Installation

Here you will find all the important information about the installation and configuration for ICS Advanced Security.

Connect for demo of ICS Advance Security for 15 days

REQUIREMENTS ON THE SERVER :

  • ICS Advanced Security can only work on 32 and 64-bit editions of OS servers.

REQUIREMENTS ON THE “CLIENT” SITE

  • ICS Advanced Security is compatible with the following OS:
    • Windows 7 SP1
    • Windows 8.1
    • Windows 10
    • Windows Server 2008 R2 SP1
    • Windows Server 2012 / 2012 R2
    • Windows Server 2016
    • Windows Server 2019
  • The required framework is .NET version 3.5.

INSTALL ICS ADVANCED SECURITY

Installing ICS Advanced Security is an easy process. Just download it from our website, run the Setup-ICS-Security.exe and follow the simple installation steps.

After the installation, there will be a new icon on your Desktop. You can now use ICS Advanced Security and begin to set security features to prevent your server from both internal and external threats !

THE ADMIN TOOL

Start the Admin Tool for ICS Advanced Security by clicking on the Desktop icon.

The dashboard proposes an immediate access to the five last security events. There are several options on the main window, each option giving you access to the various parameters and settings. Moreover, the version option allows administrators to directly run a System Audit, update ICS Advanced Security to the latest version and check the Changelog.

ADD AND MANAGE USERS AND GROUPS

  • You can switch view from the Default view to the Advanced View using the “Switch View” button.
  • The Advanced view is used to display and manage every current configured user and groups.
  • Add new user and group to the list and configure them, using the windows AD search picker. You can do so by clicking on the “Add user/group” button.
  • You will then be able to add any user available from any accessible domains from your server.
  • The Advanced View is available on the Permissions, Working Hours and Secure Desktops features.

USERS WHITELIST

  • The Users Whitelist tab gives the Administrator the possibility to add/remove users from the whitelist.
  • Users on the whitelist are ignored by ICS Advanced Security and the user who downloaded ICS Advanced Security is automatically added to the Whitelist.

PROGRAMS WHITELIST

  • On the Programs tab, you can add programs to the list of allowed programs. They won’t be checked by the Ransomware Protection.
  • By default, all Microsoft programs are whitelisted.

CONFIGURE ADVANCED SETTINGS FOR THE BEST LEVEL OF PROTECTION

On the Advanced tab, experienced Network Admins can configure advanced-security settings.

Backup/Restore data and settings in a secure and private database; deactivate the Windows firewall to use the ICS Advanced Security built-in firewall; enable/disable service and functionalities logs; and many others customization options!

Book Your Free Demo Cloud
=
This website uses cookies to ensure that you get the best experience.
Learn More
Fill Your Requirements Here
=
Sky Rocket Your Agency Income
Get Our Free Guide to