Home

Overview of eScan`s Features

image

Contents

1. Enable Sender Policy Framework SPF check Enable Spam URI Real time Blacklist SURBL check Enable Real time Blackhole List RBL check RBL Servers Auto Spam Whitelist zen spamhaus org ee msoe microsoft com bl spamcop net analytics bounces googk list dsbl org wy irctc co in vm vonage com Retna Ae Remove All Exit The Advanced Spam Filtering Options Enable Non Intrusive Learning Pattern NILP check Default NILP is MicroWorld s revolutionary technology that uses Bayesian Filtering and works on the principles of Artificial Intelligence AI to analyze each e mail and prevents spam and phishing e mails from reaching your inbox It has self learning capabilities and it updates itself by using regular research feeds from MicroWorld servers It uses an adaptive mechanism to analyze each e mail and categorize it as spam or ham based on the behavioral pattern of the user You should select this check box if you need to enable NILP check Enable eMail Header check Default You should select this check box if you need to check the validity of certain generic fields like From To and CC in an e mail and marks it as spam if any of the headers are invalid Enable X Spam Rules check Default X Spam Rules are rules that describe certain characteristics of an e mail It checks whether the words in the content of e mails are present in cro WoRLD 9 eScan s database This database contains a list of w
2. Add Host Name You can click this button to add a zone rule for a given host To add the zone rule you must provide the name of the host for which you M A Page 72 of 100 M7 Icro WorLD are adding the zone rule the type of zone whether it is Trusted or Blocked and specify a name for the zone rule Add IP You can click this button to add a zone rule for a given IP address To add the zone rule you must provide the IP address for which you are adding the zone rule the type of zone whether it is Trusted or Blocked and specify a name for the zone rule Add IP Range New Zone You can click this button to add a zone rule for a range of IP addresses To add the zone rule you must provide the range of IP address for which you are adding the zone rule start IP address in the range end IP address in the range the type of zone whether it is Trusted or Blocked and specify a name for the zone rule Modify You can click this button to modify the zone rules related to the host name IP address or range of IP addresses You can also perform these tasks by right clicking the table or row within the table and then choosing the appropriate option from the context menu 2 Expert Rule This tab allows you to specify advanced rules and settings for the eScan firewall You can configure expert rules on the basis of the source IP address or host name source port number destination IP address or host name and destination port number
3. Internet Security Suite Anti Virus amp Content Security E DicroWorrn User s Guide The software described in this guide is furnished under a license agreement and may be used only in accordance with the terms of the agreement Document Number 5BDRG 10 18 2010 11 x Current Software Version 11 x x Copyright Notice Copyright 2010 All rights reserved Any technical documentation that is made available by MicroWorld is the copyrighted work of MicroWorld and is owned by MicroWorld NO WARRANTY The technical documentation is being delivered to you AS IS and MicroWorld makes no warranty as to its accuracy or use Any use of the technical documentation or the information contained therein is at the risk of the user Documentation may include technical or other inaccuracies or typographical errors MicroWorld reserves the right to make changes without prior notice No part of this publication may be copied without the express written permission of MicroWorld Trademarks The terms MicroWorld MicroWorld Logo eScan eScan Logo MWL MailScan are trademarks of MicroWorld To view the eScan Brand Manual visit the following link http download1 mwti net download New_Artworks eScan11 BoxShots brand_manual eScan_300810 zip To view the high resolution box shots for eScan products visit the following link http download1 mwti net download New_Artworks eScan11 BoxShots AV_BOX_JPG zip Microsoft MSN Windows and Win
4. Scheduler Logs Scan When you click the Scan button on the eScan Protection Center the Scan tabbed page is displayed This page provides you with options for scanning the computer and peripheral storage devices configuring the Scan module and scheduling scans The Virus scan dialog box contains options for scanning the memory drives peripheral storage devices registry and services running on the computer for viruses and other malware It displays information about the total number of objects that have been 9 Page 80 of 100 cro WorLD scanned infected disinfected renamed and deleted total number of errors and time elapsed since the beginning of the scan In addition it provides you with the option of running scans as low priority processes After you have finished scanning the computer you can view the log files by clicking the View log button naw e Scan A Virus scan Time Elapsed 00 00 04 Set To Low Priority Ec Total Number of Objects Scanned Total Number of Objects Infected Total Number of Objects Disinfected Total Number of Objects Quarantined Total Number of Objects Deleted Total Number of Errors oo oo 0 02 Sep 2010 11 49 04 Scanning Memory Files The Virus scan Dialog Box You can click the Custom Scan Options dialog box to perform customized scans by configuring eScan to scan the selected storage devices or objects for malicious software This dial
5. In addition you can view the following reports e View Archived Mails You can click this button to open the View Archived eMails window See the section on the View Archived eMails window under Archiving A Page 57 of 100 IV 1cROWor LD e View Report You can click this button to open the Report for Mail Anti Virus window This window displays the summary of infected e mails and the action taken by Mail Anti Virus on such e mails for a given range of dates in a tabular format when you click the Generate Report button Report For Mail Anti Virus Subject Description Action Refresh l Close Reports for Mail Anti Virus cro WoRLD 9 Page 58 of 100 Anti Spam Anti Spam is a part of eScan s Protection feature This module filters all your junk and spam e mails by using the NILP technology and sends content warnings to specified recipients It also provides reports about Anti Spam activities and allows you to view quarantined mails and ham mails Feedback Help Password License Information aA Mm e Scan Feedback Help Password License Information Anti Virus Edition 11 0 1139 797 Date of virus signatures 27 Aug 2010 13 45 Configuration Anti Spam Status Stopped Mail Phishing Filter Disabled Action Quarantine Start Settings Notification Reports Total Quarantined Mails Total Clear Mails View Report Anti Spam The Anti Spam icon is disa
6. It is recommended that you close all other applications before continuing Click Next to continue or Cancel to exit Setup Copyright MicroWorld Welcome Screen To proceed with the installation click Next This will display the License Agreement screen Alternatively if you do not wish to proceed you can click Cancel This will cancel the installation and close the wizard STEP 3 License Agreement This screen displays the EULA for eScan Please read it carefully To accept the EULA on the License Agreement screen click I accept the agreement and then click Next This will display the Select Destination Location screen Pcro Wor p Page 17 of 100 License Please read the following important information before continuing Please read the following License Agreement You must accept the terms of this agreement before continuing with the installation END USER LICENSE AGREEMENT FOR eScan SOFTWARE PRODUCT IMPORTANT READ CAREFULLY This End User License Agreement EULA is a legal agreement between you and MicroWorld Software Services Pvt Ltd LICENSOR that you either an individual or a single entity have signed for the software product identified above which includes computer software and associated media and printed materials and may include online or electronic documentation SOFTWARE PRODUCT or SOFTWARE For installing restricted copying or otherwise using this SOFT
7. This will cancel the installation and close the wizard STEP 5 Viewing the Summary Report Before Installation This window shows a summary of the options that you have selected on the previous screens of the wizard This step completes the preparation for installing the application on your computer You can click the Back button to review or change the settings that you have made on the previous screens 9 Page 19 of 100 cro WorLD Ready to Install Setup is now ready to begin installing eScan Anti Virus AV Edition for Windows on your computer Click Install to continue with the installation or click Back if you want to review or change any settings Destination location C Program Files eScan Summary Report To proceed with the installation click Install When you click Install the wizard should start installing eScan on the computer However if you do not wish to proceed you can cancel the installation by clicking Cancel STEP 6 Install eScan During the installation process the wizard searches your computer for other Anti Virus programs that may conflict with the eScan installation and prompts you to remove them If there are no conflicting programs the wizard proceeds with the installation 9 Page 20 of 100 cro WorLD eScan Install m eScan If you have any other Antivirus software hardware installed on pour system we strongly recommend you to uninstall the same prior to installing eScan
8. CD e Visit Web site Requires Internet connectivity You can click this button to visit the eScan Web site i e http www escanav com e Contact Us You can click this button to view the contact information for MicroWorld s offices Additional Requirements 1 Internet connectivity is required for a few buttons to function properly Page 14 of 100 lV 1CROWorLbD Installing eScan You can install eScan Anti Virus AV either by using the eScan setup file or by using the eScan product installation CD To download the eScan setup file visit the following link http www escanav com downloads sohol11 asp To begin the eScan installation insert the eScan product installation CD into the CD ROM drive of your computer This will start the setup automatically Some computers do not play the eScan product installation CD automatically In such cases you can manually start the installation by double clicking the AUTORUN exe in the CD ROM drive window This will display a dialog box containing options for selecting the language eScan uses the Interactive Installation Wizard for its installation This wizard has a simple and intuitive GUI that guides you through the installation process Installation Steps To install eScan AV on your computer perform the following steps Special instructions for Installing eScan AV on computers running the Windows Vista operating system with User Access Control UAC enabled on them Wh
9. The context menu shows the following additional options when you right click any rule in the table Process Properties This option displays the properties of the selected process or file which include the name of the file owner of the file copyright information version and path of the file Process Details This option displays the details of the selected process or file in a browser window This information is available on the MicroWorld Web site 4 Trusted MAC Address This tab contains the information on the MAC addresses of devices connected to the computer A MAC address is a hardware address that uniquely identifies each node of a network The Trusted MAC address list is checked along with the expert rule only when The packet must be from to a trusted MAC address WW cxo Wor p Page 75 of 100 ian e Scan option is selected in the Add Firewall Rule dialog box and the action is as per the action specified in the rule noo a Firewall Settings Trusted MAC Address Local IP List Adaress o Comment o The Trusted MAC Address Tab 5 Local IP List This tab contains the list of all the local IP addresses A Page 76 of 100 IV Icro WorLD na RR Firewall Settings Local IP List Clear All Default Clear Alert Cache MV Show Application Alert The Local IP List Tab The other options available in this dialog box are as follows m Clear Alert Cache You can click
10. You can access eScan Protection Center by either clicking y Alternatively you can open the eScan Protection center by right clicking F and then clicking Open eScan Protection Center However before you can access this window you need to specify the Administrator password if it has been set The default Administrator password for eScan Protection Center is admin As a best practice for additional security you should change the password after you install eScan The Administrator Password window also contains a Read Only button You should click this button if you need to prevent changes or modifications from being made to the settings This mode enables users to access eScan Protection Center in the restricted or read only mode 9 Page 28 of 100 cro WorLD Overview of Scan Protection Center eScan Protection Center is the main application window of eScan It has a new GUI that is pleasantly straightforward and is designed to suit the needs of both novice and expert users Feedback Help Password License Information aO e Scan Anti Virus Edition 11 0 1139 797 Date of virus signatures 27 Aug 2010 13 45 ladies Qe Toot Configuration File Anti Virus Status Started Proactive Scan Status Disabled Action Disinfect Quarantine object Stop Settings Reports Total Files Scanned 542 Dangerous Objects Detected 0 Last File Scanned C bzip2 exe View Statistics View Quarantined Objects View R
11. You can click the Phrases button to open the Phrases dialog box This dialog box helps you configure additional e mail related options In addition it allows you to specify a list of words that the user can either allow or block This list is called the user specified whitelist You can specify certain words or phrases so that mails containing those words or phrases in the subject header or body are recognized as spam and are quarantined or deleted The dialog box uses the following color codes to categorize e mails e User specified whitelist of words phrases Color Code GREEN You should click this option to list the words or phrases that are present in the whitelist A phrase that is added to the whitelist cannot be edited enabled or disabled e User specified List of Blocked words phrases Color Code RED You should click this option to list the words or phrases that are defined in block list e User specified words phrases disabled Color Code GRAY You should click this option to list the words or phrases that are defined excluded during scans The options in the Phrases to Check dialog box are disabled by default A Page 61 of 100 IV 1cROWorLD Spam Filter Configuration This section provides you with options for configuring the spam filter All options in this section are selected by default o Check for Mail Phishing Default You should select this check box if you need Anti Spam to check for fraudulent e mails
12. You can create new expert rules However you should configure these rules only if you have a good understanding of firewalls and networking protocols A Page 73 of 100 IV 1cROWorLD neo Firewall Settings Expert Rule Rule Application Rule Trusted MAC Address Local IP List Firewall Rule UDP Rule ARP packet exchange For mappi NetBios LAN File Sharing Acce NetBios LAN File Sharing Acce ICMP messages ICMP messages for 192 168 pi DHCP BOOTP packet exchange O FTP Control For downloading and O FTP Data For downloading and u RPC Service DNS name resolution For accessi E Mail SMTP POP3 IMAP For se Ww HTTP amp HTTPS For acce News NNTP Internet Relay Chat IRC For chat MSN Connection For chatting ove MSN Whiteboard For chatting ove a MSN Real Time Protocol For chatti Kal Permits UDP packets on Any Interface between My Network Any Permits ARP packets on Any Interface Permits TCP and UDP packets on Any Interface between My Com Blocks TCP and UDP packets on Any Interface between Any Add Permits ICMP packets on Any Interface between My Network an Permits ICMP packets on Any Interface between My Network an Permits UDP packets on Any Interface between Any Address 68 Permits TCP packets on Any Interface between My Network Any Permits TCP packets on Any Inter
13. Your computer should have any one of the following operating systems installed on it e Windows 2000 SP4 with KB891861 e Windows XP Professional with SP2 and above For 32 bit edition only e Windows XP with SP1 and above For 64 bit edition only e Windows Vista Ultimate e Windows Vista Home Premium e Windows Vista Home Basic e Windows Vista Business e Windows Vista Enterprise e Windows 7 Ultimate e Windows 7 Home Premium e Windows 7 Home Basic e Windows 7 Business e Windows 7 Enterprise In addition it requires a PDF reader and Internet Explorer version 5 0 or higher installed on the computer Note The SOHO product will not work on server based operating systems Minimum Hardware Requirements Your computer must meet the following minimum requirements e Processor Pentium II 200 MHz e RAM 256 Megabytes MB of RAM recommended 512 MB e Hard Disk Space 700 MB of free hard disk space e Additional Drives CD ROM drive A Page 11 of 100 7 1cROWorLD Preinstallation Steps Before installing eScan please ensure that you perform the following tasks For First time Installation e Ensure that you have administrator rights or equivalent privileges for the user logged on to the computer e Close all the open applications or programs e Uninstall all other Anti Virus or Anti Spyware software e Disable or uninstall Windows Defender e Disable or uninstall any existing firewall sof
14. a specified number of days have elapsed since you have last scanned your computer e Warn if virus signature is more than Default When you select this check box eScan will notify you if the virus signature is older than the specified number of days By default eScan notifies you when your virus definitions are more than three days old e Warn if the last computer scan was more than When you select this check box eScan will notify you when a specified number of days have elapsed since the computer was last scanned Log Settings section In this section you can configure the log settings for the Scan module e Prepare log Default When you select this check box eScan creates an On demand Scan log file at the specified path The default path is c Program Files eScan LOG e Only infection to be logged Default When this option is selected eScan will log information only about infected files and the action taken on them in the On demand Scan log e Full log When this option is selected the On demand Scan log will contain information about all the files scanned by eScan Q Scheduler In this section you can schedule On demand Scan to scan your computer and storage devices for malicious objects It contains a table which displays the name of the schedule the frequency of occurrence and the next time it will be run This dialog box includes an Add task button which helps you add a new scan task to the schedule Add t
15. add a disclaimer to all incoming e mails Thus you make the recipient aware that the e mail is scanned and free of viruses You can add a custom disclaimer by either typing the text of the disclaimer in the Disclaimer box or by selecting the file containing the disclaimer text by clicking Browse Poro WorLD Page 66 of 100 _ Outgoing mails excluded from adding Disclaimer This section is enabled when the Add Disclaimer to Outgoing e mails check box is selected By selecting this check box you can restrict Anti Spam from appending the disclaimer to specific e mail addresses or domains by adding them to a list e Notification This button opens the Notification Settings dialog box You can configure the notification settings for the Anti Spam module by using this dialog box By configuring this module you can send e mails to specific recipients when a particular event occurs naw Notification Settings Warning Notification Settings Virus Alerts Warning Mails From To IV Show Alert Dialog box Jescanuser escanav col postmaster Delete Mails From User dj Attachment Removed Warning To Sender V Attachment Removed Warning To Recipient Wv Virus Warning To Sender Add _ W Virus Warning To Recipient ere _ Content Warning To Sender M Content Warning To Recipient Browse Lines starting with are comment lines This file specifies warning sent to Mai Sender by eScan when it deletes attachments
16. in the HTML format with scripts You can add e mail addresses or domain names of such users to the list All e mails in the HTML format with scripts coming from those users or domains are automatically delivered to your inbox Script and Content check disabled for mails To This section contains a list of e mail addresses or domain names which you consider as legitimate recipients This feature of eScan is useful when you need to send e mails in the HTML format with scripts to a legitimate user You can add e mail addresses or domain names of such users to this list 4 Vulnerabilities Il eScan helps you choose the action that you can take on mails containing attachments with multiple extensions A Page 52 of 100 IV 1cROWorLbD B 2 eo Mail Anti Virus Settings Select Action on Mails with Multiple Extension Attachment f No Action C Delete Mail Forward to Admin Default Cancel The Vulnerabilities Settings This tab helps you configure the following settings Select Action on Mails with Multiple Extension Attachment You can configure Mail Anti Virus to perform specific actions if attachments contain files with multiple extensions You can configure Mail Anti Virus to refrain from taking any action on the e mail delete it or forward it to the administrator The settings under Allow Multiple Extension attachment for ZIP file are disabled by default They are enabled only when you select the Delete
17. message to the sender The content of the e mail that is sent is displayed in the preview box m Virus Warning To Recipient Default You should select this check box if you need Mail Anti Virus to send a virus warning message to the recipient The content of the e mail that is sent is displayed in the preview box Content Warning To Sender You should select this check box if you need Mail Anti Virus to send a content warning message to the sender The content of the e mail that is sent is displayed in the preview box Content Warning To Recipient Default You should select this check box if you need Mail Anti Virus to send a content warning message to the recipient The content of the e mail that is sent is displayed in the preview box Delete Mails From User You can configure eScan to automatically delete e mails that have been sent by specific users For this you need to add the e mail addresses of such users to the Delete Mails From User list The Delete Mails From User section is disabled by default As you type in some text in the Delete Mails From User box and add e mail addresses the appropriate user interface elements will be enabled Reports This section displays the following information e Total Mails Scanned It shows the total number of e mails scanned by Mail Anti Virus on a real time basis e Total Infected Objects It shows the total number of infected objects found by Mail Anti Virus on a real time basis
18. register escanav com you can select I have Activation Code In this case copy the activation code and then paste it in the Enter Activation Code box Provide your personal information and then click Next Note E mail ID Address and Purchased From are the only mandatory fields that you have to fill If you do not want to disclose any other personal information you can leave the other fields blank In the next window you will have three options to register your copy of eScan Online Fax and E mail e If you are activating eScan by using the Online method ensure your computer is connected to the Internet and then click Activate A new 51 character key A Page 26 of 100 IV 1cROWorLD will be automatically added to the License Information window and your copy of eScan will be activated e Ifthe Online method fails you could either activate eScan via the E mail or Fax methods Select either the E mail option or the Fax option and then click Activate Offline activations via the e mail method or the Fax method may take up to 48 hours to process If you opt for the e mail method please ensure that you send the e mail to register escanav com e The Fax method will output a FaxRegister TXT file which you can print and fax to the nearest MicroWorld office To view the fax numbers of all MicroWorld offices visit the following Web page http www escanav com contactus asp You can also save the FaxRegister TXT file and e mail
19. remove or customize as per your requirements These rules enforce a boundary between your computer and the network Therefore the Firewall feature first checks the rules analyzes network packets and filters them on the basis of the specified rules Feedback Help Password License Information me I 1 e Scan Anti Virus Edition 11 0 1139 797 Date of virus signatures 02 Sep 2010 05 49 fsan nda Qe Toots Configuration Firewall Status Stopped Filtration System Allow All Limited Filter Interactive Filter Block All Settings Network Traffic in KB sec Reports Inbound Packets Blocked Outbound Packets Blocked View Current Network Activity View Summary View Report I Incoming I Outgoing Firewall Benefits of the Firewall feature When you connect to the Internet you expose your computer to various security threats The Firewall feature of eScan protects your data when you e Connect to Internet Relay Chat IRC servers and join other people on the numerous channels on the IRC network 9 Page 70 of 100 cro WorLD e Use Telnet to connect to a server on the Internet and then execute the commands on the server e Use FTP to transfer files from a remote server to your computer e Use Network basic input output system NetBIOS to communicate with other users on the LAN that is connected to the Internet e Use a computer that is a part of a Virtual Private Network VPN e Use a computer
20. this link to clear all the information such as previous actions taken or blocked programs stored in the firewall s cache Show Application Alert This option displays a firewall alert when an application is blocked as per an application rule Reports This section displays the following information e Inbound Packets Allowed It shows the total number of inbound packets that were allowed by the firewall e Outbound Packets Allowed It shows the total number of outbound packets that were allowed by the firewall M Vi Page 77 of 100 M7 1cROWorLD Inbound Packets Blocked It shows the total number of inbound packets that were blocked by the firewall Outbound Packets Blocked It shows the total number of outbound packets that were blocked by the firewall The report section also shows a Network Traffic Monitor which displays the incoming and outgoing network traffic in Kilobytes per second KBps In addition you can view the following reports View Current Network Activity You can click this button to open the ViewTCP tool which displays the real time activity report of the all active connections and established connections It also provides you with information regarding the process protocol local address and the remote address and the status of each network connection View Summary You can click this button to view the firewall report either in the form of detailed report or a summary report A summary report displa
21. to avoid any performance degradation or system conflicts If such software hardware is not uninstalled performance of your system may be affected If you still want to continue with installation of eScan eScan will try to disable other Antivirus Services Do you want to continue with the installation Copyright MicroWorld eScan Installation Confirmation 18 Setup eScan Anti Virus AV Edition for Windows 11 0 1139 X Installing Please wait while Setup installs eScan Anti Virus AV Edition for Windows on yo computer Extracting files C Program Files eScan killproc e32 E Installing eScan 9 Page 21 of 100 cro WorLD eScan Install Installing eScan Firewall Components Installing eScan If you do not wish to proceed you can cancel the installation by clicking Cancel S eScan Toolkit 42 0 56 X Please Wait MWAV initialization The eScan setup also runs eScan Anti Virus Toolkit This tool scans and removes the viruses and spyware found on your computer 6 y Page 22 of 100 IV 1cROWorLD WS eSen Ae sinus spyyiare Toolkit Unlity 12 20 56 DE Objects Scanned a Sep 2010 10 59 51 Scanning Memory Files m Virus Log Information Result Total Objects Scanned 50 Total Critical Objects 0 Buy eScan L__ Pause Scan Total Disinfected Objects 0 O Fes Cancel Total Deleted Objects 0 Vlog cma Total Objects Renam
22. to browse the Internet e Use a computer to send or receive e mail By default the firewall operates in the Limited Filter mode In this mode it filters only the incoming traffic However you can customize the firewall by using options such as Turn Off and Block All and by changing the mode to Interactive Filter The eScan Firewall also allows you to specify different set of rules for allowing or blocking incoming or outgoing traffic These rules include zone rules expert rules application rules trusted Media Access Control MAC address and local IP list You can also view detailed reports regarding the network traffic for your computer in both graphical and text only formats When you select the Firewall icon the tabbed page of Protection Center provides you with information regarding its status options for configuring the module and links to reports on the recent scans performed by the module This page shows two sections Configuration and Reports which are described as follows U Configuration This section displays the following information e Firewall Status It shows whether the Firewall module is running or not By default Firewall runs in the Allow All mode e Filteration System It shows the filtration system in use by the Firewall module In addition you can configure the following settings e Turn Off Default You can click this button to disable the eScan Firewall When you select this option eScan stops moni
23. 0 e Delete infected file When you select this option eScan deletes the infected file e Automatic Default When you select this option eScan first tries to clean the file If it is not possible to disinfect the file eScan quarantines or deletes the file Priority of scanner This option helps you set the priority of the eScan scanner in relation to other processes running on the computer The priority level can be high normal or low By default the scanner runs with low priority File types This option helps you select the type of files that should be scanned by On demand Scan e Automatic type recognition Default When you select this option On demand Scan will scan all files but will ignore files that cannot be infected e Only program files When you select this option On demand Scan will scan only the program files or executables stored on your computer 2 Alert This tab helps you configure eScan to alert you when it detects malicious software on your computer mie new A Options Virus Scan Alert Alert M Warn if virus signature is more than days old C Warn if the last computer analysis was more than Log Settings w i z 4 gt C Program Files eScan LOG Only infection to be logged Fulllog The Alert Tab M A Page 83 of 100 M7 1cROWorLD m Alert In this section you can configure when eScan should notify you when the virus definitions are outdated or when
24. 9 797 Date of virus signatures 27 Aug 2010 13 45 feduscony Hitoy Qiien Configuration File Anti Virus Status Started Proactive Scan Status Disabled Action Disinfect Quarantine object Stop Settings Reports Total Files Scanned 544 Dangerous Objects Detected 0 Last File Scanned C GenCRCDiff exe View Statistics j View Report File Anti Virus When you click the File Anti Virus icon in the docking view of eScan Protection Center the tabbed page for the File Anti Virus module is displayed The tabbed page contains information about the status of the module settings and buttons for displaying the recent scans performed by the module This page has two sections Configuration and Reports both of which are described as follows 9 Page 32 of 100 cro WorLD Q Configuration This section provides you with information regarding the status of File Anti Virus and Proactive Scan It also shows you the default action that File Anti Virus will perform when it detects a malicious program This section displays the following information e File Anti Virus Status It shows whether File Anti Virus is running or not e Proactive Scan Status It displays whether proactive scanning is enabled or not e Action It shows the action that eScan will perform when a malicious program is detected by File Anti Virus The page also displays the following buttons e Start Stop This button is a toggle button You can click t
25. 92 of 100 Tools You can access the Tools tabbed page by clicking the Tools button in the eScan Protection Center window This page provides you with options for sending debug information to the eScan Technical Support Team creating the eScan rescue image downloading the latest hotfix restoring the Windows default settings and contacting the eScan Remote Support nena Feedback Help Password License Information aO Anti Virus Edition 11 0 1139 797 Date of virus signatures 27 Aug 2010 13 45 ied S220 fy Udate O Tools Send Debug Information Create eScan Rescue ISO Image File Download Latest Hotfix eScan Restore Windows Default Settings Download Latest Hotfix Microsoft Windows OS eScan Remote Support QOO6Gh These options are described as follows Send Debug Information You click this button to open the Please type your Problem here dialog box This dialog box allows you to specify the eScan related problem and generate the debuges zip file The debuges zip file is a special file that contains critical eScan files and settings It is stored in the Program 9 Page 93 of 100 cro WorLD Files eScan Debug folder You can send the problem description along with the debuges zip file to eScan s Technical Support Team so that they can analyze it and assist you in resolving the problem To send the description of the problem you need to specify the following information e Mail From Def
26. Mail option or the Forward to Admin option Allow Multiple Extension attachment for ZIP file You should select this check box if you need Mail Anti Virus to allow compressed files with multiple extensions as e mail attachments 9 Page 53 of 100 cro WorLD Allow Multiple Extension Attachment for file types You can add file extensions to allow such attachments containing multiple extensions to be delivered to the user s inbox 5 Archiving This screen helps you configure settings for archiving e mails and e mail attachments Mail Anti Virus Settings Archive eMails Archive Attachments p Default The Archiving Settings The following configuration options are available on this screen m Archive eMails This option helps you archive or back up all e mails that you have sent or received Mail Anti Virus provides you with the facility of backing up your e mails to a given folder The default path for storing archived e mails is UserProfile Application M Vi Page 54 of 100 M7 Icro WorLD Data MicroWorld eScan Archive The eMail Archive Directory box is disabled by default Therefore to specify the path of the backup folder you need to select the Archive eMails check box Archive Attachments You should select this check box if you need to archive or back up all sent or received e mail attachments to a given folder However to specify the path of the backup folder you need to select the Archi
27. S smithap on Samba Server devil Default The Objects Tab Q The right pane This pane provides you with a number of settings for fine tuning the File Anti Virus module as per your requirements For example you can configure module to scan specific storage devices or exclude files of a given file type m Actions in case of virus detection This section lists the different actions that File Anti Virus can perform when it detects a virus infection These actions are Report only Disinfect Quarantine and Delete object Out of these the Disinfect option is selected by default Scan local removable disk drives Default You should select this check box if you need to scan all the local removable drives attached to the computer cro WoRrLD 9 Page 34 of 100 Scan local disk drives Default You should select this check box if you need to scan all the local drives installed to the computer Scan network drives Default You should select this check box if you need to scan all the network drives including mapped folders and drives connected to the computer Scan files of following types You should select this option if you need to scan all files only infectable files and files by mask eScan provides you with a list of default files and file types that it scans by mask You can add more items to this list or remove items as per your requirements by using the Add Delete option Exclude by
28. The attachment s that you sent with the following mail was deleted by eScan not delivered to the recipient The Mail came from The Mail recipient t Subiect nf the Mail s ace as am ener 3 The Notification Settings The warning notification settings that you can configure on this screen are as follows P Page 67 of 100 M7 1cROWorLD Virus Alerts You should select this check box if you need Anti Spam to display an alert box notifying you of a virus infection m Warning Mails You should select this check box if you need Anti Spam to send warning e mails to a given recipient The default sender is escanuser escanav com and the default recipient is postmaster In addition you can configure Anti Spam to send warning e mails and alerts to senders or recipients When you click on any one of these options the corresponding e mail message is displayed in the preview box Attachment Removed Warning To Sender Default You should select this check box if you need Anti Spam to send a warning message to the sender of an infected attachment Anti Spam sends this e mail when it encounters a virus infected attachment in an e mail The content of the e mail that is sent is displayed in the preview box Attachment Removed Warning To Recipient Default You should select this check box if you need Anti Spam to send a warning message to the recipient when it removes an infected attachment The content of the e mail t
29. WARE PRODUCT you agree to be bound by the terms of this EULA This 3 EULA supersedes any prior proposal representation or understanding between the m EULA Alternatively if you do not wish to accept the EULA you can click Cancel This will cancel the installation and close the wizard STEP 4 Selecting the Installation Folder In this step you can select the drive and folder in which you want to install eScan To select the eScan installation folder on your computer on the Select Destination Location screen in the box either type the path of the folder or click Browse to browse to the folder and then click Next Note e The default path for 32 bit computer Disk Drive Program Files eScan e The default path for 64 bit computers Disk Drive Program Files x86 eScan 9 Page 18 of 100 cro WorLD ie Setup eScan Anti Virus AV Edition for Windows 11 0 1139 0 X Select Destination Location Where should eScan Anti Virus AV Edition for Windows be installed PS o Setup will install eScan Anti Virus AV Edition for Windows into the following folder To continue click Next f you would like to select a different folder click Browse Program Files eScan Browse At least 241 2 MB of free disk space is required Welcome Screen Alternatively if you need to view the EULA you can click Back to navigate to the License Agreement screen However if you do not wish to proceed you can click Cancel
30. You should select this check box if you need Mail Anti Virus to quarantine infected e mails or attachments The default path for storing quarantined e mails or attachments is C Program Files eScan QUARANT However you can specify a different path for storing quarantined files if required Port Settings You need to specify which ports on the SMTP Mail Server should be used for incoming and outgoing e mails so that eScan can scan the e mails sent or received via those ports This setting also helps you create outbreak alerts and create warning messages and notifications that eScan should send when it detects any security breach If you configure Mail Server settings eScan will send e mail notifications about the actions that it should perform when it detects infected e mails The mail server settings that you need to configure are as follows A Page 47 of 100 IV 1cROWor LD o SMTP Mail Server Default 127 0 0 1 You need to specify the IP address of the SMTP Mail Server of your organization or Internet Service Provider ISP o SMTP Port Default 25 You need to specify a port number for the SMTP Mail Server of your organization or ISP o User Authentication Opt You need to provide the user name if the mail server of your organization or ISP requires authentication to send e mails o Authentication Password Opt You need to provide the password if the mail server of your organization or ISP requires authentication to sen
31. alTime Monitor eScan monitor success No Action 9 2 2010 10 32 31 eScan RealTime Monitor New virus database ta Update 222010 10 56 54 eScan RealTime Monitor eScan monitor success No Action x 9 2 2010 11 02 24 eScan RealTime Monitor eScan monitor success Refresh Close Report for File Anti Virus A Page 42 of 100 M7 1cROWorLD Mail Anti Virus Mail Anti Virus is a part of the Protection feature of eScan This module scans all incoming and outgoing e mails for viruses spyware adware and other malicious objects It also helps you send virus warnings to client computers and allows you to view archived e mails and reports on the Mail Anti Virus activities By default Mail Anti Virus scans only the incoming e mails and attachments but you can configure it to scan outgoing e mails and attachments as well Moreover it helps you notify the sender or system administrator whenever you receive an infected e mail or attachment In addition Mail Anti Virus lets you archive e mails and e mail attachments so that you can restore them from the backup in case you lose your important e mails You can also configure it to compress large e mail attachments automatically to conserve bandwidth Feedback Help Password License Information E C1 e Scan Anti Virus Edition 11 0 1139 797 Date of virus signatures 02 Sep 2010 05 49 Configuration Mail Anti Virus Status Stopped Action Disinfe
32. and quarantine them o Treat Mails with Chinese Korean character set as SPAM Default When this check box is selected eScan scans e mails with Chinese or Korean characters This check is based on the research data conducted by MicroWorld s various spam e mail samples collected from around the globe From these samples it was observed that spammers often use Chinese or Korean characters in their e mails o Treat Subject with more than 5 whitespaces as SPAM Default In its research MicroWorld found that spam e mails usually contain more than five consecutive white spaces When this check box is selected Anti Spam checks the spacing between characters or words in the subject line of e mails and treats e mails with more than five whitespaces in their subject lines as spam e mails o Check content of HTML mails Default You should select this check box when you need Anti Spam to scan e mails in HTML format along with textual content o Quarantine Advertisement mails Default You should select this check box when you need Anti Spam to check for advertisement types of e mails and quarantine them o Advanced You can click the Advanced button to open the Advanced Spam Filtering Options dialog box This dialog box helps you configure the following advanced options for controlling spam A Page 62 of 100 IV 1cROWor LD Page 63 of 100 naw Advanced Spam Filtering Options JV Enable eMail Header check V Enable X Spam Rules check
33. ask When you click this button eScan opens the Automatic virus scan dialog box This dialog box includes the Job Analysis extent Schedule and Virus check tabs o Job This tab helps you specify the name start type and termination condition for a new task If you select the start type as Start in foreground the task will run in the foreground otherwise the task will run in the background and its window will be minimized You can also A Page 84 of 100 IV 1cROWor LD select the termination condition for the task For example you can specify that the On demand Scan should always quit automatically after it has finished scanning o Analysis extent This tab presents you with options that help you select the type of scanning and the directories folders or local hard drives to be scanned o Schedule This tab helps you configure the options for scheduling system scans You can schedule scans to run either once or on a daily hourly weekly monthly basis when the computer boots up or on a given date at a specific time o Virus check This tab provides you with the same options as the ones present on the Virus Check tab of the Scan module You can configure On demand Scan to perform a specific action when a virus infection is detected You can also set the priority of the eScan scanner in relation to other processes running on the computer The priority level can be high normal or low By default the scanner runs with low priori
34. ault escanuser escanav com You can specify the e mail address of the sender in this box e Mail To Default support escanav com You can specify the e mail address of the recipient in this box The recipient of this e mail is usually the eScan s Technical Support Team e SMTP Server Default mail mwti net You can specify the IP address of the SMTP server in this box e SMTP Port Default 25 You can specify the port number of the SMTP port in this box e User Authentication Opt You can specify the user name in this box however adding this information is optional e Authentication Password Opt You can specify the user name in this box however adding this information is optional e OK When you click this button the e mail along with the debuges zip file is sent to eScan s Technical Support team Create eScan Rescue ISO Image File You can click this button to open the eScan Rescue File Creation Wizard which will help you create a Windows based Rescue Disk file The Rescue Disk file will help you create a clean bootable CD to provide you a clean boot on infected computers running the Windows operating system You can then eradicate rootkits and file infectors that cannot be cleaned in the normal Windows mode For more information on how to create the eScan Rescue Disk file visit the following link http escanav com documents escan11 escan rescue disk as Download Latest Hotfix eScan Requires Internet
35. bled by default When you click this icon in the docking view of eScan Protection Center the tabbed page for the Anti Spam module is displayed This page provides you with the options for configuring the module and helps you view reports on the recent scans performed by eScan The details regarding each of these sections are as follows 9 Page 59 of 100 cro WorLD Configuration This section displays the following information e Anti Spam Status It shows whether the Anti Spam module is running or not e Mail Phishing Filter It shows whether the Mail Phishing Filter is running or not e Action It shows the action that eScan will perform if a malicious object is detected In addition you can configure the following settings e Start Stop This button is a toggle button You can click this button to enable or disable the Anti Spam module e Settings You can click this button to open the Anti Spam Settings dialog box This dialog box contains options that help you configure Anti Spam to prevent spam e mails from reaching your inbox This dialog box has the following tabs AAD of Anti Spam Settings Advanced Disclaimer JV Send Original Mail to User Do not check content of Replied or Forwarded Mails Check Content of Outgoing mails pinnae Spam Filter Configuration V Check for Mail Phishing IV Treat Mails with Chinese Korean character set as SPAM IV Treat Subject with more than 5 whitespaces as SPAM J Check
36. button is displayed on the top right hand corner of the eScan Protection Center window You can click this button to visit the eScan Web site where you can provide your feedback on various eScan products and send it to the eScan s Quality Assurance team E eScan lt secure Scalable Reliable Antiyinus Content Security and F rewall Protection ton Microsotintermnet Explorer Fie Edit View Favorites Tools Help Q O haO Pwr kas Boe h gale a 3 Address Eal http www escanav com english content company feedback escan_feedback asp pid 5BM Links e Scan Secure Scalable Reliable DeScan wiki eScanForum JeScanFeeds g Home Events Bookmark RecommendeScan Technical Support Products Online Store Renew Customer Resource Partners Downloads Company I e Scan m Complete Protection with 3 gt eels te Feedback About eScan Pl re amin iv r fi k ease spare ute and give us your feedbac Contact Us MicroWorld is committed to providing quality Products and Services Your Comments suggestions will be used to help Awards improve the quality of our Services and Products Thank you for taking the time to complete this form concerning your Customer Feedback experience Indicates compulsory fields Company Feedback Form Help You can access the Help section by clicking the Help button on the top right hand corner of the eScan Protection Center window This will ope
37. cked by eScan o Quarantine eMail if attachments are not scanned You should select this check box if you need to quarantine an entire e mail if it contains an attachment that is not scanned by Mail Anti Virus Vi Page 46 of 100 M7 1cROWorLD o Quarantine Attachments if they are not scanned You should select this check box if you need to quarantine attachments that are not scanned by Mail Anti Virus o Exclude Attachments White List This list is empty by default You can add file names and file extensions that should not be blocked by eScan You can also configure eScan to allow specific files even though if the file type is blocked For example if you have listed PIF in the list of blocked attachments and you need to allow an attachment with the name ABCD PIF you can add abcd pif to the Exclude Attachments list Adding PIF files in this section will allow all PIF to be delivered MicroWorld recommends you to add the entire file name like ABCD PIF Action This section helps you configure the actions to be performed on infected e mails These operations are follows o Disinfect Default This option is selected by default You should select this option if you need Mail Anti Virus to disinfect infected e mails or attachments o Delete You should select this option causes if you need Mail Anti Virus to delete infected e mails or attachments o Quarantine Infected Files Default This check box is selected by default
38. connectivity When you click this button eScan opens the MicroWorld Download Manager and starts downloading the latest hotfix from eScan update servers Restore Windows Default Settings You can restore the Windows operating settings such as desktop and background settings to eliminate all the modifications made by a virus attack by using this button eScan automatically scans your Vi Page 94 of 100 M7 1cROWorLD computer for viruses when you click this button and sets the system variables to their default values Download Latest Hotfix Microsoft Windows OS When you click this hyperlink eScan opens the MicroWorld Download Manager and starts downloading the latest hotfix for the Windows operating system from the Microsoft Web site eScan Remote Support eScan Remote Support works with the help of a special software This feature helps you request the assistance of an eScan Support Technician When you click this button the eScan Remote Support service will start on your computer and you will get a unique user id and a password You can provide this to the eScan Support Technician to take control of your computer remotely and troubleshoot the eScan related issues Note To run eScan Remote Support your computer should have the latest eScan hotfix installed on it and it should be connected to the Internet A Page 95 of 100 IV 1cROWorLD eScan Protection Center includes the following modules Feedback The Feedback
39. content of HTML mails JV Quarantine Advertisement mails Advanced Mail Tagging Options C Do not change email at all Both subject and body is changed Spam tag is added in Subject Actual spam content is embedded in Body le X MailScan Spam 1 header line is added Actual spam content is embedded in Body Only Spam tag is added in Subject Body is left unchanged C X MailScan Spam 1 header line is added Body and subject both remain unchanged Default The Advanced Settings A Page 60 of 100 M7 Icro WorLD 1 Advanced This tab provides you with options for configuring the general e mail options spam filter and tagging e mails in Anti Spam General Options This section helps you configure the general Anti Spam settings o Send Original Mail to User Default This check box is selected by default eScan creates the Spam folder within the e mail client When an e mail is tagged as SPAM it is moved to this folder You should select this check box if you need to send original e mail that is tagged as spam to the recipient as well o Do not check content of Replied or Forwarded Mails You can select this check box if you need to ensure that eScan does not check the contents of e mails that you have either replied or forwarded to other recipients o Check Content of Outgoing mails You can select this check box if you need Anti Spam to check outgoing e mails for restricted content o Phrases
40. ct Start Settings Notification Reports Total Mails Scanned Total Infected Objects View Report Mail Anti Virus M A Page 43 of 100 M7 1cROWorLD This module is disabled by default When you click the Mail Anti Virus icon in the docking view of the eScan Protection Center the tabbed page for the module is displayed This page shows you the options for configuring the module and helps you view reports on the recent scans performed by eScan The details regarding each of the sections in the right pane are as follows Q Configuration This section provides you with information regarding the status of Mail Anti Virus and the action that it will take when it detects a malicious object e Mail Anti Virus Status It shows whether the Mail Anti Virus module is running or not e Action It shows the action that eScan will perform when it detects a malicious object In addition you can configure the following settings e Start Stop This is a toggle button You can click this button to switch the Mail Anti Virus module easily from the Start state to the Stop state and vice versa e Settings You can click this button to opens the Mail Anti Virus Settings dialog box This dialog box helps you configure Mail Anti Virus for real time monitoring This dialog box contains several tabs that allow you to configure settings for scanning e mails compressing and decompressing attachments addressing security vulnerabilities and archi
41. d e mails Port Settings for eMail You can also specify the ports for incoming and outgoing e mails so that eScan can scan the e mails sent or received via those ports o Outgoing Mail SMTP Default 25 You need to specify a port number for SMTP o Incoming Mail POP3 Default 110 You need to specify a port number for POP3 o Scan Outgoing Mails You should select this check box if you need to Mail Anti Virus to scan outgoing e mails 2 Compression Decompression Options You can configure the following settings to ensure that the available bandwidth is effectively utilized M Vi Page 48 of 100 M7 1cROWorLD new Mail Anti Virus Settings r r Uncompress inbound attachments 7 Do not compress files with extensions Exclude following attachments Compression Options Compress only if compression greater than Compress if Attachment size is above Kb Select the compression ratio Default The Compression Decompression Options Settings This tab helps you configure the following settings Compress outbound attachments This check box is disabled by default eScan reduces the size of all outgoing e mail attachments by compressing them when this check box is enabled Create self extracting zip files This check box is disabled by default eScan automatically creates a self extracting ZIP file containing the attachment when this check box is enabled The receiver can click thi
42. der by eScan when it deletes attachments The attachment s that you sent with the following mail was deleted by eScan not delivered to the recipient The Mail came from The Mail recipient t Suhiect nf the Mail lt s The Notification Settings You can configure the following notification settings m Virus Alerts Default You should select this check box if you need Mail Anti Virus to alert you when it detects a malicious object in an e mail m Warning Mails You configure this setting if you need Mail Anti Virus to send warning e mails and alerts to a given sender or recipient The default sender is escanuser escanav com and the default recipient is postmaster Attachment Removed Warning To Sender Default You should select this check box if you need Mail Anti Virus to send a warning message to the sender of an infected attachment Mail Anti Virus sends this e mail when it encounters a virus infected attachment in an e mail The content of the e mail that is sent is displayed in the preview box P Page 56 of 100 v Icro WorLD Attachment Removed Warning To Recipient Default You should select this check box if you need Mail Anti Virus to send a warning message to the recipient when it removes an infected attachment The content of the e mail that is sent is displayed in the preview box Virus Warning To Sender Default You should select this check box if you need Mail Anti Virus to send a virus warning
43. dows Vista are trademarks of the Microsoft group of companies All product names referenced herein are trademarks or registered trademarks of their respective companies MicroWorld disclaims proprietary interest in the marks and names of others Although MicroWorld makes every effort to ensure that this information is accurate MicroWorld will not be liable for any errors or omission of facts contained herein MicroWorld reserves the right to modify specifications cited in this document without prior notice No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical for any purpose without the express written permission of MicroWorld Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged Technical Support support escanav com Sales sales escanav com Forums http forums escanav com eScan Wiki http www escanav com wiki Live Chat http www escanav com english livechat asp Printed By MicroWorld Date October 2010 Page 2 of 100 M l cro WorLD Table of Contents Welcome 3 What Is this Guide All About 4 Overview of eScan s Features 5 Configuring the Test Environment 10 Overview of eScan s Product Installation CD 12 Installing eScan 15 Managing the License Key 24 Verifying the eScan Installation 26 Overview of eScan Protection Center 27 e File Anti Virus 29 e Mail Anti V
44. e body of the e mail that has been identified as spam o X MailScan Spam 1 header line is added Actual spam content is embedded in Body This option helps you add a Spam tag in the body of the e mail that has been identified as spam In addition it adds a line in the header line of the e mail o Only Spam tag is added in Subject Body is left unchanged This option helps you add the Spam tag only in the subject of the e mail which has been identified as spam o X MailScan Spam 1 header line is added Body and subject both remain unchanged Default This option helps you add a header line to the e mail However it does not add any tag to the subject line or body of the e mail 2 Disclaimer The disclaimer is a footer or signature that is appended to all e mails The disclaimer can be added in the space provided 6 A Page 65 of 100 1v 1cROWorLD Advanced Disclaimer Disclaimer Add Disclaimer to Outgoing Mails Add Disclaimer to Incoming Mails Exclude Disclaimers in Mails to Following Receivers Default Cancel The Disclaimer Settings The Disclaimer tab helps you configure the following settings Add Disclaimer to Outgoing e mails You should select this check box when you need to add a disclaimer to all outgoing e mails This helps to make the recipient aware that the e mail is scanned and free of viruses Add Disclaimer to Incoming e mails You should select this check box when you need to
45. e tabbed page of each module This section displays the status of the module whether it is running or not In addition the eScan Protection Center window shows the following buttons when an icon is clicked in the docking view Start You can click this button to start a particular module Stop You can click this button to stop a particular module Settings You can click this button to open the application s configuration window Reports This pane helps you view the reports generated by the corresponding module The Scan module and the Tools module do not show the Reports section File Anti Virus A Page 31 of 100 v 1cROWorLD File Anti Virus is a part of the eScan s Protection feature This module monitors and safeguards your computer on a real time basis from all kinds of malicious software as files are accessed copied or executed This module includes the Proactive Scanning feature which helps you blocking applications that perform suspicious activities File Anti Virus also includes the Block Files feature This feature allows you to block or quarantine files from being accessed from local or network drives In addition File Anti Virus also allows you to enable Folder Protection which prevents users from creating deleting or updating files or subfolders within specified folders 5 Feedback Help Password License Information 1 PR oem Feedback Help Password License Information Anti Virus Edition 11 0 113
46. e used to remove sophisticated rootkit infections that do not allow the anti virus software to remove the infections when the computer is booted in regular mode e eScan Remote Support This feature helps you request the assistance of an eScan Technical Support Representative through a remote connection to your computer It allows the eScan Technical Support Representative to remotely take control and troubleshoot the eScan related issues on your computer e eScan Auto backup and Restore This feature helps you back up the critical files of the Windows operating system installed on your computer It then automatically restores the clean files when eScan finds an infection in any of the system files that cannot be disinfected e Download Latest Microsoft Operating System Hotfix This feature downloads critical patches and hotfixes for the Windows operating system To view the eScan product comparison sheet visit the following link A Page 9 of 100 IV 1cROWor LD http escanav com documents escan11 eScan product comparison as Note Depending on the product some of the listed features may be unavailable Vi Page 10 of 100 IV Icro WorLD Configuring the Test Environment This section provides you with information on configuring a test environment for using eScan Software Requirements eScan products for the Small Office Home Office SOHO segment run on the 32 bit or 64 bit editions of following operating systems
47. eature of eScan 11 prevents malware from either disabling eScan or deleting its critical files thus keeps computers safe from infections The feature protects eScan services such as eScan updater eScan server and MailScan Dispatcher from being stopped and or terminated It also protects eScan executables or services running in the memory from being stopped and or terminated UL Malicious URL Filtering This feature of eScan 11 blocks suspicious URLs It thus prevents users or malware from accessing URLs which are already found to be infected and harmful to the computer L Folder Protection eScan 11 includes the new Folder Protection feature This feature helps users protect specific files and folders from being modified or deleted The main advantage of this feature is that it prevents the specified files from being infected by malicious software Another advantage of this feature is that files and folders that are protected cannot be deleted unless the folder protection is turned off This helps users safeguard their confidential data from infections by malware and accidental deletions L Automatic Patching of Windows Operating System Vulnerabilities eScan 11 automatically checks the Microsoft Web site and downloads critical hotfixes and updates for the Windows operating systems as and when they become available Most new strains of malicious software such as Rootkit Stuxnet A and Rootkit TmpHider exploit the vulnerabilities in
48. ed 0 Total Errors 0 Time Elapsed 00 00 03 Scanning File C AWINDOWS system32 eSLog0n dll 2 eScan Anti Virus Toolkit STEP 7 Completing the Installation Next the eScan Install screen is displayed and the F icon shows up in the notification area of the task bar To complete the installation of eScan and restart your computer on the eScan Install screen click Yes 9 Page 23 of 100 cro WorLD eScan Install m eScan Reboot PC to complete eScan Installation Copyright MicroWorld Confirmation Screen You can also choose to restart your computer later by clicking No In this case eScan completes the installation without restarting your computer and then displays the Installation Completion screen Starting eScan trayicos eScan Installation Continued The Installation Completion screen provides you with options for restarting your computer either immediately or later To complete the installation of eScan and restart your computer on the Installation Completion screen click Yes restart the computer now and then click Finish This will restart your computer immediately 9 Page 24 of 100 cro WorLD Completing the eScan Anti Virus AV Edition for Windows Setup Wizard To complete the installation of eScan Anti Virus AV Edition for Windows Setup must restart your computer Would you like to restart now Yes restart the computer now O No will resta
49. en you double click the setup file for installing eScan AV a User Access Control message box asking you for permission to run a awn2 xxxx tmp file is displayed Here the xxxx represents the last four characters which may be arbitrary This is a valid eScan file To proceed with the installation click Continue A Page 15 of 100 IV 1cROWorLD _y A program needs your permission to continue If you started this prom continue fe awn806B tmp MicroWorld Technologies Inc User Account Control helps stop unauthorized changes to your computer User Account Control message box STEP 1 Choosing the Language eScan AV is available in many languages such as English German French Nederlands Italiano Portuguese Spanish Turkish Chinese Simplified Chinese Traditional Greek Korean Norwegian Russian Polish and Latin Spanish Select Setup Language A Select the language to use during the installation C Selecting the Language Select the preferred language from the drop down list and then click OK STEP 2 Installation Wizard Welcome Screen The welcome screen helps you decide whether you want to proceed with the installation of eScan 9 Page 16 of 100 cro WorLD je Setup eScan Anti Virus AV Edition for Windows 11 0 1139 i0 X Welcome to the eScan Anti Virus AV Edition for Windows Setup Wizard This will install eScan Anti Virus AV Edition for Windows on your computer gt
50. ensions to prevent dangerous files from exploiting the vulnerabilities in Internet Explorer Delete HTML attachments with Scripts E mail clients help you send and receive in different formats for example the HTML format HTML files can include scripts which are similar to batch files or BAT files These scripts are embedded within specialized tags and can be used to run malicious code Hackers often use scripts to execute malicious code on the M Vi Page 51 of 100 M7 1cROWorLD computers of their victims You can configure Mail Anti Virus to delete HTML attachments with scripts by selecting the Delete HTML attachments with Script option You can also specify the tags that eScan should check for in the attachments so that the attachments containing those tags are deleted By default the Script Tags list the Script and Content Check Disabled for Mails From list and the Script and Content Check Disabled for Mails To list are disabled Script Tags This section contains a list that contains script tags eScan will delete all e mail attachments in the HTML format containing the tags included in this list You can configure this list to block HTML attachments that contain these tags Script and Content check disabled for mails From This section contains a list of e mail addresses or domain names that you consider as legitimate senders This feature of eScan is useful when you need to add a genuine user and receive legitimate e mails
51. eport eScan Protection Center In addition it provides quick access to the following feature settings Protection The GUI uses docking view for displaying the icons representing the modules of the Protection feature You can click the individual docking icons to access the protection status settings for the File Anti Virus Mail Anti Virus Anti Spam and Firewall modules Out of these the Mail Anti Virus and Anti Spam modules are disabled by default 9 Page 29 of 100 cro WorLD Icons in the Docking View o File Anti Virus This module provides real time protection to the files and folders residing on your computer o Mail Anti Virus This module prevents infected e mails and attachments from reaching your inbox and thus protects your computer from malicious programs that propagate through e mails o Anti Spam This module helps you create and configure filters that filter spam based on keywords and phrases that appear within e mails o Firewall This module helps you apply various expert rules for blocking specific ports programs or services on your computer m QVDecan You can click this button to configure scheduled scans or run on demand scans F adsan ga Upda O Tools Additional eScan Modules m Dypaate You can click this button to configure daily updates However to download the latest updates your computer needs to be connected to the Internet 7 oos You can click this button to access the tools avai
52. f 100 License You should register your copy of eScan to prevent others from misusing your license To do this you must activate the license key after installing eScan You can enter the license key for eScan via the License information of eScan dialog box This dialog box is displayed when you click the License button on the top right hand corner of the eScan Protection Center window D 2 EE N License information of eScan License Version 11 0 1139 797 License Status Evaluation Period Ends On 01 Oct 2010 Enter License Key Apply OK Cancel Trial Buy Now The License information of eScan Dialog Box cro WORLD 9 Page 98 of 100 Contact Details We offer 24x7 FREE Online Technical Support to our customers through e mail and Live Chat We also provide FREE Telephonic Support to our customers during business hours Chat Support The eScan Technical Support team is available round the clock to assist you with your queries You can contact our support team via Live Chat by visiting the following link http www escanav com english livechat asp Forums Support You can even join the MicroWorld Forum at http forums escanav com to discuss all your eScan related problems with eScan experts E mail Support Please send your queries suggestions and comments about our products about our products or this guide to support escanav com Registered Offices Asia Pacific MicroWorld Sof
53. face between Any Address 20 Blocks TCP and UDP packets on Any Interface between Any Add Permits UDP packets on Any Interface between My Network Any ES Permits TCP packets on Any Interface between My Network Any Permits TCP packets on Any Interface between My Network Any Permits TCP packets on Any Interface between My Network Any Permits TCP and UDP packets on Any Interface between My Net Permits TCP packets on Any Interface between My Network Any Permits TCP packets on Any Interface between My Network Any a Permits TCP narketa nn Any Interfane between Mv Network Anv F Clear Alert Cache 3 Application Rule MV Show Application Alert The Expert Rule Tab An application rule is based on programs or applications that are allowed to or denied access to the Internet or any network based service The Application Rule tab provides you with a default list of rules and options for configuring application rules While adding a new application rule you must provide the path of the application for which the rule is to be applied and to specify whether the Firewall module should allow the application to run Pcro Wor p Page 74 of 100 nam P Firewall Settings Application Rule Zone Rule Expert Rule Application Rule Trusted MAC Address Local IP List Applications Add e Default Clear Alert Cache J Show Application Alert I Cancel The Application Rule Tab
54. follows Configuration This section displays the following information e Last Database Updated It shows when the eScan database was last updated e Run Mode It displays mode of updation used by eScan The run mode can be either Automatic or Scheduled In addition you can click any one of the following buttons Q Update Now You can click this button to update the Anti Virus and Anti Spam definitions via HTTP FTP or Network mode bw Update via HTTP Anti Virus 0 8 Regular updates of eScan Anti Virus databases and program modules ensures effective protection Last Update 02 Sep 2010 07 04 Connecting to HTTP host lt Direct connection gt Requested file name and size eScan Anti virus Database is Updated No need to Download Connecting to HTTP host lt Direct connection gt Connecting to http www microworldsystems com Requested file name and size ing remote files with that of local files Duration 00 00 13 Hide Stop Update A Page 87 of 100 M7 1cROWorLD The Update via HTTP Dialog Box Q Settings You can click this button to open the Update Settings dialog box which helps you configure the Update module to download updates automatically This dialog box has the following tabs 1 General Config This tab provides you with general options for configuring the Updater module naM be Update Settings General Config After Update Scheduling Select Mode C FTP C Network P
55. g experience to users while they are running gaming applications in the full screen P Page 6 of 100 v 1cROWorLD mode The benefit of the Gaming Mode lies in how eScan handles alerts while a user is playing a game Normally when a user switches on a computer running eScan the real time protection module starts running in the background Now when a user starts a game eScan may display alerts and notifications which may affect the user s game The Gaming Mode in eScan 11 has been designed to overcome this problem Whenever a user runs a game on a computer eScan 11 automatically enables the Gaming Mode which prevents alerts and notifications from being displayed eScan automatically disables this mode when the user exits the gaming application Thus the Gaming Mode provides the user with an uninterrupted and seamless gaming experience Note The USB password protection module will remain active even while the Gaming Mode is on Also in the Gaming Mode updates that are downloaded will not reflect in the eScan database L Automatic Detection of Laptop Mode eScan 11 includes the automatic detection of Laptop Mode feature which is a power saving feature that provides unmitigated battery time for laptops Whenever a user switches to the Laptop Mode eScan 11 automatically detects this change and prevents memory intensive processes like scheduled scans from running Note that eScan s real time protection remains active while the lap
56. g information The current details of the system date time and whether the eScan Anti Virus monitor is running or not The number of viruses detected The results of the most recent scan such as the last object scanned and the name of the virus detected Page 41 of 100 Pcro Wor p Q View Quarantined Objects This button opens the Quarantine dialog box which displays the quarantined files and backup files This dialog box has the following tabs Quarantine This tab displays the files that have quarantined You can restore or delete the quarantined objects by right clicking the object and then clicking the appropriate option Backup This tab displays the files that were backed up by File Anti Virus before it tried to disinfect them You can restore or delete the objects that were backed up by right clicking the object and then clicking the appropriate option Before clicking any of these buttons you should ensure that you have selected the appropriate the row in the table for which you need to perform the action Q View Report This button opens the Report for File Anti Virus window This window displays the report for the File Anti Virus module for a given range of dates in a tabular format when you click the Generate Report button f Report For File Anti Virus From 02 Sep 2010 gt To 02 Sep 2010 gt Generate Report DateTime Name Description Action 3 2 2010 10 17 19 eScan Re
57. hat is sent is displayed in the preview box m Virus Warning To Sender Default You should select this check box if you need Anti Spam to send a virus warning message to the sender The content of the e mail that is sent is displayed in the preview box m Virus Warning To Recipient Default You should select this check box if you need Anti Spam to send a virus warning message to the recipient The content of the e mail that is sent is displayed in the preview box Content Warning To Sender You should select this check box if you need Anti Spam to send a content warning message to the sender The content of the e mail that is sent is displayed in the preview box Content Warning To Recipient Default You should select this check box if you need Anti Spam to send a content warning message to the recipient The content of the e mail that is sent is displayed in the preview box Delete Mails From User You can set eScan to automatically delete e mails that have been sent by specific users For this you need to add the e mail addresses of such users to the Delete Mails From User list LI Reports This section displays the following information e Total Quarantined Mails It shows the total number of files scanned by the real time Anti Spam monitor A Page 68 of 100 IV 1cROWorLD e Total Clear Mails It shows the total number of viruses or malicious software detected by the Anti Spam monitor on a real time basis In additi
58. his button to switch File Anti Virus easily from the start state to the stop state and vice versa e Settings This button opens the File Anti Virus Settings dialog box which helps you configure the File Anti Virus module for real time monitoring This dialog box has two tabs Objects and Options which are described as follows 1 Objects This tab displays the available drives on the computer It allows you to configure the actions that File Anti Virus should perform when it encounters a security threat during the scan operation This tab is divided into two panes they are described as follows Q The left pane This pane displays all the removable and non removable drives network drives installed drives and mapped drives that File Anti Virus can monitor or scan All the drives displayed on the left pane are selected by default A Page 33 of 100 IV 1cROWorLD Options Block Files Folder Protection Vg My Computer Local Disk C viae New Volume D See New Volume E vib DVD RAM Drive F ne File Anti Virus Settings Actions in case of virus detection Repor only Disinfect Quarantine object Delete object Scan local removable disk drives Scan local hard disk drives Scan network drives Scan files of following types Allinfectable O All By mask Exclude by mask Not a Virus List Exclude Files Folders Scan compound objects O Enable code analyser vi CD Drive G
59. ile Anti Virus Settings Objects Options Block Fies Folder Protection V Protect files in following folders from modification and deletion Folder Name Include Subfolder Default Cancel The Folder Protection tab Reports This section displays the following information e Total Files Scanned It shows the total number of files scanned by the real time File Anti Virus monitor e Dangerous Objects Detected It shows the total number of viruses or malicious software detected by the File Anti Virus monitor on a real time basis e Last File Scanned It shows the name of the last file scanned by the File Anti Virus monitor on real time basis In addition you can view the following reports cro WoRLD 9 Page 40 of 100 Q View Statistics This button displays the latest activity report of the real time monitor The report contains information about the number of scanned objects number of clean objects and last scanned object Thursday September 02 2010 11 20 08 AM Anti Virus bases were loaded Known viruses Scanned Objects Compound objects Packed objects Last object Virus Name Clean objects Found Known Virus Virus bodies Disinfected Deleted Quarantined Suspicious Corrupted eScan Anti Virus Monitor is loaded 6300685 80 0 0 C Program Files Trend Micro OfficeScan PCCSRVIWSS 80 110101901000 The Statistics Window In addition it displays the followin
60. irus 40 e Anti Spam 54 e Firewall 64 e Scan 73 e Update 78 e Tools 85 e Feedback 89 e Help 89 e Password 90 e License 90 Contact Details 92 Page 3 of 100 M l cro WorLD Welcome MicroWorld s eScan 11 is a revolutionary Anti Virus Software and Information Security product that is designed to provide Zero Day protection to computers from malicious software and several other security threats The new version of eScan is a feature rich and user friendly product that comes with several customizable settings It has a trendy new design that is both intuitive and easy to understand In addition eScan 11 introduces a host of new features that are aimed at safeguarding your computer from new and emerging threats such as malware phishing Web sites and e mails and hackers To achieve this eScan employs cutting edge technologies such as MicroWorld Winsock Layer MWL Non Intrusive Learning Patterns NILP and Domain IP Reputation Check DIRC MicroWorld is committed to provide a safe and secure computing environment for all eScan users This guide is designed to help you use evaluate the features and tools included in eScan 11 Thank you for choosing eScan The eScan Team A Page 4 of 100 IV 1cROWorLD What Is this Guide All About Over the past few years several new software technologies have come into existence With their advent the number of security threats in the computing world has grown exponentially As a resul
61. it to register escanav com OR You can activate your standard key through the eScan Web site using the following link http www escanav com Websiteactivation For more information on how to register your copy of eScan read the Know how to register your product article on the following Web page http www escanav com register After you receive the Activation Code either by fax or by e mail perform the steps in Activating the License Key from Step 2 onwards M A Page 27 of 100 M7 1cROWorLD Verifying the eScan Installation When the installation is complete a red shield F icon appears in the system tray The shield icon indicates the protection status of the computer If the icon has a cross mark X it indicates that eScan s real time protection is paused or disabled otherwise without the cross mark it means that the real time protection is active You can find the version of eScan installed on your computer by placing the mouse pointer on 8 In addition you can right click on it to view a context menu This menu contains options for scanning the computer downloading updates pausing eScan s real time protection and some tools for optimizing the system performance I Open eScan Protection Center Pause Protection E Enable Gaming Mode Q Scan My Computer Update now m View Current Network Activity amp System Information SS Virtual Keyboard g eScan Remote Support g About eScan Context Menu
62. lable in eScan Note Whenever you click any of the buttons or icons listed above a tabbed page containing settings related to that module is displayed The right hand side top corner of the eScan Protection Center window provides you with access to the following modules A Page 30 of 100 M7 1cROWorLD Feedback You can click this button to visit the eScan Web site where you can provide your feedback and send it to the eScan s Quality Assurance team Help You can click this button to view for the online technical help on eScan However this requires your computer to be connected to the Internet Password You can click this button to change the Administrator password for eScan Protection Center License Information You can click this button to register and activate the license key Depending on whether a module is running or stopped the icons in the Protection module show the following status icons Y Tick marked icons indicate that the module is running w Cross marked icons indicate the module is stopped or turned off When you select an icon the tabbed page shows you some information regarding the selected module It also provides you with buttons for configuring that module and helps you view reports generated by eScan for that module With the exception of Scan and Tools the tabbed pages belonging to all other modules show the following information Configuration This is the first section displayed in th
63. ludes the eScan Anti Virus Toolkit formerly MWAV which runs automatically when you boot the computer using the disk It helps you scan the computer s memory registry startup folders system folders and drives for viruses and spyware In addition it helps you run the Command exe file and execute commands for formatting the hard disk partitioning any drive or checking the hard disk for errors Note When you boot from Rescue Disk the updates download by MWAV will be stored on the local hard drive and not in the memory The eScan product installation CD contains an AUTORUN exe file You can view the contents of the CD and install eScan by using this CD When you double click AUTORUN exe the Disclaimer is displayed You can either accept the disclaimer to view the CD s menu or decline it to exit the screen ENGLISH Disclaimer h A Page 13 of 100 IV 1cROWorLD The CD s menu shows the following options e Scan My System You can click this button to scan your computer for viruses and other malware by using the eScan Anti Virus Toolkit e Products You can click this button to view information about eScan or install it on your computer Note You can click the Info button to view the Quick Reference Guide for eScan in the PDF format Scan My System Products Browse CD Visit Website Contact Us Pero Wortp Autorun Menu e Browse CD You can click this button to view the contents of the
64. malicious code 9 Page 45 of 100 cro WoRLD o Delete all Attachment in eMail if disinfection is not possible You should select this check box if you need to delete all the e mail attachments that cannot be cleaned o Delete entire eMail if disinfection is not possible Default You should select this check box if you need to delete the entire e mail if any attachment cannot be cleaned o Delete entire eMail if any virus is found You should select this check box if you need to delete the entire e mail if any virus is found in the email or the attachmenit is infected gt 2E Advanced Scan Options Delete all Attachments in eMail if disinfection is not possible V Delete entire eMail if disinfection is not possible Delete entire eMail if any virus is found V Quarantine blocked Attachments V Delete entire eMail if any blocked attachment is found Quarantine eMail if attachments are not scanned Quarantine Attachments if they are not scanned Exclude Attachments Whitelist Pt po delete Ext The Advanced Scan Options Settings o Quarantine blocked Attachments Default You should select this check box if you need to quarantine the attachment if it is has an extension that is blocked by eScan o Delete entire eMail if any blocked attachment is found Default You should select this check box if you need to delete an e mail if it contains an attachment with an extension type that is blo
65. mask Default You should select this check box if you need the File Anti Virus monitor to exclude all the objects in the Exclude by mask list during real time monitoring or scanning You can add or delete a file or a particular file extension by double clicking the Add Delete option Not a virus list Default File Anti Virus is capable of detecting riskware Riskware refers to software that are originally not intended to be malicious but somehow can pose as a security risk to critical operating system functions You can add the names of riskware such as remote admin software to the riskware list in the Not a virus list dialog box by double clicking the Add Delete option if you are certain that they are not malicious The riskware list is empty by default Exclude folders Default You should select this option if you need File Anti Virus to exclude all the listed folders and sub folders while it is monitoring or scanning folders You can add or delete folders from the existing list of folders by clicking the Add Delete option Scan compound objects Default You should select this check box if you need eScan to scan archives and packed files during scan operations Enable code analyzer You should select this check box if you need eScan to scan your computer for suspicious objects or unknown infections by using the heuristic analyzer When this check box is selected File Anti Virus not only scans and detects infected object
66. n a tabbed page which contains the Live Chat eScan Online Help and the MicroWorld Forum buttons a Live Chat Requires Internet connectivity You can contact eScan s 24 x 7 online Technical Support team via chat either by clicking the Live Chat button or by visiting the following link http www escanav com english livechat asp A Page 96 of 100 IV 1cROWorLD Q eScan Online Help Requires Internet connectivity eScan Online Help is located on the MicroWorld s wiki It provides you with comprehensive information about eScan s products and features You can visit eScan Online Help pages either by clicking the eScan Online Help button or by visiting the following link http www escanav com wiki eScan Protection Center also provides you with context sensitive help If you need information on a specific feature while viewing the eScan Protection Center window you can press F1 This will open the relevant page of eScan Online Help Q MicroWorld Forum Requires Internet connectivity You can click this button to join on the MicroWorld Forum and read the discussion threads on eScan Password You can click this button to view the Change Administrator Password dialog You can use this dialog box to change the eScan administrator password for Protection Center Nn aN Change Administrator Password Enter New Password Confirm New Password The Change Administrator Password Dialog Box Pcro WorLD Page 97 o
67. n operation to the Monvir log file You can select this option to find out which files are not infected o Limit size to Kb You should select this check box if you need File Anti Virus to limit the size of the Monvir log file You can double click the size box and specify the size of the log file For quarantining of infected objects This option helps you specify the destination for storing quarantined objects By default the quarantined objects are stored in the C Program Files eScan Infected folder You can change the location of the destination folder if required Enable Auto backup Restore This option helps you back up the critical files of the Windows operating system installed on your computer and then automatically restore the clean files when eScan finds an infection in any of the system files that cannot be disinfected The following are some of the settings that you can use with this option o For backup of clean objects You can back up uninfected objects and store them in a given folder By default these objects are stored in the FBackup folder You can change the destination of the backed up objects if necessary o Do not backup files above size KB This option helps you prevent File Anti Virus from creating backups of files that are larger than the file size that you have specified o Minimum disk space MB This option helps you allot the disk space for storing log files Limit file size to KB This o
68. og box provides you with several scan options such as Scan spyware Check memory registry and services Scan USB drives Scan startup and Check local hard drives In addition you can select the Check following directories and files option to scan specific files and folders for malware In addition the Scan tabbed pane shows the following buttons 9 Page 81 of 100 cro WorLD Q Options You can configure Scan options by clicking the Options button This will display the Options dialog box which provides you with options for configuring the Scan module This dialog box has two panes Virus Check and Alert 1 Virus Scan This tab helps you configure the actions that eScan should perform when an infection is detected It allows you to set the priority of the scan process as High Normal or Low It also helps you configure eScan to automatically recognize either all file types or only program files a NaN FS Options Virus Scan Alert In the case of an infection Automatic gt Priority of scanner Normal normal runtime x File types Automatic type recognition The Virus Scan Tab In the case of an infection This list helps you configure the action that eScan should perform on the file when it finds that it is infected The actions are as follows e Log only When you select this option eScan only logs the occurrence of the virus infection without taking any action Pcro WorLD Page 82 of 10
69. on you can view the following reports Q View Quarantined Mails This button opens the View Quarantined Mails window which displays the list of quarantined e mails that have been quarantined by Anti Spam With the help of this window you can configure the following settings You can specify the path of the folder where you need to store the archived e mails and can also specify the format for storing e mails In addition you can view the contents of e mails add the sender s e mail id to the white list or add the reserve content of the selected e mail to the Hide E Mail List Q View Ham Mails This button opens the View Ham Mails window which displays the report of all the ham e mails identified by eScan and have been archived by Mail Anti Virus As in the case of quarantined mails you can specify the path of the folder where you need to store the archived e mails and can also specify the format for storing e mails a View Report This button displays the Report for the Anti Spam window This window displays the report for the Anti Spam module for a given range of dates in a tabular format when you click the Generate Report button A Page 69 of 100 IV 1cROWorLD Firewall Firewall is a security feature of eScan s Protection module It is designed to monitor all incoming and outgoing network traffic and protect your computer from all types of network based attacks eScan includes a set of predefined access control rules that you can
70. operating systems eScan 11 ensures that the computer on which it is installed has the latest hotfixes and updates installed on it Thus eScan prevents malicious software that A Page 8 of 100 IV 1cROWorLD exploit vulnerabilities in the operating system from infecting the computer and helps users protect their data from hackers and other security threats Enhanced Features eScan 11 includes several features that were a part of eScan 10 The enhanced features are as follows e Anti Virus Engine This engine is an intelligent malware detection engine that finds and cleans malicious software on the fly e Heuristic Scan Engine This engine detects unknown malicious software e Block Spam This feature helps you block unsolicited e mails from reaching your inbox e Block Attachment This feature helps you specify e mail attachment types that eScan should block automatically e Proactive Security This feature prevents unknown or suspicious applications from executing and compromising the security your computer e Firewall This feature prevents unauthorized access to or from any network It also includes the Network Traffic Monitor which provides a graphical representation of the incoming and outgoing network traffic on a real time basis e Auto download Updates This feature automatically downloads free updates from eScan update servers e Windows based Rescue Disk This feature helps you create a bootable rescue CD that could b
71. ords and phrases each of which is assigned a score or threshold The X Spam Rules Check technology matches X Spam Rules with the mail header body and attachments of each e mail to generate a score If the score crosses a threshold value the mail is considered as spam Anti Spam refers to this database to identify e mails and takes action on them e Enable Sender Policy Framework SPF check SPF is a world standard framework that is adopted by eScan to prevent hackers from forging sender addresses It acts a powerful mechanism for controlling phishing mails You should select this check box if you need Anti Spam to check the SPF record of the sender s domain However your computer should be connected to the Internet for this option to work e Enable Spam URI Realtime Blacklist SURBL check You should select this option if you need Anti Spam to check the URLs in the message body of an e mail If the URL is listed in the SURBL site the e mail will be blocked from being downloaded However your computer should be connected to the Internet for this option to work e Enable Realtime Blackhole List RBL check You should select this option if you need Anti Spam to check the sender s IP address in the RBL sites If the sender IP address is blacklisted in the RBL site the e mail will be blocked from being downloaded However your computer should be connected to the Internet for this option to work e RBL Servers RBL is a DNS server
72. ption enables you to set a limit size for the objects or files to be scanned The default value is set to 1024 Kb Enable Proactive Scan When you select this option File Anti Virus monitors your computer for suspicious applications and prompts you to block such applications when they try to execute Use sound effects for the following events This option helps you configure eScan to play a sound file and show you the details regarding A Page 37 of 100 IV 1cROWorLD the infection within a message box when any malicious software is detected by File Anti Virus However while you need to ensure that the computer s speakers are switched on Display attention messages When this option is enabled eScan displays an alert which displays the path and name of the infected object and the action taken by the File Anti Virus module 3 Block Files This tab helps you configure settings for preventing executables and files such as autorun inf on network drives USB drives and fixed drives from accessing your computer new _ File Anti Virus Settings Deny access of executables from Network Deny access of executables on USB Drives V Deny access of AUTORUN INF on USB and Fixed Drives V Deny Access of following files Quarantine Access denied files File Name Add esysdir EXE Remove All Default Cancel The Block Files tab A Page 38 of 100 M7 1cROWor LD This tab allows
73. roxy Settings Download via Proxy Clr pc te Logon Type C i Network Change Server Default The General Config Tab Select Mode You can select the mode for downloading updates from eScan update servers The available modes are FTP HTTP and Network Proxy Settings In this section you can configure the proxy settings for downloading updates via HTTP proxy or FTP proxy servers In both case you need to provide the IP address of the server the port number and the Pcro WorLD Page 88 of 100 authentication credentials In case of FTP servers you also need to provide the format for the user id in the Logon Type section Network This section is enabled when you select the Network mode for downloading updates You must specify the source UNC path in this section 2 After Update This tab helps you configure the actions that eScan should perform after Updater downloads the updates 2 bow Update Settings General Config After Update Scheduling Execute this Program after downloading updates Vv After Downloading updates make a Virus successfully List eos Zi Update Notification The After Update Tab After Downloading updates make a Virus List Default When you select this check box eScan automatically creates a virus list after the updates are downloaded successfully Execute this Program after downloading updates successfully When you select
74. rt the computer later Installation Completion Screen Note The Yes restart the computer now option is selected by default Alternatively you can choose to restart your computer later by clicking No I will restart the computer later and then clicking Finish The installation wizard will close without displaying any message cro Worp Page 25 of 100 Managing the License Key Note When you enter the new 30 character license key that you have received after purchasing or renewing the eScan license ensure that there are no spaces before in between or after the characters in the key For example ABCD EFGH ABCD EFGH ABCD EFGH ABCD EF After entering the key click Apply and then click OK Adding the Standard License Key 1 Click Start point to All Programs point to eScan for Windows and then click eScan Registration In the License Information window in the Enter License Key box enter the 30 character license key in capital letters and then click Apply In the Confirmation message box click OK Activating the License Key 1 In the License Information window select the license key that you have just entered and then click Activate Now Alternatively you can right click the license key displayed under the Standard Key 30 char tab and then click Activate Now Ensure that the Activate Now option is selected and then click OK Note If you have received the eScan Activation code via an e mail from
75. s by using the definitions or updates but it also checks for suspicious files stored on your computer 2 Options A Page 35 of 100 v IcRo WoRrLD This tab helps you configure the basic settings for the File Anti Virus module such as the maximum size of log files and the path of the destination folder for storing log files quarantined objects and report files ne File Anti Virus Settings Objects Options Block Files Folder Protection Save report file For quarantining of infected objects Enable Auto backup Restore Limit file size to KB O Enable Proactive Scan O Use sound effects for the following events Display attention messages Default Cancel The Options tab This tab allows you to configure the following settings Save report file You should select this check box if you need eScan to save the reports generated by the File Anti Virus module The report file logs information about the scanned files and the action taken by File Anti Virus when an infected file was found during the scan cro WoRLD 9 Page 36 of 100 o Show pack info in the report You should select this check box if you need File Anti Virus to add information regarding scanned compressed files such as ZIP and RAR files to the Monvir log file o Show clean object info in the report You should select this check box if you need File Anti Virus to add information regarding uninfected files found during a sca
76. s file to uncompress it The advantage of this feature is that it eliminates the need for an unzipping tool to be installed on the user s computer As a best practice you should select this check box to ensure that the receiver 9 Page 49 of 100 cro WoRLD can uncompress the attachment even when a decompression tool is not available Uncompress inbound attachments You should select this check box when you need eScan to automatically unpack compressed files in inbound attachments scan them and then deliver them to you Uncompress inbound attachments Local Domain This check box is disabled by default When you enable this check box it appears as selected You should select this check box when you need eScan to automatically unpack compressed files in inbound attachments scan them and then deliver them to the recipients in the local domain Do not compress files with extensions You can exclude specific file types within outgoing e mail attachments from being compressed by adding them to an excluded attachments list For example Excluding files that are already compressed such as ZIP files Compress Options This section contains options that help you configure the various parameters for compressing files These parameters include the percentage up to which the file should be compressed the minimum size of the files to be compressed and the compression ratio This section contains the following options o Compre
77. seconds Default 1 You can also ensure that the no other process runs while the specified process is running for a given time interval by setting the interval in the box Note The options in the Execute this Program after downloading updates successfully section are disabled by default Update Notification When you select this option eScan sends an e mail notification to the e mail address specified in the To box in the Update Notification section e From Default escanuser escanav com You can specify the sender s e mail address in the notification mail in this box e To You can specify the recipient s e mail address in the notification mail in this box 9 Page 90 of 100 cro WorLD e SMTP Server Default 127 0 0 1 You can specify the IP address of the SMTP server in this box e SMTP Port Default 25 You can specify the port number of the SMTP port in this box 3 Scheduling The Scheduler automatically polls the Web site for updates and downloads the latest updates when they are available You can also schedule downloads to occur on specific days or at a specific time new bw Update Settings General Config After Update Scheduling Automatic Download Query Interval 120 v minutes Schedule Download C c Z 7 of the month Change Server Default The Update Settings Tab Automatic Download Default You can configure the Update module to q
78. ss only if compression greater than Default 25 You use this setting to compress all e mail attachments up to 25 percent or more o Compress if Attachment size is above Kb Default 50 You use this setting to compress all e mail attachments that are larger than the specified size o Select the compression ratio Default Max Speed You can use this setting to specify the compression ratio and make optimum use of system resources You can configure Mail Anti Virus to compress files faster or up to the maximum possible compression level 3 Vulnerabilities Authors of malicious software often exploit vulnerabilities in Web browsers such as Internet Explorer IE and propagate malicious software to computers via e mail clients such as Microsoft Office Outlook and Microsoft Outlook Express eScan also includes proactive scanning features that protect your data from such vulnerabilities cro WoRLD 9 Page 50 of 100 Mail Anti Virus Settings Vulnerabilities II Archiving V Delete attachments with CLSID Extension 7 Delete HTML attachments with Scripts Default The Vulnerabilities Settings The following configuration options are available on this screen Delete attachments with CLSID Extensions Default This option is selected by default CLSID are hidden files that do not show the actual file extension If you select this option Mail Anti Virus deletes the attachments with CLSID file ext
79. t individuals and organizations have started raising concerns about the security of their data and personal information This self explanatory guide contains detailed information on eScan Anti Virus AV version 11 x x It is targeted at users customers software testers and individual users and aims at helping them use the product efficiently and effectively This guide is organized into three main sections the first section provides an overview of the new and enhanced features in eScan 11 the next section deals with the various elements of eScan s graphical user interface GUI and the last section discusses each modules of eScan 11 in detail These sections include detailed instructions and screen shots where necessary For any queries regarding eScan please write to support escanav com To contact our support team via Live Chat please visit the following link http www escanav com english livechat asp croWorLD 9 Page 5 of 100 Overview of eScan s Features eScan epitomizes the next generation of Anti Virus software products that handle security threats from a new dimension without compromising the performance of your computer It uses powerful technologies such as the MicroWorld Winsock Layer MWL technology Domain and IP Reputation Checker DIRC technology Non Intrusive Learning Pattern NILP technology and sophisticated Heuristics Algorithms to detect and clean malware In addition it includes a comprehensi
80. that lists IP addresses of known spam senders If the IP of the sender is found in any of the blacklisted categories the connection is terminated The RBL Servers list contains addresses of servers and sites that maintain information regarding spammers You can add or change addresses to this list as per your requirements e Auto Spam Whitelist Unlike normal RBLs SURBL scans e mails for names or URLs of spam Web sites in the message body It terminates the connection if the IP of the sender is found in any of the blacklisted categories This contains a list of valid e mail addresses that can bypass the above Spam filtering options It thus allows e mails from the whitelist to be downloaded to the recipient s inbox A Page 64 of 100 iv IcRo WoRrLD Note If you have a direct connection to the Internet the Enable Spam URI Realtime Blacklist SURBL check and Enable Realtime Blackhole List RBL check check boxes will be enabled Mail Tagging Options Anti Spam also includes some mail tagging options which are described as follows o Do not change email at all You should select this option when you need to prevent Anti Spam from adding the Spam tag to e mails that have been identified as spam o Both subject and body is changed Spam tag is added in Subject Actual spam content is embedded in Body This option helps you identify spam e mails When you select this option Anti Spam adds a Spam tag in the subject line and th
81. this check box eScan runs a particular application or program after eScan updates are downloaded successfully Ai Page 89 of 100 M7 1cROWorLD This section shows the following options e Program Name Sometimes you may need a particular program to run after you have downloaded updates for eScan You can simply specify the path of the program in the Program Name box Alternatively you can use the Browse button to navigate to the path where the program executable is stored e Start In You can also specify the program to execute from a given location You can either specify the location in the Start In box or use the Browse button to navigate to the folder where the program should execute e Parameters Some programs require additional parameters to execute You can specify these start parameters in the Parameters box e Run Default Normal Whenever a program runs it runs in its own window You can specify whether the window should be in the maximized minimized normal or hidden state The default state of the window is normal e Terminate the process forcibly You can also forcibly terminate the process to free system resources by selecting this option e Don t wait for process to complete A process may require a long time to end In such cases you can allow other processes to run along with the specified process by selecting this option e While this process is being executed suspend all operations for lt placeholder gt
82. top is in the Laptop Mode Virtual Keyboard eScan 11 provides users with a Virtual Keyboard that helps them avoid using their keyboard to enter confidential information This is highly useful because it has several security benefits Malware writers create malware because of their need to obtain a payload The payload for a password stealing Trojan may be the authentication information of a user s online banking account Malware often include keyloggers which are programs designed to capture the keystrokes on the computer on which they are installed Whenever a user fills in details such as user name or password on an online form the keylogger obtains this information and then sends it to the hacker The user interface of eScan s Virtual Keyboard simulates the user s keyboard and acts as a secure mechanism for the user to enter sensitive information such as credit card details and banking passwords without any fear of data theft due to keyloggers cro WORLD 9 Page 7 of 100 Enhanced Self Protection eScan 11 comes with the enhanced Self Protection feature that protects critical eScan files and folders from being deleted or modified Some new generation malware try to infect computers by deactivating the Anti Virus software running on them They try to achieve this by either disabling the Anti Virus software or by deleting critical files that are necessary for running the Anti Virus software The enhanced Self Protection f
83. toring all incoming and outgoing network traffic e Limited Filter You can click this button to enable the Limited Filter mode When the Firewall module is in this mode it monitors all incoming traffic and helps you allow or block traffic as per the defined conditions or rules e Interactive Filter You can click this button to enable the Interactive Filter mode When the Firewall module is in this mode it needs user intervention It monitors all A Page 71 of 100 1v 1cROWorLD the incoming and outgoing network traffic and allows or blocks traffic as per the user s choice e Block All You can click this button to block all the incoming and outgoing network traffic e Settings You can click this button to open the Firewall Settings dialog box which helps you configure the various firewall rules and settings These tabs are described as follows 1 Zone Rule This tab contains settings that help you configure network access rules that specify which IP address host name or IP range of computers can access your computer nao Firewall Settings Zone Rule Zone ie Expert Rule Application Rule Trusted MAC Address Local IP List Name IP Address Host Name Add Host Name Allow Local Network 192 168 0 1 192 168 254 254 IP Range Trusted Add IP Add IP Range Default Clear Alert Cache Show Application Alert Cancel The Zone Rule Tab This tab includes the following buttons
84. tware including Windows Firewall e Determine the largest free drive or partition and then install eScan on it e Additional tasks o Recommended MicroWorld recommends that the computer on which eScan is being installed is connected to the Internet during the installation process This will ensure that eScan downloads all the latest updates from eScan update servers o Optional Ensure that you know the IP address of the mail server to which eScan should send warning messages If authentication for the mail server is mandatory for accepting e mails you will need authentication user name and password to send e mails o Optional Ensure that the critical operating system and security patches are installed on the computer U For Renewal or Upgrade Installation e You should perform the same set of tasks that were performed while installing eScan for the first time Then you can upgrade to the newer version without uninstalling the existing version For Reinstalling After Uninstalling the Existing Version e If you have uninstalled an existing version of eScan you must restart the computer before you can reinstall it cro WoRLD 9 Page 12 of 100 Overview of eScan s Product Installation CD The eScan product installation CD comes with a set of installation setup files and a bootable Rescue Disk You can use the bootable Rescue Disk to boot your computer if the operating system cannot be loaded The Rescue Disk also inc
85. tware Services Pvt Ltd Plot No 80 Road 15 MIDC Marol Andheri E Mumbai India Malaysia MicroWorld Technologies Sdn Bhd Co No 722338 A E 8 6 Megan Avenue 1 189 Jalan Tun Razak 50400 Kuala Lumpur Malaysia Tel 91 22 2826 5701 Fax 91 22 2830 4750 E mail sales escanav com Web site http www escanav com Tel 603 2333 8909 or 603 2333 8910 Fax 603 2333 8911 E mail sales escanav com Web site http www escanav com South Africa MicroWorld Technologies South Africa PTY Ltd 376 Oak Avenue Block C Entrance from 372 Oak Avenue Ferndale Randburg Gauteng South Africa Tel Local 08610 eScan 37226 Fax 086 502 0482 International 27 11 781 4235 E mail sales microworld co za Web site http www microworld co za Page 99 of 100 Pcro WorrD USA MicroWorld Technologies Inc 33045 Hamilton Court East Suite 105 Farmington Hills MI 48334 3385 USA Germany MicroWorld Technologies GmbH Leopoldstr 244 D 80807 Munich Germany Page 100 of 100 Tel 1 248 848 9081 Fax 1 248 848 9085 E mail sales escanav com Web site http www escanav com Tel 49 0 89 20 80 39 223 Fax 49 0 89 20 80 39 226 E mail sales escanav de Web site http www escanav de 9 cro WoRLD
86. ty In addition you can configure On demand Scan to scan only program files or executable files a Logs You can view the reports of the scheduled On demand Scan scans performed on your computer and storage devices in the Logs dialog box A Page 85 of 100 IV 1cROWorLD Update The Update module automatically keeps your virus definitions up to date and protects your computer from emerging species of viruses and other malicious programs You can configure eScan to download updates automatically either from eScan update servers or from the local network by using FTP or HTTP Feedback Help Password License Information 7 e Scan Feedback Help Password License Information Anti Virus Edition 11 0 1139 797 Date of virus signatures 27 Aug 2010 13 45 ied S220 fy Update 4 Tools Configuration Last Database Updated 27 Aug 2010 13 45 Run Mode Automatic Update Now Settings Reports View Log Update You can access the tabbed page for the Update module from the Protection Center by clicking the Update button The Update tabbed page provides you with information regarding the mode of updation and date on which the database was last updated It also provides you with options for configuring the module and helps you view reports on the recent scans performed by the module cro WoRLD 9 Page 86 of 100 The tabbed page shows two sections Configuration and Reports These two sections are described as
87. uery and download the latest updates automatically from the MicroWorld Web site You can configure the query interval by using the following setting e Query Interval Default 120 You can set the interval after which eScan should query the Web site for latest updates Pcro WorLD Page 91 of 100 Schedule Download Default Daily You can also schedule downloads to occur on specific days or on a daily weekly or monthly basis In addition eScan also provides you with the facility of downloading updates at a specific time By default eScan downloads updates at 1 50 00 PM When you configure this setting the Scheduler checks the MicroWorld Web site for latest updates at the specified time and downloads them if they are available Change Server You can click this button to download updates from another eScan server LI Reports This section displays the following information e View Log When you click this link the View Update Log window is displayed This window displays the latest activity report for the Update module This report includes the following information Q The timestamp session description and host name or IP address Q The description of the file such as the result of the download the name of the object and its size Q The description of the event such as the number of files downloaded the time at which the connection was established or terminated and the errors if any Pcro WorLD Page
88. ve Attachments check box because the Attachments Archive Directory box is disabled by default The default path for storing archived e mail attachments is UserProfile Application Data MicroWorld eScan Archive Attachments At times you may not require e mail attachments of a specific file type In that case you can excluded certain file types such as VCF HTM and HTML from being archived by adding them to the Do not Archive attachments of type list Notification You can click this button to open the Notification Settings dialog box which helps you configure the notification settings for the Mail Anti Virus module By configuring this module you can send e mails to specific recipients when malicious code is detected in an e mail or e mail attachment This dialog box helps you configure the notification settings for sending alerts and warning messages to the senders or recipients of an infected message A Page 55 of 100 IV 1cROWorLD neo K Notification Settings n Warning Notification Settings Virus Alerts gt Warning Mails From To V Show Alert Dialog box escanuser escanav co postmaster Delete Mails From User M Attachment Removed Warning To Sender v Attachment Removed Warning To Recipient vV Virus Warning To Sender W Virus Warning To Recipient Content Warning To Sender W Content Warning To Recipient Lines starting with are comment lines This file specifies warning sent to Mai Sen
89. ve set of powerful management tools such as the eScan Management Console EMC and eScan Protection Center ePC These tools help you configure eScan to safeguard your data and computers based on your requirements New Features in eScan 11 eScan 11 includes several improvements over its predecessor in terms of its user interface performance resource utilization and data protection features These new features are described as follows New Trendy GUI eScan 11 has a trendy new GUI that is extremely simple and easy to use It is elegant in terms of its design and is well suited to the needs of both expert and novice users The new GUI is extremely light on system resources and requires very less memory space to run efficiently It thus provides the user with a secure and pleasant computing experience without compromising on the performance of the computer L Product Installation CD with Bootable Rescue Disk eScan 11 s product installation CD comes with a set of installation setup files and a bootable Rescue Disk The bootable Rescue Disk enables the user to clean boot the computer if the operating system fails to load on it When the user boots the computer by using the Rescue Disk the eScan Anti Virus Toolkit formerly MWAYV scans and cleans the computer s memory registry startup folders system folders and drives of viruses and spyware L Gaming Mode eScan 11 includes a Gaming Mode which provides an uninterrupted gamin
90. ving e mails 1 Scan Options This tab allows you to select the e mails to be scanned and action that should be performed when a security threat is encountered during a scan operation A Page 44 of 100 iv 1cROWorLD new Mail Anti Virus Settings Scan Options 1 Compression Decompression Options Vulnerabilities Vulnerabilities II Archiving Block Attachments Types Ass COM EXE Advanced HTA 15 Port Setting Mail Server Settings 127 0 0 1 SMTP Port 25 User Authentication Opt Authentication Password SMTP Mail Server Action Disinfect C Delete M Quarantine infected Files Quarantine Path C Program Files eScan c Browse Port Settings for eMail Outgoing Mail SMTP Incoming Mail POP3 Scan Outgoing Mails Opt Default Cancet The Scan Options Settings The Scan Options tab helps you configure the following settings Block Attachments Types This section provides you with a predefined list of file types that are often used by virus writers to embed viruses Any e mail attachment having an extension included in this list will be blocked or deleted by eScan at the gateway level You can add file extensions to this list as per your requirements As a best practice you should avoid deleting the file extensions that are present in the Block Attachments Types list by default You can also configure advanced settings required to scan e mails for
91. you to configure the following settings Deny access of executables from Network You should select this check box if you need to prevent executables on your computer from being accessed from the network Deny access of executables on USB Drives You should select this check box if you need to prevent executables stored on USB drives from being accessed Deny access of AUTORUN INF on USB and Fixed Drives You should select this check box if you need to prevent executables from USB and fixed drives from being accessed Deny Access of following files You should select this check box if you need to prevent the files in the list from running on your computer Quarantine Access denied files You should select this check box if you need to quarantine files that have been Access denied You can prevent specific files from running on your computer by adding them to the Block Files list By default this list contains the value Ysysdir EXE 4 Folder Protection This tab helps you protect specific folders from being modified or deleted by adding them to the Folder Protection list It allows you to configure the following setting Protect files in following folders from modification and deletion Default This option is selected by default You should select this check box if you need the File Anti Virus module to protect files in specific folders from being modified or deleted A Page 39 of 100 v 1cROWorLD nao as F
92. ys information regarding the rules that has been invoked and applied by the firewall These rules may include application rules expert rules zone rules and Trojan rules A detailed report includes information about the rules regarding the network activities and shows data in the form of graphs and charts View Report You can click this button to open the Report for Firewall window This window displays the report for the Firewall module for a given range of dates in a tabular format when you click the Generate Report button A Page 78 of 100 IV 1cROWorLD 000 Report For Firewall From 03 Aug 2010 z 02 Sep 2010 pareten name Daten eroten SowrceP bestaren Drecton_ ston __ Pan oas 9 1 2010 6 40 01 PM TCP 204 203 18 15 192 168 0 25 hemag Blocked sy The Report For Firewall Window Page 79 of 100 IV 1cROWor LbD Scan The Scan module helps you perform on demand scans on files folders storage devices and the registry and schedule automatic scans It checks your computer for security threats such as viruses spyware and other malicious software and creates logs of all scan operations Feedback Help Password License Information 7 e Scan Anti Virus Edition 11 0 1139 797 Date of virus signatures 27 Aug 2010 13 45 Last computer scan NotyetScanned edison guia Qi Toos Scan computer Scan USB Drives Scan CD ROM p Custom Scan Options

Download Pdf Manuals

image

Related Search

Related Contents

Ultron SATA 2 Port PCMCIA CardBus US-200  FOAM-M01PF・M01PS・M01FU取扱説明書【PDF1.16MB】    

Copyright © All rights reserved.
Failed to retrieve file