Features
System Requirements
Flavor Comparison
  • Advanced Device Control*

    Controls and configures various device types for Windows and Mac platforms. Robust and flexible management options safeguard against unverified devices.

    Data Loss Prevention

    Stops data leakage by regulating transfer channels such as removable drives, network sharing, web apps and online services. Specific file types can be monitored and comprehensive reports can be scrutinized.

    File Activity Monitor*

    Provides a bird's eye view of all actions against confidential files to safeguard confidential company data. When a specified file is copied, renamed or deleted, a notification is sent to the administrator.

    Asset Management

    Gives administrators comprehensive knowledge about the hardware and software configuration of every endpoint. Notifications are sent to configured email addresses whenever any alteration to the hardware on any system takes place.

    New Dashboard

    The updated graphical dashboard provides a hub to monitor overall network health, security status and compliance degree. Gives clear visibility and control with comprehensive reports so that critical actions can be taken.

    License History

    Provides an instant glimpse into product license history. Administrators can gather details such as license activation, reactivation, license renewal and additional feature pack details.

    Redirection of Specific Groups/Clients

    Seamlessly redirects specific endpoint groups/clients to different servers. Enterprises with large numbers of endpoints, or low bandwidth, can easily migrate clients to a new server.

    IDS / IPS

    Advanced defense mechanism to detect and prevent malicious network activity that attempts to exploit software vulnerabilities of applications. Port scan attack prevention blocks intruder attempts aimed at open ports. DDoS attack prevention thwarts any Distributed Denial of Service (DDoS) attacks that might result in the denial of service.

    Intelligent Firewall

    Blocks unauthorized access to business network. Allows customization rules to be set to Low, Medium or High based on observed network traffic. Administrators can also configure exceptions for specific IP addresses or ports to be allowed or blocked.

    Easy Deployment and Maintenance

    Clients can now be flexibly deployed by the following multiple methods:

    Synchronization with Active Directory – Easy and hassle free deployment with full Active Directory integration and synchronization support.

    Disk Imaging – Creation of a disk image of Endpoint Security 6.0 client and deployment of it across the network.

    Remote Install – Installation via remote access of web console on any system in the network.

    Login Script Setup – Assigning login script for installation.

    Client Packager – Creation of client installer for manual setup.

    Notify Install – Installation via email notification (containing URL) for endpoint clients.

    Web Security

    Blocks malware infected, phishing and malicious websites from affecting the endpoint clients within the network.

    Web Filtering*

    Allows the blocking of particular categories of websites (e.g. Social Networking, Games, etc.) or individual user-specified websites to limit web access and increase productivity.

    Application Control*

    Categories of applications can be either authorized or unauthorized from being executed within the network. This feature also gives the flexibility to add custom applications to an existing blocked list.

    Scan

    This feature scans all the networked computers for viruses and malware from a central location. Customizable scans can also be scheduled for a specific date or time.

    Update

    Networked computers can be updated from a central location. Endpoints can also be configured to take updates at a specified time.

    Group Policy Management

    Different user groups within the network can be defined and flexible policies can be set accordingly.

    Email Scan*

    Effectively scans your end user inboxes for spam, phishing attacks and unsolicited email messages. Allows whitelists or blacklists and self-learning to be set up separately for each user or group.

    Multiple Update Managers

    This feature allows multiple update managers to be deployed across the network. This helps in load balancing and in avoiding network congestion as is usually the case for a single update manager.

    Email and SMS Notifications

    This feature sends notifications to preconfigured email addresses and phone numbers, thus alerting them about critical network events.

    Tuneup*

    This feature enhances the performance of computer systems in the network by cleaning junk files and deleting invalid registry/disk entries. Tuneups can also be scheduled for a specific date and time.

    Reports

    Gives the ability to drill down from high level to more in-depth reports. Provides a range of graphical and tabular reports, which can also be exported and saved in a variety of formats (e.g. PDF, CSV). Reporting can also be scheduled according to specific requirements.

    Vulnerability Scan

    This feature scans known vulnerabilities of installed applications and operating systems in the network. It helps frame security measures against known vulnerabilities and protects against security breaches by threat agents.

    Scans vulnerabilities in applications such as Adobe, Safari, Mozilla, Oracle, etc.

    Sends notifications regarding unpatched operating systems working on computers within the network.

     

    *Only available in Total flavor of Endpoint Security 6.0

    Data Loss Prevention feature is not available in Business or Total flavor by default. The feature is only available as an additional pack.

    For more details, please refer to product datasheet of Quick Heal Endpoint Security 6.0

  • Quick Heal Endpoint Security server can be installed on a system with any one of the following operating systems:

    • Microsoft Windows 2000 SP 4 Professional / Server / Advanced Server
    • Microsoft Windows XP Professional (32-bit/64-bit)
    • Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)
    • Microsoft Windows Vista Home Basic / Home Premium / Business / Enterprise / Ultimate (32-bit/64-bit)
    • Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)
    • Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
    • Microsoft Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
    • Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)
    • Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
    • Microsoft Windows SBS 2011 Standard / Essentials
    • Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
    • Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
    • Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)

    Minimum System Requirement for Console System

    • 1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium processor or equivalent
    • 1 GB of RAM
    • 4380 MB of free disk space
    • Monitor that supports 1024 x 768 resolution at 256 colors or later

    Additional Software Required for Console System

    Console needs to have web server services of either Microsoft IIS or Apache web server on the system.

    If Microsoft IIS is to be configured as web server, the version requirements are as follows:

    • IIS Version 5.0 on Windows 2000
    • IIS Version 5.1 on Windows XP
    • IIS Version 6.0 on Windows Server 2003
    • IIS Version 7.0 on Windows Vista and Windows Server 2008
    • IIS Version 7.5 on Windows 7 and Windows Server 2008 R2
    • IIS Version 8.0 on Windows 8 and Windows Server 2012
    • IIS Version 8.5 on Windows 8.1 and Windows Server 2012 R2

    If Apache is to be configured as web server, the version requirement is as follows:

    • Apache Web Server 2.0 or later

    Other essential configuration on Console system

    • Administrator or Domain Administrator access on the console system.
    • File and printer sharing for Microsoft Networks installed.
    • Transmission control Protocol/Internet Protocol (TCP/IP) support installed.
    • Internet Explorer Version 7, 8, 9, 10, or 11.

    Network Deployment Scenarios

    • If the network is configured using DHCP, the Endpoint Security server system on which Quick Heal Endpoint Security will be installed and the DHCP server system should be configured using a static IP address.
    • If Quick Heal Endpoint Security server is to be installed on a server with two network cards, and Quick Heal client agents are to be deployed on both the networks, then during installation of Quick Heal Endpoint Security server the administrator has to configure the Domain Name based on communication during installation.

    Endpoint side requirements

    Windows Workstations supported

    • Microsoft Windows 2000 SP-4 Professional / Server / Advanced Server
    • Microsoft Windows XP Home (32-bit) / Professional Edition (32-bit/64-bit)
    • Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)
    • Microsoft Windows Vista Home Basic / Home Premium / Ultimate / Business / Enterprise (32-bit/64-bit)
    • Microsoft Windows Server 2008 Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)
    • Microsoft Windows Server 2008 R2 Web / Standard / Enterprise / Datacenter (64-bit)
    • Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
    • Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)
    • Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
    • Microsoft Windows SBS 2011 Standard / Essentials
    • Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
    • Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
    • Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)

    Mac Workstations supported

    • Mac OS X 10.6, 10.7, 10.8, 10.9, 10.10

    Linux Workstations supported

    32-bit

    Supported Versions:

    • GNU C Library 2.11 and above

    Supported Distributions:

    • Red Hat Enterprise Linux 6.4
    • Fedora 12, 13, 14, 16, 17, 18, 19, 20
    • SUSE ES 11 SP2
    • openSUSE 11.3, 11.4, 12.1, 12.2, 12.3, 13.1
    • BOSS 4
    • Mandriva 2010.1, 2010.2, 2011
    • CentOS 6.4
    • Ubuntu 10.4 LTS, 10.10, 11.04, 11.10, 12.04 LTS, 12.10, 13.04, 13.10

    64-bit

    Supported Versions:

    • GNU C Library 2.5 and above.

    Supported Distributions:

    • Fedora 18, 19
    • openSUSE 12.1
    • Ubuntu 12.04.3 LTS, 13.04, 13.10
    • CentOS 6.2

    Minimum System Requirements for Windows Endpoint

    • 1 GB of RAM
    • 1800 MB of free disk space
    • 1 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista, Windows 2008 Server and Windows 7
    • For Windows 2000 – Service Pack 4 or later
    • Internet Explorer 5.5 or later
    • Administrative privilege is required for installation

    Minimum System Requirements for Mac Endpoint

    • 512 MB of RAM
    • 1200 MB free hard disk space
    • Mac Computer with Intel Processor

    Minimum System Requirements for Linux Endpoint

    • 1 GB hard disk space
    • 512 MB RAM or higher
    • Intel based processor (or compatible), 300 MHz or Higher
  • FeaturesQHEPS 6.0 - Business QHEPS 6.0 - Total
    IDS/IPS Protection
    Firewall Protection
    Phishing Protection
    Browsing Protection
    SMS Notification
    Vulnerability Scan
    Spam Protection  
    Web Filtering  
    Application Control  
    Advanced Device Control  
    PCTuner  
    File Activity Monitor  
    Asset Management
    Note : Data Loss Prevention feature is not available in Business or Total flavor by default. The feature is only available as an additional pack.



Share your feedback or suggestions for this website at webmaster@quickheal.com