ACRONIS PRIVACY EXPERT CORPORATE User Manual

Hide thumbs Also See for PRIVACY EXPERT CORPORATE:
Table of Contents

Advertisement

Acronis Privacy Expert
Corporate
User's Guide
www.acronis.com

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS PRIVACY EXPERT CORPORATE

  • Page 1 Acronis Privacy Expert Corporate User’s Guide www.acronis.com...
  • Page 2 Copyright © Acronis, Inc., 2000-2005. All rights reserved. Windows is registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder.
  • Page 3: End-User License Agreement

    G. Making telecommunication data transmission of the software. Acronis has the right to terminate this license if there is a violation of its terms or default by the original purchaser. Upon termination for any reason, all copies of the software must be immediately returned to Acronis, and the original purchaser shall be liable to Acronis for any and all damages suffered as a result of the violation or default.
  • Page 4: Table Of Contents

    1.3.2 Firewall setup ........................10 License policy ......................10 Installing Acronis Privacy Expert Corporate components onto a current computer 10 Extracting Acronis Privacy Expert Corporate components ........11 Using License Server Management Tool ..............11 Installing Acronis components onto remote machines..........12 Recovering Acronis Privacy Expert Corporate............
  • Page 5 White URLs ........................34 6.3.5 Black URLs ........................35 CHAPTER 7. OTHER OPERATIONS..................36 Creating a bootable diskette or CD with Acronis Drive Cleanser ......36 Data destruction with Acronis Drive Cleanser............36 APPENDIX A. SPYWARE THREATS GLOSSARY..............38 Adware .............................. 38 Browser Helper Objects........................
  • Page 6: Introduction

    IT managers think that spyware is the number one security threat to their networks. Acronis has a solution to ensure that spyware will not be a threat to your organization or corporate network. The Acronis Privacy Expert Corporate is...
  • Page 7: Acronis Privacy Expert Corporate Architecture

    2. Acronis Privacy Expert Corporate Agent — installs on a remote system to enable access from the Acronis Privacy Expert Corporate Management Console 3. Acronis Spyware Shield — installs on a remote computers and monitors it for suspicious applications and components 4.
  • Page 8: Technical Support

    Technical support Users of legally purchased and registered copies of Acronis Privacy Expert Corporate are entitled to free e-mail and fax technical support from Acronis. If you have installation or working problems that you cannot solve by yourself using this manual, please contact the technical support team.
  • Page 9: Chapter 1. Installing Acronis Privacy Expert Corporate Components

    1. If a remote PC has Windows NT/2000/XP OS installed, the Acronis Privacy Expert Corporate Agent can be accessed according to the security policy set up in the local network. To have remote access to Acronis Privacy Expert Corporate Agent, the user must be a member of the Administrators group on this computer.
  • Page 10: Firewall Setup

    1.5 Installing Acronis Privacy Expert Corporate components onto a current computer Run Acronis Privacy Expert Corporate setup file. In the Install Menu, select the component that you are going to install on a current PC: Acronis Privacy Expert Corporate Management Console, Acronis Privacy Expert Corporate Agent or Acronis License Server.
  • Page 11: Extracting Acronis Privacy Expert Corporate Components

    Installing Acronis Privacy Expert Corporate components It is recommended that you install Acronis License Server first. You will not be able to install Acronis Privacy Expert Corporate Agent onto the current or remote computer until you import the serial key into Acronis License Server.
  • Page 12: Installing Acronis Components Onto Remote Machines

    Acronis Privacy Expert Corporate Management Console allows you to install Acronis components onto remote computers, connected to the corporate network. Using the Acronis Privacy Expert Corporate Management Console, you can install remotely: Acronis Privacy Expert Corporate Agent Acronis Spyware Shield...
  • Page 13: Recovering Acronis Privacy Expert Corporate

    The installer will determine that the component has already been installed to your PC and ask if you want to Modify, Repair or Remove it from the disk. Select Repair Acronis Privacy Expert Corporate and click Next. All files will be copied to your hard disk again to restore the program.
  • Page 14: Chapter 2. Using Acronis Privacy Expert Corporate Management Console

    Chapter 2. Using Acronis Privacy Expert Corporate Management Console 2.1 Getting started Acronis Privacy Expert Corporate Management Console is the primary tool for managing Acronis components on remote computers with the Acronis Privacy Expert Corporate Agent installed. Acronis Privacy Expert Corporate Management Console is launched by selecting...
  • Page 15: Connecting To Remote Computer

    Otherwise, you will have to connect to every computer individually. It is highly recommended that you create an administrator’s account with the same username and password on all networked computers for remote access to the Acronis Privacy Expert Corporate Agent. Copyright © Acronis, Inc., 2000-2005...
  • Page 16: Chapter 3. Spyware Removal From Network Computers

    The user sees ads or pop-ups while running programs or visiting Web sites If you notice any or all of these activities on your users’ computers, you need to run Acronis Privacy Expert Corporate to find and eliminate spyware performing unauthorized operations on the workstations.
  • Page 17: Spyware Removal

    Shield (see section 4.2 «Spyware Shield local») 3.3 Spyware removal Using Acronis Privacy Expert Corporate, you can find and remove spyware from remote computers in your local network. To do this, select and click Spyware removal in the main program window.
  • Page 18: Selecting Scanning Mode

    Deep Scanning Mode – an extended algorithm for spyware scanning. In this mode, all folders on all PC hard drives are searched for spyware. This variant could take much more time depending on the capacity of your hard disks. Spyware scanning modes Copyright © Acronis, Inc., 2000-2005...
  • Page 19: Spyware Removal Script

    3.4 Scheduling spyware removal group tasks To set up the removal schedule for remote computers, click the Schedule task button on the toolbar of the Acronis Privacy Expert Corporate Management Console main window or select Tools → Schedule task section in the main menu.
  • Page 20: Selecting Task And Spyware Scan Mode

    One time only, at a specific time (hours:minutes) on a particular day (month/day/year) When my computer starts (you may specify launching the task once a day only) When I log on (you may specify launching the task once a day only) Copyright © Acronis, Inc., 2000-2005...
  • Page 21: Entering User Name And Password

    Entering user name and password For the remote computers, running Windows NT, 2000, XP or Server 2003, you will have to specify the name of the user that owns the executed task; otherwise, no scheduled execution would be available. Copyright © Acronis, Inc., 2000-2005...
  • Page 22: Quarantine

    After the task is distributed to selected computers, you can see it in the Task panel of the Acronis Privacy Expert Corporate Management Console. 3.5 Quarantine Though the case is unlikely, you may want to restore some of the items (files, registry keys etc.), deleted by spyware removal operations.
  • Page 23: Using The Log

    Hidden Files and Folders in Folder Options must be enabled. 3.6 Using the Log The Log keeps track of all actions performed by Acronis Privacy Expert Corporate on remote computers. It provides a complete history of activities and reasons for any problems that have occurred.
  • Page 24 Spyware removal from network computers Log settings enable you to keep track with different degrees of detail. You can select one of the following variants: Everything Important information – error and spyware messages Nothing Log settings Copyright © Acronis, Inc., 2000-2005...
  • Page 25: Chapter 4. Using Acronis Spyware Shield

    Acronis Privacy Expert Corporate not only enables you to remove spyware from network computers, but it also prevents spyware from accessing the user’s PC. This function is provided by the Acronis Spyware Shield — a special tool that monitors computer systems for suspicious applications and components.
  • Page 26: Spyware Shield Local Settings

    Programs → Acronis → Privacy Expert → Acronis Spyware Shield. 4.2 Spyware Shield local settings A local computer user can invoke the Acronis Spyware Shield Wizard by left- clicking the icon in the system tray. Having enabled Spyware Shield, the user can change its settings.
  • Page 27: Advanced Options

    Using Acronis Spyware Shield 4.2.2 Advanced options The Advanced options section enables more detailed setup of Acronis Spyware Shield and offers the following settings: Prevent browser hijacking – Acronis Spyware Shield will prevent applications from making changes to your Web browser settings, including home page, search page, and more Guard against start-up changes –...
  • Page 28: Saving Spyware Shield Settings

    Saving Spyware Shield settings Having set up Spyware Shield, you can browse the resulting settings in the final script and click Apply if everything is correct. All Spyware Shield settings will be active until you change them again. Copyright © Acronis, Inc., 2000-2005...
  • Page 29: Chapter 5. Spyware Definitions Updates

    Offering you timely and reliable protection from new spyware released as often as every day, Acronis Privacy Expert Corporate launches the special Spyware definitions updates service. It enables users to obtain the most up-to-date information and spyware protection from Acronis website.
  • Page 30: Selecting Remote Computers To Update Spyware Definitions

    Having run the Spyware Definitions Updates Wizard, you can select the update mode: either manual or scheduled automatic: To update spyware definitions right now, select Update spyware definitions now To automatically update spyware definitions on a schedule, select Update automatically. Copyright © Acronis, Inc., 2000-2005...
  • Page 31: Setting The Schedule

    One time only, at a specific time (hours:minutes) on a particular day (month/day/year) When my computer starts (you may specify launching the task once a day only) When I log on (you may specify launching the task once a day only) Copyright © Acronis, Inc., 2000-2005...
  • Page 32: Entering User Name And Password

    Having made a selection, click Next to set additional parameters on the next wizard page. 5.2.5 Entering user name and password To finish scheduling automatic updates, enter the user name and password for access remote computers. details 3.4.4. Copyright © Acronis, Inc., 2000-2005...
  • Page 33: Chapter 6. Acronis Pop-Up Blocker

    Pop-up Blocker. 6.3 Acronis Pop-up Blocker local options A local user can invoke the Acronis Pop-up Blocker options window by double- clicking the Pop-up Blocker icon in the system tray with the left mouse button. Copyright © Acronis, Inc., 2000-2005...
  • Page 34: Acronis Pop-Up Blocker General Settings

    You can add any of these to either the White or the Black list. 6.3.4 White URLs If you want to cancel the Acronis Pop-up Blocker for a particular Web site, you can move it to the White (approved) list: By clicking "New" and entering it manually By selecting the address and clicking To White in the Last visited pages, Blocked URLs, or Black list windows.
  • Page 35: Black Urls

    6.3.5 Black URLs Adding the site to the Black (rejected) list means that Acronis Pop-up Blocker will prevent you from following any link, available on this site, and show a report in IE bar (if enabled): "Acronis Pop-up Blocker: Black URL link – navigation stopped".
  • Page 36: Chapter 7. Other Operations

    Selecting media 7.2 Data destruction with Acronis Drive Cleanser Acronis Drive Cleanser is based on a wizard that scripts all hard disk operations, so no data destruction is performed until you execute the complete script. At any Copyright © Acronis, Inc., 2000-2005...
  • Page 37 The list of PC hard disks with partitions Next, select a data destruction method. Acronis Drive Cleanser utilizes a number of the most popular data destruction methods, complying with national standards including U.S. Standard DoD 5220.22-M. You may create your own method in further wizard windows as well, or load a method from an *.alg file.
  • Page 38: Appendix A. Spyware Threats Glossary

    Appendix A. Spyware threats glossary This glossary contains supplemental information on the most popular spyware from which Acronis Privacy Expert Corporate protects your organization computers. Adware This is a kind of Web marketing where banners are integrated into freeware and shareware programs.
  • Page 39: Exploit/Security Holes

    Trojans are specially created programs that are deployed to PCs imitating useful applications and utilities. They can result in failures, lock-ups or even complete data destruction. Trojans are spread via mailing lists, Web forums, etc. Copyright © Acronis, Inc., 2000-2005...

Table of Contents