User guide
Endpoint Security Module Requirements
3
Functions
Description
Dashboard (page 4)
Provides a dashboard view of the status of machines
installed with Endpoint Security.
Security Status (page
10)
Displays the current security status of machine IDs.
Manual Update (page 8)
Schedules updates of the latest version of security
protection definition files.
Schedule Scan (page
10)
Schedules security protection scans of machine IDs.
View Threats (page 11)
Lists files that have been placed in quarantine due to a
suspicious or confirmed threat.
View Logs (page 12)
Displays the security protection event log of machine IDs.
Extend/Return (page
13)
Extends the annual license count for selected machines IDs
or returns annual licenses from selected machine IDs.
Notify (page 14)
Provides automatic notification of the expiration of Endpoint
Security licenses.
Installations (page 15)
Installs or removes security protection for machine IDs.
Define Profile (page 20)
Manages security profiles. Each security profile represents
a different set of of enabled or disabled security options.
Assign Profile (page 26)
Assigns security profiles to machine IDs.
Log Settings (page 27)
Specifies the number of days to keep security protection log
data.
Exchange Status (page
28)
Displays the status of email protection on MS Exchange
servers that have Endpoint Security installed on them.
Define Alarm Sets
(page 29)
Defines sets of alert conditions used to trigger alerts using
the Apply Alarm Sets page.
Apply Alarm Sets (page
30)
Creates alarms in response to security protections events.
Endpoint Security Module Requirements
Kaseya Server
The Endpoint Security R8 module requires VSA R8.
Access to http://download.avg.com
Requirements for Each Managed Machine
256 MB of RAM
60 MB of free disk space
Microsoft Windows Server 2003, 2003 R2, 2008, 2008 R2, 2012, 2012 R2
Microsoft Windows XP, Vista, 7, 8, 8.1
Note: See general System Requirements (http://help.kaseya.com/WebHelp/EN/VSA/R8/reqs/index.asp#home.htm).