If your laptop is lost or stolen, you can use ZoneAlarm Find My Laptop to:
To use ZoneAlarm Find My Laptop, you must first activate it.
We also recommend to set the configuration protection password, to prevent unauthorized users from changing or disabling the ZoneAlarm 2018 software on your computer.
To activate Find My Laptop:
We strongly recommend that you set a password to protect your ZoneAlarm 2018 settings. This way, if somebody tries to change the ZoneAlarm 2018 settings, or to uninstall the product, they will have to enter the password.
To set a password to protect ZoneAlarm settings:
From the Find My Laptop web portal, you can see this information at the time of the latest Internet connection:
You can also take these steps to find your laptop and to protect the data stored on it:
You can send a message to the screen of your laptop - once, or periodically.
To send a message to finder:
To cancel periodic reminders:
In the Message to Finder window, click Cancel Message.
To stop anyone from using your laptop, you can simply lock it.
To lock your laptop:
To unlock your laptop remotely:
In the ZoneAlarm Find My Laptop web portal https://atf.zonealarm.com, click Unlock device.
To prevent unauthorized access to the data stored on your lost laptop, you can back it up to the ZoneAlarm Find My Laptop web portal and delete the originals from your laptop remotely. To be able to do this, make sure Emergency Backup is enabled.
You can enable Emergency Backup during the Find My Laptop activation ("Activating Find My Laptop" on page 57) or at a later time.
To enable emergency backup:
After you run a backup, it is archived and stored on the server. Only one backup archive can be stored at a time. To run another backup, you must first delete the previous backup archive.
To retrieve backed up data:
If your lost or stolen laptop's Wi-Fi antenna is turned on, you can locate your laptop on the map with the precision of 100 feet (30 meters). If your laptop is online, you can also take a webcam capture and the current screenshot of the desktop.
Every time you take a snapshot, the location on the map, the webcam capture, and the desktop snapshot is saved with the corresponding dot on the timeline on your ZoneAlarm Find My Laptop web portal page. You can select any dot on the timeline, to see the information at a particular point in time. You can also delete snapshots from the timeline.
If you try to locate your laptop and it is offline, you can set up ZoneAlarm Find My Laptop to notify you, when it comes online.
To receive email notifications when your laptop comes online:
You can manage devices you track on your ZoneAlarm Find My Laptop web portal.
To add a laptop to track:
You must install ZoneAlarm 2018 on that laptop and activate Find My Laptop with the same Username. These instructions are available to you, when you click Device > Add in your Find My Laptop web portal page.
The name of the new laptop will show in a new tab on your ZoneAlarm Find My Laptop web portal page https://atf.zonealarm.com. A separate tab is created for every device that you add to Find My Laptop tracking. You can monitor several devices at the same time, and see their tracking information in the corresponding tabs on the Find My Laptop web portal.
When a device is removed, the ZoneAlarm client shows that Find My Laptop is not activated.
By default, all ZoneAlarm Find My Laptop features are enabled. You can disable features as necessary. Only features that are enabled can be used in the ZoneAlarm Find My Laptop web portal.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html for a list of relevant copyrights and third-party licenses.