escan content admin user guide content... · 2008-11-07 · escan content security user guide 8...

81
eScan Content Security User Guide 1 This document provides information to operate Content Administrator and Updater Modules of eScan eScan Content Security User Guide

Upload: others

Post on 06-Jul-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 1

This document provides information to operate Content Administrator and Updater Modules of eScan

eScan Content Security User Guide

Page 2: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 2

eScan User Guide

The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

Document Number : 5BESCA/21.12.05/8.x

Copyright (C) 2006. All rights Reserved.

Portions (C) by Kaspersky Labs International Limited.

Any technical documentation that is made available by MicroWorld is the copyrighted work of MicroWorld and is owned by MicroWorld.

NO WARRANTY. The technical documentation is being delivered to you AS-IS and MicroWorld makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user.

Documentation may include technical or other inaccuracies or typographical errors. MicroWorld reserves the right to make change without prior notice.

No part of this publication may be copied without the express written permission of MicroWorld.

Trademarks.

MicroWorld, MicroWorld Logo, eScan, eScan logo, MWL, MailScan are trademarks of MicroWorld.

Windows is a registered trademark of Microsoft Corporation; Kaspersky is a registered trademark of Kaspersky Labs.

All product names referenced herein are trademarks or registered trademarks of their respective companies. MicroWorld Software Services Pvt. Ltd. (MicroWorld) disclaims proprietary interest in the marks and names of others. Although MicroWorld makes every effort to ensure that this information is accurate, MicroWorld will not be liable for any errors or omission of facts contained herein. MicroWorld Software Services Pvt. Ltd. reserves the right to modify specifications cited in this document without prior notice.

Companies, names and data used in examples herein are fictitious unless otherwise noted.

No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of MicroWorld Software Services Pvt. Ltd.

Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged.

Technical Support: [email protected]

Sales: [email protected]

Printed : MicroWorld

January, 2006

Page 3: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 3

Table of Contents

Welcome 5 Documentation 6 How this guide is organized 7 Contact Us 8

About MicroWorld 9 MWL Technology 10 eScan Products Suite and Features 11 Features of eScan 12

eScan Tasks 13 Topics in eScan Tasks 13 To launch e Scan tasks 13 Details of eScan tasks 13

Getting Started 18 User Interface 18

Configure eScan Updater 19 Topics in Configure eScan Updater 20 Important Terms in Configure Updater 21 Launch eScan Updater 22 Set General Config 23 Set FTP Config 28 Set HTTP Config 30 Set UNC Config 30

eScan Content Administrator 31

Page 4: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 4

Topics in eScan Content Administrator 33 Important Terms in Content Administration 34 To launch Content Administrator 34

Help Menu 35 License Information 35 Change Password 35 e-mail Attachment Control 36 e-mail Content Scanning and Spam Killer 43 Webpage Scanning 48 eScan Notification and Scan Control 67 File Rights 67 PopUp Filter 54 Browser Cleanup 57

General Details 70 View Log Files 72 Flush / Delete Logs 72 Import/ Export 70

Frequently Asked Questions 73 Index 79

Page 5: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 5

Welcome

MicroWorld Content Security and Anti-Virus products, provide a blanket, round-the-clock security screen against viruses delivered into your PC or network. After the software is installed it is always active. You can carry out your normal work, surf the net, exchange mails, download your favorite programs, run them and so on, secure in the knowledge that you are protected from virus attacks.

eScan Content Security and Anti-Virus application is delivered in listed modules:

eScan for Windows: Provides an On Demand Scanner (ODS) to quickly scan your system for virus and other threats.

eScan Anti-Virus Monitor: Provides an Anti-Virus engine to scan and protect your system against virus and other threats.

eScan Updater: Allows you to download updates to detect and remove new viruses.

Content Administrator: Allows you to set security policies to permit or prohibit specific type of content from bring accessed.

eScan Management Console. Allows you to remotely configure and administer the eScan network, installed on multiple clients.

View TCP Toolkit: Allows us to monitor active network connections to a eScan Client

MicroWorld AntiVirus Toolkit : Latest version is 8.x, helps to eliminate Spyware, & KeyLoggers

Access to these modules depends on the version of eScan you are using. For more details, please refer to the section eScan Products. To know which modules are included with a particular product, refer to the Product Suite and Features.

Page 6: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 6

Documentation eScan user guides are provided in four books. Each book covers a specific module(s). Following table provides details of the user guides and the eScan product for which they are provided.

Manual Name Description eScan Products covered

eScan Quick Reference Guide

Instructions to install eScan products and a quick reference guide for all modules.

Common guide for all eScan products.

eScan Anti Virus User Guide

Instructions to use eScan ODS and AV Monitor.

Common guide for all eScan products

eScan Content Security User Guide

Instructions to use eScan Content Administrator and eScan Updater

Provided with eScan Corporate and eScan for Proxy Servers

eServ User Guide Instructions to use eServ or the eScan Management Console

Provided with eScan Corporate and eScan for Proxy Servers

Page 7: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 7

How this guide is organized This guide is organized into separate chapters.

Overview: Provides details of MWL technology (MicroWorld Winsock Layer) technology on which our products are built and eScan Products, which gives a break up of different eScan products and modules available with them. Also listed are detailed Features of eScan. Getting Started Gives a list of key symbols and their functions. eScan Updater: Updates are vaccines created by MicroWorld to fight latest viruses and are stored in dedicated download mirror sites. This chapter explains how to configure eScan Updater to automatically download updates and run them on your system, select and configure download modes. eScan Content Administrator: Content administration involves setting policies to control Net use. This section explains how to block Spam and attachments, how to block porn and other harmful sites. Information is also given about PopUp blocker that blocks popups and Browser Cleanup that removes traces of sites you have visited.

Page 8: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 8

Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat.

Chat Support Chat with our support team at ‘escanchat’ using: MSN or Yahoo messenger service.

E-Mail Support If you have any queries about our products or have suggestions and comments about this guide, please send them to [email protected]:

Head Office:

MicroWorld Technologies Inc. 33045 Hamilton Court East, Suite 105

Farmington Hills, MI 48334-3385

USA

Tel: (248) 848 9081/9084

Fax: (248) 848 9085

Asia Pacific:

MicroWorld Software Services Pvt Ltd.. Plot No 80, Road 15, MIDC, Marol,

Andheri (E), Mumbai,

INDIA.

Tel (91) - 22- 28265701 - 05

Fax (91) - 22-28304750

For sales enquiry, e-mail: [email protected]

For support enquiry, e-mail: [email protected]

Page 9: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 9

About MicroWorld

MicroWorld is one of the leading solution providers in the areas of content security and Anti-Virus products. With its corporate head quarters in MI, USA and development center in Mumbai, India, we offer round-the-clock support, through our regional offices and over 10,000 channel partners spread across the globe. This section provides information about eScan. Details about its features are given.

eScan is a comprehensive Content Security and Traffic Scanning software package that checks the content in e-mails and its attachments for viruses. Checks are done for viruses, restricted words and phrases, embedded objects such as Java applets etc, before the e-mails reach you. It thus offers unprecedented "real-time" security at various levels in any organization, from the Internet Gateway to your desktop.

It is also synchronized with the Internet to provide real-time security for your organization. It offers a Centralized Security Management System. This feature allows your network administrator to configure Global Security Policies for the organization from a single console.

eScan is also designed to understand different file types, data-streams and compression formats. It can look inside data-streams and identify complex file architecture. It has a user-friendly interface and you can automatically download Updates from our download site. This gives you the "ultimate convenience and confidence in computing".

This chapter provides details about the following topics:

MWL Technology

eScan Products

Features of eScan

Page 10: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 10

MWL Technology

Our products are built on the MicroWorld Winsock Technology (MWL) (patent pending). This technology gives MicroWorld products a more advanced means to protect your computer from virus and other attacks. When you connect to the Internet, you do so through the Windows Socket (Winsock) layer. The Winsock layer acts as an interface between your computer application and the Internet. It does its work very efficiently and you can surf the net, download programs, etc. unhindered. But it never distinguishes between a virus infected file and a clean one.

Our MWL layer sits on the Winsock layer. It checks and analysis all traffic between your system and the Internet. All e-mails, attachments, downloads etc are scanned before they enter your system thus providing you a secure blanket. Our applications have a vast database of all known viruses and other threats. MWL ensures that any files with these known threats are barred from entering your system.

Virus infected files display suspicious forms, content or have strange codes. MWL recognizes any file, e-mail, attachment etc, which look strange or suspicious. Such objects are barred from entering your system. Products made by other manufacturers do not stop threats from entering your system. They allow them entry, permit them to infect files and then wait for the obsolete Anti-Virus software you have installed to identify them. IF and when these threats are identified, then the obsolete Anti-Virus software tries to disinfect the files. The whole process is subject to jargon like ‘possible scenarios’ ‘ threat perception’ etc. You loose priceless data and spend valuable time in removing a threat, which should not have been allowed into your system in the first place.

MicroWorld endorses the timeless proverb “prevention is better than a cure”. Stop the threat from entering your system. There is no way a threat can bypass the MWL technology and compromise your system. The first time you install our product, our Anti-Virus software thoroughly checks your system and removes all known virus. If new or unknown threats are discovered, you can delete or quarantine these files. Mail us a copy of the file and we will get back to you with possible means to tackle them.

We provide constant updates in dedicated download sites to tackle new threats. These updates are typically up to 10 KB and download very fast. You can setup eScan to automatically connect to these sites, download updates and run them on your system.

Page 11: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 11

eScan Products Suite and Features Feature Web&

Mail Filter

eScan AV

eScan VC

eScan Pro

eScan ISS

eScan Corp

eScan WSS

*

eScan TSS **

eScan Enterprise

eScan SBS

4.5/2000

eScan Proxy ##

MWL Scanning Real-Time AVScanning - Auto Attachment Compression

- -

Block offensive mails - - Block Spam - - Real-time email Scan # - -

NetBIOS Firewall HTTP Scanning - - Block sites with restricted words

- -

Auto Updates Block Content( Multi- media& Applications)

- -

Block Applets, cookies, scripts

- -

Privacy Protection - - - - Block Pop Ups - - - - Warning Messages - - Management Console - - - - - MailScan Lite - - - - - - SpyWare & KeyLoggers

- $

MailScan Full Version - - - - - - - - eScan RemoteAdmin - - - - - View TCP Toolkit Max Users UNL 50 50 50 50 UNL 25 25 UNL UNL UNL Supported OS WKS WKS WKS WKS WKS SRV

WKS SRV WKS

SRV WKS

SRV WKS

SRV WKS

SRV WKS

Recommended

For Use @

Home Home Home Home Home Lan/ Wan

SME SME Enterprise Networks

SBS Server

Proxy Server

* WSS: eScan Corp for SME ** TSS: MailScan (Except MailScan for SMTP) + eScan Corp UNL – Unlimited User License SME – Small/ Medium Enterprise

## Proxy Servers : MS ISA Proxy Server, WinRoute Proxy Server, WinGate Proxy Server

Platform Class : SRV – Server Class OS -> WinNT/ Win2000 / Win2003 WKS – WorkStation OS -> Win9x/ NT WorkStation/ Win2k Pro/ WinXP

VC: Virus Control Pro: Professional ISS: Internet Security Suite Corp: Corporate WSS: WorkGroup Security Suite TSS: Total Security Suite # Content and attachment only, mails will not be scanned for virus $ Enterprise networks with FileServers, Desktops & MailServers

Page 12: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 12

Features of eScan The main features and tasks eScan does for you are:

Content Security: Checks and blocks e-mails and websites for restricted content.

E-mail Content Scanning: Checks the e-mail body for confidential data (specified keywords, phrases, etc.) and prohibited content.

Detects Viruses on-the-fly: Protects applications and Operating Systems by detecting viruses as you download files from the Internet, browse Websites, copy files from floppies and CD ROMs, start applications from the network or open Microsoft Word or Excel documents.

Parental Control: eScan auto blocks access to porn, gambling & other sites that have harmful content. You can specify restricted words like xxx, sluts, etc. that should be blocked. Any web page with such words is blocked.

Pop-Up Ad Blocker: Stops pop-ups from being displayed on your system. You can create a white list to allow PopUps for specific sites. Hot key allows you to temporarily allow pop-ups.

Privacy Protection: Auto erase tracks of sites you visit, paths to opened files, downloads, etc.

Easy to Manage and Control: Easy to manage and control with features such as automated installation, centralized deployment, automatic downloads of Updates.

Comprehensive Object Management: eScan understands different file types, compression formats and data streams. It looks inside the Internet traffic and identifies complex architecture.

Fast Updates reduce download time: eScan downloads the latest Anti-Virus Updates quickly and efficiently. Using an incremental update procedure, it downloads only the changes in the virus pattern file. This ensures that downloads are restricted to only fresh items and you do not download older material.

Safe e-mail Virus Scanning: E-mails that you receive in your POP3 mailbox (Outlook, Netscape, Eudora, etc) are automatically scanned for virus. Personal Folders that allow you to store your e-mails and other data locally are also scanned for viruses. It also scans mails sent through SMTP.

Messaging Options: eScan allows System Administrators to collect scanning and Anti Virus activity reports centrally, consolidate them and e-mail them (via SMTP) to any e-mail ID. This helps them to keep track of outbreaks and their source.

File Rights: Prevents creation or modification of executable files on the system by remote access

Page 13: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 13

Note: These are in general features, may not applicable for all Version of eScan. Kindly go through the product comparison first.

eScan Tasks

eScan has a group of tasks for Content Security and Anti-Virus scanning. By default, the software is configured to execute them automatically. You can run some of the tasks manually. This section provides a list of different tasks, manually run with eScan. Detailed explanations of the tasks, meanings of fields etc are described in successive individual chapters. Full details of each task are explained in the respective chapters.

Topics in eScan Tasks The chapter provides details about the following topics:

To launch eScan tasks

Details of eScan tasks

To launch e Scan tasks

After the application is installed, in the application status bar, right click on .

A popup menu is displayed. Shortcuts to quickly run eScan tasks are displayed. Click on the required task to open it.

Details of eScan tasks

Task Name Function

Start eScan for Windows

Starts eScan On Demand Scanner (ODS) on your system. ODS allows you to manually scan your system or modify pre-configured settings.

Page 14: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 14

Task Name Function

Start eScan Content

Administrator

Starts the eScan Content Administrator. This feature is available for PRO, Proxy, Corporate, ISS, AV & VC versions of eScan.

Scan Floppy Disk

Manually scans floppies, ZIP floppies. Select the link and enter the drive name. Insert the floppy and choose Scan now.

You can also scan CDROMs, Tape drives, Optical discs, etc. Since these media are read only, viruses can be only detected and cannot be removed. MicroWorld recommends that you discard such media.

eScan Updater Options

Allows you to configure settings of auto downloading of updates. Details are given in Chapter 8.

Download eScan Update

Allows you to manually download updates from our download site. Download sites are predefined in the “eScan Updater Options”. Select the link to begin manual download of updates. Status bar shows progress

View Log Files

View Management Console Log: Displays details of connections to the eScan Server from the nodes for updates

View eMail Log View log files of eMail activity.

View Auto Update Log View details of files that have automatically updated.

View Download Log View list of update files, downloaded

View Weekly Virus List View virus names, sent by MicroWorld every week.

View Web Page Scan Log View details of web page scan log

View Popup Filter Log View details of PopUps blocked

View Monitor Log: View activity of eScan Anti-Virus Monitor

Page 15: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 15

Task Name Function

Send Debug Information

eScan allows you to mail debug information to MicroWorld support. Select the link to open a dialog box. Enter the relevant details and select OK.

Disable eMail/Web Scanning

Allows you to enable or disable scanning. When you see the link saying 'Disable eMail/Web Scanning' then it means that eScan is active and running. If you click the link then the link changes to 'Enable eMail/WebScanning' and means that scanning is disabled. When scanning is disabled, then all features like Web Scanning, Popup Blocker, eMail Content Scanning, Virus Scanning in eMails, etc is disabled. MicroWorld recommends that you do not disable this option.

Enable File Rights

Allows you to enable file rights feature of eScan. For more information refer File Rights

Auto-Download is

Enabled

The non-editable display field shows that auto download of updates is enabled.

Monitor Settings

The link opens eScan Monitor. The Monitor allows you to configure anti-virus settings that protect your system from virus and other threats. When you click on the link, the following popup is displayed:

eScan Monitor Settings: Opens eScan Monitor. Configure your anti-virus settings.

Disable eScan Monitor: eScan Monitor stops running if you select this link. Use this menu with caution. When the menu is clicked once, the name changes to Enable eScan Settings.

Unload eScan Monitor: eScan Monitor is removed from your system.

Set to Default: Default eScan Monitor settings are restored.

Low Security Mode

This mode is used typically for Windows 9X machines that have a lower configuration.

Medium Security (Fast

Scanning of specified files types is done and this results in faster scanning. Some file types like .exe, .dll, .txt are used as virus carriers and

Page 16: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 16

Task Name Function

Mode) only these are scanned. Other files types like .jpg, pdf which are not known to be virus carriers are exempted from scanning.

High Security (Slow Mode)

Scanning of all file types is done. This results in a slower but thorough scanning.

TCP Connections

To view active TCP/ UDP network connections to the current machine

System Information

Displays details of system where our application is installed. Following screen is displayed. There are two links in the left frame: Details and Sharepoints.

“Details”

Provides details of individual system components. Select the link to see Figure Details of System. There are different tabs pages. A brief description of each is given.

Machine All your system details are displayed. These include: machine identification, BIOS info, boot information etc.

Network Displays network details like: Network adapters, IP addresses, protocols, services, clients, and details of Winsock etc.

Devices Displays all software and hardware devices connected to the system.

Printers Displays all printer devices like hard copy printers, pdf writers etc and the port they connect.

Engines Shows names of all database engines, drivers and devices on your system.

Drives Details of drives on the machine, CPU size and free space, pattern of use etc. are displayed.

Time Zone Displays time zone details where the system is located.

Page 17: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 17

Task Name Function

Processes Displays list of all active applications running on your system.

Startup Displays applications loaded at start up.

Software Lists all software’s, installed and available on the system.

Windows 98 Displays operating system details like name, version etc. Also listed are the default application folders of the system, their path and location, environment, etc.

CPU Displays details of the central processing unit of your system. Details like identification, features, cache, etc are given.

Memory Shows details of system memory like: memory measuring, memory utilization memory properties, etc. are displayed.

Display Gives details of adapters, its properties, capabilities etc.

APM Shows status of advance power management, battery status, etc.

Media Lists names of available devices and sound devices.

"Sharepoints" Provides details of components of your system, accessed by other systems. Select link to see following screen. The features are only enabled for Win NT/2000/ XP/ 2003. There are three tab sheets.

Shares There are two frames. Top frame, displays all folders shared by your system with other machines. Bottom frame shows all list of all machines connected to your system.

Sessions Displays list of machines connected to your system. Details like username, type, files accessed etc. are shown.

Open Files Displays list of all files that are accessed, name of machine accessing the file etc.

About eScan Displays details of eScan software like versions number, application name, copyright notice etc.

Page 18: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 18

Task Name Function

Exit Select the link to exit.

eScan Management

Console

Click on the icon to launch eServ. Details are provided in chapter 10. Available with all Proxy and Corporate related versions of eScan

Getting Started

This chapter gives details of standard conventions used in this guide. Also included are components of a typical user interface, how to navigate the screens, meanings of various symbols and buttons, types of fields and how to enter values in them.

User Interface

User interface is the front end of the software. The software is made of different screens. You carry out tasks; enter values, set preferences, etc., using screens.

Screen Component

Function

Configure settings for attachments sent or received through emails

Configure Scanner Administration and Compression Control.

Configure settings to block popup Ads from being displayed on your screen.

Configure to allow or bar remote users to modify specific file types.

Configure settings to remove traces of sites you visit and enable privacy protection.

Page 19: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 19

Screen Component

Function

Configure settings to block or allow access to specific web sites or pages with restricted words.

Configure settings for eScan Notification and Scan Control.

View the eScan Log files. You can also import/export black/ white lists.

Enter License key to activate the software by clicking the key icon.

Configure eScan Updater

eScan Updater provides automatic downloads of updates. Updates are vaccines created by MicroWorld to remove new virus that have appeared or may have infected your system. Updates are stored in our dedicated download mirror sites. When you install eScan, it checks your system and refreshes some of the fields in the eScan Updater user interface. MicroWorld has assigned the most optimum default values for download sites, mode of connecting to these sites, time interval for download of updates, etc. Change the values only if required.

This chapter provides details on setting up and configuring the settings for eScan Updater. You assign the access mode your system uses to connect to the Internet, proxy IP addresses, time interval at which the system should download updates, etc. Typically the updates are up to 10 KB in size, so downloads are fast.

Note:

If you have installed eScan Corporate Edition or eScan Enterprise Edition as a Server, eScan Updater installs itself as eScan Server Updater.

Page 20: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 20

Topics in Configure eScan Updater This chapter gives details about the following topics:

Important Terms in Configure Updater

Launch eScan Auto Updater

Set General Updater Configuration

Set update download mode

To enable updates auto download

To set time for updates auto download

Set auto actions after update downloads

Set FTP Updater Configuration

Select update download FTP site

Select Logon type

Set HTTP Updater Configuration

UNC Updater Configuration

Page 21: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 21

Important Terms in Configure Updater Mode: Updates are available on our designated web sites. You connect to the site and download updates using three types of connectivity mechanisms or modes. The three modes are: HTTP, FTP and UNC

HTTP (Hyper Text Transfer Protocol): HTTP is the most commonly used access mechanism. The software selects it as the default mode. If connection is broken during download, you have to start from the beginning. HTTP downloads are faster than other types.

FTP: (File Transfer Protocol) FTP offers the most stable means to transfer data. Use this mode when you have problems connecting using HTTP. Advantage with FTP protocol is that if connection breaks during download, it commences from the point where it broke in the previous attempt. Configuring FTP for a proxy server is more complicated when compared to configuring HTTP with the proxy-server. These are reputed to be slower than HTTP.

UNC: (Universal Naming Convention) UNC is the standard for naming network drives. For example, UNC directory path has the following form: \\server\subfolder\filename. In a LAN, when only one system has Internet connectivity and updates are to be transferred to many machines, choose this mode. If your machine does not have Internet connectivity, you can choose any machine in the LAN and assign it to download updates. This ensures that updates are transferred to individual machines.

Port: An application program has a unique port number associated with it. The port is assigned a port number. The application plugs into your system using this port number. Some protocols, e.g. FTP uses port number 21 and HTTP uses port number 80.

Proxy Server: It is a server that acts as an intermediary between a workstation and the Internet. The enterprise is assured of security, administrative control and caching service.

IP Address: 32-bit host address defined by the Internet Protocol. It is usually represented in dotted, decimal notation and uniquely identifies each host on a network or Internet.

Protocol: A formal set of conventions governing the formatting and relative timing of message exchange between two communicating systems.

TCP/IP: Transmission Control Protocol/Internet Protocol - A protocol platform, known also as the Internet protocol suite that combines both TCP and IP. Widely used applications, such as Telnet, FTP and SMTP, interface to TCP/IP.

SMTP Server: Simple Mail Transfer Protocol Server to transfer electronic mail between computers

Page 22: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 22

Launch eScan Updater

To launch eScan Auto Updater, right click on icon and select eScan Updater Options. Screen General Configuration is displayed.

The application can also be launched from

Start > Program > eScan for windows > eScan Server Updater. There are four tab pages that allow you to configure individual settings General Config, FTP Config, HTTP Config & UNC Config – these are detailed below.

Page 23: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 23

General Config The General Configuration screen allows you to select access mode, enable or disable download notification and auto downloads; download through proxy and assign the IP address of server from which downloads are done. You set the time interval for automatic downloads of updates from the Internet.

To Launch General Configuration Settings: In eScan Updater, click General Configuration. By default, the tab page for General Config is opened when eScan Updater is started.

Field Name Description

Select Mode Updates are available on our designated mirror web sites. You connect to the mirror website and download updates using one of the connectivity modes. The three modes are: HTTP, FTP and UNC.

Set update download mode:

FTP (File Transfer Protocol) FTP offers the most stable means to transfer data. Use this mode when you have problems connecting using HTTP. Advantage with FTP protocol is that if connection breaks during download, it commences from the point where it broke in the previous attempt. Configuring FTP for a proxy server is more complicated when compared to configuring HTTP with the proxy-server. These are reputed to be slower than HTTP.

Select the radio button to download using FTP protocol. Tab page "FTP Config" is enabled only if this radio button is selected.

HTTP (Hyper Text Transfer Protocol): HTTP is the most commonly used access mechanism. The software selects it as the default mode. If connection is broken during download, you have to start from the beginning. HTTP downloads are faster than other types.

Select the radio button to download using HTTP mode. Tab page

Page 24: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 24

Field Name Description

"HTTP Config" is enabled only if this radio button is selected.

Network (Universal Naming Convention) UNC is the standard for naming network drives. For example, UNC directory path has the following form: \\server\folder\subfolder\filename. In a multi eScan Server environment, when only one system has Internet connectivity and updates are to be transferred to many machines, choose this mode. If your machine does not have Internet access, you can choose any machine in the LAN and assign it to download updates. This ensures that updates are transferred to individual machines.

Select the radio button to download using Network mode. Tab page "UNC Config" is enabled only if this radio button is selected.

Enable Update Notification

Select the check box if user should be notified when updates are downloaded.

Enable Download Via Proxy

Select the check box if your eScan server is behind a proxy server. The next four fields are enabled only if this check box is selected.

Version Request HTTP Site:

Displays default version request site, configured by MicroWorld. It helps the eScan updater to compare dates of updates. Change if required.

Port: Displays port number of the HTTP version request site.

Button is enabled only if Enable Update Notification check box is selected. Select the button to open the Mails Notification dialog box.

The box allows you to assign an e-mail address for which the notification is sent.

Update notification Mails from user: Enter the e-mail ID of user in this field. After an update is completed, an e-mail is sent from this ID to the email ID specified in "Update notification Mails to user".

Update notification Mails to user: Above update notification is sent to this e-mail ID.

Page 25: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 25

Field Name Description

Notification To SMTP Server: Update notification e-mail is sent to this IP address (SMTP Relay host).

Notification to SMTP Port: Enter SMTP port number of the Relay host.

OK button is enabled if any changes are made. Select OK or Cancel to discard the changes.

Scheduling Allows you to set a schedule to download updates automatically. When automatic download is enabled, eScan sends a version request to the URL: http://www.microworldsystems.com/sendinfo, for information on the latest version of updates. It compares files on your machine with those on the mirror site.

Unlike other software packages, eScan allows incremental downloads. The normal size of an incremental update is only about 7KB-10KB. If the files are different, download commences.

Advanced Settings dialog box is displayed when you click Scheduler.

Auto Download: Starts auto download as per the time set in "Query Interval" spin box.

Query Interval: To set time for updates auto download: Select the appropriate query interval in minutes from the drop-down list. Download begins automatically as per this frequency.

For example: If “1440” is selected then eScan connects to the site every 1440 minutes (24 hours) for downloads.

Schedule Download: You can set a Schedule to download updates. Schedule is the time at which eScan will automatically download updates from MicroWorld's mirror download sites.

Select the radio buttons to set the schedule for:

Daily: Updates are downloaded daily. Set the time as per using the spin

Page 26: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 26

Field Name Description

button 'At' box.

Weekly: Downloads done once a week. Select the day on which updates should be downloaded.

Monthly: Select month when updates should be downloaded

After Update Set auto actions after update downloads: Button is enabled only if “Enable Autodownload” check box is selected. Execute after Successful download box is displayed. You assign program files to be executed after updates are downloaded.

Execute this…: Select the check box if the update is to be launched automatically after download. Other fields in this dialog box are enabled only if the checkbox is selected.

Program Name: Enter program to be run after update is downloaded

You can select the button to browse your system and select the executable program. The name and path are displayed in the field.

Start in: Specify directory or folder of the program. You can select the

button to browse your system and select the executable program. The name and path are displayed in the field.

Parameters: Enter the parameter for the program to be run, in this field. The parameter in the screen shown above is a file name.

Run: Select the manner in which the file should run, from the drop-down list.

Select Normal Windows to run it in the windows mode.

Select Minimized to run it in minimized mode.

Select Maximized to run it in the maximized mode

Select Hidden to hide it from view.

Page 27: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 27

Field Name Description

Force Process...: Select the radio button if the download process should terminate the launched program after waiting for the set time interval.

Don’t wait….: The download process will complete and wait for the set interval time even if the program has not completed.

While this ….: While the program is running, all other PC operations will be suspended as per the time interval selected from the spin button. Select Ok to accept changes or Cancel to discard them.

Update now After changes are done, select the button to begin downloading updates.

Change Server Allow you to assign a new server to down load updates. Enter the new server IP in the field and select OK. To revert to the default server, click Default.

HTTP Proxy Server IP:

Enter the IP address of the HTTP Proxy server in this field. System downloads using this proxy. This field is enabled only if “Enable Download Via Proxy” check box is selected.

Port: Enter the port number of the HTTP proxy server. This field is enabled only if “Enable Download Via Proxy” check box is selected.

Login name: System allows access only for this login name of the user.

Password: Password ensures that only the above login name is allowed access. Enter a password in this field. It can be alphanumeric and must be of minimum six characters.

Hide All Icons Select the button to hide all system tray icons. If you want to see them again, start the application again. The button will have the label “Unhide…”

Save Saves all changes

Hide To remove this popup and minimize to tray

Page 28: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 28

FTP Config This screen allows you to change the default settings for FTP mode of download. The fields are enabled only if “FTP” is selected as the mode in “General Config tab page.

Key tasks are: Select update download FTP site

Select Logon type

To Launch FTP Config:

Select FTP Config tab page to view FTP Config screen.

Field Name Description

FTP Download Site:

Select update download FTP site: MicroWorld stores updates in dedicated FTP servers. The sites are predefined in the program and displayed in the drop-down list. Select the appropriate FTP site from the drop-down list. The application connects to this site to download updates. The default site is displayed in the field.

Download Directory

Updates are stored in the FTP sites in a specific directory. Based on the selection done in "FTP Download Site" the relevant directory name is displayed in the non-editable display field. Default directory name is displayed in the field. This is a non-editable display field.

FTP Proxy Server IP:

Enter the FTP proxy server IP address in this field. The application uses this proxy to download updates. The field is enabled only when "Enable Download via Proxy' check box is selected in "General Config" tab page.

Port Enter the port number of FTP proxy server. The field is enabled only when "Enable Download via Proxy' check box is selected in "General Config" tab page.

Page 29: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 29

Field Name Description

Login Name: Specify the login name for proxy authentication. System allows access only for this login name. If your proxy server does not require authentication, then retain the displayed default name "Anonymous". The field is enabled only when "Enable Download via Proxy' check box is selected in "General Config" tab page.

Password: Password ensures that only the above login name is allowed access the application. Enter a password in this field. It can be alphanumeric and must be of minimum 6 characters. The field is enabled only when "Enable Download via Proxy' check box is selected in "General Config" tab page.

Logon Type When a client connects to the Internet) via a proxy server, additional configuration is required to download the updates. The fields in this frame are enabled only when “Enable Download via Proxy’ check box is selected in “General Config” tab page.

Select Logon type:

User@siteaddress This is the format the proxy or the Firewall between the client and the Internet, expects the logon command. Select the radio button if proxy used is WinGate, Winproxy, etc.

OPEN siteaddress

This is the format the proxy or the Firewall between the client and the Internet, expects the logon command. Select the radio button if logon type is Cproxy, etc.

PASV Mode When you attempt to connect to the server, if a Firewall is present, it filters unwanted data and connection may not be granted. By using the passive or PASV mode, the server opens a random port, unsecured by the Firewall and allows you to connect. Select the radio button if logon type is of Firewall type.

Socks Select the radio button if Socks proxy is used as the logon type. The drop-down list box is enabled only if the radio button is selected. Version specification numbers for the Socks Server are displayed in the drop-down list. Select the appropriate value.

Page 30: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 30

HTTP Config This screen allows you to change the default settings for HTTP mode of download. The fields are enabled only if “HTTP” is selected as the mode in “General Config” tab page.

Field Name Description

HTTP Download Site:

A list of HTTP download sites for the application is displayed in the drop-down list. Select the appropriate site. The default HTTP site http://www.microworldsystems.com/pub/update is displayed in the field.

UNC Config UNC mode of download is required when only one server has Internet access in an eScan environment with multiple eScan servers and updates need to be transferred to them. These multiple servers could be running on eScan Pro or eScan VC. Clients running with eScan VC do not require UNC mode of download.

This tab allows you to change the default settings for Network mode of download. The fields are enabled only if “Network” is selected as the mode in “General Config” tab page.

Field Name Description

Source UNC Path Enter the name and the shared drive path of the network server in this field. For example: \\qa6\c\pub\update.

Verify values entered and select Save. A confirmation screen is displayed.

Select “Yes” to save settings or “No” to abandon them.

Page 31: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 31

eScan Content Administrator

eScan Content administrator feature of eScan, allows you to monitor and administer Internet traffic flowing into or out of your system. You can set security policies to: check e-mail traffic for specific words or phrases like xxx, naked, etc.; prohibit or allow: exchange of specific attachment types, enable their auto compression, send warning messages to sender, receiver or others when the security policies are violated. A very important feature is block and allow access to specific sites or pages with restricted words.

New features that are added include Popup Filter menu, which allows you to block popup from being displayed on your screen and Browser CleanUp, which protects your privacy by removing tracks in your system that reveal details about sites you have visited

Admin Carries eight sub menus that allow you to perform specific tasks. They are:

email Attachment Control: Allows you to block or allow specific e-mail outgoing/incoming attachments types. You can also configure settings to auto compress/decompress out/in attachments.

email Content Scanning: Allows you to check e-mails for restricted words or phrases. MicroWorld has provided a list of standard words and phrases like xxx, naked, etc. You can add your own words and phrases. You can also create a disclaimer that could be sent with all outgoing and incoming e-mails.

Webpage Scanning: This key feature allows you to add offensive websites to block lists. Users are not allowed to access the sites. You can also specify that any page with restricted words and phrases will not be allowed access in your system.

PopUp Filter Pop up filters besides being frustrating, consume valuable bandwidth and time. The feature allows you to block PopUp from displaying on your screen. You can select the sites for which PopUp should be allowed.

Browser Cleanup Privacy is very important to an individual. You may not want others to know sites or pages you have visited. This feature allows you to select settings for auto erase of such

Page 32: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 32

information. You can specify the extent of information that should be deleted: history folders of sites you have visited, cookies, URLs, ActiveX controls, PlugIns, etc.

File Rights This feature allows you to control the file types that remote users can create or modify. Certain types of viruses spread by creating virus carrier files on other machines. Using this feature, the system administrator can control file types that are prone to virus attacks from being created or modified.

Notifications When e-mail is detected that violates the security policy, you can send an alert to e-mail sender, receiver and system administrator. You can block e-mail ID of offensive mail sender and send a warning message to them.

General Details Allows us to Import or Export Security policy settings and View Logs

Import / Export : for email Content Scanning, WebPage Scanning(Specifically checks for Porn Sites, Gambling Sites, Allowed Websites), PopUp Filter (White List) and email Attachment(Block Attachment Types).

View Logs To View Log Files of Anti-Virus and other activity. You can also Flush all the logs

at once or clean up the individual logs.

Help Menu On the top right hand corner of the eScan Content Administrator pop-up, you can access the Help Menu provided with the application. This allows you to enter License Key details and change the Password and also info About the Content Administrator

Page 33: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 33

Topics in eScan Content Administrator Help Menu (Change Password/ License Information/ About/ Online help)

Email Attachment Control

e-mail Content Scanning

Webpage Scanning

PopUp Filter

Browser Cleanup

File Rights

Notification

General Details

Page 34: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 34

Important Terms in Content Administration Alerts Message sent when a virus is detected in a mail or when the security policy is violated.

Attachment Types Depending on the application there are different types of attachments. It is identified by the file extension. A document created in MS Word will have the extension. doc.

Compress Files can be compressed by using the built-in compress feature. This packs the file tightly, without affecting the contents. Compressing a file and then mailing it conserves the available bandwidth.

Disclaimer When a mail that violates the security policy is detected, certain pre-set actions like delete, quarantine, etc., are carried out. In such cases, eScan sends a notification message, called the disclaimer.

IE Vulnerability Internet explorer has certain loopholes or vulnerabilities. Virus and other threats can gain an entry into your system through these vulnerabilities. eScan has features that can be configured to plug some of the loopholes.

Restrictive words/phrases Words like xxx, naked etc., which you do not want in your system are called restrictive words and phrases. eScan, allows you to specify a list of such words. Any mail, which has such words in the subject or body, can be detected and further pre-set actions for such mails can be run.

Security Policy Refer to the rules that govern Internet traffic in your system.

To launch Content Administrator

In the status bar, right click on . A popup is displayed. Select Start eScan Content Administrator.

Content Administrator application is launched. Menus are displayed in the left panel. Select the menus, to view screens related to these menus. To execute tasks, select the respective buttons. The related screen is displayed. Brief description of the menus or tasks follows:

The next sections describe in detail about different tasks and how to validate fields.

Page 35: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 35

Help Menu

This menu contains four sub-menus that described as below:

Change Password

MicroWorld recommends that you change your password often. In the Help menu, Click to Change Password. Enter relevant information in the dialog box. You must enter the old password, to change to a new one.

License Information

License information key allows you to use the software for the duration, set by MicroWorld. If you are using an evaluation version of the software, then the key is mandatory to run the application beyond the period. To obtain

your License key, please contact [email protected]. Click on the License Key icon or the License Information sub menu in Help menu. Enter the key serial number and select OK.

About eScan Content Administrator

Click to get information including the version number , copyright & the link to microworld.net

eScan Content Administrator Help

eScan has an on-line context sensitive help. In any screen, press F1 to bring up the help. Information about a specific object like tab, dropdown, etc. is given in detail.

You can also run only the help file. Click Help > eScan Help.

In the help file, there are three tab pages. Topics are displayed in the Contents tab page under books. Click on the

icon. Select the topic you want to view the details in a separate page. The Index tab page carries a list of all key words. Select the key word or type the phrase in the field and choose Display. Relevant topics are displayed.

Page 36: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 36

e-mail Attachment Control Certain types of attachments are prone to virus infections. This feature allows you to block or allow such e-mail attachments, to enter or leave your system. Auto compression of attachments is a feature that allows automatic compression of outgoing and incoming attachments. This section provides details on blocking/allowing attachments; configure compression settings for attachments, etc.

Topics in e-mail Attachment Control To block/allow attachments

To compress/decompress attachments

To Plug Internet Explorer vulnerabilities

To archive e-mails/attachments

To launch eScan Attachment Scanning:

In eScan Content Administrator, select

Field Name Description

Scanner Administration You specify attachments that can be allowed or prohibited to enter or leave your system.

To block attachments:

You can view or add to the block list of attachment types. These are blocked from entering or leaving your system. The list is shown in the display box.

Add Select the button to add the attachment type name, entered in the above field. The item is now added to either the block or allow list.

Delete Select the button to delete the attachment type name, displayed in the display box.

Page 37: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 37

Field Name Description

Select the button to view Advanced dialog box shown below. It allows you to perform advanced tasks.

Delete all attachments in emails having non-disinfectible virus Select the check box to delete attachments whose virus cannot be removed.

Delete entire email if found having non-disinfectible virus Select the check box to delete infected e-mails whose virus cannot be removed.

Delete entire email if found having any virus: The mail is deleted if found to carry any virus.

Quarantine blocked Attachments: Select the check box to quarantine the blocked attachments.

Delete entire email if found having blocked Attachment: If attachments defined in the field 'Block Attachment Types' are encountered in the mail, they are deleted.

Quarantine emails having unscanned attachments: Mails with attachments that are not scanned are quarantined.

Quarantine unscanned attachments: Unscanned attachments of mails are quarantined.

“Attachments Excluded (White List)” The field allows you to create a white list to exclude specific attachments from the above actions. Enter the file type extension in the field and select Add. It is displayed in the display box.

To delete the item, click on it and select Delete.

Select Save and Exit.

Port Configuration

Select the button to view Port Configuration dialog box. You specify SMTP IP and port settings, used by the software to send mail notifications. D f l i di l d M dif h if i d d l S

Page 38: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 38

Field Name Description

Default settings are displayed. Modify them if required and select Save.

The fields are described below:

Mail SMTP Server: Enter IP address of SMTP relay server. Notifications are sent to this server.

Mail SMTP Port: Enter port number of above SMTP server to which notifications are sent

Auth User Name (Optional): Enter user name for SMTP server

Auth Password (Optional): Enter password for SMTP server

Outgoing mail (SMTP Port): Enter local machine port number through which mails are sent

Incoming mail (POP3 Port): Enter the POP3 port for incoming mail.

Scan Outgoing Mails: Scan mails that are sent through the SMTP server

Scan Incoming Mails: Scan mails that are coming through the SMTP server

Set to Default: Restores default settings.

Save Save the changes made

Exit Close this current popup menu

Foreground Scanning

Not available in this module.

Quarantine infected Files

Select the check box to quarantine infected files. Such files are encrypted and stored in a safe location.

Disinfect Select the radio button to disinfect infected files.

Delete Select the radio button to delete infected files.

Page 39: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 39

Field Name Description

Configure Compression/Decompression There are a range of options that allow auto compression of outgoing and decompression of incoming attachments. This increases the available bandwidth. Pre-compressed attachments like .jpeg, .zip etc., are not compressed.

To compress/decompress attachments:

Compress outbound attachments

Select the check box to allow auto compression of all outgoing attachments. Compressing is done as per the compression options.

Create self-extracting zips

Select the check box to create self-extracting zip files of outgoing attachments. This is useful when the recipient does not have the software to uncompressed attachments. This field is enabled only if “Compress outbound attachments” check box is selected.

Uncompress inbound attachments

Select the checkbox to allow auto Uncompress of all incoming attachments. All incoming attachments are automatically uncompressed and scanned for virus before they are sent to the receiver. Currently only .zip formats are supported.

Uncompress ….. (Local Domain)

Select the checkbox to allow auto Uncompress of incoming attachments from the local domain. This field is enabled only if “Uncompress inbound attachments” check box is selected.

DO NOT….

You can specify attachment types that should not be compressed automatically. Enter the attachment type extension in the field (e.g. doc, .xls, etc.) and select Add. The name appears in the list box and such attachment types will not be compressed.

To remove the name from the list, click on it in the list box and select Delete. Such attachments will be compressed as per the selected options

You can remove all names from the list and allow them to be compressed by selecting Remove All.

Compress ONLY if compression %

Some files cannot be compressed beyond a limit. You can specify the minimum compress percentage in the adjacent field. Any file, which

Page 40: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 40

Field Name Description

greater than cannot be compressed beyond the specified value, is not left as is.

Compress if Attachment size is above (Kb)

You can specify that attachments only beyond a certain size should be compressed. Enter the value in the field.

Select Compression Level to use

Select the appropriate compression from the drop-down list. The available values are: Default, Best Compression and Best Speed.

“Default” Ensures the optimum balance between speed and compression quality.

“Best Compression” Ensures the maximum amount of compression but may take more time on a slower machine.

“Best Speed” Ensures the best speed of compression. Quality of compression may not be optimized.

To Plug Internet Explorer Vulnerabilities: IE has certain loopholes or vulnerabilities, through which viruses are delivered. Since Outlook Express and other mail clients are from the same product stable, delivery of viruses into your system becomes easier as they are from the same manufacturer; delivery of viruses into your system becomes easier.

Select the button to view Advanced dialog box. It allows you to plug IE vulnerabilities. There are three tab pages. The following section gives details of each tab page and explains field validations.

IE-Vulnerabilities I

The tab page allows you to auto delete mails with CLSID extension and HTML embedded script tags.

“Delete Files with CLSID Extension” Attachments that end with a Class ID (CLSID) file extension do not show the actual file extension with Internet Explorer. This allows dangerous file types to look harmless. Select the check box to auto delete such files.

“Delete HTML with Scripts” HTML e-mails can be used to transmit virus through embedded scripts. Above selection box displays a few

Page 41: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 41

Field Name Description

known script tags. Select the check box to delete all mails with such scripts.

Script Tags Enter the new script tag in this field and select Add. The script tag is added to the list in the selection box. Mails with the tag are deleted. This field is enabled only when “Delete HTML with Scripts” check box is selected. To remove script from the list, click on the tag and select Delete.

Script Check and Content Disabled From You can specify that mails from specific e-mail IDs be allowed, even though they have the banned script. Enter the e-mail ID in the field and select Add. To remove, select ID and choose Delete.

Script Check and Content Disabled For Mails having To As: You can specify that mails to specific e-mail IDs be allowed, even though they have the banned script. Enter the e-mail ID in the field and select Add. To remove, select ID and choose Delete.

IE-Vulnerabilities II

Some virus-infected files have multiple extensions like. doc.exe. Compressed files also have double extension (e.g. pdf.zip), even though they are harmless. The tab page allows you to specify actions for such files.

No Action Select the radio button to allow free entry for mails with double extensions.

Delete Mail Select the radio button to delete mails with double extensions.

Forward to Admin Select the radio button to forward files with double extension to the system administrator.

Allow Multiple Extension Attachments to ZIP Compressed files like .zip that have multiple extensions can be allowed entry. Select the check box and enter the extension name in the field and select Add. The extension is displayed in the list box. To remove the name, select it and

Page 42: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 42

Field Name Description

choose Delete.

Archival To archive mails/attachments: All e-mails and attachments flowing in or out of the system can be archived into a specified location. The tab page allows you to specify the location for e-mails and attachments and also exclude specific attachment types from being archived.

“Archive emails” Select the check box to allow e-mails to be archived. Enter the path in the field or browse and select the location using the adjacent browse key. The field and button is enabled only when “Archive emails” check box is selected.

“Archive Attachments” Select the check box to allow attachments to be archived. Enter the path in the field or browse and select the location using the adjacent browse key. The field and button is enabled only when “Archive Attachments” check box is selected.

“Do not Archive Attachments of type” Enter the attachment type that should not be archived and select Add. The name is displayed in the list box. To remove the name, select it and choose Delete.

Page 43: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 43

e-mail Content Scanning This feature allows you to control the content flowing in or out of your system through e-mails and also kill Spam You can specify words or phrases that should be tracked. Any mail with such words either in the subject; header or body will be identified. Such mails can be quarantined or deleted. You can also create a disclaimer notice, which can be sent for all out and in mails.

This section provides all details to configure the settings for Content Control. Key tasks are:

To set action for offensive mails

To add restricted phrase

To add disclaimer for outgoing mails

To add disclaimer for incoming mails

To append customized messages

View quarantined mails

To launch eScan Content Scanning:

In eScan Content Administrator, select

Field Name Description

Enable Content Checking

Select the check box to scan e-mails for Spam, porn and other restricted words. The default list of restricted words or phrases are specified in the next four radio buttons.

Phrase: Loadable Lists of Restricted Phrases are available with four radio buttons:

a) “Whitelisted by default” for phrases that are acceptable in the mails

b) “Deleted by default” unacceptable phrases in any mail

c) “Whitelisted by User” to add user defined accepted phrases

d) “Deleted by User” user defined restricted phrases

Page 44: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 44

Field Name Description

To add restricted phrase or word: Right click the phrase text area and Add Rule this will allow you to type a new custom phrase of your choice.

Action Select the action to be done when restricted words or phrases are detected in e-mails.

To set action for offensive/Spam mails:

Quarantine The Mail

Select the radio button to quarantine mails with the phrase entered in the “Phrase:” field. All mails, which have the word or phrase, in the body or subject are quarantined. The field is enabled only when a phrase or word is added in the “Phrase:” field.

Delete The Mail Select the radio button to delete mails with the phrase entered in the Phrase” field. All mails, which have such words or phrases, in the body or subject are deleted.

The field is enabled only when a phrase or word is added in the Phrase field. It is possible to either quarantine or delete the mail.

The list box displays all phrases or words that are restricted and the action associated with them. There are four columns: first column displays the serial number, second displays the phrases or words. Next two columns show the action specified. The x sign identifies the action. They are all non-editable display fields.

If you want to change the action, then click on the phrase. It appears in the “Phrase:” field. Next select the appropriate action radio button. Select Refresh to view the updated list.

Enable Content Checking

This box needs to be ticked to enable Advanced options & actions based on defined phrase policies

Delete Select the button to delete the phrase or word displayed in the list box.

Content Options

Click Advanced dialog box for content scan and Spam. Options are.

Send Original Mails to Users Also: Allows you to send the original mail to the receiver

Page 45: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 45

Field Name Description

Anti-SPAM Options

mail to the receiver

Check Content on Outgoing Mails Also: Outgoing mails are scanned. This ensures that machines in your network are not misused to send Spam.

Check Disabled for Replied or Forwarded Mails: Mails that are sent as a reply or are forwarded to you are not scanned. Spammers use the technique of add Re: or Fw: in the subject line. If the check box is selected, Spam mails will also be delivered.

Check HTML Mails for Content: HTML types of e-mails are scanned.

HTML mails with "SRC" string to be tagged as SPAM: HTML mails sent by Spammers could have links to banned images or URLs. Links to banned content is enclosed in SRC string. Mails with such strings are regarded as Spam.

E.g..<td><img src="http://clicks.emarketmakers.com/images/email/emm/hw/spacer.gif" width="302" height="1" border="0"></td>

<td><img src="http://clicks.emarketmakers.com/images/email/emm/hw/spacer.gif" width="82" height="1" border="0"></td>

Treat Mails with Chinese/Korean character set as SPAM: Mails sent in Chinese or Korean characters can be Spam. When any such oriental characters are found in the mail, it is regarded as Spam.

Quarantine Advertisement emails: Quarantines advertisement e-mails before they reach your mailbox.

Treat Subject with more than 5 white spaces as SPAM: Subject lines in Spam mails sometimes have blank spaces. Any mails with more than 5 white spaces are regarded as Spam.

Do Not Change Mail at all: Spam mail is not changed

Page 46: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 46

Field Name Description

Mail-Tagging Options

Both Subject and Body is changed: A Spam tag is added to the subject line and the Spam content is embedded in the mail body

Only Spam tag is added: Only a Spam tag is added to the subject while the Spam body is left unchanged

X-MailScan-Spam: 1" header line is added to the mail while the Spam body and subject are not changed

X-MailScan-Spam: 1" header line is added to the mail while the Spam mail content is embedded inside the mail

Select Save to save modifications and Exit to return to the parent menu

Disclaimer The section allows you to add a disclaimer note to all outgoing and incoming mails.

To add disclaimer for outgoing mails: Select the check box for “Add Disclaimer to outbound Mails”. Type the text in the dialog box and select Save.

Add Disclaimer to outbound Mails

Select the check box to attach disclaimer for outgoing mails.

Type the message in the disclaimer box. The box is enabled only if “Add Disclaimer to outbound Mails” check box is selected.

More To add disclaimer for incoming mails: Select the button to view Advanced dialog box. This box allows you to specify if disclaimer should be sent for incoming mails and also allows you to exclude specific e-mail IDs from receiving the disclaimer note.

Disclaimer for Incoming Select the check box to send disclaimer with all incoming mails.

Do not send disclaimer mails to Enter the e-mail ID to be excluded from receiving disclaimer, in this field. Select Add. The ID is displayed in the adjacent non-editable display box.

Page 47: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 47

Field Name Description

Delete Select the e-mail ID to be removed from the list and choose Delete. The e-mail ID will now receive disclaimer

Remove All Removes all IDs from the list

View Quarantined Mails

Details of quarantined mails can be seen when you click this button. The View Quarantined Mails box is displayed.

Quarantine folder path Displays the default Quarantine Folder Path. .

Click button to browse and select another folder

Quarantine File Types: Email file types such as .eml, .nsg, .mes are displayed. Enter new file types if required. Select the adjacent Show Attachments checkbox to show the Spam attachments.

The tool bar has buttons that allow you to run tasks concerning the emails viz. Refresh, Stop, View, Find, Delete, Message source & Hide Message.

Details of Spam mails are displayed in the display area below the Tool Bar. Details include: From, To, Cc, Subject, Received, Size (Kb), Attachments and the File Name.

Select the button to view Open data entry box. The box allows you to append .txt files, carrying messages

To append customized messages: Browse to the required directory and select the file to append. Contents of the selected file are sent in the e-mails. The button is enabled only when “Add Disclaimer to outbound Mails” check box is selected.

Save Select the button to save new validations.

Refresh Select the button to view the updated validations.

Exit Select the button to quit the current screen.

Page 48: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 48

Webpage Scanning This menu allows you to block or allow access to specific sites. You can further allow or block access to a web page that has a specified word any where in it - in meta keywords, or HTML tags. The menu allows you to assign filter rules that control access to the Internet as per three standards: RSACi, ICRA and Safe Surf.

This section provides details in enabling controls for web access. They key tasks are:

To add sites category for allow/block access

To assign Filter category

To change allow/block status of Sites

To Add new Category

To delete a Category

To add websites and key words to categories

To view violations logs

To set Content Matching Options

To set filters as per International Rating systems

To Launch Web Scanning

In eScan Content Administrator, select

Fields and their meanings are described in the following table

Field Name Description

Status

Active Select the radio button to activate Web page scanning. When the button is selected, changes you make in the screens are effected on the system or network. Features in this screen are enabled only when this button is selected.

Page 49: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 49

Field Name Description

Inactive Select the radio button to bypass the rules assigned in this screen. Rules assigned with this screen do not affect the user. Webpage Scanning will not be performed.

Block Web Access

Blocks Internet access. Other fields in this screen are disabled.

Set Time Restriction

You can assign a time period when Internet access is disabled. Select the button to view Advanced Settings dialog box.

Select the Enable Time Restriction check box and click Add. A new dialog box Addition / Modification of Scheduling is displayed. Use the spin buttons to set the schedule.

Filter Categories Categories contain groups of similar websites. You can allow or block access for a category. You can create any number of groups. It is also possible to have a single site in more than one category. If a site appears in both allowed and blocked categories, access for the site is allowed.

For example: Gambling. You can group websites related to gambling in this category.

MicroWorld has created some pre-defined allow and block categories with groups of websites and key words. Any new categories you add are designated as Custom types.

To add sites category for allow/block access

Categories of sites that you allow to be accessed are shown in green color.

Access to categories of sites that you block is shown in red color.

Filter Categories To assign Filter category: Refer to the frame Filter Categories. It allows you to add a new category and change the allow/block status of a category. There are three columns:

Category Name: Displays the category name. When new categories are added, the name is displayed here.

Page 50: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 50

Field Name Description

Status: Shows the status of the category. Red means blocked and green means allowed.

Type: Refers to the type of category. Default categories are termed as PreDefined. New categories you add are termed as Custom. These are non-editable display fields.

To change status from Block to Allow: Double click in the respective row for the category. Block status in red font changes to Allow status in green font, vice-versa.

To Add new Category: Type category name in the field as shown above (e.g. Movies) and select Add.

To delete a Category: Select the category in the screen and choose Del. It is not possible to delete the predefined categories.

To add websites and key words to categories: You have to add websites to categories. The category can be assigned a status of allow or block. Select the category to which websites and key words are to be added from the list explained in the previous section. The name is displayed as the non-editable header. E.g. Category: Gambling. There are two frames.

Top frame displays list of key words for a particular category. Click in the frame and type the words or phrases in the bottom frame. The key word is added to the list.

To add a website to a category, click in the lower frame and type the full URL or the IP address.

Filter Options

Add Filter violated site to Block category

When a new site is accessed that contains the restricted key words, its URL is automatically added to the block list, when the check box is selected. Leave it unselected if you don’t want this feature.

Add pass sites to PreDefined

When a site is accessed which does not have the restricted words, its URL is added to the allow list.

Page 51: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 51

Field Name Description

Category is added to the allow list.

Set to Defaults To restore the default policy settings

View Log To view violations logs: You can view logs of violations that occur when sites are accessed, that have prohibited content. Select the button to view the View Log Violations dialog box. Details displayed include user from where violations have occurred, date and time of violation, violating site name and URL, reason why it was declared as a violation and the banned word or phrase that was found. This box also allows you to adjust font settings etc.

Advanced

Advanced settings, allow you to set matching options as per the banned words or phrases and assign International rating systems for monitoring activity. This button is enabled only if Block Web Access check box is unselected. Select the button to view Advanced dialog box. There are a number of check boxes you select to enable functions as explained below:

Content Matching Options

Search in Site Name Select the check box to search the URL for restricted words or phrases (e.g. xxx).

Search in HTML Tags Select the check box to search for banned words in title of the Web page body.

Search in Title Select the check box to search for banned words in the HTML tag for page.

Search in Page Text Select the check box to search for restricted words and phrases in websites text.

Search in Description and Keywords: Select the check box to search for restricted words in the websites description and keywords.

Restricted Word Threshold Level The slider bar allows you to specify the number of words that can appear in a web page, before the page is

Page 52: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 52

Field Name Description

blocked. Minimum is one word. This means that access for the web page is blocked if the restricted word appears only once. MicroWorld has set a default level of three words.

Actions

Log Violations Select the check box to create a log file of violations.

Shutdown Program in 30 Secs When violations occur, access to the offending site from your machine is shutdown in 30 seconds.

Content Type

Block Images: All images in a web page are blocked and will not be displayed on your system.

Block Applications: Applications like .exe files, flash movies, mp3, etc. will not be run.

Block Messages(RFC822): Messages between computers are blocked.

Block Audio: Audio files are not allowed to download and run.

Block Video: Video files are not allowed to download and run.

Active Content Blocking

Java Applets: Select the check box to block Java applets from downloading and running onto your system.

Scripts ( Java & VB ): Select the check box to block Java and VB scripts from downloading and running onto your system.

Check for Virus: Select the check box to scan and remove viruses in downloaded applications.

Set Rating

eScan allows you to choose among three International standards that ib fil i f f b i Y h i h ll

Page 53: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 53

Field Name Description

Get Default Settings

prescribe filtering norms for safe browsing. You can choose either or all of them and use the norms to prescribe safe net use on your system. Select the button to view the Content Rating dialog box. There are three tab pages. The next section gives a brief description of these standards.

You can specify threshold settings for various categories of content. Set Click Set Rating to view the box shown below. There are three tab pages that display categories of content and their classification. The next section gives a brief description of these standards.

This button is available on all the tab pages and suggests the optimum filters for safe and practical surfing.

Filter as per RSACi Rating Systems The Recreational Software Advisory Council rating service for the Internet. Based on the work of Dr.Donald F. Roberts of Stanford University, who has studied the effects of media for nearly 20 years. Expand the menus and select the appropriate radio buttons to assign the filter options.

ICRA Rating System Internet Content Rating Association. Global, cross-cultural rating and filtering system. Expand the menus and select the appropriate radio buttons to assign the filter options

SafeSurf Rating System The SafeSurf SS~~ Rating Standard. Designed with input from thousands of parents and Net citizens to empower each family to make informed decisions concerning accessibility of online content. Expand the menus and select the appropriate radio buttons to assign the filter options.

Port Setting To define list of comma separated ports numbers for Internet Access(http)

Save Select the button to save the entries.

Refresh Select the button to refresh the screen

Page 54: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 54

PopUp Filter A popup is an Ad or unsolicited information that appears on the opened web page and then opens as a separate popup window when you request for more information or inadvertently click on them. Popup’s are exasperating and may not be relevant to your work. Besides consuming bandwidth, you waste browsing time in chasing and closing them. They offer a cheap way for companies to advertise their products.

eScan Popup Filter is a dynamic plug-in for browsers like Internet Explorer, Netscape and Opera. It blocks all PopUp automatically while offering many more features. When eScan Popup Filter is running, it tells your browser to stop all unsolicited windows from opening and does not interfere with your navigation. Since it stops the browser from downloading and showing PopUp, unlike most pop-up killers, there's no need to wait while a new window appears and disappears. It offers a screen flash free blocking of PopUp and saves your bandwidth. Popup Filter of eScan allows you to block such PopUp from being displayed on your screen.

Not all PopUp are unsolicited. You may need to fill in an on-line registration form, which is a type of popup. In such cases, you specify the website from which PopUp should be allowed. Such sites are included in the White List.

This section provides details about the following topics.

To launch eScan PopUp Filter

To add URLs to White List

To Add a Blocked URL to the White List

To launch eScan PopUp Filter

In eScan Content Administrator, select .

Field Name Description

Block Popup Select the check box to block popup's. If you select the check box, popup's are blocked for all sites you access. Leave the box unselected to allow PopUps Other fields in this screen are enabled only if the check box is selected.

Page 55: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 55

Field Name Description

Beep Via PC Speaker

The application gives a beep when it blocks a popup if you select the check box.

Play Sound The application plays a sound file when it blocks a popup if you select the check box.

Click on the button to play the sound file.

Sound File You can select a sound file to play when a popup is blocked. Select the button to browse your PC for the sound file.

White List: You can add sites to a white list, whose PopUp should be allowed to display on your screen.

To add URLs to White List:

Select Add and enter the full URL or IP address in the dialog box. Select Ok. The URL is displayed in the Address list box. PopUp in this site are displayed on your screen.

Address The names of URLs whose PopUp should be displayed are displayed in the non-editable display fields.

Select the button to view the Add to White List dialog box. The box allows you to add URLs where PopUps are allowed.

Enter the full URL or IP address of the site and select Ok.

Log Files: When PopUp are blocked, eScan creates a log file of all the violations. The results are displayed in the Log Files display box. All the fields are non-editable fields. The software only allows PopUp in the white list to be displayed. By default all PopUp in URLs, not in the white list are blocked. If required, you can add a blocked URL to the white list.

To Add a Blocked URL to White List:

Select the URL from the display box and choose Add to W.List. The URL is added to the white list and PopUp in this URL are displayed on your screen, the next time you access it.

Page 56: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 56

Field Name Description

User Name of user who accessed the site is displayed.

Date Time Date and time, when the violation occurred is displayed.

Site/URL Site name or URL whose popup was blocked is displayed.

Reason Reason why the popup was blocked is displayed.

Word If any offensive word was found in the popup, it is displayed.

Clear Log Allows you to clear the displayed list.

Browse Use the button to browse the list.

Refresh Log Displays updated values for the blocked popup list.

Hot Key Hot key allows you to assign a key that you keep pressed when you want PopUp enabled temporarily in a page. Click on the hotkey button and select one of the buttons from the drop-down list.

Test popup The button opens a page in our website where you can test the efficiency of the popup filter. The page has five different types of PopUp.

Set to Default Select the button to restore the original settings for eScan Popup Filter.

Save Saves the settings

Refresh Refreshes the screen.

Exit Select the button to exit from the screen.

Page 57: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 57

Browser Cleanup Privacy is important to an individual. You may often visit sites that you do not wish others to know about. These may be job sites; on-line shopping sites, where you have shopped with your credit card, matrimonial sites, etc. As you surf the net, download files, open and close local files, the actions are stored in your hard drives. Manually deleting files, emptying the Internet cache, or deleting files, etc. is not very effective as there are tools that recover the deleted files.

eScan Browser Cleanup provides an easy, efficient and automatic means to protect your privacy in such a way that you can erase details of sites and web pages you have accessed. It also provides features that allow you to remove tracks of your normal offline activity like opening closing files, delete operations, etc. Deleted files, Internet cache, history files, cookies, etc are removed permanently from your hard disks. It allows you to use the Internet without leaving any history or residual data on your hard drive.

Tasks in Browser Cleanup!

View Browser Settings

View General Browser Cleanup Settings

Clear Cache

Clear Cookies

Clear ActiveX Controls

Clear IE PlugIns

Clear Browser History

Clear Files and Folders

To launch eScan Browser Cleanup

In eScan Content Administrator, select .

Page 58: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 58

The menu has eight tab pages that allow you to set up different configurations. Following table provides details of each tab page and the field validations.

Tab Page Name Description

Browsers When you visit sites, the browser stores traceable information in certain folders and Directories. Others can view them. Internet browsers, installed on the system are displayed in the top frame. Use the scroll bar to view all the browsers.

For each browser, the component and default path where the respective data is stored on your system is displayed in the screen. They are all non-editable display fields. Values displayed in the screen show an overview of data for all the other tab pages. You can customize data for each browser. Select the appropriate browser to set up the filters on each page. The next sections provide details on configuring for different components.

General This tab page allows you to set a schedule for running the auto erase options. You can set up a schedule to run automatically either at system startup or any other time. Select the check box for items to include its actions in the auto erase tasks.

Run at System Startup: Browser Cleanup! Runs and cleans your system, each time the system is booted.

Run Everyday at: Schedule for auto erase can be set to run at a specific time. Select the check box and set the time using the spin buttons.

Windows Auto Erase Options: You select the tasks to run for the auto erase actions.

Clear Last Run Menu: Windows Start > Run menu is cleared.

Clear Last Find Computer: The last find or search command run to search for a computer is erased.

Clear Cache: Cache memory where the Internet access data, URL visited, etc., stored by the browser is removed.

Page 59: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 59

Tab Page Name Description

Clear PlugIns: PlugIns loaded to play applications, movies, sound, etc, are removed.

Clear Last Search Menu: The last search menu command you have run on a search engine is removed.

Clear Recent Documents: Links of recent files, images, documents, etc. you have opened are removed. The files, folders, etc. are retained in their original locations.

Open/Save Dialog box History: History of open and save dialog boxes you have run in different applications is removed.

Clear Cookies: Cookies of sites visited are removed from your system.

Clear History: History folders of URLs you have visited are removed.

Clear Location Bar History: Links in the browser address bar of sites you have visited are removed.

Empty Recycle Bin: Recycle bin that contains files you have deleted is emptied.

Clear Temporary Folder: Even if this check box is selected, the temporary folder is not cleared as some programs reboot while being installed. They store reusable information in the temp folder that would be lost if this task is enabled automatically in the auto schedule. Process of clearing temp folder is explained in the Files & Folders tab sheet.

Clear ActiveX: If you use Internet explorer, any ActiveX controls that are placed in the browser are removed.

Clear Files & Folder: Selections done in the tab page for clearing Files and Folders tab page are cleared.

Select All Selects all the check boxes and tasks.

Run Checked Selections made in the above screen are run only when

Page 60: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 60

Tab Page Name Description

this button is selected.

Cache

Each time you browse the net, the browser stores access information about the visited pages in the cache as a shortcut. This allows you fast access the next time you visit the site. It also offers an easy means to track your surfing. The tab page allows you to view and clear the cache.

Drop-down list displays the folder path when you select the URL in the screen.

Screen shows details of the sites you have visited. They are all non-editable display fields.

URL List of URLs you have accessed is displayed.

Hits: Displays number of times you have visited the site.

Size: Size in KB of the cache is displayed.

Created On: Displays date the cache was created.

Modified On: Shows the date and time cache was modified.

Accessed On: Displays date the URL was accessed.

Full Path: Displays the full path of the URL and the page or image you have accessed.

Right click in the screen to open a popup shown. You can perform the additional tasks as explained below:

Search: You can search for a specific URL by selecting the link. Enter the URL in the dialog box and click Find.

Select All: All the displayed URLs are selected.

Delete: Delete a specific URL by clicking it and then clicking this link.

Clear Cache: Select the link to clear the cache.

Page 61: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 61

Tab Page Name Description

Refresh: Fresh values are displayed in the screen.

Cookies Cookies are pieces of information generated by a web server and stored in your computer, as a short cut for future access. Cookies are embedded in the HTML information flowing back and forth between the user's computer and the servers. Cookies were implemented to allow user-side customization of Web information.

Essentially, cookies make use of user-specific information transmitted by the Web server onto the user's computer so that the information might be available for later access by itself or other servers. In most cases, not only does the storage of personal information into a cookie go unnoticed, so does access to it. Web servers automatically gain access to relevant cookies whenever the user establishes a connection to them, usually in the form of Web requests.

Drop down list box shows folders and paths where cookies are stored. Relevant data is displayed in the screen in the non-editable display fields.

Name: URL name is displayed.

Hits: Number of times the URL is accessed is displayed.

Size: Cookie size in bytes is displayed.

Modified On: Date and time the cookies was modified or replaced.

Accessed On: Date and time the cookies was accessed.

Expires On: Cookies have an expiry date. This is displayed here.

Full Path: Location of the cookie in your system is displayed.

Select a cookie and right click to see a popup.

Search: You can search for a specific URL or cookie by selecting the link. Enter the URL in the dialog box and click Find.

Page 62: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 62

Tab Page Name Description

Select All: All the displayed URLs are selected.

Delete: Delete a specific URL by clicking it and then clicking this link.

Clear Cache: Select the link to clear the cache.

Refresh: Fresh values are displayed in the screen.

Privacy: Link allows you to set the privacy options for your browser. Click the link to open up the Internet Options dialog box, make the suitable changes and save.

ActiveX ActiveX is a set of rules that specify how applications should share information. ActiveX and controls are a set of technologies developed by Microsoft. ActiveX is an outgrowth of two other Microsoft technologies called OLE (Object Linking and Embedding) and COM (Component Object Model). These controls can be used to track the sites and pages you visited.

The tab page allows you to view and delete the ActiveX controls in your browser. Paths of ActiveX controls are displayed in the drop-down list.

Name: ActiveX control name is displayed.

Size: ActiveX control size in bytes is displayed.

Created On: Date and time ActiveX control is created is displayed in your system.

Modified On: Date and time the cookies was modified or replaced in your system.

Accessed On: Date and time the cookies was accessed.

Full Path: Full path of the ActiveX control in your system is displayed.

When you right click, a popup is displayed that allows you to perform other tasks.

Page 63: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 63

Tab Page Name Description

Search: You can search for a specific ActiveX control by selecting the link. Enter the name in the dialog box and click Find.

Select All: All the displayed controls are selected.

Delete: Delete a specific ActiveX control by clicking it and then clicking this link.

Refresh: Fresh values are displayed in the screen.

PlugIns PlugIn is a hardware or software module that adds a specific feature or service to a larger system. Netscape navigator uses PlugIns to display different types of audio or video messages. These can be used to trace the URLs or web pages you visited. Only downloaded PlugIns are displayed. Others that you have manually installed are not displayed and cannot be removed. Paths of PlugIns are displayed in the drop-down list.

Name: PlugIn name is displayed.

Size: PlugIn size in bytes is displayed.

Created On: Date and time PlugIn is created on your system is displayed.

Modified On: Date and time the PlugIn was modified or replaced in your system.

Accessed On: Date and time the PlugIn was accessed.

Full Path: Full path of the PlugIn in your system is displayed.

When you right click, a popup is displayed that allows you to perform other tasks.

Search: You can search for a specific PlugIn by selecting the link. Enter the name in the dialog box and click Find.

Select All: All the displayed PlugIn are selected.

Page 64: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 64

Tab Page Name Description

Delete: Delete a specific PlugIn by clicking it and then clicking this link.

Refresh: Fresh values are displayed in the screen.

History When you visit a site, the site name along with the pages opened, images or files downloaded, etc. is stored in your system in a folder called the history folder. Next time you visit the site, your browser checks the history folder, and quickly opens the site with the information already stored there. The history folder offers a very easy way to find out the sites you have visited.

The tab page allows you to view items in your history folder and delete them. List of history folders are displayed in the drop-down list.

Name: URL name is displayed.

Size: History file size in bytes is displayed.

Created On: Date and time history file is created in your browser is displayed.

Modified On: Date and time the history file was modified or replaced in your system.

Accessed On: Date and time the history file was accessed.

Full Path: Full path of the history file in your system is displayed.

When you right click, a popup box is displayed that allows you to perform other tasks.

Search: You can search for a specific history file by selecting the link. Enter the name in the dialog box and click Find.

Select All: All the displayed history files are selected.

Delete: Delete a specific history file by clicking it and then clicking this link.

Page 65: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 65

Tab Page Name Description

Refresh: Fresh values are displayed in the screen.

Files & Folders The tab page allows you to select files and folders that are to be included in the schedule for auto clean up. This feature is to be used with extreme caution and forethought as the selected files and folders are deleted beyond recovery during the auto clean up process.

Filter: Select the type of files or folders to be included in the schedule for auto clean up, from the drop-down list. Based on the selection done here, all the types of folders and files are displayed in the display boxes below the drop down list.

The first list box shows all the available folders for the selection done above. Select one of the folders. The files available for the folder are displayed in the second display box. Double click on a file in the second display box. It is now displayed in the main screen.

System Files: Select the checkbox to include system files, related to the selection done above.

Read Only: Select the checkbox to include read only files, related to the selection done above.

Hidden Files: Select the checkbox to include hidden files, related to the selection done above.

When you right click, a popup box is displayed.

Add: Right click on an object in the display boxes and select this link. It is displayed in the main screen. This is now placed in the list for auto clean up.

Save: After the selections are done, click on this link to include the objects for auto clean up.

Refresh: Displays updated values.

Page 66: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 66

Tab Page Name Description

The process is also used to clean temp folders.

Select Save.

Page 67: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 67

File Rights For security reasons, remote users from other machines should not be allowed to modify or create certain files. Some types of viruses create virus carrier files that are uploaded into the network. EScan allows you to selectively allow or bar specific file types from being created or modified.

In the Assign Remote Access File Rights screen, there are four frames, each of which allows you to assign files for a specific task. Each frame has a list box that displays included names in the non-editable display rows and a field to enter file name extensions. Three buttons are provided for each frame that allows you to add, delete or remove a name from the list.

To add a file, enter the file type in the field and select Add. The name is displayed in the respective list box. To delete the file, select it and choose Delete.

To launch Remote Access File Rights:

In eScan Content Administrator, select.

The following table gives details of field validations

Field Name Description

Enable Remote Access File Rights

Select the check box to enable settings done in this screen. File rights are assigned only if the check box is selected. Fields in this screen are enabled only if the check box is selected.

Do not allow remote users to modify the following local files

Remote users from other machines cannot modify specified files on your machine.

Modifications allowed for following files

Remote users can modify specified file types on your machine.

Do not allow remote users to

Remote users from other machines cannot create or modify specified files on your machine.

Page 68: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 68

Field Name Description

create and modify following local files

on your machine.

Creation and Modification Allowed for following Files

Remote users can create and modify specified file types on your machine.

Set to Default Default values are set for all four-tab pages.

eScan Notification and Scan Control When a virus is detected or mails and attachment with restricted words and phrases are found that violate the security policy, the message can be deleted, quarantined or disinfected. A customized notification message can be sent to the sender, receiver or others, informing them about the action taken.

This section provides details on creating customized notification messages. Key tasks are:

To add alerts

To block ID of offensive mail sender

To create a warning message

To launch eScan Notification and Scan Control:

In eScan Content Administrator, select .

Field meanings are described in the following table

Field Name Description

Show Alerts To add alerts: When a mail that violates the security policy is detected, the

Page 69: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 69

Field Name Description

Dialog software takes the specified action like delete, quarantine, disinfect, etc. The software flashes a message about the activity, which is displayed in real-time. By default this feature is enabled and the check box is selected.

A list of warning message types is displayed here. These are hard coded by MicroWorld. There is a check box on the left side, which shows icon by default. This means that the alert is sent to the specified person. You can add a customized message.

Warning Mails from User :

Enter e-mail ID that sends or ‘originates’ the message. The message will show that this ID has sent it.

Delete Mails from User :

Enter e-mail ID from which all mails, when received into your system is auto deleted. For e.g. [email protected]. All e-mails coming from this ID are automatically deleted. This helps you to avoid Spam and other offensive mails.

To block ID of offensive mail sender: Enter e-mail ID in the field and select Add. The ID is displayed in the list box. To allow mails from IDs displayed in the box, click on it and select Delete. To allow mails from all listed IDs, select Remove All.

Select the button to view the following selection box. The box allows you to select files, carrying warnings.

To select warning message: Browse to the required directory and select the file to be sent. Contents of the selected file are sent as warnings. The button is enabled only when Add Disclaimer to outbound Mails check box is selected.

‘Dialog Box’ The box allows you to add or modify specific warning messages and save the message in a default file.

To create a warning message: Select the warning message from the list of warning messages display box. Message content for the selected type is displayed in the following dialog box. Click in the box and type or modify the content. Save it to the default file, as explained in the previous field.

Page 70: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 70

Field Name Description

Select Refresh to view the updated list and select Save.

General Details

Click this tab to view the eScan Log files. You can also import or export black and white lists. Default screen shows the Enable Splash Screen as ticked.

Import/ Export This link allows you to export or import files that specify files or attachments that should be blocked or allowed. The following options are enabled:

eMail Content Scanning eScan has a list of default restricted words that forms a block list. Emails with these names are not allowed to go out or come in. You can Export this list to your hard disk. This ensures that if you had to reinstall eScan, the banned list can be retrieved.

If you have a new list of restricted words, you can Import the list into eScan. While importing, you can choose to Merge the names in the list with names in the existing list so that the old names are retained. You can Overwrite the old values.

When you click on the link eMail Content Scanning, the Import / Export (Content Scanning) dialog box is displayed

Select the appropriate radio buttons, Browse you system for the file and click OK. A splash screen asks you to confirm.

Page 71: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 71

Websites Scanning:

eScan has a list of Websites for which access is allowed. You can Export this list to your hard disk. This ensures that if you had to reinstall eScan, the list can be retrieved.

If you have a new list of allow sites, you can Import the list into escan. while importing, you can choose to Merge the names in the list with names in the existing list so that the old names are retained. You can also Overwrite the old values.

When you click on the link eMail Content Scanning, the Import / Export (Websites Allowed) dialog box is displayed

Select the appropriate radio buttons, Browse you system for the file and click OK. A splash screen asks you to confirm.

Pornography

eScan has a list of restricted words that forms a block list. Accessed to sites that has these names is blocked. You can Export this list to your hard disk. This ensures that if you had to reinstall eScan, the allow list can be retrieved.

If you have a new list of allow words, you can Import the list into eScan. While importing, you can choose to Merge the names in the list with names in the existing list so that the old names are retained. You can Overwrite the old values.

When you click on the link eMail Content Scanning, the f Import / Export (Pornography) dialog box is displayed

Select the appropriate radio buttons, Browse you system for the file and click OK.

Gambling eScan has a list of sites related to gambling that forms a block list. Access to sites that has these names in the body, script, tags, titles, etc. is blocked. You can Export this list to your hard disk. This ensures that if you had to reinstall eScan, the allow list can be retrieved.

If you have a new list of allow words, you can Import the list into escan. while importing, you can choose to Merge the names in the list with names in the existing list so that the old names are retained. You can Overwrite the old values.

When you click on the link eMail Content Scanning, the Import / Export (Gambling) dialog box is displayed

Page 72: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 72

Select the appropriate radio buttons, Browse you system for the file and click OK. A splash screen asks you to confirm.

PopUp Filter eScan has a list of sites for whom PopUp Ads are allowed. You can Export this list to your hard disk. This ensures that if you had to reinstall eScan, the allow list can be retrieved.

If you have a new list of allow words, you can Import the list into eScan. While importing, you can choose to Merge the names in the list with names in the existing list so that the old names are retained. You can Overwrite the old values.

When you click on the link eMail Content Scanning, the Import / Export (White List) dialog box is displayed

Select the appropriate radio buttons, Browse you system for the file and click OK. A splash screen asks you to confirm.

View Log Files This link open the ESCANMON.LOG file in a separate window. Details of attachments sent and received, originating IP, time when the mail was sent and received, etc. are displayed.

Flush / Delete Logs Flushes the all the log files. Delete enables us to delete the individual logs files

Page 73: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 73

Frequently Asked Questions

This section gives answers to frequently asked questions.

What should I check before installing eScan Anti-Virus on Windows 95/98/ME?

You should check for the memory, i.e. there should be a minimum of 32 MB of RAM and a minimum of 100 MB of hard disk space. If there is any other Anti-Virus software already installed on the machine, then uninstall it before installing eScan Anti-Virus software, as you cannot have two Anti-Virus software’s, installed on the same machine.

What should I check before installing eScan on Windows NT Server & Workstation? The service pack should be SP4 and above. If there is any other Anti-Virus software already installed on the machine, then uninstall it before installing eScan Anti-Virus software, as you cannot have two Anti-Virus software installed on the same machine.

NOTE - After installing or uninstalling any software you should restart the machine once]

After the installation of eScan, it gives an error "Unable to bind to port 2001: HTTP simulator failed". In such a case, you should uninstall the software and then install it again. If the problem still persists, then contact the System Administrator or your Hardware Engineer. TCP/IP will have to be installed/reinstalled on the system. After TCP/IP is installed, you can proceed with the eScan installation process again.

After the installation of eScan on Windows 95/98, it gives an error "WS2_32.dll file is missing". Let the installation process complete and then reboot the machine. If the problem still persists, then copy the two files - WS2_32.dll & WS2HELP.dll - from another Windows 95/98 computer and paste them in "c:\windows\system" of your computer. Alternatively, these two files are also available in the Windows installation CD.

After the installation is complete and the computer is restarted, the Monitor icon doesn't appear in the System Tray. This might happen due to incomplete entries in the registry during installation. This means your

Page 74: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 74

installation was not done properly. Uninstall eScan and reinstall it.

After the installation is complete and the machine is restarted, the icon doesn't appear in the System Tray. This might happen due to incomplete entries in the registry during installation. This means your installation was not done properly. Uninstall eScan and reinstall it.

During installation, a screen pops up saying, “Your machine is infected with Boot Sector virus”. If there is any Boot Sector virus, you will have to boot your computer with a clean Windows 95/98 bootable disk and then run the DOS scanner of eScan. Please follow the steps below:

1. a:\>c:

2. c:\>cd avpdos

3. c:\avpdos>avpdos32 c: /-

eScan provides a special utility called cleanwyx.exe for WYX.b or. Boot Sector virus. You will have to boot your computer with a clean Windows 95/98 bootable disk (having cleanwyx.exe) and then run the following command from the floppy:

a:>cleanwyx.exe

If the message "Writing to hard disk successfully" appears, it means the Boot Sector virus has been removed from your hard disk.

Note - If there are any other issues or problems regarding WYX.B virus, then please write e-mail to [email protected]

After the installation is complete and the machine is restarted, certain applications don't seem to function. To make the applications function, please edit c:\program files\escan95\log\tsp.log. Here you will find all the names of the EXE files of the application that are run and are giving a problem. This log file provides the entire path and the names of the EXE files.

Thereafter, edit c:\program files\escan95\exclude.dat file and add the names of the concerned EXE files of the application that are not functioning; then save this file and finally start that program. The same applies to Windows NT Server and Workstation.

Note - In case of Windows NT Server and Workstation, the path will be c:\program

Page 75: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 75

files\escannt\exclude.dat]

What should I do if some viruses could not be removed while scanning the computer? This might happen because some files might be in use. To clean those file, restart the computer in MS-DOS mode and run the DOS scanner of eScan. Then follow the steps below:

c:\>cd avpdos

c:\avpdos>avpdos32 * /-

This will clean all the viruses that could not be removed from the Windows mode.

What should I do if there is cross mark on the Monitor icon? This can happen because of two reasons, viz.:

a) either the Monitor has been disabled or

b) the License period is over (expired).

This can be rectified in two ways:

Right click on Monitor icon in the System Tray and then click on Enable eScan Monitor option. This will enable the Monitor and the cross mark will disappear.

Double click on the icon in the System Tray and then go to the Monitor section from Task Bar (left side of the screen). There will be an option to turn the Monitor On or Off. Check the "On" option and then click on the "Apply" button and exit. This will enable the Monitor and the cross mark will disappear.

I drag the mouse pointer on the icon and it shows "Unknown Server". What should I do? This might happen because of two reasons:

eScan Management Console Announcement mechanism has been stopped.

eScan server is on a different network.

To rectify this, first check if eScan Management Console icon is present in the System Tray. Double click on the icon to select the Services option in order to check if the announcement is "ON".

"Stop Announcement" should be active in case the announcement is ON.

Starting the announcement should solve your problem. In case the problem still persists, then go to c:\program files\escan95 directory of the client machine and then edit eupdate.ini. Edit the following

Page 76: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 76

entries in the EUpdate.ini in the following sections:

[Config]

Servers=

Save the file. Right click on the icon and click on "Exit". Then click on Start> Programs> eScan for Windows and thereafter click on eScan Client updater option. Now the icon will be displayed in the System Tray. Just point the cursor on it to check if the TCP/IP address of the eScan server is displayed.

What should I do when the message "License period over" is displayed whenever I start the computer? There are two different ways to enter the License key:

Right click on icon to select eScan Content Administrator option. Once the screen appears, click on the License button on the Task Bar (left side of the screen). Then enter the License key in upper case only.

Go to c:\Program files\eScan95 directory from MS-DOS prompt to edit License.ini. Just delete the old key specified in the "Key =" section and then enter the new License key in upper case only.

Where can I check the renewal/expiry date of eScan?

Right click on icon in the System Tray to select eScan Content Administrator option. Once the screen appears, click on the License button on the Task Bar (left side of the screen). The date when eScan has to be renewed is displayed there.

How do I know that the client machine is updated or has pulled the updates from the eScan server?

Right click on the icon in the System Tray to select View log files option. Further, click on View Download log to view the date, time and the list of all successfully downloaded files from the eScan server.

When I try to scan the hard disk using eScan for Windows, it displays the message "An error was found at checking the virus database: some AVC files are missing. Please call our hotline." This might happen if some database files (AVC files) of eScan are either corrupted or not being copied properly during installation. In this case, simply download the latest eScan updates from the eScan

Page 77: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 77

server. This should solve the problem

How do I remove Boot Sector and macro viruses from a floppy disk?

Right click on the icon in the System Tray to select Scan Floppy disk option. Ensure that the floppy is not write-protected before inserting it in the floppy drive. Then click on "Scan Now" button. eScan will then start the scan process to remove the viruses from the floppy disk.

What should I do if I don't see the Monitor settings menu when I right click on the Monitor icon in the System Tray? While installing eScan the option "Should the user be given the option to DISABLE background monitoring for viruses?" is provided. If you would have clicked on the NO button during installation, the Monitor settings will be disabled.

To activate the Monitor, click on Start> Run, type the command "killmon" and finally press the Enter key. This will restart the eScan Monitor and activate it.

If I make one machine as an eScan server and it is not having an Internet connection, will it pick up the updates from the Internet? In this scenario, you can have an Internet connection through a proxy or a dial-up modem. Else, you will not be able to download the latest virus signatures.

Once I install an eScan server, will I have to do any additional settings in eScan? No. When you install eScan as a server, it automatically detects the settings of the proxy server. If you have a modem, it will download the updates/signature files and push these to the clients whenever you connect to the Internet.

What will happen if I disable the eScan server? In this case, the clients will not be able to communicate with the eScan server and as a result the logs from the clients will not be uploaded to the eScan server. Likewise, the clients will not be able to pull the updates from the server.

How does a client know which is the eScan server? eScan server has an announcement mechanism that keeps broadcasting that it is the eScan server on the network. This is done through User Datagram Protocol (UDP). The client has a listening mechanism that listens to the UDP broadcasts and updates its' information pertaining to the server's IP address.

Page 78: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 78

In eScan Management Console some of the users' icons are shown in red color. What does this indicate? This indicates that those computers have been found with infections. Therefore, you need to check the logs.

What should I do if eScan is unable to remove a new virus? In case a new virus strikes and eScan is unable to remove it, please send a copy of the infected file to [email protected] (only after password protecting it in the form of a ZIP file). Virus-infected file that is detected (but cannot be disinfected) will not be forwarded but it will be quarantined.

If eScan quarantines *.exe and *.com files and thereafter eScan is uninstalled, will these files get deleted? No, these files will not get deleted.

How do I change the directory of eScan after the installation process is over? No, you cannot move/change the directory of eScan. For this you will have to reinstall the software with the desired path.

Page 79: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 79

Index

A

About Content Administrator, 31 About eScan Tasks, 13 About eScan Updater, 19 About MicroWorld, 9 Action, 43 Add Disclaimer, 43 Administrator, 12, 73 advanced tasks, 7 After Update, 23 Alerts, 34 Announcement, 73 announcement mechanism, 73 Anonymous, 23, 28 Apply, 73 attachment, 7, 10, 31 Automatic, 12, 21

B

bandwidth, 34 Block scripts popups images

audio video apps, 33 Boot Sector virus, 73

C

Checks, 9, 12 Client, 73 Code, 12 Common Installation Process, 7 Compress, 34 compressed, 34 Computing, 7, 73 Configure eScan Updater, 19, 20 Configuring, 19

Contact Us, 8 Content-, 5, 7, 9, 11, 12, 13, 31,

33, 34, 43, 73 Content Administrator, 31, 34, 73 Content Control, 7, 33, 43 Content Scanning, 12, 34 Control, 12, 21

D

Default, 28 Details, 7, 9, 13 Details of eScan tasks, 13 detect, 12 development, 9 directory, 28 Disclaimer, 34, 43 Do not send disclaimer mails to,

43 DOS, 73 download, 28, 30, 73 Download Directory, 28 drive, 73

E

Edit, 73 e-mail, 73 eMail Content Scanning and

Spam Killer, 43 email Scanning, 34 Enable, 73 Enable Autodownload, 23 Enable Content, 43 Enable Download Via Proxy, 23 Enable Update Notification, 23 error WS2_32.dll, 73 eScan Content Administrator, 73

eScan Corporate, 7, 11, 31 eScan Management Console, 7,

73 eScan Notification and Scan

Control, 33 eScan Products, 9, 11 eScan Server, 12 eScan Tasks, 13 eScan Updater Options, 23 exchange, 5 Execute this, 23 extension, 34

F

Features of eScan, 12 files, 73 Force Process, 23 Frequently Asked Questions, 7,

73 FTP, 19, 20, 21, 23, 28 FTP Download Site, 28 FTP Proxy Server IP, 28

G

Gateway, 9 General Configuration, 22, 23 Getting Started, 7, 18 Glossary, 7

H

Help, 12, 35 Heuristic, 12 Hide All Icons, 23 How this guide is organized, 7 How to use Content

Page 80: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 80

Administrator, 33 HTTP, 20, 21, 23, 30, 73 HTTP Config, 23, 30 HTTP Download Site, 30, 33

I

ID, 12, 23, 33, 43 Important Terms in Configure

Updater, 20, 21 Important Terms in Content

Administration, 33, 34 incremental, 12, 23 Installation, 7 Internet, 19, 23, 28, 73 Internet traffic, 12, 19, 31, 34 IP address, 19, 23, 28, 73

K

Key, 73 known viruses, 10

L

LAN, 21 Launch eScan Auto Updater, 20,

22 License, 34, 73 License period over, 73 listening mechanism, 73 local, 21, 23, 28 Login name, 23, 28 Logon Type, 28

M

mail, 10, 21, 43 Management, 9, 12, 73 Management Console, 73 Maximized, 23 Messages, 34 Minimized, 23 Monitor System, 7 More, 43 MWL, 7, 9, 10 MWL Technology, 9, 10

N

Network, 23, 30 New, 9 Normal Windows, 23

O

Once, 5, 73 OPEN siteaddress, 28 Our Asia Pacific office, 8 Our Head Office, 8

P

Parameters, 23 PASV Mode, 28 Phrase, 43 Port, 21, 23, 28 Program Name, 23 protocol, 21, 23 proxy, 19, 23, 28, 73

R

real-time, 9 Records, 7 Remove All, 43 Run, 23, 73

S

Safe Computing, 7 sales enquiry, 8 Save, 23, 30, 43, 73 Scanner Administration, 33 Scanner Administration and

Compression Control, 33 Select Logon type, 20, 28 Select update download FTP site,

20, 28 sender, 31 Services, 8, 73 Set auto actions after update

downloads, 20, 23 Set FTP, 20, 28 Set FTP Updater Configuration,

28 Set FTP Updater

Configuration,Password, 28 Set General Updater

Configuration, 20, 23 Set General Updater

Configuration,Password, 23 Set HTTP Updater Configuration,

20, 30 Set UNC Updater Configuration,

30 Set update download mode, 20,

23 shared drive, 30 Simple, 12, 21 Socks, 28 solution, 9 Source UNC Path, 30 Start eScan Content Administrator,

34 Start in, 23 Stop Announcement, 73 Support, 7 system, 73

T

To add alerts, 33 To add disclaimer for incoming

mails, 33, 43 To add disclaimer for outgoing

mails, 33, 43 To Add new Category, 33 To add restricted phrase, 33, 43 To add sites category for

allow/block access, 33 To add websites and key words to

categories, 33 To append customized messages,

33, 43 To archive mails/attachments, 33 To Assign eScan File Rights, 33 To assign Filter category, 33 To block ID of offensive mail

sender, 33 To block/allow attachments, 33

Page 81: eScan Content Admin User Guide Content... · 2008-11-07 · eScan Content Security User Guide 8 Contact Us We offer 24x7 support to our customers through e-mail, telephone and Chat

eScan Content Security User Guide 81

To change allow/block status of Sites, 33

To create a warning message, 33 To delete a Category, 33 To enable updates auto

download, 20, 23 To launch Content Administrator,

34 To launch e Scan tasks, 13 To Plug Internet Explorer

vulnerabilities, 33 To set action for offensive mails,

33, 43 To set Content Matching Options,

33 To set filters for rating system, 33 To set time for updates auto

download, 23 Topics in Configure eScan

Updater, 20 Topics in Content Administrator,

33 Topics in eScan Tasks, 13 Type, 28, 43

U

UDP broadcasts, 73 Unable to bind to port

2001,HTTP simulator failed, 73

UNC Configuration, 30 UNC Updater Configuration, 20,

30 Unknown Server, 73 Update notification Mails from

user, 23 Update notification Mails to user,

23 Update now, 23 Updates, 7, 9, 12, 19, 21, 28 User siteaddress, 28

V

Version Request HTTP, 23 View Download log, 73 View Records, 7

W

Webpage Scanning, 33, 34 Windows 95, 73 Windows NT, 73 Windows NT Server &

Workstation, 73 Winsock, 7, 10

Z

ZIP, 73