User guide
U S E R G U I D E
6
Firewall............................................................................................................................................................ 127
Network Attack Blocker ................................................................................................................................... 130
Encrypted connections scan ........................................................................................................................... 133
Network Monitor .............................................................................................................................................. 135
Configuring the proxy server ........................................................................................................................... 135
Creating a list of monitored ports .................................................................................................................... 135
Trusted zone ......................................................................................................................................................... 137
Creating a list of trusted applications .............................................................................................................. 137
Creating the exclusion rules ............................................................................................................................ 138
Safe mode of applications execution .................................................................................................................... 138
Running an application in safe mode .............................................................................................................. 139
Creating the list of applications to run in safe mode ........................................................................................ 140
Creating a shortcut for program execution ...................................................................................................... 141
Clearing Safe Run data ................................................................................................................................... 141
Using a shared folder ...................................................................................................................................... 142
Quarantine and Backup ........................................................................................................................................ 142
Storing quarantine and backup objects ........................................................................................................... 143
Working with quarantined objects ................................................................................................................... 143
Backup.................................................................................................................................................................. 145
Creating a backup storage area ...................................................................................................................... 146
Connecting an existing storage ....................................................................................................................... 146
Clearing a storage ........................................................................................................................................... 147
Removing a storage ........................................................................................................................................ 147
Creating a backup task ................................................................................................................................... 148
Running a backup task ................................................................................................................................... 148
Restoring data ................................................................................................................................................. 149
Searching for backup copies ........................................................................................................................... 150
Viewing backup copy data .............................................................................................................................. 151
Viewing event report ....................................................................................................................................... 151
Web Policy Management ...................................................................................................................................... 152
Configure Web Policy Management for the user ............................................................................................. 153
Viewing reports of user's activity ..................................................................................................................... 161
Data Encryption .................................................................................................................................................... 161
Creating and connecting an existing container ............................................................................................... 161
Locking and unlocking access to the data in the container ............................................................................. 162
Adding files into container ............................................................................................................................... 163
Configuring container ...................................................................................................................................... 164
Creating shortcut for quick access to the container ........................................................................................ 165
Management Console .......................................................................................................................................... 165
Configuring remote management .................................................................................................................... 166
Scanning the office network for viruses and vulnerabilities ............................................................................. 167
Updating databases on networked computers remotely ................................................................................. 167
Enabling / disabling protection components on networked computers ............................................................ 168
Remote Web Policy Management ................................................................................................................... 169
Running backup tasks on networked computers............................................................................................. 169
Managing licenses on networked computers remotely ................................................................................... 170
Password Manager ............................................................................................................................................... 170
Password Manager interface .......................................................................................................................... 172
Password Database management .................................................................................................................. 176