charter business desktop security administrator's...

60
Charter Business Desktop Security Administrator's Guide

Upload: others

Post on 14-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Charter Business Desktop Security Administrator's Guide

Page 2: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Table of Contents

Chapter 1: Introduction .............................................................................................................. 4

Chapter 2: Getting Started ......................................................................................................... 5

Creating a new user ................................................................................................................................................. 6

Recovering and changing your password ................................................................................................................ 8

Recover your password ....................................................................................................................................... 8

Change your password ........................................................................................................................................ 9

Viewing the subscription key .................................................................................................................................10

Chapter 3: Download and Install Charter Business Desktop Security Workstation Security .... 12

System requirements ............................................................................................................................................14

Download and Install Charter Business Desktop Security Workstation Security ..................................................16

Download Charter Business Desktop Security Software ...................................................................................16

Install Charter Business Desktop Security Software ..........................................................................................17

Chapter 4: Upgrade ................................................................................................................. 24

Upgrading to the latest version .............................................................................................................................25

Chapter 5: Administering the product ....................................................................................... 26

Checking the system status ...................................................................................................................................27

View reports and infection status .....................................................................................................................27

Scan for Malware ...............................................................................................................................................28

Keeping computers in the network safe ............................................................................................................29

Checking the status of a group of devices .........................................................................................................30

Checking the status of computers .....................................................................................................................30

Managing product settings ....................................................................................................................................31

Assigning operations ..........................................................................................................................................31

Assigning profiles ...............................................................................................................................................32

Manage groups ..................................................................................................................................................32

Managing profiles ..................................................................................................................................................36

Creating a profile ...............................................................................................................................................36

Editing a profile ..................................................................................................................................................39

Changing profile name or description ...............................................................................................................43

Setting a default profile .....................................................................................................................................44

Resetting default profiles ..................................................................................................................................44

Page 3: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Managing software updates ..................................................................................................................................46

Installing software updates automatically ........................................................................................................46

Installing software updates on selected computers ..........................................................................................47

Checking software update status for a specific computer ................................................................................48

Chapter 6: Troubleshooting ......................................................................................................... 51

Frequently Asked Questions ..................................................................................................................................52

Appendix A – Download and Install Charter Business Desktop Security Workstation Security for

Mac ........................................................................................................................................... 53

System requirements ............................................................................................................................................14

Download and Install Charter Business Desktop Security Workstation Security for Mac ....................................15

Download Charter Business Desktop Security Software for Mac .....................................................................15

Install Charter Business Desktop Security Software ..........................................................................................17

Page 4: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Chapter 1: Introduction

This guide is divided into chapters that give you general information about

Charter Business Desktop Security software, its deployment and installation.

This guide contains instructions how to install and administer Charter Business Desktop Security Portal and Charter Business Desktop Security software.

Page 5: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Chapter 2: Getting Started

Topics:

• Creating a new user

• Recovering your password

• Viewing your subscription key

This chapter explains how to get started with the Charter Business Desktop Security.

In this chapter, you will find instructions on how to create a new user,

recover your password, and view your subscription key.

Page 6: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Creating a new user

You are able to create new user accounts for users you wish to allow access to the Charter Business

Desktop Security Portal.

To create a new user:

1. Click the My company account and users located on the top right of the Portal.

2. The Account details page opens. Click Create user.

3. Complete the form fields and Click Submit.

User name: Enter a unique user name.

Password: Enter a password.

Confirm password: Confirm the password entered. See the Recover and change your password section for instructions on changing a password.

Mobile phone number (optional): Enter the user’s mobile phone number.

Language: Select the user’s language.

E-mail address: Enter the user’s email address.

Page 7: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Receive e-mail as: Select how the user wishes to receive e-mail, either as plain text or HTML.

Read-only (No editing rights): Select yes if you do not want the user to be able to edit, select no if you want the user to be able to edit.

Time zone: Select the time zone for the user’s location.

4. The User was created page opens, confirming that the user was created successfully.

5. The new user will now appear on your My company account and users > Account details page. You may now provide the user information to the user for them to log into the Charter Business Desktop Security portal.

Page 8: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Recovering and changing your password

You are able to recover and change your password using the Charter Business Desktop

Security Portal.

Recover your password

If you have forgotten your password, you can recover it through the Forgot your password link.

To recover your password:

1. On the log in page of the Charter Business Desktop Security Portal, click the Forgot your password? link.

2. Enter your user name, and click Submit.

Page 9: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

3. An e-mail message is sent to the e-mail address that you provided when you created the

account. The e-mail message contains a link to the Charter Business Desktop Security Portal where you can change your password.

Change your password

If you would like to change your password you may do so through the My user name link. To

change your password:

1. Click the My user name link at the top right of the Portal page. The Edit user / change

password page opens.

2. Click Change password. Enter the old password, new password, and confirm the new password. Click Submit.

Page 10: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

3. You receive confirmation that your password was changed successfully.

Viewing the subscription key

You are able to view the subscription information for your company account.

To view your subscription information:

1. Click the Subscriptions tab. The Subscriptions page opens, displaying your subscription

information, such as such as key, usage, active computers, and expiration date.

Page 11: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as
Page 12: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Chapter 3: Download and Install Charter Business Desktop Security Workstation Security

Topics: • System requirements

• Download and Install Charter Business Desktop Security Workstation

Security

System requirements and software download and installation instructions for Charter Business Desktop Security Workstation Security.

This section describes the system requirements for installing and using

the product, and gives you instructions on how to download and install

the product.

Page 13: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

System requirements

Read the following before starting to install and use Charter Business Desktop Security Workstation Security.

Your computer must meet the following minimum requirements for installing and using the product. For Mac users, see Appendix A.

Operating system version:

Processor:

Memory:

Display:

Disk space:

Internet connection:

Microsoft Windows XP (32-bit) service pack 2 or newer:

• Home, Professional and Media Center editions

Microsoft Windows 7 and Vista (32- and 64-bits). All service packs:

• Starter

• Home Basic

• Home Premium

• Business

• Ultimate

• Enterprise

Windows 8 32-bit and 64-bit

For Microsoft Windows XP:

• Intel Pentium III 1 GHz or higher

Microsoft Windows 7 and Vista:

• Intel Pentium 4 2 GHz or higher

For Microsoft Windows XP:

• 512 MB

For Microsoft Windows 7 and Vista:

• 1 GB

For Microsoft Windows XP:

• 8-bit (256 colors)

For Microsoft Windows 7 and Vista:

• 16-bit or more (65000 colors)

For Microsoft Windows XP:

• 800MB free HD space

For Microsoft Windows 7 and Vista:

• 800MB free HD space

An Internet connection is required in order to validate your subscription and

receive updates.

Page 14: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Browser: For Microsoft Windows XP:

• Internet Explorer 5.0 or newer is required.

For Microsoft Windows 7 and Vista:

•Internet Explorer 7.0 or newer is required

Supported browsers for using the Charter Business Desktop Security Portal:

•Internet Explorer 6.x or newer is required. JavaScript and

cookies must be enabled in the browser

•Firefox 2.x or newer is required. JavaScript and cookies must be

enabled in the browser

Note: To use Profile Editor, you need to have Java Runtime Environment 1.6 or newer installed on your computer.

Page 15: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Download and Install Charter Business Desktop Security Workstation Security

This section describes how to locally download and install Charter Business Desktop Security Workstation

Security.

You are able to download and install the Charter Business Desktop Security on a workstation locally from the

Charter Business Desktop Security Portal.

Download Charter Business Desktop Security Software

To download Charter Business Desktop Security on a workstation locally:

1. On the workstation computer, go to the Charter Business Desktop Security Portal URL.

2. The Charter Business Desktop Security Portal login page opens.

3. Enter your Administrator user name and password and click Enter. The Charter Business Desktop

Security Portal Home page opens.

4. Click the Download software link located at the top left of the Charter Business Desktop Security Portal.

Page 16: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

5. The download workstation software page opens. Click either Windows or Mac.

6. Several windows will open:

• The download window opens. Click Run.

• The Internet Explorer – Security Warning window opens, asking if you want to run the software. Click Run.

• The User Account Control window opens, asking if you want to allow the following program to make changes to this computer. Click Yes.

Install Charter Business Desktop Security Software

To install Charter Business Desktop Security on a workstation locally:

1. The Charter Business Desktop Security Setup page opens. Click Next.

Page 17: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

2. The License Agreement page opens. Read the license agreement and click Accept to accept the license

agreement and continue the installation.

3. The Subscription key page opens. Enter your Subscription Key, click Next.

Page 18: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Note: You can find your subscription key under the Subscriptions tab in the Charter Business Desktop Security Portal.

4. The Installation Type page opens. Select the installation type you want to install, and click Next.

Automatic installation: The product is installed automatically. Existing security products may be

automatically replaced. The product is installed to the default directory.

Step by step installation: During the installation, you can change the installation directory. However, we

recommend using the default directory.

5. The Updating and installing files page opens, stating that the file update and installation is in progress.

Click Next. The application will search for conflicts.

Page 19: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

6. If conflicting software is found, the system will prompt you to either automatically or manually remove it.

7. The Removing conflicting security programs page opens, showing progress of the program removal.

Page 20: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

8. Depending on the computer’s system configuration, the PC may prompt for a reboot. Select to either

Restart now (recommended) or Restart later. Click Finish.

9. After the reboot, the splash screen will display again.

Page 21: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

10. The Completing installation window will display the progress of the install. Installation of updates will proceed until complete.

11. The Installation Complete window will display once all updates have been installed successfully. Click

Close.

12. The Charter Business Desktop Security icon is now in the computer’s system tray. If clicked, the Charter

Business Desktop Security page opens to view status, tasks, and statistics (see Charter Business Desktop Security Workstation Guide for more information).

13. The computer is now associated with the respective subscription and is visible on the Charter Business Desktop Security Portal. Log into the Portal to verify that the computer shows in the Portal Computers page.

Page 22: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Note: It may take up to two hours before the connection is established. On the Charter Business Desktop Security Portal main page (Home Tab), you can view the status of all computers and subscriptions associated with the account. If the computer has not yet received the latest updates, you may see either a yellow or a red status icon. For more details on the computer(s), click the Computers tab.

Page 23: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Chapter 4: Upgrade

Topics:

• Upgrading to the latest version

This chapter explains how to upgrade to the latest version of Charter Business Desktop Security software.

Page 24: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Upgrading to the latest version

Charter Business Desktop Security products support channel upgrade functionality.

All Charter Business Desktop Security products support channel upgrade functionality. This means that when a

new version of any Charter Business Desktop Security product is published on the Charter Business Desktop

Security Portal, all the computers on which the product is installed receive a notification about the update

automatically.

You can install the new version after you receive the update notification or postpone it if you do not want

to start the installation immediately.

Note: In most cases, the installation of a new version of a Charter Business Desktop Security

product requires a system restart.

Page 25: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Chapter 5: Administering the product

Topics: • Checking the system status

• Managing product settings

• Managing profiles

• Managing software updates

• Managing Groups

This chapter describes how to administer the product using the Portal.

The Portal shows you the security status of the computers in your network

and points to any security problems that you should fix.

You can change the product setup locally through the program installed

on a computer, or remotely using the Charter Business Desktop

Security Portal.

Page 26: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Checking the system status

Follow the instructions in this chapter to solve any issues that you may need to fix.

The Portal shows you the security status of the devices in your network and points to any security

problems that you should fix.

View reports and infection status

On the Home tab on the Portal you can view the overall protection status of your network.

The pie chart shows the proportions of the network computers that are protected, or that have either minor

or critical problems.

Note: The Portal only shows security information about the devices that are registered to the Portal.

If you have devices that are not registered to the Portal, they may be a security risk.

The list on the right shows network information by each security component. If you only see green icons,

all devices are protected. You can also see the overall number of the accounts and devices in your

network.

Viewing reports In addition to the overall protection status that is displayed on the Home page, you can view other system-wide information by clicking on the Reports tab.

Note: The Reports page may take a moment to load fully while the system gets the most recent

data. The Reports page shows six different reports:

Overall protection: This chart shows the overall protection status for the last four weeks. Click on a date

at the bottom of the chart to display the pie chart for that day.

Virus protection: This chart shows the number of viruses blocked by Virus and Spy Protection during the

last four weeks, along with the ten most commonly found infections and most commonly affected

computers.

Internet Shield: This chart shows the number of network services blocked by Internet Shield during the

last four weeks, along with the ten most commonly blocked services.

Automatic updates: This chart shows the status of virus definitions updates throughout the system during

the last four weeks.

Viewing infection status You can view a list of all the infections found in your network on the Infections tab.

The Infections page lists all of the malware found in your network over the past four weeks.

Page 27: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Each entry includes the following information:

Date: Date and time when the infection was found.

Computer Name: The name of the computer where the infection was found. Click the entry in this column to

see an overview of the computer's protection status.

Infection Name: The name of the infection found. Click the entry in this column to see a description of the

infection.

Type: Indicates the type of source for the infection, for example whether it was found in a file or in web

traffic.

Action: The action that was taken when the infection was found.

Infected Object: The path to the infected object.

Account Name: The name of account that the infected computer belongs to. Click the entry in this column to

see an overview of the account's protection status.

User Name: The account of the user who was logged in when the infection was found.

You can export the infection information by clicking Export data. You can choose to export the information in

either Excel or CSV format.

Scan for Malware

To scan for malware, do the following:

1. Click on the Computers tab.

2. On the Computers page, select the computers that you wish to scan for malware, and click the Scan for Malware tab.

Page 28: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

3. Click Assign operation.

4. The page states that you have successfully assigned an operation to the computer. Click Close.

Keeping computers in the network safe

Page 29: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

You keep all the computers in the network safe.

To keep the computers in the network safe, do the following:

1. Make sure all your computers are registered to the Portal.

2. Check whether any of the computers that are registered to the Portal have security problems. Some of these problems you can fix directly from the Portal; some of these problems you may have to fix locally.

3. Check which users need a more strict security profile.

Checking the status of a group of devices

You can check the status of devices that belong to the same group, that have the same subscription key or that

share the same problem.

Viewing devices that have the same problem You can view all the devices that have the same problem. To view the devices:

1. On the Home tab, click one of the links that show the number of devices with a specific problem. For

example, "virus definitions are very old in 3 computers".

2. The Computers page opens, displaying the devices with the respective problem.

Viewing computers that belong to the same group You can view all the computers that belong to the same group. To view the computers:

1. Click the Computers tab. The Computers page opens.

2. Click the Central Management tab.

3. On the Central Management page, do one of the following:

Click the Group column title to sort the computers by their group name.

Enter the name of a group in the Search box at the top right corner of the computer list, and click

Search. The number of computers belonging to the group is shown. Click the link to view all the

computers in the group.

View devices with the same subscription key You can view all devices with the same subscription key. To view devices:

1. Click on the Computers tab.

2. Click the Installed software tab.

3. On the Installed software page, click the Subscription key column title to sort the computers by their

subscription key.

Checking the status of computers

On the Computers tab, you can check the overall protection status of computers.

Page 30: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

The Computers tab shows you detailed information about the computers that are registered to the Charter

Business Desktop Security Portal.

By clicking the different tabs, you can view the following:

Overall Protection

Virus Protection

Internet shield

Automatic updates

Software updates

Central management:

Computer information

Installed software

Note: To view additional details related to an individual workstation, click the computer name.

Managing product settings

This chapter explains how to remotely manage the product settings by assigning operations and profiles

using the Charter Business Desktop Security Portal.

Assigning operations

You can also assign operations to a remote computer from the Portal, for example, enable the firewall

or real-time virus scanning on a remote computer.

To assign an operation:

1. Select computers from the list by selecting the appropriate checkboxes.

2. Click Operations. A list of operations appears.

3. Select one of the following operations from the list:

Page 31: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Select...

Send full status update

Enable firewall

Enable Real-time Scanning

Enable Application Control

Set Internet Shield security level to

Office

Scan for missing software updates

according to profile in use

To...

force the remote computer to send a full report of it's status to

the Portal.

allow safe internet traffic and blocking unsafe traffic.

find and block viruses on the remote computer before they can

cause harm.

let the user decide which applications are allowed to access the

Internet on the remote computer.

select the most commonly applicable level of protection from

unsafe traffic on the remote computer.

reduce software vulnerabilities in corporate systems by

automatically keeping installed software up-to-date.

4. Click Assign Operation to assign the operation to the remote computer.

The operation is applied to the computer the next time the computers checks for updates with the Portal.

Assigning profiles

You can assign a new profile to a computer, for example, to restrict the users of that computer from

making dangerous changes to the security settings.

There are default profiles for connecting to the Internet from a fixed location (for example, Office open,

Office locked) and from outside office premises (for example, Laptop open, Laptop locked). An open

profile allows end users to change security settings; a locked one does not allow changes.

To assign a profile:

1. In the Computers list, select the computers to which you want to assign a profile.

2. Click Assign profile. A list of available profiles is shown.

3. From the list, select a profile.

4. Click Assign.

5. The local operation or profile is applied to the computer the next time the computers checks for updates with

the Charter Business Desktop Security Portal.

The remote computer must be on and connected to the Internet to be able to check for pending local

operations or new profiles.

Manage groups

You are able to view and change the groups to which computers are assigned.

Page 32: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

View groups

To view the group to which computers are assigned:

1. Click the Computers tab.

2. From the Computers page, click the Central Management tab.

Change groups

To change the group to which computers are assigned:

1. Click the Computers tab to view the list of computers. The Computers page opens to the Overall

protection tab.

2. Select the computers whose group you want to change.

Page 33: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

3. Select Change group.

4. Enter the group name for the selected computers. Click Change.

Page 34: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

5. The page confirms the group to which the computer(s) was assigned.

Page 35: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Managing profiles

You can create, edit, or remove profiles using the profile editor.

Profiles let you control what users can do with the security settings on a computer. Profiles differ by:

Users' computer skills: A profile for novice users may restrict their rights to change their security

settings.

Computer type: Laptop or desktop computer. A profile for a laptop computer is designed to protect

users when they access the Internet from unsafe locations, such as cafes with free Internet access. A

profile for a desktop computer is designed to protect access to the Internet from a fixed location.

There are predefined profiles that you can apply to computers. If a suitable profile does not exist for users,

you can create your own profiles. You can use an existing profile as a basis for a new profile. You can also

add your own default profiles.

Creating a profile

You can create a new profile that can be assigned to remote computers. To create a profile:

1. Click the Profiles tab.

2. Select Launch Profile Editor. The Profile editor page opens.

Page 36: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

3. Select an existing profile on which to base the new profile. Select a profile that is similar to what you want

so you do not have to change many settings. Hover over the profile name to see a description of the

profile.

4. Click the Create new profile icon.

Page 37: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

5. The Profile Properties window opens. Complete the fields and click OK.

Profile name: Enter a name for the profile. This name represents the profile on the Computers

page.

Profile description: Enter a description for the profile. You see the description of a selected profile

on the Computers page when you assign a profile. The description should clearly tell all users

what the profile does.

Page 38: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

6. A new profile with the same settings as the base-profile is added to the Profile tree.

7. You can now assign this profile to remote computers on the Computers page.

Editing a profile

When you edit an existing profile, the changes that you make are enforced on all the computers with that

profile.

To edit a profile:

1. From the Profiles tab, click Launch Profile Editor. The Profile editor page opens.

Page 39: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

2. Select an editable profile.

Profiles that are created by other users are locked and you cannot edit them. These profiles have a yellow

lock icon next to the profile name.

Page 40: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

3. Click the Edit profile icon. The profile name indicates that it is being edited.

4. In the Settings tab, select one of the groups of settings.

5. Change a setting:

Select or clear a setting.

If you do not want the user to be able to change the setting on the remote computer, click the lock

icon next to the setting or click Disallow user changes.

6. Repeat the previous steps until the profile has the settings you want.

7. Click the Publish profile icon to save and publish the profile changes.

8. You can remove any edits you made and leave the profile with no changes. Click the Edit profile and click

the Discard changes icon.

9. The changes you made to the profile settings are applied to all the computers with this profile when they

next check with the Portal for updates.

Deleting a profile You can remove a profile from the list of available profiles. To delete a profile:

1. Select an editable profile from the profile tree.

You cannot delete profiles that were created by other users. These profiles are locked and have a yellow

lock icon next to the profile name.

Page 41: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

2. Click the Delete selected profile icon

3. A window will pop up to confirm that you want to delete the selected profile. Click Yes.

4. All sub-profiles are also deleted. The selected profile and all its sub-profiles are deleted and no information

about the profile is available in the Portal. The deleted profile is not deleted from the actual workstation.

Page 42: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Changing profile name or description

You can rename a profile and edit the description if, for example, the settings of the profile no longer agree

with the name and description.

To rename a profile:

1. On the Profiles tab, click Launch Profile Editor.

2. Select an editable profile from the profile tree on the left. You cannot edit profiles that are created by other

users. These profiles are locked and have a yellow lock icon next to the profile name.

3. Click the edit profile icon.

4. Click the profile properties icon.

5. Edit the profile name and description and click OK. You can enter the description in multiple languages.

Page 43: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

6. You can remove any edits you made and leave the profile with no changes. Click the Edit profile and click

the Discard changes icon.

Setting a default profile

You can set your own default profiles for remote computers.

These profiles are applied to new computers that you add to the system. If you do not set any default profiles,

the system default profiles are applied to computers.

To set a default profile:

1. From the Profiles tab, select a profile that you want to set as the default profile.

2. Click Set default profiles.

3. Click Update.

4. In the Default profiles column, you can view the profiles that you selected as the default profiles. They are

applied to new computers that you add to the system.

Resetting default profiles

If you have set your own default profiles for remote computers, but you want to restore the system default

profiles, reset the default profiles.

To reset the default profiles:

1. On the Profiles tab, click Reset default profiles.

2. Click Reset default profiles.

Page 44: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Your own default profiles are cleared from the Default profiles column, and the system default profiles are

shown instead. The system default profiles are applied to new computers that you add to the system.

Page 45: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Managing software updates

Through the Charter Business Desktop Security Portal, you can manage and install software updates for

the computers in your network.

It is important to have the latest software updates installed on the workstations in your network, because

many updates fix security vulnerabilities in installed products.

In the Portal, software updates that are categorized as critical or important security updates affect the

overall protection status. In addition, computers that are missing critical security updates are highlighted on

the Home tab.

You can configure your profiles to automatically install critical and important security updates to computers.

You can also check the status of software updates both for individual computers on the computer details

page from the Computers tab and on the Software updates tab, where you can also install missing

software updates manually.

Installing software updates automatically

You can configure profiles to automatically install security-related software updates to computers in your

networks.

By default, automatic installation of software updates is turned off. To turn on automatic installation of software

updates:

1. Click the Profiles tab.

2. From the Profiles page, click Launch Profile Editor.

3. On the Profile editor page, select the profile that you want to edit.

4. Click Software updater from the list of settings in the Settings section on the right.

5. Select Enable Software Updater and set the schedule and update categories to be automatically

installed.

Page 46: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

6. Click the Publish changes icon to save and publish the profile changes.

Installing software updates on selected computers

You can also install updates on selected computers.

1. From the Computers tab, select the computers for which you want to install updates.

2. Select Software updater at the top of the Computers tab.

3. Select the updates you want to install and click Install.

4. The Software updater page confirms that you have successfully assigned an operation.

5. Click Close.

Page 47: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Checking software update status for a specific computer

You can check the status of software updates for an individual computer from the Computers tab. To check the

software update status for a specific computer:

1. Click the Computers tab.

2. On Computers page, select the computer for which you want to view software update status.

3. Click the Software updates tab.

You can also view the status of software updates for an individual computer.

1. From the Computers tab, click on the computer for which you want to view software updates. The

Detailed computer information page opens.

2. On the Detailed computer information page you can view details for software updates for the specific

computer.

Checking the status of software updates in your network On the Software updates tab, you can check the status of software updates in your network.

The Software updates page provides a list of updates for the software in use within your network. Each entry

on the list includes the category, software, bulletin ID, update name, and CVE ID. From this page, you can

check which computers are missing selected updates, and also install the missing updates to those

computers.

Note: Software updates are checked and installed according to the policies in use.

Page 48: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Viewing computers that are missing software updates

You can check which computers have not installed the software updates that you select on the

Software updates page.

To check which computers are missing software updates:

1. Click the Software updates tab.

2. On the Software updates page, select the software updates that you want to check.

3. Click View affected computers.

4. Click View computers.

5. The Affected computers dialog opens, showing a list of the computers that are missing the

selected software updates.

Installing missing software updates

You can install missing software updates to either all affected computers or only selected computers.

If you want to test software updates on a pilot group in your network, or to troubleshoot specific

updates, you should install updates to a selected group of computers. Otherwise, you can install the

missing software updates to all computers.

To install the missing software updates:

1. On the Software updates page, select the updates that you want to install.

2. Click Install.

To install the selected updates to all affected computers:

1. On the Install missing updates tab, click Install.

2. The missing updates are installed to all the affected computers.

Page 49: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

To install the selected updates to specific computers:

1. On the Install missing updates tab, click Select computers.

2. The Affected computers dialog opens, listing the computers that are missing the selected

software updates.

3. Select the computers where you want to install the missing software updates, then click Install.

4. The missing updates are installed to the selected computers.

Page 50: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Chapter 6: Troubleshooting

Topics: • Frequently asked questions

This chapter answers the most frequently asked questions.

If you do not find answers to your questions in this manual, please contact

support.

Page 51: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Frequently Asked Questions

Answers to the most frequently asked questions.

Q. How can I change the language in my Charter Business Desktop Security Portal?

A. To change the language, first log in to the Charter Business Desktop Security Portal, click your user name at

the top right corner. In the Edit account page, from the Language drop-down list, select the language that you

want, and click Submit.

Q. I installed the Charter Business Desktop Security software on a computer, but I cannot see the computer

in the Charter Business Desktop Security Portal. What should I do?

A. If you do not see a computer in the Charter Business Desktop Security Portal, click the Check now button on

your Charter Business Desktop Security Workstation Security main interface. If you still do not see your computer

in the Portal, check that the subscription key has been added to the Portal.

Q. When do I need to create my own security profile?

A. You need to create a new security profile if none of the Charter Business Desktop Security predefined profiles

matches the needs of your end customers. For example, if you have a program on your computer that slows

down too much because of real time scanning operations, you need to create a profile in which that program is

excluded from scanning. Or if a network software such as a VPN client cannot connect to the Internet with the

default firewall rules, you must create a new security profile with specific firewall rules for the software.

Q. Can I get reports out from the Charter Business Desktop Security Portal?

A. You can export information about your network computers on the Export data tab (under the Computers tab).

On the Reports tab, you can currently only view information about your network computers, such as overall

protection status and status by each security component.

Page 52: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Appendix A – Download and Install Charter Business Desktop Security Workstation Security for Mac

Topics: • System requirements

• Download and Install Charter Business Desktop Security Workstation

Security

System requirements and software download and installation instructions for Charter Business Desktop Security Workstation Security.

This section describes the system requirements for installing and using

the product, and gives you instructions on how to download and install

the product.

Page 53: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

System requirements

Read the following before starting to install and use Charter Business Desktop Security Workstation Security.

Your computer must meet the following minimum requirements for installing and using the product.

Operating system version:

Processor:

Memory:

Display:

Disk space:

Internet connection:

Macintosh OS X Mavericks 10.9

Intel Processor

1 GB or more

N/a

250 MB of free disk space

An Internet connection is required in order to validate your

subscription and receive updates.

Page 54: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Download and Install Charter Business Desktop Security Workstation Security for Mac

This section describes how to locally download and install Charter Business Desktop Security Workstation

Security for Mac.

You are able to download and install the Charter Business Desktop Security on a workstation locally from the

Charter Business Desktop Security Portal.

Download Charter Business Desktop Security Software for Mac

To download Charter Business Desktop Security for Mac on a workstation locally:

1. On the workstation computer, go to the Charter Business Desktop Security Portal URL.

2. The Charter Business Desktop Security Portal login page opens.

3. Enter your Administrator user name and password and click Enter. The Charter Business Desktop

Security Portal Home page opens.

Page 55: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

4. Click the Download software link located at the top left of the Charter Business Desktop Security

Portal.

5. The download workstation software page opens. Click Mac.

6. Select Save File and Okay to save the download file to the computer.

Page 56: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

Install Charter Business Desktop Security Software

To install Charter Business Desktop Security on a Mac workstation locally:

7. Locate the installation file on the computer. Double-click to initiate the install.

8. The Welcome window opens. Select Continue.

Page 57: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

9. The Software License Agreement page opens. Read the License Terms and click Continue.

10. Read the Software License Agreement. To accept the Software License Agreement, click Agree.

Page 58: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

11. Click Install to perform a standard installation of the software.

12. Select Manage Subscription to enter the subscription key.

Page 59: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

13. Enter the Subscription Key and click Set.

14. The installation window indicates that the installation was completed successfully. Click Close.

Page 60: Charter Business Desktop Security Administrator's Guided34y8i4q6fbqlx.cloudfront.net/Admin-Guide.pdf · Receive e-mail as: Select how the user wishes to receive e-mail, either as

15. The Main Charter Business Desktop Security window indicates that your computer is protected.