Run Pingan Guard

<p>After installing Pingan Guard, you can run it. This article describes how to run Pingan Guard.</p> <p><strong>Open Endpoint Security Client</strong></p> <p>Open the Endpoint Security client to display the status of the protection features installed on the computer. Use the following methods to display the Endpoint Security client.</p> <p><strong>Usage Guidelines</strong></p> <p>1.Currently, only the operating system Window is supported.</p> <p>2.Unmount is not supported after installation.</p> <p>3.When selecting Window as the custom image, you may not be able to install Pingan Guard. We recommend that the custom image name contains Windows keywords.</p> <p><strong>Procedures</strong></p> <p>1.&nbsp; Log in to the ECS Console.</p> <p>2.&nbsp; In the lower-left corner, left-click the <strong>Start</strong> icon to open a selection box.</p> <p>3.&nbsp; Click the <strong>McAfee Endpoint Security</strong>.</p> <p>4.&nbsp; Enter the <strong>McAfee Endpoint Security</strong> page.</p> <p><strong>Note:</strong> After protection, the status becomes <strong>Enabled</strong> which means McAfee Endpoint Security application has already been successfully launched in the Windows Server.</p> <p>&nbsp;</p> <p><strong>Use Threat Protection</strong></p> <p><strong>Manual Scan</strong></p> <p>Administrators (or users, for self-managed systems) can configure predefined or custom on-demand scans that can be run on managed computers. Use the Endpoint Security client to perform a manual full scan or quick scan on the computer. The operations of &quot;Full Scan&quot; and &quot;Quick Scan&quot; depend on how the settings are configured, and these scans can be modified and scheduled in the &quot;On-Demand Scan&quot; settings using administrator credentials.</p> <p><strong>Procedures</strong></p> <p>1.&nbsp; Open Endpoint Security client.</p> <p>2.&nbsp; Click <strong>Scan System</strong>.</p> <p>3.&nbsp; Enter the <strong>Scan System</strong> page, and after <strong>Full Scan</strong> or <strong>Quick Scan</strong>, click <strong>Scan Now</strong>.</p> <p><strong>Note:</strong></p> <ul> <li>Full scan: Check all zones of the system in a comprehensive manner. We recommend that you perform this operation if you suspect that the computer is infected.</li> <li>Quick scan: Quickly check the most vulnerable zones of your system.</li> </ul> <p>4.&nbsp; During the scanning process, you can pause, resume or cancel the scan.</p> <p><strong>Note:</strong></p> <ul> <li>Suspend the scan: You can suspend the scan before the scan is complete.</li> <li>Resume the scan: After suspending the scan, you can choose to resume the suspended scan.</li> <li>Cancel the scan: Cancel the running scan.</li> </ul> <p>5.&nbsp; When you complete the scan, click <strong>Close</strong>.</p> <p><strong>Note:</strong> After completing the scan, the page will display the number of scanned files, elapsed time, and any detection items.</p> <p><strong>Add Scan Tasks</strong></p> <p>Configure and run customized on-demand scans through the Endpoint Security client as an administrator.</p> <p><strong>Procedures</strong></p> <p>1.&nbsp; Open Endpoint Security client.</p> <p>2.&nbsp; On the right side of the page, click the <strong>&or;</strong> icon. As an option box opens, then click <strong>Settings</strong>.</p> <p>3.&nbsp; Enter the <strong>Settings</strong> page and click <strong>Advanced Display</strong> behind the common settings.</p> <p>4.&nbsp; A drop-down option opens, click the <strong>Task</strong> under common settings.</p> <p>5.&nbsp; Select the task to be run and click <strong>Run Now</strong>.</p> <p><strong>Note:</strong> You can also add or copy tasks, and then run after adding or copying.</p> <p><strong>View Event Log</strong></p> <p>Open Endpoint Security client and on the left to enter the <strong>Event Log</strong> page, click the <strong>Event Log</strong>. You can choose to display all events, or you can filter by severity or filter events by module. The event logs filtered by the search criteria will be displayed on the page. Clicking on an event log will also display the specific information of the event log.</p> <p>&nbsp;</p> <p><strong>Manage Threat Protection</strong></p> <p><strong>Configuration item</strong></p> <p>Through threat protection, you can specify the items to be excluded to fine-tune the protection. For example, you may want to exclude certain file types to prevent the scanner from locking the database or files used by the server. The locked files may cause the database or server to malfunction or generate errors.</p> <p><strong>Description</strong></p> <p><strong>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>Description for using wildcards in exclusions</strong></p> <p>For files, folders, detection item names, and potentially harmful programs, you can use wildcard characters to represent the characters in the exclusions. The following table describes the names of wildcard characters and their meaning.</p> <table border="1" cellpadding="0" cellspacing="0" style="width:0px"> <tbody> <tr> <td style="vertical-align:top"> <p><strong>Wildcard</strong></p> </td> <td style="vertical-align:top"> <p><strong>Name</strong></p> </td> <td style="vertical-align:top"> <p><strong>Description</strong></p> </td> </tr> <tr> <td style="vertical-align:top"> <p>?</p> </td> <td style="vertical-align:top"> <p>Question mark</p> </td> <td style="vertical-align:top"> <p>Single character.</p> <p>This wildcard is only applicable when the number of characters matches the length of the file or folder name. For Example: Exclusion W ?? will exclude</p> <p>WWW, but does not exclude WW or WWWW.</p> </td> </tr> <tr> <td style="vertical-align:top"> <p>*</p> </td> <td style="vertical-align:top"> <p>Asterisk</p> </td> <td style="vertical-align:top"> <p>Multiple characters, exclude the backslash (\).</p> <p>*\At the beginning of the file path is invalid. Please use **\instead.</p> <p>For example: **\ABC\*.</p> </td> </tr> <tr> <td style="vertical-align:top"> <p>**</p> </td> <td style="vertical-align:top"> <p>Two asterisks</p> </td> <td style="vertical-align:top"> <p>Zero or more arbitrary characters, including backslashes (\).</p> <p>This wildcard matches zero or more characters.</p> <p>For example, C:\ABC\**\XYZ matches C:\ABC\DEF\XYZ and C: \ ABC\XYZ.</p> </td> </tr> </tbody> </table> <p><strong>2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>Description for using root level exclusions</strong></p> <p>Threat protection requires absolute path of root level exclusions. This means that you cannot use the wildcard character\or?:\at the beginning, otherwise you cannot match the root-level drive name. With threat protection, you can use the leading wildcard **\in root-level exclusions to match drives and sub-folders.</p> <p>For example, **\test matches the following:</p> <p>C:\test</p> <p>D:\test</p> <p>C:\temp\test</p> <p>D:\foo\test</p> <p><strong>Procedures</strong></p> <p>1.&nbsp; Open Endpoint Security client.</p> <p>2.&nbsp; On the right side of the page, click the <strong>&or;</strong> icon. As an option box opens, then click <strong>Settings</strong>.</p> <p>3.&nbsp; Enter the <strong>Settings</strong> page and click <strong>Advanced Display</strong> behind the common settings.</p> <p>4.&nbsp; Click <strong>Access Protection</strong> under <strong>Threat Protection</strong> and click <strong>Add</strong> under the Exclusions on the right.</p> <p>5.&nbsp; Enter the relevant information and click <strong>Save</strong>.</p> <p><strong>Note:</strong> Enter the <strong>File Name or Folder Path</strong> to be excluded under file name or path.</p>
Did the above content solve your problem? Yes No
Please complete information!

Call us

400-151-8800

Email us

cloud@pingan.com

Online customer service

Instant reply

Technical Support

cloud products