
system support ending on page 28 for more information.
Uploading security information
Client computers upload detection and status data hourly to the SecurityCenter website. This
information is available to administrators in reports they can view on the SecurityCenter (see
Viewing reports on page 78).
1
Outbreak response
When an outbreak of a new threat is identified by Avert Labs, they issue an outbreak DAT, which
is a special detection definition (
encoded to inform the first computer receiving it to share the update immediately with other
client computers on the network. By default, client computers check for an outbreak
hour.
Rumor technology
When one computer shares updates with other computers on the local area network (LAN),
rather than requiring each computer to retrieve updates from the update website individually, the
Internet traffic load on the network is reduced. This process of sharing updates is called Rumor.
1 Each client computer checks the version of the most recent catalogfile on the Internet site.
This catalog file contains information for every component in Enforced Client, and is stored
in a digitally signed, compressed .
If the version is the same as the catalog file on the client computer, the process stops here.
If the version is different from the catalog file on the client computer, the client computer
attempts to retrieve the latest catalog file from its peers. It queries if other computers on
the LAN have already downloaded the new catalog file.
2 The client computer retrieves the required catalog file (directly from the Internet site or from
one of its peers) and uses it to determine if new components are available for Enforced Client.
DAT) file marked as Medium or High importance. It is specially
DAT every
CAB file format.
3 If new components are available, the client computer attempts to retrieve them from its peers.
It queries if computers on the LAN have already downloaded the new components.
14
Page 15
Enforced Client Product GuideIntroduction
How does the software work?
If so, the client computer retrieves the update from a peer. (Digital signatures are checked
to verify that the computer is valid.)
If not, the client computer retrieves the update directly from the update site.
4 On the client computer, the catalog file is extracted and new components are installed.
Internet Independent Updating (IIU)
Internet Independent Updating enables computers to use Enforced Client when they are not
connected to the Internet. At least one computer on the subnet must have an Internet connection
to be able to communicate with the udpate site. That computer is configured as a relay server,
and computers without an Internet connection retrieve updates locally from the relay server.
1 When a computer without Internet access fails to connect directly to the update site, it
requests information from the relay server.
2 The relay server downloads a catalog of updates from the update site.
3 The computer with no Internet connection downloads the necessary updates from the relay
server.
For more information, see Enabling relay serverson page 46.
1
15
Page 16
Enforced Client Product GuideIntroduction
Managing with the online SecurityCenter
Managing with the online SecurityCenter
To manage your account via the SecurityCenter, use the URL you received in an email message
from your service provider. From the SecurityCenter, you can view the status of your protection
services, access reports on client activity such as detections and suspicious activity, update your
account data, and configure security settings. You can manage client computers by customizing
how often they check for updates, changing the way they handle detections, and scheduling
regular scans.
Figure 1-3 The online SecurityCenter
1
16
Page 17
Enforced Client Product GuideIntroduction
Managing with the online SecurityCenter
The SecurityCenter’s main page shows a status summary for all the protection services you have
purchased (except email server protection):
Security Status — Indicates whether any action is required to address security issues, and
links you to instructions for resolving them.
Your virus and spyware protection — Illustrates the number of computers that are up-to-date
and out-of-date, and where the virus and spyware protection service is not installed. Click a
color in the pie chart to display a list of computers in that category.
Your desktop firewall protection — Illustrates the number of computers where the firewall
protection service is and is not installed. Click a color in the pie chart to display a list of
computers in that category.
Your email protection — Illustrates the number of messages delivered by category (clean,
spam, virus detected). Click a color in the pie chart or select the
Click here to configure link to
open the email security service’s web portal and view reports about your email.
Your browser protection — Illustrates the number of computers where the browser protection
service is and is not installed. Click a color in the pie chart to display a list of computers in
that category.
See Using the SecurityCenteron page 55 for more information.
1
The SecurityCenter offers two powerful tools for displaying your computers in groups and
fine-tuning their security settings.
User groups enable you to effectively categorize and manage client computers that require
different security settings or special monitoring.
Customized policies allow you to specify security settings to meet the needs of your users and
effectively use your network resources.
17
Page 18
Enforced Client Product GuideIntroduction
Managing with the online SecurityCenter
User groups
Each computer running the client software belongs to a group. A group consists of one or more
computers using the same security settings (called policies). By default, computers are placed in
the
Default group.
Groups help you manage different types of computers effectively. You can base groups on
geographic location, department, computer type, user tasks, or anything meaningful to your
organization.
For example, you might place all laptops used by traveling sales representatives into a single
group called Sales Team. You can then view details about this group of computers separately
from other computers in your account. You can easily check detections for these computers or
customize their security settings in a policy (see
for specific circumstances and risks of a remote user.
To create groups, use the Groups + Policies tab on the SecurityCenter website. See Creating
groups to manage your site on page 71 for more information.
The following example shows how an administrator might configure policies for three different
groups of client computer users in an organization. You should configure policies for your users
to meet your own company’s needs.
Use Smart Recommendations to automatically
approve common Internet
applications
Connection Type Trusted network Untrusted network Trusted network
Allowed Internet
Applications
AOL Instant Messenger None AOL Instant Messenger
No Enabled Enabled
Enabled No Enabled
GoogleTalk
18
Page 19
Enforced Client Product GuideIntroduction
Managing with the online SecurityCenter
Customized policies
After installation, Enforced Client protects client computers from threats immediately using
default security settings. However, you might want to change the way some features are
implemented for some or all of your computers. For example, you might want the service to
check for updates every four hours or set up a list of programs you consider safe.
Policies are made up of security settings that define how protection services operate on client
computers. Policy management allows you to assign different levels and types of protection to
different users. If you have created groups, you can assign a unique policy to each group or one
policy to all groups.
For example, you can assign a Sales policy to your mobile Sales Team group, with security
settings that protect against threats in unsecure networks such as airports and hotels.
Figure 1-4 Example: Sales Team group and Sales policy
1
19
Page 20
Enforced Client Product GuideIntroduction
Using this guide
1
1
2
3
4
5
6
Create a Sales Team group and a Sales policy.
Assign the Sales policy to the Sales Team group.
Client software running on computers in the Sales Team group performs the tasks defined in
the Sales policy:
Check for updates to software components and DAT files every 4 hours.
Check for outbreak DAT file every hour.
Scan for viruses and potentially unwanted programs daily.
Block communication from computers on local network (untrusted network).
Client software sends security data for each client computer to the SecurityCenter.
Administrator checks the security status for the Sales Team group in reports on the
SecurityCenter.
The administrator adjusts the Sales policy. The modified policy is downloaded automatically
to client computers in the Sales Team group the next time they check for updates.
To create your own policies and assign them to computers or groups, use the Groups + Policies
tab on the SecurityCenter website. See Setting up policieson page 75 for more information.
Using this guide
This guide provides information on installing, configuring, using, and troubleshooting Enforced
Client.
Who should read this guide?
Conventions
Who should read this guide?
This information is designed for:
System and network administrators who want to implement a proactive, hands-on approach
to their security strategy.
Partner Security Services (PSS) partners who remotely manage and monitor the
SecurityCenter on behalf of their customer base.
Hands-off administrators who do not need to customize security settings can read an overview
of basic features in the Quick Start Guide, which is available from the
SecurityCenter website.
Help page on the
20
Page 21
Enforced Client Product GuideIntroduction
Using this guide
Conventions
This guide uses the following conventions:
1
Bold
Condensed
All words from the user interface, including options, menus, buttons, and dialog box
names.
Example:
Type the User name and Password of the desired account.
CourierThe path of a folder or program; text that represents something the user types exactly
(for example, a command at the system prompt).
Example:
The default location for the program is:
C:\Program Files\McAfee\EPO\3.5.0
Run this command on the client computer:
C:\SETUP.EXE
ItalicFor emphasis or when introducing a new term; for names of product documentation
and topics (headings) within the material.
Example:
Refer to the VirusScan Enterprise Product Guide for more information.
BlueA web address (URL) and/or a live link.
Visit the SonicWALL website at:
http://www.mcafee.com
<TERM> Angle brackets enclose a generic term.
Example:
In the console tree, right-click <SERVER>.
Note: Supplemental information; for example, an alternate method of executing the
Note
same command.
Tip: Suggestions for best practices and recommendations from SonicWALL for
Tip
threat prevention, performance, and efficiency.
Caution: Important advice to protect your computer system, enterprise, software
Caution
installation, or data.
Warning: Important advice to protect a user from bodily harm when interacting
with a hardware product.
Warning
21
Page 22
Enforced Client Product GuideIntroduction
Getting product information
Getting product information
Several types of information are available to meet the specific needs of client computer users
and administrators.
Users — Client computer users can access online help from links in the client software.
Online User HelpAccess online instructions for performing security tasks in two ways:
Click help on any window displayed by the client software.
Click in the system tray and select Help.
Note:If the product’s built-in help system displays incorrectly on a client
computer, its version of Microsoft Internet Explorer might not be using
ActiveX controls properly. These controls are required to display the help
file. Make sure the latest version of Internet Explorer is installed with its
Internet security settings set to
Online Installation
Instructions
Administrators — Unless otherwise noted, these product documents are Adobe Acrobat .PDF files
available on the product CD or the
Product Guide Product introduction and features, detailed instructions for configuring the
Quick Start Guide A short “getting started” with information on basic product features, routine
Release Notes ReadMe. Product information, resolved issues, known issues, and
Online SecurityCenter
help
Online Push Install help
Avert Labs Threat
Library
Click the help link on any installation dialog box to display instructions for
installing Enforced Client using the URL method. Also contains instructions
for preparing for installation, testing, uninstalling, and troubleshooting
installation issues.
Help page of the SecurityCenter.
software, information on deployment, recurring tasks, and operating
procedures. Recommended for administrators who manage large
organizations or multiple accounts, and for hands-on administrators who
want to customize security settings and actively monitor client computers.
tasks that you perform often, and critical tasks that you perform
occasionally. Recommended for first-time customers who need an overview
of the product, and for hands-off administrators who plan to use the default
security settings and monitor security status through their weekly status
email.
last-minute additions or changes to the product or its documentation.
Available as a text document.
For information about any page of your SecurityCenter website, click the
help (
? ) link in the upper-right corner. You can access additional
information with the table of contents, index, or search feature.
While running the Push Install utility, click the help link on any dialog box
for information about deploying client software remotely to one or more
computers without user intervention.
After an update, click Avert Labs Threat Library on the Enforced Client
window to access the online SonicWALL Threat Library. This website has
detailed information on where threats come from, how they infect your
system, and how to remove them.
The Avert Labs Threat Library contains useful information on hoaxes, such
as virus warnings that you receive via email. A Virtual Card For You and
SULFNBK are two of the best-known hoaxes, but there are many others.
Next time you receive a well-meaning warning, view our hoax page before
you pass the message on to your friends.
Medium or Medium-high.
1
22
Page 23
Enforced Client Product GuideIntroduction
Enforced Client Advanced — With Enforced Client Advanced, additional documents are available.
Email security service See Chapter 7, Using the Email Security Service for instructions on setting
up and using basic features of the email security service. Links are available
from the SecurityCenter website to the email security service’s web portal,
where you can configure the service, access its administration guide, and
view reports.
Email server security
application
Detailed documentation for the email server security application is available
on the product CD or in the downloadable installer accessible from the
SonicWALL download center.
Phone — US, Canada, and Latin America toll-free:
+1-888-VIRUS NO or +1-888-847-8766 Monday – Friday, 8 a.m. – 8 p.m., Central Time
Professional Services
Small and Medium Business: http://www.mcafee.com/us/smb/services/index.html
Enforced Client
Beta Site
http://betavscan.mcafeeasap.com
Beta Feedback
DL_ToPS_SMB_Beta@mcafee.com
23
Page 24
Enforced Client Product GuideIntroduction
Getting product information
1
24
Page 25
2
Installing Enforced Client
This section describes what happens after you purchase the hosted services in Enforced Client
and Enforced Client Advanced, provides system requirements, and explains how to install the
virus and spyware protection service, firewall protection service, and browser protection service.
If you purchased Enforced Client Advanced, refer to emails and materials from SonicWALL for
instructions on installing the email security service or email server security application. See
Note
Chapter 7, Using the Email Security Service for information about activating and setting up the
When you place an order for Enforced Client, you supply an email address, and your account is
associated with that email address. After you submit your order:
1 SonicWALL processes your order.
2 You receive three emails:
This email... Contains...
WelcomeThe download URL and instructions for installing the protection
services, accessing documentation, and contacting customer support.
Login credentials Instructions for logging on to the SonicWALL SecurityCenter
administrative website and changing your password.
2
Grant letter The grant number for the order, which is required for customer
support.
3 If you purchased Enforced Client Advanced, you also receive an email with instructions for
changing your MX (Mail eXchange) records. See
If you purchased Enforced Client from a SonicWALL partner who manages security for you, the
partner usually receives these emails. If you have questions about which emails you should
Note
receive, contact the partner.
Update your MX records on page 135.
Placing multiple orders
If you placed more than one order using different email addresses, you have more than one
Enforced Client account. To merge them so that all your security information and emails are sent
to a single email address, contact the SonicWALL partner from whom you ordered, or
SonicWALL customer support if you ordered directly from SonicWALL.
Enforced Client is designed for Microsoft Windows operating systems running on a PC
platform. It installs and runs on computers equipped with:
An Intel Pentium processor or compatible architecture.
Microsoft Internet Explorer 5.5 SP2 or later.
Operating systems
RAM
Email security service
Email server security application
Terminal servers
Operating systems
Protection services
Operating system Virus and spyware Firewall Browser
Client computers
Windows 2000 Professional
with Service Pack 3 or later
Windows XP Home
Windows XP Professional
(32-bit)
Windows Vista
(32-bit)
Windows XP
Windows Vista
(64-bit)
Servers
Windows 2000 Server
Advanced Server
Small Business Server
with Service Pack 3 or later
Windows 2003 Standard Server
Enterprise Server
Web Edition
Small Business Server
2
If you upgrade the operating system on a client computer (for example, from Windows 2000 to
Windows XP) and you want to leave your existing files and programs intact during the upgrade,
Caution
you must first uninstall Enforced Client, then reinstall it after the upgrade is complete.
Support for some operating systems is ending. After support ends, client computers running those
operating systems will no longer be protected against new threats. See Operating system support
Enforced Client supports terminal servers and the Windows fast user switching feature in most
scenarios, with these limitations:
Enforced Client must be installed on the server by someone with local administrator
privileges.
When an installation or update occurs on a terminal server, one session is designated as the
primary update session (see Update computers where no user is logged onon page 55 for
restrictions that apply to automatic updates).
For all user sessions, the Enforced Client icon is removed from the system tray during the
installation or update. The icon is restarted only for the user logged on to the primary update
session. All user sessions are protected, and other users can manually redisplay their icons
(see Removing and displaying the iconon page 52 for more information).
Detection notifications are not displayed on the desktop of all computer users if the fast user
switching feature is enabled.
If you use an authenticating proxy server, disable the policy option Update client computers
where users are not logged in
virus protection options on page 97).
on the SecurityCenter’s Advanced Settings tab (see Set advanced
Complete these procedures on each computer to prepare for installing the client software:
Uninstall existing virus protection software
Uninstall existing firewall software
Configure your browser
Install the standalone installation agent — Required if users will install protection services
on client computers where they do not have administrator rights.
Uninstall existing virus protection software
Other virus protection software might conflict with the advanced features of Enforced Client
virus protection. When multiple virus scanning engines try to access the same files on your
computer, they interfere with each other.
Uninstall all virus protection software before installing the Enforced Client virus and spyware
protection service. If you are notified of existing virus protection software on a computer during
installation, follow these instructions to remove it.
2
To uninstall existing virus protection software:
1 In the Windows Control Panel, open Add/Remove Programs.
2 In the list of programs, locate any virus protection software (including Enforced Client), then
click
Remove.
The following lists include products that Enforced Client detects. In some cases, Enforced Client
uninstalls the software automatically; in other cases, it prompts you to uninstall it.
If you have virus protection software that does not appear on these lists, you must manually
uninstall it before installing Enforced Client.
Before installing the firewall protection service, we recommend that you uninstall any other
firewall programs on your computer. Follow your firewall program’s instructions for
uninstalling or use the Windows Control Panel.
To uninstall existing firewall software:
1 In the Windows Control Panel, open Add/Remove Programs.
2 In the list of programs, locate any firewall software (including Enforced Client), then click
Remove.
On computers running Windows XP and Windows Vista, the Windows firewall is disabled
automatically during installation of Enforced Client.
Note
Configure your browser
Enforced Client requires Microsoft Internet Explorer 5.5 SP2 or later during installation.
Internet Explorer
Non-Microsoft browsers
2
Internet Explorer
Enforced Client works with the default security settings in Internet Explorer. If you are unsure
of your settings, use the following steps to verify and configure them.
version 5.5
1 From the Windows Control Panel, open Internet Options.
2 On the Security tab, select Internet Zone.
3 Click Default Level.
4 Drag the scrollbar to Medium, then click OK.
version 6.x
1 From the Windows Control Panel, open Internet Options.
2 On the Security tab, select Custom Level.
3 From the Reset to menu, select Medium, then click Reset.
version 7.x
1 From the Windows Control Panel, open Internet Options.
2 On the Security tab, select Medium-high.
Non-Microsoft browsers
If on your administrative or client computers you typically use a non-Microsoft browser, such
as Mozilla Firefox or Opera, you must install Internet Explorer before installing Enforced Client.
After the software is installed, you can continue to use your default Internet browser. You can
access the SecurityCenter with Internet Explorer (version 5.5 or later) or Firefox (version 1.5 or
later).
To allow users without administrator rights to install Enforced Client on client computers using
the URL method, you must first load a standalone installation agent on their client computers.
You can use a deployment tool to install it from your administrative computer, or you can
download it directly onto the client computers. You must have administrator rights on the client
computer to install this file.
To deploy the installation agent from your administrative computer:
1 From the SecurityCenter website, click the Help tab, select Utilities, then click installation
agent
to download the installation agent.
2 Deploy and execute the file on client computers using your customary deployment tools,
such as Microsoft Systems Management Server (SMS) installer, Windows NT login scripts,
or Tivoli IT Director.
To deploy the installation agent from the client computer:
1 From the SecurityCenter website, click the Help tab, select Utilities, then click installation
agent
to download the installation agent.
2 When the download is complete, double-click the file.
After the standalone installation agent is installed on a client computer, any user can install
Enforced Client client software on that computer.
Install the client software in any of the following ways:
Standard URL installation
Use the URL you received in your welcome email message to install the software on your
computer and access the SecurityCenter website. Then install the software on other computers
using a standard or customized URL, or send the URL to users with instructions on how to
install.
Advanced Installation options
From an administrative computer, visit the SecurityCenter website and use these methods to
remotely install the software on one or more computers simultaneously without user interaction.
Silent installation
Download a program called VSSETUP.EXE, then run it at the command line. This method requires
a third-party deployment tool, a login script, or a link to an executable file in an email message.
Push installation
Download the Push Install utility, then deploy the software directly from your service provider’s
website.
2
Standard URL installation
URL installation is the most common installation method. Users install the client software
individually, by downloading it from a company-specific URL.
Requirements
Sending an installation URL to users
Installing on client computers
Requirements
To use the Internet URL installation method, the client computer’s user must have:
Local administrator rights.
Administrator rights are not the default. You need to change the Windows configuration or
deploy a standalone installation agent (see Install the standalone installation agenton page 34
Note
for more information).
Sufficient rights to install an ActiveX control and a product to the system. (This is not
As the administrator, you can obtain the company-specific installation URL in two ways:
After signing up for Enforced Client, you receive an email message containing the URL that
has been set up for your company. This installation URL installs all the services you have
subscribed to into your account’s default group in your account’s default language. You can
copy this URL into an email message to send to the client computer users at your company.
At any time, you can log on to your SecurityCenter and create a customized URL to send to
users. This enables them to install specific services in a designated group and language.
To create a customized installation URL:
1 In your web browser, log on to your SecurityCenter website.
2 From the Computers page, click Add Computer.
3 Select the group to place the client computers in, the services to install, and a language for
the software, then click
A customized URL is displayed, along with simple instructions for users.
4 Click Select Text and Copy to Clipboard.
Next.
2
5 In your local email application, open a new message and paste the text you have copied.
6 Revise the instructions if needed, then send the email to the users who need to install the
software.
Installing on client computers
Administrators and users follow the same procedure for installing the client software.
To install using the URL method:
1 On the client computer, open the email message and click the installation URL.
The URL installation method can be used only by client computers with a connection to the
Internet, and users must have local administrator rights (see Requirements.)
2 Select the services to install if you are prompted to do so, type your email address in the Email
or identifier
field, and click Continue.
2
What is the email address used for?
The information entered here identifies the computer where the installation is taking place.
The SecurityCenter uses it to identify that computer in reports. If reports indicate a problem
with a computer, you can use the email address to notify the user. If the user does not enter
an email address, it is important to know how to contact the user when security issues arise.
3 When you are prompted to do so, click Install.
4 In the File Download dialog box, click Run.
For installation, Enforced Client uses a cookie created at this time. The cookie expires after
24 hours. If you save the installation file and then try to install it after 24 hours have passed,
or delete the cookie, you are prompted to begin the installation process again.
5 On computers running Windows Vista, if the User Account Control dialog box appears, click
Continue.
6 Select Restart when prompted to reboot after installing the firewall protection service.
You must know your company key (the series of characters in the installation URL after the
characters
CK=).
Installing Enforced Client
Installation
To install Enforced Client silently:
1 From your web browser, log on to your SecurityCenter.
2 On the Computers page, click Add Computer.
3 Select the group to place the user’s computer in, the services to install, and a language for the
software, then click
4 Under Additional Installation Options, click Display advanced installation methods.
5 Under method 1, click VSSETUP to save the VSSETUP.EXE file to your hard drive.
6 Deploy the program to each client computer using your customary deployment tool, such as
those listed under
7 On a client computer, open a DOS window and run the following command:
VSSETUP.EXE /CK=<your company key> /<parameters>
Next.
Requirements.
2
As shown in this example, you must include your company key (CK) as a parameter. See
VSSETUP parameters for a list of optional parameters you can add to your command line.
What is my company key?
Your company key is included in the URL that you received when you subscribed to
Enforced Client. It is the hexadecimal value that follows the characters
CK= at the end of the
URL.
8 Reboot the client computer after installing the firewall protection service.
VSSETUP parameters
For a silent installation, use this command line and any of the following parameters (which are
not case-sensitive):
VSSETUP.EXE /CK=<your company key> /<parameters>
/CK=XYZRequired. Launches Setup using the company key.
/Email=x@y.comIdentifies the user’s email address in administrative reports.
Note: Despite its name, the email variable does not need to be an
email address. Do not use a string containing non-standard
characters, because they might display incorrectly in reports.
/UninstallUninstalls Enforced Client.
/SetRelayServerEnable=1Sets a computer with a connection to the Internet as a relay
server. If the computer is not used as a relay server, set to 0.
/ReinstallReinstalls Enforced Client, leaving the previous values for
company key, email address, and machine ID intact.
2
/Groupid=[group number]Places the computer into any group you have created. You can
/P=b
/P=f
/P=v
/P=bf
/P=bv
/P=fv
/P=vfb
find the number associated with a group by generating a
customized URL (see
on page 36).
Note: If you designate a group that does not exist, users are
placed in the
Selects the protection service(s) to install:
b — browser protection service.
f — firewall protection service.
v — virus and spyware protection service.
Note: If you omit the /P parameter, only the virus and spyware
protection service is installed.
Push means deploying remotely to one or more computers in a network. This method uses the
Push Install utility to deploy the client software directly from your service provider’s website to
client computers on your network. Push installation does not require third-party deployment
software or interaction with users.
To perform a push installation:
Designate an administrative computer, where you will download the Push Install utility and
initiate the push.
Select the target computers, which are client computers on your network that will receive the
software.
The Push Install utility is essentially an ActiveX control that runs on an administrative computer.
It installs client software on all target computers that are online when the push takes place. Use
push installation to install client software on new network computers or to install additional
protection services on computers with existing client software.
The Push Install utility allows you to specify one or more network computers with an Internet
connection as relay servers. You must do so in a separate push operation, because you cannot
push to relay servers and non-relay servers at the same time. See
Download the Push Install utility from the SecurityCenter.
Initiate a push to one or more client computers.
Optional. Initiate a push to one or more relay servers.
Online help for the Push Install utility is available by clicking the help link in any dialog box
during installation.
Note
Requirements
To use the push installation method:
The administrative computer must be running the Windows 2000, Windows XP
Professional, or Windows Vista operating system.
Push installation is not supported on Microsoft Windows XP Home Edition because Windows
XP Home Edition cannot log on to an Active Directory domain.
Note
The administrative computer must be running Internet Explorer 5.5 SP2 or later, with
ActiveX enabled.
At the administrative computer, you must be logged on with domain administrator privileges
for the domain being installed.
Administrative computers running the Windows firewall and Windows XP Professional or
Windows Vista must add File and Print Sharing to the firewall’s Exceptions list. For
instructions, see the Push Install Help, available by clicking the
help link in any dialog box
when you run the Push Install utility.
All target computers must be logged on to the same Windows domain as the administrator.
Considerations for scheduling push installations
When scheduling push installations:
Consider other network tasks. Pushing to a large number of computers simultaneously can
produce a high volume of network traffic, so schedule push installations for times when they
will not affect other network tasks.
Make sure the target computers are turned on. The Push Install utility installs client
software on target computers that are online when the push takes place.
Make sure users are not using the target computers. Restarting a client computer while a
push installation is in progress can cause the computer to become unstable, so schedule push
installations for times when users will not be turning off or restarting their computers.
After installation is complete, a status for each target computer is displayed.
Figure 2-6 Status for target computers
10 Click View Log to open a log file in Microsoft Notepad that shows the status of the current
session, then save the file.
The dialog box indicates only whether the files were pushed to the target computers. It is
important to review the log file to verify that the files were installed and updated
successfully. You can also use the log file for troubleshooting. (The contents of the log file
are deleted when you close the Push Install utility or perform another push.)
2
11 Optionally, click Back to return to the previous screen and push to more computers.
12 If you have installed the firewall protection service, restart the client computers.
If you use a corporate firewall or proxy server
Enforced Client downloads components directly from SonicWALL servers to client computers.
If you are behind a corporate firewall, or are connected to the Internet by a proxy server, you
might need to provide additional information for your service to work properly.
Authentication support is limited to anonymous authentication or Windows domain
challenge/response authentication. Basic authentication is not supported.
Advanced installation methods and automatic updating do not support a CHAP or NTLM
proxy.
If you use an authenticating proxy server, disable the policy option Update client computers
where users are not logged in
on the SecurityCenter’s Advanced Settings tab (see Set advanced
virus protection options on page 97).
Contact product support if you have proxy questions while installing or updating Enforced
Client.
Enabling relay servers
If any computers on your network do not have a direct connection to the Internet, the Internet
Independent Updating (IIU) feature allows them to receive software updates from another local
computer. In that case, you must specify at least one computer in your LAN as a relay server.
If all the computers on your network connect to the Internet, you do not need to set up any relay
servers. However, you might want to specify relay servers to reduce Internet traffic on your LAN.
Tip
See Internet Independent Updating (IIU)on page 15 for information on using relay servers.
You can specify one or more computers as a relay server in two ways:
Using the Push Install utility
Using VSSETUP
Using the Push Install utility
During the push installation procedure, select Set as Relay Server(s) before clicking Install
Enforced Client
(see step 10 under Installationon page 44).
You must perform a separate push operation to push files to relay servers and non-relay servers,
because you cannot push to both at the same time.
Using VSSETUP
During a silent installation, or at any time after Enforced Client has been installed on a computer,
you can run the
The
vssetup syntax differs, depending on whether this is an initial installation or an existing
installation. (See
Initial installation
During an installation, vssetup uses the following syntax to specify a computer as a relay
server:
vssetup command with the variable that specifies a computer as a relay server.
Silent installation on page 39 for more information.)
2
VSSETUP.EXE /RelayServer=1
If you do not specify the computer as a relay server during the installation process, the default is
0 (off), and the computer is not a relay server.
Note
Changing an existing configuration
You can edit an existing installation using vssetup with the SetRelayServerEnable parameter.
Specify a computer as a relay server:
VSSETUP.EXE /SetRelayServerEnable=1
Change a current relay server computer so that it is no longer a relay server:
VSSETUP.EXE /SetRelayServerEnable=0
Completing the installation
After installing Enforced Client, perform these procedures on each client computer to ensure that
the software is working correctly and the computer is protected. (Users can read instructions for
performing these procedures in the online Installation Instructions or User Help.)
Test the virus-detection feature of the virus and spyware protection service at any time by
downloading the EICAR Standard AntiVirus Test File at the client computer. Although it is
designed to be detected as a virus, the EICAR test file is not a virus.
To run a test:
1 Download the EICAR file from the following location:
http://www.eicar.org/download/eicar.com
If installed properly, the virus and spyware protection service interrupts the download and
displays a threat detection dialog box.
2 Click OK, then select Cancel.
If installed incorrectly, the virus and spyware protection service does not detect the virus or
interrupt the download process. In this case, use Windows Explorer to delete the EICAR test file
Note
from the client computer. Then reinstall Enforced Client and test the new installation.
Scan the client computer
After installing the virus and spyware protection service for the first time, we recommend
running an on-demand scan of all client computer drives before proceeding. This checks for and
cleans or deletes existing threats in files. In the future, files are scanned when they are accessed,
downloaded, or saved.
2
To scan your computer:
1 Click in the system tray.
2 Select Scan Tasks, then select Scan My Computer.
After installing the virus and spyware protection service for the first time, we recommend
running an on-demand email scan before proceeding. This checks for threats in email already in
the client’s Microsoft Outlook Inbox. Future emails are scanned before they are placed in the
Inbox.
To run an on-demand email scan:
From the Tools menu in Outlook, select Scan for Threats.
The On-Demand Email Scan dialog box appears when the scan starts. You can stop, pause, and
restart the scan. You can also check the results of the scan.
Set up the default firewall
To ensure complete protection on computers running Windows XP or Windows Vista, the
firewall protection service automatically disables the Windows firewall and configures itself as
the default firewall. This enables it to monitor communications for Internet applications and
track events for reporting purposes, even if the Windows firewall is also running.
We recommend that you do not re-enable the Windows firewall while the Enforced Client
firewall is enabled.
2
If both firewalls are enabled, the Enforced Client firewall lists only a subset of the blocked IP
addresses in its
Caution
some of these addresses; however, it does not report them because event logging is disabled in
the Windows firewall by default. If both firewalls are enabled, you must enable Windows
firewall logging to view a list of all blocked IP addresses. The default Windows firewall log is
C:\Windows\pfirewall.log. Enabling both firewalls also results in duplicate status and alert
messaging.
Inbound Events Blocked by the Firewall report. The Windows firewall blocks
After installing Enforced Client, client computers are protected immediately and no further setup
is required for the virus and spyware protection service, the firewall protection service, or the
browser protection service. You will receive regular status emails with details about your
account. (If you purchased Enforced Client from a SonicWALL partner who manages security
for you, the partner usually receives these emails.)
If you purchased Enforced Client Advanced, refer to emails and other materials from your service
provider for instructions on installing and configuring the additional services. See Chapter 7,
Note
Using the Email Security Service for information about activating and setting up the email
security service.
You might want to take advantage of additional features to more easily manage your account
and customize a security strategy for your specific needs:
Setting up your accounton page 62.
Viewing your security services at-a-glanceon page 63.
Managing your computerson page 65.
Creating groups to manage your siteon page 71.
2
Setting up policieson page 75.
Viewing reportson page 78.
For guidelines on administering an effective security strategy:
For virus and spyware protection, see Manage your protection strategy with best practices
on page 108.
For firewall protection, see Managing suspicious activity with best practiceson page 125.
Users configure most browser protection settings on their computers. For descriptions of these
features and recommended settings, see
Configuring browser protection on the client computer
Enforced Client consists of two main components for managing security:
The client software: Software installed on each client computer. The client software runs in
the background to download updates and protect the computer from threats. It also provides
users access to the basic functions of their SonicWALL protection services, such as scanning
files, folders, and email messages.
The SonicWALL SecurityCenter: A website for administrative functions, where you can
centrally manage the protection services for your account. Most administrative tasks are
performed from the SecurityCenter.
Enforced Client is designed for hands-off management. After installing the software on client
computers, you receive regular emails that summarize the security status of all client computers
on your account, and notify you of actions required to address vulnerabilities. Status emails
contain a link to your SecurityCenter website, where you can view detailed reports and
instructions for resolving problems.
In small organizations, status emails might be all that is needed to assure you that your
computers are safe. If you manage a large account or want more proactive, hands-on
involvement, you can take advantage of the tools available on the SecurityCenter.
After installing Enforced Client, the software runs on each client computer to immediately
protect it from threats such as viruses and intrusions.
Typically, users have little interaction with the client software unless they want to manually scan
for threats. User tasks are documented in the online User Help on client computers.
As an administrator, you can most easily use the SecurityCenter website to configure settings
and monitor detections for client computers. Occasionally, you might work directly on a client
computer.
Users and administrators access the client software’s features through these components on a
client computer:
Enforced Client system tray icon
Client menu
Administrative menu and tasks
Enforced Client system tray icon
When Enforced Client is running on a client computer, the Enforced Client icon appears in
the system tray and indicates the status of the services.
3
This icon... ....indicates:
An update is in progress. Do not interrupt the Internet or LAN connection, or
log off the computer.
Move the mouse over the icon to display which condition the icon indicates:
The last update failed to complete. Check the Internet or LAN connection,
then double-click the icon to perform a manual update.
On-access scanning is disabled (see Disabling on-access scanningon
page 110).
The firewall protection service is disabled (see Enable firewall protection
on page 114).
The service subscription is expired (see Managing your subscriptionson
page 83).
See Removing and displaying the icon.
Removing and displaying the icon
When you remove the Enforced Client icon, the protection services continue to protect the client
computer by blocking detections, but do not display any user prompts.
To remove the icon from the system tray:
1 On the client computer, hold down the Ctrl and Shift keys and click in the system tray.
2 Select Exit.
To display the icon in the system tray:
On the client computer, select Start | Programs | SonicWALL | Enforced Client Anti-Virus and
Scan Tasks: Displays a submenu for accessing features
of the virus and spyware protection service.
Firewall Settings: Displays the current status, mode,
and connection type for the firewall protection service.
If the policy allows users to configure firewall
protection, a dialog box for changing settings appears
instead.
About: Displays information about the software, including the current version of the
detection definition (
Help: Displays the built-in User Help file, which contains basic information about using
DAT) file.
product features.
Update Now: Checks whether a new update is available; if so, the update downloads
automatically.
Administrative menu and tasks
Access administrative features
by holding down both the Ctrl
and
Shift keys when clicking
in the system tray:
3
Exit: Removes the Enforced
Client icon from the system
tray. See Removing and
displaying the icon on
page 52 for more
information.
Scan Tasks | Disable
On-Access Scanner: Turns
off the automatic on-access
scanner. To re-enable the
scanner, reopen the administrative menu and select
on-access scanning on page 110 for more information.
Scan Tasks | Quarantine Viewer: Opens the quarantine folder, which contains possible
threats detected on the computer. See Manage quarantined fileson page 109 for more
information.
Administrative tasks for client computers are also described in the online User Help on the client
computer. However, instructions for accessing the administrative menu are provided only in this
Product Guide.
Updating client computers
Enable On-Access Scanner. See Disabling
Enforced Client automatically updates client computers with new detection definition (DAT)
files and other software components.
Users can check for updates manually at any time. In addition, you can configure optional policy
settings for updating tasks.
Update support for some operating systems is ending. Once support ends, client computers
running those operating systems will no longer be protected against new threats. See Operating
Note
system support ending on page 28 for more information.
Update automatically
Update manually
Update during an outbreak
Update computers where no user is logged on
Update automatically
The software on each client computer automatically connects to the Internet directly or to a relay
server and checks for updated components. Enforced Client checks for updates five minutes
after a user logs on and at regular intervals thereafter. For example:
If a computer is normally connected to the network all the time, it checks for updates at
regular intervals throughout the day.
3
If a computer normally connects to the network each morning, it checks for new updates five
minutes after the user logs on each day, then at regular intervals throughout the day.
If a computer uses a dial-up connection, the computer checks for new updates five minutes
after dialing in, then at regular intervals throughout the day.
By default, computers check for new updates every 12 hours. You can change this interval by
configuring a policy setting (see
On computers where a CHAP or NTML proxy is set up in Internet Explorer, automatic updates
do not work.
Note
Update manually
At times, users might want to check for udpates manually. For example, when a computer
appears to be out-of-date in your administrative reports, users might need to update manually as
part of the troubleshooting process.
To update manually:
Double-click in the system tray, or click the icon and select Update Now.
Update during an outbreak
When an outbreak is identified by SonicWALL Avert Labs, they issue an outbreak DAT, which
is a special detection definition (
encoded to inform the first computer receiving it to share the update immediately with other
client computers on the network.
Select your update frequency on page 97).
DAT) file marked as Medium or High importance. It is specially
In rare cases, SonicWALL might send an EXTRA.DAT file with instructions for manually
For maximum protection, configure your policies to check for an outbreak DAT file every hour
(see
Enable optional protection on page 97). This feature is enabled by default.
Using the SecurityCenter
Update computers where no user is logged on
In most scenarios, Enforced Client supports terminal servers and the Windows fast user
switching feature. When an update occurs, one session is designated as the primary update
session. A pseudo user is defined, which enables automatic updates to occur on computers where
no user is logged on.
For certain configurations, automatic updates cannot occur. Enforced Client cannot create the
pseudo user when:
The computer is a domain controller.
Local security policies, including password restrictions, prevent the user’s creation.
When the pseudo user cannot be created, automatic updates do not occur. The pseudo user also
cannot update if the computer is behind an authenticating proxy server.
For these situations, you can disable the Update client computers where users are not logged in
policy setting on the SecurityCenter’s
options on page 97). This prevents automatic update attempts from being reported as errors.
Advanced Settings tab (see Set advanced virus protection
3
To disable updates for non-logged-on users:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
2 Click the Advanced Settings tab.
3 Deselect Update client computers where users are not logged in, then click Save.
Using the SecurityCenter
Access the administrative features of Enforced Client from the online SecurityCenter.
The SecurityCenter offers tools for administrators who manage many computers or want to
assume a proactive role in overseeing their corporate security strategy.
Use the SecurityCenter to centrally manage the client computers and information for your
account. For every category of account management, you can access all the tasks you need to
perform from the SecurityCenter:
Select the information to display or the order in which it appears.
To filter information:
At the top of a page, select the information to display (group name, period of time, or type of
information).
To sort information in listings:
Click a column heading to sort by that column. Click it again to switch the order in which it is
displayed (ascending order
Online help is available from any page on the SecurityCenter website by clicking the help ( ? )
link in the top-right corner of the page. The help window provides information about the page
from which it was called. You can access additional information with the table of contents, the
index, or the search feature.
Help navigation procedures
To.. .Do t h i s . . .
Navigate back to page that initially appeared or from which you clicked a link
View the table of contents, index, and
search from a single help pane
Click Back on the shortcut menu.
Note: Do not use the Previous or Next buttons. They are
used to navigate through the linear order of pages in the
table of contents.
Click (Show Navigation).
3
Page through the help as ordered in the
table of contents
View related how-to topics
Locate an item alphabetically within the
index
Print a page
Create a bookmark of a page for an HTML
browser
Conduct a search
Remove highlighted text on a page after a
search
Click (Previous and Next).
Click (Related Links).
Click Index in the left pane.
Click (Print), or click Print on the shortcut menu.
Click (Bookmark).
Click Search in the navigation pane, enter the word or
words to search on, and click
Configure your contact information so that you receive important notices from your service
provider.
Set up your profile
Change your SecurityCenter password
Sign up for email notifications
Set up your profile
Your profile contains the information your service provider needs to contact you about your
account. Initially, information supplied during your product purchase is placed into your profile.
It is important to keep this information up-to-date to prevent a disruption in your services.
We recommend changing the administrator’s email address that you use to access the
SecurityCenter (for example, admin@example.com), so that if the current administrator for
Tip
Enforced Client leaves the company, the administrative email address is easily transferred to the
new administrator.
3
To configure your profile:
On the My Account page under My Profile, click Edit.
Change your SecurityCenter password
We recommend that you change your password when you first visit the SecurityCenter and at
regular intervals thereafter.
To change your password:
1 On the My Account page under My Profile, click Edit.
2 Under Your Contact Information, type and confirm a new password.
Sign up for email notifications
Sign up for email notifications about your account status, service expiration, and service
utilization.
Status emails keep you informed about detections and coverage for your account. It is important
to receive status emails at regular intervals that are appropriate for your account, based on the
Note
frequency with which you need to review detection information. By default, you receive status
emails
Weekly.
To configure your notification preferences:
On the My Account page under My Preferences, click Edit.
The SecurityCenter page is your “home” page on the SecurityCenter website — a graphical
overview of your coverage with instant access to summary information about the computers and
service subscriptions in your account.
Your status emails contain an overview of the information shown on the SecurityCenter page and
notify you when you need to check your SecurityCenter website.
What can I do from the SecurityCenter page?
The SecurityCenter page shows the current status for your account. It’s your “one-stop service
center,” where you can install services, check for problems, check your security coverage, or
check and update your subscriptions. Access the
SecurityCenter tab.
Figure 3-3 SecurityCenter page
SecurityCenter page at any time by clicking the
3
Select the information that appears on this page:
Groups — Display only the computers in a group or display all computers.
From the SecurityCenter, you can begin the installation process in two ways:
On the SecurityCenter page, click Install Protection.
OR
On the Computers page, click Add Computer.
See Chapter 2, Installing Enforced Client for more information.
3
View and resolve action items
Action items are security issues that need your immediate attention and are listed in red on the
SecurityCenter page or Computer Details page. Whenever you see information highlighted in red,
check for a corresponding action item on one of those pages. Possible action items are:
Computers are not protected
against the latest threat.
You have no virus and
spyware protection installed.
Click here to install
protection.
You have no desktop firewall
protection installed. Click
here to install protection.
Too many subscriptions in
use.
Your subscription is about to
expire.
Your subscription has
expired.
One or more computers are not updated with the latest detection
definition (
Either you have not installed the virus and spyware protection
service on client computers or the installation failed. Click the
action item to begin installation.
Either you have not installed the firewall protection service on
client computers or the installation failed. Click the action item to
begin installation.
You have installed Enforced Client on more computers than you
are licensed for. You need to uninstall from some computers or
purchase additional licenses.
Your subscription to one or more protection services will expire
soon and needs to be renewed.
Your subscription to one or more protection services is no longer
valid and needs to be renewed.
DAT) files or software components.
Your email is being spooled.
Please check your email
server.
Your email security service
needs to be activated.
Your organization’s email is being stored temporarily on your
service provider’s server because your email server is not
accepting email.
Your subscription to the email security service has not been
activated; you need to proceed with the activation process.
To view instructions for resolving an action item:
On the SecurityCenter page or the Computer Details page, click an action item.
View security coverage for your account
For each protection service, a pie chart shows the status of client computers in your account.
This color... Indicates...
Red Out-of-date or unprotected computers.
Green Up-to-date or protected computers.
Gray Computers where the protection service is not installed.
To view details about protection coverage for your account:
Click a color to show details about computers in a category.
The Product Coverage page lists details about the computers with the corresponding level of
coverage.
3
Managing your computers
The SecurityCenter provides a centralized location for working with all the computers in your
account. You can instantly view each computer’s group and email address, when it last
connected to the network, whether its detection definition (
detections, and the number of Internet applications approved by its user. You can easily see
which computers need your attention, display additional information, and perform necessary
management tasks.
Click the Computers tab to display the Computers page, which lists all the computers in your
account or only the computers in a selected group.
Groups — Display only the computers in a group or display all computers.
Report period — Specify the length of time for which to display information.
Computer status — Show all computers, or only out-of-date computers, computers with
detections, or computers you have blocked from receiving updates.
For example, you can check whether there are security issues within specific groups. For groups
that regularly download files from Internet sites, you might want to monitor the number and type
of detections, then modify the security settings to approve safe programs and block
communications from sites you distrust.
From the Computers page, you can:
Search for computers
Install protection services
Display details for a computer
View detections for a computer
View user-approved applications for a computer
Send email to computers
Block computers from receiving updates
Delete computers from your reports
Move computers into a group
What computer management reports are available?
Use the Reports page to access two reports that can assist you with computer management:
Use this feature to find a particular computer in your listings. Site administrators can search the
entire account; group administrators can search only the groups their site administrator has
assigned to them. (See
Designating group administrators on page 72 for information on group
administrators.)
To search for a computer:
At the top of the Computers page, type a full or partial computer name, email address, IP address,
or relay server name in the
The computer search feature does not recognize wildcard characters. You must use only letters
Note
or numbers.
Find computers box, then click Search.
Install protection services
From the SecurityCenter, you can begin the installation process in two ways:
3
On the SecurityCenter page, click Install Protection.
OR
On the Computers page, click Add Computer.
See Chapter 2, Installing Enforced Client for more information.
Display details for a computer
Use the Computer Details page to check information about a computer and manage its security.
To display details about a computer:
On the Computers page, click a computer name.
The Computer Details page displays information about the computer, its service components, and
its detections.
Use this feature to view all the detections for a single client computer.
To view detections:
1 On the Computers page, click a quantity under Detections to display a list of detected items
and their status.
2 From the Detection List, click the name of a detection to display detailed information from the
SonicWALL Avert Labs Threat Library.
View user-approved applications for a computer
Use this feature to see which programs users have approved. Users can add approved programs
and allowed Internet applications only if their policy permits.
To view user-approved applications:
On the Computers page, click a quantity under User-Approved Applications to display a list of
potentially unwanted programs detected by the virus and spyware protection service and Internet
applications detected by the firewall protection service.
These programs were detected as potential threats, but users have approved them to run on their
computers.
3
To approve or allow a program:
To allow a user-approved program to run on other client computers, add it to a policy. (See
Specify approved programs on page 101 or Set up allowed Internet applicationson page 121 for
more information.) Approved programs are no longer detected or blocked on any computers
using the updated policy.
Send email to computers
Use this feature to notify users about problems with their computers or tasks they need to
perform. You must have a local email application installed on your administrative computer.
To send email to computers:
On the Computers page, click an email address for a computer in the listing.
OR
Select the checkbox next to each computer you want to send email to, then click Email.
Your local email application opens a blank message, preaddressed (in the BCC field) to the
selected computers.
Use this feature to prevent unauthorized computers that are connecting to your network
(sometimes called rogue systems) from receiving service updates.
To block computers:
On the Computers page, select the computers you want to block, then click Block.
To unblock computers:
On the Computers page, select Blocked to list all blocked computers, then select the computers
you want to unblock and click
Unblock.
Delete computers from your reports
Use this feature to remove obsolete computers and duplicate computers from your listings.
Duplicates typically appear when the Enforced Client client software has been installed more
than once on a single computer or when users install it on their new computers without
uninstalling it from their previous computers.
Deleting a computer does not uninstall the Enforced Client client software. If you mistakenly
delete a computer with working client software from the report, it automatically reappears in your
Note
listing the next time its report data is uploaded. However, you will no longer be able to view the
historical detection data for that computer.
3
To delete computers:
On the Computers page, select the computers you want to delete, then click Delete.
See View duplicate computerson page 80 for information on displaying a complete listing of
duplicate computers in a report.
Move computers into a group
Every client computer is part of a group (see Creating groups to manage your siteon page 71
for more information). Initially, you assign computers to a group when installing Enforced
Client. If no group is specified, computers are placed in the
You can move computers into a different group at any time.
To move computers:
1 On the Computers page, select the computers you want to move.
2 From the Move to list, select the group you want to move the computers to.
You must create the group before you can move computers into it. See Create or edit a group
on page 72.
3 Click Move.
Default group.
Creating groups to manage your site
A group consists of one or more computers that use the same policy of security settings. You can
base groups on geographic location, department, computer type, the tasks performed by the
users, or anything meaningful to your organization.
By default, every computer in your account is placed into a group called Default. You can create
other groups to place them in instead.
Why use groups?
Groups help you manage large numbers of computers or computers that use different security
settings (defined in policies). Groups are particularly helpful in larger organizations or
companies that are widely distributed geographically. Placing similar computers into a single
group enables you to view and manage security issues for the group separately from the other
computers in your account.
For example, you might place all laptops used by traveling sales representatives into a single
group called Sales Team. Then you can configure special security settings for those computers
to provide greater protection against threats in unsecure networks such as airports and hotels.
You can also track the number of detections on those computers through more frequent reports
and adjust the security settings as needed. See
User groups on page 18 for an illustration.
How can I manage groups?
Click the Groups + Policies tab to display the groups in your organization and the policies
assigned to them. If you have not created any groups or policies, only the
SonicWALL Default policy are displayed.
Figure 3-6 Groups + Policies tab
Default group and the
3
From the Groups + Policies page, you can:
Create or edit a group
Delete a group
Note
The Default group
Until you create additional groups, all computers where you install your security services are
assigned to the
Computers are assigned to a group when protection services are installed. You can also move
computers to different groups using the
Default group. You cannot change the name of the Default group.
The Default group uses the SonicWALL Default policy, which is configured with settings
recommended by SonicWALL to protect most organizations. You can assign a different policy
to the
Default group.
Designating group administrators
Create or edit a group
Use this procedure to assign a name and a policy to a group. See Move computers into a group
on page 70 for instructions on assigning computers to the group.
To create or edit a group:
On the Groups + Policies page, click Add Group or Edit/Assign Policy, specify a name and a policy
for the group, then click
Only one policy can be assigned to a group. Any existing policy is removed from that group when
you click
Note
Save.
Save.
Delete a group
You must move all computers out of a group before you can delete it. See Move computers into
a group on page 70 for instructions.
3
To delete a group:
On the Groups + Policies page, click Delete next to the group you want to delete.
You cannot delete the Default group.
Designating group administrators
Group administrators oversee and manage the groups that you, the site administrator, assign to
them. When creating group administrators, you specify which groups they manage, a password
they use to access the SecurityCenter, and their access level.
Why use group administrators?
Create group administrators to distribute security management in large organizations.
Group administrators have fewer access rights than the site administrator. While the site
administrator can access all security information for all client computers in the account, group
administrators can access information only for client computers in the groups they are assigned
to.
The site administrator communicates directly with the SecurityCenter to create policies,
check reports, and maintain the Enforced Client account.
The site administrator creates and manages group administrators.
Group administrators communicate directly with the SecurityCenter to access security data
for the groups they are assigned to.
Group administrators manage the client computers in their assigned groups. The management
tasks they can perform and the information they can access on the SecurityCenter depend on
the type of group administrator account set up for them.
45
The site administrator can manage all client computers in all groups.
What can group administrators do?
The access level you assign determines which tasks group administrators can perform for their
groups.
3
Basic tasks for
Read Only
Access the SecurityCenter website (see
Getting started).
Note: No subscription information is visible.
Only the assigned groups are visible.
Manage from client computers (using the
administrative menu):
Manage quarantined files.
Disabling on-access scanning.
View computers from the SecurityCenter (see
Display details for a computer).
Check data in reports (see Viewing reports).
Additional tasks for
Read & Modify Reports
Install protection services.
View and manage computers from the
SecurityCenter (see Managing your
computers).
View policies (see Setting up policies).
Rename groups (see Create or edit a group).
Modify the information in listings and
reports:
Send email to computers.
Block computers from receiving updates.
Delete computers from your reports.
Move computers in and out of groups (see
Move computers into a group).
Send email to users.
Send reports to users in email (see Make the
most of your online data).
You specify the access level when you create the group administrator’s account, and you can
edit it at any time.
Create or edit a group administrator
Delete a group administrator
Create or edit a group administrator
Use the My Account page to manage group administrators. Up to six group administrators can be
listed on this page. If you have created more than six group administrator accounts, click
group administrators
To create or edit a group administrator:
1 On the My Account page, in the Group Administrator section, click Add or Edit.
2 On the Manage Group Administrators page, select Create New or select the name of an existing
group administrator.
3 Type the group administrator’s name, email address, and password.
The password you assign is used to log on to the SecurityCenter and must be different from
your password. Administrative rights based on the group administrator’s access level will be
assigned to this password.
4 Select an access level and which groups to manage.
5 Click Save to return to the My Account page.
6 On the line where the new group administrator’s name appears, click Email Password.
Your local email application opens a preaddressed message explaining how to log on to the
SecurityCenter, assigned groups, and instructions for accessing information about their
responsibilities. (You can use this feature only if you have a local email application
installed.)
7 Send the email message.
Delete a group administrator
For security purposes, be sure to delete obsolete accounts for group administrators.
To delete a group administrator:
On the My Account page, in the Group Administrators section, click Delete.
Setting up policies
Policies are made up of security settings for all of your protection services. These settings define
how your services operate on client computers.
3
Why use policies?
Policies enable you to customize security settings for your entire organization or for different
computers in your organization. Each policy is assigned to a group of computers. If you have
created multiple groups, you can assign a unique policy to each group or allow them to share a
single policy.
For example, you might place all laptops used by traveling sales representatives into a single
group called Sales Team. You can then assign a policy with high security settings that will
provide greater protection against threats in unsecure networks such as airports and hotels.
Whenever you want to adjust those setting, simply change the policy. Your changes will be
applied to all the computers in the Sales Team group automatically. There is no need to update
each computer’s setting individually. See
Customized policies on page 19 for an illustration.
How can I manage policies?
Click the Groups + Policies tab to display the groups in your organization and the policies
assigned to them. If you have not created any groups or policies, only the
SonicWALL Default policy are displayed (see The SonicWALL Default policy). From this page,
Default group and the
you can:
Create or edit a policy
Assign a policy to a group
Restore default policy settings
Delete a policy
Can users change their security settings?
The policy determines whether users can change their security settings.
Until you create additional policies, all computers are assigned the SonicWALL Default policy,
which is configured with settings recommended by SonicWALL to protect many environments.
You cannot rename or modify the
When you create a new policy, the default settings appear as a guideline. This enables you to
configure only the settings you want to change without having to configure them all.
Tab Default setting
Virus ProtectionOn-Demand Scan: Off
Spyware Protection Spyware Protection Status: On
Spyware Protection Mode: Prompt
Desktop Firewall Automatically install the desktop firewall on all computers using this
policy:
Use Smart Recommendations to automatically approve common
Internet applications:
Firewall Configuration: User configures firewall
Firewall Status: On
Firewall Protection Mode: Prompt
Connection Type: Untrusted
Browser ProtectionAutomatically install browser protection on all computers using this
policy:
Advanced Settings Update client computers where users are not logged in: Enabled
Display support notifications on client computers: Enabled
Virus protection:
Enable outbreak response: Enabled
Enable buffer overflow protection: Enabled
Enable script scanning: Enabled
Scan email (before delivering to the Outlook Inbox): Enabled
Scan all file types during on-access scans: Enabled
Scan compressed archives during on-access scans: Disabled
Scan compressed archives during on-demand scans: Enabled
Check for updates every: 12 hours
Spyware protection:
All programs types are enabled.
SonicWALL Default policy.
Disabled
Enabled
Enabled
3
With the default Advanced Settings configuration, it is possible for an on-demand scan to detect
threats in archived files that are not detected during an on-access scan. This is because on-access
Note
scans do not look at compressed archives by default. If this is a concern for your organization,
you should enable this option.
Use this procedure to remove a policy you have created from your account. You cannot delete
the
SonicWALL Default policy.
To delete a policy:
On the Groups + Policies page, next to a policy name click Delete.
If you delete a policy that is assigned to one or more groups, the SonicWALL Default policy will
be assigned to those groups.
Note
Viewing reports
Whenever a client computer checks for updates, it also sends its scanning history, update status,
and detections to the SecurityCenter website in encrypted XML files. It uploads the data directly
through an Internet connection or via a relay server. You can view this data in reports accessed
from the
appear in the reports.
Reports page. All client computers on your account (using the same company key)
Why use reports?
Reports provide valuable tools for managing your security strategy. Only the reports available
for the installed protection services appear on this page.
Use this report... To view...
Detections
Unrecognized
Programs
Inbound Events
Blocked by Firewall
Duplicate Computers
Computer Profiles
Detection History
Email Security Reports
The types of potentially malicious code or unwanted programs that have
been found on your network.
Use this report to manage detections of viruses and potentially unwanted
programs.
See View detectionson page 103 for instructions.
Programs that your spyware protection or firewall protection detected on
your network.
Use this report to manage your potentially unwanted program detections and
Internet applications blocked by the firewall protection service.
See View unrecognized programson page 105 and View unrecognized
Internet applications on page 123 for instructions.
Computers where inbound or outbound communications were blocked by
the firewall protection service.
Use this report to manage blocked communications.
See View inbound events blocked by the firewallon page 124 for
instructions.
Computers that appear more than once in administrative reports.
Use this report to track down obsolete computers and those where Enforced
Client has been incorrectly overinstalled and tracked as multiple
installations.
See View duplicate computerson page 80 for detailed instructions.
The version of the Windows operating system and the Internet Explorer web
browser running on each client computer.
Use this report to locate computers where you need to install software
patches for a specific browser or operating system.
See View computer profileson page 81 for detailed instructions.
A graphical summary of the number of detections and the number of
computers where detections occurred on your network over the past year.
Use this report to evaluate the effectiveness of your security strategy.
See View your detection historyon page 107 for instructions.
A page on the email security service’s portal, where you can access reports
on your site’s mailflow and detections.
Use these reports to monitor email activity and detections.
See Viewing reports for the email security serviceon page 141 for
instructions.
3
Can I customize reports?
Select the data to display (see Customize listings and reportson page 60).
Print a report, save it, or send it to users (see Make the most of your online data on page 59).
Add a customized logo (see Add your logo to reportson page 82).
Use the Duplicate Computers report to locate computers that are listed more than once in your
reports. Duplicate listings usually result when the Enforced Client client software has been
installed more than once on a single computer or when users install it on their new computers
without uninstalling it from their previous computers.
Figure 3-9 Duplicate Computers report
3
Select the information that appears in this report:
Groups — Display only the computers in a group or display all computers.
To delete a duplicate computer:
Select the duplicate computer in the report, then click Delete.
Deleting a computer does not uninstall the Enforced Client client software. If you mistakenly
delete a computer with working client software from the report, it automatically reappears in your
Note
listing the next time its report data is uploaded. However, you will no longer be able to view the
historical detection data for that computer.
To view details about a computer:
Click a computer name to display the Computer Details page.
The Computer Details page displays information about the computer, its service components, and
its detections. See
Display details for a computer on page 67 for information about tasks you can
Use the Computer Profiles report to view the version of the Windows operating system and the
Internet Explorer web browser running on client computers. This helps you locate computers for
maintenance, such as installing Microsoft software patches.
Figure 3-10 Computer Profiles report
3
Select the information that appears in this report:
Groups — Display only the computers in a group or display all computers.
Operating system version — Display computers running all Windows operating systems or
only those running the selected version.
Browser version — Display computers running all versions of Internet Explorer or only those
running the selected version.
Managing your correspondence
Use SecurityCenter features to simplify and customize your correspondence with users,
customers, and your service provider.
Use email to send important information about corporate security to your users:
Send reports or listings as an attached archived web page in .MHTM format (see Make the
most of your online data on page 59).
Send descriptions of security issues on client computers or instructions for required
maintenance (see Send email to computerson page 69).
You can use this feature only if you have a local email application installed.
Note
Update user email addresses
Users can enter their email address when installing Enforced Client. It is important for you to
update their email addresses as they change.
To update a user’s email address:
1 In any listing, click a computer name link.
2 On the Computer Details page, type a new email address, then click Save.
3
Update your account’s email address
Keep the email address for your account up-to-date to prevent lapses in receiving your status
emails and other account correspondence from your service provider.
To update your account’s email address:
1 On the My Account page, in the My Profile section, click Edit.
2 On the Customer Profile page, type your new email address in the first text box, then click
Save.
Add your logo to reports
To customize your correspondence, you can upload a logo that appears in the upper-right corner
of the SecurityCenter website, including reports you send to users.
Logo files can be .GIF, .JPEG, .JPG, or .PNG format. Logo dimensions must be 175 x 65 pixels with
a file size under 500
To upload a logo:
1 On the My Account page, in the My Logo section, click Edit.
2 On the Manage Logo page, click Upload Logo. (To replace an existing logo, click Upload New
Logo
.)
3 On the Upload Your Logo page, type the name of the file you want to upload or browse to
locate the file.
KB. Other dimensions will result in a stretched or shrunken logo.
4 In the Verification Code box, type the characters displayed in the black box. (Alphabetic
If your logo file is not the correct size, the SecurityCenter resizes it to fit the allotted area and
displays a preview of how it will appear on reports. Click
or
Delete and Resubmit to select a different file.
Approve to accept the resized logo,
6 Click Close Window.
To delete a logo:
1 On the My Account page, in the My Logo section, click Edit.
2 On the Manage Logo page, click Delete Logo.
3 Click Cancel to return to the My Account page.
Managing your subscriptions
The SecurityCenter includes tools to help you keep track of your service subscriptions.
View your service subscriptions
Update subscription information
3
Purchase, add, and renew services
Request a trial subscription
Receive subscription notifications
View your service subscriptions
Check the status of your subscriptions to ensure your protection services remain active and you
have the right number of licenses to protect new computers as your organization grows.
To view your protection services summary:
Click the My Account tab.
The Service Summary lists details about each subscription, including the number of licenses and
the expiration date.
To view your subscription history:
1 On the My Account page, in the Service Summary section, select View subscription history.
The Subscription History page lists details for each service subscription.
2 Select View Cancelled Subscriptions to display a list of subscriptions that are no longer current.
Use the Subscription History page to update the contact and account information for each of your
protection service subscriptions. This is useful for administrators who manage multiple
accounts.
Your service provider determines whether this feature is available to you. Typically, the Edit link
is available only to SonicWALL partners who oversee security for multiple accounts.
Note
To update information for a subscription:
1 On the My Account page, in the Service Summary section, select View subscription history.
The Subscription History page lists details for each service subscription.
2 In the listing, select Edit for the subscription you want to update.
3 In the Edit Subscription Information page, type new information for:
Email address
Company name
First name
3
Last name
4 Click Submit to return to the Subscription History page and view the updated entry.
Purchase, add, and renew services
To ensure that additional or renewed services remain on the same account with your existing
services, follow these guidelines:
Submit your order through the same SecurityCenter website you use to maintain your
original subscriptions.
Submit your order with the same email address you used to register and maintain your
original subscriptions.
If you customized an administrator email address that is different than the email address you used
to place your original order, be sure you use the original email address to place your new order.
Note
By keeping all your service subscriptions on the same account, all your client computers report
to the same SecurityCenter website, and your service provider sends all correspondence and
notifications to one email address.
To purchase, add, or renew services:
1 On the My Account page, locate the Service Summary section.
2 In the Add Service column, click Buy, Buy More, or Renew.
3 Follow the instructions on the Product Purchase page.
You can also access the Product Purchase page from the SecurityCenter page or the
To try a protection service free of charge for 30 days, you can request a trial subscription. You’ll
have the opportunity to try all the features. You can then purchase the service and continue using
it with no interruption in protection.
To request a free trial:
1 On the My Account page or the SecurityCenter page, click Buy or Try.
2 Follow the instructions on the Product Purchase page.
Receive subscription notifications
Configure your notification preferences to receive an email whenever the expiration date for a
service approaches. See
Sign up for email notifications on page 62 for more information.
Getting assistance
Click the Help tab to display the Help page, where you can access additional resources for
Enforced Client and your SecurityCenter website.
3
View printed and online documents
Download utilities
Contact product support
View printed and online documents
Several documents are available to assist you with installing, configuring, and using your
protection services.
To view online documents:
On the Help page, click a link for this Product Guide, the Quick Start Guide, or the Release Notes.
To view context-sensitive online help:
Click the help link ( ? ) at the upper right of any page of the SecurityCenter to view information
specific for that page.
Install client software
remotely using the Push
Install utility.
Uninstall components left
from a previous
installation.
Enable users without
administrator rights to
install client software.
VSSetup
Downloads the silent installation package for deploying client software to
a single computer without user interaction. Download to the
administrative computer. Requires a method for moving the installation
package to a client computer, such as a third-party deployment tool, a
login script, a link to an executable file in an email message, or a portable
medium such as a CD.
See Silent installationon page 39 for more information.
Run the Push Install Utility
Downloads a utility for remotely deploying client software directly from
your service provider’s website to multiple computers simultaneously.
Download to the administrative computer.
See Push installationon page 42 for more information.
MVSUninstall
Downloads a utility that cleans up registry keys and files from a previous
installation of Enforced Client or competitive software. Download directly
to the client computer, then double-click.
installation agent
Downloads the standalone installation agent. Download directly to the
client computer and install locally, or download to the administrative
computer and use deployment tools to install on clients.
Required only when you want users without administrator rights to use the
URL method to install client software. You must have local administrator
rights on the client computer to install this file.
See Install the standalone installation agenton page 34 for more
information.
3
Contact product support
If you cannot find an answer to a question in the product documentation, send it directly to a
product support representative.
To contact product support:
On the Help page, click Contact Support to display a form where you can submit a description of
your problem to a product support representative.
86
Page 87
Using the Virus and Spyware Protection
4
Service
The virus and spyware protection service in Enforced Client safeguards client computers against
threats, such as viruses and potentially unwanted programs, by scanning files and email
messages as they are accessed.
This section describes features of the virus and spyware protection service:
Accessing client features (Scan Tasks menu)
Scanning client computers
Configuring policies for virus and spyware protection
Viewing reports for virus and spyware detections
Managing detections
Disabling on-access scanning
Accessing client features (Scan Tasks menu)
Use the Scan Tasks menu to access client features of the virus and spyware protection service.
You can also access advanced features from an administrative version of the menu.
To display the Scan Tasks menu:
On the client computer, click in the system tray, then select Scan Tasks.
OR
To display the administrative version of the menu, hold down Ctrl and Shift, click in the
system tray, then select Scan Tasks.)
87
Page 88
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Accessing client features (Scan Tasks menu)
Figure 4-1 Scan Tasks menu
Select this command... To do this...
Scan...Select a location to scan (My Computer, My Documents Folder, or
Floppy A). Click Scan Folder... to browse to a folder of your
choice.
Quarantine Viewer
(administrative menu only)
View PUP Detections
Disable On-Access Scanner
(administrative menu only)
Open the quarantine folder, which contains possible threats
detected on the computer (see
page 109).
Display a list of potentially unwanted programs that the virus and
spyware protection service has detected (see
page 93).
Turn off the automatic on-access scanner. To re-enable the scanner,
reopen the administrative menu and select
Scanner
(see Disabling on-access scanningon page 110).
Note: The computer is vulnerable to attack if you disable the
on-access scanning feature. Be sure to enable the feature again as
soon as possible.
Manage quarantined files on
Scan for spyware on
Enable On-Access
4
88
Page 89
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Scanning client computers
Scanning client computers
The virus and spyware protection service safeguards computers by automatically scanning for
viruses and spyware. At any time, users can perform manual scans of files, folders, or email, and
administrators can set up scheduled scans.
Scan automatically (on-access scans)
Scan manually (on-demand scans)
Schedule on-demand scans
Scan email
Scan for spyware
The behavior of the scanning features on client computers is defined in the policies that you
configure using the SecurityCenter. Policy settings determine the types of files, programs, and
other items detected; whether users can manage their detections; how frequently computers
check for updates; and when scheduled scans occur. See
spyware protection on page 95 for instructions on configuring these settings in policies.
Configuring policies for virus and
4
Scan automatically (on-access scans)
The virus and spyware protection service scans files and folders on client computers whenever
they are accessed, which is referred to as an on-access scan.
The default on-access scanning policy is:
All types of files are scanned when opened, and again when closed (if they were modified).
All email attachments are scanned when accessed and when saved to the hard drive,
protecting the computer from email infections.
Programs are scanned for spyware identifiers, to detect if a spyware program attempts to run
or a program attempts to install spyware.
To customize on-access scans, administrators can:
Exclude certain folders, file types, or programs from on-access scanning by configuring the
virus and spyware protection settings in policies (see Specify approved programson
page 101).
Select an option to scan only files meeting the current file extension criteria specified in the
detection definition (
Select an option to scan compressed archives (see Set advanced virus protection optionson
page 97).
Specify other options for scanning email attachments and spyware (see Configuring policies
for virus and spyware protection on page 95).
DAT) files (see Set advanced virus protection optionson page 97).
How detections are handled
89
Page 90
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Scanning client computers
Scan manually (on-demand scans)
The virus and spyware protection service automatically scans most files when they are accessed.
However, users can scan a particular drive or folder at any time. This is referred to as an
on-demand scan.
The default on-demand scanning policy is:
All processes running in memory are scanned.
All files are scanned.
All critical registry keys are scanned.
In addition, during an on-demand scan of My Computer, the drive where Windows is installed, or
the Windows folder:
All cookies are scanned.
All registry keys are scanned.
Administrators can set a schedule for some or all computers to run an on-demand scan
automatically. See
To perform a manual scan using the icon:
1 Click in the system tray, then select Scan Tasks.
Schedule on-demand scans on page 95 for more information.
4
2 Select Scan My Computer, Scan My Documents Folder, or Scan Floppy A:, or select Scan Folder
and browse for a drive or folder.
To perform a manual scan from Windows Explorer:
In Windows Explorer, click any drive or folder, then select Scan Now from the menu.
Figure 4-2 Scan Now option
View scan results
How detections are handled
View scan results
After completing an on-demand scan, Enforced Client stores results in a Scan Statistics report on
the computer where the scan was performed. The number and type of detections are uploaded to
the SecurityCenter for inclusion in administrative reports.
90
Page 91
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Scanning client computers
To view results of a manual scan:
In the Scan Completed dialog box, click Report to display the Scan Statistics report.
What is in a Scan Statistics report?
The Scan Statistics report opens in the default browser and displays the following information:
Date and time the scan was started.
Elapsed time for the scan.
Version of the scanning engine software and DAT file.
Date of the last update.
Completion status of the scan.
Location of the scanned items.
Status for scanned files, registry keys, and cookies:
4
Scanned
Detected
Cleaned
Number of items scanned.
The item is still a threat and still resides on the system. For files, they are most
likely contained within a compressed archive (for example, a .
write-protected media. For registry keys and cookies, the file it is associated
with has a status of
The item was cleaned of the threat. An encrypted backup copy of the original
item was saved in a quarantine folder, where it can be accessed only with the
Detected.
ZIP archive) or on
Quarantine Viewer (see Manage quarantined fileson page 109).
Deleted
The item could not be cleaned; it was deleted instead. An encrypted copy was
saved in a quarantine folder, where it can be accessed only with the
Viewer
(see Manage quarantined fileson page 109).
Quarantine
How detections are handled
The type of threat and the policy settings determine how the virus and spyware protection service
handles a detection:
Items with detections How the service handles the detections
Files and programsVirus detections: The virus and spyware protection service attempts to
clean the file. If it can be cleaned, the user is not interrupted with an
Registry keys and cookies
alert. If it cannot be cleaned, an
deleted. A copy is placed in the quarantine folder.
Potentially unwanted program detections: If the virus and spyware
protection service is set to
deleted. If set to
Select a spyware protection mode on page 100 for details.
In all cases, an encrypted backup copy of the original item is saved in a
quarantine folder (see
all activity is uploaded to the SecurityCenter for use in reports.
Detections initially appear as Detected. See Scan for spywareon
page 93 for instructions on cleaning the detections. Cleaning detected
files also cleans their associated registry keys and cookies. Their status
is then reported as
Prompt mode, users must select the response. See
Cleaned.
alert appears, and the detected file is
Protect mode, detections are cleaned or
Manage quarantined files on page 109). Data for
91
Page 92
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Scanning client computers
Schedule on-demand scans
Schedule an on-demand scan to occur at a specific date and time, either once or on a recurring
basis. For example, you might want to scan client computers at 11:00 P.M. each Saturday, when
it is unlikely to interfere with other client processes. Scheduled scans are configured as part of a
policy and run on all computers using that policy. See
At the start of an on-demand scan, all previous detections of potentially unwanted programs
Note
are cleared from the
Potentially Unwanted Program Viewer.
Schedule on-demand scans on page 95.
Scan email
By default, the virus and spyware protection service scans all email messages and attached files
as they are accessed. It also scans messages before they reach a user’s Inbox (see
optional protection on page 97).
Users can scan their Microsoft Outlook folders or individual messages manually.
To scan an email message manually:
1 In the Microsoft Outlook Inbox, highlight one or more messages in the right pane.
2 Under Tools, select Scan for Threats.
Enable
4
The On Demand Email Scan window displays any detections. If the window is empty, no
threats were detected.
Scan for spyware
As part of its automatic scans, the virus and spyware protection service scans for spyware
whenever programs are installed or run, and during manual scans. Its response to detections
depends on the spyware mode configured in the client computer’s policy (see
protection options on page 99). Three responses are possible:
Attempt to clean the program (Protect mode).
Prompt the user for a response (Prompt mode).
Log the detection and take no further action (Report mode).
Cookies and registry keys that indicate spyware are also detected. Deleting a potentially
unwanted program deletes any associated cookies and registry keys.
All detections are listed in administrative reports available from the SecurityCenter. On client
computers, you can view and manage detections using the
Note
Set basic spyware
Potentially Unwanted Program Viewer.
At the start of an on-demand scan, all previous detections of potentially unwanted programs
are cleared from the
detections remain in the
Potentially Unwanted Program Viewer. For on-access scans, previous
Potentially Unwanted Program Viewer.
To manage spyware detections on client computers:
1 On the client computer, open the Potentially Unwanted Programs Viewer. Either:
In the Detection Alert dialog box, click Yes.
Click in the system tray, then select Scan Tasks | View PUP Detections.
The Potentially Unwanted Program Viewer lists each detected program.
92
Page 93
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Scanning client computers
2 Select one or more detections, then select an action:
4
Clean
Approve
Place an encrypted original copy of each selected item in a quarantine folder, then
attempt to clean it. If it cannot be cleaned, delete the item.
Add each selected item to the user’s list of approved programs. These programs
will not be detected as spyware during future scans. (Clicking
list of all currently approved programs on the client computer.)
Approved displays a
Close Allow the items to remain on the computer and close the Potentially Unwanted
Program Viewer
. They will be detected again during the next scan.
3 Check the status of each item, then click Close.
Action Required
Approved
Cleaned
Quarantined
Delete failed
You have not performed any action on this item since it was detected.
The item was added to the list of user-approved programs and will no longer
be detected as spyware on this computer.
The item was cleaned successfully and can be used safely. An encrypted,
backup copy of the original item was placed in a quarantine folder.
The item could not be cleaned. The original item was deleted, and an
encrypted copy was placed in a quarantine folder. If the item was a program,
all associated cookies and registry keys were also deleted.
Note: Items are placed into the quarantine folder in a format that is no longer a
threat to the computer. After 30 days, these items are deleted. You can manage
these items using the
page 109).
The item could not be cleaned or deleted. If it is in use, close it and attempt the
clean again. If it resides on read-only media, such as CD, no further action is
required. The virus and spyware protection service has prevented the original
item from accessing the computer, but it cannot delete the item. Any items
copied to the computer have been cleaned.
Note: If you are not sure why the item could not be cleaned, it is possible that
a risk still exists. If you cannot determine why the delete failed, contact
product support.
Quarantine Viewer (see Manage quarantined fileson
93
Page 94
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Configuring policies for virus and spyware protection
Configuring policies for virus and spyware protection
Policies define the operational settings for all your protection services. See Setting up policies
on page 75 for general information about using policies.
Three tabs are used to configure the features for virus and spyware protection. See The
SonicWALL Default policy on page 76 for a list of the virus and spyware protection settings in
the SonicWALL Default policy.
Set basic virus protection options
On the Groups + Policies page, use the Virus Protection tab to configure basic settings for virus
protection.
Schedule on-demand scans
Exclude files and folders from virus scans
Figure 4-3 Virus Protection policy tab
4
Schedule on-demand scans
You can force a computer to scan all files, folders, and programs by scheduling an on-demand
scan to occur at a specific date and time, once or on a recurring basis. These scans are performed
in addition to the regular on-access scans.
94
Page 95
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Configuring policies for virus and spyware protection
To schedule an on-demand scan:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
2 Click the Virus Protection tab.
3 Under On-Demand Scan, click On.
4 Select a frequency, day, and time for the scan to run, then click Save.
Exclude files and folders from virus scans
You can create a custom list of files, paths, and file extensions to exclude from both on-access
and on-demand scans for viruses. By selecting a file here, you request that it not be scanned for
viruses.
You can exclude a particular type of file you know is not vulnerable to attack or a folder you
Tip
To specify exclusions:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
2 Click the Virus Protection tab.
know is safe. If you are unsure, we recommend not setting exclusions.
4
3 Under Excluded Files and Folders, select the type of exclusion you want to create.
4 Specify the value (browse for a file or folder, or type a file extension).
5 Click Add Exclusion.
The new exclusion appears in a list.
6 Click Save.
To remove an exclusion from the list:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
2 Click the Virus Protection tab.
3 Under Excluded Files and Folders, in the table listing for the exclusion you want to remove,
click
remove, then click Save.
95
Page 96
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Configuring policies for virus and spyware protection
Set advanced virus protection options
On the Groups + Policies page, use the Advanced Settings tab to configure enhanced protection
and safeguard against additional threats lurking in out-of-the-way locations.
Select your update frequency
Enable optional protection
See Update computers where no user is logged on on page 55 for information about the Update
By default, computers check for updates every 12 hours. You can specify that they check as often
as every four hours or as infrequently as once a day.
An update is not necessarily downloaded every time the computer checks for updates.
Note
Checking can reveal that no new update is available.
To select an update frequency:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
2 Click the Advanced Settings tab.
3 For Check for updates every, select a setting, then click Save.
Enable optional protection
Specify additional updates and advanced scanning to increase protection on client computers.
96
Page 97
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Configuring policies for virus and spyware protection
To specify optional scans:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
2 Click the Advanced Settings tab, select each scan you want to enable, then click Save.
4
Enable outbreak response
Enable buffer overflow
protection
Enable script scanning
Scan email (before
delivering to the Outlook
Inbox)
Scan all file types during
on-access scans
Scan within archives during
on-access scans (e.g., .zip,
.rar, .tat, .tgz)
Scan within archives during
on-demand scans (e.g.,
.zip, .rar, .tat, .tgz)
Check for an outbreak DAT file every hour.
Detect code starting to run from data in reserved memory and
prevent that code from running. This feature protects against buffer
overflow in more than 30 most commonly used Windows-based
programs. SonicWALL updates this list as it adds buffer overflow
protection for additional programs.
Important: Buffer overflow protection does not stop data from
being written. Do not rely on the exploited application remaining
stable after being compromised, even if buffer overflow protection
stops the corrupted code from running.
Detect harmful code embedded in web pages that could cause
unauthorized programs to run on client computers.
Detect viruses and harmful code in email messages before they are
placed in the user’s Inbox.
Inspect all types of files, instead of only default types, when they are
downloaded, opened, or run. (Default file types are defined in the
DAT files.)
Detect viruses and harmful code in compressed archive files (such as
.
ZIP files) during on-demand scheduled or Scan Now scans.
Detect viruses and harmful code in compressed archive files (such as
.
ZIP files) as they are saved, uncompressed, or opened.
With the default settings, it is possible for an on-demand scan to detect threats in archived files
that are not detected during an on-access scan. This is because on-access scans do not look at
Note
compressed archives by default. If this is a concern for your organization, you should enable this
option.
97
Page 98
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Configuring policies for virus and spyware protection
Set basic spyware protection options
On the Groups + Policies page, use the Spyware Protection tab to configure basic settings for
spyware protection.
Enable spyware protection
Select a spyware protection mode
Specify approved programs
Figure 4-5 Spyware Protection policy tab
4
Enable spyware protection
You can specify whether the virus and spyware protection service looks for spyware and other
potentially unwanted programs during scans. By default, this option is enabled.
To enable and disable spyware protection:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
2 Click the Spyware Protection tab.
3 For Spyware Protection Status, select On or Off, then click Save.
98
Page 99
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Configuring policies for virus and spyware protection
Select a spyware protection mode
You can specify how the virus and spyware protection service responds to detections of
potentially unwanted programs on client computers.
Protect: It attempts to clean the detected item. If the item cannot be cleaned, a copy of the
item is placed in a quarantine folder and the original item is deleted.
Prompt: It displays a dialog box with information about the detection, and allows the user to
select a course of action. This option is the default.
Report: It reports detections to the SecurityCenter and takes no additional action.
For all modes, detections are reported to the SecurityCenter, where you can view information
about them in reports.
To prevent popup prompts from appearing on client computers when threats are detected, and
Tip
for highest security, we recommend using
To specify a response to potentially unwanted program detections:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
2 Click the Spyware Protection tab, select a Spyware Protection Mode, then click Save.
Protect mode.
4
Use the following table to determine how policy options are implemented in the different
protection modes.
Mode Behavior of protection service
Report No user prompts.
Detections reported to SecurityCenter.
Administrator can select approved programs, which are not reported as
detections.
Can be used as a Learn mode.
Prompt
Protect Users not prompted about detections.
If the policy is changed from Prompt mode to Protect mode or Report mode, the virus and
Note
spyware protection service saves user settings for approved programs. If the policy is then
changed back to
Users prompted about detections.
Detections reported to SecurityCenter.
Administrator can select approved programs. These programs are not reported
as detections, and users are not prompted for a response to them.
Users can approve additional programs in response to prompts. These are
reported to SecurityCenter.
Users notified about deleted or quarantined programs.
Detections reported to SecurityCenter.
Administrator can select approved programs. These programs are not reported
as detections.
Prompt mode, these settings are reinstated.
99
Page 100
Enforced Client Product GuideUsing the Virus and Spyware Protection Service
Configuring policies for virus and spyware protection
Learn mode
Report mode can be used as a “learn mode” to help you determine which programs to approve
(see
Specify approved programs on page 101). In Report mode, the virus and spyware protection
service tracks but does not delete unrecognized programs. You can review detected programs in
the
Unrecognized Programs report (see View unrecognized programson page 105) and approve
those that are appropriate for your policy. When you no longer see programs you want to
approve in the report, change the policy setting to
Prompt or Protect mode.
Specify approved programs
On client computers, the virus and spyware protection service maintains a list of approved programs that are not identified as potentially unwanted programs. You can configure the list of
approved programs for all computers using a policy. In addition, users can approve programs for
individual client computers when the firewall protection service is set to
Exclude only programs you know are safe. If you are unsure about a program, we recommend
Caution
not adding it to the approved programs list.
To configure approved programs in a policy:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
Prompt mode.
4
2 Click the Spyware Protection tab.
3 Under Approved Programs, select the type of program (a detected program or a user-approved
program).
4 Select a program, then click Save.
The selected program is added to the list of allowed programs. (No list appears until you have
added at least one approved program to the policy.)
Use the Unrecognized Programs report to view a complete listing of all programs detected on
Tip
client computers.
To remove an approved program from a policy:
1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).
2 Click the Spyware Protection tab.
3 In the list of Approved Programs, click remove for each program you want to delete from the
list, then click
Save.
Set advanced spyware protection options
On the Groups + Policies page, use the Advanced Settings tab to select the types of potentially
unwanted programs to search for during scans.
Threat type Description
Jokes
Remote admin tools
Programs designed to be mistaken for a virus. They might alarm or annoy a
user but do not harm files or data. They are intended to waste time and
resources.
Programs that can be used from a remote location to access a computer.
Some remote administration tools serve useful purposes, such as allowing
users to access their files from home, but others can be used by unauthorized
persons to monitor user activities and take control of a computer.
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.