Tuesday, March 24, 2009

Norman Virus Control v5.99 w key Lz0

Tuesday, March 24, 2009

Norman Virus Control
Overview
- the modules

Norman Virus Control (NVC) is a collection of antivirus software applications and utilities that protect your workstations, servers and gateways against malicious software.
The most prevalent types of malware are computer viruses, worms, and trojans.

The single most important task for antivirus software is to keep computers free from viruses.
NVC is based on the advanced core technologies of Norman’s Scanning Engine, which accurately detects known and unknown computer viruses, worms and trojans.
When infected files are detected, NVC cleans, isolates or deletes them immediately before the destructive code is activated.

Every administrator knows how important it is to have software that is easy to install, deploy, update, configure, maintain, and manage.
A product that is difficult to install and manage is unlikely to succeed in today’s market.
Norman has taken this into consideration when making the new version of the award-winning Norman Virus Control.
NVC v5 is just as easy to install and administer in a small LAN as it is in an enterprise WAN.
NVC v5 gives new meaning to TCO (”Total Cost of Ownership”).

Key features of Norman Virus Control

* On-access and On-demand scanning of file

* Norman SandBox II - revolutionary way to detect new and unknown malware

* Automatic updates over the Internet - complete product and incremental updates of definition files

* Proactive email and newsgroup scanning

Features:

Norman SandBox On-access scanner On-demand scanner Norman Internet Protection Automatic updates

Task editor Utilities Decompression library Messaging Messaging module for administrators Norman Management tool
- NDesk Configuration through Microsoft Management Control Norman Virus Control’s administrator benefits

Norman SandBox:
Norman’s SandBox technology detects new and unknown computer viruses, including trojans and worms.

Today, an email worm can infect tens of thousands of workstations in a matter of seconds.

The antivirus vendors are expected to find the cure, update the virus definition files, and distribute these to its customers immediately.
The need for speed is paramount.
Norman’s SandBox is a virtual world where everything is simulated.
An emulator provides an environment where possible virus infected executables “run” just as they would do on a real system. When execution stops, the SandBox is analyzed for changes.
The SandBox is particularly tuned to find new email-, network- and peer-to-peer worms.

On-access scanner:
On-access scanning involves constant monitoring of the file system on servers and workstations.

For an antivirus application, it is imperative to detect and block a computer virus before it is activated.
Whenever a file is accessed in a read/write operation, or a program is executed, the On-access scanner is notified and scans the file on the fly.

Like the On-demand scanner, Norman Virus Control’s On-access scanner detects and repairs many types of malicious code.
Whenever possible, an infected file is repaired before the file is handed over to the application.

If repair fails, Norman Virus Control denies access to the infected file. There are a number of configuration options for the On-access scanner, and in general it’s a good idea to decide upon a strategy when this feature is configured.
NVC provides guidelines in the program, help files, and documentation.

On-demand scanner:
This scanner is used for manual scans of selected areas on a machine.
Entire drive(s), or certain folders and subfolders - even specific files - can be selected for scanning.
From Windows Explorer, for example, any object can be selected and scanned by choosing the Norman Virus Control entry from the right-click menu.

In networks, the system administrator can create scanning tasks to be executed on selected, or on all workstations and servers in the organization.
Tasks can be executed immediately, or scheduled for execution later, for example at fixed intervals.
The On-demand scanner can use the Norman SandBox technology to further increase protection levels by detecting new and unknown malware before it can cause damage.

Norman Internet Protection:
The Norman Internet Protection (NIP) module scans incoming and outgoing email as well as files downloaded from newsgroups.
To reduce the risk of virus infection, we have added file attachment blocking.
The user can set up rules for attachment blocking according to their security policy.

* Block all attachments

* Block any attachment with double extensions

* Block attachments with CLSID extensions

* Block all except chosen extensions* Accept all except chosen extensions

NIP hooks all applications using Winsock, and scans all traffic on ports for POP3, SMTP, and NNTP.

Task editor
With the Task editor you can create task files for scans to be performed on a regular basis, or special scans that need to be run in certain situations.
For example, if files are downloaded from the Internet to designated areas, a task file can be created to scan these areas only, or run manually by the user after downloads are complete.
In addition, the task can be scheduled to run at a pre-defined time.

Administrators can create task files and distribute them to all workstations in the network to ensure consistent checking of areas that require special attention.

Utilities:
Certain elements can be changed by selecting some of the entries, for example Task files.
You can also manually delete, restore or save files that are placed in the quarantine from the Utilities module.

Decompression library:
A new advanced decompression module has been developed to scan files that have been compressed with different archive programs.
With this module NVC can now scan more than 30 archive types and variants like ZIP, TAR, RAR, ARJ, UENCODE, ARC etc.
Files that contain other files of different archive formats will also be scanned to further increase security. In addition, if malware is found within an archived file, NVC will - if possible - clean the infection and repack the file (only valid for some formats).

Messaging:
Messaging is made up from two components: Message routing and Message handling.

* Message routing allows administrators to select what kind of messages that should be routed to other PCs running NVC in the network.

* Message handling allows users as well as administrators to select what kind of messages are displayed or kept locally.

The messaging functionality is an effective way of keeping track of all activity related to NVC components locally as well as in the network.

Messaging module for administrators:
Administrators can configure which incidents that should trigger messages to be sent as email or SMS to selected receivers.
In networks using SNMP you can also configure NVC to send messages to a preferred administration tool.

Norman Management tool - NDesk:
NDesk is a tool for administering NVC v5 network installations from a single workstation, including remote installation to the Win NT/2000/XP platform.
However, NDesk can administer and monitor Windows 9x and OS/2 computers with Norman Virus Control installed (using other techniques) as well as NT/2000/XP.

Based on the conditions above, the primary functions that NDesk offers are:
* NVC remote installation on the NT/2000/XP platform

* Monitor NVC installations on all Windows and OS/2 computers

* NVC Configuration management

* NVC Task file management

* Remote triggered scan

* Remote triggered updates

* Printing of machine overview lists

Configuration through Microsoft Management Control:
Norman Virus Control snap-in modules for Microsoft Management Console are available for the configuration of all parts of NVC.
The snap-in for configuring NVC can be used on its own or can be integrated with other management console snap-ins to create a tailor-made management view.

Norman Virus Control’s administrator benefits:
So, what are the benefits for administrators who choose NVC v5?
User-friendly

We have focused on the management of software and the cost of ownership.
Norman Virus Control v5 has four fundamental characteristics:

* Simplified installation

* Simplified management

* Invisibility

* Updates via the Internet

Simplified installation:
Rollout in networks is smooth.
NVC is installed on a designated computer (the administrator), the configuration settings are selected, and the workstations where NVC should be installed are identified.
The agent handles the rest automatically.

In a matter of minutes Norman Virus Control will be installed on the selected computers.

Simplified management
Simplicity is also the philosophy behind software management.

Installation, maintenance and configuration are centralized in NVC.
From one single point the administrator can administrate workstations either as a group or as individual units, depending on the network.
The user decides which modules to install or uninstall, and defines which rights end users are granted.
The changes are deployed automatically and take effect in a matter of minutes.
The messaging system can be configured in a number of ways, for example broadcasting of virus alarms, and logging of various other incidents to file or console.

In sum, precious time is saved and can be better spent on more productive tasks for the company’s benefit.

Invisibility:
Most users do not want to be actively involved with antivirus software.
The average user does not necessarily need to know that antivirus software is installed on their computers.
The constant presence of antivirus software that is running around-the-clock represents an important assurance. NVC v5 provides this assurance.

Everything can be directed and managed from one computer.

Updates via the Internet

Today there are approximately 60,000 different known computer viruses.
New ones are constantly appearing, and Norman Virus Control is continuously being updated in order to provide protection against new threats.

System Requirements:
Any Pentium class PC running
Windows 95/98/Me or Windows NT/2000/2003/XP/Vista/2008

Norman Virus Control v5.99 w key Lz0

Download

0 comments:

Post a Comment

 
Software Wanted © 2008. Design by Pocket