Introduction

Before going into detail on the files, registry keys and folders created on deploying the protection to your computers, we offer information about the administration agent, the P2P functionality or rumor, the proxy functionality and the protection installation times.

All these factors are important to have more in-depth knowledge of the deployment process.