This help topic outlines the features and options available on the Security Manager | AV Defender client software, installed when Security Manager | AV Defender was installed on a device. You can print this topic as a PDF for distribution to customers.
Security Manager | AV Defender provides an all-in-one solution for protection. N-able N-central provides quality security and up-to-date virus signatures to ensure devices are safe from Internet threats. N-able N-central provides network protection features including:
- Anti-Malware – detecting and blocking malware threats before they have a chance to inflict damage to devices. AV Defender makes a distinction between an "infected file" and a "suspected file" based on the confidence that it has detected a security threat.
- Behavioral Analysis – examining the behavior of a file and determining if the file may be a threat.
- Network traffic scans – providing data protection for email and user web browsing in real time, and scanning various types of network traffic for potential security threats.
- Content Control – providing a way to restrict what users can access and send over the Internet.
- Anti-Phishing – preventing the attempt to obtain sensitive information such as credit card numbers or account information from a bank for malicious reasons.
- Firewall – controlling access to network resources, network services, and to the Internet by specified applications.
Version information and support contact information is available by right-clicking on the Security Manager | AV Defender icon in the system tray and clicking About.
You can access the software by right-clicking on the Security Manager | AV Defender icon in the system tray and clicking Show.
When open, the Security Manager | AV Defender window displays your system status and the events log, that lists the activities the software has performed.
There are a number of modules that can be employed on your computer to protect it and its contents from threats. To see what modules are used, click the icon in the upper left corner of the Security Manager | AV Defender window.
Your MSP configures regular scans to ensure that your computer is free of any malicious software or other threats. If you feel you need to run an ad hoc scan, you can do this through the Security Manager | AV Defender client software.
To initiate a scan, click the Scan Tasks icon .
Once started, you can view the details of the scan in action, pause, postpone or stop the scan.
A Quick Scan is pre-configured to scan only critical system locations and new files. Running a Quick Scan usually takes less than a minute, and uses a fraction of the system resources needed by a regular virus scan. When malware or rootkits are found, AV Defender automatically proceeds with disinfection. If, for any reason, the file cannot be disinfected, then it is moved to quarantine. This type of scanning ignores suspicious files. If malware is found during a quick scan, you need to run a full scan task to remove detected malware.
A Full Scan checks the entire system for all types of malware threatening its security, such as viruses, spyware, adware, rootkits and others. AV Defender automatically tries to disinfect files detected with malware. In case malware cannot be removed, it is contained in quarantine, where it cannot do any harm. Suspicious files are ignored. If you want to take action on suspicious files as well, or if you want other default actions for infected files, then run a Custom Scan.
A custom scan is a scan of the target device using AV Defender that you configure. Custom scans incorporate exclusions and depending on your settings, can also take action when security threats are detected.
The logs that appear in the Security Manager | AV Defender window contain a lot of information. You can use the filtering feature to view specific information that your technician may need for troubleshooting.
Click the Filter icon .
From the menu that appears:
Click the icons under Modules to view specific module events.
Under Date Range, you can select a start and end time frame for specific log entries. Clicking on Start and End displays a calendar. Click the dates on the calendar to populate the date fields and click Go to see the filtered log entries.
Under Severity, select the severity level to appear.
Click Reset Filters to return to the full log entry display.