Panda Cloud Office Protection manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53

Ir para a página of

Bom manual de uso

As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Panda Cloud Office Protection. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoPanda Cloud Office Protection vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.

O que é a instrução?

A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Panda Cloud Office Protection você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.

Infelizmente, pequenos usuários tomam o tempo para ler o manual Panda Cloud Office Protection, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.

Então, o que deve conter o manual perfeito?

Primeiro, o manual Panda Cloud Office Protection deve conte:
- dados técnicos do dispositivo Panda Cloud Office Protection
- nome do fabricante e ano de fabricação do dispositivo Panda Cloud Office Protection
- instruções de utilização, regulação e manutenção do dispositivo Panda Cloud Office Protection
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes

Por que você não ler manuais?

Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Panda Cloud Office Protection não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Panda Cloud Office Protection e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Panda na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Panda Cloud Office Protection, como para a versão papel.

Por que ler manuais?

Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Panda Cloud Office Protection, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.

Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Panda Cloud Office Protection. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação

Índice do manual

  • Página 1

    Panda Manage d Office Prote ction Web console walkthrough[...]

  • Página 2

    Panda Managed Office Protection . W eb console walkthrough Panda Managed Of fice Protection W eb console walkt hrough Mar ch 2009[...]

  • Página 3

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 3 of 53 Contents 1. Web console w alkthrough .................................................................................................................. 4 2. The console in detail ........................................................[...]

  • Página 4

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 4 of 53 1. Web console waltkthrough To start the evaluation of the administration and m onitoring console, let’s first take a look at the conso le itsel f. To do this, follow the st eps below: 1. G o to the console. https://managedprot ectio[...]

  • Página 5

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 5 of 53 3. Centralized security management functions accesible through the Settings s ection, e nabling the installation of the protection , adm inistration of security policies and the application of these policies to groups of work stations,[...]

  • Página 6

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 6 of 53 4. Centralized monitoring of the secur ity status of workstations, laptops or serv ers, and of detections and firewall events. This is accessible throug h the main dashbo ard in the Status section. The dashb oard graphs represent detec[...]

  • Página 7

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 7 of 53 5. In the Reports section y ou can conf igure executi ve reports on the status of y our IT r esources and of detections m ade, with high -level statistics and gra phics as wel l as det ails. These reports can b e exported into differen[...]

  • Página 8

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 8 of 53 2. The console in detail In this secti on we’ll tak e a more detailed look at the m onitoring and m anagement options in the cons ole. So, start by following the steps below: Log in to the console. 2.1. Centralize d security manageme[...]

  • Página 9

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 9 of 53 There are three ways of installing the pro tection, each adapting to different secu r ity managem ent scenarios. 1. The protection can be installed using th e installation pack age, either m anually or through ex ternal distribution s [...]

  • Página 10

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 10 of 53 Once you download and install th e distribution tool, you c an launch the program us ed to d istribute the protection: Select Inst all protection to start installing the prot ection, which can be distri buted e ither b y dom ain by IP[...]

  • Página 11

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 11 of 53 To use the d istribution tool you m ust be either the ad m inistrator of the com puters’ domain or log in to the computers using credentials with adm inistrator privileges .[...]

  • Página 12

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 12 of 53  Administering centr alized security polic ies Through the S ettings section you can determ ine the security policies to appl y to the protected c om puters. These securit y policies are grouped in security profiles which ca n be a[...]

  • Página 13

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 13 of 53 Go to Create n ew profile . W rite the nam e of the new security polic y profile and make any modifications y ou want. First you m ust decide if the c omputers to which the new profile will a pply wil l have the antivirus and/or firew[...]

  • Página 14

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 14 of 53 If you go to the Advanced update sett ings secti on, you can configure the update rules for th e computers . This section is usef ul, for example, when defining server pr ofiles, as you can det ermine at an y time when to apply softwa[...]

  • Página 15

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 15 of 53 In the Scheduled scans section you can schedule Th e on-dem and scans to be run o n computers to which the profile appli es.[...]

  • Página 16

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 16 of 53 The Warnings s ection lets you conf igure the following: 1. If you want the local prot ection to displa y a warning whene ver a detection occurs or if you would rather that the end-us er is not notified. 2. If you want to be inf ormed[...]

  • Página 17

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 17 of 53 For each security prof ile, you can now c onfigure func tions related w ith the antivirus . Select A ntiviru s and establish the protecti on levels for each m alware entr y point: 1. Files 2. Mail and instant m essaging 3. Internet 4.[...]

  • Página 18

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 18 of 53 2 3[...]

  • Página 19

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 19 of 53 4[...]

  • Página 20

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 20 of 53 For each sec urity profi le, you can now configure fu nctions related with the firewall . Selec t Firew all in the menu on the left. Bear in mind that the firewall protect ion will only be installed if in the G eneral settings s ectio[...]

  • Página 21

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 21 of 53 If the firewall is m anaged centrall y by the administrator , you must determ ine whether the p rof ile applies to computers within the cor porate net work or outside of it. In the c ase of the latter, th e firewall rules will be stri[...]

  • Página 22

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 22 of 53 At applicati on level, you c an s ee the ru les th at Panda Securit y applies and m aintains throug h the automatic updates. 1[...]

  • Página 23

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 23 of 53 You can also ad d y o ur o wn app lication rul es b y selecting U ser rules and defining them in the screen that appears after clicking Add . 1[...]

  • Página 24

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 24 of 53 You can see the s ystem- level Panda rules in the System sec tion. 2[...]

  • Página 25

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 25 of 53 To configure a user ru le, select Us er rule in the drop- down menu and c lick Add .[...]

  • Página 26

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 26 of 53 Finally, Panda Securit y also offers, maintains and upd ates intrusion detection rules, which are enabled b y default but c an be d isabled by the a dministrator. It is n ot advisable to disable t hem , especially the detection of net[...]

  • Página 27

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 27 of 53  Creating groups of comp uters and assigning security policies remotely Once you have finished creating securit y policies, the y have to be assigned to the com puters which ar e protected and managed. To do this, create groups of [...]

  • Página 28

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 28 of 53 Once you are in the secti on f or c reating a new group, assign it a name and a se curity po licy prof ile ( you ca n edit this prof ile from the shortcut to the ri ght: Go to pr ofile management ) a nd select t he group of com puters[...]

  • Página 29

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 29 of 53  Local or remote install ation of the protection w ith predefined security po licies If you want to install the protec tion on a new com puter belonging to a newl y cre ated group a nd therefore assign security policies that you ha[...]

  • Página 30

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 30 of 53 2.2. Centralize d security monitoring  Consolidated networ k dashboard Once you have access ed the Panda M anaged Office Protection console, go to th e Status section, where you will see th e mal ware detection h istory at -a-glanc[...]

  • Página 31

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 31 of 53 To see details of licenses , select V iew more . Here y ou c an see the co mput ers affected by m aintenance contrac t expir y. T here is a pr eliminary l ist of computers that will c ease t o have lice nses. The list com prises the f[...]

  • Página 32

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 32 of 53[...]

  • Página 33

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 33 of 53  Monitoring the security status of t he network In the Protection section y ou can check the status of the protec tion, with a straightfor ward view of all t he computers on your network with the protect ion installed. For each com[...]

  • Página 34

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 34 of 53 By selecting one of the protected com puters, y ou will be able to acces s detailed inf ormation about the protection, with inf ormation regarding:  Name and IP of the com puter.  Group to which it be longs and associated secur [...]

  • Página 35

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 35 of 53 There is a filter th at allows you to quickl y search for c omputers with the prot ection disabled, o utdated, pendin g restart, etc.[...]

  • Página 36

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 36 of 53  Exporting the comput ers’ status to file It is possible to export t he list of computers to Excel or CV S .[...]

  • Página 37

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 37 of 53  Centralized monito ring of detections In the Status s ection, cl ick View list of detection s to go to the section f or m onitoring detec tions. In this section you can anal yze in detail an y detections on the net work in which t[...]

  • Página 38

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 38 of 53[...]

  • Página 39

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 39 of 53 If y ou cl ick one of the detections, you will see it even more details: where it was located, which protection module detected the attack or m alware, etc.  Quick search for dete ctions and firewall events W hen y ou have to adm i[...]

  • Página 40

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 40 of 53[...]

  • Página 41

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 41 of 53[...]

  • Página 42

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 42 of 53  Exporting informatio n on detections and fi rewall ev ents to f ile This opti on lets you sav e inf ormation, in Excel or plain text about detections occurred. Y ou can save all of them or f ilter the information.[...]

  • Página 43

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 43 of 53 2.3. Consolidated re ports The reports off er rapid and straightfor ward inform ation about the mos t im portant aspects of the protec tion. These reports can be exported into diff erent form ats, such as CVS, XML, plain text, PDF, HT[...]

  • Página 44

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 44 of 53[...]

  • Página 45

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 45 of 53 3. High-level information about the detec tions in the selected period 4. Top 10 detections and T op 10 compute rs infected In the Executive r eports you can choose to see infor mation about detect ions in:  Last 24 hours. Grap h a[...]

  • Página 46

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 46 of 53 You can choose to om it inform ation about the licenses. T his option is useful for re sellers using the c lient consults manage c lients b y groups of computers . You can also choose to get inform ation about one group or several gro[...]

  • Página 47

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 47 of 53  High- level consolidat ed and detailed r eport of client s’ network security statu s This report contains: 1. High-level report ab out the number of com puters protected and th e num ber of computers without connection in the se[...]

  • Página 48

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 48 of 53 3. Details of each com puter’s protection stat us and ‘health’: if there is an error or if th ey require intervention. You can choose to om it high-leve l information, graphic s or certain detai ls according to your needs. You c[...]

  • Página 49

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 49 of 53  High-level consolidat ed and detailed r eport of firewal l detections and e vents This report contains: 1. High-level inform ation about f irewall detections and events. 2. Graph of detections in the selected period. 3. Details of[...]

  • Página 50

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 50 of 53 You can choose to omit high-leve l information, graphic s or certain detai ls according to your needs. You can also choose to get inform ation about one group or several groups in the status rep ort.[...]

  • Página 51

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 51 of 53 2.4. Users and centralized administration profiles This option allo ws security m anagement to be delegat ed among adm inistrators with dif ferent roles. In the Users section you can c reate or edit users with access to the adm inistr[...]

  • Página 52

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 52 of 53 To create a new user, s elect Create new user . I n this section you m ust specif y : 1. The user nam e and password 2. The managem ent and/or monitoring perm issions 3. The group of com puters the user has perm issions over If you cr[...]

  • Página 53

    Panda Managed Office Protection . W eb console walkthrough Revisión 0.2 2009 © Panda Security 2009 P age 53 of 53 2.5. In -depth malware audits. Panda Malware Radar Panda Malware Radar detects malware and other security p roblems in your netw ork , which have s lipped past the protection ins talled in your company. W hen the scan is c omplete, Ma[...]