©Copyright 2014 ProDot Marketing Pvt. Ltd. All Rights Reserved All rights reserved by ProDot Marketing Pvt. Ltd (PMPL). No part of this software may be reproduced, duplicated or modified in any form or incorporated into any information retrieval system, electronic or any other or transmitted in any form without prior permission of PMPL, ProDot House, A-70, Wazirpur Group Industrial Area, Delhi-110052, India. Trademarks ProDot Antivirus and ProDot Maximum Security are registered trademarks of PMPL. Microsoft, MSN, Windows and Windows Logo are trademarks of Microsoft Corporation. All brand names and product names used in this manual may be trademarks or trade names of their respective companies. i ProDot Maximum Security End User License Agreement IMPORTANT: THE FOLLOWING AGREEMENT (“AGREEMENT”) SETS FORTH THE TERMS AND CONDITIONS UNDER WHICH PRODOT MARKETING PVT. LTD. (PRODOT COPYRIGHT HOLDER) IS WILLING TO LICENSE THE “SOFTWARE” AND ACCOMPANYING “DOCUMENTATION” TO “YOU” AS AN INDIVIDUAL USER OR AN AUTHORIZED REPRESENTATIVE OF AN ENTITY. BY ACCEPTING THIS AGREEMENT, YOU ARE ENTERING INTO A BINDING LEGAL CONTRACT WITH PRODOT MARKETING PVT LTD. (PMPL). THE TERMS AND CONDITIONS OF THE AGREEMENT THEN APPLY TO YOUR USE OF THE SOFTWARE AND SUBSCRIPTION SERVICES. PLEASE PRINT THIS AGREEMENT FOR YOUR RECORDS AND SAVE A COPY ELECTRONICALLY. You must read and accept this Agreement before you install or use the Software. If you are an individual, then you must be at least 18 years old and have attained the age of majority in the state, province or country where you live to enter into this Agreement. If you are acquiring the Software on behalf of an entity, then you must be properly authorized to represent that entity and to accept this Agreement on its behalf. If you are downloading or activating the Software for trial purposes or purchasing a license to the Software, you accept this Agreement by selecting the “I Accept the terms in the license agreement” button or box provided. If you or the entity you represent does not agree to the terms of this Agreement, select “I do not accept”. Then no Agreement will be formed and you will not be permitted to evaluate, purchase or install and use the Software. If you purchased the Software from a retail store and do not accept the Agreement, you may return the Software in its original package with the purchase receipt to the retail store where purchased within thirty (30) days of purchase for a refund less any restocking fees. 1. APPLICABLE AGREEMENT AND TERMS. This Agreement applies to ProDot Antivirus (“Software”). When installing the Software, you may be prompted to accept the same or another version of PMPL’s license terms; the terms of the first agreement you accept will apply to your use of the Software. All rights in this Agreement are subject to your acceptance of this Agreement. Paid licenses: If you have purchased a license to the Software, Sections 1, 2 and 4 through 24 of this Agreement apply to you. Trial license: If you have not purchased a license to the Software and are installing the Software for trial or evaluation purposes,you are a “trial user” and Sections 1, 3 and 19 through 24 of this Agreement apply to you. 2. PAID USE LICENSE. For each license purchased, PMPL grants you a non-exclusive, non-transferable, no assignable right to install and use the Software on no more than the maximum number of client, personal or handheld computers (each a “Computer”) for which license fees have been paid as specified on your invoice, receipt, order confirmation, or other purchase documentation. Product licenses for home use must be used by end users in the same household. License fees must be paid for each Computer on which the Software is installed, provided that it may only be installed on one operating system per Computer. 3. TRIAL USE LICENSE. If you are a trial user, PMPL grants you the right to download, install and use one (1) copy of the Software on a Computer during your Subscription Term as defined in Section 7 below. At the end of your Subscription Term, this Agreement expires automatically. You may purchase a paid license to the Software by selecting the ‘Order’ option in the Software. TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, SOFTWARE AND RELATED DOCUMENTATION USED FOR TRIAL PURPOSES ARE PROVIDED “AS IS” WITHOUT PERFORMANCE PROMISES (“WARRANTIES”) OF ANY KIND. 4. UPDATES. The Software requires Updates to work effectively. “Updates” are new patterns, definitions or rules for the Software’s security components and minor enhancements to the Software and accompanying documentation. Updates are only available for download and use during your Subscription Term as defined in Section 7 below. Upon download, Updates become “Software” for the purposes of this Agreement. Updates may require additional or different license terms that must be accepted before download. Updates will replace previously licensed parts of the Software, but will not increase the authorized number of Computers or registered users. 5. SOFTWARE ACTIVATION/REGISTRATION. To receive Updates and other available “Subscription Services” set forth in Section 8, you must activate the Software and/or register with PMPL. These controls help ensure that the Software operates only on validly licensed Computers and that validly licensed end users receive applicable Subscription Services. Registration requires a valid product serial number and a valid email address for renewal and other legal notices. 6. INFORMATION COLLECTION. In addition to product registration information, PMPL must process and store certain information about your network and equipment to provide Subscription Services and related support services. To improve its products, PMPL may also upload information periodically from installed Software about product usage, detected malware or potentially unwanted files and use Service traffic to improve its data bases and develop or improve its services as effectively as possible. PMPL products are not designed to capture or retain any personal or private information. You agree that PMPL may (i) use uploaded data from installed Software to improve products and services; (ii) share data that has been identified as malicious or unwanted content with worldwide affiliates and security partners; and (iii) use and disclose uploaded data for analysis or reporting purposes only if any such use, sharing or disclosure does not identify you or include any information that can be used to identify any individual person. PMPL reserves the title, ownership and all rights and interests to any intellectual property or work product resulting from its use and analysis of such information. 7. SUBSCRIPTION TERM. For paid licenses: The “Subscription Term” for paid licenses starts on the date you receive the product serial number and ii ends 12, 24 or 36 months later, depending on the number of subscription months purchased. Note that secondary licenses expire on the same date as the primary license regardless of the date of activation of the secondary license. You must purchase a Software upgrade or renew the Subscription Term for your product serial number to continue receiving applicable Subscription Services after the Subscription Term. Software upgrades and Subscription Term renewals may require additional or different license terms. For trial use: The “Subscription Term” for trial use starts on the date you receive the product serial number and ends 15, 30 or 45 days later, depending on the stated or authorized trial period. 8. SUBSCRIPTION SERVICES. A. Updates. During the Subscription Term, registered and trial users are entitled to Updates for use with the Software on each licensed Computer. B. Technical support. During the Subscription Term, registered, validly licensed and trial users are entitled to email, telephonic and web-based technical support during business hours but only in certain limited languages. The availing of this support will be solely at your discretion and you are solely responsible to take back up of the existing data/software/programs in your computer before availing such a support. PMPL will not be held responsible for any loss of data, any kind of direct/ indirect/ consequential loss or damage to data/property arising during this entire process. If at any point of time the Technical Support team is of the opinion that it is beyond their scope, it will be the sole discretion of PMPL to suspend, cease, terminate or refuse such support as PMPL does not claim any warranty and/or guarantee of any kind in providing the support feature. 9. USE RESTRICTIONS. The Software is licensed not sold. PMPL owns the title, copyright and the trade secret, patent rights and other intellectual property rights in the Software and the copyright in the documentation, and reserves all rights not expressly granted to you in this Agreement. You agree that you will not rent, loan, lease or sublicense the Software, use components of the Software separately or use the Software to provide services to others. You also agree not to attempt to reverse engineer, decompile, modify, translate, disassemble, discover the source code of, or create derivative works from, any part of the Software. You also agree not to authorize others to undertake any of these prohibited acts. 10. LIMITED LIABILITY. A. SUBJECT TO SECTION 10(B) BELOW AND TO THE EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL PMPL OR ITS SUPPLIERS BE LIABLE TO YOU (i) FOR ANY LOSSES WHICH WERE NOT REASONABLY FORSEEABLE AT THE TIME OF ENTERING INTO THIS AGREEMENT OR (ii) FOR ANY CONSEQUENTIAL, SPECIAL, INCIDENTAL OR INDIRECT DAMAGES OF ANY KIND OR FOR LOST OR CORRUPTED DATA OR MEMORY, SYSTEM CRASH, DISK/SYSTEM DAMAGE, LOST PROFITS OR SAVINGS, OR LOSS OF BUSINESS, ARISING OUT OF OR RELATED TO THIS AGREEMENT OR THE SOFTWARE OR SUBSCRIPTION SERVICES. THESE LIMITATIONS APPLY EVEN IF PMPL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES AND REGARDLESS OF THE FORM OF ACTION, WHETHER FOR BREACH OF CONTRACT, NEGLIGENCE, STRICT PRODUCT LIABILITY OR ANY OTHER CAUSE OF ACTION OR THEORY OF LIABILITY. B. SECTION 10(A) DOES NOT SEEK TO LIMIT OR EXCLUDE THE LIABILITY OF PMPL OR ITS SUPPLIERS IN THE EVENT OF DEATH OR PERSONAL INJURY CAUSED BY ITS NEGLIGENCE OR FOR FRAUD OR FOR ANY OTHER LIABILITY FOR WHICH IT IS NOT PERMITTED BY LAW TO EXCLUDE. C. SUBJECT TO SECTIONS 10(A) AND 10(B) ABOVE, IN NO EVENT WILL THE AGGREGATE LIABILITY OF PMPL OR ITS SUPPLIERS FOR ANY CLAIM, WHETHER FOR BREACH OF CONTRACT, NEGLIGENCE, STRICT PRODUCT LIABILITY OR ANY OTHER CAUSE OF ACTION OR THEORY OF LIABILITY, EXCEED THE SOFTWARE LICENCE AND SUBSCRIPTION SERVICE FEES PAID OR OWED BY YOU. D. THE LIMITATIONS OF LIABILITY IN THIS SECTION 10 ARE BASED ON THE FACT THAT CUSTOMERS USE THEIR COMPUTERS FOR DIFFERENT HOME AND BUSINESS PURPOSES. THEREFORE, ONLY YOU CAN IMPLEMENT BACK-UP PLANS AND SAFEGUARDS APPROPRIATE TO YOUR NEEDS IN THE EVENT AN ERROR IN THE SOFTWARE OR SERVICES CAUSES COMPUTER PROBLEMS AND RELATED DATA LOSSES. FOR THESE BUSINESS REASONS, YOU AGREE TO THE LIMITATIONS OF LIABILITY IN THIS SECTION 10 AND ACKNOWLEDGE THAT WITHOUT YOUR AGREEMENT TO THIS PROVISION, THE FEES CHARGED FOR THE SOFTWARE AND SUBSCRIPTION SERVICES WOULD BE HIGHER. 11. LIMITED WARRANTY. PMPL warrants that the Software will perform substantially in accordance with the accompanying documentation for 30 days from the date of purchase, also PMPL warrants to the original Licensee only, that the disk(s) on which the software is recorded is free from defects in the materials and workmanship under normal use and service for a period of thirty (30) days from the date of payment as evidenced by a copy of the Receipt. PMPL’s only obligation under this Agreement is, at PMPL’s option, to either (a) return payment as evidenced by a copy of the Receipt or (b) replace the disk that does not meet PMPL’s limited warranty and which is returned to PMPL with the copy of the Receipt. PMPL does not warrant that the Software will meet your requirements or that your use of the Software will be uninterrupted or error-free. GIVEN THE NATURE AND VOLUME OF MALICIOUS AND UNWANTED ELECTRONIC CONTENT, PMPL DOES NOT WARRANT THAT THE SOFTWARE OR UPDATES ARE COMPLETE OR ACCURATE OR THAT THEY DETECT, REMOVE OR CLEAN ALL, OR ONLY, MALICIOUS OR UNWANTED APPLICATIONS AND FILES. SEE SECTION 15 FOR ADDITIONAL RIGHTS YOU MAY HAVE. 12 REMEDIES. If the Software does not conform to the limited warranty in Section 11 above (“Limited Warranty”), PMPL will (a) correct the error with an Update; (b) help you workaround the error; or (c) refund the cost of the Software. THIS LIMITED WARRANTY IS VOID IF THE SOFTW ARE ERROR IS THE RESULT OF ACCIDENT, ABUSE, ALTERATION, OR MISUSE OF THE SOFTWARE OR PROBLEMS OR ERRORS RESULTING FROM THE USE OF THE SOFTWARE WITH PROGRAMS THAT HAVE SIMILAR FUNCTIONS OR FEATURES OR ARE INCOMPATIBLE WITH THE SOFTWARE. PMPL WILL WARRANT REPLACEMENT SOFTWARE OR UPDATES FOR THE REMAINDER OF THE ORIGINAL LIMITED WARRANTY PERIOD. THIS SECTION STATES PMPL’S ENTIRE LIABILITY AND YOUR SOLE REMEDY FOR ANY ERRORS IN THE SOFTWARE. iii 13. NO OTHER WARRANTIES OR REMEDIES. EXCEPT FOR THE EXPRESS LIMITED WARRANTY IN SECTION 11, THE TERMS OF THIS AGREEMENT ARE IN LIEU OF ALL WARRANTIES, (EXPRESS OR IMPLIED),CONDITIONS, UNDERTAKINGS, TERMS AND OBLIGATIONS IMPLIED BY STATUTE, COMMON LAW, TRADE USAGE, COURSE OF DEALING OR OTHERWISE, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS, ALL OF WHICH ARE HEREBY EXCLUDED TO THE FULLEST EXTENT PERMITTED BY LAW. ANY IMPLIED WARRANTIES RELATING TO THE SOFTWARE WHICH CANNOT BE DISCLAIMED SHALL BE LIMITED TO 30 DAYS (OR THE MINIMUM LEGAL REQUIREMENT) FROM THE DATE YOU ACQUIRE THE SOFTWARE. 14. CONSUMER PROTECTION. SOME COUNTRIES, STATES AND PROVINCES, INCLUDING MEMBER STATES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW CERTAIN EXCLUSIONS OR LIMITATIONS OF LIABILITY, SO THE ABOVE EXCLUSION OR LIMITATION OF LIABILITIES AND DISCLAIMERS OF WARRANTIES (SECTIONS 10 AND 11) MAY NOT FULLY APPLY TO YOU. YOU MAY HAVE ADDITIONAL RIGHTS AND REMEDIES. SUCH POSSIBLE RIGHTS OR REMEDIES, IF ANY, SHALL NOT BE AFFECTED BY THIS AGREEMENT. 15. CONSENT TO ELECTRONIC COMMUNICATIONS. PMPL may be required to send you legal notices and other communications about the Software and Subscription Services or our use of the information you provide us (“Communications”). PMPL will send Communications via in-product notices or via email to your registered email address, or will post Communications on its Sites. By accepting this Agreement, you consent to receive all Communications through these electronic means only and acknowledge and demonstrate that you can access Communications on Sites. If you are a secondary user (see Section 20 below), you also consent to receiving all Communications through the primary user. 16. CONFIDENTIALITY. You acknowledge that product serial numbers have potential value to others. Therefore, you agree to treat them as confidential, to use them only to register your Software in compliance with this Agreement and not to disclose or otherwise make them available to any other person except as authorized in Sections 19 and 20 below. 17. BACK-UP. For as long as you use the Software, you agree regularly to back-up your Computer programs and files (“Data”) on a separate media. You acknowledge that the failure to do so may cause you to lose Data in the event that any error in the Software causes Computer problems, and that PMPL is not responsible for any such Data loss. 18. AUDIT. For Entity licenses only: Upon reasonable notice and during regular business hours, PMPL shall have the right to audit your use of the Software to verify compliance with this Agreement. If the audit reveals unlicensed Computers, you or the entity you represent agree to pa y PMPL fees for unlicensed Computers at then current rates within fifteen (15) days of notice. 19. PRIMARY USER. For Household licenses only: If you register first, you are the primary user and are responsible for all use of the Software under the product license. You control the confidentiality and use of the product serial number and have the right to share it only with other end users in your household. You will serve as contact for legal and other notices and are responsible for giving PMPL an accurate and current email address for such purposes. You are also responsible for sharing Communications (defined in Section 15 above) with secondary users. 20. SECONDARY USERS. For Household licenses only: If you were not the first user to register, then you are a secondary user and the primary user has control over your use of the Software and the Subscription Term. The primary user will receive all legal and other Communications (defined in Section 15 above) on your behalf. As a secondary user, you are authorized to use the product serial number to install the product. As a secondary user, all sections of this Agreement, except for Sections 3 and 19 apply to you. 21. TERMINATION. PMPL may terminate your rights under this Agreement immediately and without notice if you fail to comply with any material term or condition of this Agreement or no longer consent to electronic Communications. You have the right to appeal any such termination by contacting your local PMPL office which will provide you with the details of the appeals process. Upon such termination, you agree to destroy all copies of the Software. You may terminate this Agreement at any point by destroying all copies of the Software. Sections 1 through 4 and 10 through 23 survive any termination of the Agreement. 22. GENERAL. This Agreement and specifications regarding number of Computers and Subscription Term constitute the entire agreement between you and PMPL. Unless the Software is subject to an existing, written contract signed by PMPL, this Agreement supersedes any prior agreement or understanding, whether written or oral, relating to the subject matter of this Agreement. In the event that any provision of this Agreement is found invalid, that finding will not affect the validity of the remaining parts of this Agreement. PMPL may assign or subcontract some or all of its obligations under this Agreement to qualified third parties or its affiliates and/or subsidiaries, provided that no such assignment or subcontract shall relieve PMPL of its obligations under this Agreement. 23. QUESTIONS. If you have a question about the Software, visit: www.prodotgroup.com . Direct all questions about this Agreement to: avr.support@prodotgroup.com. 24. THIRD PARTY WEBSITE LINKS. At some point the software product includes links to third party sites; you may link to such third party websites as the user of this software. The third party sites are not under the control of PMPL and PMPL is not responsible for the contents of any third party website, any links contained in the third party websites. PMPL is providing these links to third party websites to you only as a convenience and is not responsible for any kind of loss/ damage arising out of it. THE SOFTWARE IS PROTECTED BY INTELLECTUAL PROPERTY LAWS AND INTERNATIONAL TREATY PROVISIONS. UNAUTHORIZED REPRODUCTION OR DISTRIBUTION IS SUBJECT TO CIVIL AND CRIMINAL PENALTIE iv Table of contents: a. b. c. d. Preface Prerequisites System requirements ProDot Maximum Security salient features i. Auto Rootkit Scan ii. Boot time scanning iii. Email Scanner iv. Heuristic Analyzer v. ProDot Live CD e. Installing ProDot Maximum Security f. Activating your product i. Online activation ii. Offline activation g. Using ProDot Maximum Security i. Scan 1. Quick Scan 2. Full Scan 3. Custom Scan ii. System status iii. Real-time protection/ Patrol iv. Threats 1. Active threats 2. Quarantine 3. Exclusions v. Firewall 1. Program Rules 2. System Rules 3. Web Filter Rules vi. Tools 1. Utilities a. Startup Manager b. Task Manager c. Advanced Utilities i. Parental Control ii. System Cleaner iii. Password Manager iv. Duplicate File finder v. File Shredder vi. Virtual keyboard Page 1 2 3 4 5 6-7 8-18 v 2. Settings 3. Scheduler 4. Feedback vii. Settings 1. General settings 2. User interaction settings 3. Alerts viii. Updates 1. Online updates 2. Offline updates ix. License x. Support h. Uninstalling ProDot Maximum Security i. Technical Support j. Troubleshooting 18 19 20 vi Preface What is a Virus? Virus is a small piece of computer software designed deliberately to infect or harm your computer. Generally, viruses remain undetected for longer time span and programmed to damage, erase or share confidential computer data. Virus usually spreads through human action and continues spreading from infected PC through sharing files via CDs, USBs, email attachments etc. A virus infection affects your PC in one or multiple of following ways – Computer becomes slow and hangs frequently Computer starts behaving strangely like unexpected notifications, error messages, and unusual pop-ups etc. Strange emails are sent without your knowledge Confidential data saved on your computer is shared by third party users or hackers Types of Computer infections / Viruses 1. 2. Malware – Malicious software installed without consent of users to perform unauthorized actions Worm – Standalone malicious software replicates itself without any human interaction and it usually spreads through computer networks 3. Trojan Horses – It allows remote access to hackers so that they can steal or use your confidential data and converts your machine into spam distribution computer 4. Key logger – it keeps complete record of each and every key pressed by the user to crack difficult password quickly 5. Spyware – it collects secret information from your computer that is directly sent to third party users and hackers 6. Adware – Advertising supporting software presents unwanted advertisement to users and also changes users’ homepage without their permission. 7. Rootkit – This is a secret computer program that provides administrator level access to hackers that can result into stealing or altering valued data stored in your PC 8. Phishing – This is an internet fraud that usually redirects users to a fake web page and usually asks for confidential data from them. 9. Pharming – This is again an online fraud redirects user to bogus sites even if he has typed the correct web URL. 10. Ransomware – This is a malicious software that demands ransom from users for its restoration 11. Man-in-the-middle-attack / Man-in-the-browser-attack – This is a computer threats capable of stealing any type of financial information from your computer. What is ProDot Maximum Security and why do I need it for my computer? PMS (ProDot Maximum Security) antivirus software is a computer program designed wisely to protect your computer against all computer virus or infections discussed earlier that can make your PC sick. ProDot Maximum Security helps your computer to stay healthy and unaffected from unwanted computer threats. You just have to make sure that product version is up to date that is generally available through subscription. 1 Prerequisites The following should be taken care of before installing ProDot Maximum Security: The usage of this software product is subject to acceptance of End User License Agreement (EULA) provided inside the software, this manual and on our website http://www.prodotgroup.com. Uninstall any other anti-virus programs. Delete all files in the Windows Temporary (temp) folder (OPTIONAL). Check available hard disk space. Exit all programs before starting the installation. 2 Minimum System Requirements Processor: 1GHz or more RAM: 512 MB or more Hard disk space: Minimum 300 MB free space. CD/DVD ROM for installation through CD. Operating system: o Microsoft® Windows® 8/8.1 – Pro, Enterprise (32-Bit and 64-Bit) o Microsoft® Windows® 7 – Starter, Home Basic and Premium, Professional, Ultimate (32-Bit and 64-Bit) o Microsoft® Windows® Vista®- Home Basic and Premium, Business, Enterprise, Ultimate (32-Bit and 64Bit) o Microsoft® Windows® XP- Home, Professional SP2, SP3 (32-Bit and 64-Bit) + Some product features may not work if the Windows® Server has been assigned the roles of Web Server, Email Server, Proxy Server and/or Terminal Server. Windows Installer 3 to install product features. Internet connection is required for registrations and updates. .NET Framework 3.5 must be installed or some features might not work correctly. Email scanning is supported for any POP 3 (without SSL) and IMAP email clients. Fonts must be installed for Multilingual User Interface. 3 ProDot Maximum Security salient features Auto Root kit scan Root kit virus is a virus attachment to any file, folder, cracks, key gens and torrents which are downloaded from unknown sources. It works in your PC as an undercover (hidden) agent, programmed to modify the administrative rights to give backdoor access of your PC to the hacker through internet which can result into anything from stealing of valued information or data, malfunctioning, slow down to change in behavior of the PC in any manner etc. Auto Root kit scanner detects the entire root kit virus in real time protection so that no root kit virus infects your computer and data. It keeps your computer safe from unauthorized or backdoor access. Boot time scanning In our computer there are several essential files like boot files, windows system files and start up files which are responsible for computer booting and applications startup. The Maximum Security scans all these files during operating system booting quickly and efficiently to ensure that your operating system is virus free. Email scanner Email scanner checks all incoming and outgoing mails for malwares and any other threats enabling safe and secure email communication, so that you can communicate through mail securely. Note - Email scanning is supported for any POP 3 (without SSL) and IMAP email clients. Heuristic analyzer Heuristic analyzer is an advanced technology of virus detection which detects infections through the behavior of the files not by the database. It allows detecting objects which are suspicious and being infected by any unknown or new modification of known viruses. Files which are found by heuristic analyzer are considered to be probably infected. ProDot Live CD ProDot live CD can be used in the case of system failure i.e. if your system fails to boot because of infections. You can use the “Maximum Security installation CD” to boot a Linux OS and then you can perform scans on your hard disk. Clean the viruses detected by the program and then boot your system normally. Your system will boot if all the virus infected files have been cured. Apart from a good optimized engine it offers you silent real time protection, instant USB alert, Autorun protection as well as simple and user friendly interface with over 10 million virus signatures and definitions. 4 Installing ProDot Maximum Security Before you start installing ProDot Maximum Security please make sure you have been read out Minimum System Requirements and Prerequisites sections carefully. 1. Open the setup file (ProDotMaximumSecurity.exe) provided in the Maximum Security CD. You will see the ProDot Maximum Security Installer window, click ‘Next’ to Continue. 2. End user License Agreement (EULA) will be displayed on your screen. Read it carefully and tick ‘I Accept the terms in the license agreement’ and click ‘Next’ otherwise click ‘Cancel’ to exit setup. 3. Confirm that there is no other antivirus product installed then click ‘I am sure I don’t have any other antivirus installed’ and click ‘Next’. 4. A form appears and you will be required to fill in the customer information with correct details, then click ‘Next’. 5. Please wait while the installation procedure completes then click on ‘Finish’. 6. Now the installer will prompt you to restart your system, click ‘Yes’ to restart. It is recommended to restart your system after installation so that the antivirus can become fully functional. NOTE: To know more on installation or if you face any issue during installation, kindly refer to our troubleshooting guide provided at the end of this manual or contact our technical support team. 5 Activating your product Online activation a. Go to License tab & click on Activate button if you already have an activation code or click Order to buy a new one in case of renewals. b. Select “I have the activation code” on next window. 6 c. Enter your 32 digit activation code and press OK button. d. The program will now connect with server to verify the code. If the verification succeeds it will ask you to enter your first name, last name and email id to register your product. The details should be genuine for future updates and queries. e. Once you complete with the registration process your product will be activated. Offline activation You can activate your product even if you don’t have an active internet connection with the offline activation facility, for this purpose you need to have a “license key” that can be obtained through our technical support team by following below steps: a. For that first of all you need an “activation code” mentioned on your CD jacket/cover then you can contact our support team through toll free number or live chat option. b. Once you connect with any of our technical support representative please provide your email id along with the “activation code” to get the “License key” from us. c. As soon as you will receive “License key” on your email id you just need to copy and paste the complete string on the given space after choosing “I have the license key” option. d. Now press OK button to activate your product. 7 Using ProDot Maximum Security The main window of ProDot Maximum Security will appear like this: Scan ProDot Maximum Security carries three scan modes which are available in the main window: Quick, Full and Custom Scan. Each set is provided with certain parameters. Quick scan It involves scanning of the most critical areas like startup files, system memory, boot sectors etc. where viruses are most likely to infect. Quick Scan mode is useful in case you believe your system may be compromised. You just need to click on “Quick scan” button under “Scan” tab to perform the quick scan. NOTE: If you are not using Patrol function for some reasons, Quick Scan mode will be useful for regular periodic scanning, which you can configure to start automatically through “Scheduler” under “Tools” tab. Full scan A detailed scan which checks all drives, folders, & files including compressed files, connected storage files etc. for viruses. This may take some time depends on the size of your hard disk. We recommend you to do a full system scan at least once a week to keep your system healthy and free from viruses. You just need to click on “Full scan” button under “Scan” tab to perform a detailed scan of your computer and enhance the overall performance of your computer. 8 NOTE: You can also schedule a full system scan automatically through “Scheduler” under “Tools” tab according to your priority. Custom scan You can perform a customized scan of selected files and folders as defined by you. After the scan is complete you will receive a detailed report on its results: total time of scanning and detailed information about the number of tested and infected objects. You just need to click on “Custom scan” button under “Scan” tab and then you need to choose files and folders you want to scan under this option. System status ProDot Maximum Security automatically monitors the system status in terms of security and provides summarized information in the System Status window of the program. You will see the system status on the left hand side of the Maximum Security window. It provides the following information: i. Application Version- It explains about the version of the application which you are using. ii. Last Update- It shows when the last update was performed. iii. Patrol- It specifies if real-time protection is running. iv. Mail scanning- It shows the current status of mails scanning. v. USB-Protection- It specifies either automatic USB protection is active. vi. Firewall- It shows the current status of firewall. vii. WEB-filter- It specifies either your computer is protected against harmful websites. Real-time protection/Patrol The real-time protection system present in ProDot Maximum Security is known as “Patrol”. Patrol tracks running processes and active memory of the computer to detect viruses and other malicious programs "at the moment"; effectively blocking them even before they enter into the operating system or its files, in this way it ensures reliable prevention from infections. By default, the Patrol is automatically activated every time you start ProDot Maximum Security. This is a very important component of the software. Threats Threats, also known as computer viruses are small computer programs designed deliberately to breach the security of your system or to steal confidential computer data. 9 ProDot Maximum Security has an inbuilt mechanism for threat detection to perform optimal action over it. You can manually change the Maximum Security response to a particular threat through “User interaction options” under “Settings” tab otherwise we recommend you to stick to the default action. Here are three options available under “Threats” tab: •Active threats It includes the threats detected during previous scans and real-time protection. Immediate action should be taken against these threats otherwise they may harm your system. You can choose any of the action available for an infected file like “Cure”, “Quarantine”, “Delete”, “Exclude” and “Ignore”. •Quarantine The purpose of “Quarantine” is to hold threats unless any action is taken against them. “Quarantine” prevents execution of such files in order to protect your system but it does not delete them from your hard disk. You can choose any of the options available for Quarantined files like “Delete”, “Ignore” and “Restore”. •Exclusions ProDot Maximum Security allows you to exclude files and folders which you do not want the antivirus to scan. You can add any file or delete existing files by clicking on “Add” and “Remove” buttons. 10 Firewall Firewall is a gateway between the internal network (home or corporate network) and the internet. They are designed to filter out all unwanted data or “Packets” which may cause harm to your computer or network. ProDot Maximum Security firewall monitors internet traffic, automatically locks external attacks and protects system against malicious programs to take control over it. ProDot firewall can be configured manually also according to your needs. Various rules defined under ProDot Maximum Security firewall includes following: Program Rules Using these rules you can allow or block the programs installed in your system from accessing the internet. By default the firewall applies “Allow outgoing” rule for every application which accessing the internet but you can also select other options as well: 1) “Allow all” to give all the permissions to the particular application for internet access (outgoing and incoming both). 2) “Block all” to block the particular application for internet access (outgoing and incoming both). 3) “Custom” to configure any application access according to IP addresses and Port numbers. WARNING: Only modify these rules like “Block all” and “Custom” if you have thorough knowledge about them. System Rules These are the system networking rules for protocols and standard applications which allow them to interact with network services. You can “allow” or “block” any protocol according to your needs. WARNING: Only modify these rules if you have thorough knowledge about them. 11 Web-Filter Rules Here you can configure websites which can make modifications in your system. You can either allow them to make changes or block them. By clicking on “Add” button you can add any website or domain you want to block, you can block the whole site or only the content of the site. Tools Utilities “Utilities” are the special program that provides additional capabilities to the users, ProDot Maximum Security Utilities allow you to manage daily needs and also it helps in improving overall system performance. Startup Manager The startup manager is a utility using which you can configure the services and programs which start up when your PC starts. This can used to free up the RAM and increase the system’s start up speed. To use this utility click on “Tools” “Startup Manager” “Run”, here you can Add, Edit or Delete any startup service/element according to your needs. Task Manager Task manager is used to manage the applications running on your system. Here you can end the superfluous applications which aren’t required. This would free up your system’s RAM eventually increasing your system’s performance. To use this utility click on “Tools” “Task Manager” “Run”, here you can “End” any running task and “Terminate” any running process. 12 NOTE: In case your default Windows Startup Manager and Task Manager is not working then you can use ProDot Maximum Security Startup Manager and Task Manager to use prompt services. Advanced Utilities Setting your Utilities password (First Time Use) Click on “Parental Control” or “Password Manager”. Now click on ‘Click here for user registration’. On registration form enters your desired password and answers the security questions. Security questions are helpful in case of password recovery if you forget your password. Click OK after completing the process. Now you are ready to go. 13 Parental Control Using the parental control utility you can restrict the access of internet content. The primary purpose of this is to block websites. Using this utility you can only allow the specific internet content you want people to open on your computer. Mainly it would be used for keeping an eye on your children. Here we have three options available. To use Parental Control utility, click on Parental Control and enter your “Utilities password” to login in the utility. 1. Block by Category Here you have a set of categories provided. You can mark any of them to block the websites listed in that particular category. The Blocked category will turn red once blocked. The websites mentioned in that particular websites would be blocked. 2. Block Specific Website Here you can type in the name of a website to be blocked and add them to the blocked list. Enter the website name in the textbox and click “Block” to add it to blocked list. 3. Allowed Websites Here you can add websites which you do not want to block. All websites mentioned in the allowed list will be excluded from blocking. To allow a website enter the name of the website in the textbox and click “Allow” button. Parental Control Module Update We update our repository of websites regularly in order to ensure our category blocker has apt websites. So whenever we update our category the user gets a prompt for a new update whenever he/she logs into the parental module. Once you get a prompt click yes to download the new parental files or No terminate the prompt. NOTE: You need to have an internet connection to access this module. System Cleaner Using the system cleaner you can clean junk files and temporary traces in your PC and increase your systems speed. To configure the system cleaner use the “Settings” button to select the drives to be scanned. Once cleaner shows results click “Clean” button to clean the marked results. Click on the “Scan” button to start the system scan, the files can be cleaned once the scan is complete. NOTE: System cleaner will take time depending on the hard disk size. A larger hard disk will result in more system cleaner scan time. Password Manager Password manager is a repository to store your passwords at a safe location. Log into your password manager using your “Utilities password” and a new form will appear. The “Add” button will be used to add usernames and passwords to it. And the “Delete” button will be used to delete the passwords from it. NOTE: The login credentials you entered in the utility will be saved in an encrypted form so that any other third party user cannot access your usernames and passwords. In case you forget your “Utilities password” then refer to our troubleshooting guide provided at the end of this manual to know about password recovery process. 14 Duplicate File Finder Duplicate file finder is a utility to find duplicates on your system. This will help you to free up the hard disk by removing extraneous files. You have two options available a full system scan and particular folder scan. You can also select the type of files to be scanned. Once the scan is complete duplicates will be shown with the same color. You can mark the duplicates to be deleted and click the “Delete” button. First check a checkbox show in duplicate file finder, “Browse” a directory and click “Scan” to scan that particular directory. To perform a full system scan click “Full system scan” button after checking a checkbox. NOTE: Full system scan will be a lengthy scan and may take several minutes depending upon your hard disk size. File Shredder File Shredder is a utility used to securely delete a file leaving no scope for recovery of that particular file. You can use the “Add” button to add files to the shred list. On clicking the “Clean” button all files present in the Shred list will be shredded. Use “Remove” button to remove a particular file from the list and use “Clear” button to clear the list. NOTE: File Shredding is an irreversible process. Once done the file cannot be recovered by any means. Be very particular with your choices before shredding. Virtual Keyboard You can use the virtual keyboard to enter confidential information i.e. banking information, passwords etc. on your system so that your credentials remain safe from being compromised. You can use it by clicking on the “Start” button to start the Windows On screen keyboard. Settings In the “Settings” tab you can change the “language of the product”, turn on/off “Patrol” features, edit settings for “firewall”, “mail message scanning” and checking “Autorun for USB Drives”. Scheduler Using a scan scheduler you can “schedule” & “customize” your scans so that you don’t need to scan your computer manually every day. To use this you need to click on “Scheduler” under “Tools” tab and should “enable” the scheduler first, then you have to choose “edit settings” option where you can configure the scan to run automatically on scheduled time. Here you should enter “Scan type”, “How often to scan” and “Scan time”. At the end you have to click on “Apply” button to make the changes active. Feedback Using feedback tab you can “send a suspicious file” to our developers for its evaluation so that you can receive information about the particular file to take appropriate action over it. To use it you need to disable the “Patrol” under “Tools” “Settings” tab then you need to “browse” and “attach” the suspicious file and click on “Send” under “Tools” “Feedback” tab to send the file to our developers. 15 Settings Here you can modify Maximum Security settings. You have the following options available: General Settings Here you can edit the settings like “launch the Maximum Security on startup”, “turning off splash” (Maximum Security pop-up window on system startup), configuring the areas you want to scan. User interaction options Here you can edit settings like “On dangerous file detection” and “Firewall mode”. “On dangerous file detection” you can set the actions for infected files like Cure (notify in case of failure), Cure (quarantine is case of failure), Cure (delete in case of failure), Quarantine, Delete and Ignore. By default it will give you a notification on dangerous file detection. By default the “Firewall Mode” is set to Automatic but you can choose Interactive option if you want to configure it manually. Alert Here you can manage popups/notifications shown by Maximum Security. 16 Updates Updates are very important in order to keep your system safe. The program must be updated regularly as they provide up to date information on viruses, spywares and malwares etc. You can configure the updates to execute automatically through this window. WARNING: It is recommended to update your Maximum Security once a week if you choose to update it manually as an outdated database is ineffective against cyber threats. Online Updates As soon as your computer connect to the internet the Maximum Security will be updated automatically if “Antivirus database automatic update” and “Application automatic update” are set to “Enabled”. In case, you define any of the above or both options “Disabled” then you have to update it manually by clicking over “Update Now” button. Offline Updates If you don’t have any active internet connection on your computer and you want to update Maximum Security which is mandatory, then you need to access our website link: http://prodotgroup.com/ and go to Maximum Security page to download offline updates package. Now you have “.exe” file of virus databases, you need to run that “.exe” file on your computer where you are using ProDot Maximum Security and after completion your Maximum Security database will be updated. NOTE: The offline updated virus database will be active for 7 days only, after 7 days you have to update it again in order to keep your system safe. 17 License The License tab explains about the licensing detail of your product. It displays the “number of days left for the license to expire”, “name” & “e-mail” of the license owner, “license key”, “license type” and “expiry date”. NOTE: If your product isn’t activated then you can activate your license either online or offline with us. Support In the support tab you can contact us regarding any query which you encounter while using our product. You just have to enter your credentials along with your query description and send it to us. Uninstalling ProDot Maximum Security To uninstall the product select “ProDot Maximum Security” in Programs and Features and click on “Uninstall” and through “Start menu” you need to click on “Uninstall ProDot Maximum Security”. NOTE: After uninstalling it is mandatory to restart your computer to make the services changes active. 18 Technical Support ProDot provides comprehensive support to product users in variety of ways. Support options include web support, email support, phone support and live chat support. Let us go through several support options and learn about them in detail – Web Support Here you can you check our FAQ (Frequently Asked Questions) section or you can also submit your queries to us at our website - http://prodotgroup.com/ However, you are requested to read out FAQs section at least once before choosing other communication modes. It is possible that most of the time users find answers of their queries in FAQ section. Email Support The feature enables you to send your queries to ProDot technical experts and get quick response from our technical support team. Email ID – avr.support@prodotgroup.com Phone Support This feature enables you to call ProDot Technical expert and get immediate response from the Technical Support team. Toll free no: 1800 300 24200 Most appropriate time to call our expert team is: Monday to Saturday between 11:00 AM to 07:00 PM (Indian Standard Time) Live Chat Option The feature helps you to chat with ProDot experts live on our website – http://prodotgroup.com/ and fix your issues promptly. NOTE: Details those are necessary during call or live chat Activation code that is given at the CD cover/jacket or your email id through which you have registered your product. Information about your operating system like name, version and language. Details: When did the problem first appear, and what were you doing when the problem appeared? 19 Troubleshooting 1. I don’t have a CD-ROM. What do I do? o You can download ProDot Maximum Security setup through our website i.e http://www.prodotgroup.com 2. I put the ProDot Maximum Security CD in my CD-ROM but nothing happened. How do I install it? o After inserting the ProDot Maximum Security CD in the CD-ROM, double-click the My Computer icon. Locate the icon for the CD-ROM drive (generally it is drive “D:\”) then double-click on it. Double-click on the folder. Locate the Setup file and double-click on it, this will start the ProDot Maximum Security setup program. 3. What happens if my system stops responding/crashes while installing ProDot Maximum Security? o Reboot/Reset your system and try the installation again. If problem persists, contact our Technical support. 4. I don’t have an active internet connection, how do I register? o Internet is required for registration, but thankfully you can use some other PC which has active internet to register your product. For offline activation you need to have “License key”, to get the license key please contact our technical support and they will send the license key on any of your email. 5. I don’t have an active internet connection, how do I update my product? o Download the offline update pack from our site. But keep in mind, the update pack will become obsolete in a matter of days. 6. I have lost my Product key (which I suppose is still valid) and uninstalled ProDot Maximum Security as well but I want to install it again. What do I do now? o Contact Technical Support for further assistance. 7. ProDot Maximum Security was unable to delete a virus, what to do? o Sometimes you may need to reboot you PC in order to remove a virus completely; otherwise it will show itself again and again during scans. If you restart the computer and the problem still exists, please seek help from a technical support representative. 8. What to do when ProDot Maximum Security detects legitimate applications? o There is a possibility that ProDot Maximum Security will report a legitimate file as being infected. This is called a false positive and usually occurs when ProDot Maximum Security decides that the file behaves like a malware. You can report the file to us; we will fix this issue as soon as possible. 9. What should I do if I receive the error message “Update Failed”? o Verify that your license has not expired o Check your Internet connection o Try updating again o If problem persists, contact our technical support 10. What should I do if I forgot Utilities password? o You can change your password by simply clicking on “Forgot Password” button on the Parental Control or Password Manager utility tab. It will ask two “security questions”, once you succeeded you can set new password to use PMS utilities. In case, you forget the answers of security questions then contact our technical support team for further assistance. For more troubleshooting and tips, visit our website prodotgroup.com and refer to FAQ section. 20