Home
        Welcome to Dr.Web® Enterprise Security Suite
         Contents
1.           VL     oe    33  Dr WEB        Enterprise Security Suite       Administrator Manual       Doctor Web  2015  All rights reserved    This document is the property of Doctor Web  No part of this document may be reproduced  published or  transmitted in any form or by any means for any purpose other than the purchaser s personal use  without proper attribution     TRADEMARKS   Dr Web  SpIDer Mail  SpIDer Guard  CureIt   CureNet   Dr Web AV Desk and the Dr WEB logo are  trademarks and registered trademarks of Doctor Web in Russia and or other countries  Other  trademarks  registered trademarks and company names used in this document are property of their  respective owners     DISCLAIMER   In no event shall Doctor Web and its resellers or distributors be liable for errors or omissions  or any loss  of profit or any other damage caused or alleged to be caused directly or indirectly by this document  the  use of or inability to use information contained in this document     Dr Web Enterprise Security Suite  Version 10 0   Administrator Manual  23 11 2015    Doctor Web Head Office  2 12A  3rd str  Yamskogo polya  Moscow  Russia   125124    Web site  www drweb com  Phone   7  495  789 45 87    Refer to the official web site for regional and international office information     Doctor Web    Doctor Web develops and distributes Dr Web   information security solutions which provide  efficient protection from malicious software and spam     Doctor Web customers can be found among
2.         etc  lt argument gt      path to the etc Server folder  used to search root certificates and update  public keys         archive     archive the repository        key  lt argument gt      path to the license key file  the key file or its MD5 hash must be specified         key md5  lt argument gt      MD5 hash of the license key  the key file or its MD5 hash must be  specified         product  lt argument gt      updated product  By default  entire repository is downloaded        only bases     download only virus bases         update url  lt argument gt      GUS servers folder where updates of Dr  Web products are located  it  is recommended to leave default value          servers  lt argument gt      GUS servers addresses  it is recommended to leave default value          prohibit cdn     deny CDN usage when downloading updates  by default is off  i e  CND is  used          prohibit ss1     use insecure HTTP instead of HTTPS  by default is off  i e  HTTPS is used        cert mode   lt argument gt       automatically accept HTTPS certificates     The  lt argument gt  may take one of the following values   e any     accept all certificates     e valid      accept only valid certificates   e drweb     accept only Dr Web certificates     187    ras  9     Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Components    The drweb value is used by default         proxy host  lt argument gt      proxy server specified in the following format   lt server g
3.       Audit of administrator operations allows to log operations of administrator with Dr Web  Security Control Center and writing the log into the DB        Audit of server internal operations allows to log Dr Web Server internal operations and writing  the log into the DB       Audit of Web API operations allows to log operations via XML API     H To view the audit log  select the Administration option in the main menu  then Audit log item in  the control menu     The Security tab contains additional tabs on which you can set the restrictions for the correspondent  types of connections     e Agents   the list of limitations on IP addresses from which Dr Web Agents can connect to this  Server       Installations     the list of limitations on IP addresses from which Dr Web Agents installers can  connect to this Server    e Neighbors     the list of limitations on IP addresses from which neighbor Dr Web Servers can  connect to this Server       Discovery service     the list of limitations on IP addresses from which broadcast queries can be  received by the Server Detection Service        To set access restrictions for any type of connection     1  Go to the correspondent tab  Agents  Installations  Neighbors or Discovery service    2  To allow all connections  clear the Use this ACL flag    3  To specify lists of allowed or denied addresses  set the Use this ACL flag    4      To allow the access from a specific TCP address  include it into the TCP  Allowed or TCPv  6   Allo
4.      2  Prefix 8 stands for a network with a network mask  255 0 0 0  Containing up to 16387064 addresses  256 256 256      Host addresses look like  125          Besides  you can delete addresses from the list and edit the addresses included into the list   Addresses that are not included into any of the lists are allowed or denied depending on whether the  Denial priority flag is set  If the flag is set  the Denied list has a higher priority than the Allowed    list  Addresses not included in any of the lists or included into both of them are denied  Allowed only  addresses that are included in the Allowed list and not included in the Denied list     6 2 1 5  Location    In the Location section  you can specify additional information about the physical location of the  workstation     Also on this tab you can view the station location on a geographical map     Ta  J  i    ax        Chapter 6  Administration of Workstations   89    To view the station location on a map     1     In the Latitude and Longitude fields  specify the station geographical coordinates in the Decimal  Degrees format     Click Save to save specified data     On the Location tab  the OpenStreetMaps preview will be shown containing a mark according to  the specified coordinates     If the preview cannot be loaded  the Show on map text displays     To view the full size map  click the preview or the Show on map text     6 2 2  Installed Components of the Anti Virus Package    Components    To check which
5.      As for separate group so and for several selected groups  you can launch  view and stop scan tasks on  stations  included to this group  In the same way  you can view statistics  including infections  viruses   start stop  scan and installation errors and etc  and summary statistic for all workstations of the group  or several groups     e Settings the single parameters for stations via the group  to which these stations are included  see p   Using Groups to Configure Stations         e Order  structure  the list of workstations     It is possible to create nested groups     5 1  System and User Groups    System Groups    Dr Web Enterprise Security Suite has an initial set of preinstalled system groups  These groups are  created during the installation of Dr Web Server and may not be deleted  Still the administrator may  disable their display  if necessary     Each system group except Everyone contains a set of feature packed subgroups     After the Server has been installed  until no station connected  the list of system groups displays  the Everyone group only  To display all system groups  use the Show hidden groups option in  the Settings of tree view section of the toolbar     Everyone group    Group contains all stations known to Dr Web Server  The Everyone group has default settings     Configured    Group contains stations which have personal settings specified     Operating system    This category of groups represents the operating systems under which the statio
6.      News of Doctor Web    On the Doctor Web News tab  specify a list of languages for the news feed     You can configure subscription settings on news lines at the Preferences     Subscription section     You can read news of Doctor Web company in the main menu of the Control Center  in the Q  Help      News section     Languages of Dr Web Agent for Windows    On the Dr Web Agent for Windows languages tab  specify languages for the Agent and the anti   virus package interface of Windows OS  which will be downloaded from the GUS     7 8 4  Detailed Repository Configuration    The Detailed repository configuration section provides you with options to configure revision for  each repository product separately     To edit repository configuration    1  Select the Administration item on the main menu of the Contro  Center     2  In the opened window  select in the Detailed repository configuration subsection of the control  menu  the item  which corresponds to the product you want to edit     3  Configure all necessary repository settings for the selected product  described below     Click Save and reload from disk on the toolbar to save all your changes  At that  the current  version of the repository is reloaded from the disk  see also Repository state      Revision List    On the Revision list tab  you can view information on all revisions available on the Server for this  product     The table of revisions contains the following columns     Distributed Automatic marker in th
7.      Some examples of specifying excluded paths through regular expressions are given  below       qr   pagefile  sys  i  skip scanning Windows NT swap files      qr   notepad  exes i     skip scanning notepad  exe files      qr  C  i    skip scanning disk C      qr      WINNT   i     skip scanning WINNT catalogs on all disks     qr   C           WINNT     i     skip scanning disk c and WINNT catalogs on all disks    qr  C   dirl  dir2  file  ext  i    skip scanning the c  dirl dir2 file ext file       qr  C   dirl  dir2          file  extS i     skip scanning file ext  if it is located in  the c  dirl dir2 catalog and its subcatalogs      qr  C   dirl  dir2   i    skip scanning c  dirl dir2 and its subcatalogs      qri dir       i     skip scanning the dir subcatalog located in any catalog  but scan its  subcatalogs       qr dir   i     skip scanning the dir subcatalog located in any catalog and its subcatalogs           Regular expressions briefly described in the Appendices document  in the Appendix J  Regular  Expressions Used in Dr Web Enterprise Security Suitesection        In the Scan contents of the following files subsection  you can disable the check of compound  objects  For this  clear the following flags    e The Archives flag instructs the Scanner to search for viruses in files within archives      The Email files flag instructs to scan mailboxes     e The Installation packages flag instructs the Scanner to search for viruses in packages for  program installatio
8.     Network Scanner provides the following functions       Scan  browse  the network for workstations   e Detect Dr Web Agents on stations        Install Dr  Web Agent on the detected stations as instructed by the administrator  Dr  Web Agent  installation is described in detail in the Installation Manual  p  Installing Dr Web Agent Software    via Dr Web Security Control Center        To scan  browse  the network  perform the following actions     1  Open the Network Scanner window  select the Administration item in the main menu of  Dr Web Security Control Center and in the opened window  select the Network Scanner item  in the control menu  The Network Scanner window will be opened     2  Set the Search by IP addresses  flag to search for stations in the network by specified IP  addresses  In the Networks field specify networks in the following format     e with a hyphen  for example  10 4 0 1 10 4 0 10    separated by a comma with a whitespace  for example  10 4 0 1 10 4 0 10  10 4 0 35   10 4 0 90    e with a network prefix  for example  10 4 0 0 24      3  For Windows OS  set the Search in Active Directory flag to search for stations in the Active  Directory domain  At this  specify the following parameters     e Domains   domains list in which stations are searched  Use comma to divide several domains   e Active Directory controller   Active Directory controller  e g   dc example com     To be able to search stations in the Active Directory domain via the Network Scann
9.     Ta     i    ax       Chapter 1  Welcome to Dr Web   Enterprise Security Suite   22    General distribution kit performs the installation of Dr Web Server itself and includes anti virus  protection packages for stations under Windows OS only     2  Extra distribution kit   includes distributions of all enterprise products  which are provided for  installation on protected stations under all supported OS     The package is installed as an additional on a computer with Dr Web Server general distribution kit  installed     A Extra distribution kit must be installed from the same type of package as a general distribution kit     Dr Web Server general distribution kit contains the following components       Dr Web Server software for the respective OS      Dr Web Agents software and anti virus packages software for supported OSs     Dr Web Security Control Center software    e Virus databases      Dr Web Security Control Center extension      Dr Web Server FrontDoor extension    e Manuals  templates  and examples     In addition to the distribution kit  serial numbers are also supplied  Having registered these serial  numbers one can get files with a Server key and an Agent key     1 6  Licensing    Rights to use Dr Web Enterprise Security Suite are regulated by the license key file     Key files have a write protected format based on the mechanism of electronic signature  Editing the  file makes it invalid  Therefore it is not recommended to open your key file with a text edit
10.     The constant file system protection in the real time mode  Checks all launched processes and  also created files on hard drives and opened files on removable media     98    Ta  J  1       ash        Chapter 6  Administration of Workstations   99    SplDer Gate    Checks all calls to web sites via the HTTP protocol  Neutralizes malicious software in HTTP  traffic  for example  in uploaded and downloaded files  and blocks the access to suspicious or  incorrect resources     Quarantine  Isolates malware and suspicious objects in the specific folder     wy Other components settings of which are given in the Control Center for stations under UNIX  system based OS  are additional and serve for internal configuration of anti virus software operation     Stations under OS X    Dr Web Scanner  Dr Web Agent Scanner    Scans a computer on user demand and according to the schedule  Also the remote launch of  anti virus scan of stations from the Control Center is supported     SplDer Guard    The constant file system protection in the real time mode  Checks all launched processes and  also created files on hard drives and opened files on removable media     Quarantine  Isolates malware and suspicious objects in the specific folder     Mobile devices under Android OS  Dr Web Scanner  Dr Web Agent Scanner    Scans a mobile device on user demand and according to the schedule  Also the remote launch  of anti virus scan of stations from the Control Center is supported     SplDer Guard    
11.     The detected station is registered in the DB  bus it is not active and the port is closed     You can also unfold catalog items corresponding to computers with the    or   icon  and check  which program components are installed there     Click the    icon of component at the station  connected to this Server  to open component settings  window   Interaction with Dr Web Agent    The Network Scanner tool has been included in Dr Web Enterprise Security Suite starting from  version 4 44     Ta     1       ax       Chapter 2  Components of an Anti Virus Network and Their Interface   47    wy Network Scanner can detect Agents of version 4 44 and older but cannot interact with Agents  4 33     Dr Web Agents 4 44 and older installed on protected stations process respective calls of Network  Scanner received at a certain port  By default port udp 2193 is using  but also port udp 2372 is  supported for compatibility with older versions  Correspondingly  it is the default port offered by the  Scanner to call at  Network Scanner decides whether there is an Agent on the workstation based  on the assumption of the possibility to exchange information with the station  request response   through the specified port       If the station is forbidden  for example  by a firewall  to accept packages at udp 2193  the Agent  will not be detected and consequently Network Scanner considers that there is no Agent installed  on the station     Quick Scan    If the Quick scan option is enabled  the 
12.     gt   ig Peers  0   a   Children  1   fg AUXILIARY  am Al  1   lg AUXILIARY          Figure 7 3     7  Wait until the connection between Servers is established  usually it takes not more than a minute    Press F5 from time to time to update the Servers list  After the Servers have been connected  the  child Server  AUXILIARY  will move from the Offline folder to the Online folder  see Figure 7     4         fig Dr Web Server   gt   ig Offline  0   a Online  1   jg AUXILIARY   gt   iy Parents  0    gt   ig Peers  0   ai Children  1   F AUXILIARY  4a All  1   fg AUXILIARY          Figure 7 4     8  Open Dr Web Security Control Center of the child Server  AUXILIARY  to make sure that the  parent Server  MAIN  is connected to the child Server  AUXILIARY   see Figure 7 5         fig Dr Web Server   gt   iy Offline  0   a Online  1   ig MAIN  4  Parents  1   ig MAIN   gt   ig Peers  0    gt   ig Children  0   4  All  1   ig MAIN          Figure 7 5     You may not connect several Servers with the same pare of parameters  password and the  drwcsd  pub public key     Ta  J  1       ax       Chapter 7  Configuring Dr Web Server    H For peer to peer connections between Servers  it is recommended to set Server address in the  settings for one of them only     It will not take effect on the Servers interconnection  but allows to avoid messages like Link with  the same key id is already activated in the Servers log files     Connection between two Dr Web Servers can be failed because 
13.    Events section    e Preferences section    e Help section      Logout to close the current Dr Web Security Control Center session        If automatic authorization in Control Center is enabled  after clicking Logout  information about  administrator s login and password is deleted     At next logon in the Control Center  it is necessary to repeat standard authorization procedure with  specifying login and password  If automatic authorization is enabled  specified login and password  are saved for the current web browser and authorization in Control Center become automatic   without login and password confirmation  till next Logout clicking              3 Dr  WEB Adr stratior Anti virus Network Neighborhood a admin      Logout  Administration  gt  Administrators    Man neni SEVENTEEN Help  gt   Y Administration REX    Edit administrative account   Save    Dr Web Server   a  y  amp  Administrators General  s License manager  2 42 Administrators Login  Gdmin     Encryption keys    admin   gt  Gg Newbies First name  Middle name  Last name  Interface language English y   Date format DD MM YYYY HH MM SS y    gt   Last address tep   192 168 238 1 54521  Creation date 2014 09 11 20 01 59    Dr Web Server configuration Modification date 2014 12 19 20 45 51     Dr Web Server remote access  PEF Description Default administrator account     Dr Web Server Task Scheduler  e Web Server configuration  e User hooks  v Installations 7  EA N Permissions  AA PS peee Permissions Inheritance en
14.    Ta  J  N    ax       Chapter 2  Components of an Anti Virus Network and Their Interface   50    8  Edit Licenses Donated to a Neighbor Server        View Information About a License    To view the summaries about the license key  in the main pane of the License manager  select the  key record to view the detail information  click the key record name   In the opened pane you can view  the following information    e the owner of the license      the dealer  who sold the license      identification and serial numbers of the license    e license expiration date      Inclusion of the Anti spam component    e number of stations to license by this key file    e MDS hash of the license key    the list of anti virus components which are allowed to use by this license     Add a New License Key    To add a new license key   In the main pane of the License Manager  click  F add key on the toolbar     On the opened panel  click bS  and select the license key file   Click Save   The license key will be added to the keys tree but not assigned neither to one of the objects  In this    case  to specify licensing objects  perform the Change the License Key or Extend the List of Object  License Keys procedures described below     pee Ss re    Update the License Key    In updating a license key  the new license key is assigned for the same licensing objects  for which the  updated one was assigned     Use the updating key procedure to replace expired key or to replace with a key with other se
15.    Ta  J  N    ax       Chapter 7  Configuring Dr Web Server      It is allowed to create hybrid structure that combines both cluster of the Servers and hierarchical  structure based on interserver connections  At this  on of the Servers  may be either the Server  within a cluster or not included into a cluster  is assigned as a parent and receives updates from  the GUS  Other Servers of a cluster are the child hosts and receive updates from the parent  Server via the interserver connections     If Servers of a cluster are configured to receive updates from the local zone  GUS mirror  or from  the parent Server  it is necessary to track functionality of this zone of the parent Server  If a host  that distributes updates is denied of service  it is necessary to reconfigure one of the other Servers  to operate as a parent Server or create a new update zone to receive updates from the GUS  correspondingly     Features of licenses distribution for the stations  To distribute licenses between Servers of a cluster  you can use the following approaches     a  Create hybrid structure that combines both cluster of the Servers and hierarchical structure  based on interserver connections  Such structure is useful if for serving the Agents within  Servers cluster system  the dynamic allocation of stations between Servers of a cluster is  performed  In this case  the necessary number of licenses are propagated from a parent Server   may be either the Server within a cluster or not include
16.    The task is designed to restart the Server    No additional parameters required to run the task    The task is designed to run custom program    Specify the following parameters    e The Path field   full name  with the path  of the program executable file to run   e The Arguments field   command line parameters to run the program     e Set the Run synchronously flag for the synchronization with Server     wait while  task finishes before executing other tasks with Run program type  If the Execute  synchronously flag is cleared  the Server logging only the start of the program  If  the Execute synchronously flag is set  the Server logging the start of the  program  the returned code and the time of the program end     The task is designed to send arbitrary message to users of a station or group of  stations        145    Ta     1       ax         Shut down Dr Web  Server    Station has not    connected for a long  time    Synchronization  with Active Directory    Update repository  Wake stations    Write to log file    Chapter 7  Configuring Dr Web Server    A message settings are given in the Sending Notifications to Users section        The task is designed to shut down the Server   No additional parameters required to run the task     The task is designed to issue notifications in case the stations have not been connected  to the current Server for a long time     Notifications display settings can be configured in the Notification Configuration section  using the Stati
17.    a  To exclude the application from the check  specify the path to the executable file of this  application     b  Only one excluded application is specified in each field  To add one more element to the list   click Bam    c  To remove an application from the exclusions list  click     next to the item of the list that  corresponds to this application    After you configure all necessary settings  click Save to apply the changes on the station        105    Ta  J  1       ax       Chapter 6  Administration of Workstations   106    wy The Application filter of the SpIDer Mail component can be configured on Dr Web Server only   Corresponding settings are not provided at the station     10  Configure the mail client at the station to support the manual interception mode by the SpIDer  Mail component     Configuring Mail Clients  If the SpIDer Mail configured to manual intercept connections with mail servers  change the settings  of a mail client on the station as the following     1  Set the addresses of the incoming and outgoing mail servers as localhost     2  Set the mail server port to the Sp Der Mail port number that you assigned to the corresponding mail  server     Usually  you need to specify the following in the mail server settings   localhost  lt Sp Der_Mail_port gt   where  lt Sp Der_Mail_port gt  is the number that you assigned to the mail server     For example    If you assigned the 7000 SplDer Mail port to a mail server that uses the 110 port and the pop mail 
18.    iPhone    Apple   iPad    e Android OS   Operating system Android 4 0 and later  The NAP requires   For Server    e Windows Server   2008 OS     For the Agents  e Windows XP SP3 OS  Windows Vista OS  Windows Server 2008 OS     Dr Web Agent and the full anti virus package require     Requirements are differ depending on the operating system on which anti virus solution is installed  the  full list of supported OS see in the Appendix A  The Complete List of Supported OS Versions      e Windows OS        CPU 1 GHz CPU or faster    Free RAM Not less than 512 MB    Free disk space 1 GB for executable files   extra disk space for logs and temporary files    Other iL  A Agent for Windows context help requires Windows   Internet Explorer   6 0  or later     2  For Dr Web for Outlook extension the the Microsoft Outlook client from the Microsoft  Office package is required         Outlook 2000  Outlook 9      Ta     ww    ax        Chapter 1  Welcome to Dr Web   Enterprise Security Suite   21      Outlook 2002  Outlook 10 or Outlook XP      Office Outlook 2003  Outlook 11      Office Outlook 2007  Outlook 12      Office Outlook 2010  Outlook 14      Office Outlook 2013  Outlook 15      e Linux system based OS     CPU 32 bit  IA 32  x86  and 64 bit  x86 64  x64  amd64  Intel platforms    Free RAM Not less than 512 MB    Free disk space Not less than 400 MB of free disk space on a volume on which Anti virus folders are  placed     e OS X  configuration requirements coincide with the r
19.   Administration of Workstations    6 4 2  Managing Dr Web Agent for Windows      To view and edit the configuration of Dr Web Agent on the station under Windows OS     1  Select the Anti virus network item in the main menu of the Control Center    2  Click the name of the station or group in the hierarchical list of the opened window   3  Click the Configuration  gt  Windows  gt  Dr Web Agent item in the control menu   4  A window with Agent settings will be opened     Any changes incompatible with the Server settings  for example  changes of the encryption and  compression modes  will result in disconnection of the Agent from the Server     5  If any changes in the Agent settings are made via Dr Web Security Control Center  click Save  to accept the changes     6 4 2 1  General    On the General tab  you can set the following parameters of the Agent       In the Task Scheduler startup delay  min   filed  specify the time interval between start of the  OS and execution of the startup scan task  if it was scheduled for the Agent  The 1 minute delay is  by default  Set the 0 value to perform the scan task without any delay  i e  immediately after the start  of OS        In the Period of statistics sending  min   field  specify the value of the time interval in minutes  for the Agent to send to the Server all statistics data  collected by the SpIDer Guard  SpIDer  Mail and SpIDer Gate components at the station  Specify the 0 value to desable statistics sending         In the La
20.   Main controls are placed on the main menu  the control menu and the toolbar  see Dr Web Security  Control Center      Ta  J  i    ax       Chapter 3  Getting Started  General Information   58    Connecting of Dr Web Agent    After the Agent has been installed on a workstation via the installation package  see Installation  Manual  p  Installation Files   it will try to establish a connection with the Server     With default Server settings new workstations should be approved by an administrator to be registered  at the Server  for more about the policy of connecting new workstations  please refer to p   New Stations Approval Policy   In this mode new workstations are not connected automatically  but  placed by the Server into the newbies group  see p  System and User Groups            Anti Virus Software Installation    Installation of other software components  of Agent and anti virus package  is proceeded without  administrator intervention     Anti virus components  specified at the primary group settings  are installed on the station  for more  details see Installing Components of the Anti Virus Package         To finish the installation of some components for anti virus workstations you will need to restart the  computer  In this case  there will appear a red exclamation mark over Dr Web Agent icon in the  Taskbar  see also Dr Web Agent      3 2  Setting the Network Connections    General Information    The following clients are connected to Dr Web Server       Dr Web 
21.   PAM authentication under UNIX system based OS is performed by using pluggable authentication  modules   To configure PAM authentication parameters  you can use one of the following ways        Configure authentication methods via the Control Center  in the Administration      Authentication     PAM authentication section     e The auth pam xm1 configuration file located in the etc folder of the Server  Configuration file  example is      lt     Enable this authorization module    gt      lt enabled value  no    gt    lt     This authorization module number in the stack    gt    lt order value  50    gt    lt     PAM service name gt      gt    lt service name  drwcs    gt    lt     PAM data to be queried  PAM stack must return INT zero non zero    gt      lt admin flag mandatory  no  name  DrWeb ESuite Admin    gt     Description of PAM authentication parameters which are configured at Dr Web Enterprise Security Suite side       Use PAM sSnabled gt  valne yes   no Flag that defines whether the PAM authentication  authentication method is used   flag  Use Bragiand Drop   ao    velue positive Serial number of PAM authentication if several  integer  authentication methods are used   coordinated  with other  methods  values    Service name ee Ce  Boe   Service name which is used to create PAM    field context  PAM can read politics for this service  from the  etc pam d  lt service name gt  or from  the  etc pam  conf  if the file does not exist     If the parameter is not set  n
22.   select the necessary object   in the tree     To compare hardware and software of several stations     Select the Anti virus Network item in the main menu of the Control Center     In the hierarchical list of anti virus network  select several stations or groups of stations  To view  the comparison page  you must select two of more stations under Windows OS     In the control menu  in the General section  select the Comparison of hardware and software  item     In the opened window  the following information is available   e the free with the list of hardware and software   e comparison table for the selected stations     To display comparing data  select necessary item in the tree of hardware and software  All available  values of the selected item will be displayed in the comparison tree     90    Ta     1       aX        Chapter 6  Administration of Workstations    6 3  Management of Workstation Configuration    6 3 1  Permissions of Station Users    To edit users permissions via Dr Web Security Control Center for administrating the  anti virus package     1     N    w       In the main menu  select Anti virus network  then click the name of a workstation in the   hierarchical list of the opened window  In the opened control menu  select Permissions    Permissions configuration window opens    You can edit permissions on tabs that correspond to the workstation operating system  To change    allow or deny  any of permissions  set or clear the flag for this permission    T
23.   start    Dr Web Server 26 29    station    adding to a group 77    administration 83  approving 83    configuration  inheriting    newbie 83  100    removing from a group    scanning 92  106   settings  propagation   statistics 114   unapproved 83  statistics   station 114    synchronization    198    83    77    80    77    82    Ta  J  i    ax       Index    synchronization  components 183    system requirements 17    T   traffic  composition 55  compression 129  encryption 129    U    unapproved stations 83  update   restrictions 188  update restrictions 188  updating   Agent 189  anti virus network 177  Dr Web ESS 181  force 183  manual 183  mobile mode 189  notifications 159  scheduled 183    199       Doctor Web  2015    
24.   the RAM     192    Ta     i    ax       Chapter 9  Configuring the Additional Components   193    4  Proxy server rotate the list in the RAM and moves Dr Web Server from the first position to the    end of list     Proxy Server does not save changed order of Servers to its configuration file  After restart of  Proxy server  the list of Dr Web Servers is loaded to the RAM in original version  which is stored  in the configuration file     5  When the next Agent connects to the Proxy server  procedure is repeated from the step 2     6  If the Dr Web Server disconnects from the anti virus network  e g   gets offline or denies of  service   the Agent connects to the Proxy server repeatedly and procedure is repeated from the  step 2        Network scanner which is launched from an external network  in respect to the Agents  is unable to  locate the installed Agents     If the Replace NetBios names flag is set and anti virus network contains the Proxy server  when  for all stations connected to the Server via the Proxy server  in Dr Web Security Control  Center  the name of computer on which the Proxy server is installed  will be shown instead of  stations names     Traffic Encryption and Compression    Proxy server supports traffic compression  Transferred data is processed regardless of whether traffic  is compressed or not     Proxy server does not support traffic encryption  It analyzes transferred data and if traffic between  Dr Web Server and Agent is encrypted  Proxy serve
25.   which Dr Web Server is operated     The General section contains the following parameters    e The Last DB maintenance field   the date of last execution of the database maintenance  commands from this section      The list of commands to maintain the database which includes     e Commands similar to the tasks from Dr Web Server schedule  The names of commands  correspond to the names of tasks in the Action section of the Server schedule  description of  corresponding schedule tasks is given in the Tasks types and their parameters table     e The Analyse database command  It is designed to optimize the Server database using the  analyze command        To execute database maintenance commands  1  In the commands list  set the flags for the commands you want to execute     If necessary  change the time periods for the database purging commands  after which stored  information is confirmed outdated and should be removed from the Server     2  Click Apply now  All selected commands will be executed immediately     For postponed or and periodic automatic execution of these commands  except Analyse database    use Server Task Scheduler     To manage database use the following buttons on the toolbar     Ki Import   LF Export   E  Backup     Database Export    To save the database information into a file  perform the following actions     1  Click LY Export on the toolbar   2  In the export settings configuration window  select one of the following variants      Export entire datab
26.  1   ig MAIN   iy Online  0   4  Parents  1   ig MAIN   ig Peers  0    ig Children  0   4 All  1   ig MAIN          Figure 7 2     Open Dr Web Security Control Center of the parent Server  MAIN  and add the child Server   AUXILIARY  to the list of neighbor Servers  To do this  select Neighborhood item in the main  menu  A window with the hierarchical list of the anti virus network Servers  neighboring  with the    given Server will be opened  To add a Server to the list  click fr Create neighbor on the  toolbar     A window to describe the connection between the current and the new Server will be opened     Specify the following parameters     Type of creating neighbor is Child   Name   the name of the Child Server  AUXILIARY    Password    type the same password as at step 5     Own keys of Dr Web Server   the list of public encryption keys of configuring Server  Click iei  and specify the drwcsd pub key of the current Server  To add one more key  click be and add  the key to the new field    Keys of neighbor Dr Web Server     the list of public encryption keys of connecting child  Server  Click ISl and specify the drwcsd pub key of the child Server  To add one more key     click    and add the key to the new field     URL of Dr Web Security Control Center   you can specify the address of a start web page for  Dr Web Security Control Center of the child Server  see p  Dr Web Security Control Center      In the Connection parameters drop down lists  specify the type of creati
27.  Center  but the Agent is not installed yet     e Newbies group  Contains all unapproved stations not registered at the Server at the moment   When the registration is approved or access to the Server is denied  stations will be removed from  this group automatically        Offline group  Contains all workstations not connected at the moment     Online group  Contains all workstations connected at the moment  reacting to Server requests      Update Errors group  Contains all workstations that have been failed to update        Transport  The following subgroups elicit the protocol of workstations connection to the Server  These groups are  completely virtual  may not have any settings or be primary groups     e TCP IP group  The group contains workstations connected at the moment through the TCP IP  protocol       TCP IP Version 6 group  The group contains workstations connected at the moment through the  TCP IP version 6 protocol   Ungrouped    Group contains stations  which are not included in any of user groups   User Groups    These groups are assigned by the anti virus network administrator for his her own needs  The  administrator may create own groups and include workstations in them  The contents and names of  such groups are not restricted by Dr Web Enterprise Security Suite in any manner     In the table 5 1  all possible groups and group types are given for your reference  along with the  specific parameters supported     or not supported       by the groups        
28.  Chapter 2  Components of an Anti Virus Network and Their Interface   24    Chapter 2  Components of an Anti Virus Network and  Their Interface    2 1  Dr Web Server    An anti virus network built with Dr Web Enterprise Security Suite must have at least one Dr Web  Server     To increase the reliability and productivity of an anti virus network and distribute the computational  load properly  Dr Web Enterprise Security Suite anti virus can also be used in the multiserver  mode  In this case the Server software is installed on several computers     Dr Web Server is a memory resident component  Dr Web Server software is developed for various  OS  see the Appendices document  p  Appendix A      Basic Functions    Dr Web Server performs the following tasks      initializes of installation of the Agent software and anti virus packages on a selected computer or a  group of computers        requests the version number of the anti virus package and the creation dates and version numbers of  the virus databases on all protected computers        updates the content of the centralized installation folder and the updates folder        updates virus databases and executable files of the anti virus packages  as well as executable files of  the program on protected computers     Collecting Information on Anti Virus Network    Communicating with Dr Web Agents  Dr Web Server collects and logs information on operation of  the anti virus packages  Information is logged in the general log file i
29.  Chapter 7  Configuring Dr Web Server    Chapter 7  Configuring Dr Web Server    This chapter contains a description of the following features for managing operation parameters of the  anti virus network and Dr Web Server    e Logging   view the operation log of the Server  view detailed statistic data on the Server operation   e Setting Dr Web Server Configuration   configure Server operation parameters    e Setting Dr Web Server Schedule   configure scheduled tasks to maintain the Server      Setting the Web Server Configuration   configure web server operation parameters    e User Hooks   enable and configure user hooks         Setting Notifications   configure the system of administrator notifications about anti virus network  events with different methods of notification delivering     e Administration of Dr Web Server Repository   configure repository to update all anti virus network  components from the GUS and further propagation of updates on stations     e Database Management   direct maintenance of the Server database     e Peculiarities of a Network with Several Dr Web Servers   configure multiserver anti virus network and  the neighbor connections                    7 1  Logging    7 1 1  Audit Log    Audit log allows to view the list of events and changes carried via the control subsystems of Dr Web  Enterprise Security Suite     To view the audit log     1  Select the Administrating item in the main menu of the Control Center    2  In the opened window  select 
30.  Features provided by interserver synchronization protocol       Distributing updates between Servers within anti virus network    e Immediate transmission of updates as soon as they are received from Dr Web GUS servers   e Transmitting statistic information on protection stations states between connected Servers   e Transmitting licenses for protected stations between neighbor Servers     7 10 1  Building a Network with Several Dr Web Servers    Several Dr Web Servers can be installed in an anti virus network  Each Dr Web Agent connects to  one of them  each Server with connected anti virus workstations functions as a separate anti virus  network as described in previous Chapters     Dr Web Enterprise Security Suite allows to connect such anti virus networks by transferring data  between Dr Web Servers     Dr Web Server can send to another Dr Web Server   e software and virus database updates  only one of them is to receive updates from Dr Web GUS  servers     e information on virus events  statistics  etc      e licenses for protected stations  you can configure licenses propagation between Servers in the  License Manager         The program provides for two types of connections between Dr Web Servers     a parent child type of connection  where the principle Server transfers updates to the subordinate  one and receives information about events       a peer to peer connection  where data types and transfer directions are set up individually     An example of a multi server 
31.  General section  select the Group membership rules item     e In the control menu  in the General section  select the Properties item  open the  Configuration tab and click Group membership rules     In the opened window  specify the conditions under which stations will be included into this group   a  If the group membership rules have not been specified before  click Add the rule   b  For each block of rules  specify the following settings     e Select one of the options that sets the mode of rules combination inside this block  Matches  all conditions  Matches any of conditions  Does not match any of conditions     e In the conditions drop down lists  select  one of the station parameters that will be checked  for compliance with the conditions  the mode of correspondence with this condition and  specify the condition string if the station parameter assumes it     e To add one more condition in this block of rules  click lal from the right of condition string     c  To add a new block of rules  click    from the right of the block  At this  specify the mode of  integration of this block of conditions with other blocks   e AND   conditions of blocks must be carried simultaneously   e OR   conditions at least one of the blocks must be carried out     78    Ta  J  1       ax       5     6     Chapter 5  Groups  Integrated Workstations Management    w To specify the condition string  you may use regular expressions     Regular expressions briefly described in the Appendices d
32.  See the Administrators and Administrative groups section for details     4 1 2  Active Directory Authentication    To enable Active Directory authentication     Select Administration in the main menu of the Control Center   Select Authentication in the control menu    In the opened window  select Microsoft Active Directory section   Set the Use Microsoft Active Directory authentication flag   Click Save    Restart the Server to apply changes     ONT ee O PO    For Active Directory authentication  only enabling of using this authentication method is configured in  Control Center     You must edit Active Directory administrators  settings manually at the Active Directory server     To edit Active Directory administrators     A The following operation must be carried out from a computer with Active Directory Service snap in     1  To enable editing of administrator parameters  do the following     a  Modify the Active Directory scheme with the drweb esuite modify ad schema   XXXXXXXXXXXXXX Windows nt xYY exe utility  it is included into Dr Web Server  distribution kit     Modification of Active Directory scheme may take some time  Depending on the domain  configuration  it may take up to 5 minutes and more to synchronize and apply the modified  scheme     If the Active Directory scheme has been modified earlier via this utility for the 6 version of the  Server  it is no need to perform modification repeatedly via the utility from the 10 0 version of the  Server     b  Register 
33.  The window with notification texts will  be opened  At this  notification will be automatically marked as read     3  To manege notifications list  use the following elements   a  General elements on the toolbar are used to manage notifications section in general  These tools  are always available on the toolbar     Table 7 6  Toolbar elements for managing Web console notifications section    Severity Maximal Display only notifications with the Maximal severity   High Display notifications with severity from High to Maximal   Medium Display notifications with severity from Medium to Maximal   Low Display notifications with severity from Low to Maximal   Minimal Display all notifications with severity from Minimal to Maximal   Source Agent Display notifications related to events on stations  Server Display notifications related to events on Server    To view notifications that were received during specific time period  use one of the following ways   e Select from the drop down list on the toolbar  one of the predefined time periods   e Select from the drop down calendars arbitrary dates of beginning and ending of time period     After editing these settings values  click Update to view notifications list according to the specified   settings    b  To manage separate notifications  set the flags next to the necessary notifications or the common  flag in the table header to select all notifications from the list  At this  elements on the toolbar to  manage selected notificatio
34.  Web Security Control Center and in  the opened windows  select the Administrators item in the control menu     2  Click the  amp  Create account icon in the toolbar  A window with creating account settings will be  opened    3  In the General section  specify the following parameters     In the Login field specify administrator account login for Dr Web Security Control Center    access  It is allowed to use lower case characters  a z   upper case characters  A Z   digits  0 9    symbols  _  and           In the Authentication type list  select one on the following variants     e Internal   authentication of such administrator in the Contro  Center is based on the  credentials in the DB of Dr Web Server     e External   authentication of such administrator in the Control Center is performed via  LDAP  Active Directory  RADIUS or PAM external systems     wy For more details see Authentication of Administrators          In the Password and Retype password fields set the password for accessing the Server and  Dr Web Security Control Center     A It is not allowed to use national characters in administrator password       In the First name  Middle name and Last name fields you can specify administrator s personal  data       In the Interface language drop down list  select the language which will be used by the adding  administrator  web browser language or English is specified by default      e In the Date format drop down list  select the date format which will be used by this 
35.  a primary group   approve access for selected stations  and set the primary group from the offered list         cancel action specified to execute on connect   cancel an action under unapproved station  which was specified for executing when station will connect to the Server        Reject selected stations   deny access to the Server for selected stations     Access Denying    In the Always deny access mode  the Server denies access for requests from new stations  The  administrator should manually create an account for new stations and set access password for them     Automatic Access Approving    In the Allow access automatically mode  all stations that request an access to the Server will be  approved automatically without requesting the administrator  The group which is set in the Primary  group drop down list of the Dr Web Server configuration section  on General tab  is set as a    primary   6 1 2  Removing and Restoring Stations    Removing Stations    To remove a workstation account     1  Select the Anti virus network item in the main menu  then click W General     X Remove  selected objects in the toolbar of the opened window   2  You will be prompt to remove the station  Click OK     After a station is removed from the hierarchical list  it is added to the deleted stations table  You can  restore the removed station via Dr  Web Security Control Center     Restoring Stations    To restore a workstation account     1  Select the Anti virus network item in the main 
36.  accessible  it is possible to update virus databases on  protected stations via the Internet from the Global Update System     Depending on the operating system of the station  the following protection functions are provided     Stations under Windows   OS    Anti virus check  Scans a computer on user demand and according to the schedule  Also the remote launch of  anti virus scan of stations from the Control Center including rootkits check is supported   File monitor  The constant file system protection in the real time mode  Checks all launched processes and  also created files on hard drives and opened files on removable media   Mail monitor  Checks all incoming and outgoing mail messages when using the mail clients   The spam filter is is also available  if the license permits this function    Web monitor  Checks all calls to web sites via the HTTP protocol  Neutralizes malicious software in HTTP    traffic  for example  in uploaded and downloaded files  and blocks the access to suspicious or  incorrect resources    Office control  Controls access to network and local resources  in particular  limits access to web sites  Allows  to control the integrity of important files from the accidental change or virus infecting and limit  the access to unwanted information for employees    Firewall  Protects computers from external unauthorized access and prevents leak of vital data via  Internet  Monitors connection attempts and data transfer via the Internet and blocks  suspiciou
37.  administrator during editing settings that contain dates  The following formats are available     e European  DD MM YYYY HH MM SS  e American  MM DD YYYY HH MM SS    Ta  J  1       aX       Chapter 4  Anti Virus Network Administrators      In the Description field  you can set optional description of the account     A Values of fields  marked by the   sign  must be obligatory specified     In the Groups subsection  you can specify parental administrative group  The list contains groups  to which an administrator can be assigned  The flag is set next to the group to which created  administrator will be assigned  Created administrators are placed in the parent group of current  administrator by default  To change specified group  set the flag next to the required group     Each administrator may be a member of one group only     Administrator inherits permissions from the parental group  see Administrators and Administrative       groups      After you set all necessary parameters  click Save to create a new administrative account     Adding Administrative Groups    To create administrative groups  administrator must have Create administrators  administrative  groups permission     To add a new administrative group     1     Select the Administration item in the main menu of Dr Web Security Control Center and in  the opened windows  select the Administrators item in the control menu     Click the      Create group icon in the toolbar  A window with creating group settings will
38.  all workstations in it     Set a primary group for stations  Assign a primary group for selected workstations  If a  group is selected in the hierarchical list instead of workstations  the specified primary group will be  assigned to all workstations from this group        y Merge stations  Join workstations under a single account in the hierarchical list  It can be used if  a workstation had been registered under several accounts     ce Remove personal settings  Remove individual settings of selected objects  Settings of the  parent group will be used  All workstations inside a group will also have their settings removed        Fl Send message to stations  Send notifications to users of workstations     Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface     a Reset password  Allows to delete the user password for access to anti virus components  settings on selected stations  The option is available only for stations under Windows OS        Reboot station  Launch reboot station process remotely     x Uninstall Dr Web Agent  Remove the Agents and anti virus software from the selected  workstation s  or group s         Install Dr Web Agent  Open the Network scanner for Agent installation to the selected  stations  This option is enabled only if new approved stations or stations with deinstalled Agent are  selected           E   Restore deleted stations  Allows to restore stations deleted earlier  This option is active only if  stations fro
39.  and status of this element  see table 2 1      Table 2 1  Icons of elements in the hierarchical list  Groups  General icons  ta Groups always shown in the hierarchical list   a  Groups are not displayed in the hierarchical list if     e for groups the   Setup group visibility          1 Hide if empty option performed and currently  groups do not contain stations     e for groups the Ll Setup group visibility     L Hide option performed and currently  in the    Settings of tree view section  the Show hidden groups flag is cleared   Workstations  General icons    Available workstations with installed anti virus software     lh    Ta     1       ax       Chapter 2  Components of an Anti Virus Network and Their Interface   36     d The station is unavailable    gt x lt  Anti virus software on the station is uninstalled    oo Station state during remote network installation of the Agent  Station is in this state from the moment of  successful Agent installation on the station till the moment of its first connection to the Server   Additional icons    gt     Icon of personal settings is displayed over the general stations and groups icons for which personal  settings are specified  or group includes stations with personal settings      To display the sign  select the   Settings of tree view option on the toolbar and set the Show  personal settings icon flag     Eh  lit we workstation with installed anti virus software has a personal settings  its icon looks as  follows  54     e I
40.  be   opened    In the General section  specify the following parameters      In the Group field  specify the name of administrative group  It is allowed to use lower case  characters  a z   upper case characters  A Z   digits  0 9   symbols  _  and          In the Description field  you can set optional description of the group    In the Groups subsection  you can specify parental administrative group  The list contains groups   which can be assigned as a parental group  The flag is set next to the group into which created   administrative group will be included  Created groups are placed in the parent group of current   administrator by default  To change specified group  set the flag next to the required group     Only one parent group can be assigned     Administrative group inherits permissions from the parental group  see Administrators and    Administrative groups         After you set all necessary parameters  click Save to create a new administrative group     Deleting Administrators and Administrative Groups    To delete administrative accounts and administrative groups  administrator must have Create  administrators  administrative groups and Edit properties and configuration of  administrative groups permissions correspondingly     To delete administrator account     1     Select the Administration item in the main menu of Dr Web Security Control Center and then  the Administrators item in the control menu     69    Ta  J  1       aX       Chapter 4  Anti Virus Ne
41.  cannot be edited after the hook  has been created     152    Ta     1       ax       Chapter 7  Configuring Dr Web Server   153  3  Click Save     Hooks Activation    Activation of hooks and hooks groups defines whether the hooks will be executed on corresponding  event or not     To activate a hook or a group of hooks     1  In the hooks tree  select a hook or a hooks group you want to activate   2  Perform one of the following actions   e On the toolbar  click O Enable hook execution   e In the right part of the window on the properties pane of the selected object  set the Enable  hook execution flag if it is cleared  Click Save     Hooks activation features     To execute a hook on corresponding event  the following is necessary     a  the hook itself must be activated   b  the group wich contains the hook must be activated     wy If a hooks group is disabled  its hooks will not be executed even if they are activated     On group activating  only whose hooks will be executed that are directly activated     7 7  Setting Notifications    Dr Web Enterprise Security Suite allows to send notifications about virus attacks  anti virus network  components states and other events to administrators of Dr Web Enterprise Security Suite anti   virus network     7 7 1  Notification Configuration    To configure notifications on anti virus network events   1  Select the Administration item in the main menu of the Control Center  In the opened window   select Notifications configuration 
42.  cannot be loaded  the Show on map text displays     4  To view the full size map  click the preview or the Show on map text     138    Ta  J  1       ys       Chapter 7  Configuring Dr Web Server   139    7 2 12  Download    On the Download tab  you can configure Server parameters for generating Agent installation files for  an anti virus network stations  Further these parameters are used for connecting Agent installer to the  Server       Dr Web Server address   IP address or DNS name of Dr Web Server   If Server address is not specified  computer name returned by the operating system is used        Port     port number which is used for connecting Agent installer to the Server     If the port number is not specified  the 2193 port is used  it is configured in the Control Center  at  Administration     Dr Web Server configuration     the Transport tab      The settings of the Download section are saved in the download conf confiduration file  see the  Appendices document  p  G3  Download conf Configuration File      7 2 13  Multicast Updates    On the Multicast updates tab  you can configure updates transmission on workstations via the  multicast protocol     Set the Enable multicast updates flag to enable transmission of updates to stations via the multicast  protocol  in so doing     e If multicast updates are disabled  updating of all stations is performed only in general mode   via the  TCP protocol     e If multicast updates are enabled  when for all stations connecte
43.  components are installed on a workstation     1     Select the Anti virus network item in Dr Web Security Control Center main menu  then click  the name of a group or workstation in the hierarchical list of the opened window     In the opened control menu in the General section  select the Installed components item     This opens a window with information on installed components  the component name  installation  time  the address of the Server from which the component was installed  installation folder of the  component on the station     wy Compound of installed components list depends on     Components enabled in the license key file   e Workstation OS     Settings specified by administrator of anti virus network at the Server  Administrator is able to  change the list of anti virus package components either before Agent  see Anti Virus Package  Composition  installation or at any time after its installation       It is not recommended to install SpIDer Gate  SpIDer Mail and Dr Web Firewall components on    servers that implement significant network functions  domain controllers  license distribution servers  and etc   to avoid probable conflicts between network services and internal components of Dr Web  anti virus     Virus Bases    To view virus databases installed on a workstation     1     Select the Anti virus network item in Dr Web Security Control Center main menu  then click  the name of a workstation in the hierarchical list of the opened window     In the opene
44.  described in the Appendices  document  in the Changing the Type of the DBMS for  Dr Web Enterprise Security Suite section           An embedded DB can be used  if at most 200 300 stations are connected to the Server  If the  hardware configuration of the computer with Dr Web Server and the load level of other executing  tasks are permissible  up to 1000 stations can be connected     Otherwise  you must use an external DB     If you use an external DB and more than 10 000 stations are connected to the Server  it is  recommended to perform the following minimal requirements       3 GHz processor CPU     RAM at least 4 GB for Dr Web Server and at least 8 GB for the DB server      UNIX system based OS     It is possible to perform transactions connected with clearing the database used by Dr Web Server   in particular to delete records of events and data about the workstations which have not visited the  Server for a certain period of time  To clear the database  open the Server schedule and add a  corresponding task     7 2 7  Proxy    On the Proxy tab  you can configure parameters of proxy server     Set the Use proxy server flag to setup connections with Dr Web Server via the proxy server  The  following fields become available     Proxy server     IP address or DNS name of proxy server     e To use authorization for access the proxy server according specified methods  set the Use  authorization flag and specify the following parameters   o Specify the Proxy server user and Pa
45.  drweb com host for sending push  notifications  private key pem RSA private key  webmin conf Control Center configuration file  auth ldap xml configuration file for administrators external  authorization via LDAP  auth pam  xml configuration file for administrators external  authorization via PAM  auth radius xml configuration file for administrators external  authorization via RADIUS  database sqlite embedded database e for Linux OS and Solaris  OS      var opt drwcs    Ta     i    ax  G    Chapter 2  Components of an Anti Virus Network and Their Interface   29    e for FreeBSD OS    var drwcs    for Linux OS and Solaris  OS     opt drwcs Installer   opt drwcs webmin install    for FreeBSD OS    usr local drwcs Installer   usr local drwcs webmin   install    drwcsd  pub public encryption key    Start and Stop Dr Web Server    By default  Dr Web Server automatically starts after installation and every time after restarting the  operating system     Also you can start or start  restart or stop Dr Web Server by one of the following ways     For UNIX system based OS    Stop and restart via the Control Center     e In the Administration section  use buttons  to restart  to stop  is absent under Solaris  OS     e Using the corresponding console command  see also the Appendices document  p  H3  Dr Web  Server      o Start   e for FreeBSD OS      usr local etc rce d drwesd sh start    e for Linux OS and Solaris OS      etc init d drwcsd start    o Restart   e for FreeBSD OS      us
46.  home users from all over the world and in  government enterprises  small companies and nationwide corporations     Dr Web antivirus solutions are well known since 1992 for continuing excellence in malware  detection and compliance with international information security standards  State certificates  and awards received by the Dr Web solutions  as well as the globally widespread use of our  products are the best evidence of exceptional trust to the company products     We thank all our customers for their support and devotion to the Dr Web products     Ta   gt    A    ax       N    Table of Contents    Chapter 1  Welcome to Dr Web   Enterprise Security Suite  1 1  Introduction  1 2  Conventions and Abbreviations  1 3  About Product  1 4  System Requirements  1 5  Distribution Kit    1 6  Licensing    Chapter 2  Components of an Anti Virus Network and Their Interface  2 1  Dr Web Server  2 1 1  Dr Web Server Management under Windows   OS  2 1 2  Dr Web Server Management under UNIX   System Based OS  2 2  Dr Web Agent  2 3  Dr Web Security Control Center  2 3 1  Administration  2 3 2  Anti Virus Network  2 3 3  Neighborhood  2 3 4  Search Panel  2 3 5  Events  2 3 6  Preferences  2 3 7  Help  2 4  Dr Web Security Control Center Components  2 4 1  Network Scanner  2 4 2  License Manager  2 5  The Interaction Scheme of an Anti Virus Network Components  Chapter 3  Getting Started  General Information  3 1  Establishing a Simple Anti Virus Network  3 2  Setting the Network Connect
47.  is not recommended to change this parameter without need     Ta  J  1       ax        Chapter 7  Configuring Dr Web Server   149      Timeout  sec      HTTP session timeout  For persistent connections  Server releases the connection   if there are no requests received from a client during specific time slot     e Minimal send rate  BPS      minimal acceptable data send rate  If outgoing network speed is lower  than this value  connection will be rejected  Specify 0 to ignore this limit     e Minimal receive rate  BPS      minimal acceptable data receive rate  If incoming network speed is  lower than this value  connection will be rejected  Specify 0 to ignore this limit       Send buffer size  KB      size of buffers used when sending data  This parameter affects server  performance  It is not recommended to change this parameter without need     e Receive buffer size  KB      size of buffers used when receiving data  This parameter affects server  performance  It is not recommended to change this parameter without need       Max request length  KB      Maximum allowed size of HTTP request     e Use compression   set the flag to use traffic compression for data transmission over a  communication channel with the Web server via HTTP HTTPS     e If the flag is set  the Compression level drop down list become available  In this list  you can  select the data compression level from 1 to 9  where the 1 is minimal level and the 9 is maximal  compression level       Replace IP addr
48.  network installer and the public encryption key file to install the Anti virus on a  protected computers     e lib     libraries set for Server operation   e update db     scripts necessary to update the structure of Server DB   e webmin     Dr Web Security Control Center elements      var opt drwcs  for Linux and Solaris OS and  var drwcs for FreeBSD OS   e backup     backups of DB and other critical data     e bases     unpacked virus bases for backward compatibility with previous versions of Dr Web  Agents     e coredump     Server crash dumps    e database sqlite     Server embedded database    e etc     general configuration files of anti virus network components    e extensions     scripts of user hooks meant to automate the performance of certain tasks     e installers cache     Agent installers cache  Meant to store Agent installation packages when  stations are created via the Control Center    e log     Server log files    e object     Control Center objects cache    e reports     temporary folder for generating and storing reports    e repository     repository folder to store actual updates of virus bases  anti virus packages files  and anti virus network components  It contains subfolders for the program components software    which include subfolders for their versions depending on the OS  The folder should be accessible  for writing to the user under which the Server is launched  the drwcs as a rule      Ta  yan    A    A        Chapter 2  Components of an Ant
49.  not Execute the task only at scheduled time regardless of whether a task launch  critical has been omitted or not     wy The same action you can perform from the task editor on the General tab by setting the Critical  task flag     E   Duplicate settings Duplicate tasks that are selected in the list of current schedule  When you run  the Duplicate settings option  new tasks are created with settings similarly  to the selected tasks     RA Schedule repeatedly For tasks which executed once  execute task one more time according to the  specified time settings  changing execution multiplicity of the task is described  below  in the Task Editor section      i Remove these settings Remove selected task from the schedule     3  To change task parameters  select it in the tasks list  The Task editor window described below  opens     4  After editing the schedule  click Save to accept changes     Task Editor    In the Task Editor you can specify settings to   1  Create a new task   For this click ei Create task on the toolbar     2  Edit existing task   For this click the name of one of the tasks in the tasks list     The window for editing a task opens  Settings for editing of existing task are similar to the settings of  creating a new task     wy Values of fields  marked with the   sign  must be obligatory specified     To edit task settings   1  On the General tab you can setup the following parameters     In the Name field  specify the name of the task displayed in the schedule 
50.  object in milliseconds  When the specified  time expires  the scan of this object is interrupted     e Maximum archive nesting level   maximal number of nested archives  If the maximum nesting  level for archived files exceeds specified value  the scan performs until specified nesting level only     e Maximum archive size  KB     maximal size of scanned archive in kilobytes  If the archive size  exceed the limit  neither unpacks  nor scans performed     e Maximum compression ratio   maximal archives compression rate  If the Scanner defines what  compression rate of the archive exceed specified limit  neither unpacks  nor scans performed     e Maximum size of extracted files  KB     maximal file size at unpacking  If the Scanner defines  what the size of files after extracting the archive will exceed specified limit  neither unpacks  nor  scans performed       Compression check threshold  KB     minimal size of file inside archive beginning from which  compression ratio check is performed     6 5 4 4  Exclusions    In the Exclusions section  you can specify the list of files and folders to exclude from the anti virus  check     To edit lists of files and paths excluded from scan  1  In the Excluded paths and files line  specify a path to corresponding file or folder   2  To add a new line  click Mi  and specify a path in the new line     3  To remove a path from the list  click   next to the corresponding line     The list of paths excluded from the scan can contain the follo
51.  of the station is known   a  Windows OS  the letter attachment contains Dr Web Agent for Windows installation package     b  Linux OS  OS X  Android OS  the letter attachment contains Dr Web Agent installation package  for the corresponding operating system and the configuration file with the settings for  connecting to Dr Web Server     Operating system of the station is unknown  the new station account  Agent in not yet installed      a  If the Server does not contain the packages for stations under Linux OS  OS X  Android OS  in  particular  the extra distribution kit of the Server is not installed   the letter attachment  contains Dr Web Agent for Windows installation package and the configuration file with the  settings for connecting to Dr Web Server for stations under Linux OS  OS X  Android OS     b  If the Server contains at least one package except packages for stations under Windows OS   the letter attachment contains Dr Web Agent for Windows installation package  the  configuration file with the settings for connecting to Dr Web Server for stations under Linux  OS  OS X  Android OS and the link to download installation packages for stations under Linux  OS  OS X  Android OS        To email installation package     1     2   3     Select the Anti virus network item in the main menu of the Control Center and in the opened  window  select the following objects in the hierarchical list     e select the station to email the installation package generated for this stat
52.  on detected  stations security threats to the Doctor Web company  The following fields will become available    e Interval   an interval in minutes for sending statistics    e Identifier     an MD5 key  located in the Server configuration file      Interval for sending statistics is the only obligatory field   e Scan errors     enables monitoring of scan errors occurring and storing the information in the  database     e Scan statistics     enables monitoring of the statistics of scanning and storing the information in the  database        Agent installations     logs the information about Agent installations at the stations     e Station tasks execution log     log results of tasks execution on workstations and store the log in  the DB       Station statuses     log status changes for workstations and store the log in the DB     e Virus database statuses   log changes in virus databases status and contents on workstations  and store the logs in the DB     132    Ta  J  i    ax       To view statistics information     Chapter 7  Configuring Dr Web Server   133    1  Select the Anti virus network item of the main menu   2  Select a station or a group in the hierarchical list   3  Open the corresponding section of the control menu  see the table below         wy Detailed information about statistic data is described in the Viewing Workstation Statistics section     The table below describes correspondence between flags in the Statistics tab of the Server  settings and items of
53.  per each field  To add one more receiver field  click Iu  To remove the field  click        155    Ta  J  1       ax       Chapter 7  Configuring Dr Web Server   156    e Sender     entity that sends SNMP request  Defaults are     localhost    for Windows and      for  UNIX      e Community     SNMP community or context  Default is public     e Send test message   send the test message according to the specified settings of notification  system  The test message text is specified in notifications templates     Notifications Displayed in the Web Console    For notifications displayed in the Web console  specify the following parameters       Resends number     the number of retries when failed to send a message  Default is 10    e Resend time out     period in seconds  after which the repeated attempt to send a message is  performed  Default is 300 seconds      Notification storing time     time period for storing a notification starting from its receiving  1 day is    by default  After specified period  notification is marked as outdated and deleted according to the  Purge outdated messages task in the Server schedule settings     For notifications that received by this sending method  you can specify unlimited storing time in the  Web Console Notifications section        e Send test message   send the test message according to the specified settings of notification  system  The test message text is specified in notifications templates     Notifications Using Windows Messeng
54.  product is delayed     When clicking the table row  another table with detailed information on the frozen revision of the  corresponding product opens     The option to delay updates is useful when you need to temporarily cancel distribution of last product  revision on all stations of the anti virus network  e g   if you want to perform preliminary testing of this  revision on a limited number of stations     To use delayed updates functions  perform the actions described in the Detailed repository  configuration     Delayed Updates section        To manage delayed updates   1  Set the flags next to the products  for which you want to specify actions on delayed updates  To  select all products  set the flag in the heading of frozen products table    2  On the toolbar  select the required action     P Execute immediately   disable the frozen state for the product and add the revision to the list  of revisions propagating according on stations according to the general procedure       cancel update   disable the frozen state for the product and forbid the revision  Updating from  the GUS will be restored  The unfrozen revision will be removed from the product revision list  Upon  receipt of the next revision  the unfrozen one will be removed from the disk           Change updates delay time   specify the time period for the product revision to be delayed   The reference time for a freeze is the moment of receiving the revision from the GUS    3  If you did not specify an actio
55.  repository     6  On the main Server execute the command    drwcsd rerepository    Under Windows OS the command can be performed both from the command line         C  Program Files DrWeb Server bin drwcsd exe   home  C  Program Files DrWeb  Server  rerepository    or from the Start menu     Start     All Programs     Dr Web Server     Server control     Reload repository       7  Start the main Server     A If Dr Web Self protection component was disabled before the repository update  it is  recommended to enable this component after updating     Ta  J  1       aX       Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Components    8 4 2  Downloading Repository from GUS    If Dr Web Server is not connected to the Internet  you can update its repository manually by  importing the repository downloaded from GUS     To download Dr Web Server repository from GUS  use the Dr Web Repository Loader standard  utility     Features of Use    e To download the repository from GUS  you need a license key of Dr Web Enterprise Security  Suite or its MD5 hash which you can view in the Control Center in the Administration     License  Manager section    e You can launch Dr Web Repository Loader in the following modes    e graphical version of utility  under Windows OS only    e console version of utility   e When downloading the repository from the GUS  a proxy server can be used     8 4 2 1  GUI Utility    GUI version of Dr Web Repository Loader utility can be download
56.  restarted     40    Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface   41    2 3 6  Preferences    To open the section of Control Center preferences  click 2  Preferences in the main menu   w All settings of this section are valid only for the current administrator account     The control menu located in the left pane of the window  consists of the following items     e My account     Interface     Subscription     My Account    Using this section  you can manage the current account of the administrator of the anti virus network     see also p  Administrators and administrative groups    wy Values of fields  marked with the   sign  must be obligatory specified     You can edit the following settings  if necessary        Login   administrator account login to access Dr Web Security Control Center     First name  Middle name and Last name of the administrator     Interface language used by the administrator        Date format  which is used by this administrator during editing settings that contain dates  The  following formats are available     e European  DD MM YYYY HH MM SS  e American  MM DD YYYY HH MM SS    Account Description   e To change the password  click    New password at the toolbar     The following parameters are read only     Dates of creation and last modification of the account      Status  Displays the network address of the last connection under this account     Rights of the administrator  Description of administrativ
57.  revision  and products current status     3  To manage the repository contents  use the following buttons   e Click the Check for updates button to check whether updates to all of the products are available  on the GUS servers and download updates  if any   e Click  amp  Reload repository from disk  to reload the current version of the repository from disk     On startup  Server loads the repository contents to the memory  If during Server operation the  administrator changed the contents bypassing Control Center  e g  when updating the repository  using an external utility or manually  reload the repository to enable the use of its downloaded  version     7 8 2  Delayed Updates    In the Delayed Updates section  you can view the list of products which updating is temporarily  disabled on the following page  Detailed repository configuration      lt Product gt      Delayed Updates   A delayed revision is considered frozen        The table of frozen products contains the following information       Repository folder   name of the folder where a frozen product resides   e 10 drwgatedb   SpIDer Gate bases     Ta  J  1       ys       Chapter 7  Configuring Dr Web Server    e 10 drwspamdb   Anti spam bases   e 20 drwagent   Dr Web Agent for Windows   e 20 drwandroid   Dr Web Agent for Android   e 20 drwcs   Dr Web Server   e 20 drwunix   Dr  Web Agent for UNIX   e 80 drwnews   Doctor Web News   e Revision   number of the frozen revision     Delayed till   time until update of the
58.  settings  click Save     Removing Personal Settings    To remove personal settings of a workstation via Dr Web Security Control Center     1     Select the Anti virus network item in the main menu of the Control Center  then select the workstation  in the hierarchical list of the opened window and click W General          Remove personal settings on  the toolbar  A list of settings for this workstation will be opened  Personal settings will be marked with flags     To remove personal settings  clear the flags and click Delete  Settings of the workstation inherited  from the primary group will be restored     w Before editing the configuration of a workstation for SpIDer Guard for Windows and Dr Web    Scanner for Windows  familiarize yourself with recommendations on using the anti virus for  computers on Windows Server 2003 OS  Windows 2000 OS  or Windows XP OS  An article with  necessary information can be found at http   support microsoft com kb 822158 en  The article is    meant to help you increase system performance     Provided that your Agent key  agent key  allows to use a spam filter for the SpIDer Mail  component  on the Antispam tab you can set up the filter  on the context menu of any group or  workstation  select SpIDer Mail for workstations      Starting from version 5 0 anti virus package includes SpIDer Gate and Office Control  components  For using this components  they must be included in you license  Anti virus   Antispam   that described in the Agent key 
59.  the Server  At this   e The Current version list contains the version of the Server  used at the moment  The Change  list section contains the brief list of new features and the list of errors which had been resolved in  this version relatively to the previous updates version     Ta  J  1       ax       Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Components   182    e The All versions list contains the list of this Server updates downloaded from GUS  The  Change list section contains the brief list of new features the list of errors which had been  resolved in each update     For the version that corresponds to the first installation of the Server from the installation package   in the Change list is empty     e The Backups list contains the list of backup copies which are stored for this Server  The Date  section contains the information on the date of the back up     To update the Server software  set the option next to the necessary version of the Server in the  All versions list and click Save     wy You can update only to a later version of the Server regarding to the currently used version     During the Server update  the current version is saved as a backup  placed to the Backups  section   and version to which update is performed  is moved from the All versions to the Current  version section     Backup copies are saved in the following folder   var  gt  update backup _  lt old_version gt _ lt new_version gt   During update  the var     dwu
60.  the Server and anti virus network via the Control Center     If you clear the Dr Web Security Control Center extension flag  when after reboot of Dr  Web   A Server  Dr Web Security Control Center will be not available  You will be able to manage the  Server and anti virus network only via the remote diagnostics utility  if the Dr Web Server  FrontDoor extension flag is set       Set the Dr Web Server FrontDoor extension flag to use Dr Web Server FrontDoor extension  that allows connections of Server remote diagnostics utility  see also Dr Web Server Remote  Access       Set the Dr Web Agent protocol flag to enable protocol that allows interaction of the Server with  Dr Web Agents        Ta  J  1       aX       Chapter 7  Configuring Dr Web Server      Set the Microsoft NAP Health Validator protocol to enable protocol that allows interaction of the  Server with the Microsoft NAP Validator component of system health validating        Set the Dr Web Agent installer protocol flag to enable protocol that allows interaction of the  Server with Dr Web Agent installers      Set the Dr Web Servers cluster protocol flag to enable protocol for interaction between Servers  in the cluster system      Set the Dr Web Server protocol flag to enable protocol that allows interaction of Dr  Web Server  with other Dr Web Servers  The protocol is disabled by default  If you use multi server network  configuration  see Peculiarities of a Network with Several Dr Web Servers   set the Dr Web Serve
61.  the component is installed with the anti virus package  If the Must be  installed option is specified for an existing workstation  the component will be added to the  available anti virus package       May be installed   means that the component can potentially be installed  The user decides  whether the component is required       Cannot be installed   means that installing the component is not allowed  When a new  workstation is created  the component will not be installed with the anti virus package  If the  Cannot be installed option is specified for an existing workstation  the component will be  removed from the anti virus package     Table 6 5 shows whether the component will be installed on the workstation     according to the  parameters specified by the user and the settings defined by the Server administrator     Table 6 5   Install      Do not install      3  Click Save to save the settings and the set of anti virus package components on the workstation     wy The Dr Web Anti spam component cannot be installed  if at least one of the listed products is not  installed       SpIDer Mail     Dr Web for Microsoft Outlook     Ta  J  i    ax       Chapter 6  Administration of Workstations    6 4  Management of Anti virus Components    To view and edit the configuration of the anti virus components on the workstation     1   2   3     Select the Anti virus network item in the main menu of the Control Center   Click name of the station or group in the hierarchical list o
62.  the control menu on the Anti virus network page     If you clear flags on the Statistics tab  corresponding items of the control menu become hidden     Table 7 2  Correspondence between flags of Statistics data section and items of the control menu    Quarantine state    Hardware and software composition    List of the station modules  List of installed components  Sessions of stations users  Start Stop of components    Detected security threats    Scan errors    Scan statistics    Agent installations    Station tasks execution log    Station statuses    Virus database statuses    7 2 4  Security    General     Quarantine    Configuration     Windows     Dr Web Agent     Quarantine remote  control flag    General     Hardware and software  General     Comparison of hardware and software  Tables     Modules   General     Installed components  General     Users sessions   Tables     Start Stop   Tables     Threats   Tables     Threat statistics   Tables     Errors   Tables     Statistics   Tables     Summary statistics  Tables     All network installations  Tables     Tasks   Tables     Virus Bases   Tables     Status   Tables     Virus Bases    Tables     Virus Bases    On the Security tab  you can configure restrictions for network addresses from which Agents  network  installers and other     neighboring     Dr Web Servers will be able to access the Server     Ta  J  1       aX       Chapter 7  Configuring Dr Web Server    To manage Server audit log  use the following flags
63.  this Server operating     SQL console     allows to execute SQL queries to the database which Dr Web Server uses     Lua console     allows to execute LUA scripts both typed in the console directly or loaded from a                file     Utilities     opens the section with additional utilities for interaction with Dr Web Enterprise  Security Suite     e Dr Web Repository Loader to download Dr Web Enterprise Security Suite products from  the Global Update System     e Dr Web Server remote diagnostics utility allows remotely connect to Dr Web Server  for basic controlling and viewing the operation statistics  Graphical version of the utility is  available for Windows OS only  See also Dr Web Server Remote Access    e Dr Web Mobile Control Center for administrating the anti virus network based on    Dr Web Enterprise Security Suite  Designed for installation and operation on mobile  devices under iOS and Android OS        2 3 2  Anti Virus Network    Select the Anti virus network item in the main menu of Dr Web Security Control Center     Control Menu    To view and edit the information in the opened window  use the control menu resided in the left part of  the window   Control Menu contains the following components   1  General  e Charts  e Running components    Installed components      Quarantine          Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface    e Comparison of hardware and software  when a group or several stations are sel
64.  to Dr Web   Enterprise Security Suite    Users can receive key files in one of the following ways     e by e mail  usually after registration of the serial number at the web site  see above       with the anti virus distribution kit if license files were included at kitting   e as a file on a separate carrier     Please keep key files until they expire  They are required during the installation and re installation of  the anti virus  as well as to restore program components  In case a license key file is lost  you need to  complete the registration form at the web site specified above so that you can restore it  Note that you  will need to enter the same registration serial number and the same personal data as during the first  registration  you can change the e mail address only  In this case the license key file will be sent to the  new address     To try the Dr Web Enterprise Security Suite anti virus and familiarize yourself with the software   you can order demo keys  Such key files provide for the full functionality of the main anti virus  components  but have a limited term of use  Demo key files are sent upon request made through the  web form at https   download drweb com demoreg biz   Your request for demo keys will be examined  and  if approved  an archive with key files will be sent to the designated address        The use of obtained key files during the installation is described in Installation Manual  p  Installing  Dr Web Server     23    Ta  J  1    ax      
65.  to the Server and will need to get the new parameters to assess the Server        In the Encryption drop down list  select the policy of traffic encryption between Dr Web Server  and connected clients  Dr  Web Agents  neighbor Servers  Network Installers     For more details on this parameters  read p  Traffic Encryption and Compression     e In the Compression drop down list  select the policy of traffic compression between Dr Web  Server and connected clients  Dr Web Agents  neighbor Servers  Network Installers  For more  details on this parameters  read p  Traffic Encryption and Compression     e When you select Yes or Possible for traffic compression  the Compression level drop down list  become available  In this list you can select data compression level from 1 to 9  where the 1 is  minimal level and 9 is maximal compression level     e In the Allowed difference between time of Server and Agent field specify allowed difference  between system time at Dr Web Server and Dr Web Agents in minutes  If the difference is larger  than specified value  it will be noted in the status of the station at Dr Web Server  3 minutes are  allowed by default  The 0 value means that checking is disabled     128    Ta  J  1       aX        Chapter 7  Configuring Dr Web Server   129       Set the Replace IP addresses flag to replace IP address with DNS names in Dr Web Server log  file      Set the Replace NetBIOS names flag to display DNS names instead of NetBIOS names in the  catalog of th
66.  to the command line  and application output   Appendix A Cross references or Internal Hyperlinks to web pages   Abbreviations    The following abbreviations will be used in the Manual without further interpretation     e ACL     Access Control List    e CDN     Content Delivery Anti virus network    e DB  DBMS     Database  Database Management System   e DFS     Distributed File System    e DNS     Domain Name System      Dr Web GUS   Dr Web Global Update System      EBNF     Extended Backus Naur Form    e GUI     Graphical User Interface  a GUI version of a program     a version using a GUI   e LAN     Local Area Network    e MTU     Maximum Transmission Unit      NAP     Network Access Protection    e OS     operating system    e PC     personal computer      TTL   Time To Live    e UDS     UNIX domain socket     1    ax       A     AN    Chapter 1  Welcome to Dr Web   Enterprise Security Suite   11    1 3  About Product    Dr Web Enterprise Security Suite is designed for organization and management of integrated and  secure complex anti virus protection either local company network including mobile devices  or home  computers of employers     An aggregate of computers and mobile devices on which Dr Web Enterprise Security Suite  cooperating components are installed  represents a single anti virus network     Dr Web Enterprise Security Suite anti virus network has a client server architecture  Its  components are installed on a computers and mobile devises of users and adm
67.  tree        Option is available if a license key is selected in the  tree     cS Settings of tree view allows to change hierarchical tree view       The Show the number of licenses flag enabled disables displaying in the keys tree the total  number of licenses provided by key files     e To change the tree structure  use the following options   e The Keys option prescribes to display all license keys of anti virus network as a root nodes of the    Licenses Handling    hierarchical tree  At this  all groups and stations for which these keys are assigned  are presented  as a child elements of license keys  This tree view is a general view and allows to manage  licensing objects ans license keys     The Groups option prescribes to display those groups to which the keys are personally assigned  as a root nodes of the hierarchical tree  At this  stations included in this groups and license keys  that are assigned to these groups are presented as a child element of groups  This tree view is for  convenience visualization of information on licensing and do not allow to manage objects of the    Via the License Manager you can perform the following actions under license keys     Noo oe we Nar    View Information About a License        Add a New License Key        Update the License Key        Replace the License Key        Extend the List of Object License Keys        Remove the License Key and the Object from the Licensing List        Donate a License to a neighbor Server        49 
68.  use this mode only when errors occur in component operation or by request of  technical support service  It is not recommended to enable logging debug mode for a long time     Dr Web Security Control Center interface is somewhat different from the interface of the anti   virus components     eto manage separate parameters  use the options located on the right from corresponding  settings        Reset to initial value   restore the value that parameter had before editing      Reset to default value   set the default value for a parameter       to manage set of parameters  use the options located in the toolbar       Reset all parameters to initial values   restore the values that all parameters in this  section had before current editing  last saved values      F Reset all parameters to default values   restore default values of all parameters in this  section     af Propagate these settings to another object   copy settings from this section to  settings of other station  group or several groups and workstations     ws Set inheritance of settings from primary group   remove personal settings of a  station and set inheritance of settings in this section from a primary group     rd Copy settings from primary group and set them as a personal   copy settings of this  section from a primary group and set them for selected stations  Inheritance is not set and  stations settings considered as a personal     E Export settings from this section to the file   save all settings from th
69.  virus network in case of moving Dr Web Server to another  computer     By default the drwinst instruction launched without parameters will scan the network for Dr Web  Servers and will try to install Agent from the first found Server  the Multicasting mode with using  Server Detection Service         Thus  the Server address become known for the Agent during installation     You can change the Server address in the Agent settings manually later     A  AN    T   v    A    A        Chapter 3  Getting Started  General Information   60    3 2 2  Dr Web Server Detection Service    In this connection scheme  client does not know the Server address preliminary  Before establishing  each connection  the Server will be searched in the network  To do this  the client sends the broadcast  query and waits for the respond  that includes Server address  After the client gets respond  it will  establish a connection with the Server     To realize this scheme  the Server must  listen  the network for such queries     Several variants of realization of this scheme is available  Most important is that the Server search  method at the clients side must be matched with the Server respond part     The Multicast over UDP mode is used by default in the Dr Web Enterprise Security Suite     1  Server gets registered in the multicast group with an address specified in the Server settings   2  Agents during Server search  send multicast requests to the group address specified at the step 1     Server 
70.  which are connected to this Server and currently  online   e Offline   display events for stations which are connected to this Server and currently  offline   e Deinstalled   display the last event for stations with deinstalled Dr Web anti virus  software   4  To manage filter settings  use the following buttons on the filter pane     Default   set the default values to all filter settings     Refresh   apply selected filter settings   5  You can format the way the data are presented just like in the statistics window above     wy To view operation results and statistics for several workstations  select those workstations in the  network hierarchical list     Ta  J  1       ax        Chapter 6  Administration of Workstations    6 6 2  Charts    Infection Charts    To view general charts with information on detected infections     1     Select Anti virus network in the main menu of the Control Center  then in the opened window  in the hierarchical list click the station or group name  In the opened control menu in the General  section  select Charts     Window with the following charts will be opened        Viral activity   chart displays the total number of malware detected per each time slot at all  selected stations and groups  The chart is displayed if specified time period exceeds 24 hours      Most common threats   displays the list containing ten threats that are met in the most of files   The chat displays numerical data on objects which correspond to the specific thr
71.  you open Control Center     For proper opening of Control Center via the Start menu in Microsoft Internet Explorer browser  under Windows 8 and Windows Server 2012 OS with tiled interface  set the following parameters of a  web browser  Tools     Programs     Opening Internet Explorer set the Always in Internet  Explorer flag     Ta  yas    A     A        Chapter 1  Welcome to Dr Web   Enterprise Security Suite   20      Dr Web Security Control Center extension to use Dr Web Security Control Center in full  The  extension is distributed with the Server installation package  It installs by browser request when you  use elements of Dr Web Security Control Center which require the extension  for instance  for  anti virus components remote updater or Network Scanner   The extension can be installed on  Windows Internet Explorer 8 and later or Mozilla Firefox 25 and later web browsers       For operation of Dr Web Security Control Center extension at the Network Scanner page   under both Windows and GNU Linux OS  you must have administrator  root  rights     Under Mozilla Firefox web browser  Dr Web Security Control Center extension is available under  Windows OS and Linux system based OS only       Recommended screen resolution to use Dr  Web Security Control Center is 1280x1024 pt   Dr Web Mobile Control Center requires     Requirements are differ depending on the operating system on which the application is installed   e iOS     Operating system iOS   7 and later  Device Apple
72. 1  Station Properties  6 2 2  Installed Components of the Anti Virus Package  6 2 3  Hardware and Software on Stations under Windows   OS  6 3  Management of Workstation Configuration  6 3 1  Permissions of Station Users  6 3 2  Scheduled Tasks of a Station  6 3 3  Installing Components of the Anti Virus Package  6 4  Management of Anti virus Components  6 4 1  Components    6 4 2  Managing Dr Web Agent for Windows      62  63  64  65  66  68  68  70  73  73  75  75  76  77  77  78  80  80  82  82  83  83  83  84  85  86  86  89  90  91  91  92  96  97  98  100    y  Ti    ax       6 4 3  SpIDer Mail for Windows   Configuration  Application Filter  6 5  Anti Virus Scanning of Stations  6 5 1  Viewing and Terminating Running Components  6 5 2  Terminating Running Components by Type  6 5 3  Launching Scan on Station  6 5 4  Configuring Scanner Settings  6 6  Viewing Workstation Statistics  6 6 1  Statistics  6 6 2  Charts  6 6 3  Quarantine  6 7  Mailing of Installation Files    6 8  Sending Notifications to Users    Chapter 7  Configuring Dr Web Server  7 1  Logging  7 1 1  Audit Log  7 1 2  Dr Web Server Logging  7 1 3  Repository Updates Log  7 2  Setting Dr Web Server Configuration  7 2 1  General  7 2 2  DNS  7 2 3  Statistics  7 2 4  Security  7 2 5  Cache  7 2 6  Database  7 2 7  Proxy  7 2 8  Transport  7 2 9  Modules  7 2 10  Cluster  7 2 11  Location  7 2 12  Download  7 2 13  Multicast Updates  7 2 14  Licenses  7 3  Dr Web Server Remote Access  7 4  Setting Dr Web S
73. Active Directory Schema snap in  execute the regsvr32 schmmgmt d11 command  with the administrative privileges  then run mmc and add the Active Directory Schema snap   in    c  Using the Active Directory Schema snap in  add the auxiliary DrWebEnterpriseUser class to  the User and  if necessary  Group classes     Ta  J  i    aX       Chapter 4  Anti Virus Network Administrators    If the scheme modification and application process has not finished  the DrWebEnterpriseUser  class may be not found  In this case  wait for a few minutes and retry to add the class as described  in c  step     d  With the administrative privileges run the drweb esuite aduac xxxxxxxxxXXXXXX   windows nt xYY msi file  is included in the Enterprise Security Suite 10 0 distribution kit   and wait until the installation finishes     2  Visual editing of attributes is available from the Active Directory Users and Computers control  panel     Users section     in the Administrator Properties window for editing settings of selected    user     on the Dr Web Authentication tab     3  The following parameter is available for editing  yes  no or not set values can be set for the  attribute        User is administrator indicates that the user is full rights administrator     w Algorithms of operating principles and attributes handling during authentication are described in the  Appendices document  in the Appendix Ci section     4 1 3  LDAP Authentication    To enable LDAP authentication     Select Administrati
74. Agents     Network Installers of Dr Web Agents     other Dr Web Servers     Connection is always initiated by a client     The following schemas for connection to the Server are available   1  Using Direct connections     This approach has a lot of advantages  but it is not preferable in some situations  also  there are  some situations  that are not compatible with this approach      2  Using Server Detection Service   Clients use this Service by default  if the other is not set obviously      You can use this approach  if the resetting of all system is needed  in particular  if you need to move  the Server to another computer or change the IP address of a computer with the Server     3  Using the SRV protocol     This approach allows to search the Server by name of a computer or Server service via the SRV  records at DNS server     Ta  J  1       ax       Chapter 3  Getting Started  General Information   59    If you configure the anti virus network for using the direct connections  the Server Detection Service  can be disabled  To do this  at the transport settings  Administration     Dr Web Server    configuration     Transport tab  leave the Cluster address field empty   Firewall Setup    For anti virus network components communication  all ports and interfaces  which are used by this  components  must be opened on all computers in the anti virus network     During Server installation  the installer allows to add an exceptions to OS firewall settings  To do this   set th
75. Center under Windows Internet Explorer  browser  you must add Dr Web Security Control Center address to the list of trusted sites in the  web browser settings  Tools     Internet Options     Security     Trusted Sites     For correct functioning of Dr Web Security Control Center under Chrome browser  you should  turn on cookies     30    Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface    Connecting to Dr Web Server    From any computer with network access to the Server  Dr Web Security Control Center is available  at the following address     http    lt Server_Address gt  9080    or  https     lt Server_Address gt  9081    where  lt Server_Address gt  is the IP address or domain name for the computer on which Dr Web  Server is installed     wy Ports numbers for HTTP connection and for protected HTTPS connection are differ  9080 and 9081    correspondingly     In the authorization dialog window specify the user name and password of the administrator  by  default  administrator name is admin and the password is the same  as was specified during Server  installation      If you connect through HTTPS protocol  secure SSL connection   the browser requests you to approve  the Server certificate  Warnings and indications of distrust to the certificate may display  because the  certificate is unknown to your browser  You need to approve the certificate to connect to Dr Web  Security Control Center     wy Some browsers  e g  FireFox 3 and later 
76. Connection parameters drop down lists  specify the type of creating neighbor Servers  connection     e In the Encryption and Compression drop down lists  specify parameters of traffic encryption  and compression between connecting Servers  see p  Traffic Encryption and Compression      Validity period of donated licenses   time period on which licenses are donated from the key  on the parent Server  The setting is used if the parent Server donates licenses to the current  Server     Period for accepted licenses renewal   the setting is not used in creating a parent Server     License synchronization period   interval for synchronizing information about donating  licenses between Servers     Flags in Licenses  Updates and Events sections are set according to parent child type of  connection and can not be changed     o parent Server sends licenses to child Servers   o parent Server sends updates to child Servers   o parent Server receives information about events from child Servers     In the Update restrictions  gt  Events section  you can configure the schedule of events  transmission from the current Server to the parent one  events transmission mode can be edited  as updates mode in the Update Restrictions for Workstations section      Click Save              As a result  the Parent Server  MAIN  will be included to the Parents and Offline folders  see    Figure 7 2      174    Ta  J  1       ax       Chapter 7  Configuring Dr Web Server       Ra Dr Web Server  aa Offiine 
77. DNS domains   List of DNS domains  which replaces default system list     7 2 3  Statistics    On the Statistics tab you can configure statistics information to write in the log file and to the Server  data base     To add corresponding type of information to the DB  set the following flags       Quarantine state     logs stations Quarantine state       Hardware and software composition      enables monitoring of hardware and software  composition and storing the information in the database      List of the station modules     enables monitoring of the list of the station modules and storing the  information in the database       List of installed components     enables monitoring of the list of the installed components   Scanner  monitors  etc  and storing the information in the database    e Sessions of stations users     enables monitoring of user sessions and storing in the database the  logins of users which are loged in the system with installed Agent      Start Stop of components     enables monitoring of the information on the start and stop of the  components  Scanner  monitors  etc  and storing the information in the database at stations      Detected security threats     enables monitoring of infections detecting and storing the information  in the database     If the Detected security threats flag is set  you can also configure additional parameters of statistic    on infections     Set the Send statistics to Doctor Web company flag  to activate sending statistics
78. Doctor Web  company  If necessary  you can setup your own update zones and include them into the list of servers  to receive updates     Dr Web Agent Update Settings    Update of the Agent software and anti virus package is configured separately for different versions of  OS under which this software will be installed       On the Dr Web Agent for Windows tab  in the group of selection buttons  specify whether you  want to update all components that will be installed on stations under Windows OS or update only  virus databases       On the Dr Web Agent for UNIX  specify UNIX system based OS for which you want to update the  components that are installed on workstations     To disable all updates receiving from GUS for Agent for UNIX  open the Detailed repository  configuration section  the Dr Web Agent for UNIX item  and on the Synchronization tab  set  the Disable product update flag     Dr Web Server Update Settings    On the Dr Web Server tab  specify OS for which you want to update Server files     To receive updates for Servers under all supported OS  set the Update all platforms available on  GUS flag     161    Ta  J  1       ax       Chapter 7  Configuring Dr Web Server      To receive updates for Server under certain OS  set only flags located next to their names     To disable all updates receiving from GUS for the Server  open the Detailed repository  configuration section  the Dr Web Server item  and on the Synchronization tab  set the  Disable product update flag
79. Inheriting Stations Configuration from Groups  Primary Groups    Inheriting a Station Settings    When a new workstation is created  its configuration settings are inherited from one of the groups to  which the station is included  That group is called a primary group If the settings of the primary group  are modified  these changes are inherited by all workstations included into the group  unless the  workstations have been customized  When creating a workstation  you can specify what group will be  regarded as primary  By default the primary group is Everyone     If Everyone is not a primary group  and a different primary group has no personal settings  the  settings of the Everyone group are inherited by a new station     It is possible to create nested groups     80    Ta     AN    aX       Chapter 5  Groups  Integrated Workstations Management    Inheritance in nested groups depends on groups hierarchy  If a station have no personal settings  it  inherits the configuration from a parent group  and this process repeats recursively  Therefore the  search for group configuration is performed upwards through the hierarchical tree of nested groups   starting from the station primary group and till the root group  If no personal settings are selected for  all nesting groups  then the Everyone group settings are inherited     Example    The structure of hierarchical list is the following     Network  Everyone  Groupi  Group2  i Group3  L Group4  Station1    The Group4 is the pri
80. Minute field  specify or select from the offered list the number of minutes that  should pass after the execution of initial task to start execution of edited task     The task will be launched at Agent start up   No additional parameters required to run the task     Select a day of the week  specify the hour and the minute  for the task to be launched  at the time specified     95    Ta     i    ax        Chapter 6  Administration of Workstations   96      Set the Disable after the first execution flag to execute the task only once at specified time  If  the flag is cleared  the task will be executed multiple times according to the specified periodicity     To repeat the launch of task already ones executed  use the ERI Schedule repeatedly on the  toolbar of the schedule section     4  When all parameters for the task are specified  click Save to accept changes of edited parameters   if you editing existing task  or to create a new task with specified parameters if you created a new  task     6 3 3  Installing Components of the Anti Virus Package    To change the installing components list of the anti virus package     1  Open the list of components  select the Anti virus network item in the main menu  then select  the station and click the Installing Components item in the control menu     2  Select an option for necessary components in the drop down list       Must be installed   means that a component must be present on the workstation  When a new  workstation is created 
81. S X and Linux operating systems     6 2 1 2  Configuration    In the Configuration section  you can change station configuration that includes the following      amp   Permissions for the workstation users Permissions of Station Users   fol Centralized schedule to run tasks on workstation Scheduled Tasks of a Station   ia License keys file for workstation License Manager   Q Restrictions on propagation of anti virus software Update Restrictions for Workstations  updates     Installing components list Installing Components of the Anti Virus   Package  w Settings of anti virus components for the station  Management of Anti virus Components    Dr Web Security Control Center also provides you with option for deleting personal settings of a  workstation  These settings are located on the right of the corresponding options for components  configuration options  When you delete personal settings of a workstation  it inherits settings from the    primary group       When you change settings of SpIDer Gate and or Office Control  please consider that settings of    these components are interconnected  so if personal settings of one of them are removed via  amp   Remove personal settings  it also removes settings of second component  settings inheritance  from the parent group is set      6 2 1 3  Groups    In the Groups section  you can set the list of groups into which the workstation is included  The  Membership list displays the groups which include the workstation and to which you 
82. The constant file system protection in the real time mode  The check of all files as they are  saved in the memory of the device     Calls and SMS Filter    Filtering the incoming phone calls and SMS allows to block the undesired messages and calls   such as advertisements or messages and calls from unknown numbers     Anti theft   Detect the device location or lock its functions in case it has been lost or stolen   Cloud Checker   URL filter allows to protect user of the mobile device from unsolicited Internet sites   Firewall  settings are available on a mobile device only     Protects the mobile device from external unauthorized access and prevents leak of vital data  via Internet  Monitors connection attempts and data transfer via the Internet and blocks  suspicious connections both on network and application levels     Security Auditor  settings are available on a mobile device only     Diagnostic and analysis of the security of mobile device and resolving the detected problems  and vulnerabilities    Application filter  Blocks the launch on mobile device those applications that are not included into the list of  allowed by administrator    Servers under Novell   NetWare   OS   Dr Web Scanner  Scans a computer on user demand and according to the schedule    SplDer Guard    The constant file system protection in the real time mode  Checks all launched processes and  also created files on hard drives and opened files on removable media     Ta  J  1       aX       Chapter 6
83. The following parameters are considered       Automatic membership  The parameter reflects whether stations may be automatically included in  the group  automatic membership support  and group contents automatically adjusted during Server  operation     e Membership administration  The parameter reflects whether the administrator can manage group  membership  add stations to or remove from the group     74    Ta     1       ax           Primary group  The parameter reflects whether the group can be primary for a station      Possibility to have own settings  The parameter reflects whether the group can have own    settings of anti virus components  to be propagated to its stations      Table 5 1  Groups and supported parameters    Everyone  Configured      Operating system    Status           Transport                   Ungrouped    l  di  ab    User groups    wy Under group administrator account  the user group which he manages will be the root of the  hierarchical tree  even if it has the parent group  All nested groups of managing group is available     5 2  Group Management    5 2 1  Creating and Deleting Groups    Creating Groups    To create a new group     1  Select   Add a station or a group on the toolbar and the      Create group in the submenu  A    window for creating a group will be opened     2  The Identifier field is filled automatically  You can edit it during creation  if necessary  The  identifier should not contain spaces  In the sequel group identifier ca
84. To apply the changes specified in the section settings  click Save  after this the Server must be  rebooted  To do this  click  amp   Restart Dr Web Server on the toolbar of this section     7 5 1  General    On the General tab  specify the following Web server settings     Dr Web Server address     IP address or DNS name of Dr Web Server   Parameter is specified in the following format      lt Server IP address or DNS name gt       lt port gt      If the Server address is not specified  computer name returned by the operating system or the  Server network address  DNS name  if available  otherwise   IP address are used     If the port number is not specified  the port from a request is used  e g   for requests to the Server  from the Control Center or via the Web API   Particularly  for the requests from the Control  Center it is the port specified in the address line for connection of the Control Center to the  Server     The value is stored in the  lt server name   gt  parameter of the webmin conf configuration file     This parameter value is also used to generate the link for downloading the Agent installation file for  an anti virus network stations     e Parallel requests number     number of parallel requests processed by the Web server  This  parameter affects server performance  It is not recommended to change this parameter without  need       IO threads number     number of threads serving data transmitted in network  This parameter  affects Server performance  It
85. Web Server Task Scheduler in the contro  menu  The list with the Server tasks will be   opened    To manage schedule  use the corresponding elements from the toolbar    a  General elements on the toolbar are used to create new tasks and generally manage schedule  section  These tools are always available on the toolbar       Create task     add a new task  This action is described in details below  in the Task Editor   section    E Export settings from this section to the file     export schedule to the file of special format    Ki Import settings to this section from the file     import schedule from the file of special   format     b  To manage existing tasks  set the flags next to the necessary tasks or the common flag in the  table header to select all task from the list  At this  elements on the toolbar to manage selected  tasks become available     Table 7 3  Toolbar elements for managing selected tasks    Status Enable Activate execution of selected tasks according to their schedule  if they were    execution disabled     141    Ta  yan    A    A  Y     Chapter 7  Configuring Dr Web Server   142    Disable Disable execution of selected tasks  Tasks remain on the list but will not be  execution executed        wy The same action you can perform from the task editor on the General tab by setting the Enable  execution flag     Severity Make critical Perform extra launch of the task at next Dr  Web Server launch  if scheduled  execution of this task has been omitted   Make
86. Windows OS standard broadcast notification system  You can set the alerts as described  in p  Setting Alerts     Web Server    Web server is a part of Dr Web Security Control Center and performs the following general  functions    e authentication and authorization of administrators in the Control Center      automation of Control Center pages operation    e support for dynamically generated pages of Control Center    support for HTTPS protected client connections     2 1 1  Dr Web Server Management under Windows   OS    Interface and Dr Web Server Management    Dr Web Server has no interface  As a rule  Dr Web Server can be managed via Dr  Web Security  Control Center which acts as an interface for the Server     Elements to facilitate adjusting and managing the Server are placed by the installation wizard in the  Programs main Windows OS menu  the Dr Web Server folder     e The Server control folder in its turn contains the commands to start  restart and shut down the  Server  as well as the commands to set up the logging parameters and other Server commands  described in detail in the Appendices document  p  H3  Dr Web Server       Web interface item opens Dr Web Security Control Center and connects to the Server installed  at this computer  at the http   localhost 9080        Documentation item opens administrator documentation in HTML format           Dr Web Server installation folder has the following structure       bin     Dr Web Server executable files   e etc     ge
87. able     e Self Protection  the Block changing of  system date and time  Block user activity  emulation options are not available     e Advanced  in the Log section settings  the  Dr Web Update  Dr Web Services  Create  memory dumps at scan errors options are not    91    available   Change Set the flag to allow users at the In the Agent settings  in the Protection  preventive station to edit preventive protection Components  gt  Preventive protection tab  all  protection settings  options are not available     configuration    Ta  2   ww    ax       92    Chapter 6  Administration of Workstations          Disable self  Set the flag to allow users at the In the Agent settings  in the Main  gt  Self   protection station to disable self protection  Protection the Enable self protection option is  not available     Uninstall Dr Web Set the flag to allow users at the Disables uninstalling of the Agent at the station  Agent station to uninstall Dr Web Agent  either via the installer or via standard Windows OS  services  In this case  Agent can be uninstalled only    via the X General     k Uninstall Dr Web    Agent option on the toolbar of Dr Web Security  Control Center     Run in mobile Set the flag to allow users at the The Updates section in the application main window  mode station to switch to mobile mode is blocked    and use Dr Web Global Update   System for updating  if there is no   connection with Dr Web Server     Run in mobile Set the flag to allow users at the For th
88. abled Total     Notifications Enabled Disabled  e Web console notifications View groups of stations properties All Nothing Enabled   Unsent notifications al     Notifications configuration Edit groups of stations properties All Nothing Enabled   All  Y Repository  z View groups of stations configuration All Nothing Enabled   Repository state All  s DEES Edit groups of stations configuration All Nothing Enabled      General repository configuration All  b Detailed repository configuration View stations properties All Nothing Enabled   Repository content All  v Additional features Edit stations properties All Nothing Enabled   Database management All     Dr Web Server statistics Move stations into groups and remove   All Nothing Enabled   fr i  soL k stations from groups All  SRA l Delete stations All Nothing ae      Utilities  Remote Agent installation and All Nothing Enabled  5  dainctallatian all     Doctor Web  1992 2015 17 13 16 01 2015  UTC  3 00           Figure 2 1  Dr Web Security Control Center window  Click the main menu option to see the description    Interserver Connections Menu    Information on multiserver anti virus networking and configuring neighbors is given in the  Peculiarities of a Network with Several Dr Web Servers section        Ta     1    ax       Chapter 2  Components of an Anti Virus Network and Their Interface    If interserver connections with other Dr Web Servers are configured  the following functions are  added to the administrator login on th
89. according to its schedule    e Utilities   the action is initiated via the external utilities  particularly via Dr Web Server  remote diagnostics utility     124    Ta  J  1       ax        Chapter 7  Configuring Dr Web Server   125      Result   the brief result of the action performing   e OK   operation successfully executed   e failed   an error occurred during the operation execution  Operation is not executed   e initiated   operation execution is initiated  The result of operation execution will be known  just after its completion   e no rights   administrator that launched the operation execution has no permissions to  execute this operation   e delayed   action execution is postponed until a certain period or performing of a certain  event   not allowed   execution of the requested action is prohibited  For example  deleting of  system groups     Lines that correspond to actions executed with an error  the failed value in the Result column   are  marked with red       Operation   the action description     If necessary  you can export data for the specified period into a file  To do this  click on the the  following buttons on the toolbar      amp  Save data in CSV file   fi Save data in HTML file     t Save data in XML file   ta Save data in PDF file     7 1 2  Dr Web Server Logging    Dr Web Server logs the events connected with its operation  Its name is drwcsd  log     wy The Server log helps to detect the problem in case of an abnormal operation of Dr Web    Ent
90. acle DB  the libaio required     Additionally under FreeBSD OS  the compat  8x library required     Dr Web Proxy Server requires     CPU  RAM    Intel   Pentium   III 667 MHz or faster  not less than 1 GB     Free disk space not less than 1 GB     Operating  system    Other    e Windows    e Linux    e FreeBSD    e Solaris    Complete list of supported OS see in the Appendices document  in Appendix A   For the installation of Proxy Server for UNIX system based OS  1sb v  3 or later     Additionally under FreeBSD OS  the compat  8x library required     Dr Web Security Control Center requires     e Windows Internet Explorer 8 and later  Mozilla Firefox 25 and later or Google Chrome 30 and later  web browsers     Opera   10 and later  Safari   4 and later web browsers also can be used  But operating under these  web browsers is not guaranteed     Full operability of the Control Center under Windows Internet Explorer 8 web browser with the    Enhanced Security Configuration for Windows Internet Explorer mode enabled is not guaranteed     If you install Server on a computer with a  _   underline  character in the name  configuration of  Server with Dr Web Security Control Center by use of Windows Internet Explorer will not be  available     In this case  use other web browser     For proper operation of Control Center in Microsoft Internet Explorer browser  IP address and or  DNS name of computer with installed Dr Web Server must be added to the trusted sites of browser   on which
91. action with anti virus network components and external resources such as GUS     To view Dr Web Server operation statistics     1   2   3     V e    Select the Administrating item in the main menu of the Control Center   In the opened window  select the Dr Web Server statistics item of the control menu   In the opened window  the following statistic data sections are presented     e Customer activity   data on number of served clients  which are connected to this Server   Dr Web Agents  neighbor Dr Web Servers and Dr Web Agent installers     e Network traffic   parameters of incoming and outgoing network traffic for exchanging data with  the Server     e System resources usage   uSage parameters of system resources of the computer on which  the Server is installed     Microsoft NAP   Dr Web NAP Validator operation parameters   Database usage   parameters of the Server database accessing     File cache usage   parameters of accessing the file cache of the computer on which the Server  is installed     DNS cache usage   parameters of accessing the cache which stores queries to DNS servers on  the computer on which the Server is installed     Alerts   parameters of the administrative notifications subsystem operation   Repository   parameters of data exchange between the Server repository and GUS servers   Web statistics   parameters of usage of the Web server     Cluster   parameters of accessing via the interserver synchronization protocol in Servers cluster  system for multis
92. ag is set next to the current parent group of  administrator  To change assigned group  set the flag next to the required group     It is mandatory to assign a parent group to the administrator  Each administrator can be included  only to the one group at a time  Permissions of administrator are inherited from the parent group     See also the Editing membership subsection     4  In the Permissions subsection  you can edit the list of actions that are allowed for the  administrator     Details on editing permissions are described in the Editing permissions subsection   5  Click Save to apply changes     Ta  J  i    ax       Chapter 4  Anti Virus Network Administrators    Editing Administrative Groups    To edit an administrative group     1  Select the group you want to edit from the list of the administrators  Click the group name to open  its properties section for editing   2  The Main subsection contains properties that were set during group creation     3  In the Groups subsection you can change the parent administrative group  The list contains groups  which can be assigned as a parental group  The flag is set next to the current parent group  To  change assigned group  set the flag next to the required group     It is mandatory to assign a parent group to the administrative group  The group inherits permissions  from its parent group     See also the Editing membership subsection        4  In the Permissions subsection  you can edit the list of allowed actions   Detail
93. al utility to download updates from the GUS with subsequent  distribution to Servers        anti virus network computers should have access to Dr Web Sever or to the Proxy server     17    Ta  2   ww    ax       Chapter 1  Welcome to Dr Web   Enterprise Security Suite   18       for interaction between the anti virus components  the following ports must be opened on used    computers     2193    ISX   Gr     9080  9081  10101  80  443    e incoming  outgoing for the Server For connection between the Server and  TCP and Proxy server anti virus components and for interserver    e outgoing for the Agent communication    Also is used by Proxy server to establish a    UDP incoming  outgoing connection with clients     For the Network Scanner     incoming for the Server    incoming  outgoing for the Agent    WEP    e outgoing for the computer on For the Network Installer   which the Control Center is  opened  UDP incoming  outgoing  HTTP e incoming for the Server  s For Dr Web Security Control Center   HTTPS e outgoing for the computer on  which the Control Center is  TCE opened For Server remote diagnostic utility   HTTP  outgoing For receiving updates from GUS   HTTPS    The 2371 port is required for connection  via TCP and UDP protocols  between components of 4 XX  version  It is used for support of compatibility  particularly during upgrade of anti virus network  components     Dr Web Server requires     CPU and The following operating systems installed on a computer with corre
94. alculated in the Assigned key  allow to use this component     Ta     ww    ys         Chapter 2  Components of an Anti Virus Network and Their Interface   54    b Set the flags for those objects  stations and groups  for which settings inheritance will be  terminated and installing components settings from the Assigned key column are set as a  personal  For other objects  for which flags are not set   initial settings from the Assigned key  column are inherited     2 5  The Interaction Scheme of an Anti Virus Network  Components    The Figure 2 2 describes a general scheme of an anti virus network built with Dr Web Enterprise  Security Suite     The scheme illustrates an anti virus network built with only one Server  In large companies it is  worthwhile installing several Dr  Web Servers to distribute the load between them     In this example the anti virus network is implemented within a local network  but for the installation  and operation of Dr Web Enterprise Security Suite and anti virus packages the computers need not  be connected within any local network  Internet connection is enough           Dr Web Server meee HTTP HTTPS       Dr Web Security Control Center TCP IP network    LS  Protected local computer    Unprotected local computer    Figure 2 2  The physical structure of the anti virus network    When Dr Web Server is launched  the following sequence of commands is performed     1  Dr Web Server files are loaded from the bin catalog   2  The Server Task Schedule
95. all installed at stations blocks the transfer  of packets needed to establish a TCP connection     During synchronization of Network Scanner search results with Server DB data  the Server DB  data has priority  i e  if station statuses from search results and from DB are differ  the status from  DB is set     10  Click the Scan button to launch network scanning     11  The catalog  hierarchical list  of computers demonstrating where Dr Web Enterprise Security  Suite anti virus software is installed will be loaded into this window     m    Unfold the catalog elements corresponding to workgroups  domains   All elements of the catalog  corresponding to workgroups and individual stations are marked with different icons the meaning of  which is given below     Table 2 3  Icons of the Network scanner    Workgroups    The work groups containing inter alia computers on which Dr Web Enterprise Security Suite anti   virus software can be installed     Other groups containing protected or unavailable by network computers   Workstations    The detected station is registered in the DB and active  i e  the workstation with installed anti virus  software      The detected station is registered in the DB as deleted  i e  the workstation is listed in the table of  deleted stations      The detected station is not registered in the DB  i e  there is no anti virus software on the station      The detected station is not registered in the DB  the station is connected to another Server      Se FM
96. allation Manual  p  Installing Dr Web Agent Software via Dr Web Security  Control Center         33    A  AN    T   v    A    A        Chapter 2  Components of an Anti Virus Network and Their Interface   34    5  Notifications    e Web console notifications     allows to view and manage administrator notifications which are  received via the Web console method    e Unsent_notifications     allows to track and manage administrative notifications failed to be sent  according to the settings of the Notification Configuration section       Notifications configuration     allows to configure administrative notifications on anti virus network  events           6  Repository    Repository state     allows to check repository state  date of last update of repository components  and their state     e Delayed updates     contains the list of products that are temporary disabled for updating in the  Detailed repository configuration section     e General repository configuration     opens the window to configure settings of connection to the  GUS and repository updates for all products     Detailed repository configuration     allows to setup revisions configuration for each repository  product separately     e Repository content     allows to view and manage current repository content as files and folders of  repository folder     7  Additional features  e Database management     allows direct maintenance of Dr Web Server database   e Dr Web Server statistics     contains statistics of
97. alled group     T Approve selected stations and set a primary group  Prescribes to confirm access of the  station to the Server and to set a primary group from the offered list        cancel action specified to execute on connect  Prescribes to cancel the action on  unapproved stations which was specified earlier to execute at the moment when the station  connects to the Server        Reject selected stations  Prescribes to forbid access of the station to the Server   ce Settings of tree view  Adjust the appearance of the list     for groups     e All groups membership     show a station in all groups it is a member of  only for groups  under the white folder icon  see Table 2 1   If the flag is set  the station will be shown in all  member groups  If the flag is cleared  the station will be shown only in the top white folder     e Show hidden groups     show all groups included in the anti virus network  If you clear the  flag  all empty groups  not containing stations  will be hidden  It may be convenient to  remove extra data  for example  when there are many empty groups    e for stations    e Show station ID   enables disables showing of stations unique identifiers in the  hierarchical list   Show station names      enables disables showing of stations names in the hierarchical list   if such are given    e Show station addresses   enables disables showing of stations IP addresses in the  hierarchical list    e Show station servers     enables disables showing of names o
98. amage the operating system     e Custom   protection level that is set by a user  Server administrator  and based on settings  specified in the table below     To specify custom settings of preventive protection level  set the flags in the table of this section to  the one of the following position     e Allow   always allow actions with this object or from this object     Ta     1       ax       Chapter 6  Administration of Workstations    e Ask   prompt the dialog box for setting necessary action by the user for the specific object   e Block   always deny actions with this object or from this object     If you change table settings when one of preinstalled levels in the Level of suspicious activity  blocking section is set  it automatically changes to Custom     Preventive protection settings allow to monitor the following objects       Integrity of running applications   detect processes that inject their code into running  applications that may compromise computer security  Processes that are added to the exclusion list  of SpIDer Guard component are not monitored        Integrity of users files   detect processes that modify user files with the known algorithm which  indicates that the process may compromise computer security  Processes that are added to the  exclusion list of SpIDer Guard component are not monitored  To protect your data from  unauthorized modifications  it is recommended to set the creation of protected copies for important  files     e HOSTS file   th
99. ane of the License Manager in the keys tree  select the key you want to add to the  objects keys list     2  Click B Propagate the key to groups and stations on the toolbar  A window with hierarchical  list of stations and groups of anti virus network opens   3  Select licensing object from the list  To select several stations or groups  use CTRL and SHIFT     4  Click Add key  A window with installed components settings described in Settings for Adding a  License Key to the Keys List  opens     5  Click Save to add the license key           Remove the License Key and the Object from the Licensing List    A You cannot remove the last license key record of the Everyone group     To remove the license key or the object from the licensing list     1  In the main pane of the License Manager in the keys tree  select the key you want to remove  or    the object  station or group   to which this key is assigned  and click ik Remove selected  objects on the toolbar  At this     e If the licensing object was selected  this object will be removed from the list of objects on which  its key is effects  An object for which a personal license key is removed  inherits a license key     e If the license key was selected  this key record is removed from the anti virus network  All objects  to which this license key was assigned  inherit a license key     2  A window with installed components settings described in Settings for License Key Changing  opens   3  Click Save to remove selected obje
100. ard  SpIDer Mail  SpIDer Gate  Firewall and Self   protection components    To select all types of interrupting components  set the flag against the header of the Interrupt   running components panel     Click Interrupt     6 5 3  Launching Scan on Station    To launch a scan task     1     In the main menu of Dr Web Security Control Center  select Anti virus network     2  Click the name of a station or group in the hierarchical list of the opened window   3  In the toolbar  click Q  Scan  In the opened list at the toolbar  select one of the following scan    modes     El Dr Web Scanner  Express scan  In this mode the following objects will be scanned     e main memory  RAM     e boot sectors of all disks       autorun objects      root directory of the boot sector       root directory of the Windows OS installation disk     107    Ta  J  1       ax       Chapter 6  Administration of Workstations    system directory of the Windows OS    My documents folder      temporary directory of the system    e temporary directory of the user     ER Dr Web Scanner  Complete scan  In this mode complete scan of hard disks and removable  disks  including the boot sectors  is performed     E Dr Web Scanner  Custom scan  In this mode you may select any files and folders to scan  and  Specify extended parameters of the check     You can launch the Scanner only if you select active stations running under OS that supports the  Scanner launch  Windows OS  UNIX system based OS and OS X     4  Aft
101. art connecting to the GUS and downloading the repository     186    Ta  J  1       ax       Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Components    8 4 2 2  Console Utility    Console version of Dr Web Repository Loader utility is located in the bin subfolder of Dr Web  Server installation folder  You are allowed to run this utility version only from this Server folder   Executable file is drwreploader     Available Download Methods    Recommended procedure    1  Download the Server repository from GUS using the drwreploader exe utility  When  downloading  use the   archive switch to archive the repository     2  Import the downloaded repository to Server via the Contro  Center  from the Administration      Repository Content section        Manual import    1  Download the Server repository from GUS using the drwreploader exe utility without the     archive switch  When downloading  use the   path  lt argument gt  switch to download the  repository to the specified folder     2  To import the repository  copy and replace files from the  lt argument gt  folder to the  repository  folder in the Server installation folder     3  Reload the repository from the Control Center  the Administration     Repository state section     Possible Switches        help     show help message on switches         show products     show the list of GUS products        path  lt argument gt      download the repository from GUS to the folder specified as  lt argument gt 
102. art of Dr  Web Security Control Center     b  Click Properties in the contro  menu  A window with the group properties will be opened     3  Window with the group settings contains the General and Configuration sections  These settings  are described below     If you open group properties in the right part of the Control Center  see the step 2 a     the  Stations information section with general information about stations  included to this group  will  be also available     4  Click Save to save all changes   General    In the General section  the following information is presented       ID   group unique identifier  Is read only     e Name   group name  You can change the group name  if necessary  For preinstalled groups  the  Name field is read only       Parent group   parent group in which this group is included and from which group configuration is  inherited  if the personal settings are not specified  If a parent group is not specified  settings are  inherited from the Everyone group        Description   optional filed with group description   Stations Information    In the Stations information section  the following information is presented        Stations   total number of stations which are included into this group     Primary group for   number of stations for which this group is primary      Stations online   number of stations in this group which are currently online     Configuration    wy For more details on inheriting of group settings by stations  for which t
103. ase to save all information from the database into a gz archive  Exported  XML file is similar to the database export file which is obtained when running the Server  executable file from the command line with the xmlexportdb switch  This export file can be  imported when running the Server executable file from the command line with the  xmlimportdb switch     These commands are described in details in the Appendices documents  in the H3 3  Database  Commands section      167    Ta  J  1       ys       Chapter 7  Configuring Dr Web Server   168      Export information on stations and groups to save information about the objects of the anti   virus network into a zip archive  In the result of this command execution  all information on  groups of stations and stations accounts of the anti virus network served by this Servers  is save  into the file of a specific format  Export file contains the following information about stations   properties  components configuration  permissions  update restrictions settings  schedule   installing components list  statistics  information on deleted stations  about groups  properties   components configuration  permissions  update restrictions settings  schedule  installing  components list  parent group ID    Further  export file can be imported via the Database management section     3  Click Export     Specify the path to save the archive with the database according to the web browser settings in  which the Control Center is opened     Data
104. ating 189  Dr Web Server  installation folder structure 25  27  interface 25  27  log 24  logging 125  schedule 141  setting connections 173    settings 127  start 26  tasks 24    types of connections 171    E    encryption  traffic 129    F    force update 183  functions  Agent 29  anti virus Server 24    G    groups 73  adding a station 77  configuration  inheriting 80  primary 80  removing a station 77  settings 80  settings  propagation 82    Ta  2   i    ax       GUS  see also manual updating 183    I    icons  hierarchical list 35  151  network scanner 46  interface  Agent 29    anti virus server 25  27    key files 22  demo 23  receiving 22    see also registration 22    language  Control Center 41  68    licensing 22    M    manual updating 183  mobile mode of the Agent 189    N  NAP Validator 194  setting 196  Network Scanner 45  newbie 83  100  notifications  repository  updating 159  sending  to the users 121    P    permissions  Administrators 66  users 91  preinstalled groups 73  primary groups 80  proxy server  functionality 191  start  stop 194    Index    R    registration   Dr Web product 22   stations  at the Server  removing   groups 75   stations  from a group  repository   simple editor 160  Repository Loader 185    rights  Administrators 66  users 91    S    Scanner   anti virus 106   Network 45  scanning   automatic 92   manually 106  schedule   Server 141   updates 183  Server logging 125  settings   Agent 100    anti virus Server 127    propagation 82
105. ations according to the genera  procedure           You can manage frozen revisions for all products on the Delayed Updates page        7 8 5  Repository Content    The Repository content section allows to view and manage current repository content as files and  folders of repository folder     The main window of Repository content section contains hierarchical tree of repository content  displays all folders and files of current version of the repository with the list of all revisions for each  product     View Information on the Repository    To view information on all repository objects  select the object in the hierarchical tree of repository  content  The properties panel with the following information will be opened     e The Selected objects subsection contains detailed information on the object selected in the  repository content tree  Type  Size  for separate file only   Creation date and Modification  date     e The Repository state subsection contains general information on all repository objects  current  list of objects and the date of their last update     Manage Repository    To manage repository content  use the following buttons on the toolbar     e  Export repository file to an archive        S Import archive with repository files         Delete selected objects   delete objects selected in the repository content tree without possibility  to restore        data by the Server you must reload the repository     em After you change the repository content  e g  
106. atures for managing Dr Web Server software     e Update the Server software to one of the available versions downloaded from the GUS and stored in  the Server repository  Description of settings for updating the repository from GUS  is given in the  Administration of Dr Web Server Repository section    e Rollback the Server software to the saved backup  The Server backups are created automatically  during update to the new version in the Dr Web Server Updates section  step 4 in the procedure  below         Upgrading the Server within version 10 can be also performed via the Server distribution kit  The  procedure is described in the Installation Manual  in the Upgrading Dr Web Server for Windows    OS or Upgrading Dr Web Server for UNIX   System Based OS sections     Not all Server updates within version 10 have the distribution kit file  Some of them can be installed  via the Control Center only     After the Server upgrade under UNIX system based OS via the Control Center  the Server version  in the OS package manager will not be changed     To manage Dr Web Server software    1  Select the Administrating item in the main menu of the Control Center  in the opened window   select Dr Web Server in the control menu    2  To open the Server versions list  perform one of the following actions   e Click the current version of the Server in the main window   e Click Versions list     3  This opens the Dr Web Server Updates section with the list of available updates and backups of 
107. b  set corresponding flags  see below   then click Save and restart the Server     Table 6 8  Correspondence between items of Statistics section  and flags of Statistics data section    Summary statistics Scan statistics    Ta     1       ax        Chapter 6  Administration of Workstations   115       Threats   Errors   Scan statistics  Start Stop  Threat statistics  Status   Tasks    Virus Bases    Modules  All network installations    Detected security threats  Scan errors   Scan statistics   Start Stop of components  Detected security threats  Station statuses   Station tasks execution log  Stations statuses   Virus database statuses  Station tasks execution log  List of the station modules    Agent installations    The windows with the statistics for different components and the total statistics of workstations have  the same interface  and the actions to set the information to be provided are similar     Below several examples for viewing the statistics via Dr Web Security Control Center are given     6 6 1 1  Summary Data    To view Summary data     1  In the hierarchical list select a station or a group    2  Select Summary data item from the Statistics section of the control menu    3  The window with report table data will be opened  To include specific data in the report  click  Summary data on the toolbar and select necessary types in the drop down list  Scan statistics   Threats  Tasks  Start Stop  Errors  Statistics from this report sections are similar to statis
108. b Security Control Center Extension     A Automatic authorization option requires Dr  Web Security Control Center Extension     Further  for any Control Center in this web browser  authorization will be proceeded automatically  if  the user with these login and password is registered at the Server  If the login and password do not  much  e g   such user is not registered or the user with this name has the different password   the  standard Dr Web Security Control Center authorization window will be given     After clicking Logout in the main menu of the Control Center  information about administrator s  login and password is deleted     At next logon in the Control Center  it is necessary to repeat standard authorization procedure with  specifying login and password  If automatic authorization is enabled  specified login and password  are saved for the current web browser and authorization in Control Center become automatic   without login and password confirmation  till next Logout clicking     In the Session timeout drop down list  select time period after which the user session of Control  Center in a web browser is automatically terminated     PDF Export    In this section you can specify text settings for statistic data export to the PDF format       In the Reports font drop down list  select the font  which is used at reports export to PDF format       In the Reports font size field  specify the font size of general text of statistic tables  which is used  at reports ex
109. base Import    You can use the import procedure of the database containing information on the objects of anti virus  network  to transfer the information either on the new Server or on the Server which is already  operating into anti virus network  particularly to merge the lists of served stations of two Servers     All imported stations will be able to connect to the Server on which you perform the import  When   A you performing the import  please note that you must have corresponding number of available  licenses to connect imported stations  E g   if necessary  in the License Manager section  add the  license key from the Server  from which the information about stations had been imported     To load the database from a file  perform the following actions     1  Click GY Import on the toolbar   2  In the import window  specify the zip archive with the database file  To select the file  you can use    the bS  button     You can import only those zip archives that have been obtained during the export of the database for  the Export information on stations and groups option     3  Click Import to start the import process   If during import  there are stations or and groups with the same identifiers which are included both  into imported data and into current Server database  the Collisions section opens to configure  actions on duplicated objects   Groups and stations lists are presented in separated tables   For corresponding objects table  in the Groups import mode or Sta
110. be frozen and delayed for the time period  specified in the Change updates delay time list        To configure delayed updates     1  Set the Delay updates flag to temporarily disable downloading updates from GUS servers for this  product    2  In the Updates delay time drop down list  select the time period to delay downloading of updates  starting from the moment of their receive from the GUS servers    3  If required  set the Delay updates for the following files only flag to delay distribution of  updates that contain files which corresponds to the masks specified below  Masks are specified in  the format of regular expressions     164    Ta  J  i    ax       Chapter 7  Configuring Dr Web Server    If the flag is cleared  all updates from the GUS are frozen     To disable the frozen state       On the Revision list tab  click L  Execute immediately to disable the frozen state for the product  and add the revision to the list of revisions distributed to stations according to the general procedure     e On the Revision list tab  click   Cancel update to disable the frozen state for the product and  forbid the revision  Updating from the GUS is restored  Unfrozen revision will be removed from the  list of product revisions  After the next revision is received  the unfrozen revision will be removed  from the disk     e When the time specified in the Change updates delay time list is out  the revision becomes unfrozen and  is included to the list of revisions distributed to st
111. can errors  to create memory dumps in cases of scan errors  occur  It is recommended to enable this setting for Dr Web operation errors analysis     6 4 2 5  Interface    On the Interface tab  you can specify the parameters of the Agent interface       Set the Show icon in taskbar flag to display Agent icon in the taskbar  If icon is disabled  user cannot view  and edit settings of Agent and anti virus package       Set the Show reboot request flag to display a request on station reboot  If the flag is cleared  request is not  displayed at the station and automatic reboot is not performed  Statistics of a station received by the  Control Center  contains notification on the need of station reboot  Information on a state that  requiring reboot is displayed in the State table  Administrator is able to reboot a station from the  Control Center if it is needed  see the Anti Virus Network section      To select the type of events that a user is to be notified of  set the respective flag        Critical notifications   receive only critical notifications  Such notifications include periodical reminders  about     e updating errors of the anti virus software or some of the components   e the necessity to restart a computer after updating   The notification shows  if the user has administrator rights      Threats notifications   receive only notifications about viruses  This type of notification includes  messages about virus  viruses  detection by one of the anti virus software comp
112. can include it     Ta  J  1       aX       Chapter 6  Administration of Workstations   88    To manage the membership of a workstation do the following     1  To add a station to the user group  set the flag for this group in the Membership list   2  To remove a station from the user group  clear the flag for this group in the Membership list     wy You cannot remove stations from preinstalled groups     3  If you want to reassign the other primary group  click the icon of necessary group in the  Membership list  The 1 sign displays on the icon     6 2 1 4  Security    In the Security section  restrictions for network addresses from which Agents installed on the station  will be able to access the Server are set     To allow all connections  clear the Use this ACL flag  To make the list of allowed or denied addresses   set the flag     To allow any TCP address  include it into the TCP  Allowed or TCPv  6  Allowed list   To deny any TCP address  include it into the TCP  Denied or TCPv6  Denied list     To edit addresses in the list    1  Specify an address in the corresponding field in the following format   lt  P address gt      lt network prefix gt      2  To add a new field  click    in the corresponding section    3  To delete a field  click     next to the deleting address    4  Click Save to apply settings     Examples of prefix usage   1  Prefix 24 stands for a network with a network mask  255 255 255 0    Containing 254 addresses   Host addresses look like  195 136 12 
113. ce     Ta  J  1       ax       Chapter 6  Administration of Workstations    Task schedule     a list of actions performed automatically at a preset time on workstations  Schedules  are mostly used to scan stations for viruses at a time most convenient for users  without having to  launch the Scanner manually  Besides Dr Web Agent allows to perform certain other types of tasks as  described below     To edit centralized schedule of regular tasks execution for certain stations and groups  use Dr Web  Security Control Center     To edit centralized schedule  perform the following actions     1  Select the Anti virus network item in the main menu of the Control Center  in the hierarchical  list of the opened window  select a group or workstation  In the opened contro  menu  select Task  Scheduler  The list with the tasks of the station will be opened     wy By default for stations operated under Windows OS  schedule contains the Daily scan task   daily    station scan  disabled      2  To manage schedule  use the corresponding elements from the toolbar   a  General elements on the toolbar are used to create new tasks and generally manage schedule  section  These tools always available on the toolbar        Create task   add a new task  This action is described in details below  in the Task Editor  section     5 Propagate these settings to another object   copy sheduled tasks into other objects    stations and groups  For details  see Propagation of Settings to Other Groups Statio
114. charts window will  be opened  see detailed description below      1    rae    Ta  J  1       ax        Chapter 6  Administration of Workstations   117    6 6 1 3  Status    To view data on workstations status     1  In the hierarchical list select a station or a group    2  In the control menu select Status item from the Statistics section    3  Status information are displayed according to the filter settings  Click Y on the toolbar  to change  the following filter parameters      In the Period drop down list  select a time period during which stations have not been connected  to the Server  Period field displays the number of days corresponding to the selected period  the  list will contain stations which have been disconnected from the Server during specified time slot  or more  In case of excess of this count  situation is rated as critical for the anti virus network  security      In the Severity drop down list  set the flags for necessary levels of messages severity  the list of  messages on status will contain only messages with selected severity  All flags are set by default      In the Source list  set the flags for those sources of messages appearance that will be displayed  in the list    e Agent   display events from Dr Web Agents connected to this Server   e Server   display events from this Dr  Web Server      In the Stations list  set the flags for stations status types  messages on which will be displayed in   the list   e Online   display events for stations
115. checks workstation  anti virus state against the corresponding health requirement policies  and then classifies the  workstation in one of the following ways    e Workstations which meet the health policy requirements are classified as compliant and allowed  unlimited access and communication on the network    e Workstations which do not meet at least one requirement of the health policy are classified as  noncompliant and have their access limited to Dr Web Server only  The Server allows  noncompliant workstations to update the system with the necessary anti virus settings  After  update  the workstations are validated again           Health Policy Requirements    1  Dr Web Agent must be started and running  Agent health      2  Dr Web virus databases must be up to date  i e  databases on the workstation must be similar to  those on the Server     195    Ta  J  1       aX       Chapter 9  Configuring the Additional Components    Configuring NAP Validator    After installation of Dr Web NAP Validator  see Installation Manual  p  Installing NAP Validator   on a computer where a NAP server resides  you need to perform the following actions     1  To open NAP server configuration component  run the nps msc command   2  In the Policies section  select Health Policies   3  In the opened window  open properties of the following elements       NAP DHCP Compliant  In the settings windows  set the Dr Web System Health Validator  flag which prescribes to use Dr  Web NAP Validator compo
116. ched the specified value  the  oldest revision is removed  Revisions marked as Current  Stored and Distributed are not removed        Set the Disable product update flag to disable receiving updates for this product from the GUS  servers  Agents will be updated to the current revision on the Server  or according to the procedure  used to select the distributed revision      For some products  the following settings are also available     Set the Update only following files flag to receive updates from GUS only for the file listed below         Set the Do not update only following files flag to disable updating from GUS only for the file  listed below        Ta     AN    ax       Chapter 7  Configuring Dr Web Server    Files can be specified in the format of regular expressions     If both flags are set  files for an update are selected as follows     1  From the full list of product files only those are selected that are specified in the Update only  following files lists     2  From the selection at step 1  files specified in the Do not update only following files lists are  removed     3  Files resulting from the selection at step 2 are updated from GUS     Notifications    On the Notifications tab  you can configure notifications on repository updates       Set the Do not notify only about following files flag to disable notifications on events of the files  listed below      Set the Notify only about following files flag to enable notifications on events of the files list
117. communicate with Agents that installed on workstations       Name   the name of Dr Web Server  If no name is specified  the name set on the General tab is  used  see above  if no name is set on the tab  the computer name is used   If the other name  specified for the protocol than the name from the General tab  the name from the protocol  description is used  This name is used by detection service to find Server by Agents and etc      Set the Discovery flag to enable Server discovery service      Set the Multicasting flag to use the Multicast over UDP mode for detecting the Server    e Multicast group     IP address of multicast group in which the Server is registered  It is used for  communication of Agents and Network installers when searching active Dr Web Servers in the  network  If field is not specified  the 231 0 0 1 group is used by default    e Under UNIX system based OS only  in the Path field  specify the path to the connection socket  e g    with the Agent     wy See the Setting the Network Connections section for more details        This parameters should be specified in the network addresses format described in the Appendices  document  p  Appendix E  The Specification of Network Addresses     7 2 9  Modules    On the Modules tab  you can configure protocols for interaction of the Server with other Dr Web  Enterprise Security Suite components     e Set the Dr Web Security Control Center extension flag to use Dr Web Security Control  Center Extension for managing
118. con of update error is displayed next to the general icons of stations on which errors during anti virus  software update occurred     To display the sign  select the   Settings of tree view option on the toolbar and set the Show  update error icon flag   E g   if an error during anti virus software update occurred on an online workstations  its icon looks as    follows     E     Y Icon of membership rules is displayed next to the general icon of groups for which rules of automatic  stations placing are set     To display the sign  select the   Settings of tree view option on the toolbar and set the Show  membership rules icon flag     E g   if a groups that is always shown in the hierarchical list has membership rules specified  its icon  looks as follows  Y  2     Management of the anti virus network catalog elements is carried out via the toolbar of the hierarchical  list     Toolbar    The toolbar of the hierarchical list contains the following elements        General  Manage the general parameters of the hierarchical list  Select the corresponding item in  the drop down list     LS Edit  Opens settings of the station or group in the right pane of Dr Web Security Control  Center     X Remove selected objects  Remove an items from the hierarchical list  Select the items in the  list and click Remove selected objects    R Remove membership rules  Remove rules for automatic including stations to groups    Set this group as primary  Determine the selected group as primary for
119. ct and to switch to the inherited key        Donate a License to a neighbor Server    At donating a part of vacant licenses to a neighbor Server from the license key of this Server  donated  number of licenses will not be available for use on this Server till the end of propagation time of these  licenses     To donate licenses to a neighbor Server     1  In the main pane of the License Manager in the keys tree  select the key a vacant licenses from  which you want to donate to neighbor Server     2  Click fi Propagate the key to neighbor Servers on the toolbar  A window with hierarchical tree  of neighbor Server opens     51    Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface   52    3  Select from the list those Servers to which you want propagate licenses   4  Specify the following parameters next to the each Server   e Number of licenses   number of vacant licenses  you want to donate from this key to a  neighbor Server     e License expiration date   validity period of licenses donation  After specified time period  all  licenses will be recall from the neighbor Server and got back to the list of vacant licenses in this  license key     5  Click on of the buttons     e Add key   to add licenses to the list of presence licenses of neighbor Servers  A window with  installed components settings described in Settings for Adding a License Key to the Keys List   opens     e Replace key   to remove current licenses of neighbor Servers and 
120. ction  you can configure the list of interfaces to listen for  accepting connections via the HTTP protocol     In the Address and Port fields  specify correspondingly the IP address and the port number of the  network interface from which HTTP connections can be accepted     By default  the following parameters are set to  listen  by the Web server     e Address  0 0 0 0     use  all network interfaces  for this computer  on which the Web server is  installed     e Port  9080     use the standard 9080 port for the HTTP protocol     Ta  J  1       aX       Chapter 7  Configuring Dr Web Server   150       In the Addresses to listen on HTTPS section  you can configure the list of interfaces to listen for  accepting connections via the HTTPS protocol     In the Address and Port fields  specify correspondingly the IP address and the port number of the  network interface from which HTTPS connections can be accepted     By default  the following parameters are set to  listen  by the Web server     e Address  0 0 0 0     use  all network interfaces  for this computer  on which the Web server is  installed     e Port  9081     use the standard 9081 port for the HTTPS protocol     To add a new address field  click   in the corresponding section  To delete a field  click     next to  the deleting field     7 5 4  Security    On the Security tab  you can configure restrictions for network addresses from which the Web server  receives HTTP and HTTPS requests     To setup access limitation
121. ctive Directory   the third  via the  RADIUS   the fourth  Under UNIX system based OS  the PAM is used the fifth     Authentication methods via LDAP  Active Directory and RADIUS can be swapped in the Server  settings  but authentication of administrator from the Server DB is always used first     Authentication methods via LDAP  Active Directory and RADIUS are disabled by default     To swap the usage of authentication methods     1   2   3     Select Administration in the main menu of the Control Center   Select Authentication in the control menu     In the opened window  list of authentications types is represented in the order of use  To change  this order  drag and drop authentication methods in the list and place them in the necessary order  of use the authentication     To apply changes  you must restart the Server     Administrative login must be unique     Administrators are not allowed to connect via external authentication systems if an administrator with  the same login already exists at the Server     61    Ta  J  i    aX        Chapter 4  Anti Virus Network Administrators   62    4 1 1  Authentication of Administrators from the Server DB    Authentication method with storing administrative account information in the Server DB is used by  default     To manage administrators list     1  Select Adminiatration in the main menu of the Control Center   2  Select Administrators in the control menu  The list of all administrators registered in the DB will  be opened    
122. d contro  menu in the Statistics section  select the Virus bases item     This opens a window with information on installed virus databases  the name of the file containing a  particular database  virus database version  the database creation date  the total number of virus  records in the database     then select Dr Web Server configuration in the control menu of the window  On the Statistics  tab  set Stations status monitoring and Virus database monitoring flags  then restart the  Server     w If the Virus bases item is hidden  to view the item  select Administration in the main menu  and    Ta     AN    ax        Chapter 6  Administration of Workstations    6 2 3  Hardware and Software on Stations under Windows   OS    Dr Web Enterprise Security Suite allows to accumulate and view information on hardware and  software installed on protected stations under Windows OS     To collect information on hardware and software of the stations     1     Enable statistics collecting on the Server   a  Select the Administration item in the main menu of the Control Center   b  Select the Dr Web Server Configuration item in the control menu     c  In the Server settings  open the Statistics tab and set the Hardware and software flag if it  is cleared     d  To apply the changes  click Save and restart the Server   Allow collecting statistics on stations   a  Select the Anti virus Network item in the main menu of the Control Center     b  In the hierarchical list of anti virus network  s
123. d into a cluster  to child Servers via  the interserver connection directly during operation     Thus  on a parent Server can be located only one license file containing the number of licenses  that corresponds the total number of server stations  and the necessary number of licenses to  child Servers is propagated during operation of a cluster  Administrator of anti virus network  should manually configure donation of necessary number of licenses to child Servers for a  necessary time period     Use the License Manager to configure licenses donation to the neighbor Servers     For example  you can configure hierarchical structure of Servers and allocate the parent Server   may be either the Server within a cluster or not included into a cluster  which will be  propagate both repository updates and licenses from a license file to all nodes of a cluster     b  In case of refusal to configure hierarchical structure of the Servers  opportunity to donate  licenses from a single license file between all the Servers is not supported  In this case  you  must plan the structure of anti virus network considering cluster of the Servers beforehand   and use several license files   one for each Serves of a cluster  Total number of licenses in all  license files is equal to the total number of stations in the network  but distribution the number  of licenses between Servers of a cluster you must calculate beforehand considering the  assumed number of stations that are planned to be connec
124. d to favorites list for the quick assess     7  Search for stations and groups in an anti virus network by different parameters  name  address   ID     8  View and manage messages on major events in an anti virus network via the interactive Push  notifications    e display all notifications at Dr  Web Server    e set reactions on notification events    e search notification by specified filter parameters    e delete notifications    e exclude notifications from automatic deletion   You can download Mobile Control Center from the Control Center or directly in App Store and  Google Play     Network Stations Protection    On protected computers and mobile devices of the network  the control module  Agent  and the  anti virus package for corresponding operating system are installed     Ta  J  1       ys       Chapter 1  Welcome to Dr Web   Enterprise Security Suite    Cross platform software allows to provide anti virus protection of computers and mobile devises  under the following operating systems     e Windows   OS    e UNIX   system based OS   e OS X      e Android OS    e Novell   NetWare   OS     Either user computers or LAN servers can be protected stations  Particularly  anti virus protection of  the Microsoft   Outlook   mail system is supported     Control module performs regular updates of anti virus components and virus databases from the  Server and also  sends information on virus evens on protected computer to the Server     If the central protection Server is not
125. d to this Server updating is  performed in two stages     1  Update via multicast protocol   2  General update via the TCP protocol   To setup multicast updates  use the following parameters     UDP datagram size  bytes      size of UDP datagrams in bytes     Allowed range is 512   8192  To avoid fragmentation  it is recommended to set a value less than MTU   Maximum Transmission Unit  of the network        File transmission time  ms       during specified time  single update file is transmitted  after that  Server starts sending the next file     All files which failed to transmit at the step of multicast protocol update  will be transmitted at  standard update process over the TCP protocol     e Multicast updates duration  ms       duration of update process via multicast protocol     All files that failed to transmit during update stage via multicast protocol will be transmitted in process  of standard update via TCP protocol     e Packages transmission interval  ms       interval of packages transmission to a multicast group     The low interval value may cause significant losses during package transfer and network overload  It  is not recommended to change this parameter       Interval between retransmission requests  ms       with this interval Agents send requests for  retransmission of lost packages     Server accumulates these requests after that sends lost blocks     Ta  yan    A    A        Chapter 7  Configuring Dr Web Server         Silence    interval on the lin
126. de from the  previous version saving configuration file  the authorization queue value is saved from the previous  version configuration     If you need to edit the authorization queue value  edit the following parameter value in the Server  configuration file      lt     Maximun authorization queue length    gt    lt maximum authorization queue size  50   gt        Set the Limit updates traffic flag to limit the network traffic bandwidth for transmitting updates  from Server to Agents     If the flag is set  specify in the Maximal transmission speed  KB s  field the value of maximal  speed for updates transmission  Updates will be transferred in ranges of specified bandwidth of  summary network traffic for all Agents updates     If the flag is cleared  updates for Agents are transferred without limitation of network traffic  bandwidth     For more details see Update Traffic Limitations         In the Newbies registration mode drop down list  select the registration mode for new stations   see New Stations Approval Policy      e In the Default primary group drop down list select the group which is set as a primary when  access of stations to the Server is allowed automatically     e Set the Reset unauthorized to newbie flag to reset parameters to access the Server for  workstations which have not passed authorization check  This option can be helpful when you  change Server settings  such as public key  or change the DB  In such cases workstations will not be  able to connect
127. ded through the checksums  a file corrupted at  sending or replaced will not be received by the Server     Between the Server and Dr Web Security Contro  Center  a dashed line in Figure 2 3  data about  the configuration of the Server  including information about the network layout  and workstations  settings are passed  This information is visualized on Dr Web Security Contro  Center  and in case a  user  an anti virus network administrator  changes any settings  the information about the changes is  transferred to the Server     Connection between Dr Web Security Control Center and a certain Server is established only after  an anti virus network administrator is authenticated by his login name and password on the given  Server     Ta     i    ax       Chapter 3  Getting Started  General Information   57    Chapter 3  Getting Started  General Information  3 1  Establishing a Simple Anti Virus Network    Before using the anti virus software it is recommended to change the settings of the backup folder  for the Server critical data  see p  Setting Dr Web Server Schedule   It is advisable to keep the  backup folder on another local disk in order to reduce the risk of losing Server software files and  backup copies at the same time     Connecting via Dr Web Security Control Center    The Server is started automatically once the installation of the Server is complete  see also Dr Web  Server          To set up the Server and configure the anti virus software  Dr Web Security Con
128. delete or import repository objects  to use the changed    See the Repository State section     165    Ta     a    ax       Chapter 7  Configuring Dr Web Server   166    Repository Export    To save repository file into a zip archive  perform the following actions     1     In the hierarchical tree of the repository content  select the product  separate product revision or  entire repository  Entire repository will be exported if nothing is selected in the tree or the  Repository tree header is selected  To select several objects  use CTRL or SHIFT     Please note the general type of exported objects during repository export     a  Zip archives of repository products  Such archives contains one of the following repository object  types     e Entire repository   e Entire product   e Entire separate revision     Archives generated during export of these objects can be imported via the Repository content  section  The name of such archives contains the repository prefix     b  Zip archives of separate repository files     Archives generated during export of separated files and folders which are lower than objects from  the a  item in the hierarchical tree  cannot be imported via the Repository content section  The  name of such archives contains the files_ prefix     Such archives can be used as backup copies of files for manual replacement  But it is not  recommended to replace repository files manually  bypassing the Repository content section     Click 3 Export repository fil
129. designed for executing user hooks  see the User Hooks section    In the Name drop down list  select a group of user hooks that will be executed     The task is designed for executing Lua script which is specified in the Script field     The task is designed to issue reminders about the license expiration of Dr Web  product     You have to set the period preceding license expiration starting from which the  reminders will be issuing     The task is designed to issue notifications in case the neighbor Servers have not been  connected to the current Server for a long time     Notifications display settings can be configured in the Notification Configuration section  using the Neighbor server has not been connected for a long time item        Set values in the Hours and Minutes fields to define a time period after which the  neighbor Server will be considered as not connected for a long time     The task is designed to collect and purge unused records in the Server database using  the vacuum command     No additional parameters required to run the task     The task is designed to purge outdated information about the stations from the  database     You have to specify the number of days after which the statistic records on  workstations  but not the workstations themselves  are considered outdated and  purged from the Server     The period after which the statistic records are purged is specifies for each type of  records separately     The task is designed to purge outdated stati
130. dly For tasks which executed once  execute task one more time according to the  specified time settings  changing execution multiplicity of the task is described  below  in the Task Editor section         fi Remove these settings Remove selected task from the schedule     3  To change task parameters  select it in the tasks list  The Task editor window described below  opens     4  After editing the schedule  click Save to accept changes     If  when edited  the schedule is empty  without any tasks   Dr  Web Security Control Center will  offer you to use either the schedule inherited from groups  or the empty schedule  Use empty  schedule to override the schedule inherited from the groups     Task Editor    In the Task Editor you can specify settings to   1  Create a new task     For this click i Create task on the toolbar     2  Edit existing task   For this click the name of one of the tasks in the tasks list     The window for editing a task opens  Settings for editing of existing task are similar to the settings of  creating a new task     wy Values of fields  marked with the   sign  must be obligatory specified     To edit task settings   1  On the General tab you can setup the following parameters     In the Name field  specify the name of the task displayed in the schedule list       To enable the task execution  set the Enable execution flag  If the flag is cleared  the task  remains on the list but will not be executed     wy The same action you can perform from the 
131. dministrators   64    Format of user names specifying is not predefined and not fixed   it can be any as it is accepted in  the company  i e  forced modification of LDAP scheme is not demanded  Translation according given  scheme is performed using rules of translation of names to LDAP DN     3  After translation  like for the Active Directory  attempt of the user registration at the specified LDAP  server using determined DN and specified password is performed     4  After this  like for the Active Directory  LDAP object attributes are read for the determined DN   Attributes and their possible values can be redefined in the configuration file     5  If undefined values of administrator attributes are found  and inheriting is specified  in the  configuration file   the search of needed attributes in the user groups is the same as in the Active  Directory     4 1 4  RADIUS Authentication    To enable RADIUS authentication     Select Administration in the main menu of the Control Center   Select Authentication in the control menu    In the opened window  select RADIUS authentication section   Set the Use RADIUS authentication flag    Click Save    Restart the Server to apply changes     OF EN    To use the RADIUS authentication and authentication protocol  you must install a server that  implements this protocol  e g   freeradius  for more details  see http   freeradius org          In the Control Center you can specify the following parameters for the RADIUS server  communicat
132. e  ms       when a file transmission is over before allowed time has  expired  if during specified    silence    interval no requests from Agents for retransmission of lost  packages are received  Server considers that all Agent received updates files and starts sending the  next file        Retransmission requests accumulation interval  ms       during specified interval  Server  accumulates requests from Agents for retransmission of lost packages     Agent request lost packages  Server accumulates these requests during specified time slot after that  sends lost blocks     To specify the list of multicast groups from which multicast updates is available  setup the following  parameters in the Multicast groups section   e Multicast group     IP address of multicast group in which stations receive multicast updates       Port     port number of Dr Web Server network interface  to which transport multicast protocol is  bound for updates transmission     wy For multicast updates  you must specify any unused port  particularly  different from the port that is  specified in the settings of transport protocol for Server operating       Interface     IP address of Dr  Web Server network interface  to which transport multicast protocol is  bound for updates transmission     Every line contains setup of one multicast group  To add one more multicast group  click a     When you configure several multicast groups  please note the following features   e For different Dr Web Servers  whic
133. e Add Server ports and interfaces to firewall exceptions flag     If a non built in Windows firewall is in use  the network administrator should set it up manually     3 2 1  Direct Connections    Dr Web Server Setup    In the Server settings the address must be set  see the Appendices document  p  Appendix E  The  Specification of Network Addresses  to listen for accepting incoming TCP connections        You can specify this parameter in the following Servers settings  Administration     Dr Web Server  configuration     Transport tab     Address field     By default  the following parameters are set to  listen  by the Server    e Address  empty value   use  all network interfaces  for this computer  on which the Server is  installed    e Port  2193   use the 2193 port  registered for Dr  Web Enterprise Security Suite in IANA     w Note  in Servers 4 XX the 2371 port was used  In the 10 0 version this port is no longer  supported     For the proper functioning of all Dr Web Enterprise Security Suite anti virus network  it is enough  for the Server to listen at least one TCP port  which is known by all clients     Dr Web Agent Setup    During the Agent installation  the Server address  IP address or hostname of the computer  on which  the Server is launched  can be directly set in installation parameters   drwinst  lt Server_Address gt     For the Agent installation it is recommended to use the Server name  registered in DNS service  This  will simplify the setting of the anti
134. e Parameters of the Notification System  Templates    c  For notifications from the Station subsection  you can set the list of stations on the events on  which notifications will be send  In the template editing window  in the Groups of monitored  stations tree  select groups of stations to monitor events and send corresponding notifications   To select several groups  use CTRL or SHIFT        wy For the SNMP send method  notification template texts are set at the SNMP client side  Via the    Control Center in the Station subsection  you can specify only the list of stations on the events on  which notifications will be send     8  After editing  click Save to apply all changes specified     Notifications via the Agent Protocol    For notifications via the Agent protocol  specify the following parameters       Resends number   the number of retries when failed to send a message  Default is 10      Resend time out     period in seconds  after which the repeated attempt to send a message is  performed  Default is 300 seconds       Station     identifier of a station to which notifications must be send  You can view station identifier in  the stations properties       Notification storing time     time period for storing a notification starting from its receiving  1 day is  by default  After specified period  notification is marked as outdated and deleted according to the  Purge outdated messages task in the Server schedule settings    e Send test message   send the test messag
135. e according to the specified settings of notification  system  The test message text is specified in notifications templates     154    Ta     it    aX       Chapter 7  Configuring Dr Web Server    Notifications on Email    For notifications on email  specify the following parameters       Resends number   the number of retries when failed to send a message  Default is 10     e Resend time out     period in seconds  after which the repeated attempt to send a message is  performed  Default is 300 seconds       Sender email address     email address of notifications sender     Recipient email addresses     email addresses of notifications receivers  Only one email address of  a receiver per each field  To add one more receiver field  click lal  To remove the field  click fam     In the SMTP server settings section  specify the following parameters   e Address     SMTP server address which is used to send emails   e Port     SMTP server port which is used to send emails   e User  Password  Retype password      if necessary  specify name and password of SMTP  server user  if the SMTP server requires authorization   Set the STARTTLS encoding flag to use STARTTLS traffic encoding for sending notification on  email   Set the SSL encoding flag to use SSL traffic encoding for sending notification on email   e Set the Use CRAM MD5 authentication flag to use CRAM MD5 authentication on a mail  server   e Set the Use DIGEST MD5 authentication flag to use DIGEST MD5 authentication on a mai
136. e administrator work enabling  quicker performance of certain tasks of Dr  Web Server     wy User hooks are located in the following subfolder of the Server installation folder   for Windows OS  var extensions     for FreeBSD OS   var drwces extensions    for Linux OS and Solaris OS   var opt drwcs extensions  After the Server installation  preinstalled user hooks are located in this folder   It is recommended to edit user hooks via the Control Center     To configure user hooks execution     1  Select the Administration item in the main menu of the Contro  Center     2  In the opened window  select the User hooks item in the control menu  User hooks settings  window will be opened     Hooks Tree    Hooks hierarchical list displays the tree view  nodes of which are hook groups and user hooks included  into them   Initially  hooks tree contains the following preinstalled groups     e Examples of the hooks     contains templates of all available user hooks  On the base of these  templates you can create your own user hooks        IBM Tivoli integration     contains templates of user hooks used in integration with IBM Tivoli  system     The icon of the tree element depends on the type and status of this element  see table 7 10      Table 7 10  Icons of elements in the hooks tree  Icon   Description   Hooks groups  a Hooks group for which hook execution is enabled   E Hooks group for which hook execution is disabled   Hooks  Play Hook which is enabled to execute    amp     Hook w
137. e anti virus network  when host names cannot be detected  IP addresses are displayed         Replace IP addresses and Replace NetBIOS names flags are cleared by default  If the DNS  service is not set up properly  enabling these flags may considerably slow down the Server  operation  When using any of these options  it is recommended to enable cashing names on the DNS   server     If the Replace NetBIOS names flag is set and anti virus network contains the Proxy server   when for all stations connected to the Server via the Proxy server  in Dr Web Security Control  Center  the name of computer on which the Proxy server is installed  will be shown instead of  stations names     e Set the Synchronize stations descriptions flag to synchronize stations descriptions with the  description in Dr Web Security Control Center  Computer description field at the System  properties page   If the station description in Dr Web Security Control Center is absent  the user  description will be set to this field  If descriptions differ  the description in Dr Web Security Control  Center will be replaced by the user description     e Set the Track epidemic flag to enable the mode of administrator notification on virus epidemic  cases  If the flag is cleared  notifications on virus infection are performed in the standard mode  If  the flag is set  you can configure the following parameters of virus epidemic tracking    e Period  sec     time period in seconds  during which specified number of mes
138. e boot sectors area     e In the following drop down list  set the Scanner reaction to the detection of corresponding type of  unsolicited software     e Adware    e Dialers    e Jokes    e Riskware   e Hacktools        111    Ta  J  i    ax       Chapter 6  Administration of Workstations       If you select Ignore  no action is performed  no notifications are sent to the Control Center as  compared to when you select Report on virus detection     Set the Restart computer automatically  flag to reboot user s computer automatically after the  scan is completed  if during the check infected objects detected and the cure process requires reboot of  operating system  If the flag is cleared  reboot of a user s computer is not performed  Statistics of a  station scan received by the Control Center  contains notification on the need of station reboot to  compete the cure process  Information on a state that requiring reboot is displayed in the State table   Administrator is able to reboot a station from the Control Center if it is needed  see the Anti Virus  Network section         Set the Show scan progress flag to display a progress bar and the status bar of the stations scan  process in the Control Center     6 5 4 3  Limitations    wy Settings that are not supported in check of stations under UNIX system based and MAS OS X are  marked with the   sign     In the Limitations section  the following settings are available     Maximum scanning time  ms    maximal scanning time of one
139. e console mode of the application  the drweb   mode station to switch to mobile mode ctl update command for updating the virus  and use Dr Web Global Update databases from the GUS is not available   System for updating  if there is no  connection with Dr Web Server     Run in mobile Set the flag to allow users of mobile The Updates section on the application main screen  mode devices to switch to mobile mode is blocked    and use Dr Web Global Update   System for updating  if there is no   connection with Dr Web Server     After disabling an option that changes Agent settings  the value which has been set at the last time  before disabling  will be used     Actions for the corresponding menu options are described at the Dr Web   for Windows  User  manual documentation     4  To use the same settings for another object  click B Propagate these settings to another  object   To export settings to a file  click ie Export settings from this section to the file    6  To import settings from a file  click Ei Import settings to this section from the file    7  To save permissions changes  click Save     wy If you have edited a workstation  when it was not connected to the Server  the new settings will be  accepted  once the Agent has reconnected to the Server     6 3 2  Scheduled Tasks of a Station    Dr Web Enterprise Security Suite provides the centralized task schedule which is set by the anti   virus network administrator and complies with all the rules of configuration inheritan
140. e main menu     e Next to the administrator login  the name of current Dr Web Server is shown      Clicking on administrator login opens drop down list with connected neighbor Servers  If the name    for a neighbor is not specified  its identifier is given   On neighbor click  two options are possible     e The Control Center of neighbor Server opens if the IP address of the Control Center was  specified during connection configuring   The action is similar to the ld button on the toolbar in the Neighbors section on the main menu     e If the Control Center address of this neighbor Server is not set  the setting of the Neighbors  section opens to specify the IP address     2 3 1  Administration    Select the Administration item in the main menu of Dr Web Security Control Center  The control  menu in the left part of the window is used to view and edit information in the opened window     The control menu consists of the following items     1     Administration    Dr Web Server     opens the panel which shows basic information about the Server and lets you    restart or shutdown it via the  amp   and  is absent under Solaris OS  buttons in the top right part  of the panel  Also if Dr Web Server has updates downloaded  from this section you can access  the Dr Web Server Updates section with the Server versions list to update and back up     e License Manager     allows to manage the license key files     Encryption keys     allows to export  save locally  public and primary enc
141. e operating system uses this file for simplifying access to the Internet  Changes to  this file may indicate virus infection or other malicious program     e Low level disk access   block applications from writing on disks by sectors avoiding the file system      Drivers loading   block applications from loading new or unknown drivers     Other options control access to critical Windows OS objects and allow protection of the following  registry branches from modification  in the system profile as well as in all user profiles      Table 6 5  Protected registry branches  Image File Execution Options Software Microsoft Windows NT CurrentVersion Image File Execution Options  User Drivers Software Microsoft Windows NT CurrentVersion Drivers32  Software Microsoft Windows NT CurrentVersion Userinstallable drivers    Winlogon parameters Software Microsoft Windows NT CurrentVersion Winlogon  Userinit  Shell   UIHost  System  Taskman  GinaDLL   Winlogon notifiers Software Microsoft Windows NT CurrentVersion Winlogon Notify   Windows shell autorun Software Microsoft Windows NT CurrentVersion Windows  AppInit_DLLs   LoadAppInit_DLLs  Load  Run  IconServiceLib   Executable files associations Software Classes  exe   pif   com   bat   cmd   scr   Ink  keys     Software Classes exefile  piffile  comfile  batfile  cmdfile  scrfile  Inkfile  keys   Software Restriction Policies Software Policies Microsoft Windows Safer    Internet Explorer extensions Software Microsoft Windows CurrentVersion E
142. e rights and its editing see in the Editing Administrators section     Click Save after you have changed all necessary parameters   Interface    Tree settings    Parameters of this section let you adjust the appearance of the list and they are similar to the settings   located in the    5 option of the toolbar of the Anti virus network item of the main menu       for groups     Ta  J  1       aX       Chapter 2  Components of an Anti Virus Network and Their Interface    All groups membership     show a station in all groups it is a member of  only for groups under  the white folder icon  see Table 2 2   If the flag is set  the station will be shown in all member  groups  If the flag is cleared  the station will be shown only in the top white folder     Show hidden groups   show all groups included in the anti virus network  If you clear the flag     all empty groups  not containing stations  will be hidden  It may be convenient to remove extra  data  for example  when there are many empty groups     e for stations     Show station ID     enables disables showing of stations unique identifiers in the hierarchical list     Show station names     enables disables showing of stations names in the hierarchical list  if  such are given    Show station addresses     enables disables showing of stations IP addresses in the hierarchical  list    Show station servers     enables disables showing of names or addresses of Dr Web Servers  to which stations are connected     Show update er
143. e selected as current   Alternatively  a marker that indicates the current revision can be not set     Stored Set the    marker to save the revision when the repository is automatically cleaned up   The marker can be set for different revisions simultaneously   Alternatively  a marker can be not set     Server stores a certain number of product revisions which is specified on the Synchronization  tab  When the specified number of maximal stored revisions is reached  the oldest temporarily  stored revision is deleted upon saving a new one  downloaded from the GUS     When the repository is automatically cleaned up  the following revisions are not removed   e Revisions indicated with Q marker in the Stored column   e Revision indicated with  v  marker in the Current column     If the product revision is stable  you can mark it as stored and in case a new revision   downloaded from GUS  is unstable  you will be able to rolle back to the previous one     Revision The date the product revision was received   If the revision is frozen  the blocking status displays in the column as well     Synchronization    On the Synchronization tab  you can configure parameters for updating the Server repository from  GUS        In the Stored revisions number drop down list  number of product revisions temporary stored on  disk not including revisions which are marked at least in one column of the Revisions list tab  When  a new revision is received and the number of stored revisions already rea
144. e to an archive on the toolbar     Specify the path to save zip archive with selected repository object according to the web browser  settings in which the Control Center is opened     Repository Import    To load repository files from a zip archive  perform the following actions     1   2     4     Click    Import archive with repository files on the toolbar   In the opened window  in the Select file section  specify the zip archive with repository files  To  select the file you can use the   S button   You can import only those zip archives that have been collected during the export of one of the  following repository object types   e Entire repository   e Entire product   e Entire separate revision   The name of such archives during export contains the repository _ prefix   In the Import settings section  specify the following parameters     e Add missing revisions only   in this import mode  only those revisions of repository will be  added that are missing in the current version  Other revisions remain unchanged     e Replace entire repository   in this import mode  repository is fully replaced with the imported  one     e Set the Import configuration files flag to import configuration files when importing repository   Click Import to start the import process     Ta  J  1       ys       Chapter 7  Configuring Dr Web Server    7 9  Additional Features    7 9 1  Database Management    The Database management section allows to perform direct maintenance of the database with
145. e transparency flag is set when sending a message  the first pixel in the position  0 0  is  declared transparent  All pixels of the same colour as the initial colour of this pixel become  transparent  the window background is be displayed instead     If you use the Use transparency option for rectangular logotype  it is recommended to make a  rectangular border to avoid erroneous transparency of the pixels of the image itself     Enabling the Use transparency option will be useful in case of a nonstandard  non rectangular   form of the logotype to remove the undesirable background  which supplements the informative part    of the image to a rectangular shape  For example  if the image shown in figure 6 2 is used as a  logotype  the purple background will be removed  become transparent      E gt     Figure 6 2  Nonstandard form logotype    If you want to use transparent background logotype in the message  use the PNG or GIF file formats     Before sending a user message  especially to multiple users   it is recommended to send it first to any  computer with the Agent installed to check the adequacy of the result     Message Send Example    To send the message displayed in figure 6 1  the following parameters were set for the link        Message text     Dear users     Dr Web Firewall component was installed on you computer   Details on functionality of this component you can find  link      Sincerely   Administration     URL  http   drweb com     Text  here    A         wy   
146. ease consider the following features     a     b     c     If lists of allowed anti virus components in several keys of one object differ  when the list of  allowed components for this station is defined by intersection of keys components sets  E g   if  for stations group a key with Anti spam support and a key without Anti spam support are  assigned  when the Anti spam cannot be installed on the stations     Settings for object licensing are calculated according of all keys assigned to this object  If keys  expiration dates are differ  after nearest expiration date is out  you need to replace or remove  expired key manually  If expired key limits an anti virus components installation  it is necessary  to adjust licensing object settings in the Installing Components section     The number of licenses of the object is calculated as a sum of licenses from all the keys which  are assigned to this object  Also consider the opportunity to donate licenses via the interserver  communication to a neighbor Server  see p  3   In this case  you should subtract the licenses  donated to a neighbor Server from the total number of licenses     License key file is set during the installation of Dr Web Server  see Installation Manual  p   Installing Dr Web Server   Further you can get new key files  e g  with longer license validity time or       other set of anti virus components for protected stations     The key file has a write protected format using a digital signature  Editing the key f
147. eat      Threat classes   displays the list of threats corresponding to the malware specification  The pie  chart displays percentage between all of detected threats      Most infected stations   displays the list of stations on which security threats detected  Chart  displays the total number of threats for each stations      Actions performed   displays the list of actions performed to detected malware  The pie chart  displays percentage between all of performed actions    To view data for a certain time slot  specify it in the drop down list on the toolbar  view the certain   day or month  Or you can select the arbitrary date range  To do this  enter required time and date   or click the calendar icons to set the time period  To view the data  click Refresh    To exclude an item from displaying on a chart  except the Viral activity chart   click the name of   this item in the legend under the chart     Total Statistics Charts    Graphical data is displayed in the Charts entry of the General section and in some entries of the  Statistics section     Depending on the object  selected in the hierarchical list  station or group   different collections of  charts are displayed  In the table below  charts and sections of the control menu  in which these charts  are displayed  are listed     Table 6 9  Correspondence between charts  items  selected in the hierarchical list and sections of the control menu    118    Viral activity Charts  Most common threats     Charts  Threats  T
148. ecords each one of which establishes a correspondence  between settings of SpIDer Mail and a mail server     By default  the interception list is empty  You can add necessary records     Configuring Mail Interception    1     Make a list of all mail servers whose connections you want to intercept and assign port numbers for  these servers in arbitrary order  At this  use only unused non system ports  The assigned numbers  are called Sp Der Mail ports     wy SpIDer Mail supports POP3  SMTP  IMAP4  and NNTP mail servers     Select the Anti virus network item in the main menu of the Control Center   Click the name of the station or group in the hierarchical list of the opened window   Click the Configuration  gt  Windows  gt  SpIDer Mail item in the opened contro  menu  Open the    Application filter tab     In the SpIDer Mail connections settings section  specify the following parameters     SpIDer Mail port     Sp Der Mail port that you assigned for the mail server at step 1     Server     the domain name or IP address of the mail server      Port     the port number that the mail server uses     If necessary  repeat the step 5 for other servers  To add one more mail server to the list  click Fy  To stop intercepting connections to a certain mail server  click     next to the item of the list that    corresponds to this server     In the Excluded applications list  you can specify the list of applications whose mail traffic will not  be intercepted and checked by SpIDer Mail  
149. ected      User sessions     Inactive stations   e Hardware and software  when stations are selected    e Properties   e Group membership rules  when user groups are selected   2  Statistics  3  Configuration   e Permissions   e Task Scheduler     Installing components     Update Restrictions      The list of anti virus components for operating system of selected station or by list of operating  systems when a group is selected                    wy The list of anti virus component settings and setup recommendations are listed in the User Manual  for corresponding operating system     Hierarchical List of Anti Virus Network    In the middle part of the window there is a hierarchical list of the anti virus network  The list  catalog   represents the tree structure of the anti virus network elements  The nodes in this structure are groups  and workstations within these groups    You can perform the following through the hierarchical list elements       Left click the name of a group or station to display the control menu  at the left part of the window   of corresponding element and brief element information on a property pane  at the right part of the  window        Left click the icon of the group to open or to hide the contents of a group   e Left click the icon of the station to open the properties sheet of this station     wy To select several elements of the hierarchical list  press and hold CTRL or SHIFT during selection     The appearance of the icon depends on the type
150. ed  below     Files can be specified in the format of regular expressions     If exceptions list are not specified  all notifications enabled on the Notifications configuration page are  sent        Parameters of notifications on repository updates are configured in the Notifications configuration page   in the Repository section     Delayed Updates    On the Delayed updates tab  you can delay distribution of updates on stations for the specified period  of time  A delayed revision is considered frozen     The option to delay updates is useful when you need to temporarily cancel distribution of last product  revision on all stations of the anti virus network  e g   if you want to perform preliminary testing of this  revision on a limited number of stations     To use delayed updates functional  perform the following actions     1  For the product  update of which you want to freeze  configure delayed updates as described below    2  To disable distribution of the last revision  set one of the previous revisions as a current on the  Revision list tab    3  For the group of stations that will receive the last revision  set the Receive all the latest updates  flag on the Anti virus Network     Update Restrictions for Workstations section  Other workstations  will receive the revision which you selected as current at step 2    4  The next downloaded from the GUS revision which is satisfying the conditions specified for the  Delay updates for the following files only option  will 
151. ed in a Server license key in the previous versions of Dr Web    Enterprise Security Suite  starting from the 10 0 version  is stored in the Server configuration  file     e During the new Server installation  the new UUID is generated     e During the Server update from the earlier versions  UUID is automatically taken from the  Server key of previous version  the enterprise key file from the etc folder of the  previous Server installation  and is written to the configuration file of the installing Server     When updating the Servers cluster  the Server which is responsible for DB updating  gets a license  key  for other Servers it is necessary to add license keys manually     2  License keys are actual for protected stations only  You can assign a key file either for separate  stations or for stations groups  in this case  a license key is valid for all stations which inherit it from  this group  To assign the key file simultaneously for all stations of anti virus network  for which  personal settings of license key are not specified  assign the license key for the Everyone group     3  Via the interserver communication  optional number of licenses from keys at this Server can be  donated to a neighbor Server for a specified time slot     4  Each license key can be assigned for several licensing objects  groups and stations  simultaneously   For one licensing object can be assigned several license keys simultaneously     5  When you assigning several keys to the object  pl
152. ed in the administration of a local  network and competent in anti virus protection as an administrator of the anti virus network  Such  employer should have full access to the installation folders of Dr Web Server  Depending on  organization security policy and staffing situation  such employer should either be a local network  administrator or work closely with such person     H To manage the anti virus network  it is not necessary to have administrator rights on computers    included in the anti virus network  However  remote installation and removal of the Agent software  is possible within a local network only and requires administrator s rights in the local network  and  checkout of Dr Web Server requires full access to its installation folder     4 1  Authentication of Administrators    To connect to Dr Web Server  administrator can authenticate by the following ways     1     With storing administrative account information in the Server DB     2  Via the Active Directory  for Servers under Windows OS      PW    Via the LDAP protocol   Via the RADIUS protocol   Via PAM  only for UNIX system based OS      Authentication methods are used sequentially according to the following rules     1     5     The order of authentication methods usage depends on the order of their following in the settings   specified in the Control Center     Authentication of administrator from the Server DB is always tried first     By default  LDAP authentication is used by the second  via the A
153. ed in this cluster directly   Otherwise  it may cause the deletion of the information already stored into the database  It is  recommended to install the Servers firstly with an embedded database and after the installation  to switch them to the common external database    Switch the Servers to the external database usage you can via the Control Center  in the  Administration  gt  Dr Web Server configuration  gt  on the Database tab or via the  drwcsd conf Servers configuration file       Except the first Server of a cluster  it is not recommended to add the Servers already operating  within anti virus network with other external or embedded database to a cluster  It will cause the  loss of data  information on stations  statistics  settings  except the settings which are stored in  the configuration files   because data are completely erased from the base during the import  In  this case  only a part of some of the settings can be imported     The same version of the repository    On all Servers of a cluster  repositories must contain updates of the same version     You can reach this requirement by one of the following ways       Update all Servers of a cluster from the GUS simultaneously  In this case  all Servers contain  the latest version of updates  Update all Servers repositories is also can be configured from the  local update zone which will distribute the same confirmed version of products updates or the  latest version in case if the GUS mirror is created     179 
154. ed on you  computer    Details on functionality of this component you can find  here     Sincerely   Administration           Figure 6 1  Message window on user   s PC    To send a message to a user   1  Select the Anti virus network item in the main menu of the Contro  Center    2  In the opened window  select a station or a group in the hierarchical list and click    General        Send message on the toolbar     3  Specify the following fields in the opened window     Message text     an obligatory field containing the message itself     Set the Show logotype in the message flag  to display a graphical object in the message  window title  Specify the following logotype parameters    e Set the Use transparency flag to use a transparency in the logotype image  see Logo File  Format  p  4     e In the URL field  you can specify the link to an Internet resource to open on the logo and  message title click    e In the Message title field  you can specify the title of the message  e g  the company  name  This text will be displayed in the message window title on the right of the logo  If you  leave this field blank  information on the message will be displayed in the title of the  message window     e On the right of the Logotype file field  click IS  to load the logotype file from the local  resource  and select the necessary object in the opened file system browser     If the logotype is not set or the logotype size exceeds the allowable limits  see Logo File Format  p   3   D
155. ed via the Control Center  in the  Administration     Utilities section  You can run this utility version on any computer under Windows  OS with Internet access  Executable file is drwreploader gui  lt version gt  exe     To download repository via the GUI version of Dr Web Repository Loader     1  Run the GUI version of Dr Web Repository Loader utility   2  In the main window of the utility  specify the following parameters    a  License key or MD5 of the key   specify Dr Web license key file  Click Browse and select  active license key file  Instead of license key you can specify only MD5 hash of the license key   which you can view in the Control Center in the Administration     License Manager  section    b  Downloading folder   specify the folder to download repository to    c  Inthe Mode list  select on of the updates loading mode     e Load repository   repository is downloaded in the Server repository format  Loaded files  can be directly imported via the Contro  Center as the Server repository updates     e Synchronize update mirror   repository is downloaded in the GUS updates zone format   Loaded files can be placed on the updates mirror in your local network  Further  Servers  can be configures to receive updates directly from this updates mirror containing the last  version of the repository but not from the GUS servers    d  Set the Archive repository flag to pack downloaded repository into zip archive automatically   This option allows to get prepared archive f
156. ed with the Server and provides the web  interface for remote managing of the Server and the anti virus network by means of editing the  settings of the Server and protected computers settings stored on the Server and protected  computers     The Control Center can be opened on any computer that have the network access to the Server   The Control Center can be used almost under any operating system with full use on the following  web browsers     e Windows   Internet Explorer     e Mozilla   Firefox       12    Ta  J  1       aX       Chapter 1  Welcome to Dr Web   Enterprise Security Suite    13    e Google Chrome     The list of possible variants of use is given in the System Requirements section   Central protection Control Center provides the following features     e Serviceability of Anti virus installation on protected stations including  remote installation  on protected stations under Windows OS with preliminary browsing the network to search  computers  Creation of distribution files with unique identifiers and parameters of connection  to the Server to facilitate Anti virus installation process by the administrator or possibility  of Anti virus installation by users on stations by oneself      Facilitate administering based on grouping of anti virus network workstations  detailed  information see in the Chapter 5  Groups  Integrated Workstations Management section      Feasibility of centralized administrating of stations anti virus packages including   uninstallati
157. elect a station or a group of stations for which you  want to allow statistics collecting  When selecting a group of stations  please note the settings  inheriting  if the stations of selected group have personal settings  when changing the group  settings will not change the station settings     c  In the control menu  in the Configuration     Windows section  select Dr Web Agent     d  In the Agent settings  on the General tab  set the Collect information about stations flag if  it is cleared  If necessary  edit the Period of collecting information about stations  min    parameter value     e  To apply the changes  click Save  Settings will be transmitted to the stations     To view hardware and software of the station     UGN    Select the Anti virus Network item in the main menu of the Control Center   In the hierarchical list of anti virus network  select appropriate station   In the control menu  in the General section  select the Hardware and software item     In the opened window you can view the tree with the list of hardware and software  which contains  the following information about the station     e Application   the list of program applications installed on the station    e Hardware   the list of hardware mounted on the station    e Operating System   information on operating system of the station    e Windows Management Instrumentation   information on Windows management  instrumentation    To view the detailed information on a concrete hardware or application
158. em of the control menu     the Updates or Installations  internal tab     the Limit traffic option     Data traffic is limited as follows     1  If limitation is enabled for the common rate of data transferring in the Server settings  the  summary rate of transferring data from Server to all stations will not exceed the specified value  At  that     a  Not depending on the difference in bandwidth of channels between Server and stations  the  transfer rate is equally distributed among all the stations     b  If the bandwidth of a channel between Server and a station is less than the average rate for one  station calculated according to the a  item  the data transferring traffic for this station is limited  to the maximum bandwidth of this channel  The rest limit of the common rate  is equally  distributed among the set of stations as described in the a  item     2  If the personal limitation for data transferring rate is set for a certain station or group of stations   the rate of transferring data to this group or stations will not exceed the specified value  This  limitation does not affect on other stations and data are transferred to them at the maximum rate    3  If both common and personal limitations are set in the Server settings and in the settings of a  certain station or group  when    a  Rate of transferring data to the personally limited groups and stations will not exceed the value  specified in their settings    b  Rate of transferring data to the rest of statio
159. ement of the following encryption keys   e the drwcsd pri private key on the Server   e the drwcsd pub public key on workstations     Because some workstations can be turned off at the time of replacement  the  procedure is divided into two steps  You have to create two tasks to perform each of  these steps  it is recommended to perform the second step some time after the first  one  when certain stations will probably connect to the Server     When creating a task  select the appropriate step of key replacing from the drop down  list     e Adding a new key   the first step of the procedure when the new inactive  encryption key pair is created  The stations get the new public key upon the  connection to the Server     e Deleting the old key and switching to the new key   the second step when  the stations are notified about switching to the new encryption keys  followed by  replacing the existing keys with the new ones  public keys on the stations and  private key on the Server     If for any reason some stations did not receive the new public key  they will not be  able to connect to the Server  To resolve this problem  the following options are  available     e Manually put the new public key on the station  you can view the procedure of  replacing the key on station  in the Appendices document  p  Connecting Dr Web  Agent to Other Dr Web Server      e Allow the Agents authorize on the Server with incorrect public key  see the  Network section in the Agent preferences      
160. eparate several addresses     o Group identifiers   the list of group identifiers of the stations that will be  turned on  Use separate field for each new identifier  Click    to add a new  field  To remove the identifier click next to it     To run this task  all stations that are going to be turned on should be  equipped with network cards with Wake on LAN support     To check whether your network card supports Wake on LAN  please  refer to its documentation or see its properties  Control Panel        Network and Internet     Network Connections     Change  Adapter Settings     Configure     Advanced      The task is designed to write to the Server log file specified string   String   message to be logged        146    Ta     1       ax       Chapter 7  Configuring Dr Web Server   147    wy Outdated information is purged from the database to save disc space  The period in the Purge old   records and Purge old stations tasks by default is 90 days  If you decrease the value  the   statistics on the operation of the anti virus network components will be less representative  If you  decrease the value  the Server may need extremely more resources     A Simultaneous execution of tasks with Execute script type on several Servers which use one  database may result in errors     3  On the Time tab     In the Period drop down list  set the launch mode of the task and setup the time according to  the specified periodicity     Table 7 5  Parameters of different launch modes    Daily S
161. equirements for operating system   e Android OS  configuration requirements coincide with the requirements for operating system   e Novell NetWare OS  configuration requirements coincide with the requirements for operating system       No other anti virus software  including other versions of Dr Web anti virus programs  should be  installed on the workstations of an anti virus network managed by Dr Web Enterprise Security  Suite     wy Functionality of Agents is described in the user manuals for corresponding OS     1 5  Distribution Kit    The program software is distributed depending on the OS of the selected Dr Web  Server     1     For UNIX system base OS   as run files for installation under corresponding OS versions of the  following components      Dr Web Server general distribution kit      Dr Web Server extra distribution kit      Proxy Server    For Windows OS   as installation wizard executable files for installation of the following components     Dr Web Server general distribution kit      Dr Web Server extra distribution kit      Proxy Server      Dr Web Agent for Active Directory    e Utility for Active Directory scheme modification    e Utility to change attributes for Active Directory objects      NAP Validator     Dr Web Server distribution kit contains two packages     1     General distribution kit   basic distribution kit to install Dr Web Server  Composition is similar to  composition of previous versions of Dr Web Enterprise Security Suite distribution 
162. er    Update Restrictions for  Workstations    Installing Components of  the Anti Virus Package             Configuring __ Automatic  Group Membership    Management__of _Anti   virus Components    Dr Web Enterprise Security Suite provides the following ways how to place stations into user    groups     1  Place stations into groups manually   2  Use automatic group membership     5 3 1  Including Stations into Groups Manually    There are several ways how to add a workstation to a user group manually     1  Change the station settings        2  Drag and drop a station in the hierarchical list        To edit the list of groups containing the station via the station settings     1     4   5     In the main menu  select Anti virus network  then click the name of a workstation in the  hierarchical list     The station properties panel opens  Also  you can open the stations properties section by selecting  Properties in the control menu     In the Station Properties pane  select the Groups section     The Membership list displays the groups which include the workstation and to which you can  include it     To add the workstation into a group  set the flag for this group in the Membership list   To remove a workstation from the group  clear the flag for this group in the Membership list     Ta  J  1       ax       6     Chapter 5  Groups  Integrated Workstations Management    H You cannot remove stations from preinstalled groups     To save changed settings  click Save     In the P
163. er    Windows network message system functions only under Windows OS with Windows Messenger  Net  Send  service support     Windows Vista OS and later do not support Windows Messenger service     For notifications in a Windows OS network  specify the following parameters       Resends number     the number of retries when failed to send a message  Default is 10     e Resend time out     period in seconds  after which the repeated attempt to send a message is  performed  Default is 300 seconds     e the list of names of computers to receive messages  Only one computer name per each field  To add  one more receiver field  click K  To remove the field  click Fm     e Send test message   send the test message according to the specified settings of notification  system  The test message text is specified in notifications templates     Ta  J  i    ax       Chapter 7  Configuring Dr Web Server    7 7 2  Web Console Notifications    Via the Control Center  you can view and manage administrator notifications which are received via    the Web console method  sending of administrator notifications is displayed in the Notifications    Configuration section    To view and manage notifications     1  Select the Administration item in the main menu of the Control Center  In the opened window   select Web console notifications in the control menu  The list of notifications which were sent to  the Web console will be opened     2  To vie the notification  click corresponding row of the table 
164. er  the web  browser in which the Control Center is opened  must be launched in the name of the domain user  with permissions to search objects in the Active Directory domain     4  For UNIX system based OS  set the Search by LDAP flag to search for stations by LDAP  At this     specify the following parameters    e Domains   domains list in which stations are searched  Use comma to divide several domains   e LDAP server   LDAP server  e g    dap   idap example com    e Login   LDAP user login    e Password   LDAP user password     45    Ta     1       ax       Chapter 2  Components of an Anti Virus Network and Their Interface   46    5  In the Port field  specify the port to connect via the UDP protocol to the Agents during search    6  If necessary  in the Timeout field  change the value of timeout in seconds  which defines time limit  for receiving an answer from inquired stations    7  If necessary  set the Quick scan flag for express scanning     8  Set the Show station names flag to display either IP address and DNS name of found network  stations     If a station is not registered at DNS server  only its IP address displays     9  Set the Correlate with stations list from database flag to enable synchronization of Network  Scanner search results with the stations list stored in the Server DB  If the flag is set  the list of  found network stations contains stations from the Server DB list that are not found by the  Network Scanner during current search  e g  if a firew
165. er groups list are  available inside     e In the hierarchical list of administrators  administrator from the Newbies group sees only a tree  the  root node of which is a group of this administrator  i e  sees administrators from the own group and  its subgroups  Administrator from the Administrators group sees all administrators not depending  on their groups     Administrators Permissions    All administrators activity in Control Center depends on the set of permissions  which can be defined  either for specific account or for a group of administrators     Administrative permissions system includes the following opportunities of permissions management   e Granting permissions    Granting permissions performed during creation of administrative account or administrative group   When administrator or administrative account is created  it inherits permissions from the parent group  it is added to  Changing permissions is not allowed during creation     e Inheriting permissions    By default permissions of administrators and administrative groups are inherited from respective  parent groups  but this behavior can be changed     It is possible to define a custom set of permissions for a specific administrative account while the rest  permissions will continue to be inherited from account parent group  Inheriting account or group  permissions does not reassign them from parent to a child but calculates new set of privileges from  permissions of all parent groups in the branch of h
166. er stopped and running monitors  paused   Attention  You cannot launch SpIDer Guard  SpIDer Mail and SpIDer Gate monitors via  Dr Web Security Control Center     6 5 2  Terminating Running Components by Type      When you use this option  running scans will be terminated  Scanner stopped and running monitors  paused   Attention  You cannot launch SpIDer Guard  SpIDer Mail and SpIDer Gate monitors via  Dr Web Security Control Center     To interrupt all running components of a certain type    1     2     4     Select Anti virus network in the main menu of the Control Center  then in the hierarchical list  of the opened window select necessary group or separate workstations     In the toolbar of anti virus network  click    Components management  In the drop down list    select Gi Interrupt running components    In the opened panel  set the flags against components types which you want to interrupt   immediately       Interrupt scheduled Dr Web Agent Scanner   to stop active scan by Dr Web Agent  Scanner which was launched manually by administrator via the Control Center      Interrupt Dr Web Agent Scanner started by administrator   to stop active scan by Dr Web  Agent Scanner which was launched according to centralized schedule      Interrupt Dr Web Scanner started by user   to stop active scan by Dr Web Scanner which  was launched by a user at the station      Interrupt SpIDer Guard  SpIDer Mail  SpIDer Gate  Office Control  Firewall and Self   protection   to pause SpIDer Gu
167. er you select scan type  the Scanner settings window will be opened  Change scanning  parameters if necessary  see the Configuring Scanner Settings section      5  Click Scan for viruses to launch the scan process on selected workstations        w Station scanning via Dr Web Agent Scanner that is launched remotely  is performed in the  background mode without displaying any notifications for station user     6 5 4  Configuring Scanner Settings    Via the Control Center  you can specify the following anti virus check parameters       Dr Web Scanner settings  This Scanner is launched by users on stations and cannot be remotely  launched from the Contro  Center  But administrator is can centralized change its settings which will  be transmitted and saved on stations       Dr Web Agent Scanner settings  This Scanner is remotely launched from the Control Center and  performs station check similarly to Dr Web Scanner  Dr Web Agent Scanner settings are  presented as extended settings of Dr  Web Scanner and specified during the launch of stations anti   virus check     Dr Web Scanner Parameters Setup    1  In the main menu of Dr Web Security Contro  Center  select Anti virus network   2  Click the name of a station or group in the hierarchical list of the opened window     3  In the opened contro  menu in the Configuration section  select in the necessary operating system  subsection the Scanner item  The Scanner settings window opens     4  Specify necessary scan parameters  Descrip
168. erprise Security Suite anti virus     The log file resides by default   e Under UNIX OS     e for Linux OS and Solaris OS   var opt drwes log drwcesd 1log   e for FreeBSD OS   var drwcs log drwcsd log       Under Windows OS  in the var subfolder of the Server installation folder     It is a plain text file  see the Appendices document  the Appendix K  Log Files Format section         To view the Server log via the Control Center     1   2   3     Select the Administrating item in the main menu of the Control Center   In the opened window  select the Dr Web Server log item of the control menu     Window with the Server logs list opens  According to the rotation mode settings  the following  names format of Server log files is used   lt file_name gt   lt N gt  log or  lt file_name gt   lt N gt  log gz   where  lt N gt    sequence number  1  2  etc  E g  if the log file name is drwcsd  the list of log files is  the following     e drwcsd log     current log file   e drwcsd 1 log     previous log file   e drwcsd 2 log and so on  the greater the number  the older the version of the log     Ta  J  1       ys       4     Chapter 7  Configuring Dr Web Server    To manage log files  set the flag next to the necessary file or several files  To select all log files  set  the flag in the header of the table  On the toolbar  the following buttons become available     2 Export selected log files   save local copy of selected log files  It can be useful  e g  to view  the log file content f
169. ertificate pem    download conf    drwcesd conf  name may  vary     denec Cie Om monsen    drwesd pri    enterprise key  name may  vary     ita OMe ClOOrae Olieis       http alerter certs pem    private key pem  webmin conf    auth ads xml    auth ldap xml    auth radius xml       database sqlite    drwcsd pub    Agent license key    SSL certificate    network settings for generating of the Agent installation  packages    Server configuration file    Server configuration file template with default  parameters    private encryption key    Server license key file  The file is saved if it presented  after the upgrade from the previous versions  For the  new Server 10 0 installation  the file is absent    configuration file for the Server remote diagnostic utility    certificates for verification the apple notify drweb com  host for sending push notifications        RSA private key  Control Center configuration file    configuration file for administrators external authorization  via Active Directory    configuration file for administrators external authorization  via LDAP    configuration file for administrators external authorization  via RADIUS    embedded database    public encryption key    Start and Stop Dr Web Server    Sre    var    e Installer       webmin   install    By default  Dr Web Server automatically starts after installation and every time after restarting the    operating system     Also you can start or start  restart or stop Dr  Web Server by one of the follo
170. erver Schedule  7 5  Setting the Web Server Configuration  7 5 1  General    120  121  124  124  124  125  126  127  128  131  132  133  135  135  136  137  137  138  138  139  139  140  141  141  148  148    Ta   gt    A    aX       N    7 5 2  Additional  7 5 3  Transport  7 5 4  Security  7 6  User Hooks  7 7  Setting Notifications  7 7 1  Notification Configuration  7 7 2  Web Console Notifications  7 7 3  Unsent Notifications  7 8  Administration of Dr Web Server Repository  7 8 1  Repository State  7 8 2  Delayed Updates  7 8 3  General Repository Configuration  7 8 4  Detailed Repository Configuration  7 8 5  Repository Content  7 9  Additional Features  7 9 1  Database Management  7 9 2  Dr Web Server Statistics  7 9 3  Backups  7 10  Peculiarities of a Network with Several Dr Web Servers  7 10 1  Building a Network with Several Dr Web Servers  7 10 2  Setting Connections between Several Dr Web Servers  7 10 3  Using an Anti Virus Network with Several Dr Web Servers  7 10 4  Dr Web Servers Cluster    Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its  Components    8 1  Updating Dr Web Server and Restoring from the Backup  8 2  Manual Updating of Dr Web Enterprise Security Suite Components  8 3  Scheduled Updates  8 4  Updating the Repository of a Server not Connected to the Internet  8 4 1  Copying Repository of Other Dr Web Server  8 4 2  Downloading Repository from GUS  8 5  Update Restrictions for Workstations    8 6  Updating Mobile Dr Web Agen
171. erver network configuration     To view statistic data of specific section  click the section name   In the opened list  the section parameters with dynamic counters of values are given     At the statistic section opening  the graphical representation for each parameter changes is  enabled  At this     e To disable graphical representation  click the section name  When graphical representation is  disabled  the digital value of parameters still dynamically refreshes     e To enable graphical representation of the data repeatedly  click the section name ones more     e The names of the sections and their parameters for which the graphical representation is enabled   are marked with the bold font     To edit the parameters refresh frequency  use the following toolbar options     e In the Refresh rate drop down list  select the necessary data refresh frequency  After the drop   down list value changed  the time period of digital and graphical data refreshing is automatically  applied     Click Refresh to refresh all statistic data values at a time        169    Ta  J  1       ys       Chapter 7  Configuring Dr Web Server    8  On mouse hover over the graphical data  the selected point digital value is displayed as the  following     e Abs   parameter absolute value     e Delta   incrementation of the parameter value relative to its previous value according to the data  refresh rate     9  To hide the section parameters  click the arrow on the left of the section name  When the 
172. esh  The  tables with statistics will be loaded     5  In the Summary statistics section  the summary data is displayed     if stations are selected   by selected stations     if groups are selected   by selected groups  If several groups are selected  only non empty groups  will be displayed     If both stations and groups are selected   separately by all stations  including stations from  selected non empty groups     6  To view the detailed statistics of anti virus components  click the station name in the table  If  groups were selected  click the group name in the summary statistics table  then click the station  name in the displayed table  A windows  or a section of current window  with detailed statistics will  be opened     7  You can open the settings window of the anti virus component from the statistic table of station or  group components  To do this  click the name of the component in the statistic table     8  To sort the data in columns of a table  click the certain point  decrease or increase  in the header of  the table     9  To save the table for printing or future processing  click one of the following buttons   t Save data in CSV file   ir Save data in HTML file     t Save data in XML file        Save data in PDF file   10  To view the summary statistics not split in sessions  click Summary statistics in the control menu   A window of summary statistics will be opened     To view the statistics as a charts  click Charts in the control menu  A statistics 
173. esses   set the flag to replace IP address with DNS names of computers in the  Server log file       Keep alive SSL connection     set the flag to use keep alive SSL connection  Older browsers may  not work properly with regular SSL connections  Disable this parameter  if you have problems with  SSL protocol     e SSL certificate     path to SSL certificate file  The drop down list contains available certificates from  the Server folder     e SSL private key     path to SSL private key file  The drop down list contains available private keys  from the Server folder     7 5 2  Additional    On the Additional tab  specify the following Web server settings   e Set the Show script errors flag to show script errors in browser  This parameter is used by  technical support and developers  It is not recommended to change this parameter without need       Set the Trace scripts flag to enable scripts tracing  This parameter is used by technical support and  developers  It is not recommended to change this parameter without need       Set the Abort scripts flag to allow aborting of scripts execution  This parameter is used by technical  support and developers  It is not recommended to change this parameter without need     7 5 3  Transport    On the Transport tab  you can configure network addresses to listen for accepting incoming  connections by the Web server  e g   for connection of the Control Center or executing requests via  the Web API       In the Addresses to listen on HTTP se
174. f  other components should be compatible with the settings of the Server     Ta  yan    A    A        Chapter 7  Configuring Dr Web Server   130    As traffic between components  in particular the traffic between Dr Web Servers  can be considerable   the anti virus network provides for compression of this traffic  The setting of the compression policy and  the compatibility of settings on different components are the same as those for encryption     When configuring encryption and compression on the Server  please consider the features of the  clients which are planning to be connected to this Server  Not all clients support traffic encryption  and compression  e g  Dr Web Anti virus for Android and Dr Web Anti virus for OS X do not  support neither encryption nor compression   Such clients will not be able to connect to the Server   if the Yes value is specified for encryption and or compression on the Server     To set the encryption and compression policies for Dr Web Server     1  Select the Administration item in the main menu   2  Click Dr Web Server configuration in the control menu   3  On the General tab  select the necessary variant in the Encryption and Compression drop down  lists     Yes     enables obligatory traffic encryption  or compression  with all components  is set by default  for encryption  if the parameter has not been modified during the Server installation      Possible     instructs to encrypt  or compress  traffic with those components those settin
175. f the opened window     In the opened control menu  in the Configuration section  in the subsection that corresponds the  operating system of selected stations  select the necessary component     A window with the component settings will be opened     wy The list of anti virus component settings and setup recommendations are listed in the User Manual    for corresponding operating system     But some settings of the components in the Control Center and on workstations may differ by the  level of detail     This Manual contains Dr Web Agent for Windows settings which are presented as extended  settings of the Agent  provided to a user on a station  and also anti virus components settings which  are not provided on protected stations       When configuring anti virus components for station under Windows OS  please note the following    logging points     e On the Control Center  logging settings are specified separately for each component in the Log  sections  On stations  logging settings are specified in the Advanced common section     e If the Detailed logging option is enabled  operation of corresponding component is logged in the  debug mode with maximal detailing  Limitations on the file size are disabled in this mode  This led  to significant increasing of the log file size  Also note  that the rotation of the log file is not  performed  in all logging modes     Debug logging mode decrease performance of Anti virus and operating system of a station  It is  recommended to
176. f this group in    the hierarchical list  the Y icon displays  if the Show membership rules icon flag is set in the ce  Settings of tree view list on the toolbar     wy If the station was automatically included into the user group according to the membership rules     when removing the station from this groups manually makes no sense  because the station will be  automatically returned to this group at the next connection to the Server     To remove the rules of automatic including stations into the group     1   2     Select the Anti virus Network item in the main menu of the Control Center     In the hierarchical list of anti virus network  select a user group for which you want to remove the  membership rules     Perform one of the following actions     e On the toolbar  click     Remove membership rules   e In the group properties pane on the right part of the window  in the Configuration section  click  Remove membership rules   e In the control menu  in the General section  select the Properties item  open the  Configuration tab and click    Remove membership rules    After group membership rules are removed  all stations that have been included into this group  automatically will be removed from this group  If for any of automatically included stations  this  group was set by administrator as primary  after removing stations from the group  the Everyone  group will be set as primary for these stations     79    Ta  J  i    ax       Chapter 5  Groups  Integrated Worksta
177. file     Spam filter  SpIDer Gate and Office Control settings are described in the manual Dr Web    Agent for Windows  User Manual     6 2 1 1  General    In the General section  the read only fields are listed       Station identifier   station unique identifier     Name   station name   e Creation date   the date of creation the station on the Server     86    Ta  J  N    aX       Chapter 6  Administration of Workstations   87      Grace period expiration   date when the grace period of Anti virus usage at the station ends     Also you can specify the following fields     e In the Password field  specify a password to authorize the station at the Server  retype this  password in the Retype password field   If you change the password  you must repeat this action  in the Agent connection settings at the station to permit Agent connection       In the Description field  add comments   wy Values of fields  marked by the   sign  must be obligatory specified     Also in this section the following links reside   e In the Installation file item   the link for downloading Agent installer for this station     After creation of a new station  before the operating system of a station is set  in the section of  distribution kit downloading  the links are presented separately for all OS that are supported by  Dr Web Enterprise Security Suite     e In the Configuration file item   the link for downloading the file with settings of connection to  Dr Web Server for stations under Android  O
178. following actions will be performed     1  Ping requests are sent to network computers     2  The parallel poll for Agents detection is performed only for computers which has answered to ping  requests     3  Agents detection procedure is implemented according to general rules     wy Ping requests can be blocked because of network policies  e g  by firewall settings    For example     If in Windows Vista and later OS network settings the Public location options is set  OS will block  all ping requests     During regular scanning  ping requests are not sent and all stations in the network are sequentially  scanned to detect Agents  This method can be used as an addition to quick scan  if there are stations  in the network  whereon ping requests are blocked     Quick scan is parallel  regular scan is sequential     The Network scanner operating speed is different for these cases  Maximal scanning time is  calculated in the following way     e for regular scan   lt N gt     lt timeout gt    e for quick scan   lt N gt  40   2  lt timeout gt      where   lt N gt    stations quantity   lt timeout gt    value  specified in the Timeout field     Ta  J  1       ax        Chapter 2  Components of an Anti Virus Network and Their Interface    2 4 2  License Manager    Licensing Features    1  Dr Web Server is not licensed  Server can be installed without license key  The key can be added  later either locally or received via the interserver communication     wy Server UUID which was stor
179. gate updates on protected  stations     Hierarchical structure of several Servers can be established to serve protected stations of anti virus  network     Server supports the backup of critical data  databases  configuration files  etc     Server writes single log of anti virus network events        Single Database    The single database is connected to the central protection Server and stores statistic data on anti   virus network events  settings of the Server itself  parameters of protected stations and anti virus  components  installed on protected stations     You can use the following types of databases   Embedded database  Two variants of database that is inbuilt into the central protection Server  directly are provided   e SQLite2  InitDB    e SQLite3   External database  Inbuilt drivers for connecting the following databases are provided     e Oracle   e PostgreSQL     e ODBC driver to connect other databases such as Microsoft SQL Server Microsoft SQL Server  Express     You can use any database that corresponds to your demands  Your choice should be based on the  needs that must be satisfied by the data store  such as  capability to service the anti virus network  of corresponding size  features of database software maintenance  administration capabilities  provided by the database itself and also requirements and standards which are accepted for use in  your company     Central Protection Control Center    Central protection Contro  Center is automatically install
180. gent has not been connected to the Server for a long time  etc   See also p  Manual Updating of  Dr Web Enterprise Security Suite Components         fe Update failed components  Force synchronization of the components that failed to update     Gh Interrupt running components  Prescribes to stop operating of all running anti virus components  at the station     Q Scan  Scan stations in one of the modes  selected in the drop down menu      Dr Web Scanner  Express scan  In this mode the following objects are scanned   e main memory  RAM      boot sectors of all disks     autorun objects     37    Ta     AN    aX       Chapter 2  Components of an Anti Virus Network and Their Interface   38      root directory of the boot sector       root directory of the Windows OS installation disk     system directory of the Windows OS      My documents folder    e temporary directory of the system      temporary directory of the user     ER Dr Web Scanner  Complete scan  In this mode all hard disks and removable disks  including  the boot sectors  will be fully scanned     E   Dr Web Scanner  Custom scan  In this mode you will be able to choose files and folders to  scan     a Unapproved stations  Manage newbies list   stations  which registration is not approved  This  option is active only if stations of the Newbies subgroup of the Status group are selected  When the  registration is approved or access to the Server is denied  stations will be automatically removed from  the Newbies preinst
181. gs       Set the Do not show notifications in full screen mode flag to disable popup notifications if any  program is running in full screen mode    e Set the Display Firewall notifications on separate desktop in full screen mode flag to  display Dr Web Firewall notifications on separate desktop  i e  on top of running full screen  application  It is recommended to enable this option to avoid blocking of network connections which    are used by this full screen mode application without possibility to enable them in the time of  Dr Web Firewall request receipt     6 4 2 6  Preventive Protection    On the Preventive Protection tab in the Level of suspicious activity blocking section  you can  configure Dr Web reaction on such actions of other programs that may cause workstation infection   You can also protect user data from unwanted changes     Select one of protection levels that anti virus provides       Paranoid   maximal protection level when you need total control of access to critical Windows OS  objects     Using this mode may lead to compatibility problems with legitimate software that uses the protected  registry branches     e Medium   protection level at high risk of computer getting infected  In this mode  the access to the  critical objects that can be potentially used by malicious software is additionally blocked     e Minimum   protection level that disables automatic changes of system objects  modification of which  explicitly signifies a malicious attempt to d
182. gs do not  prohibit it   e No   encryption  or compression  is not supported  is set by default for compression  if the  parameter has not been modified during the Server installation      When coordinating the settings of the encryption policy on the Server and other components  the  Agent or the Network Installer   one should remember  that certain combinations are incompatible  and  if selected  will result in disconnecting the corresponding component from the Server     7 1 describes what settings provide for encryption between the Server and the components      when  the connection will be non encrypted       and what combinations are incompatible  Error      Table 7 1  Compatibility of the encryption policy settings         Yes   Error  Possible 4      No Error            Encryption of traffic creates a considerable load on computers those capacities are close to the  minimal system requirements for the components installed on them  So  when traffic encryption is  not required to provide additional security  you can disable this mode  Traffic encryption is also not  recommended in big networks  more then 2000 clients      To disable encryption mode  you should step by step switch the Server and other components to  the Possible mode first  avoiding formation of incompatible Network Installer Server and  Agent Server pairs  If you do not follow this recommendation it may result in loss of connection  with the component and the necessity to reinstall it     Using the comp
183. h will distribute multicast updates  must be different multicast  groups specified       For different Dr Web Servers  which will distribute multicast updates  must be different Interface  and Port parameters specified        For using several multicast groups  sets of stations which are included into these groups must not  overlap  Thus  each station of anti virus network can be included only into one multicast group     7 2 14  Licenses    On the Licenses tab  you can configure settings of licenses propagation between Dr Web Servers       Validity period of donated licenses     time period on which licenses are donated from the key on  this Server  The setting is used if the Server donates licenses to neighbor Servers      Period for accepted licenses renewal     period till the license expiration  starting from which this  Server initiates renewal of the license which is accepted from the neighbor Server  The setting is  used if the Server accepts licenses from neighbor Servers        License synchronization period     interval for synchronizing information about donating licenses  between Servers     wy Detailed information on licenses propagation between Servers is described in the License Manager  section     Ta     1       ax  G    Chapter 7  Configuring Dr Web Server    7 3  Dr Web Server Remote Access    For connection of the Server remote diagnostics utility  you must enable Dr Web Server  FrontDoor extension  To do this  in the Dr Web Server configuration section  
184. he Scanner may give false positives though       The Scan boot sectors flag so Scanner will check boot sectors of the drives  Both boot sectors of  logical drives and main boot sectors of physical drives are scanned     e The Scan programs that run on startup   flag to scan files that automatically launched at  operating system startup       Set the Follow symbolic links flag to follow symbolic links during scan   e See the Scan running programs and modules   flag to scan processes that are run in the RAM     e Set the Scan for rootkits   flag to enable scanning for malware that hides its presence in the  system      Set the Interrupt scanning when switching to battery mode  flag to interrupt scanning when  switching computer of a user to battery mode        The Scan priority drop down list defines priority of the check process relatively computing  resources of operating system        Set the Load level of computer resources  flag to limit the use of computer resources when  scanning  set the flag and select from the drop down list the maximum allowed load of resources by  Scanner  In absence of other tasks  computer resources are used in maximum     The Load level of computer resources option has no effect on the actual resources load when  launching the scan on a single processor system with one core     e The Actions after scan drop down list instructs to perform specified action automatically when the  check is completed     e do nothing   no actions perform on user comp
185. he anti virus network when a Proxy server is used is illustrated in the figure  9 1     Chapter 9  Configuring the Additional Components     O gt 8       am Dr Web Server  g LAN          Proxy Server E  Internet    Lo  Protected computer Router    Figure 9 1  Diagram of the anti virus network when a proxy server is used    Principle of Operation    When a proxy server is used  the following operations are performed    1     If the address of the Server is not specified on the Agent  the Agent sends a multicast request  according to the protocol of the network    If the Proxy server is set up to translate connections  the discovery  yes  parameter   a  message about the availability of an operating Proxy server is sent to the Agent    The Agent sets the received Proxy server parameters for Dr Web Server  Further  intercommunication is performed transparently for the Agent    The Proxy server listens specified ports for incoming connections via given protocols according to  the configuration file    For each incoming connection from the Agent  or Dr Web Server  the Proxy server establishes  a connection with Dr Web Server  or Agent      The forwarding algorithm for the list of Dr Web Servers    1     Proxy server loads to RAM the list of Dr Web Servers from the drwcsd proxy xml  configuration file  see the Appendices document  p  Appendix G4     Dr Web Agent connects to the Proxy server    Proxy server forwards Dr Web Agent to the first Server from Dr Web Servers list loaded in
186. hich is disabled to execute     Hooks Tree Managing    To manage objects in the hooks tree  use the following elements of the toolbar    P  drop down list for adding an element to the hooks tree   3 Add hook   add a new user hook   C    Add hooks group     add a new user group for placing hooks in it   X Remove selected objects     remove user hook or hooks group which is selected in the hook tree     151    Ta     AN    ax       Chapter 7  Configuring Dr Web Server       Enable hook execution     the same action is performed in the hooks editor if you set the Enable  hook execution flag  See also Hooks activating     O Disable hook execution     the same action is performed in the hooks editor if you clear the  Enable hook execution flag  See also Hooks activating     Hooks Groups Managing    To create a new group     1  On the toolbar  select  P  gt  C   Add hooks group   2  In the opened window  specify the following parameters     Set the Enable hook execution flag to activate hooks which will be included into this group  See  also Hooks activating     In the Group name field  specify an arbitrary name for the creating group   3  Click Save     To change the order of groups using   1  In the hooks tree  drag and drop the hooks group and place it in the necessary order relative to the  other groups     2  The order of hooks usage is automatically changed after changing groups order  the first will be  performed the hooks from the groups that are placed higher in the hooks 
187. his group is primary  see the  Using Groups to Configure Stations section        Ta  J  1       ax       Chapter 5  Groups  Integrated Workstations Management    In the Configuration section  the following groups parameters are presented     a    eo  P  B     lt     Permissions for workstations  which inherit this setting from a group if it is  primary  Setting permissions of groups is similar to setting permissions of  separate workstations     Centralized task schedule for workstations  which inherit this setting from a  group if it is primary  Setting schedule of group is similar to setting  centralized schedule of separate workstations     License key file for workstations  which inherit this setting from a group if it  is primary    Restrictions for anti virus software updating for workstations  which inherit  this setting from a group if it is primary    Installing components list for workstations  which inherit this setting from a  group if it is a primary    Editing the components list of group is similar to setting the components list  of separate stations     Configuring automatic placing the stations into the group  Available for user  groups only     Settings of the anti virus components  Setting the anti virus package  components of group is similar to setting the anti virus package components  of separate workstations     5 3  Including Workstations into User Groups    77       Permissions of Station  Users       Scheduled Tasks of a  Station       License Manag
188. hreat statistics  Threat Classes Charts  Threat statistics  Most infected stations Charts  Actions performed Charts  Threats  Count of errors by stations Errors  Count of errors by components Errors    Ta  J  1       ax       Chapter 6  Administration of Workstations    Threats by components   Start Stop  Errors by components     Start Stop    Count of errors by stations   displays the list of stations on which errors in anti virus components  operation detected  Graph displays the total number of errors for each station       Count of errors by components   displays the list of anti virus components in which operation  errors detected  The pie chart displays percentage between errors of all components       Threats by components   displays the list of anti virus components which detected the threats   Chart displays the total number of threats detected by each component        Errors by components   displays the list of anti virus components in which operation errors  detected  Chart displays the total number of errors for each component     6 6 3  Quarantine    Quarantine Content    Files can be added to the Quarantine       by one of anti virus components  e g  Scanner   e manually by user via the Quarantine Manager     After moving to Quarantine  files are automatically rescanned  This affords     Clarifies the status of infection  presence of infection and its type  because in manual moving to Quarantine   information on files infection status is unavailable        infec
189. i Virus Network and Their Interface   28    e run     Server process PID    e sessions     Control Center sessions    e upload     folder to download temporary files which are specified via the Control Center  keys    etc       etc opt drweb com  for Linux OS  only for installation from   tar gz run generic packages   and  usr local etc opt  for FreeBSD OS    e software drweb esuite  remove     script to remove the Server    e   possible extra files and folders         usr local etc rc d  for FreeBSD OS   e drwcsd sh     script to start and stop the Server      var tmp drwcs     backup after Server removal     General Configuration Files    agent key  name may Agent license key    vary    certificate pem SSL certificate   common  conf configuration file  for some of UNIX system based  OS    download conf network settings for generating of the Agent    installation packages    drwcesd conf  name may Server configuration file    vary    drwesd conf distr Server configuration file template with default  parameters   drwesd pri private encryption key    e for Linux OS and Solaris       enterprise key  name Server license key file  The file is saved if it Os   may vary  presented after the upgrade from the previous    versions  For the new Server 10 0 installation   Nar opt drwcs etc  the file is absent e for FreeBSD OS   frontdoor conf configuration file for the Server remote   OT IIS Os  diagnostic utility  http alerter  certificates for verification the apple   certs pem notify
190. ierarchy  The resulting set of permissions for an  object depends on inheriting and parent groups permissions can be found in the Appendices  document  in the Appendix C3 section     Changing permissions    Changing permissions is not allowed for administrators accounts or administrative groups during  creation  Permissions can be changed only for already created accounts and groups and can be done  in the properties section of an account or a group  You can only reduce permissions at editing  You  cannot edit permissions for the admin predefined administrator     The procedure is described in the Editing Administrative Accounts and Groups section        wy Brief description of administrative permissions and Control Center sections depended on a certain  permissions  is given in the Appendices document  in the Appendix C4  section     67    Ta  J  i    ax        Chapter 4  Anti Virus Network Administrators   68    4 3  Management of Administrative Accounts and Administrative  Groups    4 3 1  Creating and Deleting Administrative Accounts and Groups    Administrative login must be unique     Administrators are not allowed to connect via external authentication systems if an administrator with  the same login already exists at the Server     Adding Administrators    To create administrative account  administrator must have Create administrators   administrative groups permission     To add a new administrative account     1  Select the Administration item in the main menu of Dr
191. ification Configuration section          Delete   permanently delete all selected unsent notifications   5  Unsent notifications are removed from the list in the following cases   a  Notification is successfully sent to the receiver   b  Notification is deleted by administrator manually via the     Delete button on the toolbar   c  The number of resend attempts is over and notification was not sent     d  In the Notification Configuration section  the notification block according to whose settings this  notifications have been sending  is removed     7 8  Administration of Dr Web Server Repository    The repository of Dr Web Server is designed to store benchmark copies of the anti virus software and  update them from GUS servers     The repository deals with sets of files  products   Each product resides in a separate subfolder of the  repository folder located in the var folder  which in case of installation with the default settings is  lodged in the Server root folder  In the repository each product is dealt with separately     To administrate the updating in the repository product revisions are used  A revision is a correct state  of product files at a certain time  including file names and checksums  and has its unique number     The repository synchronizes revisions of products as follows   a  to Dr Web Server from the product update site  via HTTP      158    Ta  J  1       ax       Chapter 7  Configuring Dr Web Server   159    b  between different Dr Web Servers in a 
192. ile for import downloaded repository archive to the  Server via the Control Center  for the Administrating     Repository Content section     3  If you want to change the additional settings for GUS connections and updates downloading  click  Additional settings  In the opened settings window  the following tabs are available     a  On the Products tab  you can change the list of products to download  In the opened settings  window  the list of all repository available for downloading for the GUS is presented     e To update the list of products currently available on the GUS  click Update     e Set the flags next to whose products that you want to download from the GUS or the flag in  the head of the table to select all products from the list     b  On the Dr Web GUS tab  you can configure update servers parameters        185    Ta  J  1       ax       c     d     Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Components    GUS servers are listed in the order the utility contacts them when downloading the  repository  To change GUS server order  use the Up and Down buttons     To add a GUS server to the list of servers used for updates  specify the address of the GUS  server under the servers list and click Add     To remove a GUS server from the list of used  select the server you want to delete and  click Remove     In the Base URI field  specify a GUS servers folder where updates of Dr Web products are  located     In the Protocol drop down list  se
193. ile makes it  invalid  To avoid this  do not modify the key file and or save it when closing the text editor     License Manager Interface    Dr Web Security Control Center contains the License Manager component  This component is  used to manage licensing of anti virus network objects     48    Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface    To open the License manager  select Administration item in the main menu of Dr Web Security  Control Center  In the opened window select the License manager item in the control menu     Keys Hierarchical List    The main pane of the License manager contains keys tree   the hierarchical list nodes of which are  license keys of stations and groups for which license keys are assigned     Toolbar contains the following control elements      P Add key       x Remove  selected objects    b Propagate the  key to groups and  stations    D Export key  RN Propagate the    key to neighbor  Servers    Add a new license key record     Remove the connection  between the key and the  licensing object     Replace of add selected key to a  licensing object     Save the local copy of the license  key file     Donate licenses from the  selected key to neighbor  Servers     Option is always available     Functional features depend on whether the object is  selected in the key tree or not  see Add a new license  key     Option is available if a licensing object  station or  group  or a license key is selected in the
194. iles       Installation packages     cleanup interval of personal installation packages    e Repository files     cleanup interval of files in repository     When setting numerical values  please note the drop down lists with unit of measure for intervals     7 2 6  Database    On the Database tab  you can configure a DBMS required for Dr  Web Server operation     wy You can get the structure of Dr Web Server DB via the init sql script  located in the etc  subfolder of Dr Web Server installation folder     To specify parameters of operating with the Database     1  On the Database tab of the Dr Web Server configuration section  select the type of DB in the  Database drop down list       IntDB     embedded SQLite2 DB  a component of Dr Web Server      ODBC   to use external DB via the ODBC connection     Oracle     external DB for all platforms except FreeBSD       If an Oracle external DBMS is used via the ODBC connection  it is necessary to install the latest  version of the ODBC driver delivered with this DBMS  It is strongly recommended not to use the  Oracle ODBC driver supplied by Microsoft     PostgreSQL   external DB       SQLite3     embedded DB  a component of Dr Web Server   The recommended option when  using an embedded database     2  Specify requirement settings for DB operation       For an embedded DB  if necessary  specify the full path to the database file into the Path field  and specify the cache size and the data log mode       The parameters of an externa
195. in PDF file     7 10 4  Dr Web Servers Cluster    You must upgrade Servers within the cluster from installation packages only  At this  you must stop   A all the Servers and upgrade them one after another  Upgrading via the Control Center  transition  to a new revision  should not be used because after you upgrade the first Server in using the  common database  all other Servers will not be able to operate and upgrade     For creation of the Servers cluster in the anti virus network  the following prescriptions must be  implemented     1  The same configuration files    All Servers must have the same drwcsd pub and drwcsd pri encryption keys     If encryption keys have not been created before  during installation of the first Server of a cluster   encryption keys will be generated automatically     You can get necessary encryption keys for installation of the next Servers of a cluster  via the  Contro  Center  Administration  gt  Encryption keys menu  At this  depending on the following  cluster establishing way  either both keys or only drwcsd pri may be needed       If the drwcsd pri private encryption key is specified during the Server installation  the  drwcsd pub public key is generated automatically       If the necessary private key is not specified during the Server installation  when you must replace  both of the keys manually after the installation     w Location of configuration files is given in the Dr Web Server section     2  Common Server name    For all Server
196. in the control menu   2  At initial setup  notifications list is empty  Click Add notification   3  To enable notifications sending  set the switch on the left of the notifications block header to the  corresponding position       notifications sending for this block is enabled     L       notifications of this block are not sent   4  In this section  you can create several notifications blocks  profiles   e g   for the different sending    methods  To add one more block  click M on the right of the notifications block settings  At the  bottom of the page  one more notifications block will be added  Configuration of different  notifications blocks as their templates texts is performed independently     5  In the Title field  specify the name of added notifications block  This name is used  e g  in  configuration of the Statistic reports in the Server schedule  Further  to edit the header  click it  and type necessary name  If you have more than one notification blocks  when you click the header  text  the drop down list with headers of existing notifications blocks will be prompted     Ta  J  i    ax       Chapter 7  Configuring Dr Web Server    6  To configure notifications sending  select necessary type for notifications sending from the  Notifications send method drop down list     e Dr Web Agent     send notifications via the Agent protocol   e Email     send notifications on email      Push notifications     send push notifications to Dr Web Mobile Control Center  This o
197. inistrators as well as on  a computers that function as LAN servers  Anti virus network components exchange information via  TCP IP network protocols  Anti virus software can be installed  and manage them afterwards  on  protected stations either via the LAN  or via the Internet     Ne E se       I  I  I  I  ad       Dr Web Server      HTTP HTTPS    Dr Web Security Control    Center    TCP IP network    Dr Web Mobile Control    Center Updates transmission via HTTP HTTPS    Protected station    Dr Web GUS    u p E g    The logical structure of the anti virus network    Ta  J  N    ax       Chapter 1  Welcome to Dr Web   Enterprise Security Suite    Central Protection Server    Central protection Server is installed on a computer of anti virus network  and installation can be  performed on any computer  not only on that functioning as a LAN server  General requirements to  this computer are given in the System Requirements section    Cross platform Server software allows to use a computer under the following operating systems as  a Server     e Windows   OS   e UNIX   system based OS  Linux    FreeBSD    Solaris         Central protection Server stores distribution kits of anti virus packages for different OS of protected  computers  updates of virus databases and anti virus packages  license keys and package settings of  protected computers  Server receives updates of anti virus protection components and virus  databases via the Internet from the Global Update System and propa
198. installing components setup for the following procedures       Extend the List of Object License Keys     Donate a License to a neighbor Server with adding a key     When performing these procedures  to setup installing components  do the following     1  In the window with installed components settings  the following objects are listed   e Stations and groups with their list of installing components     e In the Current key column  you can find the list of object keys and settings of installing  components that are currently actual for the object     e In the Assigned key column  you can find the key and settings of installing components that are  specified in the key which you want to add to the selected objects     2  If necessary  set the Show only different flag to show in the list only those components settings  of which in the current and assigned keys are differ  Note that in the Assigned key section not the  assigned key settings are listed  but the result settings of installing components     3  To configure the list on installed components   a  In the Assigned key column  you can configure the result list of installing components     e Installing components settings in the Assigned key column  are calculated on the basis of that if  use the component in the current settings and in the new key is allowed     or not allowed      as    follows          pa   pan            e You can change installing components settings  downgrade rights to install  only if settings  c
199. ion     e Server  Port  Password   parameters for connection to the RADIUS server  IP address DNS name   port number  password  secret  correspondingly      Timeout   time for waiting the response from the RADIUS server  in seconds      Retries number   maximum number of retries to connect the RADIUS server     Also  you can setup additional RADIUS parameters via the following tools   e The auth radius xm1 configuration file located in the etc folder of the Server     Besides parameters that are specified via the Contro  Center  in the configuration file you can specify  the NAS identifier value  This identifier according to the RFC 2865  can be used instead of IP address   DNS name as a client s identifier for connection to the RADIUS server  In the configuration file it is  stored in the following form      lt     NAS identifier  optional  default   hostname    gt    lt nas id value   wo      The dictionary drweb dictionary located in the etc folder of the Server     The dictionary stores the list of RADIUS attributes of Doctor Web company  VSA   Vendor Specific  Attributes      Ta     1    ax       Chapter 4  Anti Virus Network Administrators    4 1 5  PAM Authentication    To enable PAM authentication     Select Administration in the main menu of the Control Center   Select Authentication in the control menu    In the opened window  select PAM authentication section    Set the Use PAM authentication flag    Click Save    Restart the Server to apply changes     O U PWN E  
200. ion    e select the group of stations to email all installation packages generated for stations of this group   Use CTRL or SHIFT to select several objects at at time    On the toolbar  click    General      4 Mail installation files     In the Mailing of installation files opened section  specify the following parameters     Ta     Ti    ax       Chapter 6  Administration of Workstations    121    e In the Recipient email addresses section  specify the email address to sent installation  package to  If several stations or groups were selected  specify email addresses to send  installation packages of each station separately next to this station name     In the Additional section  set the Pack in zip archive flag to pack installation packages into a  zip archive  Archiving can be useful if the user s email system contains filters that block sending of  executable files in emails attachment     In the Sender section  specify the email address which will be set as a sender of the email with  installation files     In the SMTP server settings section  you can specify SMTP server parameters which will be  used to send email  In the parameters are known  e g  already been specified  this section will be  folded  you can unfold it and edit specify parameters  if necessary  At first sending of installation  packages  in the opened section you must specify the following parameters     o Address     SMTP server address which is used to send emails    o Port     SMTP server port which 
201. ion   the name of notification from the list of preinstalled notifications    e Title   the name of notification block according to whose settings this notification is sent    e Resends remained   number of remained resend attempts that are taken after notification send  failed  Initial number of resend attempts is specified at notifications setup in the Notification  Configuration section  After notification has been sent  you cannot change the number of  remained resends for this notification    e Time of next resend   date and time of the next notification resend attempt  Period to perform  notification resend attempts is specified at notifications setup in the Notification Configuration  section  After notification has been sent  you cannot change the period of remained resends for  this notification    e Receiver   addresses of notification receivers    e Error   error that caused the failure of notification sending        4  To manage unsent notifications   a  Set the flags next to the specific notifications of the flag in the notifications table header to  select all notifications in the list     b  Use the following buttons on the toolbar       gt  Resend   send selected notifications immediately  At this  the immediate attempt to send  the notification is performed  If the sending failed  the number of remained attempts is  decremented by one and the time of the next attempt will be counted from the moment of the  current sending with periodicity specified in the Not
202. ion has been initiated  It is specified  only in case of an external connection to the Server  particularly via the Control Center or via  the Web API       Repository folder   folder name of the Server repository that was modified according to the  update process     5  To view the detailed information on a certain update  click the line of this update  This opens the  window with table on product files changed during selected update  The following information is  given fro each file  File name  File hash  Size and State     6  If necessary  you can export data for the specified period into a file  To do this  click on the the  following buttons on the toolbar    amp  Save data in CSV file   Save data in HTML file     t Save data in XML file    amp  amp  Save data in PDF file     7 2  Setting Dr Web Server Configuration    To set the configuration parameters of Dr Web Server     1  Select the Administration item in the main menu of the Contro  Center     2  Select Dr Web Server configuration in the control menu  A window with Server configuration  will be opened     wy Values of fields  marked by the   sign  must be obligatory specified     3  On the toolbar  the following buttons to manage the section settings are available     Restart Dr Web Server   restart the Server to apply changes that have been specified in this  section  The button become enabled after you specified the changes in the section settings ans click  Save         Restore configuration from the backup   d
203. ion with branched system of  assigning licenses to stations  groups of stations and also  granting licenses between  several Servers in multiserver configuration of anti virus network  detailed information see  in the License Manager section      Wide set of setting to configure the Server and its separate components including   configuring schedule to maintain the Server  plug in user hooks  flexible configuration of  update system of all anti virus network components from the GUS and further propagation  of updates on stations  configuring the system of administrator notifications about anti virus  network events with different methods of notification delivering  configuring neighbor  connections to configure multiserver anti virus network  detailed information see in the  Chapter 7  Configuring Dr Web Server section                              Detailed information on features for installation of anti virus protection on workstations is given in  the Installation Manual     The par of the Control Center is the Web server that is automatically installed with the Server   The general task of the Web server is performing operation with web pages of the Control  Center and clients network connections     Central Protection Mobile Control Center    As a separate component  the Mobile Control Center is provided  It is designed for installation  and operation on mobile devices under iOS and Android OS  General requirements to the application  are given in the System Requirements 
204. ions  3 2 1  Direct Connections  3 2 2  Dr Web Server Detection Service  3 2 3  Using SRV Protocol  Chapter 4  Anti Virus Network Administrators  4 1  Authentication of Administrators    4 1 1  Authentication of Administrators from the Server DB    10  11  17  21  22   24  24  25  27  29  30  33  34  39  39  40  41  44  45  45  48  54   57  57  58  59  60  60   61  61  62    y  Ti    ax        4 1 2  Active Directory Authentication  4 1 3  LDAP Authentication  4 1 4  RADIUS Authentication  4 1 5  PAM Authentication  4 2  Administrators and Administrative groups  4 3  Management of Administrative Accounts and Administrative Groups  4 3 1  Creating and Deleting Administrative Accounts and Groups    4 3 2  Editing Administrative Accounts and Groups    Chapter 5  Groups  Integrated Workstations Management  5 1  System and User Groups  5 2  Group Management  5 2 1  Creating and Deleting Groups  5 2 2  Editing Groups  5 3  Including Workstations into User Groups  5 3 1  Including Stations into Groups Manually  5 3 2  Configuring Automatic Group Membership  5 4  Using Groups to Configure Stations  5 4 1  Inheriting Stations Configuration from Groups  Primary Groups  5 4 2  Propagation of Settings to Other Groups Stations  5 5  Comparison of Stations and Groups  Chapter 6  Administration of Workstations  6 1  Management of Workstation Accounts  6 1 1  New Stations Approval Policy  6 1 2  Removing and Restoring Stations  6 1 3  Merging Stations  6 2  General Workstation Settings  6 2 
205. is column defines the state of product revisions  Two types of markers are  available      v    Distributed revision  Revision used for updating Agents and anti virus software on the  workstations    Revision for distribution is selected as follows    1  Revision indicated with the v  marker in the Current column is distributed  Only one    revision can be marked  For the Dr Web Agent for Windows product  revision received  earlier than the current one cannot be selected as distributed     Ta     1       ax       Chapter 7  Configuring Dr Web Server    2  If no revision is marked in the Current column  the revision indicated with the Q marker  in the Stored column is distributed     3  If no revision is marked in the Current and Stored columns  the last revision is  distributed     The automatic marker always indicates the distributed revision     O  Frozen revision  A frozen revision is not distributed to stations  new revisions are not  downloaded from the Server  For actions under frozen revision  refer to Delayed Updates     If a revision is frozen  the revision for distribution is selected as follows     1  If the v  marker in the Current column is set  the current revision is distributed to  stations     2  Ifthe v  marker in the Current column is not set  the revision that precedes the current  one is distributed to stations     Current Set the   marker to specify the revision used for updating Agents and anti virus software on  the stations     Only one revision can b
206. is section to a  file of a special format     97    Ta  J  1       ax        Chapter 6  Administration of Workstations    Ki Import settings to this section from the file   replace all settings in this section with  settings from the file of a special format     5  If any changes in the settings are made via Dr Web Security Control Center  click Save to  accept the changes  The settings will be passed to the stations  If the stations were offline when  changes are made  the settings will be passed when stations connect to the Server     6 4 1  Components    Depending on the operating system of the station  the following anti virus components are provided     Stations under Windows   OS  Dr Web Scanner  Dr Web Agent Scanner  Scans a computer on user demand and according to the schedule  Also the remote launch of  anti virus scan of stations from the Control Center including rootkits check is supported   SplDer Guard  The constant file system protection in the real time mode  Checks all launched processes and  also created files on hard drives and opened files on removable media   SplDer Mail  Checks all incoming and outgoing mail messages when using the mail clients   The spam filter is is also available  if the license permits this function    SplDer Gate  Checks all calls to web sites via the HTTP protocol  Neutralizes malicious software in HTTP    traffic  for example  in uploaded and downloaded files  and blocks the access to suspicious or  incorrect resources     Office c
207. is used to send emails    o User  Password  Retype password    if necessary  specify name and password of SMTP  server user  if the SMTP server requires authorization     o Set the STARTTLS encoding flag to use STARTTLS traffic encoding for sending messages  on email     o Set the SSL encoding flag to use SSL traffic encoding for sending messages on email     o Set the Use CRAM MD5 authentication flag to use CRAM MD5 authentication on a mail  server     o Set the Use DIGEST MD5 authentication flag to use DIGEST MD5 authentication on a  mail server     o Set the Use the plain authentication flag to use plain text authentication on a mail  server     o Set the Use LOGIN authentication flag to use LOGIN authentication on a mail server     o Set the Validate the SSL server certificate flag to enable validating the SSL certificate of  a mail server     o Set the Debug mode flag to get SMTP session detailed log Click Send     6 8  Sending Notifications to Users    The system administrator may send the users informational messages including     e message text    e hyperlinks to Internet resources    e company logo  or any other graphic presentation     e exact date of message receipt in the title of the window     These messages are displayed on user   s PC as popup windows  see figure 6 1      A  AN    T   v    A    A        Chapter 6  Administration of Workstations   122       New message  IA   Tione 09 04 2015 16 56    C gt   S Dear users     Dr Web Firewall component was install
208. it while task finishes before  executing other tasks with Run program type  If the Execute  synchronously flag is cleared  the Agent logging only the start of the  program  If the Execute synchronously flag is set  the Agent logging  the start of the program  the returned code and the time of the program  shutdown     Complete    Custom Parameters of scanning setup are described in the Configuring Scanner       Settings     Express    Remote launch of the Scanner is available only on stations under Windows OS  UNIX system based  OS and OS X     3  On the Time tab       In the Period drop down list set the launch mode of the task and setup the time according to the    specified periodicity     Daily    Every N minutes    Hourly  Monthly    N minutes  initial task    Start up    Weekly    after    Table 6 4  Parameters of different launch modes    Specify the hour and the minute for the task to be launched at the time specified   The N value should be specified to set the time interval for the execution of the task     At N equal 60 or more  the task will be run every N minutes  At N less than 60  the  task will be run every minute of the hour multiple of N     Specify a number from 0 to 59 to set the minute of every hour the task will be run     Specify the day of the month  the hour and the minute for the task to be launched at  the time specified     In the Initial task drop down list  select the task relatively to which the time of current  task execution is set     In the 
209. item of the control menu  select the Summary data option to  view the data on the total number of entries on events at neighbour Servers  In the table with  statistic data on neighbour Servers  the following data is displayed       Infections   infections which are detected at stations  connected to the neighbour Servers     Errors   scanning errors    Statistics   statistics on detected infections      Start Stop   the launch and termination of scan tasks       Status   status of anti virus software on stations      All network installations   network installations of the Agent     3  To view the page with detailed tabular information on events at neighbour Servers  click the  number of entries on demand event at the table in Summary data section     4  Also  to view the page with detailed tabular information on events at neighbour Servers  select the  corresponding item  see step 2  in the Tables section of the control menu     5  To view the data for certain time period  specify the certain time period relatively today in the drop   down list  or select the arbitrary date range on the toolbar  To select the arbitrary date range  enter  required dates or click the calendar icons next to the date fields  To load data  click Refresh     6  To save the table for printing or further processing  click     amp  Save data in CSV file     Ta  yan    A    A        Chapter 7  Configuring Dr Web Server   178    fi Save data in HTML file     fi Save data in XML file   f amp  Save data 
210. l  server   e Set the Use the plain authentication flag to use plain text authentication on a mail server   e Set the Use LOGIN authentication flag to use LOGIN authentication on a mail server   Set the Validate the SSL server certificate flag to enable validating the SSL certificate of a  mail server     Set the Debug mode flag to get SMTP session detailed log Send test message     send the test  message according to the specified settings of notification system  The test message text is  specified in notifications templates     Push Notifications    For Push notifications which are sent to Mobile Control Center  specify the following parameters       Resends number   the number of retries when failed to send a message  Default is 10     e Resend time out     period in seconds  after which the repeated attempt to send a message is  performed  Default is 300 seconds       Send test message   send the test message according to the specified settings of notification  system  The test message text is specified in notifications templates     Notifications via the SNMP Protocol    For notifications via the SNMP protocol  specify the following parameters       Resends number   the number of retries when failed to send a message  Default is 10     e Resend time out     period in seconds  after which the repeated attempt to send a message is  performed  Default is 300 seconds     e Receiver     entity that receives SNMP request  For example  IP address or DNS name  Only one  receiver
211. l DB are described in detail in the Appendices document in  Appendix B  The Description of the DBMS Settings  The Parameters of the DBMS Driver     3  Click Save to apply specified settings        wy Dr Web Server distribution kit contains embedded clients for supported DBMS  so note     e If you plan to use embedded DBMS clients which are supported within Dr Web Server  then  during installation  upgrade  of the Server  in the installer settings  select the Custom option of  the installation and in the next window make sure that installation of corresponding embedded  DBMS client is enabled in the Database support section     Ta     1       aX       Chapter 7  Configuring Dr Web Server   136    e If you plan to connect external databases via ODBC  then during installation  upgrade  of the  Server  in the installer settings  select the Custom option of the installation and in the next  window disable the installation of corresponding embedded client in the Database support  section    Otherwise  interaction with DB via ODBC will be impossible because of libraries conflict     Server installer supports change mode of the product  To add or remove separate components e g   databases management drivers  it is enough to run Server installer and select the Change option     Using an embedded DBMS is selected by default  This mode considerably increases the load on the  Server  It is recommended to use an external DBMS in large anti virus networks  Changing the type of  the DBMS is
212. lect the protocol type to receive updates from update  servers  For all protocols  updates are downloaded according to the settings of the GUS  servers list    In the Allowed certificates drop down list  select the type of SSL certificates that will be  automatically accepted  This option is used only for secure protocols that support  encrypting    Login and Password   user credentials to authenticate on updates server  if the updates  server requires authorization     Set the Use CDN flag to allow downloading repository from GUS via Content Delivery  Network     On the Proxy Server tab  you can specify parameters for connecting ti the GUS via the proxy  server     Proxy server address and Port   the network address and the port number of the proxy  server to use correspondingly    Login and Password   authorization parameters on the proxy server if used proxy server  requests authorization     On the Scheduler tab  you can configure the schedule to receive updates periodically  To  execute the schedule  the Task schedule of Windows OS is used  At this  you do not have to  launch the utility manually  the repository downloading performed automatically according to the  specified time slots     e  On the Log tab  you can configure parameters of updates downloading log     Click OK to apply specified changes and to return to the main widow of Dr Web Repository  Loader       After configuring all parameters  click Download in the main window of Dr Web Repository    Loader to st
213. list     e To enable the task execution  set the Enable execution flag  If the flag is cleared  the task  remains on the list but will not be executed     w The same action you can perform from the main window of the schedule via the Status option on  the toolbar     Ta     i     ax         The Critical task flag instructs to perform extra launch of the task at next Dr Web Agent  launch  if scheduled execution of this task has been omitted  Dr Web Agent is switched off at  the due time   If a task is omitted several times within a certain period of time  then it will be    Chapter 7  Configuring Dr Web Server    performed only once after Dr Web Agent has been launched     wy The same action you can perform from the main window of the schedule via the Severity option on    the toolbar     2  On the Action tab  in the Action drop down list  select the type of the task and specify task    parameters which are needed to perform the task     Back up critical  server data    Back up repository    Create statistic  report    Table 7 4  Tasks types and their parameters    The task is designed to backup the following critical data of the Server   e database    e license key file    e private encryption key    Specify the following parameters     e Path   path to the directory where the data will be saved  blank field means that the  default directory will be used      e Maximum number of copies     maximum number of backup copies  the 0 value  means no limitation      For details see 
214. listens by default  similarly to direct connections      udp 231 0 0 1 2193    wy Note  in Servers v  4 XX the 2371 port was used  In the 10 0 version this port is no longer  supported     This parameter is set at the Servers settings  Administration     Dr Web Server configuration      Transport tab     Multicast group field   3 2 3  Using SRV Protocol    Clients under Windows OS support SRV client network protocol  format description is given in the  Appendices document  p  Appendix E  The Specification of Network Addresses         Accessing the Server via the SRV records are implemented by the following way     1  During the Server installation  registration in Active Directory domain is set up  installer registers  corresponding SRV record on DNS server        wy SRV record is registered on DNS server according to the RFC2782  see http   tools ietf org html   rfc2782      2  Ina request for connecting the Server  client specifies access via the srv protocol     For example  launch the Agent installer with explicit specification of the Server looks as following     drwinst srv drwcs    3  Transparently for the user  the client uses functional of SRV protocol to access to the Server     wy If the Server is not specified directly  the drwcs is used by default as a name of the service     Ta  J  1       ax        Chapter 4  Anti Virus Network Administrators    Chapter 4  Anti Virus Network Administrators    It is recommended to appoint a reliable  qualified employer experienc
215. load on each of them     3  Consolidation of data from several Servers on one Server  the possibility to view all the data  through Dr Web Security Control Center connected to such Server     wy Dr Web Enterprise Security Suite anti virus monitors and prevents the creation of cyclic data  flows     4  Available licenses for protected stations can be donated to the neighbor Server  At this  the license  key itself remains at the disposal of the distributing Server  available licenses are propagated to a  neighbor Server for a specified time period and after it has expired  the licenses are revoked     7 10 2  Setting Connections between Several Dr Web Servers    To use several Servers in an anti virus network  you should set up connections between these  Servers     It is advisable to make a plan of the anti virus network structure first  All data flows  connections of the   peer to peer  and  parent child  types should be indicated  Then  each Server included into the  network connections with any  neighboring  Servers   neighbors  have at least one dataflow between  them  should be set up  After that  for each Server included into the network  you should set up  connections with  neighboring  Servers   neighbors  have at least one data flow between them      Example of configuring of a connection between Parent and Child Dr Web Servers    wy Values of fields  marked by the   sign  must be obligatory specified     1  Make sure that both Dr Web Servers operate normally    2  T
216. ly on the  toolbar of the schedule section   4  When all parameters for the task are specified  click Save to accept changes of edited parameters     if you editing existing task  or to create a new task with specified parameters if you created a new  task     Ta  J  1       ax        Chapter 7  Configuring Dr Web Server   148    7 5  Setting the Web Server Configuration    To set the configuration parameters of the Web server     1  Select the Administration item in the main menu of the Control Center     2  Select Web server Configuration in the control menu  A window with Web server configuration  will be opened     wy Values of fields  marked by the   sign  must be obligatory specified     3  On the toolbar  the following buttons to manage the section settings are available   Restart Dr Web Server     restart the Server to apply changes that have been specified in this  section  The button become enabled after you specified the changes in the section settings ans click  Save       Restore configuration from the backup     drop down list with the backup of all section  settings  which you can restore after making changes  The button become enabled after you  specified the changes in the section settings ans click Save     Reset all parameters to initial values     restore the values that all parameters in this section  had before current editing  last saved values    Reset all parameters to default values     restore default values of all parameters in this  section    4  
217. m the Deleted subgroup of the Status group are selected      5  mail installation files  Send installation files for stations selected in the list to e mail addresses   specified in this section parameters         F Add a station or a group  Add a new element of anti virus network  Click the corresponding item  in the drop down menu     E Add station  Add a new station  see Installation Manual  p  Creation of a New User  Account         T Add group  Add a new group        Data Export  Save common data about workstations in the anti virus network to a CSV  HTML or  XML file  Select the file format in the drop down menu     tsave in CSV format   in Save in HTML format     fi save in XML format   fa Save in PDF format     Fj Export configuration   Ki Import configuration        Propagate configuration     C  Setup group visibility  Change the appearance of groups in the list  Select one of the following in  the drop down list  the icon of the group will change  see table 2 1      LE Hide group   means that the group will not be displayed in the hierarchical list     Hide if empty   means that the group will not be displayed if the group is empty  does not  contain any workstations    E Show   means that the group will always be displayed in the hierarchical list        Components management  Manage the components on the workstation  Select the necessary  action in the drop down menu     e Update all components  Update all installed components of the anti virus  e g   when the  A
218. main window of the schedule via the Status option on  the toolbar       The Critical task flag instructs to perform extra launch of the task at next Dr Web Agent  launch  if scheduled execution of this task has been omitted  Dr Web Agent is switched off at  the due time   If a task is omitted several times within a certain period of time  then it will be  performed only once after Dr Web Agent has been launched     wy The same action you can perform from the main window of the schedule via the Severity option on  the toolbar       If several scan tasks must be implemented  only one task will be executed   the first one in the  queue     Ta     1       aX        Chapter 6  Administration of Workstations    For example  if Daily scan is enabled and critical scan via the Agent Scanner is omitted  only  Daily scan will be executed and omitted critical task will not be done     2  On the Action tab  in the Action drop down list  select the type of the task and specify task    parameters which are needed to perform the task     Write to log file    Run program    Dr Web Scanner     scan    Dr Web Scanner     scan    Dr Web Scanner     scan    Table 6 3  Tasks types and parameters    String   the text of the message to be added to the log file   Specify the following settings       The Path field     full name  with the path  of the executable file to be  launched       The Arguments field     line parameters for the program to be run         Set the Execute synchronously flag to wa
219. mary group for the Station1  To determine which settings to inherit for the  Station1  the search is carried out in the following order  Stationl     Group4     Group3  gt        Group2     Groupl     Everyone     By default the network structure is displayed in such a way as to show a station in all the groups it is  included into  If you want workstations to be displayed in the network catalog in their primary groups    only  on the toolbar in cS Settings of tree view  clear the All groups membership flag   Setting a Primary Group    There are several ways how to set a new primary group for a workstation or a group of workstations     To set primary group for station  1  In the main menu  select Anti virus network  then click the name of a workstation in the  hierarchical list     2  The station properties panel opens  Also  you can open the stations properties section by selecting  Properties in the contro  menu  In the opened window  go the Groups section    3  If you want to reassign the other primary group  click an icon of necessary group in the  Membership list  The 1 sign displays on the icon     4  Click Save     To set primary group for several stations    1  In the main menu  select Anti virus network  In the hierarchical list of the opened window  click  the name of workstations  you can select groups of workstations either  in such case  the action  spreads on all stations in the group  for which you want to set a primary group  To select several  workstations a
220. me of a  station or group in the hierarchical list  Select Update restrictions in the contro  menu     In the Update restriction drop down list  select the limitation mode   e No restrictions   do not restrict distribution of updates on stations     e Forbid all updates   forbid distribution of all updates on stations during time slots that are  specified in the Stations update timetable table below    e Update only bases   forbid distribution of updates only for program modules during time slots  that are specified in the Stations update timetable table below  Virus bases updates will be  performed with no changes in a normal mode    Set the Limit updates traffic flag to limit the network traffic amount during transmitting of   updates between Server and Agents  In the Maximal transmission speed  KB s  field  specify   the value of maximal speed for updates transmission     For more details see Update Traffic Limitations        Set the Receive all the latest updates flag to transmit all components updates to the stations  not depending on the limitations that are specified in the Detailed Repository Configuration section        If the flag is cleared  station receives only those updates which are marked as current updates for  distribution     In the Stations update timetable table  the update mode is specified using the following colors   m green   update is enabled     188    Ta     i    ax       Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Compone
221. menu  in the opened window in the hierarchical  list select deleted station or several stations you want to restore     84    y    aX       AN    Chapter 6  Administration of Workstations    wy All deleted stations are located in the Deleted subgroup of the Status group     On the toolbar  select    General     k3 Restore deleted stations   The section for station restoring will be opened  You can specify the following station parameters   which will be set during restoring       Primary group   select the primary group  in which the station will be added  By default the  primary group which was set before station deletion is selected     w If you restore several stations simultaneously  the Former primary group is selected by default  It    means that for each selected station its own primary group  in which station was resides before  deletion  will be specified  If the definite group is selected  for all restoring stations the same    specified group will be set     e In the Membership section  you can change the list of groups in which the station will be  included  By default  the list of groups in which the station has been included before deletion is  set  To include the station in a user groups  set the flags for this groups     To restore the station with specified parameters  click Restore     6 1 3  Merging Stations    As a result of operations with the database or reinstallation of the software on anti virus workstations   several stations with the same name may a
222. meters as default  After that  when you use the Network scanner  this  parameters will be set automatically     42    Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface   43    Time Interval    In this section  you can specify settings of time interval to display statistics data  see Viewing  Workstation Statistics section            In the Default interval for viewing statistics data drop down list  specify the time interval  which  is set as default for all sections of statistics data     When you open the page for the first time  statistics will be displayed for this time interval  You can  change the time interval at statistics pages directly  if necessary     e Set the Save last interval for statistics data flag  to save the interval  specified last time at  statistics sections     If the flag is set  when you open the page for the first time  statistics will be displayed for the last  period  specified at the Web browser     If the flag is cleared  when you open the page for the first time  statistics will be displayed for the  period  specified in the Default interval for viewing statistics data drop down list     Authorization    Set the Automatic authorization flag to allow automatic authorization for all Contro  Centers with  the same administrator s login and password in the current browser     After setting this flag  login and password specified by administrator at next logon in the Control  Center  will be saved via the Dr We
223. mplemented as a database  In  small networks  not more than 200 300 computers  an embedded database can be used  In larger  networks it is recommended to use an external database     An embedded DB can be used  if at most 200 300 stations are connected to the Server  If the  hardware configuration of the computer with Dr Web Server and the load level of other executing  tasks are permissible  up to 1000 stations can be connected     Otherwise  you must use an external DB     If you use an external DB and more than 10 000 stations are connected to the Server  it is  recommended to perform the following minimal requirements     e 3 GHz processor CPU     RAM at least 4 Gb for Dr  Web Server and at least 8 Gb for the DB server   e UNIX system based OS     The following information is collected and stored in the general log file     e versions of the anti virus packages on protected computers     time and date of the software installation and update on workstations   e versions and dates of virus databases updates     Ta  J  1    aX       Chapter 2  Components of an Anti Virus Network and Their Interface       OS versions of protected computers  processor type  OS system catalogs location  etc       configuration and settings of anti virus packages        data on virus events  including names of detected viruses  detection dates  actions  results of curing   etc     Dr Web Server notifies the administrator on virus events occurring on protected computers by e mail  or through the 
224. multi server configuration according to a specified  synchronization policy     c  from Dr Web Server to workstations     The repository allows to set up the following parameters     e the list of product update sites in a  operations        restrictions to the number of products requiring synchronization of a  type  thus  a user is enabled to  track only necessary changes of certain files or categories of files         restrictions to product components requiring synchronization of c  type  a user can choose what  should be installed on the workstation         control of switching to new revisions  independent testing of products before installation is possible    e adding one s own components to products      independent creation of new products which will be synchronized too     The Server repository deals with the following products       Dr Web Server     Dr Web Agent  the Agent software  the anti virus software for workstations under corresponding  operation systems        Dr Web Proxy server      Dr Web virus data bases      SpIDer Gate bases      Dr Web Anti spam bases   e Doctor Web company news     7 8 1  Repository State    To view the repository state or update anti virus network components  1  Select the Administration item in the main menu of the Control Center and click Repository  state in the control menu of the opened window     2  In the open window  you can view the list of products in the repository  date of the used revision   date of the last downloaded
225. n     Ta  yan    A    A        Chapter 6  Administration of Workstations    6 6  Viewing Workstation Statistics    Via the control menu of the Anti virus network section  you can view the following information     e Statistics   to view data on anti virus components functioning at the stations  stations and anti virus  components status  to view and save the reports  that contains all statistic data or selective statistic  tables     e Charts   to view charts with information on infections  detected at the stations   e Quarantine   remote access to the Quarantine contents at the station     6 6 1  Statistics    To view tables     1  Select the Anti virus network item in the main menu of the Control Center and in the opened  window  click the name of the station or group in the hierarchical list     2  In the opened contro  menu  select a necessary item in the Statistics section        The Statistics section of the menu contains the following items     e Summary statistics   view full statistics which is not divided into sessions     e Summary data   view and save the reports  that contains all statistic data or selective statistic tables   This menu item will not be displayed if all other menu items are hidden in the Statistic section       Threats   view information on virus events  list of infected objects  viruses  anti virus actions  etc        Errors   view a list of scanning errors on a selected workstation for a certain period    e Scan statistics   view statistics on 
226. n  you can find the list of object keys and settings of installing  components that are currently actual for the object     e In the Assigned key column  you can find the key and settings of installing components that are  specified in the key which you want to assign to the selected objects     2  If necessary  set the Show only different flag to show in the list only those components settings  of which in the current and assigned keys are differ     3  To configure the list on installed components     Ta     1       ax       Chapter 2  Components of an Anti Virus Network and Their Interface   53    a  In the Assigned key column  you can configure the result list of installing components     e Installing components settings in the Assigned key column  are calculated on the basis of that if  use the component in the current settings and in the new key is allowed     or not allowed      as    follows               SF    e You can change installing components settings  downgrade rights to install  only if settings  calculated in the Assigned key  allow to use this component     b Set the flags for those objects  stations and groups  for which settings inheritance will be  terminated and installing components settings from the Assigned key column are set as a  personal  For other objects  for which flags are not set   initial settings from the Assigned key  column are inherited     Settings for Adding a License Key to the Keys List    In this section you can find description of 
227. n not be changed     3  Specify the group name in the Name field     For nested groups  in the Parent group field  select from the drop down list a parental group to  inherit configuration from it if personal settings are not specified  For a root group  without a  parent   leave this field blank to add the group to the root of the hierarchical tree  In this case    settings are inherited from the Everyone group   5  Specify optional comment in the Description field Click Save     The groups you create are initially empty  Procedure of including workstations to groups is described in    the Including Workstations into User Groups section     Deleting Groups    To delete existing group   1  Select the user group in the hierarchical list of the Control Center     2  Click    General       Remove selected objects on the toolbar     Chapter 5  Groups  Integrated Workstations Management                75    A  AN    T   v    A    A        Chapter 5  Groups  Integrated Workstations Management   76    wy You cannot delete preinstalled groups     5 2 2  Editing Groups    To edit group properties    1  Select the Anti virus network item in the main menu of Dr Web Security Control Center  then  select the group in the hierarchical list of the opened window    2  Open the group properties section by one of the following ways     a  Click the name of the group in the hierarchical list of anti virus network  A panel with properties  of the group will be automatically opened in the right p
228. n the anti virus  network components to reduced network traffic to minimum     Traffic encryption    Data transferred between the anti virus network components can be encrypted to provide  additional secure level     Additional Features    NAP Validator    NAP Validator is provided as a separate component and allows to use Microsoft Network  Access Protection  NAP  technology to check health of protected stations software  The  resulting security is achieved through the implementation of the requirements for performance  of network stations     Repository loader    Dr Web Repository loader is provided as a separate utility and allows to download products  of Dr Web Enterprise Security Suite from the Global Update System  It can be used for  downloading of Dr Web Enterprise Security Suite products updates to place them on the  Server not connected to the Internet     1 4  System Requirements    For Dr Web Enterprise Security Suite to be installed and function the following is  required       Dr Web Server should be installed on a computer that have an access to the Internet to receive  updates from Dr Web GUS  Global Update System  automatically     It is allowed to propagate updates by any other way to the Servers which are not connected to the  Internet  Particularly  in multiserver configuration of anti virus network  it is possible to receive  updates from the GUS by only one Server with subsequent distribution to other Servers  or to use  Dr Web Repository Loader addition
229. n to be applied upon removal of the frozen status  the revision  becomes unfrozen when the time is out and is included to the list of revisions distributed to stations  according to the general procedure        7 8 3  General Repository Configuration    In the General repository configuration section  you can specify parameters for connection to GUS  and for updating repositories of all products     To edit repository configuration    1  Select the Administration item in the main menu of the Control Center    2  In the opened window  select the General repository configuration item in the control menu    3  Configure all necessary parameters for updating from the GUS as described below    4  If during parameters editing you need to discard all changes  use the following buttons on the  toolbar     al Reset all parameters to initial values   rerestore the values that all parameters in this  section had before current editing  To apply the similar action to a certain parameter value  use the  button next to each parameter       Reset all parameters to default values   restore all parameters from this section to their  defaults  specified in the Server configuration file  To apply the similar action to a certain parameter  value  use the    button next to this parameter     160    A  AN    T   v    A    A        Chapter 7  Configuring Dr Web Server    5  Click one of the following buttons on the toolbar     e Save and resynchronize   save all changes and update the repository fr
230. nd groups  press and hold CTRL or SHIFT during mouse selection     2  On the toolbar  click    General     Set a primary group for stations  This opens the  window listing the groups which can be set as primary for the selected workstations   3  Click the name of a group to set it as primary     You can also make a group primary for all workstations included into it  To do this  select the necessary  group in the hierarchical list  and click    General     M Set this group as primary on the toolbar     81    Ta     AN    A          Chapter 5  Groups  Integrated Workstations Management   82    5 4 2  Propagation of Settings to Other Groups Stations    Configuration settings of anti virus programs  schedules and user permissions and other settings of a  group or a workstation can be copied  propagated  to other group or several groups and workstations   To propagate settings   1  Click Propagate these settings to another object in the one of the following locations      4  in the editor of anti virus component configuration         in the schedule editor      S in the update restrictions window         in the installing components window      iN in the window for stations user permissions setup    A window of the anti virus network hierarchical list will be opened     2  Select necessary groups and stations to which you want to propagate the settings   3  To enable changes in the configuration of these groups  click Save     5 5  Comparison of Stations and Groups    You can com
231. nent policies  To classify workstations  as compliant only when all health policy requirements are met  select Client passed all SHV  checks in the drop down list       NAP DHCP Noncompiliant  n the settings windows  set the Dr Web System Health Validator  flag which prescribes to use Dr  Web NAP Validator component policies  To classify workstations  as noncompliant if any of the health policy requirements are not met  select Client failed one or  more SHV checks in the drop down list     196    Ta  J  i    ax       A    accounts 66  Administrators  permissions 66    Agent  functions 29  interface 29  mobile mode 189  settings 100  updating 189  alerts  settings 153    anti virus network 171  components 54  setting connections 173  structure 54 171  updating 177  virus events 177   anti virus Scaner 106   anti virus scanning 106   anti virus Server  interface 25 27  log 24  logging 125  schedule 141  setting connections 173    settings 127  start 26 29  tasks 24    types of connections 171  approving stations 83  authorization  Control Center 43  automatic authorization 43    C    components  anti virus network 54  synchronization 183  connections  between the Servers  setting 173  types 171  Control Center  description 30  hierarchical list 35  main menu 31    197    Index    property pane 39    toolbar 36  creating  groups 75    D    demo key files 23  distribution kit 21  Dr Web Server  start 29  Dr Web Agent  functions 29  interface 29  mobile mode 189  settings 100  upd
232. neral configuration files of anti virus network components       Installer     program to install the Anti virus on a protected computer and the public encryption  key file  drwcsd  pub         update db     scripts necessary to update the structure of Server DB    var     contains the following subfolders   e es dl cache     customers    personal installation packages during two weeks after their creation   e backup     backups of DB and other critical data   e extensions     scripts of user hooks meant to automate the performance of certain tasks     e repository     repository folder to store actual updates of virus bases  anti virus packages files  and anti virus network components  It contains subfolders for the program components software  which include subfolders for their versions depending on the OS  The folder should be accessible  for writing to the user under which the Server is launched  the LocalSystem as a rule      e templates    a set of reports templates     25    Ta  2   1       ax       Chapter 2  Components of an Anti Virus Network and Their Interface   26       webmin     Dr Web Security Control Center elements  documents  icons  modules     The content of the updates catalog  var repository is automatically downloaded from the  updates server through HTTP HTTPS protocol according to the Server schedule  or the anti virus  network administrator can manually place the updates to the catalog     General Configuration Files    agent   key  name may vary   c
233. ng neighbor Servers  connection     In the Encryption and Compression drop down lists  specify parameters of traffic encryption  and compression between connecting Servers  see p  Traffic Encryption and Compression      Validity period of donated licenses   the setting is not used in creating a child Server   Period for accepted licenses renewal   period till the license expiration  starting from which  the child Server initiates renewal of the license which is accepted from the current Server  The  setting is used if the child Server accepts licenses from the current Server   License synchronization period   interval for synchronizing information about donating  licenses between Servers   Flags in Updates and Events sections are set according to parent child type of connection and  can not be changed    o child Server receives updates from main Server    o child Server send information about events to main Server   In the Update restrictions  gt  Updates section  you can configure the schedule of updates  transmission from the current Server to the child one  updates transmission mode can be edited  as updates mode in the Update Restrictions for Workstations section               Click Save     175    Ta     ww    ax        Chapter 7  Configuring Dr Web Server   176    As a result  the child Server  AUXILIARY  will be included to the Children and Offline folders  see    Figure 7 3         ig Dr Web Server  4 Offline  1   fg AUXILIARY   gt  fig Online  0    gt   iy Parents  0
234. nguage drop down list  specify the language for the Agent and Dr Web Anti virus  components interface at the station or group of stations        Set the Enable Microsoft Network Access Protection flag to enable station state monitoring  using Microsoft   Network Access Protection  NAT  technology  This enables the System Health  Agent  SHA  which is automatically installed in a workstation with Dr Web Agent software   for  more details see p  NAP Validator         Set the Allow quarantine remote control flag to enable remote control of workstations  Quarantine from the Server     wy The Allow quarantine remote control option is available if in the Administration     Dr Web  Server configuration     Statistics tab  the Quarantine state flag is set     e Set the Collect information about stations flag to enable collecting information about software  and hardware at the stations  When the flag is set  in the Period of collecting information about  stations  min   drop down list select period in minutes of sending actual information on hardware and  software from station by Agent to the Server      Set the Synchronize time flag to enable system time synchronization on the Agent computer with  the time on the computer with Dr Web Server installed      Set the Block changing of system date and time flag to prevent manual and automatic change of  system time settings except time synchronization with Dr Web Server  is set by the Synchronize  time flag        Set the Block user activi
235. ns        Ei Export settings from this section to the file   export schedule to the file of special format     Ki Import settings to this section from the file   import schedule from the file of special   format    b  To manage existing tasks  set the flags for the necessary tasks or in the table header to select all  task from the list  The elements on the toolbar to manage selected tasks become available     Table 6 2  Toolbar elements for managing selected tasks    Status Enable Activate execution of selected tasks according to their schedule  if they were  execution disabled   Disable Disable execution of selected tasks  Tasks remain on the list but will not be  execution executed     wy The same action you can perform from the task editor on the General tab by setting the Enable  execution flag     Severity Make critical Perform extra launch of the task at next Dr Web Agent launch  if scheduled  execution of this task has been omitted   Make not Execute the task only at scheduled time regardless of whether a task launch  critical has been omitted or not     wy The same action you can perform from the task editor on the General tab by setting the Critical  task flag     ER  Duplicate settings Duplicate tasks that are selected in the list of current schedule  When you run  the Duplicate settings option  new tasks are created with settings similarly  to the selected tasks     93    Ta     1       aX       Chapter 6  Administration of Workstations   94    RA Schedule repeate
236. ns are working at the  moment  These groups are not virtual  may have station settings and be primary groups     e Android family groups  This family includes a set of groups  that correspond to specific version of  Android OS for mobile devices     e Mac OS X family groups  This family includes a set of groups  that correspond to specific version of  OS X operating system     e Netware group  This group contains stations  that operate under Novell NetWare OS     Ta  J  1       ys       Chapter 5  Groups  Integrated Workstations Management    e UNIX family groups  This family includes a set of groups  that correspond to OS of UNIX system   based systems  for example  Linux  FreeBSD  Solaris  etc       Windows family groups  This family includes a set of groups  that correspond to specific version of  Windows operating system     Status    The Status group contains subgroups reflect the current status of the station  that is if it is connected   to the Server or not at the moment  These groups are completely virtual  may not have any settings or   be primary groups      Deinstalled group  Once Dr Web Agent software has been deinstalled from a station  the station is  transferred to the Deinstalled group     e Deleted group  Contains stations  which were deleted by an administrator from the Server  Such  stations can be restored  see p  Removing and Restoring Stations      e New group  Contains new stations  which have been created by administrator via Dr  Web Security  Control
237. ns become available         Delete notifications   delete all selected notifications without possibility of restore   R Mark notifications as read   mark all selected notifications as read     c  Set the LJ Store message without automatic deletion icon in the notifications list next to  those notifications that should not be deleted after expiration of storage period  storage period is  set before sending notification in the Notifications Configuration section in the Web console  sending method settings   Such notifications are stored until you delete them manually in the  Web console notifications section or clear the Mi icon next to these notifications     7 7 3  Unsent Notifications    Via the Control Center you can track and manage administrative notifications failed to be sent  according to the settings of the Notification Configuration section        157    Ta  J  1       ys       Chapter 7  Configuring Dr Web Server    To view and manage unsent notifications     1  Select the Administration item in the main menu of the Control Center  In the opened window   select Unsent Notifications in the control menu  The list of unsent notifications of this Server will  be opened     2  To the unsent notifications list whose notifications are placed that was failed to be sent to the  recipients  but number of resend attempts which is specified in this notification settings is not yet  expired    3  The table of unsent notifications contains the following information    e Notificat
238. ns is calculated as follows  the common limitation of  data transferring rate  after subtraction of limitations in the a  item  is equally distributed among  other workstations    c  If the bandwidth of a channel between Server and a station  for which no personal limit is  specified  is less than the average rate obtained in the b  item  the traffic for this station is  limited to the maximum bandwidth of this channel  The rest rate similarly to the b  item is  equally distributed among other stations  for which no personal limitations are specified     7 2 2  DNS    On the DNS tab  you can configure the following parameters of DNS server usage       DNS queries timeout  sec       timeout in seconds for resolving DNS direct reverse queries  Set the  0 value to disable restriction on wait time until the end of the resolution     131    Ta     AN    ys       Chapter 7  Configuring Dr Web Server    e Number of retried DNS queries     maximum number of repeated DNS queries on fail while  resolving the DNS query       Set the Set the time to store DNS server responses flag to specify time for storing responses  from DNS server in the cache  TTL      o For positive responses  min       the storage time in the cache  TTL  of positive responses from  the DNS server in minutes     o For negative responses  min       the storage time in the cache  TTL  of negative responses  from the DNS server in minutes       DNS servers   List of DNS servers  which replaces default system list     
239. nstallation in HTML format       Administrator manual     opens administrator documentation in HTML format     Appendices   opens appendices of administrator manual in HTML format     e Web API Manual      opens administrator documentation on XML Web API  see also the  Appendices document  p  Appendix L  Integration of Web API and Dr Web Enterprise Security  Suite  in HTML format     e Release notes   opens release notes for Dr Web Enterprise Security Suite of installed  version     User Documentation     opens user documentation for corresponding operating system in HTML  format from the list     44    Ta  yan    A    A        Chapter 2  Components of an Anti Virus Network and Their Interface    2 4  Dr Web Security Control Center Components    2 4 1  Network Scanner    Dr Web Server contains the Network Scanner component       It is not recommended to launch the Network Scanner under Windows 2000 and earlier operating  systems due to possible insufficiencies of network review     The functioning of the Network Scanner is guarantied under UNIX system based operating  systems and Windows XP or later     The Network scanner requires Dr Web Security Control Center Extension     For correct functioning of the Network Scanner under Windows Internet Explorer browser  you  must add Dr Web Security Control Center address into which the Network Scanner is  launched  to the list of trusted sites in the web browser settings  Tools     Internet Options        Security     Trusted Sites 
240. nts    m red   update is disabled   The restrictions are set separately for each 15 minutes of each day of the week     00 00  00 30  01 00  01 30  02 00  02 30  03 00  03 30  04 00  04 30  05 00  06 00  06 30  07 00  07 30  08 00  08 30  09 00  09 30  20 30  21 00  21 30  22 00  22 30  23 00  23 30    05 30       To change the update mode  click the corresponding block of the table     e To change the update mode for a row  full day   click the corresponding color in the right part of  the table row     e To change the update mode for a column  a particular 15 minutes interval of each day of the  week   click the corresponding color under the table column     6  After editing  click Save to accept changes     In the toolbar  the following options are available      amp  Reset all parameters to initial values   restore the values that all parameters in this section had  before current editing  last saved values       amp  Reset all parameters to default values   restore default values of all parameters in this section      e Propagate these settings to another object   copy settings from this section to settings of  other station  group or several groups and workstations     F Set inheritance of settings from primary group   remove personal settings of a station and set  inheritance of settings in this section from a primary group     s Copy settings from primary group and set them as a personal   copy settings of this section  from a primary group and set them for selected s
241. o  lt service gt  tag in  the configuration file   the drwcs name is used    by default   Control flag is Pa Mendaeony  les  ino Parameter defines whether the control flag  mandatory flag 2 identifying a user as an administrator is  mandatory     By default is yes     65    Ta  yan    A     A        Chapter 4  Anti Virus Network Administrators        lt admin  name    Control flag flag gt     name field    Key string according to which PAM modules read  the flag     By default is Drweb_ESuite_Admin   When configuring operating of PAM authentication modules  use parameters which are set at Dr Web    Enterprise Security Suite side  and consider default values which are used if parameters are not  specified     4 2  Administrators and Administrative groups    To open administrative accounts control section  select Administration in the main menu of the  Control Center and then in the opened window select the Administrators item of the control menu       The Administrators section is available for all Contro  Center administrators  Full hierarchical tree    of administrators is available only for Administrators group members who have the View  properties and configuration of administrative groups permission  The rest of administrators  will only see their respective groups with subgroups and accounts     Hierarchy of Administrators    Hierarchical view of administrators is a tree which represents a structure of administrative groups and  administrators accounts  Administrative gr
242. o each of Dr Web Servers give    meaningful    names  as it will help prevent mistakes while  connecting and administering Dr Web Servers  You can change the names through Dr Web  Security Control Center menu  Administration     Dr Web Server configuration on the  General tab in the Name field  In this example we name the parent Server MAIN  and the child  Server   AUXILIARY    3  On both Dr Web Servers  enable the server protocol  To do this  on Dr Web Security Control  Center Administration menu  select Dr Web Server configuration  On the Modules tab  set  the Dr Web Server protocol flag  see p  Modules      wy If the server protocol is disabled  the message about enabling this protocol will be shown and the link    to the corresponding section of Dr Web Security Control Center will be given during creation of  new connection     Restart both Dr Web Servers     5  Via Dr Web Security Control Center of the child Server  AUXILIARY   add the parent Server   MAIN  to the list of neighbor Servers  To do this  select Neighborhood item in the main menu   A window with the hierarchical list of the anti virus network Servers  neighboring  with the given    Server will be opened  To add a Server to the list  click the fo Create neighbor on the toolbar     A window to describe the connection between the current and the new Server will be opened     Specify the following parameters     173    Ta  J  i    ax       Chapter 7  Configuring Dr Web Server    e Type of creating neighbor is Pa
243. o edit permissions for stations under Windows  OS X  Linux and Android operating systems  use   the following tabs      Components   change permissions for components management  By default  a user is authorized  to launch each component  but prohibited to edit components configuration or stop the operation  of components       General   to change permissions for Dr Web Agent and its functions management     Table 6 1  Setting stations permissions on the General tab    Change the run  mode    Change Dr Web  Agent  configuration    Run  mode    In the Agent settings  in the Main  gt  Mode section   the Use Mobile mode when there is no  connection with the server option is not  available     in mobile Set the flag to allow users at the  station to switch to mobile mode  and use Dr Web Global Update  System for updating  if there is no  connection with Dr Web Server     In the Agent settings  in the Main  gt  Mode section   the following options are not available     Set the flag to allow users at the  station to change the Agent run  moce e Accept updates from the server   e Accept jobs from the server    e Accumulate events     In the Agent settings  in the Main section  the  settings of the following options are not available     Set the flag to allow users at the  station to change Dr Web Agent  settings  Noti A    e Notifications  all settings are not available   e Mode  the Server connection settings and the  Synchronize system time with the server  time flag are not avail
244. ocument  in the Appendix J  Regular  Expressions Used in Dr Web Enterprise Security Suite section           Please note  for the starts with and ends with filter parameters  the condition string is  automatically complemented with the following escape characters correspondingly     string starts  with the specified symbols  or    string ends with the specified symbols      For fully usage of regular expressions  it is recommended to select the contains filter parameter     To save and apply the specified rules  click one of the following buttons     e Apply now   save the specified membership rules and apply these rules immediately to all  stations registered on this Server  If a lot of stations are registered on the Server  execution of  this action may take some time  Rules of stations regrouping are applied to all already registered  stations immediately after the action is set and will be applied further to all stations  including the  firstly registered on the Server  at the moment of their connection    e Apply on stations connect   save the specified membership rules and apply these rules to  stations in the moment of their connection to the Server  Rules of stations regrouping are applied  to all already registered stations at the moment of their next connection to the Server and will be  applied to all stations firstly registered on the Server at the moment of their first connection    When automatic membership rules are specified for a user group  next to the icon o
245. of     e Network problems     Wrong address of the parent Server was set during connection setup   e Wrong drwcsd pub encryption public keys at one of connecting Servers     e Wrong access password at one of connecting Servers  passwords on connecting Servers do not  match      7 10 3  Using an Anti Virus Network with Several Dr Web Servers    The peculiarity of a multi server network is that updates from Dr Web GUS servers can be received by  a part of Dr Web Servers  as a rule  one or several parent Servers  and update tasks should be  scheduled on these Servers only  for information on how to set Servers schedule  read p  Setting  Dr Web Server Schedule   Any Server which has received updates from Dr Web GUS servers or some  other Servers distributes them immediately to all connected child Servers and those peer Servers for  which this option is enabled     Dr Web Enterprise Security Suite anti virus automatically monitors the situations when due to an  imperfect structure of the network or incorrect Server configuration an update already received is  sent again to the same Server  and cancels the updating     The administrator can receive consolidated data about important events on the anti virus stations linked  to any Server via intersever connections     To view information on virus events on all Dr Web Servers linked to the current Dr Web  Server   1  Select Neighborhood item in the main menu of Dr Web Security Control Center     2  In the opened window in the Tables 
246. om GUS according to  the new settings     e Save and reload from disk   save all changes without updating the repository from GUS  At  that  the current version of the repository is reloaded from the disk  see also Repository state      Configuring Dr Web GUS    On the Dr Web GUS tab  you can configure parameters for connection to Dr Web Global Update  System     To edit GUS connection settings  use the following options      In the Base URI field  specify the GUS servers folder where updates of Dr Web products are  located      Set the Use CDN flag to allow receiving updates from GUS via Content Delivery Network      Set the Use SSL flag to update repository from GUS via protected SSL connection     At this  in the Allowed certificates list  select SSL certificates that will be automatically accepted       If necessary  edit the list of GUS servers from which the repository is updated  in the Dr Web  Global Update System Servers List section     e To add a GUS server to the list of servers used for updates  click   and specify the address of  the GUS server in the appeared field     e To remove a GUS server from the list of used  click     next to the server which you want to  delete   e GUS servers are listed in the order Dr Web Server contacts them when updating the repository     To change the order of GUS servers  move a server as necessary by dragging the left root line of  the server     After installation of Dr Web Server  the list contains only update servers of the 
247. on either separate components or entire Anti virus on stations under Windows  OS  configuring parameters of anti virus package components  assigning permissions to set  up and administer the anti virus packages on protected computers for users of these  computers  detailed information see in the Chapter 6  Administration of Workstations  section     Centralized administering of workstations anti virus check including  remote launch of anti   virus check either according the specified schedule or direct request from administrator for  the Control Center  centralized configuration of check parameters and transmitting them  to the workstations to launch the local check with these parameters  detailed information  see in the Anti Virus Scanning of Stations section      Receiving the statistic information on protected stations states  viral statistics  installed anti   virus software state  running anti virus components state and also  the list of hardware and  software on protected station  detailed information see in the Viewing Workstation Statistics  section     Flexible administrating system of Server and anti virus network based on opportunity of  permissions delimiting for different administrators and also  possibility to connect  administrators via the external authorization systems such as Active Directory  LDAP   RADIUS  PAM  detailed information see in the Chapter 4  Anti Virus Network Administrators  section     Managing the licensing of workstations anti virus protect
248. on has not been connected for a long time item     In the Days field specify a time period after which the station will be considered as not  connected for a long time     The task is designed to synchronize network structures  Active Directory containers  which contains computers become groups of anti virus network to which workstations  are placed     No additional parameters required to run the task     The task is disabled by default  To activate the task execution  set the  Enable execution option in the task settings or on the toolbar as  described above     The information on this task can be found in the Scheduled Updates section        The task is designed to turn on stations  for example before running the scanning task   The following task parameters define which stations will be turned on     e Wake all stations   every station which is connected to the Server will be turned  on     e Wake stations by specified parameters   only stations that accord to the  parameters below will be turned on     o IP addresses   the list of IP addresses of the stations that will be turned on   The list is specified in the following format  10 3 0 127  10 4 0 1 10 4 0 5   10 5 0 1 30  Use comma or newline to separate several addresses  You can also  use DNS names of the stations instead of their IP addresses     o MAC addresses   the list of MAC addresses of the stations that will be turned  on  The MAC address octets have to be separated by the     sign  Use comma or  newline to s
249. on in the main menu of the Control Center   Select Authentication in the control menu    In the opened window  select LDAP authentication section    Set the Use LDAP authentication flag    Click Save    Restart the Server to apply changes     Orr eed IE    You can configure authentication using LDAP protocol at any LDAP server  Also you can use this  mechanism to configure the Server under UNIX system based OS for authentication in Active Directory  on a domain controller     wy Settings of LDAP authentication are stored in the auth 1dap xm1 configuration file   General xml attributes are described in the Appendices document  in the Appendix C2 section     Unlike to Active Directory  this mechanism can be configures to any LDAP scheme  By default Server  attributes are used as they were defined for Active Directory     LDAP authentication process can be presented as the following     1  LDAP server address is specified via the Contro  Center or xml configuration file     2  For the specified user name  the following actions are performed        Translation of name to the DN  Distinguished Name  using DOS like masks  with   symbol   if  rules are specified       Translation of name to the DN using regular expressions  if rules are specified     Custom script for translation of name to the DN is used  if it is specified in settings     If matches in translation rules are not found  specified name is used as it is     63    Ta  J  1       aX       Chapter 4  Anti Virus Network A
250. on the Modules  tab  set the Dr Web Server FrontDoor extension flag     For connection of the Server remote diagnostics utility  administrator that connects via the utility   must have the Use additional features permission  Otherwise  access to the Server via the  remote diagnostics utility will be forbidden     To configure parameters for Server remote diagnostics utility     1     Select the Administrating item in the main menu of the Control Center  in the opened window    select Dr Web Server remote access in the control menu    Specify the following parameters    e SSL certificate     SSL certificate file which will be verified on connection  The drop down list  contains available certificates from the Server folder    e SSL private key     SSL private key file which will be verified on connection  The drop down list  contains available private keys from the Server folder    e Address   address from which the Server remote diagnostics utility can be connected    e Port     port to connect the Server remote diagnostics utility  The 10101 port is used by default     Click Save     wy You can view the usage description of the console version of the Server remote diagnostics utility in  the Appendices document  p  H9  Dr Web Server Remote Diagnostics Utility        7 4  Setting Dr Web Server Schedule    To edit Dr Web Server schedule  perform the following actions   1  Select the Administrating item in the main menu of the Control Center  in the opened window     select Dr 
251. onents     e Major notifications   receive only important notifications  Such notifications include messages about   e the launching errors of the anti virus software or some of the components     102    Ta  J  i    ax       Chapter 6  Administration of Workstations   103    e the updating errors of the anti virus software or some of the components  is displayed right after  error of update procedure     e the necessity to restart a computer after updating  is displayed right after update procedure   e necessity of message with reboot requirement to finish components installation       Minor notifications   receive only minor notifications  Such notifications include messages about  e the starting of remote scanning   e the stoping of remote scanning   e the beginning of updating of the anti virus software or some of the components   e the end of successful updating of the anti virus software or some of the components     If you want messages of all groups to be sent  set all the four flags  Ohterwise only message of the  specified groups will be displayed     Users can configure all notifications except Critical notifications  which are configured by  administrators only     Events receiving can be set via the Control Center only till the first changing of these settings at the  user side  After setting personal settings at the user side  events receiving can be configured via the  Agent context menu only     In the Additional subsection  you can specify the following settin
252. onents instructs to reset the error state and update only those  components that failed at the previous update          Update all components instructs to force the update of all components  including those  updated successfully     wy After forced update of all components  reboot of a station is required  Follow the Agent  instructions     8 3  Scheduled Updates    You can make a schedule on a certain Dr Web Server to regularly check for software updates and  synchronize products in the repository with new versions on another Dr Web Server or the GUS  server     For more details on the schedule  see p  Setting Dr Web Server Schedule     To schedule product updates on Dr Web Server     1     an PWN    Select the Administration item in the main menu and click Dr Web Server Task Scheduler in  the control menu  The list with the current tasks of the Server will be opened    To add a task  click cj New task in the toolbar    In the opened window assign a name to the task in the Name field    Go to the Action tab and select the Update action in the drop down list    In the opened list  set the flag next to those components which will be updated by this task     Go to the Time tab and in the Time drop down list  set the time span of running the task and  specify time according to the time span selected     Click Save to accept the changes     183    Ta  J  1    ax        Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Components   184    8 4  Updating the Repo
253. ons from the database     You have to specify the time period  90 days by default  after which all stations that  did not have at least one connection to the Server are considered old and are purged  from the Server     The task is designed for purging the following messages from the database   e agent notifications    e notifications for the web console    e reports created according to the schedule        144    Ta     1       ax       Purge unsent events    Replace encryption  key    Restart Dr Web  Server    Run program    Send message to  station    Chapter 7  Configuring Dr Web Server    This also purges messages marked as obsolete  i e  with expired retention period which  can be configured     e for notifications  for appropriate sending method while creating a notification  see  Notification Configuration         e for reports  in a task for creating reports    No additional parameters required to run the task    The task is designed to purge unsent events from the database    You have to set the period for storing unsent events after which they will be purged     This refers to events that a subordinate Server sends to a master Server  If sending  a message fails  it is moved to the unsent messages list  A subordinate Server  continues its attempts to send the message at the specified interval  When the Purge  unsent events task is run  events will be purged if their storage time has reached and  exceeded specified period     The task is designed for periodic replac
254. ontrol  Controls access to network and local resources  in particular  limits access to web sites  Allows  to control the integrity of important files from the accidental change or virus infecting and limit  the access to unwanted information for employees    Firewall  Protects computers from external unauthorized access and prevents leak of vital data via    Internet  Monitors connection attempts and data transfer via the Internet and blocks  suspicious connections both on network and application levels     Quarantine  Isolates malware and suspicious objects in the specific folder    Self protection  Protects files and folders of Dr Web Enterprise Security Suite from unauthorized or  accidental removal and modification by user or malicious software  If self protection is    enabled  access to files and folders of Dr Web Enterprise Security Suite is granted to  Dr Web processes only     Preventive protection  settings are provided into Dr Web Agent settings     Prevents of potential security threats  Controls the access to the operating system critical  objects  controls drivers loading  programs autorun and system services operation and also  monitors running processes and blocking them in case of detection of viral activity     Stations under UNIX   system based OS    Dr Web Scanner  Dr Web Agent Scanner    Scans a computer on user demand and according to the schedule  Also the remote launch of  anti virus scan of stations from the Control Center is supported   SplDer Guard
255. or  which  may occasionally corrupt it     Dr Web Enterprise Security Suite license parameters and price depend on the number of protected  computers  which includes the servers protected by Dr  Web Enterprise Security Suite network     Before purchasing a license for a Dr Web Enterprise Security Suite solution you should carefully  consider this information and discuss all the details with your local distributor  The number of Dr  Web  Servers running the network does not affect the license price     Licensing specific and key files management for already deployed anti virus network are described in  details in p  License Manager     When purchasing a license for Dr  Web Enterprise Security Suite anti virus  you receive registration  keys or a registration card with a serial number     License key files are generally sent to users by e mail  after the product serial number has been  registered at the special web site  http   buy drweb com register  unless otherwise specified in the  registration card attached to the product  Visit the web site above  in the form enter your personal data  and in the corresponding field type the registration serial number  it is written on the registration card    An archive with key files will be sent to the designated address  Or you will be allowed to download it  directly from the web site     As a rule  key files come in a zip archive  which contains key files for the Server and for workstations     Ta  J  i    ax       Chapter 1  Welcome
256. or scheduled tasks to be performed  scanning  updating of virus databases  etc      e files of anti virus packages     when the Agent receives a task to install them      software and virus databases updates     when an updating task is performed    e Agent messages on the configuration of the workstation    e statistics  to be added to the centralized log  on the operation of Agents and anti virus packages   messages on virus events and other events which should be logged     The volume of traffic between the workstations and the Server can be quite sizeable subject to the  settings and the number of the workstations  Therefore Dr Web Enterprise Security Suite provides  for the possibility to compress traffic  See the description of this optional mode in p  Traffic Encryption  and Compression below           Traffic between Dr Web Server and Dr Web Agent can be encrypted  This allows to avoid disclosure  of data transferred via the described channel as well as to avoid substitution of software downloaded  onto workstations  By default traffic encryption is enabled  for more  please read p  Traffic Encryption  and Compression         From the update web server to Dr Web Server  a thick continuous line in the Figure 2 3  files  necessary for replication of centralized catalogs of installation and updates as well as overhead  information on this process are sent via HTTP  The integrity of the information  Dr Web Enterprise  Security Suite files and anti virus packages  is provi
257. orks operated by Dr Web Enterprise Security Suite provide for centralized  configuring of anti virus packages on workstations and allows    e to set the configuration parameters of anti virus programs    e to schedule tasks on workstations    e launch scanning the computer independently of schedule settings      to update workstations  also after an updating error  in this case the error state will be reset     The administrator of the anti virus network can grant a user with the permissions to change the  configuration of the workstation and launch tasks  as well as restrict or prohibit such actions     The configuration of workstations can be modified even when they are temporarily disconnected from  the Server  These changes will be accepted by the workstations as soon as they are reconnected to  the Server     6 1  Management of Workstation Accounts  6 1 1  New Stations Approval Policy    wy Procedure of stations adding via the Control Center is described in the Installation manual  p   Creation of a New User Account        Possibility of managing authorization of stations at Dr Web Server depends on the following  parameters     1  If during the Agent installation  the Manual authorization on server flag is cleared  mode of  stations access to the Server is defined according to settings specified at the Server  used by  default   see below     2  If during the Agent installation  the Manual authorization on server flag is set and Identifier  and Password parameters are s
258. otification in the events list is marked with a color corresponding to the severity  of the events  same as the icon   When opening a section that responsible for the notification  functions  the notifications is considered as read and the stub changes color into gray     Table 2 2  The list of available notifications on events in anti virus network    Install Dr Web Security minor The page to download Installation of Dr Web Security   Control Center browser Dr Web Security Control Control Center extension required    extension Center extension   Unread news minor Unread news of Doctor Web company   a rap   are are available   New notifications minor Administration     Web New administrator notifications which    ree   console notifications are received via the Web console   Critical notifications major neiei ere avelkbe    Server updates are major Administration     Dr Web Server update is downloaded   available Dr Web Server into repository and available for  installation    Server configuration has major Administration     Settings of the Server configuration   been changed  Server Dr Web Server file has been changed after Server   restart required  configuration start  To take new settings  the Server  must be restarted    Web server configuration major Administration     Web Settings of the Web server    has been changed  Server  restart required     Server configuration    configuration file has been changed  after Server start  To take new  settings  the Server must be
259. oups and their members  administrators accounts  both can  be nodes of such tree  Each administrator can be a member of only one group  Nesting level of groups  in a tree is not limited     Predefined groups    After installing Dr Web Server two groups are automatically created        Administrators  The group initially contains only admin user with a full set of privileges  The  admin user is automatically created during Dr Web Server installation  see below      e Newbies  The group is initially empty  Administrators with external type of authentication  such as  LDAP  Active Directory or RADIUS  will be automatically moved to this group     Administrators of the Newbies group have read only access by default     Predefined administrators    After installing Dr Web Server the following administrative account is automatically created        Account name admin  Password Password is set during Dr Web Server installation  step 15 of installation procedure    Privileges Full set of privileges     Account editing Administrator privileges cannot be edited  Administrative account cannot be deleted     66    Ta  J  1       ys       Chapter 4  Anti Virus Network Administrators    Hierarchical Lists Displaying       In the hierarchical list of anti virus network  administrator sees only those user groups  which are  granted in the View groups of stations properties permission  All system groups are also  displayed in the anti virus network tree  but only stations from the specified us
260. oxy server under Linux system based OS after computer reboot  you  must edit system network configuration without Network manager     Starting and Stopping    To start and stop the Proxy server under Windows OS  open Control Panel     Administration  gt   Services  then double click drwcsd proxy and select a necessary action in the opened window     To start and stop the Proxy server under a UNIX based OS  use the start and stop commands with  scripts created during installation of the Proxy server  see the Installation Manual  p  Installing  Proxy Server      To start the Proxy server under both Windows OS and UNIX system based OS  you can run the  drwcsd proxy executable file with corresponding switches  see the Appendices document  p  H8     Proxy Server      9 2  NAP Validator    Overview    Microsoft   Network Access Protection  NAP  is a policy enforcement platform built into Windows OS  that allows you to better protect network assets by enforcing compliance with system health  requirements     With NAP  you can create customized health requirement policies to validate computer health in the  following cases      before allowing access or communication    e automatically update compliant computers to ensure ongoing compliance       optionally confine noncompliant computers to a restricted network until they become compliant     Detailed description of NAP technology is given on Microsoft company web site        NAP in Dr Web Enterprise Security Suite    Dr Web Enterpri
261. pare stations and groups by general parameters     To compare several objects of the anti virus network    1  In the main menu  select Anti virus network  then select the objects you want to compare in the  hierarchical list  Use CTRL and SHIFT for this  The following variants are possible   e selection of several stations   to compare selected stations   e selection of several groups   to compare selected groups and all nested groups     e selection of several stations and groups   to compare all stations  selected directly in the  hierarchical list and included in all groups and their nested groups     2  In the control menu  click Comparison   3  The comparison table for selected objects will be opened     Comparative parameters for groups     e Stations   total number of stations  included in this group    e Stations online   number of on line stations    e Primary group for   number of stations for which this group is parental    e Personal configuration   list of components with personal settings  not inherited from the  parental group       Comparative parameters for stations     e Creation time of this station    e Primary group for this station    e Personal configuration   list of components with personal settings  not inherited from the  primary group    e Installed components   list of anti virus components installed at this station     Ta  J  1       aX       Chapter 6  Administration of Workstations    Chapter 6  Administration of Workstations    Anti virus netw
262. pdater 1og log file is created or supplemented     To rollback the Server software to the saved backup copy  set the option next to the necessary  version of the Server in the Backups list and click Save     During the Server software rollback  the applied backup copy is placed to the Current version  section     Ta  J  1       ax       Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Components    8 2  Manual Updating of Dr Web Enterprise Security Suite  Components    Checking for Updates from GUS    To check for updates of Dr Web Enterprise Security Suite products on the updates  server    1     Select the Administration item in the main menu and click Repository state in the control menu     2  In the opened window information about all components are listed  also last revision date and its  current state is specified  Click Check for updates    3  If the checked component is outdated  it will be updated automatically during the check  Products  are updated according to the settings of the repository  read p  Administration of Dr Web Server  Repository and further     Updating the Software    To update the software of an anti virus station through Dr Web Security Control Center    1     2     Select the Anti virus network item in the main menu  then click the name of the station or group  in the hierarchical list     In the toolbar  click    Components management  In the opened submenu select the necessary  forced update mode         Update failed comp
263. pecified  when connecting to the Server  station will be authorized  automatically regardless of Server settings  is used by default when installing the Agent via the  esinst installation package   see Installation manual  p  Installation Files      wy Setting the type of the Agent authorization during its installation is described in the User Manual     To change the access mode of stations to Dr Web Server    1  Open the Server configuration  select the Administration item in the main menu  then click  Dr Web Server configuration in the control menu    2  On the General tab  in the Newbies registration drop down list select the necessary option       Approve access manually  the mode is specified by default unless changed at the Servers  installation        Allow access automatically     Always deny access     83    Ta     AN    aX       Chapter 6  Administration of Workstations    Manual Access Approving    In the Approve access manually mode  new stations are placed to the Newbies subgroup of the  Status group until administrator submits them   To manage the access of unapproved stations     1  Select the Anti virus Network item in the main menu of Dr Web Security Control Center  In  the hierarchical list of the anti virus network  select stations in the Newbies subgroup of the  Status group     2  To specify an access to the Server  in the ca Unapproved stations section of the toolbar  set the  action to apply for selected stations     T Approve selected stations and set
264. pecify the hour and the minute for the task to be launched at the time specified   Every N minutes The N value should be specified to set the time interval for the execution of the task     At N equal 60 or more  the task will be run every N minutes  At N less than 60  the  task will be run every minute of the hour multiple of N     Hourly Specify a number from 0 to 59 to set the minute of every hour the task will be run     Monthly Specify the day of the month  the hour and the minute for the task to be launched at  the time specified     N minutes after In the Initial task drop down list  select the task relatively to which the time of current  initial task task execution is set     In the Minute field  specify or select from the offered list the number of minutes that  should pass after the execution of initial task to start execution of edited task     Shut down The task will be launched at Server shut down   No additional parameters required to run the task   Start up The task will be launched at Server start up   No additional parameters required to run the task     Weekly Select a day of the week  specify the hour and the minute  for the task to be launched  at the time specified       Set the Disable after the first execution flag to execute the task only once at specified time  If  the flag is cleared  the task will be executed multiple times according to the specified periodicity     To repeat the launch of task already ones executed  use the    Al Schedule repeated
265. plication levels     Security Troubleshooting  Diagnostic and analysis of the security of mobile device and resolving the detected problems  and vulnerabilities    Application launch control    Blocks the launch on mobile device those applications that are not included into the list of  allowed by administrator     Ta  J  1       ax        Chapter 1  Welcome to Dr Web   Enterprise Security Suite    Servers under Novelle NetWare   OS  Anti virus check  Scans a computer on user demand and according to the schedule   File monitor    The constant file system protection in the real time mode  Checks all launched processes and  also created files on hard drives and opened files on removable media     Providing a Connection between Anti virus Network Components    To provide stable and secure connection between anti virus network components  the following  features are presented     Dr Web Proxy server    Proxy server can optionally be included into the anti virus network  The main function of the  Proxy server is to provide connection between the Server and protected stations in cases  when direct connection is impossible  E g  if the Server and protected stations are located in  different networks which do not have packet routing between them  At the expense of using  caching function  reducing of network traffic and time of receiving updates by protected  stations can be provided     Traffic compression    Special compression algorithms are applicable for transferring data betwee
266. port to PDF format     Ta  J  1       ax       Chapter 2  Components of an Anti Virus Network and Their Interface    Reports    In this section you can specify view settings for statistic data in the Reports section of the Control  Center       In the Number of lines per page field  specify the maximal number of lines on one report page for    paginal view of statistic     e Set the Show charts flag to show charts on statistic reports pages  If the flag is cleared  charts    viewing is disabled     Subscription    In this section you can setup the subscription on Doctor Web company news     Set the Automatic subscription to new sections flag to add new sections in the News page of  Control Center automatically     2 3 7  Help    To open the Help section of Dr Web Security Control Center  click Q  Help in the mail menu     The control menu in the left part of the window contains the following elements     1     General     Forum     opens official forums of Doctor Web company      News   open the news page of Doctor Web company      Contact technical support service     opens the web page of Doctor Web technical support     Send a suspect file     opens a web form for sending a virus to Dr Web Virus Laboratory       Report false alarm in Office Control     opens a web form for sending a message about false  alarm or detection failure in Office Control module       Administrative Documentation      Installation manual   opens documentation on Dr Web Enterprise Security Suite  i
267. ppear on the anti virus network list  only one of them will be  correlated with the respective workstation      To remove repeated workstation names     1   2     3     Select all repeated names of workstation  Use the CTRL to do this     In the toolbar  select    General     Y Merge stations     In the   column  select the station which will be the main  All other stations will be deleted and    their data will be prescribed to the selected station   In the  amp  column  select the station settings of which will be set for the main station   Click Save     85    Ta  2   1       ax       Chapter 6  Administration of Workstations    6 2  General Workstation Settings    6 2 1  Station Properties    Station Properties    To view and edit the properties of a workstation    1     4     Select the Anti virus network item in the main menu of the Control Center  then select the station in  the hierarchical list of the opened window     Open the station properties section by one of the following ways     a  Click the name of the station in the hierarchical list of anti virus network  A panel with properties  of the station will be automatically opened in the right part of Dr Web Security Control  Center     b  Click Properties in the control menu  A window with the workstation properties will be opened     Station properties pane contains the following groups of settings  General  Configuration   Groups  Security  Location  These settings are described below     To save changes in the
268. pression         In the Network listening parameters field  specify the UDP port for Dr Web Security Control  Center to search for working Dr Web Agents in a network  To disable ports listening  enter NONE        Aq P  AN    A        v    Chapter 6  Administration of Workstations    This parameter should be specified in the network addresses format described in the Appendixes    document  in the Appendix E  The Specification of Network Addresses section        By default  the udp  2193 is used  which means  all interfaces  port 2193      6 4 2 3  Mobility    On the Mobility tab  you can specify parameters of Mobile Mode of the Agent        w Information on Agents operation in the Mobile mode is given in the Updating Mobile Dr Web Agents  section       In the Update period  sec   field  specify the time interval between anti virus software updates  in seconds       Set the Use proxy server flag to use an HTTP proxy server to receive updates from the Internet   This will make the fields to set a proxy server available     6 4 2 4  Log    On the Log tab  you can specify parameters of Agent and some Dr Web anti virus components  logging     The Agent log verbosity level parameter determines the level of detail of Agent logging     e The Engine log verbosity level parameter determines the level of detail of Scanning Engine  logging       The Update log verbosity level parameter determines the level of detail of Dr Web updating  module logging       Set the Create memory dumps at s
269. ption is  available in the Notifications send method drop down list only after Dr  Web Mobile Control  Center has been connected to this Dr  Web Server       SNMP     send notifications via the SNMP protocol    e Web console     send notifications for viewing in the Web console    e Windows Message     send notifications using Windows Messenger  for Servers under Windows  OS only      Settings description for each type of notifications sending is given in this section below           7  For notifications sending  the predefined set of standard Server notifications is provided     wy Description of predefined notifications and their parameters is given in the Appendices document  in  p  Appendix D1  Predefined Notifications Description        To configure concrete notification  do the following     a  In the notifications list  set the flags next to those notifications that will be sent according to the  send method of current notifications block     b  To change notifications settings  click  amp  next to the edited notification  Notification template will  be opened  If necessary  edit the text of notification to send  In the notification text you can use  template variables  in braces   To add variables  use drop down lists on the message header   When a message is being generated  the system replaces template variables with a certain text   which depends upon its current parameters  The list of available variables is given in the  Appendices document  in p  Appendix D3  Th
270. r  protocol flag to enable this protocol     7 2 10  Cluster    On the Cluster tab  you can configure parameters of Dr Web Servers cluster for data exchange in  multiserver anti virus network configuration     To use the cluster  specify the following parameters   e Multicast group     IP address of multicast group through which Servers will be exchange  information     e Port     port number of network interface to which transport protocol is bound to transmit the  information into multicast group      Interface     IP address of network interface to which transport protocol is bound to transmit the  information into multicast group        H Peculiarities of Dr Web Server clustering are given in the Dr Web Servers Cluster section     7 2 11  Location    On the Location tab  you can specify additional information about the physical location of the  computer on which Dr Web Server is installed     Also on this tab you can view the Server location on a geographical map     To view the Server location on a map     1  In the Latitude and Longitude fields  specify the Server geographical coordinates in the Decimal  Degrees format     2  Click Save to save specified data to the Server configuration file     To view the map  you do not need to restart the Server  But to apply changed geographical    coordinates  you must restart the Server     3  On the Location tab  the OpenStreetMaps preview will be shown containing a mark according to  the specified coordinates     If the preview
271. r Web Agent logotype will be displayed in its place in the message window     e Set the Show link in the message flag  to include a hyperlinks to web resources into the  message     To insert a link    1  In the URL field  specify a link to an Internet resource    2  Inthe Text field  specify the link name   a text displayed in the link place in the message    3  In the Message text field  add the  link  marker in all places where you want the link to  appear  In the resulting message  the link with the specified parameters will be shown instead of  the marker  You may use unlimited number of the  link  markers in a text  all of them will  have the same parameters from the URL and Text fields       Set the Send to online stations only flag to send the message to online stations only  If the  flag is set  sending to offline stations is not performed  If the flag is cleared  sending to offline  stations is postponed till their connection     Set the Show send status flag  to show notification with the message send status   4  Click Send        Ta  J  1       ax        Chapter 6  Administration of Workstations   123    Logo File Format    A file with graphic image  logotype  inserted into a message should require the following     1  File graphic format  BMP  JPG  PNG  GIF  SVG    2  Logo file size may not exceed 512 KB    3  Overall image size is 72x72 pixels  Images of other size will be scaled to the default size before  send      Bit depth is any  8   24 bit     5  If the Us
272. r addresses of Dr Web  Servers to which stations are connected    e Show update error icon     enables disables marker on icon of workstations the last  update of which is failed      for all elements    e Show personal settings icon     enables disables marker on icon of workstations and  groups which shows whether individual settings are present    e Show descriptions     enables disables showing of groups and stations descriptions  the  descriptions are set in the properties of an element     e Show the number of stations     enables disables showing the number of stations for all  groups of anti virus network    e Show membership rules icon     enables disables showing the mark on stations icons  which are added to groups automatically according to the membership rules  also on groups  icons in which stations are added automatically     Ta  J  1       aX       Chapter 2  Components of an Anti Virus Network and Their Interface    Property Pane    The property pane shows the properties and settings of workstations   To display the property pane    1  Select the name of a station or a group in the hierarchical list     2  A pane with properties of selected workstation or group opens in the right pane of Dr Web  Security Control Center  Detailed description of these settings is given in the Editing Groups and  Station Properties        2 3 3  Neighborhood    Select the Neighborhood item in the main menu of Dr Web Security Control Center  The control  menu in the left part of 
273. r is loaded     Ta     N    ys       Chapter 2  Components of an Anti Virus Network and Their Interface   55    3  The content of the centralized installation catalog and update catalog is loaded  notification system  is initialized   Server database integrity is checked    5  Server Task Scheduler tasks are performed     6  The Server is waiting for information from Dr Web Agents and commands from Dr Web  Security Control Center     The whole stream of instructions  data and statistics in the anti virus network always goes through  Dr Web Server  Dr Web Security Control Center exchange information only with Servers  Based  on Dr Web Security Control Center commands  Servers transfer instructions to Dr Web Agents  and change the configuration of workstations     Thus  the logical structure of the fragment of the anti virus network looks as in the Figure 2 3                 Dr Web Server     HTTP HTTPS    Dr Web Security Control Center       TCP IP network    A       j    Protected computer     Transfer of updates via HTTP    Dr Web GUS    u g    Figure 2 3  The logical structure of the anti virus network    Between the Server and workstations  a thin continuous line in the Figure 2 3  transferring the  following information     e Agents requests for the centralized schedule and the centralized schedule of workstations     Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface       settings of the Agent and the anti virus package    requests f
274. r local etc rce d drwcesd sh restart    e for Linux OS and Solaris OS      etc init d drwcesd restart    o Stop     e for FreeBSD OS      usr local etc rc d drwcsd sh stop    e For Linux OS and Solaris OS      etc init d drwcsd stop    wy Please note  if you need the Server to read environment variables  the service must be rebooted via  the console command     2 2  Dr Web Agent    Detailed description of Agent and its operation principals you can find in the Dr Web   Agent for  Windows  User manual     Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface    Principle of Operation    Workstations are protected from virus threats by Dr Web anti virus packages designed for  correspondent OS     The packages operate by Dr Web Agents  which is installed and constantly resided in the memory of  protected workstations  They maintain connection to Dr Web Server  thus enabling administrators to  centralized configure anti virus packages on workstations from Dr Web Security Control Center   schedule anti virus checks  see the statistics of anti virus components operation and other information   start and stop remotely anti virus scanning  etc     Dr Web Servers opportunely download updates and distribute them to the Agents connected to  them  Thus due to Dr Web Agents anti virus protection is implemented  maintained and adjusted  automatically  without user intervention and irregardless of user s computer skills     In case an anti virus station is o
275. r switches to the transparent mode  i e   transfers all traffic between Server and Agent without any data analyzing     A If encryption between Server and Agent is enabled  Proxy server do not caching updates     Caching  Proxy server supports traffic caching     Products are cached by revisions  Each revision stores in separate directory  Directories with all next  revisions contain hard links on existing files from old revisions and originals for changed files  Thus  files  for each version are stored on a hard drive in a single exemplar  all directories for next revisions contain  only links on unchanged files     According to the settings specified in the configuration file  the following actions are performed if the  caching is enabled   e Outdated revisions are periodically deleted  By default   once per hour     e Only latest revisions are stored  All other  earlier revisions are considered outdated and are deleted   By default 3 last revisions are stored     e Unused memory mapped files are periodically unloaded  By default   each 10 minutes     Settings    The Proxy server does not have a GUI  Its settings are adjusted via a configuration file  The format of  the configuration file is described in the Appendices document  p  Appendix G4     Ta  J  1       ax       Chapter 9  Configuring the Additional Components   194    1 Only user with administrative rights on the computer can manage settings  edit configuration file  of  Proxy server     For proper operation of Pr
276. re configured  In other  cases  e g   if one of the networks is external for the cluster and the Agents are connected from it   and the second network is intercluster  when cluster protocol is better to open only for interfaces of  the internal network  In this case  the following addresses must be set as an interfaces   192 168 1 1  n   192 168 1 N     The same database    A To be able to work with a common database  all Dr  Web Servers must be the same version     All Dr Web Servers within one cluster  must operate with the same external database     As in the case of the database without cluster  each of the Servers calls the database independently  and all Servers data is stored separately  Wherever relevant  Server gets from the database only  records for its ID which is unique for each Server  Usage of the same database allows the Servers  operate with the Agents  firstly registered on other Servers of a cluster     When you creating a Servers cluster with the same database  please consider the following  features       The database may be installed either separately from all Servers or on the one of the computers  on which the Server of a cluster in installed       The database must be created before installation of the first Server of a cluster or before the  connection of the first Server to the database       When adding new hosts into the cluster  except the first Server   during the Servers installation  it is not recommended to set the common database which is us
277. re numbered according to the date of their  creation  that was the last for this product before update process started      Revision from update   number of the revision  revisions are numbered according to the date  of their creation  that was was downloaded during update process      Updated files   brief information on the changed files  Is given in the following format   lt files  number gt     lt actions on files gt       Initiator   system that initiated the update process    e Launched from the command line   update was initiated by administrator via the   corresponding console command    Launched by Task Scheduler   update wad launched according to the task in the Dr Web   Server schedule    Interserver update   update was received via the interserver connection from the main   Server  This initiator presents only in case of multiserver configuration of anti virus network   with propagation of update via the interserver connections    Launched from the Control Center   update was launched by administrator via Dr  Web   Security Control Center  from the Repository State section    Repository import   update was loaded by administrator in the Repository Content section   of the Control Center       Administrator   login of the Server administrator  It is specified if the action was initiated  directly by administrator           126    A  AN    T   v    A    A        Chapter 7  Configuring Dr Web Server   127      Network address   IP address from which the action execut
278. rent   e Name   the name of the parent Server  MAIN    Password    an arbitrary password to access the parent Server     e Own keys of Dr Web Server   the list of public encryption keys of configuring Server  Click SS  and specify the drwcsd pub key of the current Server  To add one more key  click te and add  the key to the new field    e Keys of neighbor Dr Web Server    the list of public encryption keys of connecting parent  Server  Click MSS and specify the drwcsd pub key of the parent Server  To add one more key   click    and add the key to the new field    e Address    the network address of the parent Server and the connection port  Use the following  format   lt Server_address gt    lt port gt      You can browse the list of Servers  available in the network  To do this     a  Click the arrow on the right of the Address field    b  In the opened window  specify networks in the following format  with a hyphen  for  example  10 4 0 1 10 4 0 10   separated by a comma with a whitespace  for  example  10 4 0 1 10 4 0 10  10 4 0 35 10 4 0 90   with a network prefix  for  example  10 4 0 0 24     c  Click E to browse the network for available Servers     d  Select the Server in the list of available Servers  Its address will be set to the Address  field to create connection     e URL of Dr Web Security Control Center   you can specify the address of a start web page for  Dr Web Security Control Center of the main Server  see p  Dr Web Security Control Center      e In the 
279. report errors when connecting through HTTPS and refuse    connection to Dr Web Security Control Center  To solve this problem  add Dr Web Security  Control Center to the list of exceptions by clicking Add site in the warning message  This allows  connection to Dr Web Security Control Center     Dr Web Security Control Center Interface    Dr Web Security Control Center window  see figure 2 1  is divided in main menu header and  working area     Working Area    The working area is used to perform all the main functions of Dr Web Security Control Center  It  consists of two or three panels depending on the actions which are being performed  Items in the  panels are nested from left to right    e the control menu is always located in the left part of the working area     e depending on the selected item  one or two additional panels are displayed  In the latter case  the  rightmost panel contains the settings of elements from the central panel     The interface language must be set individually for each administrator account  see p  Managing  Administrator Accounts         Main menu    The main menu consists of the following items     e Administration section   e Anti virus network section        31    Ta     N    ax       Chapter 2  Components of an Anti Virus Network and Their Interface   32    e Neighborhood section     Search panel       the name of the current administrator logged into Dr Web Security Control Center  Also  the  interserver connections menu may be available  
280. ression mode reduces traffic  but considerably increases the computational load on  computers  more than the encryption     The Possible value in Dr Web Agent settings means that by default the traffic will be encrypted   compressed  but it can be disabled by editing the settings of the Server without editing the settings  of the Agent     Ta  J  1       ax       Chapter 7  Configuring Dr Web Server    7 2 1 2  Workstation Traffic Limitations    You can limit the network traffic bandwidth for transferring data between Server and Agents in  Dr Web Enterprise Security Suite anti virus network  You can separately configure limitations for  transferring updates and limitations for transferring data during Agent installations     The following options to limit the data traffic are available    1  Limit data transfer bandwidth for all workstations   You can configure this option in the Server configuration section  select the Administration item in  the main menu of the Control Center     the Dr Web Server configuration item in the control    menu     the General tab     the Updates or Installations internal tab     the Limit traffic  option     2  Limit update transfer bandwidth for certain stations or groups of stations personally     You can configure this option in stations configuration section  select the Anti virus Network item  in the main menu of the Control Center     select the station or group of stations in the network  hierarchical list     the Traffic restrictions it
281. rm the following actions     1  In the hierarchical tree  select the necessary backups  to select entire backup  it is enough to select  in the tree the folder that corresponds to this backup   or separate files from the backup  composition  To select several objects  use CTRL or SHIFT     Please note the general type of exported objects during the export     a  Zip archives of the backups are saved for the following selected objects   e One or several entire backups  when selecting folders which correspond to the backups    e Several separate files from the backups composition     b  Separate files from the backups composition  If only one file have been selected for the export   it will be saved as it is without archiving     2  Click    Export on the toolbar     170    A  AN    v    Aq    A        Chapter 7  Configuring Dr Web Server    3  Specify the path to save selected objects according to the web browser settings in which the  Control Center is opened     7 10  Peculiarities of a Network with Several Dr Web Servers    Dr Web Enterprise Security Suite allows to build an anti virus network with several Dr Web  Servers  In such networks each workstation is assigned to one Server  which allows to distribute the  load between them     The connections between the Servers can have an hierarchical structure  which allows optimally  distribute the load between the Servers     To exchange information between the Servers a special interserver synchronization protocol is used    
282. rom the remote computer        Delete selected log files   delete selected log files without possibility to restore     7 1 3  Repository Updates Log    Repository updates log allows to view the list of updates from GUS  that includes detailed information  on updated products revisions     To view the repository updates log     1   2   3     Select the Administrating item in the main menu of the Control Center   In the opened window  select the Log of repository updates item of the control menu     Window with the registered actions table opens  To configure viewing the log  specify on the toolbar  the time period during which the actions have been performed  For this  you can select one of the  proposed periods or specify arbitrary dates in the calendars which are opened on clicking the dates  fields  Click Refresh to display the log for the selected dates     The log table contains the following data     Start   date and time when an update of the certain product has been started from the GUS     Finish   date and time when an update of the certain product has been finished from the GUS       Product name   name of the repository product that was downloaded or was requested to be  downloaded       Update result   repository update result  Contains brief information on successful update  completion or error reason     wy The Update result cells that correspond to actions executed with an error  are marked with red        Initial revision   number of the revision  revisions a
283. rop down list with the backup of all section  settings  which you can restore after making changes  The button become enabled after you  specified the changes in the section settings ans click Save       Reset all parameters to initial values   restore the values that all parameters in this section  had before current editing  last saved values        Reset all parameters to default values   restore default values of all parameters in this  section    4  To apply the changes specified in the section settings  click Save  after this the Server must be  rebooted  To do this  click  amp   Restart Dr Web Server on the toolbar of this section     Ta  yan    A    A        Chapter 7  Configuring Dr Web Server    7 2 1  General    On the General tab  you can configure the following Server parameters       Dr Web Server name   the name of the Server  If it is not specified  the name of the computer  where Dr Web Server software is installed is used        Parallel requests number     the threads number processing data from the Agents  This parameter  affects Server performance  Change the default setting on advice of the technical support only       DB connections     the number of database connections with the Server  Change the default setting  on advice of the technical support only     Starting from the 10 0 version  the Authorization queue parameter cannot be edited vie the  Control Center     On the new Server installation  this parameter takes the 50 default value  On the upgra
284. roperties section  you can also set a group as a primary one for the station  for more details   read p  Inheriting Stations Configuration from Groups  Primary Groups         To edit the list of groups containing the station via the hierarchical list     1     In the main menu  select Anti virus network and unfold the hierarchical list of groups and  stations    To add a station to the user group  press CTRL and drag and drop a station to the corresponding  group    To move a station from one user group to another  drag and drop this station from the user group   from which station will be removed  to the user group  to which station will be added     When dragging a station from preinstalled group in both 2 and 3 steps  station is added in the user  group and is not removed from preinstalled group     5 3 2  Configuring Automatic Group Membership    Dr Web Enterprise Security Suite allows to configure the rules of automatic including stations into  user groups     To specify the rules of automatic including stations into the group     1   2     Select the Anti virus Network item in the main menu of the Control Center     In the hierarchical list of anti virus network  select the user group for which you want to specify the  membership rules     Open the membership rules editing section by one of the following ways     e In the group properties pane on the right part of the window  in the Configuration section  click  Y Group membership rules     e In the control menu  in the
285. ror icon     enables disables marker on icon of workstations the last update of  which is failed       for all e llements     Show personal settings icon     enables disables marker on icon of workstations and groups  which shows whether individual settings are present     Show descriptions     enables disables showing of groups and stations descriptions  the  descriptions are set in the properties of an element     Show the number of stations     enables disables showing the number of stations for all groups  of anti virus network    Show membership rules icon     enables disables showing the mark on stations icons which are    added to groups automatically according to the membership rules  also on groups icons in which  stations are added automatically     Network scanner    A The Network scanner requires Dr Web Security Control Center Extension     The settings of this section let you configure the default parameters of Network Scanner        To launch the Network scanner  select Administration item in the main menu  In the contro  menu   select Network scanner     Specify the following parameters of Network scanner     1  In the Networks field specify networks in the following format   e with a hyphen  for example  10 4 0 1 10 4 0 10     separated by a comma with a whitespace   for example  10 4 0 1 10 4 0 10  10 4 0 35 10 4 0 90   e with a network prefix  for example  10 4 0 0 24    2  Change Port and Timeout parameters  if necessary     3  Click Save to save these para
286. ru  address  then set mail client to connect to localhost via the 7000 port     6 5  Anti Virus Scanning of Stations    Users can scan their workstations themselves using Dr Web Scanner for Windows  A Scanner  shortcut is created on the desktop during the installation of the anti virus package  The Scanner can  be launched and operate successfully even in case of Agent malfunction or running Windows OS in  the safe mode     Via the Control Center you can       View the list of all anti virus components running at present   e Terminate running anti virus components of a certain type      Initiate anti virus scanning and specify its parameters     6 5 1  Viewing and Terminating Running Components    To view the list of running components and terminate some of them manually     1  In the main menu  select Anti virus network  then click the name of a workstation or group in  the hierarchical list of the opened window  In the contro  menu  select Running components     Lists of components active at present such as launched via the Control Center manually by  administrator or scheduled and launched by a users at the station  will be opened     2  If you want to interrupt any of components  set the flag next to this component and click Interrupt  on the toolbar  Execution of a task will be terminated  and the tasks will be removed from the list     Ta  J  1       aX       Chapter 6  Administration of Workstations      When you use this option  running scans will be terminated  Scann
287. ryption keys             Logs    Audit log     allows to view the list of events and changes carried via the control subsystems of  Dr Web Enterprise Security Suite       Tasks execution log     contains the list of Server tasks with completion marks and comments     Dr Web Server log     contains the list of events on the Server operation     e Log of repository updates     contains the list of updates from GUS  that includes detailed  information on updated products revisions          Configuration    e Administrators     opens the panel for managing anti virus network administrator accounts         Authentication     opens the panel to manage authentication methods of Dr Web Security  Control Center administrators  see Authentication of Administrators        Dr Web Server configuration     opens the panel with main settings of the Server    e Dr Web Server remote access     contains settings for connecting Server remote diagnostics utility     Dr Web Server Task Scheduler     opens the panel with Server task scheduler settings    e Web server configuration     opens the panel with general settings of the Web server    e User hooks                      Installations    e Network Scanner     allows to specify a list of networks  search for installed anti virus software in  networks to determine protection status of computers  and install anti virus software     e Network installation     allows to simplify installation of the Agent software on certain  workstations  see Inst
288. s       The Infected files drop down list specifies the Scanner reaction to the detection of a file infected  with a known virus     e The Suspicious files drop down list specifies the Scanner reaction to the detection of a file  presumably infected with a virus  upon a reaction of the heuristic analyzer         If scanning includes the OS installation folder  it is recommended to select the Report action for  suspicious files       The Incurable files drop down list specifies the Scanner reaction to the detection of a file infected  with a known incurable virus and in case if attempt to cure a file is failed        The Infected containers drop down list specifies the Scanner reaction to the detection of an  infected or suspicious file in a file container     e The Infected archives drop down list specifies the Scanner reaction to the detection of an infected  or suspicious file in a file archive       The Infected archives drop down list specifies the Scanner reaction to the detection of an infected  or suspicious file in e mail format     If viruses or suspicious program code is detected within complex objects  archives  e mail  attachments or file containers   an actions selected for this type of a complex object is performed to  a whole object  not just to the infected part  By default informing the user on the threat is  performed       The Infected boot sectors drop down list specifies the Scanner reaction to the detection of an  viruses or suspicious program code in th
289. s  the same IP address or DNS name of the Server must be specified to use it for  generating Agent installation files for an anti virus network stations     This name is specified via the Contro  Center  Administration  gt  Dr Web Server configuration   gt  the Download tab  gt  the Dr Web Server address field  Settings of this section are stored in the  download conf configuration file  description of the file is given in the Appendices document  p     G3  Download conf Configuration File      3  Cluster usage setup    At the network DNS server  the common cluster name must be registered for each Server and load  balancing must be set     For automatically applying of the settings in Dr Web Servers cluster  the specific cluster protocol  must be used     To configure cluster protocol  it is necessary for each Server in the Control Center open the  Administration  gt  Dr Web Server configuration menu ans specify the following settings     a  To enable cluster protocol  on the Modules tab  set the Dr Web Servers cluster protocol flag     Ta  J  i    ax       Chapter 7  Configuring Dr Web Server    b  To configure parameters for interaction of the Servers within a cluster  on the Cluster tab  specify the corresponding parameters     c  After configuring of the necessary parameters  click Save and restart the Servers   For Example    e Multicast group  232 0 0 1  e Port  11111  e Interface  0 0 0 0    In this example  for all Servers of a cluster  transports for all interfaces a
290. s connections both on network and application levels    Quarantine  Isolates malware and suspicious objects in the specific folder    Self protection  Protects files and folders of Dr Web Enterprise Security Suite from unauthorized or  accidental removal and modification by user or malicious software  If self protection is  enabled  access to files and folders of Dr Web Enterprise Security Suite is granted to  Dr Web processes only    Preventive protection  Prevents of potential security threats  Controls the access to the operating system critical  objects  controls drivers loading  programs autorun and system services operation and also  monitors running processes and blocks them in case of detection of viral activity     15    Ta  J  1       ax        Chapter 1  Welcome to Dr Web   Enterprise Security Suite    Stations under UNIX   system based OS  Anti virus check    Scans a computer on user demand and according to the schedule  Also the remote launch of  anti virus scan of stations from the Control Center is supported    File monitor  The constant file system protection in the real time mode  Checks all launched processes and  also created files on hard drives and opened files on removable media    Web monitor  Checks all calls to web sites via the HTTP protocol  Neutralizes malicious software in HTTP    traffic  for example  in uploaded and downloaded files  and blocks the access to suspicious or  incorrect resources     Quarantine  Isolates malware and suspicious objec
291. s for any of connection type     1  To allow the access by HTTP or by HTTPS from definite addresses  add them to the HTTP   Allowed or HTTPS  Allowed lists correspondingly     2  To deny the access by HTTP or by HTTPS from definite addresses  add them to the HTTP  Denied  or HTTPS  Denied lists correspondingly     3  The addresses not included into any of the lists are allowed or denied depending on whether the  HTTP denial priority and HTTPS denial priority flags are set  if the flag is set  the addresses  not included into any of the lists  or included into both of them  are denied  Otherwise  such  addresses are allowed     To edit the address list    1  Specify the network address in the corresponding field and click Save   2  To add a new field  click   in the corresponding section    3  To delete a field  click i     The network address is specified as   lt  P address gt      lt prefix gt        wy Lists for TCPv6 addresses will be available  if the IPv6 interface is installed on the computer     Examples of prefix usage   1  Prefix 24 stands for a network with a network mask  255 255 255 0    Containing 254 addresses   Host addresses look like  195 136 12      2  Prefix 8 stands for a network with a network mask  255 0 0 0  Containing up to 16387064 addresses  256 256 256      Host addresses look like  125          Ta  yan    A    A        Chapter 7  Configuring Dr Web Server    7 6  User Hooks    User hooks  implemented as a lua scripts  are meant for automation of th
292. s on editing permissions are described in the Editing permissions subsection        6  Click Save to apply changes     Editing Permissions    To edit privileges of administrators and administrative groups in the properties editing  section   1  To change the inheritance  click on off in the Inheritance column of the permissions table and  select the necessary value in the drop down list   2  The list of permissions is divided into three subsections   e permissions for managing stations groups of stations   e permissions for managing administrators administrative groups   e permissions with flags   3  Permissions of the first two sections are managed in the Granted and Denied columns     These permissions are applied according to the following rules        Group name or list of the Permission is allowed only for the Permission is denied only for the listed    group names listed groups groups   All Permission is allowed for all groups Permission is denied for all groups   None Permission is not allowed for any Permission is not denied for any group  group    To edit a permission  click on a respective cell  A window with a list of groups that are affected by  the permission will be opened  Select one of the two available settings from the list     For stations  All Apply permission settings for all stations that are connected to the current Server     71    Ta     1       ax       Chapter 4  Anti Virus Network Administrators    Select certain Apply permission settings only for 
293. sages on infections  must be received  so that Dr Web Server may send to the administrator a single notification on  epidemic on all cases of infection    e Messages number   the number of messages on infections that must be received in specified  time period  so that Dr Web Server may send to the administrator a single notification on  epidemic on all cases of infection    e Set the Synchronize geolocation flag to enable synchronization of stations geolocation between  Dr Web Servers in multiserver anti virus network  If the flag is set  you can configure the following  parameter    e Startup synchronization   number of stations without geographical coordinates  information on  which is requested when establishing a connection between Dr Web Servers     7 2 1 1  Traffic Encryption and Compression    Dr Web Enterprise Security Suite anti virus network allows encrypting the traffic between Dr Web  Server and workstations  Dr Web Agents   between Dr Web Servers  in multi server anti virus  network configuration  and between Dr Web Server the Network Installers  This mode is used to  avoid leakage of user keys and also information on environment and anti virus network users during  components interaction     Dr Web Enterprise Security Suite anti virus network uses reliable tools of encryption and digital  signature based on the concept of pairs of public and private keys     The encryption policy is set separately for each component of the anti virus network  at this  settings o
294. se Security Suite allows you to use the NAP technology to check health of Dr Web  anti virus software on protected workstations  This functionality is provided by use of Dr Web NAP  Validator     Means of Health Validation      A NAP health policy server which is installed and configured in the network       Dr Web NAP Validator which is an implementation of NAP System Help Validator  SHV  with use  of Dr Web custom policies extensions  This component is installed on the computer where the NAP  server resides    e System Health Agents  SHAs  which are installed automatically on the workstations during installation  of Dr Web Agents     e Dr Web Server which serves as the NAP remediation server and ensures health of anti virus  software on workstations     Ta     1       ax       Chapter 9  Configuring the Additional Components        gt   Dr Web Server NAP Server   Dr Web NAP  as Validator      Lo  Protected computer  compliant PE  LAN  Internet    Protected computer  noncompliant    Figure 9 2  Diagram of the anti virus network when NAP is used    Workstation Validation Procedure    1  Validation is activated when you configure the corresponding settings of the Agent  For more  information  see Managing Dr Web Agent for Windows   OS    2  The SHA connect to Dr Web NAP Validator installed on the NAP server    3  Dr Web NAP Validator determines compliance of workstations against the health requirement  policies as described below  To determine health compliance  NAP Validator 
295. search stations by the name of hardware installed on the station     Software   to search stations by the name of software installed on the station     39    Ta     1       ax       Chapter 2  Components of an Anti Virus Network and Their Interface    Enter a parameter value to search  You can search values by specifying    e specific string for full match with search value      a mask for search string  the   and   symbols are allowed    Press ENTER to start the search    The search results contain a hierarchical list of elements according the search parameters      If you searched for a workstation  occurrence of the workstation in groups will be displayed       If no elements are found  the message No results found will be displayed in the empty  hierarchical list     2 3 5  Events    To notify administrator on events requiring attention  the section displayed under the A Events icon  on the main menu is provided     The icon may take the following states     A     no new notifications on events in the network     A     new notifications on minor events     A     new notifications on major events requiring administrator intervention     The following actions are available for the events list     The icon click opens the drop down list of anti virus network events  At this  the icon automatically    The click on notification string on event opens the Control Center section that responsible for    1    changes to bad   2    corresponding functions   3     The stub of every n
296. section        Ta  J  1       ax        Chapter 1  Welcome to Dr Web   Enterprise Security Suite   14    Mobile Control Center connects to the Server according to the anti virus network administrator  credentials including via an encrypted protocol  Mobile Control Center supports the base set of  Control Center functions     1  Manage Dr Web Server repository     e view the products state in the repository   e launch repository update from Dr Web Global Update System     2  Manage stations on which an update of anti virus software is failed     e display failed stations   e update components on failed stations     3  Display statistics information on anti virus network state     e number of stations registered at Dr Web Server and their current state  online offline    e viral statistics for protected stations     4  Manage new stations waiting for connection to Dr  Web Server     e approve access   e reject stations     5  Manage anti virus components installed on anti virus network stations     e launch the fast or full scan either for selected stations or for all stations of selected groups    e setup Dr Web Scanner reaction on malware detection    e view and manage files in the Quarantine either for selected stations or for all stations in  the selected group     6  Manage stations and groups     e view properties    e view and manage components composition of anti virus package   e delete    e send custom messages to stations    e reboot stations under Windows OS    e ad
297. section  parameters are hidden  the graphical statistic data is cleared and on the parameters opening  the  drawing starts from the beginning     7 9 3  Backups    The Backups section allows to view as files and folders and also save locally contents of Dr Web  Server critical data backup copies     During backup  the following objects are saved  repository settings  configuration files  encryption keys   certificates  embedded database backup     Dr Web Server critical data backup copies are saved in the following cases       As a result of the Back up critical server data task execution according to the Server schedule       As a result of back up when running the Server executable file from the command line with the  backup switch  This command is described in details in the Appendices documents  in the H3 5     Backup of Dr Web Server Critical Data   View Information on Backups    To view information on the backup  select the object in the hierarchical tree of the backups  The  properties panel with the following information on the object will be opened  Type  Size  for separate  file only   Creation date and Modification date     Manage Backups    To manage backups  use the following buttons on the toolbar     g Export   allows to save the backup of selected object to the computer on which the Control Center  is opened        Delete selected objects   delete objects selected in the tree without possibility to restore     Backup Export    To save the backup locally  perfo
298. set only propagated licenses   A window with installed components settings described in Settings for License Key Changing   opens     6  Click Save to propagate licenses to neighbor Servers           Edit Licenses Donated to a Neighbor Server    To edit licenses propagated to neighbor Server    1  In the main pane of the License Manager in the keys tree  select the neighbor Server  on which  licenses were propagated    2  On the opened properties panel  edit the following parameters     e Number of licenses   number of vacant licenses  which were donated from the key of this  Server to the neighbor Server     e License expiration date   validity period of licenses donation  After specified time period  all  licenses will be recall from the neighbor Server and got back to the list of vacant licenses in this  license key     3  Click Save to update information on propagated licenses     Changing the List of Installed Components    Settings for License Key Changing    In this section you can find description of installing components setup for the following procedures     e Update the License Key   e Replace the License Key   e Remove the License Key     Donate a License to a neighbor Server with replacing a key     When performing these procedures  to setup installing components  do the following     1  In the window with installed components settings  the following objects are listed   e Stations and groups with their list of installing components     e In the Current key colum
299. sitory of a Server not Connected to the  Internet    8 4 1  Copying Repository of Other Dr Web Server    If the anti virus Server is not connected to the Internet  its repository can be updated manually  Copy  the repository of another Dr Web Server  which has been updated normally     A This way is not meant for upgrading     To update the anti virus software  do the following    1  Install the anti virus Server software on another computer connected to the Internet as described  in the Installation Manual  p  Installing Dr Web Server    2  Stop the two Servers     3  Start the Server connected to the Internet with the syncrepository switch to update the anti virus  software        Example for Windows OS      C  Program Files DrWeb Server bin drwcsd exe   home  C  Program Files DrWeb  Server  syncrepository       4  Fully replace the content of repository catalog on the main  working  Server by the content of  correspondent catalog of the Server connected to the Internet  Usually it is       var repository under Windows OS      var drwces repository under FreeBSD OS      var opt drwces repository under Linux OS and Solaris OS     If the Agent with an active self protection is installed on Sever computer  you must disable Dr  Web  Self protection component in the Agent settings before starting the repository update     5  If the main Server is runing under UNIX OS  it is necessary to set the rights of the user created   selected at the installation of the Server to the copied
300. spicious  files  malware and infected archives     wy Dr Web Agent Scanner automatically applies actions that are specified for detected virus threats     The following actions for detected virus threats are provided       Cure   restore the original state of an object before infection  If the object is incurable  or the attempt of curing  fails  the action set for incurable viruses is applied     Available for known viruses only except Trojan programs that are deleted on detection  and infected  files within complex objects  archives  mail boxes or file containers     e Delete   delete infected object      Move to quarantine   move the object to the special Quarantine at the station     e Report   send a notification to the Control Center about the detection of a virus  see the  Setting Alerts section on how to configure alerts         Ignore   skip the object without performing any action and do not send notification in the scan  statistic     Table 6 7  Reactions of Scanner to various virus events             Infected     Suspicious          Incurable         Containers          Ta  yan    A     A        Chapter 6  Administration of Workstations                Archives  E mail files        Boot sectors ia    Adware          Dialers 1          Jokes          Riskware          Hacktools          Conventions    action is enabled for this type of objects      action is set as default for this type of object    To set actions on virus threats detection  use the following option
301. sponding CPU are    operating  system    RAM    Free disk space    supported   e CPU that supports SSE2 instructions and has 1 3 GHz or faster clock frequency   e Windows   e Linux   e FreeBSD   e Solaris x86   e V9 UltraSPARC IIIi CPU or later   e Solaris Sparc   Complete list of supported OS see in the Appendices document  in Appendix A   e Minimal requirements  1 GB   e Recommended requirements  2 GB and more     Up to 12 GB  up to 8 GB for a embedded database  installation catalog  and up to 4GB for the  system temporary catalog  for work files      Depending on the Server settings  additional space may required to store temporary files  e g   to store personal installation packages of Agents  app  8 5 MB for each  in the var   installers cache subfolder of Dr Web Server installation folder     Ta     N    ys       Chapter 1  Welcome to Dr Web   Enterprise Security Suite   19    Other    To install the Server  it is required on Windows OS system disk or in the  var   tmp for UNIX system based OS  or in the other temporary files folder  if it is  redefined   not dependently on the Server installation folder  at least 1 2 GB for  the general distribution kit and 2 5 GB for the extra distribution kit of free system  disk space to launch the installer and unpack temporary files     For the installation of Dr Web Server for UNIX system based OS  the following libraries  required  1sb v  3 or later  glibc v  2 7 and later    To use PostgreSQL DB  the 1ibpq required    To use Or
302. ssword of proxy server user fields     o Select one of authorization methods     Any supported method Use any authorization method supported by the proxy server  If the proxy  server supports several authorization methods  the most secured is used     Any safe supported method Use any secured authorization method supported by the proxy server  In  this mode  the Basic authorization method is not supported  If the proxy  server supports several authorization methods  the most secured is used     Basic Use Basic authorization  It is not recommended to use this method because  The following authorization transfer of authorization accounting data is not encrypted   methods  Digest Use Digest authorization  Cryptographic authorization method     authorization       Sa   oe Chapter 7  Configuring Dr Web Server   137  NTLM Use NTLM authorization  Cryptographic authorization method  The NTLM  authorization protocol of Microsoft company is used for authorization   GSS Negotiate Use GSS Negotiate authorization  Cryptographic authorization method   authorization  7 2 8  Transport    On the Transports tab  you can configure parameters of transport protocols used by the Server to  connect with clients     In the TCP IP subsection  parameters of connection with the Server via TCP IP are set       Address and Port     correspondingly the IP address and the port number of the network interface to  which this transport protocol is bound  Server listens interface with specified parameters to  
303. stem        119    Ta  J  1       ax       Chapter 6  Administration of Workstations   120      Q Scan files   scan selected in Quarantine file one more time     e  amp  Export   copy and save selected in Quarantine files     After moving suspicious files to the local Quarantine on user s computer  you can copy these files  via the Control Center and save them via the web browser  e g  to send files to Dr Web virus  laboratory ulteriorly  For saving  set the flags for the needed files and click Export       Export data about the Quarantine state to a file in one of the following formats      amp  Save data in CSV file   i Save data in HTML file     fi Save data in XML file   f amp  Save data in PDF file     6 7  Mailing of Installation Files    After a new stations account is created in the Control Center  the installation package for Dr Web  Agent installation is generated  Installation package contains the Anti virus installer and the set of  parameters for connecting to the Server and for authorization of the station at the Server  description  of installation package and the process of Agent installation via this package is given in the  Installation Manual  in the Local Installation of Dr Web Agent section         After the installation package is created  for the convenience of their distribution  you can sent specific  installation packages to the user s email     To send installation packages  the email content is formed by the following way     1     Operating system
304. structure is presented in Figure 7 1     171    Ta     AN    ax          Dr Web Server    Protected computer    Dr Web GUS    Chapter 7  Configuring Dr Web Server             TCP IP network    Transfer of updates via HTTP    Sending information on events    Interserver transfer of updates   licenses for stations    RT    Figure 7 1  A multi server network    Some advantages of the anti virus network with several Dr Web Servers     1  Receiving of updates from Dr Web GUS servers by one principle Dr Web Server and their  subsequent distribution to the other Servers directly or through intermediates     Servers that receive updates from the superior Server  do not receive updates from GUS even if  such task is set in the schedule     Still  in case the parent Server is inaccessible  it is recommended to keep the task for updating from  the GUS on subordinate Servers  This allows the Agents which are connected to the subordinate  Server to receive updated virus databases and program modules  see also p  General Repository    Configuration      172    Ta     N    ys       Chapter 7  Configuring Dr Web Server      In the task for updating from GUS on the superior Server propagating updates  you must set up the  receiving updates of the Server software for all operating systems installed on all subordinate  Servers  which receive updates from this superior Server  see p  General Repository Configuration         2  Distribution of workstations between several Servers  decreasing the 
305. t       lt port gt           proxy auth  lt argument gt      data for authentication on the proxy server  user login and password     lt  login gt      lt password gt           strict     terminate downloading if an error occurred       log  lt argument gt      create a log file of the Server log file format to register information on the    downloading process and located it in the folder specified as  lt argument gt      Examples of Use    1     2     3     To create an imported archive with all products     drwreploader exe   path C  Temp repository zip   archive   key  C  Program Files   DrWeb Server etc agent key    etc  C  Program Files DrWeb Server etc           To create an imported archive with virus bases           drwreploader exe   path C  Temp repository zip   archive   key  C  Program Files   DrWeb Server etc agent key    only bases   etc  C  Program Files DrWeb Server  Neieow    To create an imported archive with Server only        drwreploader exe   path C  Temp repository zip   archive   key  C  Program Files   DrWeb Server etc agent key    product 20 drwcs   etc  C  Program Files DrWeb  Server etc     8 5  Update Restrictions for Workstations    Via Dr Web Security Control Center you can configure update mode for Dr Web Enterprise  Security Suite at protected workstations in particular time slots     To configure station update mode  perform the following actions     1     Select the Anti virus network item in the main menu  in the opened window click the na
306. t of  installing components  The keys tree structure remains    To update a license key    1  In the main pane of the License Manager in the keys tree  select the key you want to update    2  On the opened key properties panel  click M4 and select the license key file    3  Click Save  A window with installed components settings described in Settings for License Key    Changing  opens   4  Click Save to update the license key        Replace the License Key  In changing a license key  all current license keys are deleted for the licensing object and a new key is    added     To replace the current license key     1  In the main pane of the License Manager in the keys tree  select the key you want to assign to  the licensing object     Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface    2  Click Be Propagate the key to groups and stations on the toolbar  A window with hierarchical  list of stations and groups of anti virus network opens     3  Select licensing object from the list  To select several stations or groups  use CTRL and SHIFT     Click Replace key  A window with installed components settings described in Settings for License  Key Changing  opens   5  Click Save to replace the license key     Extend the List of Object License Keys    In adding a license key  the licensing object saves all current keys  and to the keys list a new license  key is added     To add the license key to the object license keys list     1  In the main p
307. tations  Inheritance is not set and stations settings  considered as a personal     Ei Export settings from this section to the file   save all settings from this section to a file of a  special format     Ei Import settings to this section from the file   replace all settings in this section with settings  from the file of a special format     8 6  Updating Mobile Dr Web Agents    If user s computer  laptop or mobile device has no connection to Dr Web Server for a long time  to  receive updates opportunely from the Dr Web GUS  it is recommended to set the Agent mobile mode  of operation on the station     In the mobile mode the Agent tries to connect to the Server three times and  if unsuccessful   performs an HTTP update  The Agent tries continuously to find the Server at interval of about a  minute     The mobile mode will be available in the Agent settings if the mobile mode of using Dr Web GUS  has been allowed in the station permissions  for more  read p  Permissions of Station Users         189    Ta  2   ww    aX       Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Components   190    When the Agent is functioning in the mobile mode  the Agent is not connected to Dr Web Server   All changes made for this workstation at the Server  will take effect once the Agent mobile mode is  switched off and the connection with the Server is re established     In the mobile mode only virus databases are updated     Description of mobile mode configuration at 
308. ted to each Server        7  Tasks in the Server schedule    To avoid duplicates in queries to the database  it is recommended to execute the following tasks  from the Server schedule only on the one of the Servers  Purge Old Data  Backup sensitive  data  Purge old stations  Purge expired stations  Purge unsent IS events  For example  on  the Server which is located on the same computer as the common external database  Or on the  most productive computer of a cluster  if configuration of the Servers are differ and the database is  located on the separate computer     180    Ta     1       ax        Chapter 8  Updating Dr Web Enterprise Security Suite Software and Its Components   181    Chapter 8  Updating Dr Web Enterprise Security Suite  Software and Its Components    AN Before updating Dr Web Enterprise Security Suite and its components  ensure availability of your  Internet connection     Check that the Internet Protocol is properly configured and DNS server settings are specified  correctly     The anti virus software and virus databases can be updated either manually or through the schedule of  a Server or an Agent     Before updating the anti virus software and virus databases you should set the configuration of the  repository  including access to Dr Web Global Update System as described in Administrator  Manual  p  Editing the Configuration of the Repository          8 1  Updating Dr Web Server and Restoring from the Backup    Control Center provides the following fe
309. that are used in the network     3  Appendices  the drweb esuite 10 appendices en pdf file     1 Administrator documentation contains cross references between three mentioned documents  If  you download these documents to the local computer  cross references work only if documents  are located in the same folder and have their initial names     Administrator documentation does not include the description of Dr Web anti virus packages for  protected computers  For relevant information  please consult User Manuals of Dr Web anti virus  solution for corresponding operating system     Before reading these document make sure you have the latest version of the Manuals  The Manuals are  constantly updated and the current version can always be found at the official web site of Doctor Web  at http   download drweb com esuite         Ta     N    aX        Chapter 1  Welcome to Dr Web   Enterprise Security Suite   10    1 2  Conventions and Abbreviations    Conventions    The following conventions are used in the Manual     Table 1 1  Conventions    wy Marks important notes or instructions   Note  that  Warns about possible errors   A Warning  Dr Web Scanner Names of Dr Web products and components   Anti virus network A term in the position of a definition or a link to a definition    lt  P address gt  Placeholders   Cancel Names of buttons  windows  menu items and other program interface  elements   CTRL Keyboard keys names   C  Windows  Names of files and folders  code examples  input
310. the Agent side is given in the User Manual     Ta  J  i    ax       Chapter 9  Configuring the Additional Components   191    Chapter 9  Configuring the Additional Components    9 1  Proxy Server    The anti virus network may consist of one or several Proxy servers     The main function of a Proxy server is to establish a connection between Dr Web Server and  Dr Web Agents in cases when it is impossible to set up direct access  e g  if Dr Web Server and  Dr Web Agents are located in separate networks which do not have packet routing between them      To establish a connection between the Server and clients via the Proxy server  it is recommended  to disable traffic encryption  For this  it is enough to set the no value for the Encryption parameter  in the Dr Web Server Configuration  gt  General section        General Functions    A proxy server performs the following functions     1   2   3     Network listening and receipt of connections according to the specified protocol and port   Protocol translation  supported protocols  TCP IP      Data transmission between Dr Web Server and Dr Web Agents according to the Proxy server  settings     Caching of Agent and anti virus package updates  which are translated by the Server  In case of  using cache of the Proxy server to translate updates  following are provided     reducing of network traffic     reducing of Agent updates receiving time        Proxy servers can be composed to hierarchical structure     The general diagram of t
311. the Appendices document  p  Appendix H5 5    The task is designed for periodic backups of the repository    Specify the following parameters    e Path   full path of the directory where the backup copy will be stored     e Maximum number of copies   maximum number of repository backup copies  which are stored by the task in the specified directory  If the maximum number of  copies is reached  the oldest copy will be overwritten by the new one     Repository area defines which part of information on anti virus component will be  saved   o Entire repository   save all revisions from the repository for the components  that are selected in the list below   o Only critical revisions   only revisions marked as important will be saved for  the components that are selected in the list below   o Only configuration files   only configuration files will be saved for the  components that are selected in the list below     e Set the flags for the components selected areas of which will be saved   The task is designed to create a report with statistics on the anti virus network     To be able to create a report it is mandatory to enable the Periodic report  notification  see Notification Configuration   The generated report is saved on a  computer where the Server is installed  Report delivery depends on the type of  notification     e For sending messages via Email  a letter with attached report and also the link to  the report location is sent to the mail address which is specified in no
312. the Audit log item of the control menu    3  Window with the registered actions table opens  To configure viewing the log  specify on the toolbar  the time period during which the actions have been performed  For this  you can select one of the  proposed periods or specify arbitrary dates in the calendars which are opened on clicking the dates  fields  Click Refresh to display the log for the selected dates    4  The log table contains the following data      Date   date and time when the action has been performed   e Login   login of the Server administrator  It is specified if the action was initiated directly by  administrator or during connection to the Server according to the administrator credentials       Address   IP address from which the action execution has been initiated  It is specified only in  case of an external connection to the Server  particularly via the Control Center or via the Web  API      Subsystem   the name of the subsystem by which or via which the action has been initiated  The  audit is logged for the following subsystems    e Control Center   the action was performed via Dr Web Security Control Center   particularly by administrator    e Web API   the action was performed via the Web API  e g   from an external software  connected according to the administrator credentials  see also the Appendices document   p  Appendix L  Integration of Web API and Dr Web Enterprise Security Suite     e Server   the action was performed by Dr Web Server  e g   
313. the operation of anti virus facilities on a workstation    e Start Stop   view a list of components which operated on a workstation      Threat statistics   view information on viruses detected on a workstation which are grouped by  type       Status   view data on an unusual state of workstations  which might need your attention    e Tasks   view the list of tasks set for a workstation during a certain period      Products   view information on products installed on selected stations  In this case  products refers  to the Server repository products     e Virus bases   view details on installed virus databases including information on the file containing a  particular database  virus database version  the total number of virus records in the database  the  database creation date  This menu item is available only if stations selected     e Modules   view detailed information on all Dr Web modules including module description   its  function name  the executable file for the separate product  the full module version etc  This menu  item is available only if stations selected       All network installations   view a list of Agent installations on a workstation or group of  workstations       All deinstallations   view the list of workstations with deinstalled Dr Web anti virus software     To show hidden items of the Statistics section  select Administration in the main menu  then in  the opened window select Dr Web Server configuration in the control menu  On the Statistics  ta
314. the stations in the selected groups  To assign  stations certain group  single click it in the Anti virus network list  To select multiple  groups  press the CTRL or the SHIFT key     For administrators    All Apply permission settings for all administrators of the current Server   Select certain Apply permission settings only for the administrators in the selected administrative  administrators groups  To assign certain group  single click it in the Administrators list  To select    multiple groups  press the CTRL or the SHIFT key     4  To manage permissions from the third section  set a flag next to respective permission either in the  Granted or Denied column  to correspondingly allow or deny this permission for the  administrators of editing group     5  Click Save to apply changes     Editing Membership    There are several ways to assign a parent group for an administrator or an  administrative group   1  Change administrator settings or group settings as described above     2  Drag and drop administrator or administrative group from the hierarchical tree to the group you  want to assign as a parent group        72    Ta  yan    A    A        Chapter 5  Groups  Integrated Workstations Management   73       Chapter 5  Groups  Integrated Workstations Management    Grouping is designed to make the administration of anti virus workstations easier     Grouping of stations may be used for the following purposes     Group operations over all stations  included to these groups
315. the window is used to select viewing information     Administration    Administration section of the control menu contains the Neighborhood item  that serves to manage  connections between Servers in a multi server anti virus network  for more details  see Peculiarities of  a Network with Several Dr Web Servers         The hierarchical list represents all of Dr Web Server  connected to this Server     Setting of new interserver connections is described in Setting Connections between Several Dr Web  Servers        Tables    The Tables section of the control menu contains information about the operation of the anti virus  network received from other Servers  see also Peculiarities of a Network with Several Dr Web  Servers         To view the summary tables with data from other Servers  select the corresponding item in the  Tables section     2 3 4  Search Panel    The search panel locates at the top right part of Dr Web Security Control Center and used to  simplify searching for elements  The panel may find both groups and separate stations according to  specified parameters     To find a workstation or group of workstations     1  Select the search criterion in the drop down list of the search panel     Station   to search stations by name     Group   to search groups by name     ID   to search stations and groups by unique identifiers     Description   to search stations and groups by their description     IP address   to search stations by their IP address   e Hardware   to 
316. tics  from the corresponding items of the Table section  To view the report with selected tables  click    Refresh     4  To view the data for certain time period  specify the certain time period relatively today in the drop   down list  or select the arbitrary date range on the toolbar  To select the arbitrary date range  enter  required dates or click the calendar icons next to the date fields  To load data  click Refresh     5  To save the report for printing or future processing  click one of the following buttons        Save data in CSV file   fi Save data in HTML file     fi Save data in XML file   fa Save data in PDF file     6 6 1 2  Scan Statistics    To view the statistics on operation of anti virus programs on a workstation    1  In the hierarchical list select a station or a group     wy If you want to view records for several stations or groups  select these stations keeping the SHIFT or    CTRL key pressed     2  Inthe control menu select Scan Statistics item from the Statistics section     Ta  yan    A    A  Y    Chapter 6  Administration of Workstations   116    3  The Statistics window will be opened  The statistics for last 24 hours are displayed by default     To view the data for certain time period  specify the certain time period relatively today in the drop   down list  or select the arbitrary date range on the toolbar  To select the arbitrary date range  enter  required dates or click the calendar icons next to the date fields  To load data  click Refr
317. tification  settings     e For all other methods of delivery  an appropriate notification with a link to the report  location is sent     To create a task in the schedule you have to specify the following parameters     143    Ta  yan    A    A        Chapter 7  Configuring Dr Web Server    Execute hook    Execute script    License expiration  reminder    Neighbor server has  not connected for a  long time    Purge database    Purge old records    Purge old stations    Purge outdated  messages    e Notifications profiles   name of notifications group with common settings for  report generation  The title name can be specified when creating a new notifications  group     e Report language   language of the data in the report     e Date format   format for dates display in statistic data  The following formats are  available     o European  DD MM YYYY HH MM SS  o American  MM DD YYYY HH MM SS  e Report format   document format to save the statistics report   e Report period   time period for which the statistics will be included in the report     e Groups   list of anti virus network station groups which data will be included in the  report  To select multiple groups  use the CTRL or SHIFT     e Report tables   list of statistical tables which data will be included in the report  To  select multiple tables  use the CTRL or SHIFT     e Report retention period   time period for storing a report on the computer with  running Server  starting from report generation     The task is 
318. tion names and their type are cast to a common view     Also  user can rescan files in Quarantine via the Control Center or via the Quarantine Manager at  the station     To view and manage Quarantine via the Control Center   1  Select the Anti virus network item in the main menu  then click the name of the station or group  in the hierarchical list and select Quarantine in the contro  menu     2  A new window with table that contains Quarantine current state opens  If you selected one  workstation  a table in the window displays objects in Quarantine at this station  If you selected  more than one stations or one or more groups  the windows displays a set of tables with  quarantined objects for each station     3  To filter files by time when they were quarantined  set a time slot on the toolbar and click Refresh     4  To manage files in Quarantine  set the flag for the corresponding file  group of files or for all files  in the Quarantine  at the table header   On the toolbar  select one of the following actions            Restore the files from the Quarantine     A Use this option only if you are sure that objects are harmless     Select one of the options from the drop down list     a  4   Restore the original location of the file  i e  restore the file to the folder where it had resided  before it was moved to the Quarantine     b  Ea   Restore the file to the folder specified by the administrator     Ek Remove files   delete the file from the Quarantine and from the sy
319. tion of Dr Web Scanner parameters is given in the  User Manual for corresponding operating system     5  Click Save  Settings will be saved in the Control Center and transmitted to the corresponding  stations     Dr Web Agent Scanner Parameters Setup    Dr Web Agent Scanner parameters are specified during the launch of stations anti virus check as  described in the Launching Scan on Station section     Ta  yan    A    A        Chapter 6  Administration of Workstations   109    The list of Scanner settings sections which are available     or not available     depends on the mode  of station scan launch and presented in the table below     Table 6 6  The list of Scanner settings sections depending on the scan launch      Dr Web Scanner  Custom scan  Dr Web Scanner  Express scan a F a z    Dr Web Scanner  Complete scan 7 v D       Depending on the operating system of the stations on which the remote scan is launched  only those  part of Scanner settings is available  which is supported by station system     Hy Settings that are not supported in check of stations under UNIX system based and MAS OS X are  marked with the   sign     6 5 4 1  General    wy Settings that are not supported in check of stations under UNIX system based and MAS OS X are  marked with the H sign     In the General section  you can configure the following settings of anti virus check   e Set the Use heuristic analysis flag so Scanner will check for unknown viruses via the heuristic  analyzer  In this mode t
320. tions Management    5 4  Using Groups to Configure Stations    Stations settings can be     1  Inherited from the primary group   2  Specified personally           Inherited Settings    For created group  its settings are inherited from the parental group or from the Everyone group  if  the parental group is not specified     For created station  its settings are inherited for the primary group     wy For more details  see the Inheriting Stations Configuration from Groups  Primary Groups section        When viewing or editing workstation configuration inherited from the primary group  a notification that  the settings are inherited from the primary group will be displayed in correspondent windows     You can set different configurations for different groups and stations  by editing corresponding settings        Personal Settings    To set the personal settings for the station  edit corresponding settings section  see p  Management_of  Stations Configuration   In the settings section  notification that the settings are set personally for the  station will be displayed     If the personal settings are specified for the station  personal group settings and their changing will not  have any affect on station settings     You can restore the configuration inherited from the primary group  To do this  click the iR Remove  personal settings button in the toolbar of Dr Web Security Contro  Center  in the corresponding  parameters section or in the station settings section     5 4 1  
321. tions import mode drop   down list  select one of the collision resolving option    e Save import data for all   delete all information on duplicated objects from the current  Server database and overwrite it with the information from the imported database  The  action is applied simultaneously to all duplicated objects in this table    e Save current data for all   save all information on duplicated objects from the current  Server database  Information on duplicated objects from the imported database will be  ignored  The action is applied simultaneously to all duplicated objects in this table    e Select manually   specify the action for each duplicated objects manually  In this mode   the list of duplicated objects become editable  Set the options for those objects  which will  be saved     Click Save     Ta  J  1       ax       Chapter 7  Configuring Dr Web Server    Back up    To back up Server critical data  click    Backup on the toolbar  The data will be saved into gz archive   Backup files are similar to files which are obtained when running the Server executable file from the  command line with the backup switch     This command is described in details in the Appendices documents  in the H3 5  Backup of Dr Web  Server Critical Data           7 9 2  Dr Web Server Statistics    Via the Control Center  you can view the statistics on Dr Web Server operating on the level of  system resources usage of a computer on which Dr Web Server is installed and also network  inter
322. tree     To move a hook to the other group     1  In the hooks tree  select a hook you want to move     2  On the opened properties pane  in the Parent group drop down list  select the group into which  you want to move the hook     3  Click Save     Hooks Managing    To create a new hook     1  On the toolbar  select  P  gt  J    Add hook   2  In the opened window  specify the following parameters     Set the Enable hook execution flag to activate the creating hook  See also Hooks activating       In the Parent group drop down list  select the group into which you want to place the creating  hook  Further  you can move the hook into other group   see above      In the Hook drop down list  select the hook type  The hook type defines an action for which the  hook will be called      In the Hook text field  enter the lua script which will be executed when the hook called   The Information on hook subsection contains an action for which the hook will be called   information whether the Server database is available or not for this hook  and also contains the  lists of input parameters and returned values for this type of hook     3  Click Save   To edit a hook     1  In the hooks tree  select a hook you want to edit    2  In the right part of the window  the properties pane for this procedure automatically opens  You can  edit all parameters which are specified on creating the hook except the Hook parameter  This  parameter defines an action for which the hook will be called  and
323. tro  Center should  be run on the computer of the administrator and a connection to the Server should be established     From any computer with network access to the Server  Dr Web Security Control Center is available  at the following address     http     lt Server_Address gt   9080    or  https     lt Server_Address gt   9081    where  lt Server_Address gt  is the IP address or domain name for the computer on which Dr Web  Server is installed     In the authorization dialog window specify the user name and password of the administrator  by  default  administrator name is admin and the password is the same  as was specified during Server  installation  see Installation Manual  p  Installing Dr Web Server         If registration at the Server is successful  the main Dr Web Security Control Center window will be  opened  In this window information on the anti virus network managed from this Server can be viewed   for details  see p  Dr  Web Security Control Center         Anti virus Network Managing    Now you can administer the Server and the anti virus network        create anti virus stations  see Installation Manual  p  Installing Dr Web Agent      approve stations      edit  configure and remove anti virus stations  see Chapter 6  Administration of Workstations         configure and edit connections with neighbor Dr Web Servers  see Peculiarities of a Network with  Several Dr Web Servers      e view logs of current and neighbor Dr Web Servers and other data               
324. ts    Chapter 9  Configuring the Additional Components  9 1  Proxy Server  9 2  NAP Validator    149  149  150  151  153  153  157  157  158  159  159  160  162  165  167  167  169  170  171  171  173  177  178    181  181  183  183  184  184  185  188  189   191  191  194    197    Thar   LO    Index    Ta  J  1       ax       Chapter 1  Welcome to Dr Web   Enterprise Security Suite   9    Chapter 1  Welcome to Dr Web   Enterprise Security  Suite    1 1  Introduction    Documentation of Dr Web   Enterprise Security Suite anti virus network administrator is intended to  introduce general features and provide detailed information on the organization of the complex anti   virus protection of corporate computers using Dr  Web   Enterprise Security Suite     Documentation of Dr Web   Enterprise Security Suite anti virus network administrator contains the  following parts     1  Installation Manual  the drweb esuite 10 install manual en pdf file   2  Administrator Manual  the drweb esuite 10 admin manual en pdf file     Administrator Manual is meant for anti virus network administrator   the employee of organization  who is responsible for the anti virus protection of computers  workstations and servers  of this  network    Anti virus network administrator should either have a system administrator privileges or work closely  with a local network administrator  be competent in anti virus protection strategy and know in  detailes Dr Web anti virus packages for all operating systems 
325. ts in the specific folder     Stations under OS X     Anti virus check  Scans a computer on user demand and according to the schedule  Also the remote launch of  anti virus scan of stations from the Control Center is supported    File monitor  The constant file system protection in the real time mode  Checks all launched processes and  also created files on hard drives and opened files on removable media    Quarantine  Isolates malware and suspicious objects in the specific folder     Mobile devices under Android OS  Anti virus check    Scans a mobile device on user demand and according to the schedule  Also the remote launch  of anti virus scan of stations from the Control Center is supported     File monitor  The constant file system protection in the real time mode  The check of all files as they are  saved in the memory of the device    Calls and SMS Filter    Filtering the incoming phone calls and SMS allows to block the undesired messages and calls   such as advertisements or messages and calls from unknown numbers     Anti theft   Detect the device location or lock its functions in case it has been lost or stolen   Restricting Internet Access   URL filter allows to protect user of the mobile device from unsolicited Internet sites   Firewall    Protects the mobile device from external unauthorized access and prevents leak of vital data  via Internet  Monitors connection attempts and data transfer via the Internet and blocks  suspicious connections both on network and ap
326. twork Administrators   70    2  In the administrators hierarchical list  select administrative account or administrative group you  want to delete     3  Click the 9  Remove selected objects icon in the toolbar   4 3 2  Editing Administrative Accounts and Groups      To edit accounts of administrators and administrative groups  you need to have the Editing  administrative accounts and Editing administrative group configuration properties  privileges permissions     Fields marked with the   sign must be specified     Editing Administrators    To edit an administrative account     1  Select the account you want to edit from the list of administrative accounts  Click the account name  to open its properties section for editing     2  The Main subsection contains properties that were set during account creation  Also  please note     a  To change the password for the administrative account  click the Pad Change password icon on  the toolbar     w An administrator with corresponding permissions can change passwords of all other administrators     A Login for administrative account cannot contain national characters     b  The following properties of the administrator account are read only     Account creation date and its properties last change date     Status   displays network address of the last connection under the current account     3  In the Groups subsection  you can change an administrative group  The list contains groups to  which an administrator can be assigned  The fl
327. ty emulation flag to prevent any changes in Dr Web operation  except  those made manually by user     100    Ta  2   1    ax       Chapter 6  Administration of Workstations   101      Set the Connect to cloud services flag to connect the station to Doctor Web cloud services  This  allows anti virus components of the station to check the data on threats according to the information  received in real time mode from Doctor Web servers  In turn  data about Dr Web components  operation on the station will be automatically sent to Doctor Web servers     6 4 2 2  Network    On the Network tab  you can specify parameters determining interaction with the Server    e In the Public key field specify the public encryption key of Dr Web Server  drwcsd pub  which is  stored at the station  To select the key file  click el  Several public keys can be stored at the station at the same time  e g   during the process of    encryption keys replacement or during moving from one Server to another  Note that keys must be  unique  i e  you cannot specify two similar public keys     To add one more public key  click    and select the key file     To remove existing key from the station  click        wy If the Allow operating without public key flag is cleared  you cannot remove the last public key       Set the Allow operating without public key flag to allow connecting Agents  if they do not have public  encryption key  drwcsd  pub  or the file has incorrect structure       Set the Allow operating 
328. uter after the check is completed     e shutdown station     shutdown the user computer after the check is complete  Before shutdown  the computer  the Scanner applies specified actions to detected threats     A  yan    Aq    A        Chapter 6  Administration of Workstations   110    e reboot station   restart the user computer after the check is complete  Before restart the  computer  the Scanner applies specified actions to detected threats     e suspend station   e hibernate station       Set the Disable network while scanning flag to disable network and Internet connections during  scanning process       Set the Scan fixed volumes flag to scan fixed hard drives  hard disk drives  etc          Set the Scan removable media flag to scan all removable data storages such as floppy or CD DVD  disks  flash drives etc       In the Paths selected for scan field  specify the list of checked paths  how to specify paths is  described below      e To add a new string to the list  click   and specify required path to the opened string     e To remove an item from the list  click     next to the corresponding string     If you set the Paths selected for scan flag  only specified paths will be scanned  If the flag is  cleared  all disks will be checked     6 5 4 2  Actions    wy Settings that are not supported in check of stations under UNIX system based and MAS OS X are  marked with the   sign     On the Actions tab  you can configure reactions of Scanner on detection of infected or su
329. utside the anti virus network  Dr Web Agent uses the local copy of the  settings and the anti virus protection on that computer retains its functionality  up to the expiry of the  user s license   but virus databases and program files are not updated     Updating of mobile Agents is described in p  Updating Mobile Agents        Basic Functions    Dr Web Agent is designed to perform the following       installs  updates and sets up the anti virus package  starts scans  and performs other tasks given by  Dr Web Server    e allows to call for execution the Dr Web anti virus package files through a special interface    e sends the results of tasks execution to Dr  Web Server     e sends notifications of predefined events in the operation of the anti virus package to Dr Web  Server     Every Dr Web Agent is connected to Dr Web Server and is included in one or several groups  registered on this Server  for more  see p  System_and User Groups   The Agent and Dr Web Server  communicate through the protocol used in the local network  TCP IP of 4 or 6 version         Hereinafter a computer on which Dr Web Agent is installed as per its functions in the anti virus  network will be called a workstation  while in the local network it can be functioning both as a server  or a workstation     2 3  Dr Web Security Control Center    To manage the anti virus network and set up the Server  the in built Dr Web Security Control  Center serves     For correct functioning of Dr Web Security Control 
330. wed list     5  To deny specific TCP address  include it into the TCP  Denied or TCPv6  Denied list   To edit the address list    1  Specify the address in the corresponding field and click Save    2  To add a new field  click the Ma button in the corresponding section     3  To delete a field  click       The network address is specified as   lt  P address gt      lt prefix gt       wy Lists for TCPv6 addresses will be available  if the IPv6 interface is installed on the computer     Examples of prefix usage   1  Prefix 24 stands for a network with a network mask  255 255 255 0    Containing 254 addresses   Host addresses look like  195 136 12      2  Prefix 8 stands for a network with a network mask  255 0 0 0  Containing up to 16387064 addresses  256 256 256      Host addresses look like  125          134    Ta  J  i    ax       Chapter 7  Configuring Dr Web Server   135    The addresses not included into any of the lists are allowed or denied depending on whether the  Denial priority flag is set  If the flag is set  the Denied list has a higher priority than the Allowed  list  Addresses not included in any of the lists or included into both of them are denied  Allowed only  addresses that are included in the Allowed list and not included in the Denied list     7 2 5  Cache    On the Cache tab  you can configure the following parameters of Server cache cleanup     Cache flush period     period of full cache flush      Quarantined files     cleanup interval of quarantined f
331. wing elements   1  Direct path in the explicit form to the excluded object  And     A character   or   excludes the entire disc with the Windows OS installation folder     A character   at the end of a path excludes the folder from checking     112    Ta  J  1       ax       Chapter 6  Administration of Workstations   113      A path without a character   at the end   all subfolders of the selected folder are excluded from  checking     For example  c  windows   skip scanning files of the c  windows folder and all its subfolders     2  Masks of objects  excluded from the scan  The   and the   symbols can be used to specify masks     For example  c  Windows     dll   C  Windows  skip scanning all files with the dll  extension at all subfolders of the c   Windows folder     3  Regular expression  Paths can be specified through regular expressions  Any file those full name   with the path  corresponds to a regular expression is excluded from checking     Before starting Dr Web Scanner for Windows familiarize yourself with recommendations on virus  scanning for computers operated by Windows Server 2003 OS  Windows 2000  or Windows XP OS   The information can be found at http   support microsoft com kb 822158 en  The article is meant to  help you increase system performance        The syntax of regular expressions used for excluding paths from scanning is as follows   qr expression flags    As a flag mostly the character i is used  It instructs  to ignore letter case difference   
332. wing ways     For Windows OS    General case     e Using the corresponding command  located in the Start     Programs     Dr Web Server menu     e Via the services management tools in the Administrative Tools section at the Control Panel of    Windows OS     Ta  J  i    ax       Chapter 2  Components of an Anti Virus Network and Their Interface   27      Stop and restart via the Control Center   e In the Administration section  use buttons   f to restart  24 to stop     e Using the console commands run from the bin subfolder of the Server installation folder  see also  the Appendices document  p  H3  Dr Web Server      e drwcesd start     start the Server   e drwcsd restart  total restart of the Server service   e drwcsd stop     normal shutdown of the Server        Please note  if you need the Server to read environment variables  the service must be rebooted via  the services management tools or via the console command     2 1 2  Dr Web Server Management under UNIX   System Based OS    Interface and Dr Web Server Management    Dr Web Server has no interface  As a rule  Dr Web Server can be managed via Dr Web Security  Control Center which acts as an interface for the Server     Dr Web Server installation folder has the following structure      opt drwcs  for Linux and Solaris OS and  usr local drwcs for FreeBSD OS   e bin     Dr Web Server executable files   e doc     license agreements files   e ds modules  e fonts     fonts for Control Center interface     e Installer    
333. with invalid public key flag to allow connecting Agents  if they have incorrect  public encryption key  drwcsd  pub        In the Server field  you can specify the address of Dr  Web Server  You may leave this field blank  Then the  Agent will use as the address of Dr Web Server the value of the parameter that is set on the user   s local  computer  the address of the Server from which the installation performed      Either one Server address or several different Servers addresses can be set  To add one more    Server  click   and specify an address in the added field  Format of Server network addresses is    described in the Appendices document  in the Appendix E  The Specification of Network Addresses  section     Server address example     tcp 10 4 0 18 2193  tcp 10 4 0 19  10 4 0 20    If the Server parameter is set incorrectly  the Agents will disconnect from the Server and will not  be able to reconnect  In this case you will have to set the Server address on the stations directly       In the Search retries number field  set the parameter determining the number of attempts to find  Dr Web Server via the connection using the Mulicasting mode     e In the Search timeout  sec   field  set the interval between attempts to find Dr Web Server in  seconds via the connection using the Mulicasting mode      The Compression mode and Encryption mode fields determine the compression and encryption  settings of network traffic correspondingly  also see p  Traffic Encryption and Com
334. xplorer Browser Helper Objects   BHO     Program autorun Software Microsoft Windows CurrentVersion Run  Software Microsoft Windows CurrentVersion RunOnce  Software Microsoft Windows CurrentVersion RunOnceEx  Software Microsoft Windows CurrentVersion RunOnce Setup  Software Microsoft Windows CurrentVersion RunOnceEx Setup  Software Microsoft Windows CurrentVersion RunServices  Software Microsoft Windows CurrentVersion RunServicesOnce   Policy autorun Software Microsoft Windows CurrentVersion Policies Explorer Run   Safe mode configuration SYSTEM ControlSetXxxX Control SafeBoot Minimal  SYSTEM ControlSetxxxX Control SafeBoot Network    Session Manager parameters System ControlSetXxxX Control Session Manager SubSystems  Windows    Ta     1       ax        Chapter 6  Administration of Workstations    System services System CurrentControlXXX Services    L If any problems occur during installation of important Microsoft updates or installation and operation  of programs  including defragmentation programs   disable the corresponding options in this group     6 4 3  SpIDer Mail for Windows   Configuration  Application Filter    Application filter allows to configure manual interception of mail traffic  In this mode  SpIDer Mail  serves as a proxy between mail clients and mail servers and intercepts only those connections that are  explicitly defined in the settings  To use this mode  you need also to configure mail clients on stations     The list of intercepted addresses includes r
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
BT-DPRF-02 WICHTIG! Vor Installation das Installations  Hunter Fan 23920 Fan User Manual  Arizona Instruments Jerome 631 Hydrogen Sulfide Analyzer  User Manual - I  SERIE PGL - Adam Equipment    Receptor Digital Satélite SRT 6006  Mounting the Access Point  Manual - PDF 315K  PLUSH + PLAY    Copyright © All rights reserved. 
   Failed to retrieve file