ZENworks Endpoint Security Client 3.5 User Guide

This Novell® ZENworks® Endpoint Security Client 3.5 User Guide is written to instruct the end-user on the operation of the Endpoint Security Client 3.5 for Windows* XP* and Windows 2000*.

The information in this guide is organized as follows:

Audience

This guide can be sent to all employees in the enterprise to help them understand how to use the Endpoint Security Client 3.5.

Feedback

We want to hear your comments and suggestions about this manual and the other documentation included with this product. Please use the User Comments feature at the bottom of each page of the online documentation, or go to the Novell Documentation Feedback site and enter your comments there.

Additional Documentation

ZENworks Endpoint Security Management is supported by other documentation (in both PDF and HTML formats) that you can use to learn about and implement the product. For additional documentation, see the ZENworks Endpoint Security Management 3.5 documentation Web site.

Documentation Conventions

In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path.

A trademark symbol (®, ™, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.

When a single pathname can be written with a backslash for some platforms or a forward slash for other platforms, the pathname is presented with a backslash. Users of platforms that require a forward slash, such as Linux*, should use forward slashes as required by your software.