Panda Cloud Office Protection Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Panda Cloud Office Protection an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Panda Cloud Office Protection, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Panda Cloud Office Protection die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Panda Cloud Office Protection. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Panda Cloud Office Protection sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Panda Cloud Office Protection
- Den Namen des Produzenten und das Produktionsjahr des Geräts Panda Cloud Office Protection
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Panda Cloud Office Protection
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Panda Cloud Office Protection zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Panda Cloud Office Protection und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Panda finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Panda Cloud Office Protection zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Panda Cloud Office Protection, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Panda Cloud Office Protection widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Panda Manage d Office Prote ction Web console walkthrough[...]

  • Seite 2

    Panda Managed Office Protection . W eb console walkthrough Panda Managed Of fice Protection W eb console walkt hrough Mar ch 2009[...]

  • Seite 3

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 3 of 53 Contents 1. Web console w alkthrough .................................................................................................................. 4 2. The console in detail ........................................................[...]

  • Seite 4

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 4 of 53 1. Web console waltkthrough To start the evaluation of the administration and m onitoring console, let’s first take a look at the conso le itsel f. To do this, follow the st eps below: 1. G o to the console. https://managedprot ectio[...]

  • Seite 5

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 5 of 53 3. Centralized security management functions accesible through the Settings s ection, e nabling the installation of the protection , adm inistration of security policies and the application of these policies to groups of work stations,[...]

  • Seite 6

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 6 of 53 4. Centralized monitoring of the secur ity status of workstations, laptops or serv ers, and of detections and firewall events. This is accessible throug h the main dashbo ard in the Status section. The dashb oard graphs represent detec[...]

  • Seite 7

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 7 of 53 5. In the Reports section y ou can conf igure executi ve reports on the status of y our IT r esources and of detections m ade, with high -level statistics and gra phics as wel l as det ails. These reports can b e exported into differen[...]

  • Seite 8

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 8 of 53 2. The console in detail In this secti on we’ll tak e a more detailed look at the m onitoring and m anagement options in the cons ole. So, start by following the steps below: Log in to the console. 2.1. Centralize d security manageme[...]

  • Seite 9

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 9 of 53 There are three ways of installing the pro tection, each adapting to different secu r ity managem ent scenarios. 1. The protection can be installed using th e installation pack age, either m anually or through ex ternal distribution s [...]

  • Seite 10

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 10 of 53 Once you download and install th e distribution tool, you c an launch the program us ed to d istribute the protection: Select Inst all protection to start installing the prot ection, which can be distri buted e ither b y dom ain by IP[...]

  • Seite 11

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 11 of 53 To use the d istribution tool you m ust be either the ad m inistrator of the com puters’ domain or log in to the computers using credentials with adm inistrator privileges .[...]

  • Seite 12

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 12 of 53  Administering centr alized security polic ies Through the S ettings section you can determ ine the security policies to appl y to the protected c om puters. These securit y policies are grouped in security profiles which ca n be a[...]

  • Seite 13

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 13 of 53 Go to Create n ew profile . W rite the nam e of the new security polic y profile and make any modifications y ou want. First you m ust decide if the c omputers to which the new profile will a pply wil l have the antivirus and/or firew[...]

  • Seite 14

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 14 of 53 If you go to the Advanced update sett ings secti on, you can configure the update rules for th e computers . This section is usef ul, for example, when defining server pr ofiles, as you can det ermine at an y time when to apply softwa[...]

  • Seite 15

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 15 of 53 In the Scheduled scans section you can schedule Th e on-dem and scans to be run o n computers to which the profile appli es.[...]

  • Seite 16

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 16 of 53 The Warnings s ection lets you conf igure the following: 1. If you want the local prot ection to displa y a warning whene ver a detection occurs or if you would rather that the end-us er is not notified. 2. If you want to be inf ormed[...]

  • Seite 17

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 17 of 53 For each security prof ile, you can now c onfigure func tions related w ith the antivirus . Select A ntiviru s and establish the protecti on levels for each m alware entr y point: 1. Files 2. Mail and instant m essaging 3. Internet 4.[...]

  • Seite 18

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 18 of 53 2 3[...]

  • Seite 19

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 19 of 53 4[...]

  • Seite 20

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 20 of 53 For each sec urity profi le, you can now configure fu nctions related with the firewall . Selec t Firew all in the menu on the left. Bear in mind that the firewall protect ion will only be installed if in the G eneral settings s ectio[...]

  • Seite 21

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 21 of 53 If the firewall is m anaged centrall y by the administrator , you must determ ine whether the p rof ile applies to computers within the cor porate net work or outside of it. In the c ase of the latter, th e firewall rules will be stri[...]

  • Seite 22

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 22 of 53 At applicati on level, you c an s ee the ru les th at Panda Securit y applies and m aintains throug h the automatic updates. 1[...]

  • Seite 23

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 23 of 53 You can also ad d y o ur o wn app lication rul es b y selecting U ser rules and defining them in the screen that appears after clicking Add . 1[...]

  • Seite 24

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 24 of 53 You can see the s ystem- level Panda rules in the System sec tion. 2[...]

  • Seite 25

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 25 of 53 To configure a user ru le, select Us er rule in the drop- down menu and c lick Add .[...]

  • Seite 26

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 26 of 53 Finally, Panda Securit y also offers, maintains and upd ates intrusion detection rules, which are enabled b y default but c an be d isabled by the a dministrator. It is n ot advisable to disable t hem , especially the detection of net[...]

  • Seite 27

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 27 of 53  Creating groups of comp uters and assigning security policies remotely Once you have finished creating securit y policies, the y have to be assigned to the com puters which ar e protected and managed. To do this, create groups of [...]

  • Seite 28

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 28 of 53 Once you are in the secti on f or c reating a new group, assign it a name and a se curity po licy prof ile ( you ca n edit this prof ile from the shortcut to the ri ght: Go to pr ofile management ) a nd select t he group of com puters[...]

  • Seite 29

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 29 of 53  Local or remote install ation of the protection w ith predefined security po licies If you want to install the protec tion on a new com puter belonging to a newl y cre ated group a nd therefore assign security policies that you ha[...]

  • Seite 30

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 30 of 53 2.2. Centralize d security monitoring  Consolidated networ k dashboard Once you have access ed the Panda M anaged Office Protection console, go to th e Status section, where you will see th e mal ware detection h istory at -a-glanc[...]

  • Seite 31

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 31 of 53 To see details of licenses , select V iew more . Here y ou c an see the co mput ers affected by m aintenance contrac t expir y. T here is a pr eliminary l ist of computers that will c ease t o have lice nses. The list com prises the f[...]

  • Seite 32

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 32 of 53[...]

  • Seite 33

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 33 of 53  Monitoring the security status of t he network In the Protection section y ou can check the status of the protec tion, with a straightfor ward view of all t he computers on your network with the protect ion installed. For each com[...]

  • Seite 34

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 34 of 53 By selecting one of the protected com puters, y ou will be able to acces s detailed inf ormation about the protection, with inf ormation regarding:  Name and IP of the com puter.  Group to which it be longs and associated secur [...]

  • Seite 35

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 35 of 53 There is a filter th at allows you to quickl y search for c omputers with the prot ection disabled, o utdated, pendin g restart, etc.[...]

  • Seite 36

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 36 of 53  Exporting the comput ers’ status to file It is possible to export t he list of computers to Excel or CV S .[...]

  • Seite 37

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 37 of 53  Centralized monito ring of detections In the Status s ection, cl ick View list of detection s to go to the section f or m onitoring detec tions. In this section you can anal yze in detail an y detections on the net work in which t[...]

  • Seite 38

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 38 of 53[...]

  • Seite 39

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 39 of 53 If y ou cl ick one of the detections, you will see it even more details: where it was located, which protection module detected the attack or m alware, etc.  Quick search for dete ctions and firewall events W hen y ou have to adm i[...]

  • Seite 40

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 40 of 53[...]

  • Seite 41

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 41 of 53[...]

  • Seite 42

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 42 of 53  Exporting informatio n on detections and fi rewall ev ents to f ile This opti on lets you sav e inf ormation, in Excel or plain text about detections occurred. Y ou can save all of them or f ilter the information.[...]

  • Seite 43

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 43 of 53 2.3. Consolidated re ports The reports off er rapid and straightfor ward inform ation about the mos t im portant aspects of the protec tion. These reports can be exported into diff erent form ats, such as CVS, XML, plain text, PDF, HT[...]

  • Seite 44

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 44 of 53[...]

  • Seite 45

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 45 of 53 3. High-level information about the detec tions in the selected period 4. Top 10 detections and T op 10 compute rs infected In the Executive r eports you can choose to see infor mation about detect ions in:  Last 24 hours. Grap h a[...]

  • Seite 46

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 46 of 53 You can choose to om it inform ation about the licenses. T his option is useful for re sellers using the c lient consults manage c lients b y groups of computers . You can also choose to get inform ation about one group or several gro[...]

  • Seite 47

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 47 of 53  High- level consolidat ed and detailed r eport of client s’ network security statu s This report contains: 1. High-level report ab out the number of com puters protected and th e num ber of computers without connection in the se[...]

  • Seite 48

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 48 of 53 3. Details of each com puter’s protection stat us and ‘health’: if there is an error or if th ey require intervention. You can choose to om it high-leve l information, graphic s or certain detai ls according to your needs. You c[...]

  • Seite 49

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 49 of 53  High-level consolidat ed and detailed r eport of firewal l detections and e vents This report contains: 1. High-level inform ation about f irewall detections and events. 2. Graph of detections in the selected period. 3. Details of[...]

  • Seite 50

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 50 of 53 You can choose to omit high-leve l information, graphic s or certain detai ls according to your needs. You can also choose to get inform ation about one group or several groups in the status rep ort.[...]

  • Seite 51

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 51 of 53 2.4. Users and centralized administration profiles This option allo ws security m anagement to be delegat ed among adm inistrators with dif ferent roles. In the Users section you can c reate or edit users with access to the adm inistr[...]

  • Seite 52

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 52 of 53 To create a new user, s elect Create new user . I n this section you m ust specif y : 1. The user nam e and password 2. The managem ent and/or monitoring perm issions 3. The group of com puters the user has perm issions over If you cr[...]

  • Seite 53

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 53 of 53 2.5. In -depth malware audits. Panda Malware Radar Panda Malware Radar detects malware and other security p roblems in your netw ork , which have s lipped past the protection ins talled in your company. W hen the scan is c omplete, Ma[...]