This article will guide you through the first steps you need to take in order to fully benefit from the protection provided by your G DATA Business solution.
The Registration Process: When you first purchase a G DATA license, you receive a Registration Number.
Your license is inactive until you use this Registration Number to activate your G DATA Management Server.
This step is called the Registration Process.
After registration, you will receive a set of Login Credentials (User Name and Password) and you will need to use those to reactivate the program if you have reinstalled it.
If you have lost your Login Credentials, check the following article:
How to find your Login Credentials for G DATA Business
To learn how to install and activate your G DATA Management Server for the first time using your Registration Number, check the following article:
How to install and activate your G DATA Business product (Using your Registration Number)
To learn how to install and activate your G DATA Management Server using your Login Credentials, check the following article:
How to install and activate your G DATA Business product (Using your Login Credentials)
To learn how to activate your G DATA Management Server if it is already installed, check the following article:
How to reactivate an already installed G DATA Business program
The next step is to install the antivirus client program. This is called the G DATA Security Client.
This program has to be installed on each one of your client computers and also on your ManagementServer.
To learn how to install the Security Client on various operating systems, check the following articles:
How to install the G DATA Security Client
Once the product is installed, it is recommended to update it.
To following article will guide you through the different update options:
How to update the virus definitions and program files of G DATA Business
If you have also purchased the Mailsecurity module, you can learn how to install and configure it by reading the following articles:
How to install G DATA Mail Security
How to configure the G DATA Mail Security Gateway
You can now enjoy all of the benefits provided to you by your G DATA Business solution.
If you wish to have additional, in-depth information about the different components of our Business solutions, as well as additional tips regarding the deployment and administration, check our Reference Guide.
Click here to download the latest version of our Reference Guide