You are on page 1of 175

Anti-Virus & Content Security

eScan Endpoint Security


(with MDM & Hybrid Network Support)

User Guide

www.escanav.com

sales@escanav.com

Thesoftwaredescribedinthisguideisfurnishedunderalicenseagreementandmaybeusedonly
inaccordancewiththetermsoftheagreement.

DocumentNumber:5BUG/23.06.2014/14.1
CurrentSoftwareVersion:14.1
CopyrightNotice:Copyright2014.Allrightsreserved.
AnytechnicaldocumentationthatismadeavailablebyMicroWorldisthecopyrightedworkof
MicroWorldandisownedbyMicroWorld.

NOWARRANTY:ThetechnicaldocumentationisbeingdeliveredtoyouASISandMicroWorld
makesnowarrantyastoitsaccuracyoruse.Anyuseofthetechnicaldocumentationorthe
informationcontainedthereinisattheriskoftheuser.
Documentationmayincludetechnicalorotherinaccuraciesortypographicalerrors.MicroWorld
reservestherighttomakechangeswithoutpriornotice.
NopartofthispublicationmaybecopiedwithouttheexpresswrittenpermissionofMicroWorld.

Trademarks:ThetermsMicroWorld,MicroWorldLogo,eScan,eScanLogo,MWL,MailScanare
trademarksofMicroWorld.
Microsoft,MSN,Windows,andWindowsVistaaretrademarksoftheMicrosoftgroupof
companies.Allproductnamesreferencedhereinaretrademarksorregisteredtrademarksoftheir
respectivecompanies.MicroWorlddisclaimsproprietaryinterestinthemarksandnamesofothers.
AlthoughMicroWorldmakeseveryefforttoensurethatthisinformationisaccurate,MicroWorld
willnotbeliableforanyerrorsoromissionoffactscontainedherein.MicroWorldreservesthe
righttomodifyspecificationscitedinthisdocumentwithoutpriornotice.
Nopartofthisdocumentmaybereproducedortransmittedinanyformorbyanymeans,
electronicormechanical,foranypurpose,withouttheexpresswrittenpermissionofMicroWorld.
Otherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksof
theirrespectivecompaniesandareherebyacknowledged.

TechnicalSupport:
support@escanav.com
Sales:

sales@escanav.com
Forums:

http://forums.escanav.com
eScanWiki:
http://www.escanav.com/wiki
LiveChat:

http://www.escanav.com/english/livechat.asp
PrintedBy:

MicroWorld
Date:

June,2014

TableofContents
1. eScanManagementConsole ........................................................................................ 4
2. PrerequisitesforeScanServer..................................................................................... 5
3. SystemRequirements ................................................................................................... 6
4. InstallingeScanEndpointSecurityServer .................................................................... 7
5. ComponentsofeScanServer...................................................................................... 16
6. UserInterfaceofeScanManagementConsole .......................................................... 17
7. ManagedComputers .................................................................................................. 34
8. ManagingInstallations................................................................................................ 51
9. ManagingPoliciesandTasksfortheGroup ............................................................... 75
10.ManagingTasksandPoliciesforSpecificComputers................................................. 91
11.ManagingandSchedulingReports ............................................................................. 97
12.AssetManagement ................................................................................................... 100
13.PrintActivity.............................................................................................................. 104
14.DefiningSettings ....................................................................................................... 109
15.ExportandImportSettings ....................................................................................... 115
16.ManagingLicenses .................................................................................................... 118
17.IntroductioneScanMobileDeviceManagement................................................... 121
18.GettingstartedwitheScanMobileDeviceManagement ........................................ 127
19.WorkingwitheScanMobileDeviceManagementConsole ..................................... 129
20.BackupManagement ................................................................................................ 146
21.LostDeviceProtectionthroughAntiTheft............................................................... 148
22.MobileEndpointsAssetManagement .................................................................... 150
23.CustomizingandSchedulingReports........................................................................ 155
24.ReportScheduler ...................................................................................................... 159
25.EventsandDevices ................................................................................................... 163
26.Settings...................................................................................................................... 165
27.AppStore .................................................................................................................. 166
28.GettingstartedwitheScanMobileSecurity ............................................................. 168
29.ContactDetails.......................................................................................................... 174
30.RegisteredOffices ..................................................................................................... 175

1. eScanManagementConsole

ItisawebbasedcentralizedManagementConsolethathelpstheadministratortoinstalland
manageeScanClientonthecomputersconnectedtothenetwork.

Usingthisconsoleyoucanperformfollowingactivities

InstalleScanClientapplicationontheComputersconnectedtothenetworkthathas
Windows,MacorLinuxOperatingSystem.

CreateandManagepoliciesortasksforcomputersonyournetwork.

ManageNotificationsforAlertsandWarnings.

2. PrerequisitesforeScanServer

BeforeinstallingeScanensurethatthefollowingprerequisitesaremet:

Logontocomputerasanadministrator.
Checkforfreespaceontheharddisk/partitionforinstallingeScan.
TheIPaddressforeScanservershouldbestatic.
DetermineIPaddressofthemailservertowhichyouneedtosendthewarningmessages
(optional).

Note:
Yourequireausernameandpasswordtosendemails,ifauthenticationforthemailserveris
mandatoryforacceptingemails.

3. SystemRequirements

Windows

(Windows server
&workstations)
Platforms
Supported

Linux

Mac

Android

(AndroidEndpoints)
PlatformsSupported

AndroidVersion2.2&
above

(LinuxEndpoints)
PlatformsSupported

(Mac
Endpoints)
Platforms
Supported

RHEL4&above(32&64bit)
CentOS5.10&above(32&64bit)

SLES10SP3&above(32&64bit)
MicrosoftWindows2012/SBS
Debian4.0&above(32&64bit)
2011/Essential/2008R2/2008/
openSuSe10.1&above(32&64bit)
2003R2/2003 /10/8.1/ 8/ 7 / Vista Fedora5.0&above(32&64bit)
/
XPSP2/2000ServicePack4and
Ubuntu6.06&above(32&64bit)
RollupPack1
(For32Bit&64BitEditions)

HardwareforClientsand
Server
(Server)
CPU2GHzIntelCore
Duoprocessoror
equivalent.
Memory4GB&above
DiskSpace8GB&above
(Endpoints)
1.4Ghzminimum(2.0Ghz
recommended)Intel
Pentiumorequivalent
1.0GBminimum(1.5GB
recommended)
DiskSpace800MBand
more
eScanConsolecanbe
accessedbyusingbelow
browsers:

InternetExplorer7/8/9/
10
Firefox14&above
GoogleChromelatest
version

HardwareRequirements
(Endpoints)
CPUIntelPentiumor
compatibleorequivalent.
Memory512MBand
above
DiskSpace500MBfree
harddrivespacefor
installationofthe
applicationandstorageof
temporaryfiles

Hardware
Requirements
(Endpoints)
CPUIntelbased
Macintosh
Memory1GBand
Morerecommended
DiskSpace500MB
andabove

Hardware
Requirements
(Endpoints)
Android2.2&above
devices

MacOSX10.9Mavericks
MacOSX10.8Mountain
Lion
MacOSX10.7Lion
MacOSX10.6Snow
Leopard

4. InstallingeScanEndpointSecurityServer

InstallingeScanfromCD/DVD

InstallingeScanEndpointSecurityforWindowsfromtheCD/DVDisverysimple,justinsert
the CD/DVD in the ROM and wait for few seconds for auto run to start the installation
process and follow the instructions on screen. In case if installation does not start on its
own then locate and double click on the Ewn2ksmk.exe on CD Rom, this will open the
wizardbasedsetupofeScanEndpointSecurityforWindowsonyourcomputer.Tocomplete
theinstallationfollowtheinstructionsonscreen.Denote

DownloadingandinstallingeScanEndpointSecurityServerfrominternet

Youcanalsodownloadthesetupfilefromwww.escanav.com

ForinstallingeScanServerfromthesetupfiledownloadedfromInternet,justdoubleclick
ontheEwn2ksmk.exeandfollowtheinstructionsonscreentocompletetheinstallation
process.

Note:BeforedeployingeScanonanyendpointwhereanythirdpartyantivirusisalready
installed,pleasemakesuretoexcludefollowingfoldersofeScanfromrealtimescanning

For32bitcomputerC:\ProgramFiles\eScan
C:\ProgramFiles\CommonFiles\Microworld

For64bitComputerC:\ProgramFiles(x86)\eScan
C:\ProgramFiles\CommonFiles(x86)\Microworld

InstallationProcess

Theinstallationprocesscomprisesoffollowingsteps

Step1SelectingLanguage

Selecting the Setup Language will mark the beginning of the Installation process of eScan
server.YouwillbewelcomedwiththefollowingwindowforselectingLanguage.ReferFigure
4.1

Figure4.1

Using the Drop Down menu present on the Window, select the desired language for
Installation and click OK to proceed. You will be forwarded to the main window of the
InstallationWizard.ReferFigure4.2

Note:
TheDefaultLanguageshownintheDropdownMenuisdependentonthe
LanguageoftheOperatingSysteminstalledontheComputer.Currentlywesupportonly
EnglishandJapanese.

Figure4.2

Step2AcceptingtheLicenseAgreement

ToproceedwiththeinstallationclickNext,thiswillforwardyoutotheLicenseAgreement
Screen;AccepttheLicenseagreementbyclickingoptionandclickNext.ReferFigure4.3.

Figure4.3

Step3SelectingtheDestinationFolder
SelectthedestinationfolderwhereyouwishtoinstalleScanManagementConsoleonyour
computer. Use browse option to browse the Destination Folder for installing eScan
ManagementConsole.ClickNexttoproceedwiththeinstallation.ReferFigure4.4

Figure4.4

Note:
DefaultPathforeScaninstallationona32bitComputerC:\ProgramFiles\eScan
DefaultpathforeScaninstallationona64bitComputerC:\ProgramFiles(x86)\eScan

Step4ReadytoInstall

This window displays the destination location where eScan Management Console will be
installed. Check the destination location, if you are ready to install eScan Management
Consoleonyourcomputer,clickInstalltoproceed.ReferFigure4.5

Figure4.5

Step5InstallationProgress
Theinstallationwillstartandtheprogresswillbedisplayedonthefollowingwindow.Refer
Figure4.6

Figure4.6

Step6ConfiguringeScanManagementConsole
During the installation eScan Management Console Configuration Wizard will guide to
Configure settings for SQL Server as well as Login settings for the eScan Management
Console.Thisisvitalforcompletingtheinstallationprocess.ReferFigure4.7

Figure4.7
Step7SelectingtheComputerforHostingSQLServer
Usingvariousoptionspresentonthiswindowyoucanselectdesiredcomputerorinstance
forhostingSQLServer.ReferFigure4.8

Figure4.8

Options

Description

UseLocalInstance

[Radiobutton]
Usethedropdowntoselectthedesiredinstancefor
HostingtheSQLServer.Itdisplaysalistofinstances
presentonthesystem.Thisoptionisbeingusedifyou
alreadyhaveSQLInstancerunninglocally.

InstallMicrosoftSQLServer
ExpressEdition

[RadioButton]
Select this option to Install Microsoft SQL Server Express
Edition.ItisrecommendedtoselectthisoptionforServer
installation.ThisoptionisselectedifyoudonothaveSQL
installed on the system on which eScan server is being
installed.

ChooseExisting

[RadioButton]
Select this option if you have already created an instance
for eScan Database on any SQL Server installed on any
computer connected to the network. Use the Browse
optiontoLocatetheserver.Thisoptionisbeingusedifyou
already have an instance running locally or in your local
areanetwork.

ClickNexttoproceedwiththeInstallationprocess.SQLServerinstallationWizardwillstart.

Step8InstallingSQLServer
ClickInstalltostarttheinstallationofSQLServer.ReferFigure4.9.

Figure4.9

ThewizardwillinformyouonsuccessfulinstallationofMicrosoftSQLServerExpress.Refer
Figure4.10

Figure4.10
ClickNexttocontinue.YouwillbeforwardedtotheeScanManagementConsoleLogininformation
Window.

Step9FillingLoginCredentialsforeScanManagementConsole
Fill up the required Login credentials that will be required to Login into the eScan
ManagementConsole.ClickNextwhendone.ReferFigure4.11.

Figure4.11

Step10CompletingeScanManagementConsoleConfiguration
ForcompletingtheConfigurationofeScanManagementConsole,clickFinish.Itwillstart
installingthenecessaryfilesaspertheconfigurationbeingdone,Itwilltakefewminutesto
completewiththeinstallation.ReferFigure4.12

Figure4.12

Once the scanning is complete or the scanning is cancelled, you will be forwarded to the
Finishwindow.ClickFinishtocompletetheinstallationprocess.

Figure4.13

Note:
eScanEndpointsecurityclientaswellasservercanbeinstalledonanycomputerwhereany
otherantivirussoftwareisalreadyinstalled.

5. ComponentsofeScanServer

TheeScanServercomprisesthefollowingcomponents.

eScanServerThisisacorecomponentwhichallowsyoutomanage,deployand
configure eScan on Endpoints. It stores the configuration information and log files
about the Endpoints which are present in the network. It also communicates with
othercomponentsmentionedbelow.

Agent It manages the connection between the eScan server and the client
computer.

eScanManagementConsoleItisaWebbasedapplicationhostedontheeScan
Server.ItallowsadministratorstomanageeScanonEndpointsinthenetwork.

MicrosoftSQLServerExpressEditionDatabaseforstoringeventsandlogs,already
includedintheeScanSetupfile.
(NOTE : On Windows 8 / 8.1 / 2008 /2012 operating systems, SQL 2008 Express
editionwillbeinstalledelseSQL2005Expresseditionwillbeinstalled.)
Apache For running eScan Management Console. Already included in the eScan
Setupfile.

(NOTE: Uninstallation of eScan server will not remove SQL and APACHE software
fromthesystem.)

6. UserInterfaceofeScanManagementConsole
TaskbarMenu

ClickeScanManagementConsoleiconpresentinthetaskbaronyourdesktop(oneScanServer
only). This will open the Login Page of eScan Management Console in your default web
browser.

OptionsonRightClick( eScanManagementConsoleIconintaskbar)

Options
ClientLiveUpdater

OpenWebConsole
StopAnnouncement
AbouteScanManagement
Console
ShutDown

Description
Usingthisoptionyoucangetliveeventfeedsfrom
allEndpointsonyournetwork.Thisfeedconsistsof
IP Address, Username of the Endpoints, Module
NamesandClientactions.ThisLiveFeedlistcanbe
exportedtoExcelifrequired.
ClickonthisoptiontoopeneScanManagement
Consoleinawebbrowser.
Clickonthisoptiontostopbroadcastfromand
towardstheserver.
ClickonthisoptiontoknowmoreabouteScan.
Clickonthisoptiontoshutdowntheserver.
(Note:Thisisnotrecommendedtoshutdownthe
servercomponent,thiswillstopthe
communicationsbetweenclientandserver)

TheLoginPage

EntertheUsernameandPassworddefinedbyyouduringinstallationofeScan
EndpointSecuritytoLogintotheeScanManagementConsole.ReferFigure6.1

Figure6.1

Note:
PleasenotethatrootisthesuperuserbeingcreatedbydefaultbyeScanduringInstallation,
seeFillingLoginCredentialsforeScanManagementConsole.

Options
Username

Password

Description
[Field]
EntertheusernametologintoeScanManagement
Console.
[Field]
EnterthePasswordtologintoeScanManagement
Console.

Login

[Button]
EntertheUsernameandPasswordandclickLoginto
entertheeScanManagementConsole.

eScanClientandAgentSetup
Links

[DownloadLinks]
Clientsetuplinks(forWindows)ispresentontheWeb
ConsoleLoginpage;youcansendtheselinksonmail

to the users of the Endpoints where remote


installation is not possible. Using this link they can
download the Client setup and install it manually on
their computers. Or they can directly access eScan
Managementconsolefromtheirdesktop.
[DownloadLink]
You can give this link on mail to the user of the
Endpointsfromwhereyouarenotabletogetsystem
informationorcommunicationisbreakingfrequently.
Once the Agent is downloaded and installed on the
eScanAgentSetupLink
Managed Computer. It will establish the connection
between Server and Client computer. Please note
that installation of eScan on Linux and MAC
computers can only be done manually by
downloading AGENT on MAC or Linux computers
fromthelinks.
MainInterfaceeScanManagementConsoleReferFigure6.2

Figure6.2

Note:

IconsoneverystatusLabeldenotesthatthestatusisdisplayedforthecomputershaving
operatingsystemas

Windows,

MACOSXor

Linux.

Links

Description

AbouteScan

[Link]
ClickonthislinktovisitourHomepagewww.escanav.com

Username

[Link]
Click on this link to edit User Login details like Full name,
Password and email address that you use to Login in the
eScanManagementConsole.

Logoff

NavigationPanel

[Link]
Click on this link to Log out of the eScan Management
Console.
PresentontheLeftineScanManagementConsole,itdisplays
allModulesofeScanManagementConsoleprovidingaccess
tonumerousfunctionalitiespresentunderthem.

eScanManagementConsoleNavigationPanel
NavigationPanelappearsontheleftsideafteryoulogintoeScanManagementconsoleand
gives you direct access to various options present in the console for managing computers,
installing,updatingandconfiguringeScanontheEndpointsconnectedthenetwork.Usingthis
panel you can also configure settings for the Web console and manage user roles and
permissionsforManagementConsole.ReferFigure6.3

Figure6.3

OverviewoftheNavigationPanel
VariousoptionspresentintheNavigationPanelofeScanManagementConsoleareas
follows

Dashboard The dashboard of eScan Management Console displays charts showing


deployment status, Protection status, Protection Statistics and top 10 Summary and the
monitoring done by Management Console of the Endpoints for Web protection and
applicationcontrol.Formoredetailsclickhere.ReferFigure6.4

Figure6.4

Note:
IconsoneverystatusLabeldenotesthatthestatusisdisplayedforthecomputershaving
operatingsystemas

Windows,
MACOSXor
Linux.

Setup Wizard It guides you in step by step creation of groups, adding computers to
respective groups, adding hosts from the network and installing client on the connected
computeratadesiredpath/locationonthatcomputer.ReferFigure6.5

Figure6.5
ManagedComputersItconsistsofaConsoletreeontheleftandataskpaneonright.
Usingthissectionyoucandefine/configurePoliciesforEndpoints.Itprovidesvarious
optionsforcreatinggroups,addingtasks,deployingoruninstallingclientapplication,
movingcomputersfromonegrouptotheotherandredefiningpropertiesoftheEndpoints
fromnormaltoroamingusersandviceversa.Formoredetailsclickhere.ReferFigure6.6

Figure6.6
UnmanagedComputersThissectiondisplaysinformationaboutthecomputersthathave
not yet been assigned to any group. This section also allows you to set the host
configuration, move computers to a group, view the properties of a computer, or refresh
theinformationaboutaclientcomputerbyusingtheActionListmenu.Thissectionconsists
of Network Computers, IP Range, Active Directory and New Computers Found. Refer
Figure6.7

Figure6.7

ReportTemplatesTheReportTemplatepageallowsyoutocreateandviewcustomized
reportsbasedonagiventemplate,foragivenperiod;sortedbydate,computer,oraction
taken;andforaselectedconditionortargetgroup.Italsoprovidesoptionsforconfiguring

orschedulingreports,viewingreportproperties,andrefreshingordeletingexistingreports.
Formoredetailsclickhere.ReferFigure6.8

Figure6.8

Note:
IconsoneverystatusLabeldenotesthatthestatusisdisplayedforthecomputershaving
operatingsystemas

Windows,
MACOSXor
Linux.

ReportSchedulerTheReportSchedulerpageallowsyoutoscheduleanewreportingtask,
run an already created reporting schedule or view its properties. For more details click
here.ReferFigure6.9

Figure6.9
Tasks for Specific Computers Using this section create and run tasks on specific
computers,italsoallowsyoutoscheduleormodifycreatedtasksforselectedcomputersor
groups. You can easily redefine settings of already created tasks for desired machines. It
alsoallowsyoutoviewresultsofthecompletedtasks.Formoredetailsclickhere.Refer
Figure6.10

Figure6.10

Policies for Specific Computers Using this section you can define rule set for specific
computersinthemanagedcomputersgroup.Italsoallowsyoutodefinetherulesetsthat
youhavealreadycreated.ReferFigure6.11

Figure6.11

NotePrecedencewillbegiventoPolicyforspecificcomputerovergrouppolicy

AssetManagementThismoduleprovidesyoutheentireHardwareconfigurationandlist
of software installed on Endpoints in a tabular format. Using this module, you can easily
keepatrackofalltheHardwareaswellasSoftwareresourcesinstalledonalltheEndpoints
connected to the Network. Based on different Search criteria you can easily filter the
information as per you requirement. It also allows you to export the entire system
informationavailablethroughthismoduleinPDF,MicrosoftExcelorHTMLformats.Refer
Figure6.12

Figure6.12
PrintActivityItmonitorsandlogsprintingtasksdonebyalltheEndpoints,itgives
youareportofallPrintingJobsdonebyEndpointsthroughanyPrinterconnectedto
the network. It also gives you a Log report of all PDF conversions through PDF
Converters done on individual Machine connected to the network. Refer Figure
6.13

Figure6.13

Settings Using this section you can define important settings for FTP downloads,
maintainingLogs,eScanManagementConsoletimeoutsettings,updatedownloadsettings
alongwithimportantsettingsforescan.FormoreinformationClickHere

License The eScan Web Console enables you to manage license of users. You can add,
activate, and view the total number of licenses available for deployment, number of
licensesdeployed,andnumberoflicensesremainingwiththeircorrespondingvalues.You
can also move the licensed computers to nonlicensed computers and nonlicensed
computerstolicensedcomputers.ReferFigure6.14

Figure6.14

ServerStatusinfoItdisplaystheAnouncementinfooftheserveralongwiththeServerup
time.

DashboardanditsConfiguration

ItdisplaystheDeploymentStatus,ProtectionStatus,andProtectionStatisticsandSummaryTop
10ofeScananditmodulesgraphicallyintheformofpiecharts.

ThissectiondisplaysthePiechartviewofthefollowing

DeploymentStatus
ItdisplaysthedeploymentstatusofeScanclientontheEndpoints.Displayschartsshowing
statusofeScanClientinstallation,LicensesandeScanversionsinstalledonEndpoints.

eScanStatus

Figure6.15

InstalledTotalnumberofComputerswhereeScanClientisinstalled.
NotInstalledTotalnumberofComputerswhereeScanClientisnotinstalled.
UnknownTotalnumberofComputerswhosestatusabouttheClientinstallationis

unknown.(ServerisunabletoreceiveinformationfromtheComputersforalong
time)
TotalTotalnumberofcomputerswhereeScanisinstalled,notinstalledorthe
installationstatusisunknown.

License

Figure6.16
LicenseinUseTotalnumberofLicensesthathavebeenactivated.
TotalnumberofLicensesremaining.
Totallicensesizei.e.ThetotalnumberofLicensespurchased,itincludesthe
numberoflicensesthatareusedaswellasunused.

eScanVersion
Itgivesyouapiechartviewofthetotalnumberofversionsinstalledonthecomputerson
thenetwork.
Alsodisplaysnumberofcomputersonwhichspecificversionsareinstalled.

Note:
To know more details about the computers, click on the number of computers
linksforlistedoptions.

Note:
Windows,
Mac,
Linuxiconsatthetopofeverychartdenotethattheinformationis
displayed for computers with respective operating systems (Windows, Macintosh or Linux). Know
moredetailsaboutthecomputers,clickonthenumberofcomputerslinksforlistedoptions.

ProtectionStatusItdisplaysthestatusofallthemodulesofeScanClientalongwith
UpdatestatusonEndpoints.

WebAntiPhishing

Figure6.17

StartedNumberofcomputersonwhichWebAntiPhishingisenabled.
StoppedNumberofcomputersonwhichWebAntiPhishingisdisabled.
UnknownNumberofcomputerswherethestatusisunknown.
UnavailableTotalnumberofcomputerswhereWebAntiPhishingmoduleofeScan
isunavailable.
TotalTotalnumberofcomputerswhereWebAntiPhishingmoduleofeScanis
started,stopped,unavailableorthestatusisunknown.

WebProtection

Figure6.18

StartedNumberofcomputersonwhichtheWebProtectionModuleisinStarted

Stateorturnedon.
StoppedNumberofcomputersonwhichWebProtectionModuleisinStopped
Stateorturnedoff.
UnavailableNumberofcomputerswhereWebProtectionmoduleofeScanis
unavailable.
UnknownNumberofcomputerswherethestatusisunknown.
TotalTotalnumberofcomputerswhereWebProtectionmoduleofeScanis
started,stopped,unavailableorthestatusisunknown.

EndpointSecurity

Figure6.19

StartedNumberofcomputersonwhichtheEndpointSecurityModuleisinStarted

Stateorturnedon.
StoppedNumberofcomputersonwhichEndpointSecurityModuleisinStopped
Stateorturnedoff.
UnavailableNumberofcomputerswhereEndpointSecuritymodulesofeScanare
notavailable.
UnknownNumberofcomputerswherethestatusisunknown.
TotalTotalnumberofcomputerswhereEndpointSecuritymoduleofeScanis
started,stopped,unavailableorthestatusisunknown.

Note:
Icons at the top of every chart denote that the information is
displayed for computers with respective operating systems (Windows,
MacintoshorLinux).Toknowfurtherdetails,clickonthenumberofcomputers
linksforlistedoptions.

ProtectionStatistics

ThistabdisplaysactivitystatisticsofallModulesofeScanClientonalltheEndpointsinpie
charts.ItdisplaystheactionstakenbyeScanmodulesontheEndpointsasCount.Youcan
resettheProtectionStatisticsusingtheResetCounteroptionpresentinthewindow.

Figure6.20

SummaryTop10

This Tab displays top 10 Summary of various actions taken by eScan on all Endpoints. It
displayslistofapplicationsallowed/blocked/computernamesalongwiththechartand
graph of the actions taken by eScan on occurrence of an event (Like unauthorized USB
insertion in USB port of any Managed Computer) or detection of an infection. You can
exclude or include desired options using Configure Dashboard Display Option present in
theeScanManagementConsole.

Figure6.21

ConfiguringDashboard

YoucanconfiguretheDashboardtoshowpiechartsanddetailsofstatus,statisticsand
summaryfordesiredmodules.YoucanconfigureDashboarddisplayusingfollowingSteps

ClickConfigureDashboardDisplayoptionpresentonthetopRightCorneroftheinterface.
ReferFigure6.22

Figure6.22
NowselectCheckboxtochoosethedesiredModule/Optionthatyouwishtoincludeinthe
TabspresentinDashboard.

Figure6.23
ClickOktosavesettingsandclosethewindow.Charts,InformationandSummaryforthe
selectedmoduleswillbedisplayedinrespectivetabs.
Note:

Icons at the top of every chart denote that the information is


displayedforcomputerswithrespectiveoperatingsystems(Windows,Macintoshor
Linux). Know more details about the computers, click on the number of computers
linksforlistedoptions.

7. ManagedComputers

Thissectionhelpsyouincreatinglogicalcomputergroups,definingpoliciesforthecreatedgroups,
andcreatingtasksforthedesiredgroupofcomputers.Itisrecommendedthatyougroupallthe
computers on the network in Logical group; it will help you in defining tasks and policies and
monitoring activity on every computer present on the network. These groups can be based on
departments,userrolesordesignationsinthecompany.Letusseethestepstowardssecuringall
thecomputersonthenetwork.

CreateLogicalComputerGroups
MoveComputerstothecreatedComputerGroups
CreatingLogicalComputerGroups

ForsecuringandmanagingComputerspresentonthenetwork,creategroupsandthenadd
allcomputersinthegroupscreatedbyyou.Itwillhelpinbettermanagement,monitoring
andsecurityoftheEndpoints.Youcancreatethegroupsusingfollowingsteps.

1. ClickManagedComputersoptionpresentintheNavigationPanel.ReferFigure7.1

Figure7.1
2. ThiswillopentheManagedComputerssectionontheright;nowclickNewGroupoption
presentinActionListdropdownmenuontheinterface.ReferFigure7.2

Figure7.2

CreatingNewGroupwindowwillpopup,FillintheNewGroupNameandSelecttheGroup
typeasNormaluserorRoaminguserasdesiredusingthedropdownpresentonthe
interface.

Figure7.3

Figure7.4
3. ClickOk;thegroupwillbecreatedunderManagedComputersineScanManagement
Console.ReferFigure7.5

Figure7.5

MovingComputerstothecreatedGroups

ForinstallingeScanClientonthecomputersconnectedtothenetworkanddefinepolicies
andtasksonthebasisofthegroupstheybelongto,youwillberequiredtomovecomputers
to the created groups. You can move the computers from Unmanaged Computers to
desiredgroupscreatedintheManagedComputersusingthefollowingoptionspresentin
eScanManagementConsole

MovingComputersfromNetworkComputers.

MovingallComputerswithinselectedIPRange.

MovingComputersfromActiveDirectory.

MovingComputersfromtheNewComputersFoundList.

i.
MovingComputersfromtheNetworkComputersYoucanmovethecomputersfromthe
listofcomputerspresentintheNetworkComputersusingthefollowingsteps

1. ClickNetworkComputersoptionpresentintheNavigationPanelunderUnmanaged
Computers.ReferFigure7.6

Figure7.6

2. Now expand the Microsoft Windows Network tree and select the workgroup from
where you wish to move computers to the desired group created in Managed
Computerssection.ReferFigure7.7

Figure7.7

3. Now select the Computer(s) that you wish to move to the desired groups that you
createdunderManagedcomputers.Youcandosobyselectingthecheckboxbesidethe
ComputerNames.ReferFigure7.8

Figure7.8

AlsoseeViewingPropertiesandSettingHostConfiguration

4. ClickMovetoGroupoptionpresentintheActionListdropdownmenupresentonthe
interface.ReferFigure7.9

Figure7.9

5. SelectGroupwindowwillopenonthescreen.ExpandtheManagedComputerstreeto
viewthegroupsthatyoucreatedearlier.
ReferFigure7.10

Figure7.10

6. Nowselectthegroupwhereyouwishtomovetheselectedcomputer(s).ReferFigure
7.11

Figure7.11

7. NowClickOk,selectedComputer(s)willbemovedtothegroup.ClickCancelifyoudo
notwishtomovetheselectedComputerstothisgroup.

AlsoseeCreatingNewGroupfromtheSelectGroupwindow.
ViewingPropertiesofSelectedComputer

YoucanviewthePropertiesoftheSelectedComputerusingfollowingSteps

1. Select the desired computer in the Network Computers List to View its Properties. Refer
Figure7.12

Figure7.12

2. NowclickPropertiesoptionintheActionList Dropdown menupresentontheinterface.


ReferFigure7.13

Figure7.13

3. ThiswillopenthePropertiesWindowonapopup.Itdisplaysgeneralinformationofthe
computer like Computer Name, IP Address, User name and Operating System, along with
detailsofitsversionandupdatesummary.ReferFigure7.14

Figure7.14

Note:
IncaseofMultipleSelectionofComputers,thePropertiesoptionwillbedisabled.

SettingHostConfiguration

ForanycomputerwithWindowsoperatingsystemconnectedtothenetwork,ifyouarenot
able to view / fetch its details using the Properties option. You can get the details after
settingHostconfigurationthatbuildscommunicationbetweentheServerandtheselected
computeronthenetwork.

YoucansetHostConfigurationusingfollowingSteps
1. SelectthedesiredcomputerthePropertiesofwhichyouwishtoview/fetch.
2. Now click Set Host Configuration option present in the Action List drop down menu.
ReferFigure7.15

Figure7.15
3. Now write Remarks and define the Administrator Username and Password and then
clickSave.ReferFigure7.16

Figure7.16

4. YoucannowviewthepropertiesoftheselectedcomputerusingthePropertiesoption
presentintheActionList.
CreatingNewGroupfromtheSelectGroupwindow
(TheSelectGroupWindowopenswhenyouclickMovetoGroup)
ReferFigure7.17

Figure7.17
YoucancreateaNewGroupfromthiswindowusingthefollowingsteps

1. ClickNewGroup,writethenameoftheGroupandclickOk.ReferFigure7.18

Figure7.18

2. TheGroupwillbecreatedinstantly
3. .ReferFigure7.19

Figure7.19
MovingallComputerswithinselectedIPRangetoaGroup

Itincludesfollowingsteps

AddingNewIPRangeYoucanAddtheComputerswithincertainIPrangeusingtheIP
RangeoptionpresentunderUnmanagedComputers.Itcanbedoneusingthefollowing
simplesteps

1.

ClickIPrangeoptionunderUnmanagedComputers,andthenclickNewIPRangeoptionin
theWindow.ReferFigure7.20

Figure7.20
2.

YouwillbeforwardedtoSpecifyIPRangewindow.SpecifythedesiredIPRangeandclick
Ok.ReferFigure7.21

Figure7.21

3.

TheselectedIPRangewillbeaddedtotheIPRangetree.AllcomputerspresentinthatIP
RangewillbedisplayedwhenyouselecttheIPRangeontheinterface.
ReferFigure7.22.

Figure7.22
Other details like IP Address of the computer, its group, Protection status (Unmanaged /
Unknown/Protected/Notinstalled,Critical/Unknown);thetablealsodisplaysStatusofall
modulesofeScan.

ActionList(Menu)

SettingHostConfigurationSelectthecomputeranddefinetheHostConfiguration
settingsusingSetHostConfigurationoptionpresentinActionList.Thiswillhelpyou
infetchingComputerPropertiesbeforeaddingthemtoagroupunderManaged
Computers.(ForEndpointswithWindowsoperatingsystem)

ViewingPropertiesSelecttheComputerinthetableandclickPropertiesinthe
Actionlist,thiswilldisplayallthedetailsoftheselectedcomputer.

RefreshingClientClickthisoptiontofetchlatestinformation/detailsofthe
selectedcomputer.ThisoptionispresentonIPRangewindowaswellasunder
ActionListMenu.

DeleteIPRange

1. SelectthedesiredIPRangeandclickDeleteIPRangeoptionpresentonthescreen.Refer
Figure7.23

Figure7.23

2. ToconfirmthedeletionclickOKonthePopupwindow.
ReferFigure7.24

Figure7.24

3. TheselectedIPrangewillbedeletedinstantly.

MovingtoaGroup
YoucanmovetheselectedIPRangetoanygroupunderManagedComputersusing
followingsimplesteps.

1. SelecttheIPrangeandallcomputerspresentintheselectedIPRangethatyouwishto
movefromunmanagedcomputerstoagroupinManagedComputer.ReferFigure7.25

Figure7.25

2. NowClickMovetoGroupunderActionListdropdownmenu.ReferFigure7.26

Figure7.26

3. You will be forwarded to the Select Group Window. Select the Group where you wish to
MovetheselectedcomputersintheIPRangeandClickOK.ReferFigure7.27

Figure7.27

4. TheSelectedComputer(s)willbemovedtotheselectedgroupunderManagedComputers
section.ReferFigure7.28

i.

Figure7.28
MovingComputerfromActiveDirectoryYoucanusethefollowingsimplestepstoadd
computersfromtheActiveDirectory.

1. ClickActivedirectoryunderUnmanagedComputersintheNavigationPanelofeScan
managementConsoleandSelectActiveDirectorypresentinthetree.NowClickProperties.
ReferFigure7.29

Figure7.29
2. YouwillbeforwardedtothePropertieswindow.ClickAdd.ReferFigure7.30

Figure7.30

3. YouwillbeforwardedtotheLoginSettingswindow.FillintherequiredLoginCredentialsof
AdministratortofetchdataavailableontheActiveDirectoryandclickOK.ReferFigure7.31

Figure7.31
4. ThedetailsincludingIPAddressesfromactivedirectorywillbeaddedinstantly.ReferFigure
7.32

Figure7.32

5. SelecttheActiveDirectoryandclickOK.TheselectedActiveDirectorywillbeaddedtothe
Activedirectorytree,toviewthedetailsclickonthedirectorypresentunderActive
directorytree.ReferFigure7.33

Figure7.33

6. TomovecomputerspresentintheActiveDirectory,selectthecomputersinthelistandlick
MovetoGroupoptionunderActionListmenu.ReferFigure7.34

Figure7.34

7. SelecttheGroupandClickOK.ReferFigure7.35

Figure7.35

8. Theselectedcomputerswillbemovedtotheselectedgroup.

i.

Moving Computers from New Computers Found list List of all new computers
connectedtothenetworkisgeneratedinNewComputersfoundlistunderUnmanaged
Computers.UsingtheActionListMenuyoucanSetHostConfiguration,MoveSelected

ComputerstoaGroup,viewProperties,RefreshClientorExporttheNewComputersList
toexcelfileformatifdesired.

ii.

Once the Computers are moved from Unmanaged Computers to Groups under
Managed Computers, you can Perform Tasks, Set host configuration, Manage Policies,
Deploy / Upgrade Client or deploy a Hotfix on all or any of the Managed Computer
individuallyoringroup.

Setting Host Configuration Select the computer and define the Host Configuration
settings using Set Host Configuration option present under Client Action List. This will
help you infetching Computer details beforeadding them to a group under Managed
Computers.

8. ManagingInstallations

AftergroupingallcomputersinlogicalgroupsusingeScanManagementConsole,youcannow
installeScanClientaswellasotherthirdpartysoftwareonthecomputersconnectedtoyour
network.[ConditionsApply]

Thissectionwillgiveyouanoverviewonfollowingactivities

InstallingeScanClienteScanclientcanbeinstalledoncomputersconnectedtothe
networkinthefollowingways

Remote Installation It allows you to install eScan Client on all the computers in a
selected group at once. You can initiate and monitor eScan Client installation using
eScanManagementConsole.Formoreclickhere

ManualInstallationIncaseremoteinstallationfails,youcanallowcomputerusersto
installeScanclientmanuallyontheircomputers.Itdoesnotrequireanyremote
assistance.FormoreClickhere

InstallingeScanusingagentInstallationofagentensuresthatyouhaveAdministrator
rightsonthecomputerandyoucannowremotelyinstalleScanClientonthatcomputer.
Formoreclickhere

InstallingotherSoftwares(3rdPartysoftwares)eScanManagementConsoleallowsyouto
installthirdpartysoftwaresonnetworkedcomputersremotely.Formoreclickhere.

Deploying hotfixes Using this option you can deploy hotfixes that eScan Server has
downloadedfromeScanwebsite.Thisoptionishighlightedonlywhendownloadedhotfixis
savedinprogramfiles\escan\wgwinfolder.

ConnectingtotheClientUsingthisoptionyoucantaketheremoteaccessoftheselected
ClientComputer.

ViewingInstalledSoftwareListUsingthisoptionyoucanviewlistofsoftwaresinstalled
onEndpointsconnectedtoyournetwork.

Force Download This option is present under Client Action list in Managed Computer
Section.YoucanupdateeScanclientonanynetworkedcomputerbyusingthisoption.Itis
requiredincaseswhereclienthasnotbeenupdatedonthecomputerformanydays.Select
theClientComputerandclickForceDownloadintheActionListMenu.Itwillinitiatethe
ForceddownloadprocessonselectedClientcomputer.

Note:Conditionsforthirdpartysoftwareinstallation
AfterstartingtheinstallationfromeScanManagementConsole,nomanualinterventionshould
berequiredtocompletetheinstallationonClientMachine.Onlyautomatedinstallationscanbe
donethrougheScanManagementConsole.
Care should be taken that the installation file is not huge as it may impact internal network
speedofyourorganization.
RemoteInstallationofeScanClient

PreparingClientComputerforRemoteDeployment

ToinstalleScanEndpointSecurityforWindowsontheclientsystem,checkifthebasicsystem
requirementsareinplace.

Configuringthesettingson

WindowsXPProfessionalsystems(WindowsXP,2000,2003,alleditions)

1.
2.
3.
4.

ClickStart,andthenclickControlPanel.
DoubleclicktheAdministrativeToolsicon.
DoubleclicktheLocalSecurityPolicyicon.
Onthenavigationpane,clickLocalPoliciesfolder,andthenclickSecurityOptions
folder.
5. DoubleclickNetworkAccess:SharingandSecurityModelforLocalaccountspolicy.
6. SelectClassicLocaluserauthenticateasthemselvesoptionfromthedropdown
list.
7. ClickApply,andthenclickOK.
8. DoubleclicktheAccounts:Limitlocalaccountuseofblankpasswordstoconsole
logononlypolicy.TheAccounts:Limitlocalaccountuseofblankpasswordsto
consolelogononlydialogboxappears.
9. ClickDisabledoption.
10. ClickApply,andthenclickOK.

IfWindowsfirewallisenabledonalllocations,selectFileandPrinterSharingcheck
box,underExceptionstab(ControlPanel>>WindowsFirewall>>Exception).

ForWindowsXPHome:

Since Windows XP Home has limitations with regards to remote deployment, MWAgent
should be installed on your system. You can download MWAgent from the eScan Web
Console.

ForWindowsVista/Windows7/Windows8/Windows8.1

1.
2.

ClickStartonyourdesktop,andthenclickRun.
Nowtypesecpol.msc,andthenclickOK.YouwillbeforwardedtoLocalSecurity
Settingswindow.
3. Onthenavigationpane,clickLocalPoliciesfolder,andthenclickSecurityOptions
folder.Thesecuritypolicyappears.
4. DoubleclickNetworkAccess:SharingandSecurityModelforLocalaccountspolicy.
5. SelectClassicLocalusersauthenticateasthemselvesoptionpresentinthedrop
downlist.
6. NowclickApply,andthenclickOK.
7. DoubleclicktheAccounts:Limitlocalaccountuseofblankpasswordstoconsole
logononlypolicy.
8. ClickDisabledoption.NowClickApplyandthenclickOK.Ifthefirewallisenabled,
selectFileandPrinterSharingcheckbox,underExceptionstab.
9. OndesktopClickStart,andrightclickMyComputer,nowclickManage.Youwillbe
forwardedtotheComputerManagementwindow.
10. Onthenavigationpane,clickLocalUsersandGroupsoption,andthenclickUsers
folder,anddoubleclickAdministrator.YouwillbeforwardedtotheAdministrator
propertieswindow.
11. CheckPasswordneverexpiresanduncheckAccountisdisabledcheckbox.
12. ClickApply,andthenclickOK.

YoucaninstalleScanremotelyonanycomputerorgrouppresentinManagedComputerusingthe
followingsimplesteps

Option1InstallingeScanClientonallComputerspresentinaGroup

1. ClickManagedComputer

Figure8.1

2. NowSelecttheGroupwhereyouwishtoinstalleScanClient.ReferFigure8.2

Figure8.2

3. NowclickDeploy/UpgradeClientoptionpresentintheActionListdropdownmenu.Refer
Figure8.3

Figure8.3

Ifyouwanttodeployonlyonspecificcomputersthenselectthosespecificcomputersand
followalltheabovementionedprocessfromtheclientActionlistdropdown.

4. YouwillbeforwardedtoClientInstallationWindow,selectthedesiredoptionsandClick
install.ReferFigure8.4

Figure8.4

5. ByDefaulteScanisinstalledatthefollowingPathonClientcomputer.

C:\ProgramFiles\eScan(defaultpathfor32bitcomputer)orC:\ProgramFiles(x86)\eScan
(defaultpathfor64bitcomputers)

6. YoucanalsodefinetheinstallationpathwhereyouwishtoinstalleScanusingtheAdd
option.ReferFigure8.5

Figure8.5

7. ClickInstall.
8. TheprogressofFiletransferwillbedisplayed.ReferFigure8.5
9. TheprogressofFiletransferwillbedisplayed.
10. ReferFigure8.6

Figure8.6

11. AfterInstallationtheeScanstatuswillbeupdatedinManagedComputerslistInstalled
(Client)eScanEndpointSecurityforWindows.

Figure8.7

Option2InstallingeScanClientonanindividualComputerinaGroup

1. ClickManagedComputer.

2. NowSelecttheGroupwhichthatcomputerbelongsto.

3. ClickClientComputersoptionpresentundertheGrouptree.ReferFigure8.8

Figure8.8

4. Allcomputerspresentinthegroupwillbevisibleinthelistontheright.Selectthecomputers
whereyouwishtoinstalleScanClient.ReferFigure8.9

Figure8.9

5.

NowclickDeploy/UpgradeClientunderClientActionListmenu.ReferFigure8.10

Figure8.10
6. YouwillbeforwardedtotheClientInstallationwindow.

7. NowSelectInstalleScanoptionandalsoselectthedesiredeScaninstallationoptionusingthe
respectivecheckboxespresentontheinterface.

8. ByDefaulteScanisinstalledatthefollowingPathonClientcomputer.

C:\ProgramFiles\eScan(defaultpathfor32bitcomputer)orC:\ProgramFiles(x86)\eScan
(defaultpathfor64bitcomputers)

9. YoucanalsodefinetheinstallationpathwhereyouwishtoinstalleScanusingtheAddoption
presentontheinterface.

10. ClickInstalltoinitiatetheinstallationprocessonClientComputer.eScanServerwillstart
copyingfilesrequiredforinstallingeScanClientontheclientcomputerandprogressoffile
transferwillbedisplayedontheinterface.

11. AfterinstallationeScanstatuswillbeInstalled(Client)eScanEndpointSecurityfor
Windows.

Figure8.11

ViewingPropertiesofaGroup

ThePropertiesoptionpresentunderActionListMenuinManagedComputersdisplays
followingimportantdetailsoftheGroup

GeneralTab

GroupName
ParentGroup
GroupTypeNormalorRoamingUser
SubGroupsorNumberofComputersinthatGroup
DateofCreationoftheGroup

UpdateAgents

ThistabdisplayslistofcomputersthatareactingasUpdateAgentforotherComputersinthe
group,itgivesyouanoptiontoAddorRemoveacomputerfromthislist.WhenyouAdda
computertothislistitbecomesUpdateAgentforothercomputersinthegroup.

CreatingSubGroups

YoucancreateaSubGroupunderanygroupbyusingthefollowingsimplesteps

1. ClickManagedComputers.
2. SelecttheGroupunderwhichyouwishtocreateaSubGroup.

ReferFigure8.12

Figure8.12

3. NowclickNewSubGroupunderActionListmenu.ReferFigure8.13

Figure8.13
4. YouwillbeforwardedtoCreatingNewGroupwindow,writethenameoftheGroup,Select
theGrouptypeusingtheDropDown(NormalUser,RoamingUser)andclickOk.Refer
Figure8.14

Figure8.14
5. ThecreatedgroupwillbeaddedundertheParentGroup.

RemovingaGroup

1. SelecttheGroupthatyouwishtoremovefromtheManagedComputerslistandClick
RemoveGroupunderActionMenu.ReferFigure8.15

Figure8.15
2. ToconfirmclickOK.TheSelectedGroupwillberemovedinstantly.Pleasenotethatyou
cannotdeleteaGroupuntilitisempty.

Figure8.16

SettingGroupConfiguration

UsingthisoptionyoucandefinesingleUsernameandPasswordtologinforall
thecomputersinthegroup.Itcanbedoneusingthefollowingsimplesteps

1. ClickManagedComputers.
2. NowSelecttheGroupforsettingtheConfiguration.
3. NowclickSetGroupConfigurationunderActionListdropdownmenu.
4. NowdefinetheUsernameandPasswordforthegroupandclickSave.
5. Thesettingswillbeconfiguredinstantly.

NoteThisistheSystemLoginandPasswordthatwillberequiredforLoginonanycomputerin
thatgroup.ThisoptionisvalidforComputerswithWindowsOperatingsystemonly.

RefreshingClient

UsethefollowingstepstorefreshthestatusofeScanClientonanynetworkedcomputer.

1. ClickManagedComputer.
2. SelecttheComputer(s)presentunderanyGroup.

Figure8.17

3. NowclickRefresh.
4. TheStatuswillberefreshedoncetheprocessisover.

MovingComputerfromoneGrouptoOther

Usethefollowingstepstomoveselectedcomputersfromonegrouptoother

1.
2.
3.
4.

ClickManagedComputers.
Selectthedesiredcomputerspresentinagroup.
NowclickMovetoGroupoptionunderClientActionListdropdownmenu.
Selectthegroupinthetreetowhichyouwishtomovetheselectedcomputersandclick
OK.
5. Theselectedcomputerswillbemovedtothisgroupinstantly.

ViewingInstalledSoftware(onClientComputer)

UsethefollowingStepstoremoveselectedcomputersfromagroup

1.
2.
3.
4.

ClickManagedComputers.
SelectthedesiredcomputerpresentunderManagedComputers.
NowclickShowInstalledSoftwareunderClientActionListdropdownmenu.
ListofalltheSoftwareinstalledonthatcomputerwillbedisplayedonpopupwindowin
aninstant.
RemovingEndpointsfromaGroupinManagedComputers

UsethefollowingStepstoremoveselectedcomputersfromagroup

1. ClickManagedComputers.

2. SelectthedesiredcomputerspresentinagroupthatyouwishtoremovefromManaged
Computers.
3. NowclickRemovefromGroupoptionpresentunderClientActionListdropdown
menu.
4. ClickOKtoconfirm.

InstallingeScanonLinuxandMACComputers

For installing eScan on Linux or Mac computer please install the Agent on the Linux or Mac
computersandthenproceedtoinstalleScan,itcanbedonewiththefollowingsimplesteps

1. InstallAgentonLinuxorMacComputers.
2. InstalleScanClientafterinstallingAgentonLinuxorMacComputers.

StepsforInstallingAgentonLinuxandMacComputers

o InstallingAgentonLinux(DebianbasedOperatingSystem)

1. Downloadagentfromthelinksentonmailandsaveitatthedesiredpathonthe
computerwhereyouwishtoinstalleScanClient.
2. OpentheterminalforinstallingAgent.
3. InstallationofAgentrequiresrootorsudouserauthentication.
4. AfterLoginasrootorsudouser,gotothepathwheretheAgent_setup.debfilehas
beensaved.
5. Installtheagentfromthepathusingthefollowingcommanddpkgi.(forRPM
basedsetupRpmivh)ReferFigure8.18

Figure8.18

6. Agentinstallationwillstart,oncompletionyouwillbeinformedthroughamessage
andtheAgentwillstartonyoucomputer.

o InstallingAgentonMacComputers
1. Downloadagentfromthelinksentonmailandsaveitatthedesiredpathonthe
computerwhereyouwishtoinstalleScanClient.
2. GotothePathwhereAgentissaved.
3. DoubleclickontheAgent_Setup.dmgfiletostarttheinstallation.
4. ThiswillstarttheAgentInstallationWizard.ReferFigure8.19

Figure8.19

5. NowdoubleclickoneScanAgent,asshownabove.Thiswillstarttheinstallation
process.YouwillbeforwardedtotheIntroductionWindow.
6. ClickonContinuebuttontocontinuetheinstallationprocess.ReferFigure8.20

Figure8.20

7. ThiswillforwardyoutotheReadMewindow,readthesystemrequirementandclick
oncontinuebutton.ReferFigure8.21

Figure8.21

8. YouwillbeforwardedtoLicenseWindow.Readtheagreementandclickoncontinue
button.ConfirmbyclickingonAgree.ReferFigure8.22

Figure8.22
9. Now select eScan Agent Install by clicking on the checkbox and click on continue
button.ReferFigure8.23

Figure8.23
10. SelectthedesireddestinationfolderChangeinstallLocationandclickoninstall
button.
11. Youwillbeinformedoncetheinstallationisover.ClickonClose.ReferFigure8.24

Figure8.24

StepsforinstallingeScanClientonLinuxorMacintoshComputers

1. InstallAgentonLinuxorMaccomputersmanually.
2. NowLogintoeScanManagementConsoleandSelectthecomputerandRefreshtheClientusing
refreshClientoptionineScanManagementConsole.
3. AlinkwillbecreatedfordownloadingthesetupfileofeScanClientforthatcomputer,youwill
beredirectedtoescanav.comfromwhereyoucandownloadthesetupfile.ReferFigure8.25

Figure8.25

4. DownloadtheclientSetupfromthelinkonthecomputerwhereeScanEndpointSecurity
serverisinstalled.

5. FordeployingthedownloadedsetuponselectedLinux/MACcomputerClickonDeploy/
UpgradeclientoptionpresentunderClientActionListmenu,clickonInstallothersoftware
andselectLinux/MACClientsetupoption,Figure1

Figure8.26
6. ClickonInstallbuttontoinitiatetheinstallationprocess.
7. Youwillbeinformedoncetheinstallationisover.
InLinux
eScanAdministratorIconwillbedisplayedondesktop.

InMac
AnIconofeScanwillbecomevisibleintheDockonthedesktop.YoucanaccesseScanusing
thesameicon.

UninstallingeScan
Client(Windows,MacandLinux)

UsethefollowingsimplestepsforuninstallingeScanClientonanynetworkedcomputer.

1. SelecttheComputerandclickUninstalleScanClientunderClientActionListmenu.Refer
Figure8.27

Figure8.27

2. YouwillbeforwardedtotheClientUninstallationwindowReferFigure8.28

Figure8.28

3. Thetaskwillstartinstantly.eScanManagementConsolewilldisplaytheprogressdetails.
ReferFigure8.29

Figure8.29
4. ClickClosewhentheUninstallationprocessisover.
Note:
YoucanuninstalleScanClientfromallthecomputersinthegroupbyselectingtheGroupand
thenClickUninstalleScanClientunderActionListdropdownmenu.
ManuallyInstallingeScanClientonNetworkComputers

Manual Installation is required on computers where remote installation through eScan


ManagementConsoleisnotpossible.DownloadlinkformanuallyinstallingeScanClientorAgent
aredisplayedontheLoginPageofeScanManagementConsole.ReferFigure8.30

Figure8.30

ForwardthislinktotheuseroftheClientcomputeronmailandguidehimthroughthe
installationprocess.
AlsocheckShowClientSetupLink

InstallingeScanclientusingagent

UsethefollowingsimplestepstoInstalleScanusingagent

RemotelyInstallingagentonClientComputer(s)

1. ClickManagedComputers.
2. SelecttheGrouptowhichtheComputer(s)belongsto.
3. NowselecttheComputer(s)fromthelistedComputersintheGroup.
4. SelecttheDeploy/UpgradeClientoptionunderClientActionListdropdownmenu.
5. SelectInstallAgentoptionandclickInstall.
6. Thiswillinstallagentonselectedcomputers.

Thisoptionusefulincasewhenthereareglitchesinthenetworkconnectivitybetweenserver
andClientComputer,itwillovercomethoseglitchesthusspeedsuptheclientinstallationon
theselectedcomputers.

Manually Installing agent on Client Computer(s) For manually installing agent on


Endpoints.PleasesendthelinkthatisdisplayedontheLoginPageofeScanManagement
ConsoletotheusersoftheClientComputeronmail.ReferFigure8.31

Figure8.31
AlsocheckShowAgentSetupLink

InstallingotherSoftwares(3rdPartySoftware)

UsingeScanManagementConsole,youcaneasilyinstallotherthirdpartyapplicationson
anynetworkedcomputerinManagedComputers.Thiscanbedoneusingthefollowing
simplesteps
1. ClickManagedComputers.
2. SelectthedesiredcomputerpresentunderManagedComputers.
3. NowclickDeploy/UpgradeClientunderClientActionListdropdownMenu.
4. YouwillbeforwardedtotheClientInstallationwindow.SelectinstallOtherSoftware
option.ReferFigure8.32

Figure8.32

5. NowClickAddandgivetheexactpathoftheEXE(oneScanServer)thatyouwishtoinstallon
theselectedComputer.ClickAdd.ReferFigure8.33

Figure8.33
6. TheselectedEXEwillbeaddedtotheRequiredfilesforInstallationlist.ReferFigure8.34.

Figure8.34

7. TheExecutableFilenamewillbedisplayedintherespectivedropdownmenupresenton
theinterface.
8. YoucandefinethecommandlineParametersifrequired.
9. ClickInstalltoinitiatetheInstallationprocess.
10. Youwillbeconfirmedthroughamessageoncompletion.ReferFigure8.35

Figure8.35

Task'Install/UpgradeSoftwareonHost'successfullyscheduledon

9. ManagingPoliciesandTasksfortheGroup

YoucancontrolallmodulesofeScanClientbydefiningPoliciesandcreatingtasksthrougheScan
ManagementConsole.

DefiningPoliciesfortheGroupUsingthepoliciesyoucandefinerulesetsforallmodulesof
eScanclienttobeimplementedontheManagedComputerGroups.eScanallowsyoutodefine
securitypoliciesforWindows,MacandLinuxComputersconnectedtothenetwork

DefiningPoliciesforComputerswithWindowsoperatingsystemeScanallowsyoutodefine
policiesforthefollowingModulesofeScanClientonWindowsoperatingsystem
Modules
Description
WebProtection
Thiswillallowyoutodefinethesitesthatyoudonotwanttoallowaccess
to. You can define the site names you want to block, do a time based
accessrestriction.
EndpointSecurity
Thiswillcontroltheapplicationfromthepointofendusersbyallowing/
restrictingUSB,blocklisting,whitelisting,anddefiningtimerestrictions.
Administrator
ThiswillallowyoutosetpasswordtoenterintoeScanProtectionCenter.
Password
Notifications
& Thiswillallowyoutostopreceivingtheeventsandnotificationforallthe
Events
executableandwebsitesthatareallowed.

DefiningPoliciesforComputerswithMacorLinuxoperatingsystemeScanallowsyouto
definepoliciesforthefollowingModulesofeScanClientonMacorLinuxoperatingsystem

Modules
Description

This will allow you to block USB storage device from accessing your
EndpointSecurity computer.ThisoptionisavailableonlyinMaccomputers.
BlockUSBstorage
deviceThisoptionis
presentinsettings
underProtection
ModuleineScanfor
Mac

StepsforDefiningPoliciesforthegroup

1. ClickManagedComputers.
2. Selectthedesiredgroupnamefromthetree

3. NowclickPolicy.ReferFigure9.1

Figure9.1
4. ClickProperties.

Figure9.2

5. YouwillbeforwardedtothePropertieswindow.

6. NowclickPolicyDetailstabtoredefinepoliciesforthegroup.ReferFigure9.3.

Figure9.3

7. SelecttheModuleinthegroupandClickEdittodefinethepoliciesfortheModule.ReferFigure
9.4

Figure9.4

Note:UsingLinux/Mactab,youcandefinesettingsforeScanonLinuxandMacmachine.Itallows
youtodefinesettingsforthefollowingmodules

Linux
,Mac
IcondenotesthatyoucanEditsettingsfortheselectedmoduleinthe
respectiveoperatingsystem.

8. Youwillbeforwardedtoapagewhereyoucandefineactionsandpoliciesspecificallyforthat
modulewhichyouwishtobeimplementedonallEndpointsinthatgroup.ReferFigure9.5

Figure9.5

9. eScanManagementConsoleallowsyoutodefinepoliciesforeveryoptionpresentinallthe
ModulesofeScanClient.AllPoliciesareautomaticallyimplementedafterNextupdateonthe
Endpoints.

10. UsingAdvancedSettingsoptionyoucandefinePoliciesforMoreadvancedoptionsineScan
Client.Thesepoliciesaredefinedinthe.inifileorregistryoftheEndpoints.ReferFigure9.6

Figure9.6

ConfigurableeScanPoliciesforWindowsComputers
1. WebProtection

Figure9.7
Web Protection is a part of eScans Protection feature. This module uses highly advanced
algorithms based the occurrence of specific words or phrases in the contents of the Web site to
blockWebsitescontainingpornographicoroffensivematerial.Thisfeatureisextremelybeneficial
to parents because it prevents kids from accessing Web sites containing harmful or restricted

content.Administratorscanalsousethisfeaturetopreventemployeesfromaccessingnonwork
relatedWebsitesduringworkhours.Youcanconfigurethefollowingsettings.
A. FilteringOptions:Thistabhaspredefinedcategoriesthathelpyoucontrolaccesstothe
Internet.
Status:ThissectionhelpsyoutoalloworblockaccesstospecificWebsitebasedon
FilterCategories.YoucansetthestatusasActiveorBlockWebAccess.Youshould
selecttheBlockWebAccessoptionwhenyouwanttoblockalltheWebsitesexcept
theonesthathavebeenlistedintheFilterCategories.Whenyouselectthisoption,
onlyFilteringOptionsandPopupFiltertabsareavailable.
FilterCategories:Thissectionusesthefollowingcolorcodesforallowedand
blockedWebsites.
Green:Itrepresentsanallowedwebsitescategory
Red:Itrepresentsablockedwebsitescategory
ThefiltercategoriesusedinthissectionincludecategorieslikePornography,Gambling,
Chat,Alcohol,Violence,Drugs,Ratings_block_category,WebsitesAllowed,etc.Youcanalso
addordeletefiltercategoriesdependingonyourrequirement.
Category:[Categoryname]:ThissectionshowstheWords/Phraseslist,whichlists
thewordsorphrasespresentintheselectedcategory.Inaddition,thesection
displaystheSiteNameslist,whichliststheWebsitesbelongingtotheselected
category.Youcanalsoaddordeletefiltercategoriesdependingonyour
requirement.
FilterOptions:ThissectionincludestheAddsitesrejectedbythefiltertoBlock
categorycheckbox.YoushouldselectthischeckboxifyouneedeScantoaddWeb
sitesthataredeniedaccesstotheBlockcategorydatabaseautomatically.
B. ScanningOptions:Thistabhelpsyoutoblockimages,ActiveXcontrols,mediacomponents,
andapplicationsfromappearingwithinthebrowser.
ActiveX Blocking: An ActiveX control is component program that can be
automatically downloaded and executed by a Web browser. It is similar to a Java
applet. ActiveX controls may include malicious code and therefore may pose as a
securityhazard.
JavaApplets:JavaAppletsareprogramsthatarewrittenintheJavaprogramming
language.TheseappletscanbeembeddedinanHTMLpageandcanbeviewedfrom
a Java enabled Web browser. Applets enhance the interactivity in Web pages and
provide users with an enhanced Web experience. However, some applets contain
maliciouscodethatmayeitherdisrupttheprocessesrunningonyourcomputeror
steal sensitive information. You can select the Java Applets check box to block
appletsfrombeingdownloadedtoyourcomputer.
Scripts (Java & VB): Scripts are usually written in scripting languages such as
JavaScriptandVBScript.Ascriptisalistofcommandsthatcanexecutewithoutuser
input.Withthehelpofscripts,youcanautomatecertaintaskswithinanapplication
to work in a particular computing scenario. Hackers often use malicious script to

stealinformationaboutthevictims.WhenyouselecttheScripts(Java&VB)check
box, eScan blocks script from being downloaded to your computer from the
Internet.
CheckforVirus:[Default]Thischeckboxisselectedbydefault.Youshouldselect
thischeckboxifyouneedeScantoscanandblockallWebsitesthatcontain
maliciouscode.
Actions:ThissectionhelpsyouselecttheactionsthateScanshouldperformwhenit
detectsasecurityviolation.
LogViolations:[Default]Thischeckboxisselectedbydefault.Youshouldselectthis
checkboxifyouneedWebProtectiontologallsecurityviolationsforyourfuture
reference.
ShutdownProgramin30Secs:YoushouldselectthischeckboxifyouneedWeb
Protectiontoshutdownthebrowserautomaticallyin30secondswhenanyofthe
definedrulesorpoliciesisviolated.
PortSetting:ThissectionhelpsyouspecifytheportnumbersthateScanshould
monitorforsuspicioustraffic.
InternetAccess(HTTPPort):Webbrowserscommonlyusetheportnumbers80,
8080,3128,6588,4480,and88foraccessingtheInternet.Youcanaddport
numberstotheInternetAccess(HTTPPort)boxtomonitorthetrafficonthose
ports.
ContentType:Thissectionhelpsyoublockcontentbasedontheirtype,suchas
images,applications,emails(RFC822),audiofiles,andvideofiles.
BlockImages:Selectthischeckboxtoblockdownloadofanykindofimageson
managedendpoints.
BlockApplications:Selectthischeckboxtoblockthedownloadofanyapplications
onmanagedendpoints.
BlockEmails:SelectthischeckboxtoblockdownloadofRFC822typeemails.
BlockAudiofiles:Youshouldselectthisoptionifyouwanttoblockallaudiofiles.
BlockVideofiles:youshouldbeselectingthisoptionifyouwanttoblockallvideo
files.

2.EndpointSecurity

Figure9.8

EndpointSecurityisapartofeScansProtectionfeature.Thismoduleprotectsyourcomputeror
EndpointsfromdatatheftsandsecuritythreatsthroughUSBorFireWirebasedportabledevices.
ItcomeswithanApplicationcontrolfeature,whichhelpsyoublockunwantedapplicationsfrom
runningonyourcomputer.Inaddition,thisfeatureprovidesyouwithacomprehensivereporting
featurethathelpsyoudeterminewhichapplicationsandportabledevicesareallowedorblocked
byeScan.
Thispageprovidesyouwithinformationregardingthestatusofthemoduleandoptionsfor
configuringit.
Start/Stop:ItenablesyoutoenableordisableEndpointSecuritymodule.Clickthe
appropriateoption.
TherearetwotabsApplicationControlandUSBControl,whichareasfollows:
1.ApplicationControl
Thistabhelpsyoucontroltheexecutionofprogramsonthecomputer.Allthecontrolsonthistab
aredisabledbydefault.
Youcanconfigurethefollowingsettings.
EnableApplicationControl:Youshouldselectthischeckboxifyouneedtoenable
theApplicationControlfeatureoftheEndpointSecuritymodule.

EnterApplicationtoBlock:Itindicatesthenameoftheapplicationyouwantto
blockfromexecution.Typethefullnameoftheapplicationtobeblocked.
ListofBlockedApplications:Thislistcontainsblockedexecutablesofapplications
thatarepredefinedbyMicroWorld.Eachoftheapplicationslistedinthepredefined
categoriesareblockedbydefault.Inaddition,youcanalsoaddexecutablesthatyou
needtoblockonlytotheCustomGroupcategory.Ifyouwant,youcanunblockthe
predefinedapplicationbyclickingtheUnBlocklink.Thepredefinedcategories
includecomputergames,instantmessengers,music&videoplayers,andP2P
applications.
2.DeviceControlTheEndpointSecurityfeatureofeScanprotectsyourcomputerfrom
unauthorizedportablestoragedevicespromptingyouforthepasswordwheneveryoupluginsuch
devices.Thedevicesarealsoscannedimmediatelywhenconnectedtopreventanyinfectedfiles
runningandinfectingthecomputer.
Youcanconfigurethefollowingsettings:
EnableDeviceControl:[Default]Youshouldselectthischeckboxifyouneedtomonitorall
theUSBstoragesdevicesconnectedtoyourcomputer.Thiswillenablealltheoptionson
thistab.
Settings:ThissectionhelpsyoucustomizethesettingsforcontrollingaccesstoUSB
storagedevices.
BlockUSBPorts:SelectthischeckboxifyouwanttoblockalltheUSBports.
AskforPassword:Selectthischeckbox,ifyouwanteScantopromptforapassword
wheneveraUSBstoragedeviceisconnectedtothecomputer.Youhavetotypethe
correctpasswordtoaccessUSBstoragedevice.Itisrecommendedthatyoualways
keepthischeckboxselected.
UseeScanAdministrator:ThisoptionisavailableonlywhenyouselecttheAskfor
Passwordcheckbox.ClickthisoptionifyouwanttoassigneScanAdministrator
passwordforaccessingUSBstoragedevice.
UseOtherPassword:ThisoptionisavailableonlywhenyouselecttheAskfor
Passwordcheckbox.Clickthisoptionifyouwantassignauniquepasswordfor
accessingUSBstoragedevice.
DisableAutoPlay:[Default]Whenyouselectthischeckbox,eScandisablesthe
automaticexecutionofanyprogramstoredonaUSBstoragedevicewhenyou
connectthedevice.
ReadOnlyUSB:Selectthischeckbox,ifyouwanttoallowaccessoftheUSBdevice
inreadonlymode.
RecordFilesCopiedToUSB:Selectthischeckbox,ifyouwanteScantocreatea
recordofthefilescopiedfromthesystemtoUSBdrive.
Whitelist:eScanprovidesagreaterlevelofendpointsecuritybypromptingyoufora
passwordwheneveryouconnectaUSBdrive.Todisablepasswordprotectionfora
specificdevice,youcanadditalongwithitsserialnumbertothewhitelist.Thenext
timeyouconnectthedeviceitwillnotaskforapasswordbutwilldirectlydisplaythe

filesorfoldersstoredonthedevice.Thissectiondisplaystheserialnumberand
devicenameofeachofthewhitelisteddevicesinalist.Youcanadddevicestothis
listbyclickingontheAddbutton.TheWhitelistsectiondisplaysthefollowing
button.
YoucanclickontheAddbuttontoentertheSerialnumber(uniqueforeachUSB
device)andDeviceNameoftheUSBdevicetobewhitelisted.TheSerialNumber
andtheDeviceNamedetailsareshowninEndpointsecuritymoduleineScan
ProtectionCenterunderthesamesubsection.YouneedtoinserttheUSBdeviceon
theeScanserverandcopythedetailsontotheeScanwebconsolesettings.
DisableWebCam:Youshouldselectthisoption,ifyouwanteScantodisableWeb
Cam.
DisableBluetooth:Youshouldselectthisoption,ifyouwanteScantodisable
Bluetooth.
DisableSDcards:Youshouldselectthisoption,ifyouwanteScantodisableSD
Cards.
CD/DVDSettings:YoushouldselectthischeckboxifyouneedtoblockanyCD/DVDor
allowreadonlyaccesstoCD/DVD.
BlockCD/DVD:Youshouldselectthisoption,ifyouwanteScantoblockCD/DVD.
ReadonlyCD/DVD:Youshouldselectthisoption,ifyouwanteScantodisableCD/
DVD.
AdvancedSettings

Figure9.9

Option
Description
AllowCompositeDevices(Allow=1,Disallow=0 AllowsyoutoallowordisallowScanningof
)
CompositeDevicesconnectedtotheManaged
Endpoints.
AllowUSBModem(Allow=1,Disallow=0)
AllowsyoutoallowordisallowUSBModemson
theManagedEndpoints.
EnablePredefinedUSBExclusionforData
AllowyoutoEnable/DisableExclusionof
Outflow(Enable=1,Disable=0)
PredefinedUSBsforDataOutflow,itwillnot
recorddataoutflowthroughUSBdrivespecified
byyou.
EnableUSBWhitelistingoptiononpromptfor
AllowyoutoEnable/DisableUSBwhitelisting
eScanclients(Enable=1,Disable=0)
onpromptonthemanagedEndpoints.
EnableUSBonTerminalClient(Enable=1,
AllowyoutoEnable/DisableUSBonTerminal
Disable=0)
Client
EnableDomainPasswordforUSB(Enable=1,
AllowsyoutoEnable/DisablePasswordforUSB
Disable=0)
usageonmanagedendpoints.
ShowSystemFilesExecutionEvents(Enable=1, AllowsyoutoEnable/Disabletoreceiveevents
Disable=0)
forSystemFilesexecution.
AllowexecutionofMicrosoftSigned
Allow/DisallowexecutionofMicrosoftSigned
Application(Allow=1,Disallow=0)
Application.
AllowmountingofImagingdevice(Allow=1,
Allow/DisallowmountingofImagingDevices
Disallow=0)
onManagedendpoints.
BlockFileTransferfromIM(Allow=1,Block=0)
Allow/BlockfilestransferfromInstant
MessengersonmanagedEndpoints.
AllowWIFINetwork(Allow=1,Block=0)
Allow/BlockaccessofManagedEndpointsto
WIFInetwork.
WhitelistedWIFISSID(CommaSeparated)
Allowyoutoenlist/whitelistWIFISSIDfor
networkaccesstomanagedendpoints.
AllowNetworkPrinter(Allow=1,Block=0)
Allowaccesstonetworkprintersfrommanaged
endpoints.
WhitelistedNetworkPrinterlist(Comma
Allowyoutoenlist/whitelistNetworkPrinters
Separated)
formanagedendpoints.
DisablePrintScreen(Enable=1,Disable=0)
Allowsyoutodisable/enablePrintScreenon
ManagedEndpoints.

Default
Note:ClicktheDefaultbutton,ifyouwanttoapplydefaultsettings,whicharedoneduring
installationofeScan.Itloadsandresetsthevaluestothedefaultsettings.
3.NotificationsandEvents
Events

Figure9.10

DefinesettingstostopclientfromsendingEventofcertaintypesasperyourselection.

ConfigurableeScanPoliciesforLinuxandMacComputers

Figure9.11

To define policies for Mac or Linux computers, select Policy option present under the desired
computergroupinManagedComputerssectionofeScan.NowclickonPropertiesbuttonpresent
on the interface and then click on Policy Details tab and open Linux / Mac tab present on the
interface.eScanallowsyoutodefinesettingsforEndpointSecurityforMacComputersconnected
to the network. Use the Edit button to configure the eScan module settings for computers with
respectiveoperatingsystems.

NoteIconspresentbesideeverymoduledenotesthatthesettingsarevalidfortherespective
operatingsystemsonly.

ConfiguringModuleSettingsforLinuxandMacComputers

EndpointSecuritySettingsvalidforeScanclientonMacsystemsonly.

Figure9.12

UsethisoptiontoBlockaccesstoUSBStoragedevicebyselectingtheCheckbox.

7.

Managing Tasks for the Group Using the Group Tasks option present in Managed
ComputerssectionunderSelectedGroup,youcancreateatask,startatask,selectataskand
view its properties, view task results as well as delete an already created task. Tasks can
includethefollowing.

Enable/DisabledesiredModule
SetUpdateServer
ForceClienttoDownloadUpdates
SchedulingScanonNetworkedComputers

StepsforCreatingaGroupTask

1. ClickManagedComputers.
2. Selectthedesiredgroupfromthetree.
3. ClickGroupTasks
4. NowClickNewTask.ReferFigure9.13

Figure9.13

5. YouwillbeforwardedtoNewTaskTemplatewindow.Thiswindowallowsyoutodefine
Task Name, Assign task as well asschedule task on Endpoints. Write the Task Name and
configurethedesiredtasksettings.
6. ClickSave.ReferFigure9.14

Figure9.14

Note:
Windows,Linux
,Mac
Icondenotesthatyoucanconfiguretasksettingsfor
theselectedmoduleintherespectiveoperatingsystem.

7. ThecreatedtaskwillbeaddedtotheGrouptaskslist.ReferFigure9.15

Figure9.15

8. Click Properties to view the created task. It also allows you to modify or redefine the
settingsearlierconfiguredbyyou.Italsofacilitatesthereschedulingofthecreatedtask.
9. ClickSave.ReferFigure9.16

Figure9.16

10. UsingtheStartTaskoptionyoucaninitiatetheselectedtaskontheEndpointsintheGroup.
ReferFigure9.17

Figure9.17
11. ClickResultstoviewthedetailsofrecentlyexecutedtasks.

12. ClickTaskStatusLinktoviewthestatusofthelistedtasks.Itgivesyouabriefsummaryof
theselectedtask.ReferFigure9.18

Figure9.18

10.ManagingTasksandPoliciesforSpecificComputers

eScanManagementConsolegivesyouaflexibilitytodefineandconfiguretasksandPoliciesfor
specificEndpointsintheManagedComputerslist.Itcaneasilybedoneusingthefollowingsimple
steps

ManagingTasksforSpecificComputers

1. ClickTasksforSpecificComputersinNavigationPanelofeScanManagementConsole.

2. NowClickNewTask.ReferFigure10.1

Figure10.1

3. YouwillbeforwardedtoNewTaskTemplateWindow.

1. DefinetheTaskNameinthetextfield.ReferFigure10.2

Figure10.2

2. Selectthedesiredoptionsforassigningtasks.ReferFigure10.3

Figure10.3

Note: Windows,Linux
,Mac
Icondenotesthatyoucanconfiguretasksettingsfor
theselectedmoduleintherespectiveoperatingsystem.

3. UsetheexplorertreetoselecttheComputersonwhichyouwishtoinitiatethistask.
MarktheComputersandclickAdd.
ReferFigure10.4

Figure10.4

4.

ScheduletheTaskasdesired.ReferFigure10.5

5.

Figure10.5
ClickSave.TheTaskwillbecreatedandscheduledforselectedcomputersinstantly.

ManagingPoliciesforSpecificComputers

1. Click Policies for Specific Computers option present in Navigation Panel of eScan
ManagementConsoleandclickNewPolicy.ReferFigure10.6

Figure10.6

2. YouwillbeforwardedtotheNewPolicywindow.DefinethePolicynameandRules.Select
andaddthecomputerswhereyouwishtoimplementthosepolicies.
3. ClickDeploy.ReferFigure10.7

Figure10.7

4. Thepolicywillbecreatedanddeployedontheselectedcomputers.

OneTimePassword

eScan password protection restricts user access from violating a security policy deployed in a
network.e.g.administratorhasdeployedasecuritypolicytoblockallUSBdevices,butsomeone
wants to access it for genuine reason. How would an administrator give him an access without
violatingthecurrentsecuritypolicy?OTPdeliverstheanswerforthesamebygeneratingonetime
password for a period of time like 10 minute or one hour for that specified user to disable the
modulewithoutviolatingexistingpolicy.

Working:
1. eScanServerAdministratordefinesapolicyforaparticulargroupblockingaccesstotheUSB
portsthroughthewebconsole.TheUSBaccessisblockedthroughtheendpointsecurity
modulethroughPoliciesforSpecificComputers.
2. Forsomespecificreason,accesstoaUSBportisrequiredinoneofthesystemswithina
groupwherethesecuritypolicyhasbeendefined.Theadministratorisnotifiedofthis
requestmanually.

3. Theadministratorgeneratesaonetimepasswordontheserverandmanuallynotifiesthe
userwhorequiresaccesstotheUSBportforaspecifictimeperiod.
4. TheuserutilizestheonetimepasswordwithinthegroupforaccessingtheUSBportforthe
specifiedtimeperioddefinedbytheadministrator.Othersystemswithinthegroupcannot
accesstheUSBportsasthesecuritypolicyissetforthemthusensuringthatthegroup
policyisnotinfringed.

HowtoAccess
UsethefollowingsimplestepstoaccessOTPass.EXE.ReferFigure10.8

Figure10.8
1.
2.
3.
4.
5.

OpenWindowsExplorer.
GotothepathwhereeScanisinstalled.
OpeneScanFolder.
FindandopenOTPass.exe.
NowtypetheComputerNameforwhichyouwishtogeneratethepasswordintherespective
field.
6. SelectthetimeforwhichthepasswordwillbevalidontheselectedcomputerusingtheValid
fordropdownpresentontheinterface.ReferFigure10.9

Figure10.9

7. SelecttheModulethatyouwishtoenableordisableusingcheckboxespresentontheinterface
andclickonGeneratePassowrdbutton.ReferFigure10.10

Figure10.10

8. Sendthispasswordtotheuser.
9. ToPausetheselectedmoduleonhiscomputer,theusershouldopeneScanEndpointSecurity
forWindowsClientusingrightclickoneScanEndpointSecurityforWindowsiconandclickon
PauseProtectionfromthetaskbar.ReferFigure10.11

Figure10.11

11.ManagingandSchedulingReports

eScanManagementconsoleprovidesyouwithpredefinedtemplatesbasedoneScanmodules.It
providesyouanoptiontocreatecustomreportsbasedoncertaincriteria.

TheeScanWebConsolecomeswithcomprehensivereportingcapabilitiesforviewingthestatusof
the modules, scheduled tasks, and events. It allows you to view predefined reports, create new
reportsbasedonpredefinedreports,andcustomizeexistingreportsforcomputersorforagroup
ofcomputers.

SchedulinganexistingReportTemplate

1. ClickReportsTemplateinthenavigationbarandselectthedesiredTemplate.
2. ClickCreateschedule.ReferFigure11.1

Figure11.1

3. NowdefinetheReportNameandfilterthecriteriaforgeneratingreportbyexpandingthe
tree.ReferFigure11.2

Figure11.2

4. SelecttheConditionsandTargetGroupsforgeneratingReports.ReferFigure11.3.

Figure11.3

5. DefineemailandServersettingsforsendingreportsbymail,alsoselecttheFormatforthe
report,youcangeneratereportinhtml,CSV,PDFandExcelformats,asrequiredbyyou.
ReferFigure11.4.

Figure11.4
6. SchedulethereportasdesiredandclickOK.ReferFigure11.5

Figure11.5

7. Reportwillbecreatedandscheduledinstantly.ReferFigure11.6

Figure11.6

Note:
YoucanOptionstocreateandschedulereportsarealsopresentinReportSchedulersectionof
eScanManagementConsole.

12. AssetManagement

This module provides you the entire Hardware configuration and list of softwares
installed on Managed Computers in a tabular format. Using this Module, you can
easilykeepatrackofalltheHardwareaswellasSoftwareresourcesinstalledonall
the Managed Computers connected to the Network. Based on different Search
criteriayoucaneasilyfiltertheinformationasperyourrequirement.Italsoallows
you to Export theentire system information available through this module in PDF,
MsExcelorHTMLformats.

ViewingHardwareReports

For Viewing the Hardware Configuration of all the Managed Computers connected to the
Network, Click on the Asset Management section present in the Navigation Panel on the
Left in the eScan eScan Management Console. Following Information will populate in the
tableontheright.
S.No.
1.

ColumnName
ComputerName

Description
ItdisplaystheHostNameoftheComputersasdefinedby
theAdministrator.
ItdisplaystheNameoftheGrouptowhichthatComputer
belongsto,asdefinedinManagedComputersectionof
eScanManagementConsole.
ItdisplaystheIPaddressoftheEndpoints.

2.

Group

3.

IPAddress

4.

UserName

ItdisplaysthecurrentUsernameoftheEndpoints(whois
loggedonthesystem).

5.

OperatingSystem

ItdisplaystheOperatingsysteminstalledonthe
Endpoints.

6.

ServicePack

7.

OSversion

8.

OSInstalledDate

9.

InternetExplorer

ItdisplaystheServicePackversionandbuildinstalledon
theEndpoints.
ItdisplaystheversionoftheOperatingSysteminstalledon
theManagedEndpoints.
ItdisplaystheDateandTimeofInstallationofthe
OperatingsystemontheEndpoints.
Itdisplaystheversionofinternetexplorerinstalledonthe
Endpoints.

10.

Processor

ItdisplaystheProcessordetailslikeProcessorName,Type
andProcessingSpeedoftheEndpoints.

11.

Motherboard

ItdisplaysthedetailsofthemotherboardoftheEndpoints.

12.

RAM

ItdisplaysthedetailsoftheRAMinstalledonthe
Endpoints.

13.

HDD

ItdisplaysthedetailsoftheHardDisklikenumberof
Partitionsandtheirrespectivesizes.

14.

MACAddress

ItdisplaystheMACAddressoftheEndpoints.

15.

PCIdentifyingumber

ItdisplaystheuniqueIdentificationnumberofeach
ManagedEndpoint.

Software

ByclickingontheviewlinkpresentinthisColumn,youcan
viewthelistofsoftwaresalongwiththeinstallationdates
ontheManagedComputer.

16.

Thestatusisdisplayedforthecomputershavingoperatingsystemas
Macintoshor

Windows,

Linux

ByclickingontheViewlinkpresentinSoftwareColumn,youcanviewthelistofSoftwarealong
withtheinstallationdatesontheEndpoints.

ForFilteringtheHardwareReportasperyourrequirements,clickonthedropMenuLinkofFilter
Criteria
inAssetManagementsection.TheHardwarereportcanbefilteredon
thebasisoffollowingCriteria.ReferFigure12.1

Figure12.1

Note:
Youcandefinecriteriaforthetext/ColumnContenttobeincludedorexcludedinyourSearch
resultusingthedropdownspresentontheinterface.

ViewingtheSoftwareReport

ThissectiondisplayslistofSoftwarealongwiththenumberofEndpointsonwhichtheyare
installed. To view the Software Report, click Asset Management and then Click Software
Report Tab present on the right. This will populate the Software Name with Computer
Countinatabularformat.

For knowing the Computer Details where specific Software is installed, click on the
Computer Count present in the Computer Count Column. A window with the respective
ComputerDetailswillpopup.

ForFilteringtheSoftwareReportasperyourdesire,clickontheDropMenuLinkofFilter
Criteria
in Asset Management Section. The Software report can be
filteredonthebasisoffollowingCriteria.

Figure12.2
YoucanfilteryoursearchonthebasisofSoftwareNameortheComputerName,usingthe
dropdownpresentontheinterface;youcaneitherincludethesearchstringenteredbyyou
inyoursearchorexcludeitifdesired.Systemwillpopulatetheresultsaccordingly.

ExportOptions:ExportingtheHardware/SoftwareReport

eScanManagementConsolesoffersExportingofHardwareReportinPDF,ExcelorHTML
formats.

in

ItcaneasilybedonebyClickingonDropMenuLinkofExportOption
AssetManagementSection.Itwilldisplaythefollowingoptions.

Figure12.3

ClickonthedesiredRadiobuttonforexportingthereportinavailableformats.Whenthe
Exportisover,youwillbeinformedwiththefollowingmessage

Figure12.4

ForOpening/Downloadingtheexportedfilesclickonthelinkasshownabove.

13. PrintActivity

ItmonitorsandlogsprintingtasksdonebyalltheEndpoints,itgivesyouareportof
allPrintingJobsdonebyEndpointsthroughanyPrinterconnectedtothenetwork.
Thelogreportgeneratedinthissectionkeepsthelogofnumberofcopiesprinted
throughanyprinter,theFilenameofthePrintedfile,theDateonwhichPrintwas
taken(ClientMachine),MachineName,alongwiththeUsernameofthecomputer
anditsIPaddress.

ItalsogivesyouoptionsforFilteringthereportonthebasisofexcludingorincluding
themachinenameoraprinterwithinadesireddaterange,andExportingtheReport
inPDF,ExcelorHTMLformats.

ViewingthePrintActivityLog

ClickPrintActivityunderDashboardontheleftineScanManagementConsole.Atablewith
theListofPrintersandnumberofcopiesprintedbythemwillpopulateonleft.Optionsfor
Filtering or Exporting the log in desired formats are also present on the same interface.
ReferFigure13.1

Figure13.1

ViewingthePrintLogs

For viewing the Print log of a Printer listed in the Printing Activity table, click on the number of
Copiesundercopiescolumn,thiswillforwardyoutothePrintActivitywindow.ReferFigure14.2

Figure13.2

S.No.

FieldName

1.

ClientDate

2.

MachineName

3.

IPAddress

4.

Username

5.

DocumentName

6.

Copies

7.

Pages

Description
It displays the Printing date of
ClientMachine

It displays the name of the


Machine from which the Prints
weretaken.
It displays the IP Address of the
machine from where the Prints
weretaken.
It displays the Username of the
Machine from where the Prints
weretaken.
It displays the document name
thatwasprinted.
Itdisplaysthenumberofcopiesof
thedocumentthatwereprinted.
It displays the number of Pages
thatwereprinted.

This window also gives you option to Export the Log report generated on this widow in the
desiredformats,youcaneasilydosobyselectingthedesiredexportoptionusingtheDropdown
presentonthescreen,andthenclickExport.AftertheExportiscompleteyouwillbeinformed
throughthefollowingmessage.

Figure13.3

Clickonthelinktoopenandsavetheconvertedfile.

FilterCriteria

ForFilteringthePrintActivityLogasdesired,clickFilterCriteriaonthemaininterfaceof
PrintActivitysection,followingoptionswillbepopulatedonscreen.ReferFigure14.4

Figure13.4

S.No.
1.

Machine

2.

Not

3.

Printer

4.

Not

5.

DateRange

6.
7.

From((MM/DD/YYYY)
To(MM/DD/YYYY)

8.

Search

9.

Option

Reset

Description
Typethedesiredmachinenamethatyouwish
toexcludeorincludeinyourLog.
Tickonthischeckbox,ifyouwishtoexcludea
machineinthelogreport.
Typethedesiredprinternamethatyouwishto
excludeorincludeinyourlog.
Tickonthischeckbox,ifyouwishtoexcludea
printertointhelogreport.
Tick on this checkbox, if you wish to generate
reportbetweencertaindates.
Selectthestartingdateforreportgeneration.
SelecttheEndingdateforreportgeneration.
ClickthisoptiontoFiltertheLogonthedefined
criteria.
Clickthisoptiontoresetthedefinedcriteriafor
filtering.

ExportingthePrintActivityLog

eScanManagementConsoleoffersexportingofPrintActivitylogsinPDF,ExcelorHTML
formats.

ItcaneasilybedonebyClickingonDropMenuLinkofExportOption
PrintActivitySection.Itwilldisplaythefollowingoptions.

Figure13.5

in

Clickonthedesiredradiobuttonforexportingthereportinavailableformats.Whenthe
exportisover,youwillbeinformedwiththefollowingmessage

ForOpening/Viewing/Savingtheexportedfilesclickonthelinkasshownabove.

14. DefiningSettings

Usingthissectionyoucandefineimportantsettingsforthefollowing

1. eScan Management Console (EMC) Using this section you can define settings for FTP
sessions,LogSettings,ClientGroupingandClientconnectionsettings.

2. Web Console Settings Using this section you can define settings for Web Console
timeout, Dashboard Settings, Login Page settings, SQL Server Connection settings, SQL
Databasecompressionsettings.

3. Update Settings Using this section you can define general configuration settings for,
SettingsforUpdateNotifications,andschedulingUpdateDownloadsfortheserver.

14.1. eScanManagementConsoleSettings

The EMC Settings page includes several options that allow you to configure the eScan
Management Console. You can configure the FTP settings, Bind to IP Settings, and log
settingsbyselectingtheoptionsappropriateforyournetwork.

YoucanbindannouncementofFTPServertoparticularIPbyselectingtheIPaddressinthe
list. However, you can choose to leave it as 0.0.0.0, which mean it will announce on all
availableinterface/IP.

You can also enable FTP settings such as allowing upload of log file to eScan Server by
EndpointsbyselectingtheAllowUploadbyClientscheckbox.Ifyouaredoingthat,youcan
setalimitforthemaximumnumberofFTPsessionsallowed.Ifyouspecifythisnumberas
0,itmeansthatanynumberofEndpointscanconnecttoFTPserverforuploadingfiles.

BycheckingDeletetheusersettingsanduserlogfilesafteruninstallingcheckboxyoucan
opttodeleteUsersettingsandLogfilesonceeScanClientisuninstalledonthatcomputer.
YoucanalsodefinethenumberofdaysforwhichLogshouldbemaintainedbydefiningthe
daysinthefieldforNoofdaysClientlogsshouldbekept.ReferFigure14.1

Figure14.1

ThestepstoconfiguretheEMCsettingsareasfollows:

To configure the Bind IP address, under BIND IP, in the box, click the required IP
address.ThedefaultIPaddressis0.0.0.0.
To allow uploads by Endpoints, under FTP Settings, select the Allow Upload by
Clientscheckbox.
To restrict the maximum number of FTP connections, in the Maximum FTP Clients
allowedbox,typeorselectthemaximumnumberofFTPConnectionstobeallowed.
Thedefaultvalueis0;thisallowsanunlimitednumberofFTPconnections.
TospecifythenumberofdaysforwhichEMCshouldmaintainclientcomputerlogs,
underLOGSettings,intheno.ofdaysClientlogsshouldbekeptbox,typeorselect
thenumberofdays.
UnderClientGroupingsection,youcansortgroupclientseitherbyNetBIOSorDNS
domain. This setting is especially useful only during fresh client installations. After
installation, it enables you to manually manage domains and the clients grouped
underthem.

ClickNetBIOS,ifyouwanttosortclientsonlybyhostname.
ClickDNSDomain,ifyouwanttosortclientsbyhostnamecontainingthedomainname.
ClickSavebuttonimplementthedefinedsettings.

14.2.

WebConsolesettings

Using this section you can define settings for Web Console timeout, Dashboard Settings,
LoginPagesettings,SQLServerConnectionsettings,SQLDatabasecompressionsettings.

1. WebConsoletimeoutsettingsSelecttheEnabletimeoutsettingsoptionanddefinethe
timetoautomaticallyLogoutWebConsolewhenidlebeyondthedefinedminutes.

Figure14.2

2. Dashboard Settings Define the number of Days for which you wish to View the Status,
StatisticsandProtectionStatusChartsintheDashboardofeScanManagementConsole.

Figure14.3

3. LoginpageSettingsDefinethesettingstoshoworHideLinkfordownloadingeScanClient
andMWAgenttofacilitatemanualdownloadandinstallationonEndpoints.

4. SQL Server Connection settings Select the SQL server and define Server instance, and
HostNamealongwiththecredentialsforconnectingtothedatabase.

5. SQLDatabasePurgeSettingsDefinethesizeLimitforthedatabaseaswellasspecifythe
numberofdaystocompresstheDatabasefolderifitisolderthanthedefinedperiod.

Figure14.4

ClickSavetosavethedefinedsettings

14.3.

UpdateSettings

TheUpdatemoduleallowsyoutoconfigureeScantodownloadupdatesautomatically
eitherfromeScanupdateserversorfromthelocalnetworkbyusingFTPorHTTP.
YoucanaccesstheupdatesettingspagefromthenavigationPanel.Thispageprovidesyou
withinformationregardingthemodeofupdate.Italsoprovidesyouwithoptionsfor
configuringthemodule.ItalsohelpstheUpdatemoduletodownloadupdates
automatically.

1. GeneralConfigTheGeneralConfigtabprovidesyouwithgeneraloptionsforconfiguring
the update module. These include selecting the mode, and configuring the proxy and
networksettings.ReferFigure14.5

Figure14.5

YoucanconfigureeScantodownloadupdatesfromeScanupdateserversbyusinganyof
theavailablemodessuchasFTP,HTTP,andNetwork.IfyouareusingHTTPorFTPproxy
servers,youneedtoconfiguretheproxysettingsandprovidetheIPaddressoftheserver,
the port number, and the authentication credentials of the proxy server. In case of FTP
servers,youalsoneedtoprovidetheformatfortheuseridintheLogonTypesection.

YoucanalsoselecttheNetworkmodefordownloadingupdates.However,todothis,you
mustspecifythesourceUNCpathintheSourceUNCPathbox.

2. UpdateNotificationTheUpdateNotificationtabhelpsyoutoconfiguretheactionsthat
eScanshouldperformafterupdaterdownloadstheeScanupdates.ReferFigure16.6

Figure14.6

YoucanconfigureeScantosendanemailnotificationtoaspecifiedemailaddressfroma
specifiedemailaddressaftersuccessfulupdate.Tousethisfeature,youmustalsospecify
theIPaddressofSMTPserveranditsportnumber

3. Scheduling The eScan Scheduler automatically checks eScan Web site for updates and
downloads the latest updates when they are available. It also allows you to schedule
downloadstooccuronspecificdaysorataspecifictime.ReferFigure14.7

Figure14.7

You can configure the update module to query and download the latest updates
automatically from the MicroWorld Web site by selecting Automatic Download. In this
case,youmaywanttospecifyaqueryintervalafterwhicheScanshouldquerytheWeb
siteforlatestupdates.Thedefaultintervalis120minutes,butyoucanchooseaninterval
fromtheQueryIntervallist.

You can also schedule downloads to occur on specific days or on a daily, weekly, or
monthly basis and at a specific time. When you configure this setting, the scheduler
checkstheeScanserverforlatestupdatesonthespecifieddayatthespecifiedtimeand
downloadsthemiftheyareavailable.

15. ExportandImportSettings

The eScan Web Console enables you to take backup, it will be helpful in case you wish to
replaceeScanserver.Exportsettingsalongwiththedatabasefromexistingservertothenew
server.

ExportSettings

Figure15.1

Usethefollowingstepstoexportthesettings.

1. Onthenavigationpane,underAdministration,clickExport&Import.
TheExportImportSettingsscreenappears.
2. UnderExportSettingssection,selectanappropriatecheckbox:
WMCSettingsandPolicies:Selectthischeckbox,ifyouwanttoexportWMCsettings
andpolicies.
Database:Selectthischeckbox,ifyouwanttoexporteScandatabase.
3. ClickExport.
Amessageofsettingssuccessfullyexportedappearsonthescreen.
4. ClickDownloadExportedFilelink,ifyouwanttodownloadthefile.Inaddition,youcan
alsoviewthedateandtimeofwhenthefilewaslastdownloaded.

ImportSettings

Figure15.2

Usethefollowingstepstoimportthesettings.

1. Onthenavigationpane,underAdministration,clickExport&Import.
TheExportImportSettingsscreenappears.
2. UnderImportSettingssection,typethefilenameorclickBrowsetoselectthefilethatyou
wanttoimport
3. UnderImportSettingssection,selectanappropriatecheckbox:
WMCSettingsandPolicies:Selectthischeckbox,ifyouwanttoimportWMCsettings
andpolicies.
Database:Selectthischeckbox,ifyouwanttoimportdatabase.
4. ClickImport.
Amessageofsettingssuccessfullyimportedappearsonthescreen.

Schedule

Figure15.3

Usethisoptionyoucandothefollowing
1. EnableschedulingofWMCsettingsandPoliciesorDatabase.
2. ScheduletheExport/Importataspecifictiethatcanbedaily,weeklyordesiredday(s)ofa
weekoradesireddateinaMonth.
3. SendNotificationstospecificrecipient.
4. AllowsyoutodefineUsernameandPasswordforSMTPauthentication.
5. Allowsyoutodefinesettingsforstoringbackupfiles.
6. Displayslastschedulestatus.

16. ManagingLicenses

TheeScanWebConsoleenablesyoutomanagelicenseofusers.Youcanadd,activate,and
viewthetotalnumberoflicensesavailablefordeployment,numberoflicensesdeployed,and
number of licenses remaining with their corresponding values. You can also move the
licensed computers to nonlicensed computers and nonlicensed computers to licensed
computers.

AddingLicenseandActivatingLicenseKey

Itenablesyoutoaddlicensesofusers.

(Youcanaddonlytwolicensesatatime,itismandatorythatyouatleastactivateonelicense,
becauseunlessanduntilyouactivatealicenseyoucannotaddmorelicenses.TheToAdd
LicenseClickHerelinkbecomesunavailableafteraddingtwolicenses,andtomakeit
availableyouhavetoatleastactivateonelicense.)

Steps

1. Onthenavigationpane,clickLicenseandclickClickHerelink.

Figure16.1

2. Addthe30DigitLicensekeyandClickOk.Theaddedlicensekeywillbevisibledisplayedin
theRegisterInformationtable.

Figure16.2

3. ClickActivatenowlinkpresentinActivationCodeColumnofRegisterInformationtableto
activatethelicenseonClientComputer.

Figure16.3

4. SelectthedesiredoptionforactivationandfillthePersonalInformation.

Field
Description
Name
Typethemachinename.
PhoneNo.:
Typethephonenumber.
Address:
Typetheaddress.
MobileNo.:
Typethemobilenumber.
City
Typethecityname.
FaxNo.:
Typethefaxnumber.
State:
Typenameofthestate.
EmailId*:
[Mandatory]
TypeanemailID
Country:
Selectthecountryfromthedropdownlist.
PostalCode:
Typethepostalcode.
Email
Clickanappropriateoption.
Subscription
Yes:Clickthisoption,ifyouwanttosubscribeforemail.
No:Clickthisoption,ifyoudonotwanttosubscribefor
email.
Reseller/Dealer*: Typenameoftheresellerordealer.Thisisamandatoryfield.

5. ClickActivatepresentatthebottomoftheinterface.TheLicensekeywillbeactivated
instantly.(RequiresInternetConnection)

Movinglicensedcomputerstononlicensedcomputers

Usethefollowingstepstomovelicensedcomputerstononlicensedcomputers.

1. Onthenavigationpane,clickLicense.
2. UnderLicensesection,clickManageLicenselink.
3. UnderLicensedComputerssection,selectanappropriatecheckbox,thecomputerthatyou
wanttomovetononlicensedcomputers.
TheMovetononlicensebuttonisavailableonlywhenyouselectanappropriatecheckbox
underLicensedComputerssection,andyoucanmovemultiplecomputersatatime.
4. ClickMovetononlicense.
Thelicensedcomputermovestononlicensedcomputerssection.

Movingnonlicensedcomputerstolicensedcomputers

Usethefollowingstepstomovenonlicensedcomputerstolicensedcomputers.

1. Onthenavigationpane,clickLicense.
TheLicensescreenappears.
2. UnderLicensesection,clickManageLicenselink.
3. UnderNonLicensedComputerssection,selectanappropriatecheckbox,thecomputer
thatyouwanttomovetolicensedcomputers.
TheMovetolicensebuttonisavailableonlywhenyouselectanappropriatecheckboxunder
NonLicensedComputerssection,andyoucanmovemultiplecomputersatatime.
4. ClickMovetolicensebutton.
Thenonlicensedcomputermovestolicensedcomputerssection.
eScanallowsyoutomanageLicensesforeScanclientinstalledoncomputerswith
Windows,

Macintoshor

Linuxopreatingsystem.

17.

Introduction - eScan Mobile Device Management

eScan Mobile Device Management solution is specifically designed for XE "Android" Mobile or
SmartPhonedevices.Itenablesyoutoblockapplicationsandwebsites,whichensuressecurityto
yourdevice.UsingeScanMobileDeviceManagementSolutionyoucanmanageandsecureMobile
aswellasSmartphones.

eScanMobileDeviceManagement(MDM)allowsyoutomonitor,secure,manageallyourandroid
devices remotely. Using this solution you can control and monitor all security settings, gain real
time visibility into mobile devices accessing your corporate network, and administer consistent
policiesacrossalldevices.

Components of eScan Mobile Device Management Solution

Component
eScanEndpoint
Security

Description
ForusingeScanMobileDeviceManagement
server,youfirstneedtoinstall
eScanEndpointSecurityonanyofthe
computerconnectedtothenetwork.

RequiredorOptional
Required

eScanMobileDevice
Management

After adding the devices in Mobile device


Management console, a message is sent on
the email address used for enrolling the
device with a link to download and Install
Required
eScan Mobile Security (Client). The user
shouldenrollthedevicewithsamedetailsas
usedduringenrolmentontheMobileDevice
ManagementConsole(Server)

MicrosoftSQL
Server

The Microsoft SQL Server hosts the


Required
databasesforMDMserver.

ActiveInternet
Connection

Anactiveinternetconnectionismandatory
toinstalleScanMobileSecurity.To
downloadandinstalleScanMobilesecurity
onthedeviceanemailwillbesentbythe
MDMsever.

Required

Features of eScan Mobile Device Management Console (Server)

Sr.No
.
1

Features

Description

Dashboard
DeploymentStatus

eScanStatus

eScanVersion

AndroidVersion

DeviceSyncStatus
(Successful)

DeviceCompliant

ItdisplaysthepiecharttoshowthestatusofeScaninstallation
onManagedDevices.ToviewDevicedetailsyoucanclickon
numericvaluespresentbesidethechart.
ItdisplaysthepiecharttoshowtheversionofeScan
installationonManagedDevices.ToviewDevicedetailsyou
canclickonnumericvaluespresentbesidethechart.
ItdisplaysthepiecharttoshowtheAndroidversionof
ManagedDevices.ToviewDevicedetailsyoucanclickon
numericvaluespresentbesidethechart.
Itwilldisplaythedevicessyncedwithinthedefinedtime
period.Suchasdevicessyncedtoday,withinlast12days,37
days,etc.andalsodevicesthatarenotyetsynced.
Itwilldisplaythedevicesthatarecompliantwiththepolicies
defined,noncompliantwiththepoliciesdefinedand
unknown.

ItdisplaysthestatusofWebsitesblockedstartedorstopped
onmanageddevices.Toviewfurtherdetailsyoucanclickon
numericvaluespresentbesidethechart.
ItdisplaysthestatusofApplicationsblockedorstartedtor
stoppedonmanageddevices.Toviewfurtherdetailsyoucan
clickonnumericvaluespresentbesidethechart.
ItdisplaystheStart/StopstatusofcallandSMSfilterModule
ofeScanonDevices.Toviewfurtherdetailsyoucanclickon
numericvaluespresentbesidethechart.

ItdisplaysthePiecharttoshowthenumberofsitesallowedor
blockedbyeScanonManagedDevices.Toviewfurtherdetails
youcanclickonnumericvaluespresentbesidethechart.
ItdisplaysthePiecharttoshowthenumberofappsthatare
allowedtoexecuteorblockedbyeScanonManagedDevices.
Toviewfurtherdetailsyoucanclickonnumericvaluespresent
besidethechart.

eScanCorporatewithMobileDeviceManagement

ProtectionStatus

WebControl

Applicationcontrol

CallandSMS

ProtectionStatistics

WebControl

ApplicationControl

CallStatistics

SMSStatistics

ManagedMobileDevice
GroupCreation
AddMobileDevice
MoveToGroup

CreatePolicies

CreateTasks

3
4

NewMobileDevices
Found
ManageBackups

SMS

Contacts

Antitheft

ItdisplaysthePiecharttoshowthenumberofincomingand
outgoingcallsallowed,incomingandoutgoingcallsblockedon
theManagedDevices.Toviewfurtherdetailsyoucanclickon
numericvaluespresentbesidethechart.
ItdisplaysthePiecharttoshowthenumberofSMSreceived
orsentfromManagedDevices.Toviewfurtherdetailsyoucan
clickonnumericvaluespresentbesidethechart.

Allowsyoutocreatedifferentgroups
Allowsyoutoadddevices
Allowsyoutomovedevicesfromonegrouptoanothergroup
AllowsyoutodefinepoliciesforCall&SMSFilterPolicy,
ParentalPolicy,AntiTheft,AdditionalSettingsPolicy,Password
Policy,DeviceOrientedPolicy
AllowsyoutocreateNewTask,StartTask,TaskSettings,and
ScheduleTask.
Itwillshowifanydevicefoundinthenetwork

ItallowsanadministratortobackupandrestoreSMSfrom
manageddevices.
Itallowsanadministratortobackupandrestorecontactsfrom
manageddevices.

WipeData

WipeDatafeaturethathelpsuserstoremotelydeletecontacts
andSMSsfromdevicesthatareeitherlostorstolen.

BlockDevice

Allowsyoutoremotelyblockthedevice

Scream

RaiseanAlarmontheDeviceforeasylocation

SendMessage Allowsyoutosendsomemessagetothedevice

LocateDevice

AssetManagement

HardwareInformation

SoftwareInformation

FilterCriteria

TheLocateDevicefeaturehelpstrackthelocationofthelost
devicethroughGPSfinder.

Itshowsconsolidatedhardwareinformationofmanaged
devices.
Itshowsconsolidatedsoftwareinformationofmanaged
devices.
Itallowsyoutofilterreportcapturedfromdevicesbasedon

ExportOptions

ReportTemplates
ApplicationControl
Report

anyorallcriteriatobeincludedorexcludedinthereport.
Itallowsyoutoexportgeneratedreportsindesiredformats.
eScansupportsExcel,PDFandHTMLformats.

GenerateApplicationBlocked/AllowedReportforManaged
devices

InventoryReport

GenerateSoftwareandHardwareReportforManageddevices

WebControlReport

Generatereportforwebpagesblocked/AllowedbyeScanfor
Manageddevices

CreateanewReportSchedule

ReportScheduler
NewReportScheduler
SelectionforApplied
Groups/Clients
ReportSendOptions
ReportScheduling
Settings
Events&Devices

10

Settings

DefinesettingsformailserverforsendingEmailnotifications

11

AppStore

12

CallLogs

SelectDevicesforreportcreation
SendreportonEmail
ScheduleAutomaticorManualReportonDesireddays,dateor
time.
ItwillshowalleventswhichreceivedfromDevices
AllowsyoutoAddAppstotheConsolethatcanbepushedto
ManagedDevicesforinstallation
Itshowsthelistofalltheoutgoing,incomingcalls,alongthe
detailssuchasthenameofthecontactasinthecontactlist,
typeofcall(incoming/outgoing),calltime,dateandduration.

FeaturesofeScanMobileSecurity(Client)
S.No. Features

Description
Thiswilldisplaythecompliancestatusofthedeviceashealthy
ornoncompliant.

ItwillallowyoutofilterSMSonthebasisofblacklistand
whitelistcreatedbyyou.Itwillalsoallowyoutofilterthe
Outgoingcallsbasedonthewhitelistcreatedbyyou.

1.

DeviceCompliance

2.

CallandSMSFilter

3.

Backup

Take a Backup of SMS and Contacts and also restores MSMS


andcontactsfrommanageddevicetotheserver.

4.

ParentalControl

Block execution of Unwanted Applications as well as opening


onunwantedwebsitesonthedevice,asdesired.

5.

AntiTheft

6.

PrivacyAdvisor

7.

Applications

8.

AdditionalSettings

Use this option to Enable Antitheft module on the device,


administrator Use this feature for locating the Device, Wipe
theDatapresentontheDevice(SMSandAddressBook),Block
Device from being used without Admin password, Raise an
Alarm for easy location of the Device, Send Message to the
DevicethroughMDMServer.
Shows the permissions for installed applications on your
device.
Itwillallowtoaddappsfromtheconsoleandalsoallowsyou
toaddthedownloadedapplications.
Configure Advanced Settings for your device for showing
notifications, sound notifications, creating secret code, Write
logs, and Uninstall eScan from Device, Sync with the Server,
andChangeServerandPortAddress.

18.

Getting started with eScan Mobile Device Management

ThischapterhelpsyoustartusingeScansMobileDeviceManagement(Hereafterreferredas
eScanMDM)andprovidesyouthebasicusageinstructions.CurrentlyeScanMDMconsolewillget
installedalongwitheScanEndpointSecurityInstallation.OnceeScanEndpointSecurityisinstalled,
usingeScanEndpointSecurityconsoleyoucanaccesseScanMDMasshownintheimagebelow.

Note:
There is no separate installable file for eScan MDM, once available it will be updated on our
websiteaswellasintheuserguide.

Mobile Device Management Console

YoucanaccesstheMobileDeviceManagementConsolethroughatabprovidedineScan
ManagementConsole,asshownbelow

Figure18.1

TheMobileDeviceManagementConsoleisthecentralpointformanagingandmonitoringMobile
Securitythroughoutyourcorporateandenterprisenetwork.Theconsolecomeswithasetof
defaultsettingsandvaluesthatyoucanconfigurebasedonyoursecurityrequirementsand
specifications.

YoucanusetheMobileDeviceManagementConsoletodothefollowing:
InstallandManagetheeScanMobileSecurity(Client)installedonmobiledevices
ConfiguresecuritypoliciesfortheeScanMobileSecurity(Client)
Configurescansettingsonasingleormultiplemobiledevices
Groupdevicesintologicalgroupsforeasyconfigurationandmanagement
Viewenrollmentandupdateinformation

Accessing eScan Mobile Device Management Console

StepstoaccesseScanMobileDeviceManagementConsole
1. LogontotheeScanManagementConsole.
2. NowClickMobileDeviceManagementtabpresentintheNavigationPanelatthebottom
leftoftheinterface.
3. MobileDeviceManagementconsolewillopeninanewtab.

19. Working with eScan Mobile Device Management Console


Interactive Dashboard

Figure19.1

Description

ThisModuledisplaysarealtimestatusofDeploymentStatus,ProtectionStatusandProtection
StatisticsintheformofPiecharts.

FollowinginformationisdisplayedinchartspresentinthetabsunderDashboardmodule.
1. DeploymentStatusThistabdisplaysdetailedpiechartviewandstatisticsofthefollowing

eScan Status Displays the pie chart view of devices where eScan Mobile Security
(client) is installed, and number of devices for which the eScan Mobile Security
(client)installationstatusisunknown.Youcanviewdetailsofeachdevicebyclicking
thenumericvaluesdisplayedinthelegendssection.

eScanVersionDisplaystheversionsofeScaninstalledonManagedDevices.You
can view details of each device by clicking the numeric values displayed in the
legendssection

Android Version Displays the Android Versions and the number of devices with
that particular version of android installed on Managed Devices. You can view

details of each device by clicking the numeric values displayed in the legends
section.

DeviceSyncStatus(Successful)Thiswilldisplaythelistofdevicessyncedwithon
thebasisoftimeperiodandalsothelistofdevicesthatarenotsynced.Itwilldisplay
thedevicesthataresyncedasoftoday,inthelast2days,inlast37days,withinthe
last830days,andbefore30days

DeviceComplianceThiswilldisplaythecompliancestatusofthedeviceashealthy
ornoncompliant.Thedeviceisidentifiedashealthyornoncompliantbasedonthe
policiesdefinedforthemanagedgroup.

2. ProtectionStatusThisTabdisplaysdetailedpiechartviewandstatisticsofthefollowing

WebControlDisplaysthepiechartviewforthenumberofdeviceswhereParental
Control (Web Control) module of eScan Mobile Security (endpoint) is started or
stopped or the status is unknown. You can view details of each device by clicking
thenumericvaluesdisplayedinthelegendssection.

Application ControlDisplaysthepiechartviewforthenumberofdeviceswhere
Application Protection module of eScan Mobile Security (Client) is started or
stoppedorthestatusisunknown.Youcanviewdetailsofeachdevicebyclickingthe
numericvaluesdisplayedinthelegendssection.

CallandSMSFilterDisplaysthepiechartviewforthenumberofdeviceswhere
CallandSMSFiltermoduleofeScanMobileSecurity(Client)isstartedorstoppedor
thestatusisunknown.Youcanviewdetailsofeachdevicebyclickingthenumeric
valuesdisplayedinthelegendssection.

3. ProtectionStatisticsThistabdisplayspiechartviewofdetailedeScanmodulesactivityon
Managed Devices. You can view details of each device by clicking the numeric values
displayedinthelegendssection.
WebControlDisplaysstatisticsinpiechartaswellasnumbersforwebsitesallowed
orblockedonManagedDevices.Youcanviewdetailsofeachdevicebyclickingthe
numericvaluesdisplayedinthelegendssection.
ApplicationControlDisplaysstatisticsinpiechartaswellasnumbersforAppsto
beallowedorblockedtoexecuteonManagedDevices.Youcanviewdetailsofeach
devicebyclickingthenumericvaluesdisplayedinthelegendssection.
Call Statistics It displays the Pie chart to show the number of incoming and
outgoing calls allowed, incoming and outgoing calls blocked on the Managed

Devices.Youcanviewdetailsofeachdevicebyclickingthenumericvaluesdisplayed
inthelegendssection.
SMSStatisticsDisplaysstatisticsinpiechartaswellasnumbersforSMSreceived
or sent on Managed Devices. Further details can be viewed by clicking on the
numericvaluesforrespectivedetails.

Managed Mobile Devices

CreatingGroups,AddingDevicesandUninstallingeScan

S.No. Options
1.
NewGroup
2.

Figure19.2

AddNewDevice

3.

AddMultipleDevices

Description
UsethisOptiontoCreateNewGroupfor
categorizing/addingDevices.
Usethisoptiontoaddnewdevicesincreated
groups.
Youcanimport(*.txt)filewithdeviceanduser
detailsinthefollowingformatforadding
multipledevicesatonce.
Mobileno.1,Username1,Emailid1forexample:
9012345678,ABCD,abcd@xyz.com
NotePleasedonotputspacebeforeorafter
commaintheaboveformat.

Create New Group

Figure19.3

StepsforCreatingaNewGroup
1. SelecttheManagedDevicesgrouppresentinthetreeunderManagedMobile
Devicesmodule.
2. ClickNewGroupoptionpresentunderActionlistMenu.Youwillbeforwardedto
CreateNewGroupwindow,asshownabove.
3. WritetheNameoftheGroupthatyouwishtocreate.
4. ClickSavebuttonpresentatthebottomoftheWindow.
5. ThecreatedgroupwillbeaddedunderManagedDevicesgroupintheManaged
MobileDevicesWindow.
Add New Device

OncethelogicalGroupsarecreated,youwillberequiredtoAdddevicestotherespective
groupsforManagingandsecuringthemefficiently.

Figure19.4

StepstoAddaNewDevice
1. SelecttheGroupwhereyouwishtoAddthedevice,presentinthetreeunderManaged
MobileDevicesmodule.
2. NowClickAddNewDeviceoptionpresentunderActionList.
3. AddDeviceDetailsintherespectivefieldspresentonAddNewDevicewindow.
4. ClickAddbutton.
5. ANotificationmailwithalinktodownloadandinstalleScanMobileSecurity(client)will
besentontheemailaddress.

Note:
UsingtheSameenrollmentdetailstheusershouldregistertheproductfromthedevice.

Adding Multiple Devices

UsingAddmultipleDevicesoptionpresentunderActionList,youcanAddmultipledevices
toagroupbyimportingdetailsfromaNotepad(*.txt)fileinthefollowingformat
Mobileno.1,Username1,Emailid1
Note:
ThereisnoSpaceafterorbeforecommaintheaboveformat
Usealinebreaktoseparateeachdeviceinformation
AllthefieldsareMandatoryandpleaseprovidecorrectemailid

StepstoAddMultipleDevices

1. SelecttheGroupinwhichyouwishtoaddmultipledevicesusingthefoldertree
presentontheManagedMobileDevicewindow.
2. NowopenAddNewDevicesoptionpresentunderActionlist.
3. Browsethe.txtfilethathastherequireddetailsusingtheBrowseoptionpresenton
theAddMultipleDevicesWindow.

Figure19.5
4. ClickOKbuttontoaddthedevices,alldevicesfromthe.txtfilewillbeaddedtothe
group.
5. DetailswillbeaddedandvisibleinClientDevicespresentundertheselectedgroup.
Moving Devices from one Group to the other

AfterAddingDevicesinagroup,youcanmovedesireddevicesfromonegrouptoother
wheneverrequired.

StepsforMovingDevicesfromoneGrouptoother

1. SelecttheGroupwherethedevicesarealreadyaddedusingthetreepresentinthe

ManagedMobileDevices.
2. Nowselectthedesireddevicesthatyouwishtomovefromthisgrouptoanotherusing
thecheckboxpresentbesideit.
3. NowClickClientActionListMenupresentatthetopintheManagedMobileDevices
screenandselectMovetoGroupoption,asshownbelow

Figure19.6

4. YouwillbeforwardedtoSelectGroupWindow,selectthedesiredgrouptowhich

youwishtomovetheselecteddevices.AndclickOKbutton.
5. Theselecteddeviceswillbemovedtothegroupinstantly.

Note:
YoucancreateaNewGroupusingtheNewGroupoptionpresentintheSelectGroupWindow.
Viewing Device Properties

UsingthefollowingsimplestepsyoucanViewtheProperties/DetailsoftheAddeddevices.

StepsforViewingDeviceProperties

1. SelecttheDevicepresentinthelistontheManagedMobileDevicesscreentoview

itsproperties.
2. NowclickPropertiesunderClientActionlistmenu.

3. YouwillbeforwardedtotheDevicepropertieswindow,alldetailsofthedevicewill

bedisplayedonPropertieswindow,asshownbelow

Figure19.7

4. ClickClosetoclosethePropertiesWindow
Removing Device(S) from the Group

UsingthefollowingsimplestepsyoucanremovetheDevice(s)fromanygroupwhenever
required

1. UsingtherespectivecheckboxselecttheDevice(s)thatyouwishtoremovefrom
thedesiredGroupinManagedMobileDevicesModule.Pleasenotethatyoucan
selectsingleormultipledevicesfordeletion.
2. NowClickRemovefromGroupoptionpresentinClientActionListmenu.
3. Youwillbepromptedwithamessageforconfirmingthedeletion,asshownbelow

Figure19.8

4. ClickOKonthedialogboxtodeletetheselecteddevicefromthegroup.
5. Theselecteddevicewillberemovedinstantlyfromthegroup.

Note:
If the user has uninstalled eScan Mobile Security (Client) from the device using
Uninstall option present in Android OS, then the Administrator has to manually
removethedevicefromtheMobiledeviceManagementConsole.

Resending Enrollment Email

IncasetheuserhasnotreceivedtheEnrolmentemailsenttohimatthetimeofaddingthe
device,youcanresendtheemailbyusingResendEnrollmentEmailoptionpresentunder
ClientActionListmenuinManagedMobileDevicessection.

Changing Email Address for Product Enrolment

YoucanchangetheemailAddressforsendingenrolmentmailusingthefollowingsimplesteps

1. SelecttheDeviceusingtherespectivecheckboxintheManagedMobileDeviceswindow.
2. NowClickClientActionListMenupresentatthetop.
3. ClickChangeUsername/EmailIDunderClientActionListmenu,youwillbeforwardedto

theChangeDetailsWindow,asshownbelow

Figure19.9

4. MakedesiredchangesandclickSaveDetailsatthebottomoftheChangeDetails
window.
Disenroll

UsingthisoptionyoucanDisenrollorremovethedevicefromthelistofmanageddevices.

1.
2.
3.
4.

SelecttheDeviceusingtherespectivecheckboxintheManagedMobileDeviceswindow.
NowClickClientActionListMenupresentatthetop.
ClickDisenrollunderClientActionListmenu.
ClickOK.

Figure19.10

Protecting Managed Devices with Policies

UsingPolicydetailsoptionspresentunderPolicy,youcanconfigurefollowingsettingsineScan
MobilesecurityinstalledonManagedDevices

1. Enable/DisableeScanModulesineScanMobileSecurityonMobileDevices.
2. DefinesettingsforallModulesofeScanMobileSecurityonManagedDevices.
3. ConfigureSettingsforCallandSMSFilter.
4. DefinePolicyforBlacklisting/WhitelistingApplicationsandWebsites.
5. EnableAntiTheftmoduleonthemanageddevices.
6. DefineadditionalsettingsforNotificationsandlogs.
7. DefineAdminpasswordforthemanageddevices.
8. SwitchonGPSonManagedDevices.
9. InitiateinstallationofAPKonmobiledevice.

Note:
AllPolicieswillbeappliedontheManagedDevicesinselectedGroup

StepsforDefiningPoliciesfortheGroup

1. SelectthedesiredgroupforwhichyouwishtodefinepoliciesintheManagedMobile
Devicesmodule,clickPolicyundertheGroup,asshownbelow

Figure19.11

2. NowclickPolicyDetailsontheinterface,youwillbeforwardedtothePolicyDetails
Window.

Figure19.12

Call and SMS Filter Policy

ClickCallandSMSFilterPolicytodefinepoliciesforFilteringCallsandSMSonthebasisof
thewhitelistandblacklistcreatedbyyou.ItwillallowincomingcallsandSMSonlyfromthe
numbersinyourcontactlistandalsoblockSMSandcallsfromnonnumericnumbersforall
manageddevices.

Figure19.13

Itincludesfollowingoptions
Option
CallandSMSFilterMode
WhiteList
Blacklist
Bothlist

AllowContacts
BlockNonNumeric
SMS

Description

AccepttheCallFromWhitelistednumbersonlyand
rejectothers
Blocksthecallsfromallthenumberspresentin
blacklist
VerifythenumbertoBlockoracceptthecallwiththe
numberpresentinWhiteListandBlackList.Reject
callsfromallothernumbers
ApartfromthenumberspresentinBlacklistor
Whitelist,allowcallsfromContactlistsavedonthe
device.
SMScomingfromNonnumericnumberswillbe
blocked

Parental Policy

ClickParentalPolicytodefinepoliciesforApplicationandWebControl.Itallowsyouto
WhiteListorBlacklistapplicationsorwebsitesonmanageddevices.

Figure19.14

S.No. Options
1.

ParentalControlMode

2.

Add/BlockApplication
List

3.

Exclusions

Description
AlloworBlockApplications,orWebsitesorBothbased
onyourrequirementandPolicies
1.AppsaddedtothislistwillbeAllowed/Blockedasper
actionspecified.
2.SystemappswillbeAllowedbydefaultunlessexplicitly
addedto"Block"action.
3.UserInstalledappswillbeBlockedbydefaultunless
explicitlyaddedto"Allow"action.
4.Ifactionissetto"AskUninstall"thedevicewillprompt
theUsertouninstalltheAppandwillremain"Non
Compliant"untiltheAppisuninstalled.
Youcanallowusertoviewspecifiedwebsitesorweb
pagesbyaddingthemtoexclusions.
Webfilteringallowsusertoviewwebsitesfromthe
exclusionlistregardlessoftheselectedcategories.

Anti-Theft Policy

S.No.
1.

2.

3.

Figure19.15

Options
Description
TickthischeckboxtoEnableantitheftunder
EnableAntitheft
onManagedDevices.
TickthischeckboxtoreceiveanSMS
notificationonchangingtheSIMcard
SendSMSnotificationonSIMcard
withoutthepermissionoftheadministrator.
change
Thenotificationwillsendtothenumberset
bytheadministrator
Tickthischeckboxtoreceiveanemail
notificationonchangingtheSIMcard
SendEmailnotificationonSIMcard
withoutthepermissionoftheadministrator.
Change
Theemailnotificationwillsentto
administratorsemailidandalsothecustom
emailidthattheadministratorhasspecified.

Note:
IfAntitheftisnotenabledandthedevicesislostorstolen,eventhenitwillreceiveAntitheft
messages,ifconnectedtoaninternet.

Additional Settings

Figure19.16

DescriptionUsethisoptiontoenableordisabletheaboveoptiononselectedmanageddevices.

S.No. Options
Description
UsethischeckboxtoEnableNotifications
optionpresentunderAdditionalSettingson
1.
ShowNotification
ManagedDevicespresentintheselected
Group.Allnotificationmessageswillbe
shownonDevices.
UsethischeckboxtoEnableSoundoption
presentunderAdditionalSettingson
2.
Sound
ManagedDevicespresentintheselected
Group.Alertsoundwillbeplayedonthe
deviceforapplicationevents.
UsethischeckboxtoEnableWriteLogs
optionpresentunderAdditionalSettingson
3.
WriteLogs
ManagedDevicespresentintheselected
Group.LogsforUseractionswillbe
maintainedineScanLogfiles.
Usethischeckboxtodisable/blockAndroid
4.
DisableSystemSettings
settings.
DefinetimefrequencyforcollectingPolicy
5.
SyncFrequency
Datafromdevices.Bydefaultitis60
minutes.

Password Policy

Figure19.17

UsethisoptiontodefineAdministrativePasswordthatwillallowtheusertoconfigure
settingsofeScanModuleonrespectiveManageddevices.

Device Oriented Policy

Figure19.18

Usethisoptiontoenable/disableGPSonselectedmanageddevices.
Required Applications Policy

UsingImportoptionpresentunderthistab,youcanimporttheapplicationsfromAppStore
forinstallationonManageddevicesinthegroupthroughPolicydeployment.

FormoreinformationonAddingtheAppstoAppStore,clickhere

Steps for Importing Apps from App Store

1. ClickImport.
2. SelectthedesiredappthatyouwishtoinstallonManagedDevicesusingthe
respectivecheckboxandclickSave.

Figure19.20

3.
4.

TheselectedAppwillbeimported.
ClickDeploy.ThePolicywillbedeployedonthedeviceinstantlyifinternet
connectivityisavailableonthedevice.Ifinternetconnectionisnotavailable,the
changewillbeappliedinnextscheduledsynctime,bydefaultsynctimeis60
minutes.Thefollowingscreenappearsconfirmingthedeployment.

Figure19.21

OnPolicyDeploymenttheuserwillgetthemessageonPhonetoinstalltheapp,on
acceptancehewillbeprovidedwiththeoptiontostarttheinstallationprocess.Ifuser
cancelstheinstallation,itwillalerttheuserwhenthenextsynchappens.

Viewing Managed Client Devices

Figure19.6
S.No. Captured
Information
1.
MobileNumber
2.
EnrollmentStatus
3.
4.
5.
6.
7.
9.
10.
11.
12.
13.
14.
15.

Username
MacNumber
EmailId
eScanStatus
eScanVersion
StatusforeScan
modules
LastConnection
LastUpdate
LastScanned
UpdateServer
ClientOS
PolicyApplied
Date

Description
DisplaystheMobileNumberoftheDevice
DisplaystheStatusoftheDeviceEnrollment/recognitiononthe
MDMServer.Ifsuccessfullyenrolledthestatuswillchangedto
EnrolledelseitwillshowasPending.
DisplaystheUsernameoftheEnrolleddevice
DisplaystheMacaddressoftheenrolleddevice
Displaystheemailaddressoftheuseroftheenrolleddevice
DisplaystheinstallationstatusofeScanontheenrolleddevice
DisplaystheeScanVersioninstalledonthedevice
ItdisplaystheEnable/DisablestatusofeScanModulesWeb
Control,ApplicationControl,CallandSMSFilteronthedevice
ItdisplaystheLastconnectiontimingbetweenMDMserverand
device
ItdisplaysthedateandtimewheneScanwaslastupdatedonthe
device
ItdisplaysdateandtimeofLastScanonthedevice
ItdisplaystheName/IPaddressofUpdateServer
ItdisplaystheOSNameandVersioninstalledonthedevice
ItdisplaysthedateandtimeonwhichthePolicyisappliedonthe
device

20. Backup Management


Manage Backup

UsingtheManageBackupmoduleofeScan,youcantakebackupofSMSandContactlistsavedon
ManagedDevicetotheserverandrestoreitlateronthedevicewheneverrequired.

Figure20.1

DescriptioneScansMobileDeviceManagementallowsyoutotakeBackupofSMSandContacts
fromtheselectedDevices/GroupstotheMDMServer.

StepsforTakingSMSBackupfromDevicestotheServer
1. SelecttheDevicesorGroupinManageBackupmoduleofeScanfromwhereyouwishto
takebackupofSMStotheMDMserver.

Figure20.2

2. NowclickBackupNowandselectthedesiredoptionusingrespectivecheckboxtotake
backup.

Figure20.3

3. ClickBackupNowoptiontotaketheBackup.

Note:
Thisfeaturewillnotworkifthereisnointernetconnection.

21. Lost Device Protection through Anti-Theft


Anti-theft How it Works

Ifauserlosesormisplacesthemobiledevice,youcanremotelylocate,lockordeleteallthedata
availableonthatmobiledevice.

Figure21.1

UsingthisModule,youcandothefollowing
Wipe Data

UsingthisoptionyoucandeleteSMSandAddressbookfromthedeviceincasetheDevice
islostorstolen.
Block Device

YoucansendBlockinstructionfromtheMDMconsoletoremotelyblockamobiledevice.
UserswillrequiretotypetheAdministrativepasswordtounlockthemobiledevice.

Scream

UseScreamOptiontoraiseanalarmonthedeviceforeasilylocatingthedevice.

Send Message

UsethisoptiontosendMessagetodesiredManagedDevices.

Locate Device

Youcanlocatethemobiledevicethroughthewirelessnetworkorbyusingmobiledevices
GPS.TheMobileDeviceManagementserverdisplaysthemobiledevicelocationonGoogle
Maps.

Note:
Anactiveinternetconnectionisrequiredtousethisfeature.

22. Mobile Endpoints- Asset Management

Asset Management How it Works

ThisModuledisplaysdetaileddescriptionoftheHardwareandSoftwareinstalledonthe
ManagedDevices.
Asset Management Hardware Information

Figure22.1

StepsforviewingSoftwareandHardwareinformation

1. ClickAssetManagementModulepresentintheNavigationPanelofMobileDevice
ManagementConsole.
2. NowselectthedesiredTabtoviewrelatedinformation.

FollowingHardwareinformationiscapturedfromManagedDevices
S.No.
CapturedInformation
1.
PhoneNumber
2.
Group
3.
IPAddress
4.
Username

Description
DisplaysthePhonenumberusedonthedevice
DisplaystheGrouptowhichthedeviceisaddedto
DisplaystheIPaddressoftheDevice
Displaystheusernamewithwhichthedeviceis
registeredontheMDMServer
5.
IMEINumber
DisplaystheIMEInumberofthedevice
6.
PhoneModel
DisplaystheModeldetailsofthedevice
7.
OperatingSystem
DisplaysthedetailsoftheOSofthedevice
8.
OSVersion
DisplaystheOSversionoftheDevice
9.
RAM(MB)
DisplaystheRAMsizeofthedeviceinMB
10.
DisplaysthesizeofPhonememoryofthedevicein
PhoneMemory(MB)
MB
11.
ExternalSDCard(MB)
DisplaysthesizeofSDCardofthedeviceinMB
12.
InternalSD(MB)
DisplaysthesizeofInternalmemoryinMB
13.
Displaysthetypeofthenetworkbeingusedbythe
NetworkType
device
14.
Rooted
Displaysifthedeviceisrootedornot
15.
RoamingEnabled
DisplaystheStatusofRoaming,enabledordisabled
16.
Bluetooth
DisplaysifBluetoothispresentonthedeviceornot
17.
WIFI
DisplaysifWIFIispresentonthedeviceornot
18.
GPS
DisplaysifGPSispresentonthedeviceornot
19.
Software
Displaysthelistofsoftwareinstalledonthedevice
AssetManagementHardwareInformationFilterCriteria

Figure22.2

InformationcapturedbyMDMcanbefilteredonthebasisofanydetailscapturedfromthedevice.

StepsforFilteringtheHardwareinformation

1. UnderHardwareinformationTab,clickFilterCriteriaoption.
2. ThiswillextendtheFilterCriteriaModuleontheinterface.

Figure22.3

3. eScanfacilitatesfilteringofthecapturedinformationonlargenumberofcriteriaasshown
intheabovefigure.
4. Basedonyourrequirement,youcaneitherincludetheselectedcriteriainyourreportor
excludethemfromthedropdown.
5. Selectthedesiredcriteriausingtherespectivefieldsanddropdownpresentonthe
interfaceandclickSearchbuttonpresentatthebottomofinterface.
6. Detailswillbefilteredinthetableinstantly.
Asset Management Software Information

Figure22.4

ThistabdisplaysthelistofsoftwareinstalledonManageddevicesaswellasthedevice
countforeveryinstalledsoftware.
Asset Management Software Information Filter Criteria

Figure22.5

Alltheinformationcapturedfromthedevicescanbefilteredonthebasisofincludingthe
softwarenameorthePhonenumberassociatedwiththedevice.
Asset Management Export Options for the Generated Reports

Figure22.6

eScansMDMsupportsexportAllreportsgeneratedforthehardwareaswellassoftware
inventorytoExcel,PDForHTMLformats,asdesiredbyyou.
StepsforExportingaReport

1. ClickExportoptionpresentontheinterface.
2. Nowselectthedesiredexportoption.
3. ClickExportbuttonpresentontheinterface,reportwillbeexportedintheselectedformat
andyouwillbeinformedthroughfollowingmessage

Figure22.7

4. Clickonthelinktoopen/downloadthereportinselectedformat.

23. Customizing and Scheduling Reports


Report Templates

Figure23.1

UsingthisModuleyoucangenerate/Edit(Customize)anypredefinedReportTemplatefor
any eScan Module. You can also create your own customized report template for desired
periodoftimeandfordesiredmodule.

Creating a New Report Template

Basedonyourrequirement,selectthedesiredReportTypeforCreatingaNewReport
Template.

StepsforCreatingaNewReportTemplate

1. ClickNewoptionpresentinReportTemplateModuleofMobileDeviceManagementof
eScan.
2. YouwillbeforwardedtotheNewReportTemplatewindow,asshownbelow

Figure23.2

3. TypethedesiredReportTemplateNameintherespectivefieldpresentontheinterface.
4. SelecttheReporttypethatyouwishtogenerateusingtherespectiveRadiobuttonspresent
ontheinterfaceunderSelectReporttypesection.
5. SelecttheFilterandSortoptionusingtherespectiveRadiobuttonsandclickSave.

Figure23.3

6. ReportTemplatewillbecreatedinstantly.

Editing an Existing Report Template

YoucanEdit/CustomizeanyexistingReportTemplateasperyourrequirementusingthe
Editoptionpresentontheinterface,underReportTemplatemoduleofeScansMobile
DeviceManagement.

StepsforEditinganExistingReportTemplate
1. SelectthedesiredreporttemplatethatyouwishtoEdit/Customizefromthelistusingthe
respectivecheckbox,asshownbelow

Figure23.4

2. NowclickEditbuttonpresentatthetopofinterface.YouwillbeforwardedtoEditReport
TemplateWindow.
3. MakedesiredchangesandclickSave.

Viewing a Report

YoucanViewtheresultscapturedinthereportbyselectingtheReportandthenclickon
ViewoptionpresentonthetopofReportTemplatemodule.Resultsoftheselectedreport
willbedisplayed,asshownbelow

Figure23.5

Deleting a Report Template

SelecttheReportTemplatethatyouwishtodeleteusingtherespectivecheckboxandclick
Delete.

24.

Report Scheduler
Creating a Report Schedule

Figure24.1

Followingoptionswillbedisplayed

S.No. Options
Description
1.
New
UsethisoptioncreateaNewReportSchedule
2.
Edit
UsethisoptiontoEditanExistingReportSchedule
3.
Delete
UsethisoptiontodeleteanexistingReportSchedule
4.
UsethisoptiontoRunanalreadycreatedReport
Run
schedule
5.
UsethisoptiontoViewanalreadycreatedReport
View
Schedule
6.
Usethisoptiontoviewresultsofpreviouslydeployed
Result
reportschedule.

StepsforCreatingaNewReportSchedule
1. ClickNew.
2. SelectthedesiredreporttemplatesthatyouwishtoscheduleandFilterthecriteria,as
shownbelow

Figure24.2

3. SelecttheGroupsorDevicesforwhichyouwishtoScheduletheReport.

Figure24.3

4. ConfiguretheoptionsforSendingtheReportonEmailusingReportSendOptions.
5. AlsoselecttheFormatforsendingtheReportonMail.Excel,HTMLandPDFformatsare
supported.

Figure24.4

6. SchedulethereportasperyourrequirementandclickSave.

Figure24.5

7. ReportSchedulewillbecreatedinstantly.
8. SelecttheReportScheduleandclickRuntomanuallyruntheCreatedReportSchedule.

Figure24.6

9. YoucanViewtheDataoftheReportbyclickingViewbuttonpresentontheinterface.

Figure24.7

10. ToViewtheStatusofScheduledReportclickResult.

Figure24.8

25. Events and Devices


Viewing Events

Eventscapturedfromthedevicesarecategorizedanddisplayedinthismodule.Thiswill
givearealtimestatusofsecurityandeScanupdateonallthedevices.

Figure25.1

Types of Event Status

Onthebasisofseverity,thatis,thelevelofimportance,eventsarecategorizedintothe
followingthreetypes.

Recent: It displays both critical and information events that occurred recently on
manageddevicessuchaswebcontrolstatus,applicationstatusetc.
Critical:Itdisplaysallcriticaleventsoccurredonmanageddevicessuchasantitheft
disabledetc.
Information: It displays all informative type of events such as antitheft status,
manualsyncstatusetc.

Device Selection

TheDeviceSelectiontabenablesyoutoselectandsavethecomputerstatussettings.This
moduleenablesyoutodothefollowingactivities:
DefineCriteriasforFilteringofDeviceStatusonthebasisoffollowing
DevicewiththeCriticalStatus

DevicewiththeWarningStatus
Notconnectedforalongtime
Protectionoff

Hardware / Software Updates

CaptureEventsonthebasisofSoftwareChanges,HardwareChangesorexistingDevice
Information.
Type of Updates

Thelistsofupdatesareasfollows:

SoftwareChanges:Itdisplaysthelistofmanageddevicesonwhichsoftwarerelated
changesaremade.Forexample,Installation/Uninstallationofothersoftware.
HardwareChanges:Itdisplaysthelistofmanageddevicesonwhichhardwarerelated
changesaremade.

Events and Devices settings


Defining Settings for Events and Devices

Event Status: You can define settings for the Events and Devices for Event Status, Device
Selection, as well as Hardware and Software changes. By defining these settings you can
definenumberofRecordstoshowforEvents,captureevents,InformationrelatedtoEvents
for Hardware and Software Changes for desired number of days and desired number of
recordstoshow.
ExistingSystemInfo:Itdisplaysdeviceinformationoftheexistingdevices.
EventsandDevicessettings
The Software/Hardware changes: The following actions can be performed using
thisoption
Field
Description
Software/Hardware SelectfromthedropdowntogenerateEventsrelatedtothe
Changes
selectedoption.
NumberofDays
Typethenumberofdays,toviewchangesmadewithinthe
specifieddays.
Forexample,ifyouhavetyped2days,thenyoucanviewthelist
ofdevicesonwhichanysoftware/hardwarechangeshavebeen
madeinthelast2days.
NumberofRecords
Typethenumberofdevicesthatyouwanttoviewinthelist.

26. Settings

Usingthismodule,youcanSaveServerdetailsforsendingEmailnotificationstotheDeviceuser
emailaddresses.

Figure26.1

27. App Store

UsingtheAppStoreyoucanAddappsthatwillbeofusetotheMobileDeviceusersaccessingyour
network.AfteraddingtheappstotheAppStoreyoucanpushtheseappstothemanageddevices
throughpolicydeployment.
FormoreinformationonPolicyDeployment,clickhere

StepsforaddinganApptotheAppstore

1. ClickAddundertheAppStoremoduleofeScansMobileDeviceManagementConsole.

Figure27.1
2. Nowbrowsethepathwherethe.apkfilefortheappissavedandclickContinue.
3. YouwillbeforwardedtotheEditApplicationwindow,writeabriefdescriptionfortheApp
andclickSave.

Figure27.2

4. TheAppwillbeaddedinthestoreinstantly.

Figure27.3

5. ClickontheNumericValuepresentinInstalledColumntoviewthelistofdeviceswherethe
applicationisinstalled,initiallybeforepolicydeploymentitwillbe0.Iftheappwiththe
sameversionnumberisinstalledonthedevicesthecountwillbeshownaccordingly.

28. Getting started with eScan Mobile Security

Introduction

eScan Mobile Security is specifically designed for Android devices. It helps you secure
enterprisedataaccessedfromsmartphonesandtabletconnectedtoyournetwork.Itenables
you to white list/black list contacts and messages, backup/restore contacts and messages,
blocksapplicationsandwebsites,whichensuresecuritytothedevices.
Downloading and Enrolling eScan Mobile Security

Asfirststepforenrollingthedevice,theadministratorhastoadddevicedetailstotheMDM
console.OncethedetailsofthedeviceisaddedtotheMDMConsolebytheadministrator,an
emailisautomaticallysenttotheusersemailaddresswithalinktodownloadeScanMobile
securityondevicesalongwithmandatoryuserdetailsrequiredforenrollingthedevice,the
detailsinclude,MobileNumber,Server,Portnumberandcountry.

ItismandatoryfortheusertohaveinternetconnectiononthedevicefordownloadingeScan
andcompletingtheenrollmentprocess.
Enrolment Process

Enrolmentprocessconsistoffollowingsteps

1. Downloadthe.apkfromthedownloadlinkreceivedonyouremailaddress.
2. InstalleScanMobileSecurityonthedevice.
3. OpeneScanMobileSecurityandenrollthedeviceonMDMserverbyfillingup
Enrollmentdetailsonthedevice.

Youcanfilluptheformusinganyofthefollowingtwoprocedures
Fillingenrollmentdetailsmanually
AutomaticallyfillingenrollmentdetailsusingQRcodereceivedinenrollmentmail

TheQRcodecontainsuserinformationfilledbytheadministratoratthetimeofadding
thedeviceonMDMconsole.
YouarerequiredtofillthesameinformationintheEnrollmentDetailsformfromthe
deviceforenrollingthedeviceoneScanMDMserver.

StepsforfillingenrollmentdetailsthroughQRCode

1. OpeneScanMobileSecurityondeviceafterinstallation.

2. Enrollment Details form will open on the device, Tap on Fill entries through QR
Code.
3. Now focus the camera towards the QR Code received in the enrollment email on
yourcomputer.
4. The Enrollment details form will automatically be filled with all the mandatory
detailsencryptedintheQRCode.
5. TaponEnrollDevicebuttonpresentatthebottomoftheinterface.

Stepsforfillinginformationmanually

1. OpeneScanMobileSecurityondeviceafterinstallation.
2. EnrollmentDetailsformwillopenonthedevice.
3. Now fill in the Enrollment details form with the mandatory (*marked) details
receivedintheenrollmentemailsentbytheadministrator.
4. TaponEnrollDevicebuttonpresentatthebottomoftheinterface.
5. The device will be enrolled instantly and you will be forwarded to the Device
Administratorpopupmessage.
6. TaponNextbuttontoactivatedeviceadministratorpermissiontoenableAntitheft,
ParentalControlonthedevice.
7. You will be forwarded to the information window for activating device
administrator.TaponActivatebuttonpresentatthebottomoftheinterfaceorTap
onCanceltocanceltheactivation.

ThedevicewillbeenrolledtotheMDMServer

eScanMobilesecurity

Thefollowingarethemodules/optionspresentonscreenonthemobileinterface.
Administrator Mode: This will allow you to change the settings from your mobile device
onceyouinputthecorrectpasswordprovidedontheserver.Withoutthepasswordyouwill
haveonlyareadyonlyaccesstoallthemodulesandwontbeabletomakeanychangesto
thealreadydefinedsettings.

Figure28.1
DeviceCompliance:Thiswillportraythecompliancestatusofthedeviceashealthyornon
compliant.Thedeviceissettohealthyornoncompliantbasedonthepoliciesdefinedon
theserver.

Figure28.2
CallAndSMSFilter:ThiswillallowyoutofilterincomingCallsandSMSonthebasisofblack
listandwhitelistcreatedbyyou.ThiswillalsoallowyoutofiltertheOutgoingcallsbasedon
thewhitelistcreatedbyyou.

Figure28.3

Backup:ThiswillallowyoutotakeabackupofcontactsandSMS,restorecontactsandSMS
andwillalsomaintainthelogforalltheactivitiescarriedout.

Figure28.4

ParentalControl:Allowingandblockingspecificwebsitesandapplications.

Figure28.5
AntitheftThissectionhelpstheusertotrace,Lock,orWipetheDataonTabletthrough
anonlineprofileincaseofalostortheftofthedevice.

Figure28.6
Privacy Advisor: This section displays the list of applications installed on the Tablet along
withthepermissionsusedbythem.

Figure28.7
Applications:Youcandownloadnewappsfromtheappstoreandalsoportraysthelistof
downloadedapps.

Figure28.8
Additional:Configuringadditionaladvancedsettings.

Figure28.9

29. Contact Details

Weoffer24x7FREEOnlineTechnicalSupporttoourcustomersthroughemailandLiveChat.We
alsoprovideFREETelephonicSupporttoourcustomersduringbusinesshours.
Chat Support

TheeScanTechnicalSupportteamisavailableroundtheclocktoassistyouwithyour
queries.YoucancontactoursupportteamviaLiveChatbyvisitingthefollowinglink.

http://www.escanav.com/english/livechat.asp
Forums Support

YoucanevenjointheMicroWorldForumathttp://forums.escanav.comtodiscussallyour
eScanrelatedproblemswitheScanexperts.
E-mail Support

Pleasesendyourqueries,suggestions,andcommentsaboutourproductsaboutour
productsorthisguidetosupport@escanav.com.

30. Registered Offices

AsiaPacific
MicroWorldSoftwareServicesPvt.Ltd.
CINNo.:U72200MH2000PTC127055
PlotNo80,Road15,MIDC,Marol,Andheri(E),Mumbai,India
Tel:(91)(22)28265701
Fax:(91)(22)28304750
Email:sales@escanav.com
Website:http://www.escanav.com
Malaysia
MicroWorldTechnologiesSdn.Bhd.
(Co.No.722338A,E86,MeganAvenue1,189,JalanTunRazak,50400Kuala
Lumpur,Malaysia
Tel:(603)23338909or(603)23338910
Fax:(603)23338911
Email:sales@escanav.com
Website:http://www.escanav.com
SouthAfrica
MicroWorldTechnologiesSouthAfrica(PTY)Ltd.
376OakAvenue
BlockC(Entrancefrom372OakAvenue)Ferndale,Randburg,Gauteng,SouthAfrica
Tel:Local08610eScan(37226)
Fax:(086)5020482
International:(27)(11)7814235
Email:sales@microworld.co.za
Website:http://www.microworld.co.za
USA
MicroWorldTechnologiesInc.
31700W13MileRd,Ste98,FarmingtonHills,MI48334,USA
Tel:(1)(248)8552020
Fax:(1)(248)8552024
Email:sales@escanav.com
Website:http://www.escanav.com
Germany
MicroWorldTechnologiesGmbH
Drosselweg1,76327Pfinztal,Germany
Tel:(49)724094490920
Fax:(49)724094490992
Email:sales@escanav.de
Website:http://www.escanav.de

You might also like