Endpoint Security - Quickheal

Please contact us if you are interested.

View Cart

Endpoint Security Requirements

  • See below

Managing Endpoint Security for Complex Next-Gen Networks made Simple.

All new and intuitive web based user interface simplifies security management from a single console. 

  • Award winning Quick Heal client protection prevents malicious threats from entering endpoints.
  • Integrated multi-layered approach for securing applications and organizational data.

Features & Benefits:

  • Enhanced Graphical Dashboard
    • Advanced Graphical Dashboard gives immediate status of health of endpoints and highlights critical security situations that need immediate attention.
  • Easy deployment and maintenance
  • Multiple methods of deploying clients. Deployment methods include:
    • Synchronization with Active Directory - Easy and hassle free deployment with full active directory integration and synchronization support.
    • Disk Imaging – Creation of a disk image of Endpoint Security 5.3 client and deployment of it across the network.
    • Remote install – Installation via remote access of web console on any system in the network.
    • Login script setup – Assigning login script for installation.
    • Client Packager –Creation of client installer for manual set up.
    • Notify Install –Installation via email notification (containing URL) for endpoint client installation.
    • Advanced defense blocks malicious network activity and attempts to exploit software vulnerabilities of applications. Port scan attack prevention blocks intruder attempts aimed at open ports. DDOS attack prevention thwarts any Distributed Denial of Service attacks (DDOS) that might result in a Denial of Service (DOS).
  • Intelligent Firewall
    • Blocks unauthorized access to business network. Allows customization rules to be set to either low, medium or high based on observed network traffic. Admin can also configure exceptions for specific IP addresses or ports to be allowed or blocked.
  • Web Security
    • Blocks malware infected, phishing and malicious websites.
  • Web Filtering*
    • Allows blocking particular categories of websites (e.g. Social Networking, Games, etc.) or user-specified websites to limit web access and increase productivity.
  • Application Control*
    • Categories of applications can be either authorized or unauthorized from being executed in the network. This feature also gives the flexibility to add custom applications to existing blocked list.
  • Storage Device Control*
    • Prevents threats from the use of unauthorized devices and media (DVDs, CDs and USB devices). Allows policies to be set to give read only or complete access to USB devices and block DVDs/CDs. This robust feature also prevents data leak by making USB devices accessible only on systems within the organization's network.
  • Scan
    • This feature allows virus and malware scan of all networked computers from a central location. The scans can also be scheduled at a specific time.
  • Update
    • Networked computers can be updated from a central location. Endpoints can also be configured to take updates at a specified time.
  • Group Policy Management
    • Different user groups can be defined and policies can be set accordingly.
  • Email Scan*
    • Effectively scans your end-user inboxes for spam, phishing attacks and unsolicited e-mail messages. Allows White/black lists and self-learning to be set up separately for each user or group.
  • Multiple Update Managers
    • This feature allows deployment of multiple update managers across the network. This helps in load balancing and in avoiding network congestion that usually happens when there is a single update manager.
  • Email and SMS Notifications
    • This feature allows notifications to be sent to configured email addresses and numbers alerting them of critical network events.
  • Tuneup*
    • This feature helps to improve the performance of computer systems by cleaning junk and invalid registry/disk entries. Tuneups can be carried out for all endpoints from the Endpoint Security Server. It can also be scheduled at a specific time and date.
  • Reports
    • Provides a range of graphical and tabular reports, which can also be exported and saved in a variety of formats (e.g. PDF, CSV). Reporting can be scheduled according to the requirements.
  • Vulnerability Scan
    • This feature scans known vulnerabilities of installed applications and operating systems in the network. It helps frame security measures against known vulnerabilities and protect against security breaches by threat agents.
    • Scans vulnerabilities in applications such as Adobe, Safari, Mozilla, Oracle, etc.
    • Notifies regarding unpatched operating systems of computers in the network.


Endpoint Security server can be installed on a system with any one of the following operating systems:

  • Microsoft Windows 2000 SP4 Professional / Server / Advanced Server
  • Microsoft Windows XP Professional (32-bit/64-bit)
  • Microsoft Windows Server 2003 Web/Standard/Enterprise (32-bit/64-bit)
  • Microsoft Windows Vista Home Basic/Home Premium/
    Business/Enterprise/Ultimate (32-bit/64-bit)
  • Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit)/ Datacenter (64-bit)
  • Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
  • Microsoft Windows 7 Home Basic/Home Premium/
    Professional/Enterprise/Ultimate (32-bit/64-bit)
  • Microsoft Windows 8 Professional / Enterprise 
  • Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows SBS 2011 Standard / Essentials
  • Microsoft Windows Server 2012 Standard / Essentials / 
    Foundation / Storage Server / Datacenter (64-bit)
  • Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
  • Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)

Minimum system requirement for Console system

  • 1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium processor or equivalent
  • 1 GB of RAM
  • 3250 MB of free disk space
  • Monitor that supports 1024*768 resolution at 256 colors or later

Additional Software Required for Console System

Console needs to have Web Server services of either Microsoft IIS or Apache Web Server on the system.

If Microsoft IIS is configured as web server, the version requirements are as follows:

  • IIS Version 5.0 on Windows 2000
  • IIS Version 5.1 on Windows XP
  • IIS Version 6.0 on Windows Server 2003
  • IIS Version 7.0 on Windows Vista and Windows Server 2008
  • IIS Version 7.5 on Windows 7 and Windows Server 2008 R2
  • IIS Version 8.0 on Windows 8 and Windows Server 2012
  • IIS Version 8.5 on Windows 8.1 and Windows Server 2012 R2

If Apache is to be configured as web server, the version requirement is as follows:

  • Apache Web Server 2.0 or later

Other essential configuration on Console system

  • Administrator or Domain Administrator access on the console system.
  • File and printer sharing for Microsoft Networks installed.
  • Transmission control Protocol/Internet Protocol (TCP/IP) support installed.
  • Internet Explorer Version 7, 8, 9, 10, or 11.

Network Deployment Scenarios

  • If the network is configured using DHCP, the Endpoint Security server system on which Quick Heal Endpoint Security server will be installed, and the DHCP server system should be configured using a static IP address.
  • If Quick Heal Endpoint Security server is to be installed on a server with two network cards, and Quick Heal client agents are to be deployed on both the networks, then during installation of Quick Heal Endpoint Security server the administrator has to configure Domain Name based communication during installation.

Client side requirements

Windows Workstations supported

  • Microsoft Windows 2000 SP 4 Professional / Server / Advanced Server
  • Microsoft Windows XP Home (32-bit) / Professional Edition (32-bit/64-bit)
  • Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)
  • Microsoft Windows Vista Home Basic / Home Premium / Ultimate / Business / Enterprise (32-bit/64-bit)
  • Microsoft Windows Server 2008 Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)
  • Microsoft Windows Server 2008 R2 Web / Standard / Enterprise / Datacenter (64-bit)
  • Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
  • Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows SBS 2011 Standard / Essentials
  • Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server/ Datacenter (64-bit)
  • Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
  • Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)

Mac Workstations supported

  • Mac OS X 10.6, 10.7, 10.8, 10.9
  • Mac Computer with Intel Processor

Linux Workstations supported


  • Redhat 9
  • Redhat Enterprise Linux 4, 5.3, 6.0
  • Fedora 7, 12, 13, 14
  • SuSE 7.3, SuSE ES 10, SuSE ES 11
  • BOSS
  • Mandrake 9.2
  • Mandriva 2008
  • CentOS 5
  • Ubuntu 7.10, 10.04 LTS, 10.04.1 LTS


  • Redhat Enterprise Linux 5.3, 6.0
  • Fedora 13, 14
  • SUSE ES 11
  • Ubuntu 10.04 LTS, 10.04.1 LTS

Minimum System Requirements for Windows Clients

  • 256 MB of RAM
  • 1800 MB of free disk space
  • 1 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista, Windows 2008 Server and Windows 7
  • 1 GB of RAM for Windows Vista and Windows 7
  • 512 MB of RAM for Windows 2008 and Windows 2008 R2
  • For Windows 2000 – Service Pack 4 or later
  • Internet Explorer 5.5 or later
  • Administrative privilege is required for installation

Minimum System Requirements for Mac Clients

  • 512 MB of RAM
  • 1200 MB free hard disk space

Minimum System Requirements for Linux Clients

  • 133 MHz or later Intel based (or compatible) processor
  • 128 MB or later RAM
  • 500 MB of free hard disk space