AVIRA SERVER SECURITY 2012 User Manual

Hide thumbs Also See for SERVER SECURITY 2012:

Advertisement

Quick Links

Avira Server Security
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SERVER SECURITY 2012 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for AVIRA SERVER SECURITY 2012

  • Page 1 Avira Server Security User Manual...
  • Page 2 Protected trademarks are not marked as such in this manual. This does not mean, however, that they may be used freely. Copyright information Code provided by third party providers was used for Avira Server Security. We thank the copyright owners for making the code available to us.
  • Page 3: Table Of Contents

    Installation on the network ........................17 3.3.1 Uninstallation on the network ......................... 18 3.3.2 Command line parameters for the setup program ................18 3.3.3 Parameters of the file setup.inf ......................18 3.3.4 Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 4 9.2 Realtime Protection ....................... 47 Action on detection ............................ 50 9.2.1 Further actions ............................53 9.2.2 Exceptions ..............................54 9.2.3 Products ................................ 57 9.2.4 Heuristic ................................ 58 9.2.5 Report ................................58 9.2.6 Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 5 Installation types ............................14 3.1.1 3.2 Uninstallation .......................... 16 3.3 Installation and uninstallation on the network ..............16 Installation on the network ........................17 3.3.1 Uninstallation on the network ......................... 18 3.3.2 Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 6 Report ................................46 9.1.6 9.2 Realtime Protection ....................... 47 Action on detection ............................ 50 9.2.1 Further actions ............................53 9.2.2 Exceptions ..............................54 9.2.3 Products ................................ 57 9.2.4 Heuristic ................................ 58 9.2.5 Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 7 Acoustic alerts ............................. 70 9.6.3 9.7 Email ............................71 Realtime Protection email alerts......................71 9.7.1 System Scanner email alerts ........................72 9.7.2 Updater email alerts ..........................73 9.7.3 Email template ............................75 9.7.4 Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 8: Introduction

    Introduction 1. Introduction Your Avira product protects your computer against viruses, worms, Trojans, adware and spyware and other risks. In this manual these are referred to as viruses or malware (harmful software) and unwanted programs. The manual describes the program installation and operation.
  • Page 9 Italics File name or path data. Displayed software interface elements (e.g. window section or error message). Bold Clickable software interface elements (e.g. menu item, navigation area, option box or button). Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 10: Product Information

    Windows Server from viruses and malware. The Avira Server Security Console is used for management, control and monitoring of the servers to be protected or of the Avira Server Security services on the servers to be protected. You can access any number of servers via the Avira Server Security Console.
  • Page 11: Delivery Scope

    Avira Server Security Console can also be installed on the servers to be protected. The Avira Server Security Console can be connected to any number of servers to be protected and provides access to components, reports, events and to the Configuration of the connected Avira Server Security service.
  • Page 12: System Requirements

     Support for Windows Management Instrumentation System requirements The Avira Server Security has the following requirements for successful use of the Avira Server Security service and the Avira Server Security Console:  Computer Pentium or later, at least 1 GHz ...
  • Page 13: Licensing

    You require a license to use Avira Server Security. Activate your license for Avira Server Security with the license file hbedv.key. You can obtain the license file by email from Avira. The license file contains the license for all products that you have ordered in one order process.
  • Page 14: Installation And Uninstallation

    Ensure that an Internet connection or network connection to a download server exists for updating the Avira Server Security. If you use a fileserver, you may require a user name and a password for server login. When installing the full version: ensure that a valid license file hbedv.key exists and is stored in a local directory on the server.
  • Page 15  Selection of the type of setup (express installation or user-defined installation)  Licensing of the Avira Server Security: Load the license file or select a 30-day test license  Installation of Avira Server Security service and/or Avira Server Security Console If you have installed the Avira Server Security service, a configuration wizard opens after the installation has been completed.
  • Page 16: Uninstallation

    Your Avira product is uninstalled now. 3.3 Installation and uninstallation on the network To simplify installation of Avira products on a network of multiple client computers for the system administrator, your Avira product has a special procedure for the initial installation and the change installation.
  • Page 17: Installation On The Network

    An installation file for Internet-based installation cannot be used. Avira products can be easily shared on the network with a server login script or via SMS. For information on installation and uninstallation on the network: ...
  • Page 18: Uninstallation On The Network

     LicenseFile=<Path and file name of the license file> Avira Server Security is installed with the license. If you enter the file name only, the license file will be searched in the source folder of the setup only. Example: LicenseFile="A:\hbedv.key"...
  • Page 19 Installs the Systray tool. An Avira Server Security tray icon is visible in the notification area of the protected server. The Tray Icon lets you monitor the status of the Avira Server Security and gives you access to other Avira Server Security functions.
  • Page 20: User Interface And Operation

    Start the Avira Server Security Console via the Avira Server Security user interface link in the Windows Start menu or under All programs. You can also load the Avira Server Security Console directly in the MMC. You will find the preconfigured Avira Server Security Console in the installation directory of the Avira Server Security Console.
  • Page 21 Display of the created servers with connection status  Actions: Add server Note The local Avira server and all Avira severs added by the registered user are displayed on the Avira Server Security Console. Server  Display of server status ...
  • Page 22  delete job Reports  Display reports of scans of on-demand scan and updates  Actions:  display report  display report file  print report  delete report Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 23: User Interface: Tray Icon

    User interface and operation Events  Display all events of the Avira Server Security service on the server to be protected  Actions:  display events  export events  delete events Settings  Configuration of the Avira Server Security service on the server to be protected ...
  • Page 24: Quickstart

    The Avira Server Security Console can also be opened by double-clicking the tray icon. 4.3 Quickstart Carry out these steps if you are using the Avira Server Security for the first time: 1. Installation Install the Avira Server Security service on the servers that you want to protect against viruses and unwanted programs.
  • Page 25 Define scans and update jobs. To configure Scanner scans, first create, where appropriate, user-defined profiles under Scheduler In the next step you can create the scans and update jobs under Scheduler. See Chapters Scan and Scheduler. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 26: System Scanner

    Shell Extension: Scan from the context menu in Windows Explorer (local only) You have the option to use the Scan selected files with Avira entry in the context menu of a directory to scan that directory for viruses and unwanted programs. The Shell Extension function is an additional component that is only available if it was selected during the user-defined installation.
  • Page 27: Updates

     Program files (product update) The Scheduler facility on the Avira server console allows you to create update jobs that will be executed by Avira Updater at the specified intervals. Following the installation of Avira server, an update job is created that will be executed by default at the following interval: 60 minutes.
  • Page 28: Viruses And More

    One form of exploitation for example is an attack from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 29 Trojan or virus. The result is that the system can now only access fake websites, even if the correct web address is entered. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 30 A worm is a program that multiplies itself but that does not infect the host. Worms cannot consequently form part of other program sequences. Worms are often the only possibility to infiltrate any kind of damaging programs on systems with restrictive security measures. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 31: Threat Categories

    The connection data allow many conclusions on the usage behavior and are problematic in terms of data security. Your Avira product detects Adware. If the Adware option is enabled with a check mark in the configuration under...
  • Page 32 The term APPL, respectively application, refers to an application which may involve a risk when used or is of dubious origin. Your Avira product recognizes "Application (APPL)". If the option Application is enabled with a check mark in the configuration under...
  • Page 33 Threat categories, you receive a corresponding alert if your Avira product detects a game. The game is now over in the truest sense of the word, because you can simply delete it. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 34 Thanks to the extension of its scanning and identification routines, your Avira product is able to detect joke programs and eliminate them as unwanted programs if required. If the...
  • Page 35: Info And Service

    Your feedback for more security 8.1 Contact address If you have any questions or requests concerning the Avira product range, we will be pleased to help you. For our contact addresses, please refer to the Control Center under Help > About Avira Server Security.
  • Page 36: Suspicious File

    8.4 Reporting false positives If you believe that your Avira product is reporting a detection in a file that is most likely "clean", send the relevant file packed (WinZIP, PKZip, Arj etc.) as an email attachment to the following address: virus@avira.com...
  • Page 37: Reference: Configuration Options

    If this option is enabled, the selection of the files scanned for viruses or unwanted programs is automatically chosen by the program. This means that your Avira program decides whether the files are scanned or not based on their content. This procedure is...
  • Page 38 This option is only available on multi-processor systems, but is always displayed in the configuration and can be enabled: If the managed server does not have more than one processor, the System Scanner option is not used. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 39 All in all, work with other programs is optimal: The computer responds more quickly if other programs require computation time while the System Scanner continues running in the background. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 40: Action On Detection

    The back-up copy is saved in Quarantine, where the file can be restored if it is of informative value. You can also send the backup copy to the Avira Malware Research Center for further investigation. Primary action Primary action is the action performed when the System Scanner finds a virus or an unwanted program.
  • Page 41 Reference: Configuration options Quarantine If this option is enabled, the System Scanner moves the file to the quarantine. These files can later be repaired or - if necessary - sent to the Avira Malware Research Center. Delete If this option is enabled, the file is deleted. This process is much faster than "overwrite and delete".
  • Page 42: Further Actions

    Windows Event Log after a System Scanner scan has been completed. The events can be called up in the Windows Event Viewer. The option is disabled as the default setting. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 43: Archives

    The permitted values are 1 to 99. The standard value is 20 which is recommended. Default values The button restores the pre-defined values for scanning archives. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 44: Exceptions

    If you have entered a file name without a path, all files with this name (irrespective of the path or drive) are not scanned. With this button, you can add the file object entered in the input box to the display window. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 45: Heuristic

    System Scanner, D:\folder\file.txt will not be excluded from the scan. Note If you are managing the Avira program in AMC, you can use variables in the path details for file exceptions. You can find a list of variables you can use under Variables: Realtime Protection und System Scanner Exceptions.
  • Page 46: Report

    Reference: Configuration options enable AHeAD Your Avira program contains a very powerful heuristic in the form of Avira AHeAD technology, which can also detect unknown (new) malware. If this option is enabled, you can define how "aggressive" this heuristic should be. This option is enabled as the default setting.
  • Page 47: Realtime Protection

    The list can be edited manually via the "File extensions" button. This option is enabled as the default setting and is recommended. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 48 MO and ZIP drives, etc. only are monitored. This option is enabled as the default setting and is recommended. Monitor network drives If this option is enabled, files on network drives (mapped drives) such as server volumes, peer drives etc., are scanned. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 49 Max. recursion depth When scanning archives, the Realtime Protection uses a recursive scan: Archives in archives are also unpacked and scanned for viruses and unwanted programs. You can Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 50: Action On Detection

    Realtime Protection moves the file to Quarantine. The file can be recovered from Quarantine manager if it has an informative value or - if necessary - sent to the Avira Malware Research Center. Depending on the file, further options are available in the Quarantine manager.
  • Page 51 It can be restored via the Quarantine manager if it is of informative value. You can also send the backup copy to the Avira Malware Research Center. Depending on the object, more selection options are available in the Quarantine manager.
  • Page 52 Quarantine If this option is enabled, the Realtime Protection moves the file to Quarantine. The files in this directory can later be repaired or - if necessary - sent to the Avira Malware Research Center. Delete If this option is enabled, the file is deleted.
  • Page 53: Further Actions

    Quarantine If this option is enabled, the Realtime Protection moves the file to Quarantine. The files can later be repaired or - if necessary - sent to the Avira Malware Research Center. Delete If this option is enabled, the file is deleted. This process is much faster than Overwrite and delete.
  • Page 54: Exceptions

    Full path details are required for processes where the executable files are located on connected drives, e.g. network drives. Please note the general information on the notation of Exceptions on connected network drives. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 55 If a directory is excluded, all its sub-directories are automatically also excluded. For each drive you can specify a maximum of 20 exceptions by entering the complete path (starting with the drive letter). For example: C:\Program Files\Application\Name.log Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 56 Report. Now access the files, folders, mounted drives or connected network drives with the activated Realtime Protection. You can now read the path to be used from the Realtime Protection report file. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 57: Products

    Reference: Configuration options If you are managing the Avira product in AMC, you can use variables in the path details for process and file exceptions. You can find a list of variables you can use under Variables: Realtime Protection and Scanner Exceptions.
  • Page 58: Heuristic

    Advanced Heuristic Analysis and Detection (AHeAD) enable AHeAD Your Avira program contains a very powerful heuristic in the form of Avira AHeAD technology, which can also detect unknown (new) malware. If this option is enabled, you can define how "aggressive" this heuristic should be. This option is enabled as the default setting.
  • Page 59 100MB. A backup of the old report file is created. Up to three backups of old report files are saved. The oldest backups are deleted first. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 60: Variables: Realtime Protection And System Scanner Exceptions

    Reference: Configuration options 9.3 Variables: Realtime Protection and System Scanner exceptions If your Avira product is managed with AMC, you may use variables to configure exceptions for the Realtime Protection and the System Scanner. When saving the configuration on the managed system, the variables are automatically replaced by true values corresponding to the operating system and its language.
  • Page 61: Update

    The conditions for this option are: complete configuration of the update and an open connection to a download server. Before a product update is performed, you will receive an alert on the Avira Server Security Console used to manage the server to be protected.
  • Page 62 The conditions for this option are: complete configuration of the update and an open connection to a download server. You will be notified in the Avira Server Security Console and by email, if email notification has been configured. Notify once again after n day(s)
  • Page 63: Proxy Settings

    If you do not specify a port, port 80 will be used. By default, the accessible Avira web servers are specified for updating. You can, however, use your own web servers on the company intranet. If a number of web servers are specified, separate each one by a comma.
  • Page 64: General

    Address: proxy.domain.com Port: 8080 Address: 192.168.1.100 Port: 3128 9.5 General 9.5.1 Threat categories Selection of extended threat categories Your Avira product protects you against computer viruses. In addition, you can scan according to the following extended threat categories.  Adware ...
  • Page 65: Password

    Reference: Configuration options 9.5.2 Password You can restrict the access to servers you wish to protect in the Avira Server Security Console with a password. The password of the server must always be entered when a connection is made to the server. Connection to servers protected by a password is ended as soon as you close the Avira Server Security Console.
  • Page 66: Reports

    If this option is enabled, the settings of the system are used for handling temporary files. Use following directory If this option is enabled, the path displayed in the input box is used. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 67: Alerts

    An alert is always sent to computers, not to a certain user. Warning This functionality is no longer supported by the following operating systems: Windows Server 2008 and higher Windows Vista and higher Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 68: Realtime Protection Network Alerts

    The window shows the message sent to the selected workstation when a virus or unwanted program is detected. You can edit this message. A text may contain a maximum of 500 characters. You can use the following key combinations for formatting the message: Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 69: System Scanner Network Alerts

    If this option is enabled, network alerts are sent. This option is disabled as the default setting. Note To be able to activate this option, at least one recipient must be entered under Settings > Alerts > Network. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 70: Acoustic Alerts

    Realtime Protection. The acoustic alert is only emitted in "Extended terminal server support" action mode. An alternative WAVE file can be selected as an acoustic alert. Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 71: Email

    This button is used to test the selected WAVE file. 9.7 Email 9.7.1 Realtime Protection email alerts Avira Realtime Protection can send alerts by email to one or more recipients for certain events. Email alerts If this option is enabled, Avira Realtime Protection sends email messages with the most important information when a certain event occurs.
  • Page 72: System Scanner Email Alerts

    If this option is enabled, the program sends email messages with the most important information when a certain event occurs. This option is disabled as the default setting. Email messages for the following events Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 73: Updater Email Alerts

    If this option is enabled, the Update component sends email messages with the most important data when a specific event occurs. This option is disabled as the default setting. Email messages for the following events Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 74 If this option is enabled, an email is sent if the Updater has successfully made a connection to the download server but there are no new files available on the server. This means that your Avira product is up to date. Edit The "Edit"...
  • Page 75: Email Template

    Fully qualified domain name %TIMESTAMP% Event time stamp: Time and date format as per the language settings of the operating system %COMPUTERNAME% NetBIOS computer name %USERNAME% Name of user accessing the component Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 76 Protection %VIRUSNAME% Name of the virus or unwanted Realtime program Protection %ACTION% Action performed after the Realtime detection Protection %MACADDR% MAC address of the first Realtime registered network card Protection Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 77 Number of infected files renamed System Scanner %DELETEDCOUNT% Number of infected files deleted System Scanner %WIPECOUNT% Number of infected files System overwritten and deleted Scanner %MOVEDCOUNT% Number of infected files moved System to quarantine Scanner Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 78 End of the update Scanner, Updater %TIME_TAKEN% Duration of scan in minutes System Duration of the update in minutes Scanner, Updater %LOGFILEPATH% Path and file name of the report System file Scanner, Updater Avira Server Security - User Manual (Status: 23 Sep. 2011)
  • Page 79 This manual was created with great care. However, errors in design and contents cannot be excluded. The reproduction of this publication or parts thereof in any form is prohibited without previous written consent from Avira Operations GmbH & Co. KG. Issued Q4-2011 Brand and product names are trademarks or registered trademarks of their respective owners.

This manual is also suitable for:

Internet update manager

Table of Contents