x
48-TIMMARSERBJUDANDE
Förnya nu och spara 50 %
om du redan är kund och
använder våra produkter
för hemanvändning.
FÖRNYA NU
x
48 TIMMARS ERBJUDANDE
50%
FÖRLÄNGNINGAR Endast privata användare
FÖRLÄNG MED RABATT
x
48 TIMMARS ERBJUDANDE
50%
FÖRLÄNGNINGAR Endast privata användare
x
EXKLUSIVT ERBJUDANDE
50%
FÖRLÄNGNINGAR Endast privata användare
FÖRLÄNG MED RABATT
x
SPECIAL OFFER
Förnya nu och spara 50 %
om du redan är kund och
använder våra produkter
för hemanvändning.
FÖRNYA NU
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
KÖP NU OCH FÅ 50% RABATT
x
SPECIAL OFFER
Köp det bästa antiviruset
till det bästa priset
KÖP NU OCH FÅ 50% RABATT
x
SPECIAL OFFER
Köp det bästa antiviruset
till det bästa priset
KÖP NU OCH FÅ 50% RABATT
x
SPECIAL OFFER
-50%
Köp det bästa antiviruset
till det bästa priset
KÖP NU OCH FÅ 50% RABATT
x
SPECIAL OFFER
-50%
Köp det bästa antiviruset
till det bästa priset
KÖP NU OCH FÅ 50% RABATT
x
SPECIAL OFFER
Köp det bästa antiviruset
till det bästa priset
KÖP NU OCH FÅ 50% RABATT
x
UPP TILL
−60 %
KÖP NU
x
UPP TILL
−60 %
KÖP NU

Hello!

You’re about to visit our web page in Svenska
Would you like to continue?

Yes, I want to visit the web page in Svenska No, I want to visit the web page in

If this is not what you’re looking for,

Visit our Welcome Page!

Tekniska Support

Behöver du hjälp?

 

What is the WiFi monitor included in Small Business Protection?

Informationen gäller för:

Produkter
Small Business Protection

The Wi-Fi monitor feature, available in Small Business Protection, displays the Wi-Fi networks that you are connected to as well as the devices that are connected to those Wi-Fi networks. This is particularly helpful to find out if someone is stealing your Wi-Fi connection.

If you are connected to multiple networks through different devices at the same time, it will show which devices are connected to each network.

Special requirements for Windows XP SP 2

There can be some limitations if your operating system is Windows XP SP 2. For more information, please refer to this Microsoft knowledge base article and download the necessary hotfix to resolve the issue.

Special requirements for Windows XP (regardless of the SP version)

To use the Wi-Fi monitor included in the version, make sure the Wireless Zero Configuration Service is running on your Windows XP. Bear in mind that some hardware manufacturers provide their own configuration software that replaces the Wireless Zero Configuration service that is provided in Windows. In that case, you won't be able to use the Wi-Fi monitor feature. For more information, please refer to this Microsoft knowledge base article.

Enabling the Wi-Fi monitor

To enable this protection, open Small Business Protection and click the Wi-Fi monitor widget.



You can also access it through the Start menu located in the main window too. As the Wi-Fi monitor is disabled by default, first you need to enable it by moving the switch to ON.

Here, you will find the information below:

  • Connected to: This section displays all the network information of the Wi-Fi networks that you are connected to, that is:

    • Router MAC address
    • Encryption type
    • Authentication
    • Signal strength
    If you are connected to more than one network, use the arrow on the right-hand side of the window to move from one pane to another.
  • Show devices connected to: This section displays information about the devices connected to your network. Remember that you must move to ON the switch next to the network that you have selected.

The information below is displayed for each device connected to the network:

  • Device IP address
  • Mac address
  • Manufacturer: The device manufacturer.
  • Date/Time
    The date and time when the Wi-Fi monitor first detected the connection.
Additionally, the following features have been included:

  • Wi-Fi auditing. Audits the Wi-Fi network searching for vulnerabilities, and provides recommendations to improve network security. This analysis checks the following aspects:
    • Network authentication and encryption.
    • Computer-to-computer connections (ad hoc network).
    • Connection mode.
    • Network name in order to avoid common names.
    • Signal strength.
    • Channel saturation.
  • Connection history. Find out which computers have connected to your network in the past, even though they may not be currently connected to your home network. This, again, helps identify possible intruders.
  • Ability to identify computers with an alias.
  • Ability to block unknown computers from accessing your computer.

Artikelnummer- 20151214 83005 EN

Har ditt problem lösts med hjälp av denna artikel?

JA NEJ

Tack för ditt svar


Hur skulle du förbättra denna artikel?




Vill du kontakta teknisk support?

ALLTID ONLINE, REDO ATT HJÄLPA TILL TWITTER FORUM BETYGSÄTT OSS
ALLTID ONLINE, REDO ATT HJÄLPA TILL TWITTER FORUM BETYGSÄTT OSS