Privacy policy for enterprise solutions

Page tree
Skip to end of metadata
Go to start of metadata
Client settings - General

The General tab allows you to configure general settings for the selected clients.

G DATA Security Client

The G DATA Security Client section covers basic client functionality.

  • Note: Enter any notes or remarks that apply to this client.
  • Tray icon: Choose when the client icon should be displayed in the system tray: Never, Display in first session only (for terminal servers and Windows Fast user switching) or Always display (in all sessions). If the icon is not displayed, the functionality of Security Client is severely limited (for example, Idle scan cannot be used and the user has no access to the Client functions).
  • Assigned to: By default, clients are assigned to the main ManagementServer. The dropdown list displays the main ManagementServer and its subnet servers and can be used to quickly assign a client to a specific (subnet) server.


The Updates section lets you define virus signature and program file update settings.

  • Update virus signatures automatically: Enables automatic updating of the virus signatures. At every synchronization interval the clients check whether new virus signatures exist on the G DATA ManagementServer. If new virus signatures are available, they are automatically installed on the client.
  • Update program files automatically: Enables automatic updating of the program files. At every synchronization interval the clients check whether updated program files exist on the G DATA ManagementServer. If updated program files are available, they are automatically installed on the client. A client reboot may be necessary after the update. Dependent on the setting under Reboot after update, the client user has the option of postponing the completion of the update.
  • Reboot after update: Select Open message box on client to inform a user that they should restart their client computer at a convenient time. Create report will create a report in the Security events module, or select Force reboot to automatically force a restart.
  • Participate in the Malware Information Initiative to improve detection rates: Enable participation in the Malware Information Initiative. The G DATA SecurityLabs continuously research new technologies to protect our customers against malware (viruses, worms and malicious programs). The more information is available, the higher the efficacy of the technologies. However, much information is available only on systems that have been attacked or infected. In order to include even such information in the analyses, the G DATA Malware Information Initiative was founded. In this context,  alware-related information is sent to the G DATA SecurityLabs.

Signature update settings

Define where clients obtain their virus signature updates:

  • Load signature updates from the ManagementServer: Clients will obtain virus signature updates from their ManagementServer. They will check for updates at every synchronization interval.
  • Load online signature updates independently: Clients will obtain updates from the central G DATA update servers. The update check can be scheduled under Settings and scheduling.
  • Load online signature updates independently, if no connection to the ManagementServer can be established: This option is recommended for mobile workstations such as laptops. When the client has a connection to the ManagementServer, it will download its updates from there. If there is no connection to the ManagementServer, the virus signatures are automatically downloaded from the G DATA update servers. The update check can be scheduled under Settings and scheduling.

Proxy server

Specify which proxy settings the client or group should use.

If enabled, the user can use their own proxy settings, but this should only be allowed in exceptional cases. Enabling the option may compromise the security of the client.

The proxy server can also be configured differently from the system-wide settings without applying the user's proxy settings.

Client functions

Under Client functions, you can set permissions for local users to change Security Client settings. User rights can be very extensive or restrictive, as your network policy demands.

  • Allow the user to run virus checks: In case of a suspected virus infection, the user can run a local virus check, independent of the ManagementServer schedule. Results of this virus check will be transferred to the ManagementServer during the synchronization. Additionally, this lets users change settings for local virus checks.
  • Allow the user to download signature updates: If you enable this function, the user of the client computer is allowed to download virus signatures over the Internet, without connecting to the ManagementServer. This is especially important if the client has a laptop that is often used outside the network perimeter.
  • Allow the user to change monitor options: If this function is enabled, the client user has the option to change the Monitor settings.
  • Allow the user to change email options: If this function is enabled, the client user has the option to change the Email and AntiSpam settings.
  • Allow the user to change web options: If this function is enabled, the client user has the option to change the Web settings.
  • Allow the user to display the local quarantine: If you allow the local quarantine to be displayed, the user can, if necessary, disinfect, delete or restore data that was moved into quarantine. In doing so, note that a virus is not removed by restoring a file from quarantine. This option should therefore only be made accessible to experienced users.
  • Protect client settings with a password: To prevent improper manipulation of local settings, there is the option of only permitting options to be changed when a password is entered. This allows you, for example, to prevent end users from changing settings. The password is set specifically for the selected client or group and it should only be shared with authorized users.

Scan jobs

You can define exceptions that are not to be checked during the execution of scan jobs. Archives and restore partitions, for example, can be defined as exception directories. You can also define file extensions as exceptions. Exceptions can be defined for complete groups. If the clients in a group have defined different exception directories, new directories can be added or existing ones can be deleted. The directories specially defined for individual clients are preserved. The same procedure also goes for monitor exceptions.

Idle scan

To allow the client to perform a virus scan when the computer is idle, tick Idle scan enabled. By clicking the Edit button, you can define the scan scope, which includes all local hard drives by default.

  • No labels