Forefront Endpoint Protection. Jack Cobben
|
|
- Daniela Cummings
- 8 years ago
- Views:
Transcription
1 Forefront Endpoint Protection Jack Cobben
2 Page number 1 1. Contents 2. Release Notes... 8 Microsoft Forefront Endpoint Protection Running a repair on Microsoft Forefront Endpoint Protection 2010 reporting fails... 8 X-axis labels not displaying properly for the Antimalware Protection Summary report... 8 Managing the Customer Experience Improvement Program setting on the Forefront Endpoint Protection server... 9 Microsoft Forefront Endpoint Protection 2010 Client Software... 9 Managing the Customer Experience Improvement Program setting on Forefront Endpoint Protection clients... 9 Operating system upgrade... 9 Custom scan on virtual drives in Windows XP Forefront Endpoint Protection does not uninstall Symantec on computers running x64 operating systems Forefront Endpoint Protection Client stops reporting malware activity when the System Event Log is full Overview Why Use Forefront Endpoint Protection Easy to Deploy Easy to Manage Unified Protection Decision Considerations for FEP and the FEP Security Management Pack Dashboard Overview Reports Overview System Requirements Prerequisites for Installing Forefront Endpoint Protection on a Server Forefront Endpoint Protection Server Prerequisites Forefront Endpoint Protection Console Prerequisites Prerequisites for Deploying Forefront Endpoint Protection on a Client Prerequisites for Importing the Forefront Endpoint Protection Security Management Pack Getting Started Getting Assistance Where to find Forefront Endpoint Protection Help and Assistance: Providing Feedback Release Notes
3 Page number 2 8. Planning and Architecture Forefront Endpoint Protection Forefront Endpoint Protection and High Availability About Configuration Manager Site Topologies and FEP Single-Site Deployment Hierarchical Deployment Forefront Endpoint Protection Installed on the Parent and Child Sites Forefront Endpoint Protection Installed on the Child Sites About Basic Setup Basic Topology About Basic with Remote Reporting Database Setup Basic Topology with Remote Reporting Database FEP 2010 Security Management Pack Forefront Endpoint Protection Client Policies System Requirements Competitive Uninstall Forefront Endpoint Protection Client Deployment Options Definition Updates About Configuring Clients by Using Policies Creating and Configuring Policies Deploying Policies Planning for Definition Updates Migrating from Forefront Client Security to Forefront Endpoint Protection Client Update for Microsoft Forefront Client Security (1.0.xxxx.0) Server Installation FEP Overview of Installing Forefront Endpoint Protection Installation Options Installing Using Basic Setup Prerequisites Installing Using Basic with a Remote Reporting Database Setup Installing Using Advanced Setup Release Notes
4 Page number 3 Validating Installation Configuring the Client Software on a Configuration Manager Site Server Moving from a Public RC Version to a Retail Version Uninstalling FEP 2010 Security Management Pack Overview of Installing the Forefront Endpoint Protection Security Management Pack About Agents Extracting the FEP 2010 Security Management Pack Files Importing the FEP 2010 Security Management Pack Configuring Client Discovery Create a New Management Pack for Customizations Client Deployment Overview of Deploying Forefront Endpoint Protection FEP Deploying by Using Configuration Manager Packages Deploying Manually Deploying the Client Software by Using the Command Prompt Validating Deployment Uninstalling Enforcing the Client Software Deployment Deploying the FEP Client Software to a FEP Collection To create a reinstall advertisement Operations Configuring Client Settings by Using Policies FEP Policies Creating a Policy Duplicating a Policy Editing a Policy Exporting a Policy Importing a Policy Setting Policy Precedence Assigning a Policy to Endpoint Computers Using Group Policy with FEP Release Notes
5 Page number 4 Converting FEP Policies to Group Policy Merging Settings from Multiple Policy Files Exporting Policy Settings to a FEP Policy File Configuring and Viewing FEP Group Policy Settings FEP Policy Templates About Preconfigured Policy Templates Applying Policies from the Command Prompt Updating Policies from the Command Prompt Common Tasks Running an Endpoint Protection Scan Managing Windows Firewall Protection Retrieving the Effective Endpoint Protection Settings Forcing Definition Updates Configuring Definition Updates Configuring Update Synchronization Microsoft Update Definition Updates File-Share-Based Definition Updates FEP Monitoring Monitoring Client Status by Using the Dashboard Using Alerts to Monitor Malware Detections Using Desired Configuration Management to Monitor Client Compliance FEP 2010 Security Management Pack Monitoring Security Considerations Health Rollup Object Classes About Discovery About Views About Monitors Monitoring Using Overrides About Rules About Alerts About Tasks Placing Objects in Maintenance Mode Release Notes
6 Page number 5 Configuring Notification Settings FEP 2010 Reports Forefront Endpoint Protection Security Reports Command options Operational Reports Displaying Computers Infected by a Specific Malware Displaying Recent Malware Infections Subscribing to Reports FEP 2010 Security Management Pack Reporting FEP Health and Deployment Status Schema FEP Security Incidents schema Disaster Recovery for FEP 2010 on Configuration Manager Backup Restore Automating Day-to-Day Tasks by Using Windows PowerShell Deploying or Removing the FEP Client Software Assigning and Unassigning FEP Policies to Collections Automating Desired Configuration Management Automating the FEP Dashboard Automating Tasks on Client Computers Automating FEP Reports Troubleshooting Using the FEP Best Practices Analyzer Troubleshooting FEP and Configuration Manager FEP Log Files Troubleshooting the FEP Security Management Pack and Operations Manager Technical Reference FEP 2010 Policy - Default Settings Antimalware Settings Updates Settings Windows Firewall Settings Security Management Pack Monitors Forefront Endpoint Protection 2010 Security Management Pack Monitors Release Notes
7 Page number 6 Security Management Pack Tasks Forefront Endpoint Protection 2010 Security Management Pack Tasks FEP ADMX Reference FEP2010 Client Help Welcome to Microsoft Forefront Endpoint Protection Why do I need antivirus and antispyware software? How can I tell if my computer is infected with malicious software? What should I do if Forefront Endpoint Protection detects malicious software on my computer? Using Forefront Endpoint Protection to remove potentially harmful software Frequently asked questions about malicious software How to help prevent malicious software infections How to help prevent malicious software infections Getting started Understanding alert levels What are recommended actions? Applying default actions to detected items Scanning for viruses, spyware, and other potentially unwanted software To scan the areas of your computer that malicious software is most likely to infect (Quick scan) To scan all areas of your computer (Full scan) To scan specific areas of your computer only (Custom scan) Running a custom scan To scan a specific file or folder (right-click scan) Running a right-click scan Scheduling scans When is the best time to run a scan on my computer? Responding to potential threats after a scan How can I view a scan's progress? What are advanced scanning options? Excluding items from a scan What's real-time protection? Understanding real-time protection options Turning real-time protection on and off Release Notes
8 Page number 7 How do I know that Forefront Endpoint Protection is running on my computer? How to set up Forefront Endpoint Protection alerts What are virus and spyware definitions? How do I keep virus and spyware definitions up to date? Running a scan using the latest updates How do I remove or restore items quarantined by Forefront Endpoint Protection? To remove or restore quarantined items How do I add or remove items from the Forefront Endpoint Protection allowed list? How do I view or clear the history in Forefront Endpoint Protection? What if I want to download or run a program that Forefront Endpoint Protection detects as potentially harmful? Privacy settings for detected items What is the Microsoft SpyNet Community? Reporting suspicious software to Microsoft SpyNet Changing your Microsoft SpyNet community membership Where can I find the Forefront Endpoint Protection privacy statement? Where can I find the Forefront Endpoint Protection license agreement? Troubleshooting Troubleshooting Update Issues I can't start the Forefront Endpoint Protection service I can't install Forefront Endpoint Protection I can't connect to the Internet issue (General topic) Error 0x8******* encountered while virus and spyware definition updates or product upgrades Forefront Endpoint Protection detects a threat but can't remediate it Release Notes
9 Page number 8 2. Release Notes These release notes contain information that is required to successfully install, deploy and use Microsoft Forefront Endpoint Protection. They contain information that is not available in the product documentation. Microsoft Forefront Endpoint Protection 2010 Running a repair on Microsoft Forefront Endpoint Protection 2010 reporting fails The user account used to run a repair on Forefront Endpoint Protection Reporting must be assigned the Content Manager SQL Server Reporting Services role. For more information about the Content Manager SQL Server Reporting role, see Content Manager Role ( in the SQL Server Books Online. Note: When User Account Control (UAC) is enabled on the SQL Server Reporting Services server, the role assignment cannot be inherited from the following groups or repair will fail: Administrators local group Domain Administrators domain group X-axis labels not displaying properly for the Antimalware Protection Summary report In some circumstances, when running the Antimalware Protection Summary report, the x-axis labels do not display properly. This occurs only when running Microsoft SQL Server 2008 or SQL Server 2008 R2 reporting services. Install one of the following SQL Server cumulative updates to fix the report: Cumulative Update package 3 for SQL Server 2008 R2 ( Cumulative update package 10 for SQL 2008 Service Pack 1 ( Note: It is recommended that you install the SQL Server cumulative update prior to installing Forefront Endpoint Protection. If the SQL Server cumulative update is installed after Forefront Endpoint Protection was installed, you will need to run a repair on the Microsoft Forefront Endpoint Protection 2010 Reporting component. Release Notes
10 Page number 9 Managing the Customer Experience Improvement Program setting on the Forefront Endpoint Protection server After installing Forefront Endpoint Protection you cannot change your membership in the Customer Experience Improvement Program (CEIP) through the user interface. To manually configure the CEIP setting, modify the following registry key on the Forefront Endpoint Protection server: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Forefront\Forefront Endpoint Protection 2010\config\SqmEnabled Setting the registry key to 1 joins the CEIP. Setting the registry key to 0 removes membership in the CEIP. For the change to take effect you need to restart the computer. Microsoft Forefront Endpoint Protection 2010 Client Software Managing the Customer Experience Improvement Program setting on Forefront Endpoint Protection clients Forefront Endpoint Protection clients automatically join the Customer Experience Improvement Program (CEIP). Users can modify this setting; however, the administrator cannot control the CEIP setting via a Forefront Endpoint Protection policy created in the Configuration Manager console. To configure the CEIP setting, create the following registry key on the Forefront Endpoint Protection client computer: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Microsoft AntiMalware\Miscellaneous Configuration\SqmConsentApprove Setting the registry key to 1 joins the CEIP (default). Setting the registry key to 0 removes membership in the CEIP. After the registry key has been created, the user can no longer change this setting from the Forefront Endpoint Protection client. For the change to take effect you need to restart the computer. Operating system upgrade After the operating system on a client computer is upgraded, the Forefront Endpoint Protection client software no longer functions as expected. To avoid this, you must uninstall the Forefront Endpoint Protection client software before running the operating system upgrade. This applies to the following operating system upgrade paths: Windows XP to Windows Vista Windows Vista to Windows Vista SP1, Windows Vista SP2, or Windows 7 Release Notes
11 Page number 10 Custom scan on virtual drives in Windows XP On computers running Windows XP, malware residing on a virtual drive is not be detected during a custom scan of the virtual drive. A virtual drive is created by applications using Application Virtualization (App-V) technology, like Microsoft Office Quick scans and full scans properly detect the malware. Forefront Endpoint Protection does not uninstall Symantec on computers running x64 operating systems The Forefront Endpoint Protection client software does not uninstall the Symantec Antivirus Corporate Edition client on computers running a 64-bit operating system. On these computers, you need to manually uninstall Symantec software before deploying the Forefront Endpoint Protection client software. Forefront Endpoint Protection Client stops reporting malware activity when the System Event Log is full Client malware activity incidents are reported from the client to the Forefront Endpoint Protection server based on the entries in the System event log. If the System event log is full and no new events can be written, no new malware activity is reported to the Forefront Endpoint Protection server. It is recommended that you configure the properties of the System event log to overwrite events when needed, so that new events can be written and are not lost. 3. Overview Microsoft Forefront Endpoint Protection 2010 (FEP) is a security and antimalware solution integrated into System Center Configuration Manager 2007, and the Forefront Endpoint Protection Security Management Pack is a security and antimalware management solution for servers and critical, high-priority computers, integrated into System Center Operations Manager Together, they are a software solution that provides security and antimalware management for desktops, portable computers, and servers. Together they provide a lower total cost-of-ownership enterprise solution that enables desktop administrators in your organization to add security management to their day-to-day operations, within a familiar framework and without requiring specialized security knowledge. FEP and the FEP Security Management Pack leverage the familiar administrative experience of managing and monitoring endpoints. They improve visibility for identifying and remediating potentially vulnerable endpoints while lowering ownership costs by using existing infrastructure for both endpoint management and security. The FEP client software deploys effortlessly to hundreds of thousands of endpoints by using existing System Center Configuration Manager agents, and provides highly accurate detection of known and unknown threats, as well as actively protecting against network-level attacks by managing basic Windows Firewall configurations. FEP and the FEP Security Management Pack provide the following features: Overview
12 Page number 11 Integration with your existing system management infrastructure Proven antimalware engine Reporting functionality In FEP, policy-based antimalware management In FEP, Firewall management Seamless migration from previous antivirus solutions Why Use Forefront Endpoint Protection Forefront Endpoint Protection and the FEP Security Management Pack provide seamless integration with the management products you use on a daily basis. The key benefits are described below. Easy to Deploy Forefront Endpoint Protection makes it easy for desktop administrators to roll out a large-scale endpoint protection solution to all user desktops and portable computers, while the FEP Security Management Pack makes it simple to roll out real-time alerting and reporting for servers and critical, high-priority client computers. FEP comes complete with policy templates, for both recommended client configurations and typical server workloads, which are ready to use right out-of-the box, taking the guesswork out of security management. While no advanced customization is required, it is easy to customize policies to meet the needs of your organization. Forefront Endpoint Protection supports deployments that are built on the familiar System Center Configuration Manager software distribution infrastructure, while the FEP Security Management Pack, built on System Center Operations Manager, supports servers and critical high-priority client computers. Using Forefront Endpoint Protection, you can deploy the client Across various topologies to support non-domain-joined computers, endpoints at different branch offices, in addition to unmanaged (stand-alone) clients. To seamlessly upgrade or replace previously installed security solutions. On various Windows operating systems. Easy to Manage Forefront Endpoint Protection and the FEP Security Management Pack offer both the desktop administrator and the server administrator a streamlined security management experience. Built on the familiar System Center interfaces, it gives administrators simplified access to the information and tools they need in order to keep their enterprise secure and running, including the following: In FEP, policy-based administration Remediation capabilities including scanning and updating definitions on client computers Overview
13 Page number 12 Current and historical reporting that enables administrators to answer critical security questions, such as: What percentage of computers are currently protected? Is antivirus software installed and turned on? Are the latest definitions installed? What malware was detected in the organization? What computers currently have malware activity? How can I improve my organizational security? Forefront Endpoint Protection is built on System Center Configuration Manager, and the FEP Security Management Pack is built on System Center Operations Manager. Unified Protection Forefront Endpoint Protection delivers a single-agent, multithreat protection for desktops, portable computers, and the FEP Security Management Pack provides management of servers and critical high-priority client computers. Backed by a world-class response center and a dedicated community (Microsoft SpyNet ) serving millions of users, the FEP client includes: Antimalware and antispyware Rootkit detection and remediation Critical vulnerability assessment and automatic updates Integrated Windows Firewall management Network Inspection System The FEP client helps users stay secure and productive both at work and on the go with a lightweight, easy-to-use interface. It is built on the same antimalware engine as Microsoft Security Essentials (MSE), which has been delighting millions of consumers with low false positives and high catch rates. Whenever possible, the FEP client automatically solves security issues as they occur without disturbing users, so users can stay safe and continue with their work without contacting their desktop administrators. Decision Considerations for FEP and the FEP Security Management Pack Both FEP and the FEP Security Management Pack provide best-of-breed security protection for desktops, portable computers, and servers. You can implement either FEP or the FEP Security Management Pack, or you can implement both to take advantage of the features of each. Choosing when to implement each requires that you evaluate your security needs. Consider the questions in the following table. Overview
14 Page number 13 If Then You are already using System Center Configuration Manager to manage your enterprise You can easily implement Forefront Endpoint Protection to integrate security into your computer management solution. You are using System Center Operations Manager to manage your data center You can implement the FEP Security Management Pack to monitor your servers and critical high-priority computers. You need real-time reporting and monitoring for any of your computers or servers The FEP Security Management Pack can provide realtime monitoring and alerting for the servers (and highpriority client computers) you designate. You are using the Desired Configuration Management (DCM) feature in Configuration Manager Forefront Endpoint Protection provides additional DCM checks that allow you to report on the status of security areas within your Configuration Manager environment. You are managing any branch offices or non-domain-joined clients Configuration Manager supports both of these scenarios, and Forefront Endpoint Protection, built on Configuration Manager, can take full advantage of this support. The desktop administrators in your organization are responsible for desktop security If you have implemented Configuration Manager for desktop administration, your desktop administrators can work within the familiar interface of Configuration Manager. You need historical reporting for malware events Both Forefront Endpoint Protection and the FEP Security Management Pack are an option for you. Both maintain a historical record of malware information in your organization. Overview
15 Page number Dashboard Overview The Forefront Endpoint Protection dashboard provides key information for tracking the status of client software deployments, antimalware activity, definition updates, policy distributions, and client software compliance. The dashboard contains several summary areas displayed on a single page, and works by querying the Configuration Manager Site database, and using the resulting data sets to present key metrics in a graphical format. The Forefront Endpoint Protection dashboard is located in the Configuration Manager console, in the following path in the tree: Site Database / Computer Management / Forefront Endpoint Protection The following table describes the summary areas displayed in the Forefront Endpoint Protection dashboard: Summary area Description Client Deployment Status This area displays the following information: The number of computers in your organization to which the client software was not targeted. The number of computers in your organization to which the client software is targeted. The set of computers to which the client software is targeted is divided into the following deployment states: Removed Failed Pending Out of date Deployed Protection Status This area displays the reporting status for the FEP client software. There are three possible status values: Protection service off The number of computers on which the FEP antimalware service is turned off. Not reporting The number of computers to which the FEP client has Dashboard Overview
16 Page number 15 been deployed, but have not sent a status report back to the Configuration Manager server in the past 14 days. Healthy The number of computers running the FEP client software and have sent a status report back to the Configuration Manager server in the past 14 days. Security Status This area displays information about malware activity in your organization. The possible states of the FEP client software are as follows: Infected The number of computers on which the FEP client software has detected active malware. Restart required The number of computers running the FEP client software that require a restart in order to complete malware cleaning. Full scan required The number of computers running the FEP client software that require a full scan. Recent malware activity (Last 24 hours) The number of computers on which the FEP client software detected and cleaned malware within the last 24 hours. Definition Status This area displays information about the age of the FEP antimalware definitions on the client computers. Computers are listed according to the age category into which the definitions fall. The following is a list of possible categories: Older than 1 week The number of client computers with definitions more than 1 week old. Up to 7 days old The number of client computers with definitions up to 1 week old. Up to 3 days old The number of client computers with definitions up to 3 days old. Up to date The number of client computers with up-to-date definitions. Data for this dashboard area is collected by Configuration Manager Desired Configuration Manager (DCM) baselines. For more information about DCM baselines and Forefront Endpoint Protection, see Using Desired Configuration Management to Monitor Client Compliance. Dashboard Overview
17 Page number 16 Policy Distribution Status This area displays information about the possible policy distribution states for the FEP client software. The following is a list of the possible states: Failed The number of computers to which a policy could not be deployed. Pending The number of computers to which a policy is in the process of being deployed. Distributed The number of computers to which a policy was successfully deployed. Forefront Endpoint Protection Baselines This area displays summary status information for FEP client compliance with FEP configuration baselines. For more information, see Using Desired Configuration Management to Monitor Client Compliance. 5. Reports Overview Reporting in Forefront Endpoint Protection is integrated into the Configuration Manager console. The information is gathered using the standard Configuration Manager data collection mechanism and is stored in the Forefront Endpoint Protection reporting database. Since this information is gathered at scheduled intervals, reports may not reflect the most recent information. Forefront Endpoint Protection presents the information gathered in the reporting database in summary and detailed reports, and contain links that can be clicked to view the related reports. There are several predefined reports located under the Forefront Endpoint Protection Reports node and under the standard Configuration Manager Reporting node. Reports broadly divide into security reports and operational reports respectively. The following table is a list of the available reports. Report name Description Type Antimalware Activity Report This report provides an overview of antimalware status, malware alerts, and malware detections. Security Antimalware Protection Summary Report This report provides an overview of antimalware deployment and health. Security Reports Overview
18 Page number 17 Malware Details Report This report displays further details about a specific malware. Security Computer List Report This report displays a list of computers that can be filtered by collection, name, protection status, security state, antimalware signature version, detected malware, and last antimalware scan time. Security Computer Details Report This report displays further details about a specific computer. Security Deployment Overview This report displays the breakdown of the Microsoft Forefront Endpoint Protection 2010 client deployment status per collection. Operational Deployment for a specific collection This report displays the breakdown of the Microsoft Forefront Endpoint Protection 2010 client deployment status for a specific collection. Operational Computers with a specific deployment state This report displays a list of computers in a collection and the specific deployment state. Operational Policy Distribution Overview This report displays the breakdown of policy distribution states per collection. The report will only enumerate computers with Microsoft Forefront Endpoint Protection 2010 deployed. Operational Policy Distribution for a specific collection This report displays the policy distribution states for a specific collection. Operational Computers with a specific policy distribution state This report displays a list of computers in a collection and the specific policy state. Operational FEP information for a specific computer This report displays a summary of Forefront Endpoint Protection information for a specific computer. Operational Reports Overview
19 Page number System Requirements To get started with Microsoft Forefront Endpoint Protection 2010, your computers must meet the minimum requirements for installing the Forefront Endpoint Protection server and deploying the Forefront Endpoint Protection client. Use the following topics to help you prepare the computers in your environment: Prerequisites for Installing Forefront Endpoint Protection on a Server Prerequisites for Deploying Forefront Endpoint Protection on a Client Prerequisites for Importing the Forefront Endpoint Protection Security Management Pack Prerequisites for Installing Forefront Endpoint Protection on a Server The Forefront Endpoint Protection Setup wizard includes a prerequisites verification that checks that the prerequisites are already installed before you continue with the installation. If the prerequisites verification check identifies missing prerequisites, the check points you to locations where you can download and install the required components. Forefront Endpoint Protection Server Prerequisites The following table is the list of minimum requirements for installing the Forefront Endpoint Protection server. Prerequi site Minimum requirements Notes Memory 2 GB of RAM Available disk space Forefront Endpoint Protection server: 600 MB Forefront Endpoint Protection database: 1.25 GB Forefront Endpoint Protection reporting database: 1.25 GB For large scale deployments comprised of more than 10,000 client computers, on the computer running Microsoft SQL Server where the Forefront Endpoint Protection reporting database resides, the tempdb must be configured with a 500 GB Logical Unit Number (LUN) for its data file. For more information about configuring the tempdb data file, see Optimizing tempdb Performance ( Operatin g system Windows Server 2003 Standard, Enterprise, or Datacenter Edition Service Pack 2 (x86 or x64), or Windows Server 2008 System Requirements
20 Page number 19 Standard, Enterprise, or Datacenter Service Pack 1 (x86 or x64), or Windows Server 2008 R2 Standard, Enterprise, or Datacenter (x64) Databas e servers Microsoft SQL Server 2005 Standard or Enterprise Edition Service Pack 3 (x86 or x64), or Microsoft SQL Server 2008 Standard or Enterprise (x86 or x64), or Microsoft SQL Server 2008 R2 Standard or Enterprise (x86 or x64) When using an RTM release of SQL Server 2008, make sure that the default instance is defined. If the default instance is not defined, reporting and alerting does not function, because data cannot flow up to the Configuration Manager site server. Verify that all computers that are running SQL Server are joined to the domain, that the user account running Setup is a member of sysadmin SQL server role, and that all SQL Server services are running. Additionally, in nonclustered SQL Server environments, the SQL Server services should be configured to start automatically. The user account running Setup will be set as the owner of the following SQL Server databases and jobs: FEPDB_XXX (database) FEPDW_XXX (database) FEP_DataWarehouseMaintenance _FEPDW_XXX (job) FEP_DB_Maintenance_FEPDB_XX X (job) FEP_GetNewData_FEPDW_XXX (job) FEP_GetNewDataOnInstall_FEPD W_XXX (job) System Requirements
21 Page number 20 Addition al require ments for installing Forefron t Endpoint Protecti on reportin g database SQL Server Analysis Services SQL Server Integration Services SQL Server Reporting Services SQL Server Agent For SQL Server Analysis Services, the user account running Setup, or a domain group that it is a member of, must belong to the server administrator role on your specified SQL Server Analysis Server. For more information, see Analysis Server Properties Dialog Box ( ). The Forefront Endpoint Protection reporting database and server running SQL Server Analysis Services must be installed on the same SQL Server instance. On the computer that is running SQL Server Analysis Services, the following ports must be open for incoming traffic: SQL Server (TCP 1433) SQL Server Analysis Services (TCP 2383) For more information, see Configuring the Windows Firewall to Allow SQL Server Access ( For Forefront Endpoint Protection reporting to function, you must make sure that the Forefront Endpoint Protection client that is installed as part of Forefront Endpoint Protection has access to definition updates via the Configuration Manager client agent, Windows Server Update Services, or Microsoft Update. Addition al require ments for installing Forefron t The name you entered in the SQL Network Name box for your SQL Server cluster must be registered in the domain. SQL Server Integration Services must be installed System Requirements
22 Page number 21 Endpoint Protecti on reportin g database on a SQL Server cluster on all nodes and must be part of the cluster group. Configur ation Manager Microsoft System Center Configuration Manager 2007 Service Pack 2 installed with default roles, and either Microsoft System Center Configuration Manager 2007 R2 installed and configured to use SQL Server Reporting Services, or Microsoft System Center Configuration Manager 2007 R3 installed and configured to use SQL Server Reporting Services The following client agents are installed and configured: Hardware Inventory Software Distribution System Requirements
23 Page number 22 Desired Configuration Management Addition al require ments No other version of Forefront Endpoint Protection is installed Microsoft Windows Installer version 3.1 Microsoft.Net Framework 3.5 Service Pack 1 Configuration Manager Hotfix KB ( wlink/?linkid=203936) SQL Server Analysis Management Objects The computer where Setup is run is not pending a restart from a previous install or update The user account running Setup is a domain account for the domain of which the Forefront Endpoint Protection server is a member, has local administrative credentials, and has Configuration Manager administrative credentials You must install SQL Server Analysis Management Objects on the computer where Setup is run when the Forefront Endpoint Protection reporting database is being installed on a remote computer. You can download the SQL Server Analysis Management Objects for your version of SQL Server from the following locations: For SQL Server 2008 R2, visit Microsoft SQL Server 2008 R2 Feature Pack ( LinkId=206861), go to the Microsoft SQL Server 2008 R2 Analysis Management Objects section, and download the appropriate file based on your system architecture. For SQL Server 2008, visit Microsoft SQL Server 2008 Feature Pack ( LinkId=206625), go to the Microsoft Analysis Management Objects section, and download the appropriate file based on your system architecture. For SQL Server 2005, visit Feature Pack for Microsoft SQL Server 2005 ( LinkId=206624), go to the Microsoft SQL Server 2005 Management Objects Collection section, and download the appropriate file based on your System Requirements
24 Page number 23 system architecture. Forefront Endpoint Protection Console Prerequisites The following table is the list of minimum requirements for installing the Forefront Endpoint Protection console. Prerequisite Minimum requirements Configuration Manager Microsoft System Center Configuration Manager 2007 Service Pack 2 Console, or Microsoft System Center Configuration Manager 2007 R2, or Microsoft System Center Configuration Manager 2007 R3 Additional requirements Microsoft.Net Framework 3.5 Service Pack 1 Configuration Manager Hotfix KB ( The computer running Setup is not pending a restart from a previous install or update The user account running Setup is a domain account for the domain of which the Forefront Endpoint Protection server is a member, has local administrative credentials, and has Configuration Manager administrative credentials Prerequisites for Deploying Forefront Endpoint Protection on a Client The following table is a list of the prerequisites for deploying the Forefront Endpoint Protection on client computers. Prerequisite Requirement Configuration Manager A Microsoft System Center Configuration Manager 2007 site that has Forefront Endpoint Protection server installed. Note: If you have client computers that do not require the central deployment and management features of Forefront Endpoint Protection server, and you System Requirements
25 Page number 24 intend to manually install the Forefront Endpoint Protection client, the Configuration Manager prerequisites stated for client computers are not required. For more information, see Deploying the Client Software by Using the Command Prompt. Operating system Windows 7 (x86 or x64), or Windows 7 XP mode, or Windows Vista (x86 or x64) or later versions, or Windows XP Service Pack 2 (x86 or x64) or later versions, or Windows Server 2008 R2 (x64) or later versions, or Windows Server 2008 R2 Server Core (x64), or Windows Server 2008 (x86 or x64) or later versions, or Windows Server 2003 Service Pack 2 (x86 or x64) or later versions, or Windows Server 2003 R2 (x86 or x64) or later versions Note: On the following operating systems, the Forefront Endpoint Protection client software can be installed manually. However, policies cannot be applied to them, nor can they be centrally managed by Forefront Endpoint Protection. Windows 7 Starter Windows 7 Home Premium Windows Vista Basic Windows Vista Home Premium Windows XP Home Edition Available disk space 255 MB Additional Windows Installer 3.1 or later versions System Requirements
26 Page number 25 requirements Filter manager rollup package for Windows XP Service Pack 2 (x86) KB ( Competitive uninstall The client installation checks for and uninstalls the following existing antimalware clients: Symantec Endpoint Protection version 11 Symantec Corporate Edition version 10 McAfee VirusScan Enterprise version 8.5 and version 8.7 and its agent Forefront Client Security version 1 and the Operations Manager agent TrendMicro OfficeScan version 8 and version 10 Prerequisites for Importing the Forefront Endpoint Protection Security Management Pack The following table lists the minimum requirements for importing the Forefront Endpoint Protection Security Management Pack. Prerequisite Minimum requirement System Center Operations Manager 2007 System Center Operations Manager 2007 R2 The following table lists the minimum requirements for the Reporting management pack for use with the Forefront Endpoint Protection Security Management Pack. Prerequisite Minimum requirement Reporting components Reporting components must be installed for System Center Operations Manager 2007 R2 in order to use the Reporting feature. 7. Getting Started Before deploying Microsoft Forefront Endpoint Protection 2010, you should read the documentation carefully and plan your deployment according to your business needs. If planned correctly, Forefront Endpoint Protection can reduce your administrative overhead and total cost of ownership. If Forefront Endpoint Protection is deployed without sufficient planning you can disrupt your whole Getting Started
27 Page number 26 network, because Forefront Endpoint Protection has the potential to affect every computer in your organization. Because Forefront Endpoint Protection is built on System Center Configuration Manager, you should be familiar with Configuration Manager before you deploy Forefront Endpoint Protection. For more information, see System Center Configuration Manager 2007 ( Because the FEP Security Management Pack is built on System Center Operations Manager, you should be familiar with Operations Manager before deploying the FEP Security Management Pack. For more information, see System Center Operations Manager R2 ( Note: If you are new to Forefront Endpoint Protection, you should experiment in a test network environment before you deploy the product. Next Steps Plan the Forefront Endpoint Protection installation. For more information, see Planning and Architecture. Install Forefront Endpoint Protection on your Configuration Manager Site server. For more information, see FEP Import the FEP Security Management Pack on your Operations Manager server. For more information, see FEP 2010 Security Management Pack. Deploy Forefront Endpoint Protection policies and clients. For more information, see Client Deployment. Learn about routine operations. For more information, see Operations. Getting Assistance The Forefront Endpoint Protection online help and assistance options are available to you when you're planning, deploying, administering, and troubleshooting Forefront Endpoint Protection. Where to find Forefront Endpoint Protection Help and Assistance: Forefront Endpoint Protection TechNet Library ( The FEP TechNet library contains the most up-to-date product documentation. This documentation is updated as Forefront Endpoint Protection features evolve and new troubleshooting information becomes available. Forefront Endpoint Security Blog ( The Forefront Endpoint Security blog contains technical articles written by the Forefront Endpoint Protection team, in addition to product announcements and updates. Getting Started
28 Page number 27 Forefront Endpoint Protection Forum ( The forum provides a place to discuss Forefront Endpoint Protection with customers and Forefront Endpoint Protection team members. The Forefront Endpoint Protection forum is an excellent way to interact with the Forefront Endpoint Protection team and with other customers worldwide. The Forefront Endpoint Protection section of the TechNet Wiki ( The TechNet Wiki contains communitygenerated content about various Microsoft products, including Forefront Endpoint Protection. Through the use of the TechNet Wiki, you can share your knowledge and experience with other members of the community. Providing Feedback Your feedback about Microsoft Forefront Endpoint Protection 2010 will be greatly appreciated and will help Microsoft improve Forefront Endpoint Protection. Please submit all feedback to the Forefront Endpoint Protection Forum ( 8. Planning and Architecture The content in this section is designed to help you plan your Microsoft Forefront Endpoint Protection 2010 installation and the infrastructure required to support it. Before you install Forefront Endpoint Protection, it is recommended that you review the following sections: Planning Your Deployment Migrating from Forefront Client Security to Forefront Endpoint Protection Forefront Endpoint Protection 2010 Forefront Endpoint Protection easily installs into your existing Configuration Manager 2007 deployment. The Forefront Endpoint Protection server installation process automatically installs the required components to the correct servers based upon the Configuration Manager deployment. The following is a list of items that are installed during Forefront Endpoint Protection Setup. Installation item Description Forefront Endpoint Protection Site Server Extensions for Configuration Manager The Forefront Endpoint Protection Site server extensions for Configuration Manager. Forefront Endpoint Protection Console Extensions for The Forefront Endpoint Protection extensions to the Configuration Manager management console add views to Planning and Architecture
29 Page number 28 Configuration Manager manage and monitor Forefront Endpoint Protection client deployments. Forefront Endpoint Protection Database An auxiliary database used by Forefront Endpoint Protection. Forefront Endpoint Protection Reporting role Provides historical reports on Forefront Endpoint Protection client malware activity and client protection status. Forefront Endpoint Protection Reporting database The database for storing Forefront Endpoint Protection client protection status and malware activity historical data. Forefront Endpoint Protection Security Client The Forefront Endpoint Protection client is installed for access to antimalware metadata. The following items are installed during the installation of Forefront Endpoint Protection Site Server Extensions for Configuration Manager: The FEP Deployment package. The FEP Policies package. The FEP Operations package. Forefront Endpoint Protection Operations tasks are added to the Configuration Manager right-click context menu, and the Actions pane for a computer objects. Forefront Endpoint Protection desired configuration management configuration baselines and configuration items. Forefront Endpoint Protection related collections. Forefront Endpoint Protection client deployment and policy distribution reports are added to Configuration Manager reporting. Forefront Endpoint Protection and High Availability Forefront Endpoint Protection is installed on top of Configuration Manager and is dependent on the availability of the Configuration Manager services. The following items are Forefront Endpoint Protection server deployment recommendations for high availability: Use clustered SQL Server for the Forefront Endpoint Protection reporting database. Use the System Center Operations Manager Forefront Endpoint Protection Monitoring Management Pack to monitor Forefront Endpoint Protection services. Planning and Architecture
30 Page number 29 About Configuration Manager Site Topologies and FEP 2010 Forefront Endpoint Protection can be deployed to a Configuration Manager stand-alone (single) site or to a hierarchical site environment. Installation of Forefront Endpoint Protection on secondary sites is not supported. For more information about Configuration Manager sites, see Understanding Configuration Manager Sites ( Single-Site Deployment In a single-site Configuration Manager deployment, Forefront Endpoint Protection is installed on the Configuration Manager site server. The Configuration Manager administrator will perform the following tasks from the Configuration Manager console: Create or modify Forefront Endpoint Protection policies. Assign Forefront Endpoint Protection policies to collections. Deploy Forefront Endpoint Protection clients to collections. Monitor Forefront Endpoint Protection via the Forefront Endpoint Protection dashboard. Configure Forefront Endpoint Protection alerts. Assign the Forefront Endpoint Protection Desired Configuration Management baselines to collections. Hierarchical Deployment In a hierarchical Configuration Manager deployment, there is a parent site that has one or more sites (children) attached to it in the hierarchy. A parent site contains pertinent information about its lower-level sites and it can control many operations at the child sites. A site that has no parent site is known as a central site. For more information about planning and deploying Configuration Manager, see Planning and Deploying the Server Infrastructure for Configuration Manager 2007 ( Forefront Endpoint Protection can be installed in the following combinations: Parent and child sites Parent site Child sites The administrative control requirements will determine where Forefront Endpoint Protection should be installed: For centralized policy creation and control, install Forefront Endpoint Protection on the parent site. When Forefront Endpoint Protection is also installed on the child sites, policies are replicated from the parent site to the child sites. Installing Forefront Endpoint Protection on the child sites allows the administrator to view the FEP dashboard when connected to the child site via the Configuration Manager console. Planning and Architecture
1. Server 2008 - Microsoft FEP 2010 - Instalation
1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements
More informationMicrosoft Forefront Endpoint Protection 2010 Evaluation Guide
Forefront Endpoint Protection 2010, the next version of Forefront Client Security, enables businesses to simplify and improve endpoint protection while greatly reducing infrastructure costs. It builds
More informationGetting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
More informationKASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
More informationGetting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
More informationGetting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
More informationMaintaining, Updating, and Protecting Windows 7
Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationK7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationSystem Center Configuration Manager
System Center Configuration Manager Software Update Management Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationAltiris IT Analytics Solution 7.1 SP1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationMicrosoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.
Situation Microsoft IT had limited monitoring and reporting functionality with its existing antimalware system. Although the system could scan for malware, there was no reporting capability or configurable
More informationWindows Server Update Services 3.0 SP2 Operations Guide
Windows Server Update Services 3.0 SP2 Operations Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide describes how to manage Windows Server Update Services 3.0
More informationSpector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
More informationStep-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
More informationGetting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
More informationInstalling and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationE-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
More informationE-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
More informationClient Manager for Endpoint Protection (CMEP) User s Guide
Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product
More informationMicrosoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
More informationBitDefender Security for Exchange
Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the
More informationHow To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMetalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationLEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationAltiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished
More informationBackup Exec System Recovery Management Solution 2010 FAQ
Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation
More informationms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
More informationGetting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks
More informationCore Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
More informationUsing WMI Scripts with BitDefender Client Security
Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...
More informationCLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright
More informationGetting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information
Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec
More informationsafend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
More informationGFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.
GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationAVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
More informationTotal Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
More informationAdministration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233
Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features
More informationContents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationKaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide
Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationAltiris Patch Management Solution for Windows 7.1 from Symantec Release Notes
Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished
More informationSpyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationHow To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook
Page 1 of 285 User Guide - Exchange Mailbox idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX IDATAAGENT DEPLOYMENT -
More informationSystem Center Configuration Manager 2007
System Center Configuration Manager 2007 Software Distribution Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has
More informationIdera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013
Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management
More informationLegal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationTable of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
More informationAuthoring for System Center 2012 Operations Manager
Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack
More informationAd-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...
Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware
More informationF-Secure Client Security. Administrator's Guide
F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main
More informationForefront Client Security. Ronald Beekelaar Beekelaar Consultancy ronald@beekelaar.com
Forefront Client Security Ronald Beekelaar Beekelaar Consultancy ronald@beekelaar.com Introductions Presenter Ronald Beekelaar MVP Windows Security MVP Virtual Machine Technology E-mail: ronald@beekelaar.com
More informationInstalling and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
More informationSynchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
More informationSymantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
More informationKaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide A P P L I C A T I O N V E R S I O N : 9. 0 Dear User! Thank you for choosing our product. We hope that this document will help
More informationWindows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
More informationBest Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationCore Protection Module 1.6 powered by. User s Guide
Core Protection Module 1.6 July, 2010 BigFix Core Protection Module 1.6 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix
More informationInstallation Guide for Symantec Endpoint Protection and Symantec Network Access Control
Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in
More informationGFI Product Manual. Version 6.0. Getting Started Guide
GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
More informationGFI Cloud User Guide A guide to administer GFI Cloud and its services
GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works
More informationUpgrading Client Security and Policy Manager in 4 easy steps
Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security
More informationSymantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide
Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is
More informationSophos Cloud Migration Tool Help. Product version: 1.0
Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How
More informationMicrosoft Corporation. Project Server 2010 Installation Guide
Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups
More informationManaged Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
More informationGFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
More informationUser Guide - Exchange Public Folder idataagent
Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT
More informationMcAfee VirusScan and epolicy Orchestrator Administration Course
McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from
More informationProduct Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with
More informationWhat is Windows Intune? The Windows Intune Administrator Console. System Overview
What is Windows Intune? Windows Intune helps you manage and secure computers in your environment through a combination of Windows cloud services and upgrade licensing. Windows Intune delivers cloud-based
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationProviding Patch Management With N-central. Version 7.2
Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
More informationSymantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More informationMicrosoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012
coursemonster.com/me Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012 View training dates» Overview Elements of this syllabus may be subject to change
More informationSophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
More informationHow To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X
Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS
More informationEnterprise Manager. Version 6.2. Administrator s Guide
Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version
More informationWelcome to the QuickStart Guide
QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationTable of Contents. 10.0 Release Notes 2013/04/08. Introduction ... 3. in OS Deployment Manager. in Security Manager ... 7. Known issues ... 9 ...
Release Notes Release Notes 2013/04/08 Table of Contents Introduction... 3 Deployment Manager... 3 New Features in Deployment Manager... 3 Security Manager... 7 New Features in Security Manager... 7 Known
More informationSafeGuard Enterprise upgrade guide. Product version: 6.1
SafeGuard Enterprise upgrade guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6
More informationKaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition
Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition ADMINISTRATOR'S GUIDE PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this document
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
More informationFEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
More informationKaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide APPLICATION VERSION: 9.0 MAINTENANCE RELEASE 1 Dear User! Thank you for choosing our product. We hope that this document will
More information