Forefront Endpoint Protection. Jack Cobben

Size: px
Start display at page:

Download "Forefront Endpoint Protection. Jack Cobben"

Transcription

1 Forefront Endpoint Protection Jack Cobben

2 Page number 1 1. Contents 2. Release Notes... 8 Microsoft Forefront Endpoint Protection Running a repair on Microsoft Forefront Endpoint Protection 2010 reporting fails... 8 X-axis labels not displaying properly for the Antimalware Protection Summary report... 8 Managing the Customer Experience Improvement Program setting on the Forefront Endpoint Protection server... 9 Microsoft Forefront Endpoint Protection 2010 Client Software... 9 Managing the Customer Experience Improvement Program setting on Forefront Endpoint Protection clients... 9 Operating system upgrade... 9 Custom scan on virtual drives in Windows XP Forefront Endpoint Protection does not uninstall Symantec on computers running x64 operating systems Forefront Endpoint Protection Client stops reporting malware activity when the System Event Log is full Overview Why Use Forefront Endpoint Protection Easy to Deploy Easy to Manage Unified Protection Decision Considerations for FEP and the FEP Security Management Pack Dashboard Overview Reports Overview System Requirements Prerequisites for Installing Forefront Endpoint Protection on a Server Forefront Endpoint Protection Server Prerequisites Forefront Endpoint Protection Console Prerequisites Prerequisites for Deploying Forefront Endpoint Protection on a Client Prerequisites for Importing the Forefront Endpoint Protection Security Management Pack Getting Started Getting Assistance Where to find Forefront Endpoint Protection Help and Assistance: Providing Feedback Release Notes

3 Page number 2 8. Planning and Architecture Forefront Endpoint Protection Forefront Endpoint Protection and High Availability About Configuration Manager Site Topologies and FEP Single-Site Deployment Hierarchical Deployment Forefront Endpoint Protection Installed on the Parent and Child Sites Forefront Endpoint Protection Installed on the Child Sites About Basic Setup Basic Topology About Basic with Remote Reporting Database Setup Basic Topology with Remote Reporting Database FEP 2010 Security Management Pack Forefront Endpoint Protection Client Policies System Requirements Competitive Uninstall Forefront Endpoint Protection Client Deployment Options Definition Updates About Configuring Clients by Using Policies Creating and Configuring Policies Deploying Policies Planning for Definition Updates Migrating from Forefront Client Security to Forefront Endpoint Protection Client Update for Microsoft Forefront Client Security (1.0.xxxx.0) Server Installation FEP Overview of Installing Forefront Endpoint Protection Installation Options Installing Using Basic Setup Prerequisites Installing Using Basic with a Remote Reporting Database Setup Installing Using Advanced Setup Release Notes

4 Page number 3 Validating Installation Configuring the Client Software on a Configuration Manager Site Server Moving from a Public RC Version to a Retail Version Uninstalling FEP 2010 Security Management Pack Overview of Installing the Forefront Endpoint Protection Security Management Pack About Agents Extracting the FEP 2010 Security Management Pack Files Importing the FEP 2010 Security Management Pack Configuring Client Discovery Create a New Management Pack for Customizations Client Deployment Overview of Deploying Forefront Endpoint Protection FEP Deploying by Using Configuration Manager Packages Deploying Manually Deploying the Client Software by Using the Command Prompt Validating Deployment Uninstalling Enforcing the Client Software Deployment Deploying the FEP Client Software to a FEP Collection To create a reinstall advertisement Operations Configuring Client Settings by Using Policies FEP Policies Creating a Policy Duplicating a Policy Editing a Policy Exporting a Policy Importing a Policy Setting Policy Precedence Assigning a Policy to Endpoint Computers Using Group Policy with FEP Release Notes

5 Page number 4 Converting FEP Policies to Group Policy Merging Settings from Multiple Policy Files Exporting Policy Settings to a FEP Policy File Configuring and Viewing FEP Group Policy Settings FEP Policy Templates About Preconfigured Policy Templates Applying Policies from the Command Prompt Updating Policies from the Command Prompt Common Tasks Running an Endpoint Protection Scan Managing Windows Firewall Protection Retrieving the Effective Endpoint Protection Settings Forcing Definition Updates Configuring Definition Updates Configuring Update Synchronization Microsoft Update Definition Updates File-Share-Based Definition Updates FEP Monitoring Monitoring Client Status by Using the Dashboard Using Alerts to Monitor Malware Detections Using Desired Configuration Management to Monitor Client Compliance FEP 2010 Security Management Pack Monitoring Security Considerations Health Rollup Object Classes About Discovery About Views About Monitors Monitoring Using Overrides About Rules About Alerts About Tasks Placing Objects in Maintenance Mode Release Notes

6 Page number 5 Configuring Notification Settings FEP 2010 Reports Forefront Endpoint Protection Security Reports Command options Operational Reports Displaying Computers Infected by a Specific Malware Displaying Recent Malware Infections Subscribing to Reports FEP 2010 Security Management Pack Reporting FEP Health and Deployment Status Schema FEP Security Incidents schema Disaster Recovery for FEP 2010 on Configuration Manager Backup Restore Automating Day-to-Day Tasks by Using Windows PowerShell Deploying or Removing the FEP Client Software Assigning and Unassigning FEP Policies to Collections Automating Desired Configuration Management Automating the FEP Dashboard Automating Tasks on Client Computers Automating FEP Reports Troubleshooting Using the FEP Best Practices Analyzer Troubleshooting FEP and Configuration Manager FEP Log Files Troubleshooting the FEP Security Management Pack and Operations Manager Technical Reference FEP 2010 Policy - Default Settings Antimalware Settings Updates Settings Windows Firewall Settings Security Management Pack Monitors Forefront Endpoint Protection 2010 Security Management Pack Monitors Release Notes

7 Page number 6 Security Management Pack Tasks Forefront Endpoint Protection 2010 Security Management Pack Tasks FEP ADMX Reference FEP2010 Client Help Welcome to Microsoft Forefront Endpoint Protection Why do I need antivirus and antispyware software? How can I tell if my computer is infected with malicious software? What should I do if Forefront Endpoint Protection detects malicious software on my computer? Using Forefront Endpoint Protection to remove potentially harmful software Frequently asked questions about malicious software How to help prevent malicious software infections How to help prevent malicious software infections Getting started Understanding alert levels What are recommended actions? Applying default actions to detected items Scanning for viruses, spyware, and other potentially unwanted software To scan the areas of your computer that malicious software is most likely to infect (Quick scan) To scan all areas of your computer (Full scan) To scan specific areas of your computer only (Custom scan) Running a custom scan To scan a specific file or folder (right-click scan) Running a right-click scan Scheduling scans When is the best time to run a scan on my computer? Responding to potential threats after a scan How can I view a scan's progress? What are advanced scanning options? Excluding items from a scan What's real-time protection? Understanding real-time protection options Turning real-time protection on and off Release Notes

8 Page number 7 How do I know that Forefront Endpoint Protection is running on my computer? How to set up Forefront Endpoint Protection alerts What are virus and spyware definitions? How do I keep virus and spyware definitions up to date? Running a scan using the latest updates How do I remove or restore items quarantined by Forefront Endpoint Protection? To remove or restore quarantined items How do I add or remove items from the Forefront Endpoint Protection allowed list? How do I view or clear the history in Forefront Endpoint Protection? What if I want to download or run a program that Forefront Endpoint Protection detects as potentially harmful? Privacy settings for detected items What is the Microsoft SpyNet Community? Reporting suspicious software to Microsoft SpyNet Changing your Microsoft SpyNet community membership Where can I find the Forefront Endpoint Protection privacy statement? Where can I find the Forefront Endpoint Protection license agreement? Troubleshooting Troubleshooting Update Issues I can't start the Forefront Endpoint Protection service I can't install Forefront Endpoint Protection I can't connect to the Internet issue (General topic) Error 0x8******* encountered while virus and spyware definition updates or product upgrades Forefront Endpoint Protection detects a threat but can't remediate it Release Notes

9 Page number 8 2. Release Notes These release notes contain information that is required to successfully install, deploy and use Microsoft Forefront Endpoint Protection. They contain information that is not available in the product documentation. Microsoft Forefront Endpoint Protection 2010 Running a repair on Microsoft Forefront Endpoint Protection 2010 reporting fails The user account used to run a repair on Forefront Endpoint Protection Reporting must be assigned the Content Manager SQL Server Reporting Services role. For more information about the Content Manager SQL Server Reporting role, see Content Manager Role ( in the SQL Server Books Online. Note: When User Account Control (UAC) is enabled on the SQL Server Reporting Services server, the role assignment cannot be inherited from the following groups or repair will fail: Administrators local group Domain Administrators domain group X-axis labels not displaying properly for the Antimalware Protection Summary report In some circumstances, when running the Antimalware Protection Summary report, the x-axis labels do not display properly. This occurs only when running Microsoft SQL Server 2008 or SQL Server 2008 R2 reporting services. Install one of the following SQL Server cumulative updates to fix the report: Cumulative Update package 3 for SQL Server 2008 R2 ( Cumulative update package 10 for SQL 2008 Service Pack 1 ( Note: It is recommended that you install the SQL Server cumulative update prior to installing Forefront Endpoint Protection. If the SQL Server cumulative update is installed after Forefront Endpoint Protection was installed, you will need to run a repair on the Microsoft Forefront Endpoint Protection 2010 Reporting component. Release Notes

10 Page number 9 Managing the Customer Experience Improvement Program setting on the Forefront Endpoint Protection server After installing Forefront Endpoint Protection you cannot change your membership in the Customer Experience Improvement Program (CEIP) through the user interface. To manually configure the CEIP setting, modify the following registry key on the Forefront Endpoint Protection server: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Forefront\Forefront Endpoint Protection 2010\config\SqmEnabled Setting the registry key to 1 joins the CEIP. Setting the registry key to 0 removes membership in the CEIP. For the change to take effect you need to restart the computer. Microsoft Forefront Endpoint Protection 2010 Client Software Managing the Customer Experience Improvement Program setting on Forefront Endpoint Protection clients Forefront Endpoint Protection clients automatically join the Customer Experience Improvement Program (CEIP). Users can modify this setting; however, the administrator cannot control the CEIP setting via a Forefront Endpoint Protection policy created in the Configuration Manager console. To configure the CEIP setting, create the following registry key on the Forefront Endpoint Protection client computer: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Microsoft AntiMalware\Miscellaneous Configuration\SqmConsentApprove Setting the registry key to 1 joins the CEIP (default). Setting the registry key to 0 removes membership in the CEIP. After the registry key has been created, the user can no longer change this setting from the Forefront Endpoint Protection client. For the change to take effect you need to restart the computer. Operating system upgrade After the operating system on a client computer is upgraded, the Forefront Endpoint Protection client software no longer functions as expected. To avoid this, you must uninstall the Forefront Endpoint Protection client software before running the operating system upgrade. This applies to the following operating system upgrade paths: Windows XP to Windows Vista Windows Vista to Windows Vista SP1, Windows Vista SP2, or Windows 7 Release Notes

11 Page number 10 Custom scan on virtual drives in Windows XP On computers running Windows XP, malware residing on a virtual drive is not be detected during a custom scan of the virtual drive. A virtual drive is created by applications using Application Virtualization (App-V) technology, like Microsoft Office Quick scans and full scans properly detect the malware. Forefront Endpoint Protection does not uninstall Symantec on computers running x64 operating systems The Forefront Endpoint Protection client software does not uninstall the Symantec Antivirus Corporate Edition client on computers running a 64-bit operating system. On these computers, you need to manually uninstall Symantec software before deploying the Forefront Endpoint Protection client software. Forefront Endpoint Protection Client stops reporting malware activity when the System Event Log is full Client malware activity incidents are reported from the client to the Forefront Endpoint Protection server based on the entries in the System event log. If the System event log is full and no new events can be written, no new malware activity is reported to the Forefront Endpoint Protection server. It is recommended that you configure the properties of the System event log to overwrite events when needed, so that new events can be written and are not lost. 3. Overview Microsoft Forefront Endpoint Protection 2010 (FEP) is a security and antimalware solution integrated into System Center Configuration Manager 2007, and the Forefront Endpoint Protection Security Management Pack is a security and antimalware management solution for servers and critical, high-priority computers, integrated into System Center Operations Manager Together, they are a software solution that provides security and antimalware management for desktops, portable computers, and servers. Together they provide a lower total cost-of-ownership enterprise solution that enables desktop administrators in your organization to add security management to their day-to-day operations, within a familiar framework and without requiring specialized security knowledge. FEP and the FEP Security Management Pack leverage the familiar administrative experience of managing and monitoring endpoints. They improve visibility for identifying and remediating potentially vulnerable endpoints while lowering ownership costs by using existing infrastructure for both endpoint management and security. The FEP client software deploys effortlessly to hundreds of thousands of endpoints by using existing System Center Configuration Manager agents, and provides highly accurate detection of known and unknown threats, as well as actively protecting against network-level attacks by managing basic Windows Firewall configurations. FEP and the FEP Security Management Pack provide the following features: Overview

12 Page number 11 Integration with your existing system management infrastructure Proven antimalware engine Reporting functionality In FEP, policy-based antimalware management In FEP, Firewall management Seamless migration from previous antivirus solutions Why Use Forefront Endpoint Protection Forefront Endpoint Protection and the FEP Security Management Pack provide seamless integration with the management products you use on a daily basis. The key benefits are described below. Easy to Deploy Forefront Endpoint Protection makes it easy for desktop administrators to roll out a large-scale endpoint protection solution to all user desktops and portable computers, while the FEP Security Management Pack makes it simple to roll out real-time alerting and reporting for servers and critical, high-priority client computers. FEP comes complete with policy templates, for both recommended client configurations and typical server workloads, which are ready to use right out-of-the box, taking the guesswork out of security management. While no advanced customization is required, it is easy to customize policies to meet the needs of your organization. Forefront Endpoint Protection supports deployments that are built on the familiar System Center Configuration Manager software distribution infrastructure, while the FEP Security Management Pack, built on System Center Operations Manager, supports servers and critical high-priority client computers. Using Forefront Endpoint Protection, you can deploy the client Across various topologies to support non-domain-joined computers, endpoints at different branch offices, in addition to unmanaged (stand-alone) clients. To seamlessly upgrade or replace previously installed security solutions. On various Windows operating systems. Easy to Manage Forefront Endpoint Protection and the FEP Security Management Pack offer both the desktop administrator and the server administrator a streamlined security management experience. Built on the familiar System Center interfaces, it gives administrators simplified access to the information and tools they need in order to keep their enterprise secure and running, including the following: In FEP, policy-based administration Remediation capabilities including scanning and updating definitions on client computers Overview

13 Page number 12 Current and historical reporting that enables administrators to answer critical security questions, such as: What percentage of computers are currently protected? Is antivirus software installed and turned on? Are the latest definitions installed? What malware was detected in the organization? What computers currently have malware activity? How can I improve my organizational security? Forefront Endpoint Protection is built on System Center Configuration Manager, and the FEP Security Management Pack is built on System Center Operations Manager. Unified Protection Forefront Endpoint Protection delivers a single-agent, multithreat protection for desktops, portable computers, and the FEP Security Management Pack provides management of servers and critical high-priority client computers. Backed by a world-class response center and a dedicated community (Microsoft SpyNet ) serving millions of users, the FEP client includes: Antimalware and antispyware Rootkit detection and remediation Critical vulnerability assessment and automatic updates Integrated Windows Firewall management Network Inspection System The FEP client helps users stay secure and productive both at work and on the go with a lightweight, easy-to-use interface. It is built on the same antimalware engine as Microsoft Security Essentials (MSE), which has been delighting millions of consumers with low false positives and high catch rates. Whenever possible, the FEP client automatically solves security issues as they occur without disturbing users, so users can stay safe and continue with their work without contacting their desktop administrators. Decision Considerations for FEP and the FEP Security Management Pack Both FEP and the FEP Security Management Pack provide best-of-breed security protection for desktops, portable computers, and servers. You can implement either FEP or the FEP Security Management Pack, or you can implement both to take advantage of the features of each. Choosing when to implement each requires that you evaluate your security needs. Consider the questions in the following table. Overview

14 Page number 13 If Then You are already using System Center Configuration Manager to manage your enterprise You can easily implement Forefront Endpoint Protection to integrate security into your computer management solution. You are using System Center Operations Manager to manage your data center You can implement the FEP Security Management Pack to monitor your servers and critical high-priority computers. You need real-time reporting and monitoring for any of your computers or servers The FEP Security Management Pack can provide realtime monitoring and alerting for the servers (and highpriority client computers) you designate. You are using the Desired Configuration Management (DCM) feature in Configuration Manager Forefront Endpoint Protection provides additional DCM checks that allow you to report on the status of security areas within your Configuration Manager environment. You are managing any branch offices or non-domain-joined clients Configuration Manager supports both of these scenarios, and Forefront Endpoint Protection, built on Configuration Manager, can take full advantage of this support. The desktop administrators in your organization are responsible for desktop security If you have implemented Configuration Manager for desktop administration, your desktop administrators can work within the familiar interface of Configuration Manager. You need historical reporting for malware events Both Forefront Endpoint Protection and the FEP Security Management Pack are an option for you. Both maintain a historical record of malware information in your organization. Overview

15 Page number Dashboard Overview The Forefront Endpoint Protection dashboard provides key information for tracking the status of client software deployments, antimalware activity, definition updates, policy distributions, and client software compliance. The dashboard contains several summary areas displayed on a single page, and works by querying the Configuration Manager Site database, and using the resulting data sets to present key metrics in a graphical format. The Forefront Endpoint Protection dashboard is located in the Configuration Manager console, in the following path in the tree: Site Database / Computer Management / Forefront Endpoint Protection The following table describes the summary areas displayed in the Forefront Endpoint Protection dashboard: Summary area Description Client Deployment Status This area displays the following information: The number of computers in your organization to which the client software was not targeted. The number of computers in your organization to which the client software is targeted. The set of computers to which the client software is targeted is divided into the following deployment states: Removed Failed Pending Out of date Deployed Protection Status This area displays the reporting status for the FEP client software. There are three possible status values: Protection service off The number of computers on which the FEP antimalware service is turned off. Not reporting The number of computers to which the FEP client has Dashboard Overview

16 Page number 15 been deployed, but have not sent a status report back to the Configuration Manager server in the past 14 days. Healthy The number of computers running the FEP client software and have sent a status report back to the Configuration Manager server in the past 14 days. Security Status This area displays information about malware activity in your organization. The possible states of the FEP client software are as follows: Infected The number of computers on which the FEP client software has detected active malware. Restart required The number of computers running the FEP client software that require a restart in order to complete malware cleaning. Full scan required The number of computers running the FEP client software that require a full scan. Recent malware activity (Last 24 hours) The number of computers on which the FEP client software detected and cleaned malware within the last 24 hours. Definition Status This area displays information about the age of the FEP antimalware definitions on the client computers. Computers are listed according to the age category into which the definitions fall. The following is a list of possible categories: Older than 1 week The number of client computers with definitions more than 1 week old. Up to 7 days old The number of client computers with definitions up to 1 week old. Up to 3 days old The number of client computers with definitions up to 3 days old. Up to date The number of client computers with up-to-date definitions. Data for this dashboard area is collected by Configuration Manager Desired Configuration Manager (DCM) baselines. For more information about DCM baselines and Forefront Endpoint Protection, see Using Desired Configuration Management to Monitor Client Compliance. Dashboard Overview

17 Page number 16 Policy Distribution Status This area displays information about the possible policy distribution states for the FEP client software. The following is a list of the possible states: Failed The number of computers to which a policy could not be deployed. Pending The number of computers to which a policy is in the process of being deployed. Distributed The number of computers to which a policy was successfully deployed. Forefront Endpoint Protection Baselines This area displays summary status information for FEP client compliance with FEP configuration baselines. For more information, see Using Desired Configuration Management to Monitor Client Compliance. 5. Reports Overview Reporting in Forefront Endpoint Protection is integrated into the Configuration Manager console. The information is gathered using the standard Configuration Manager data collection mechanism and is stored in the Forefront Endpoint Protection reporting database. Since this information is gathered at scheduled intervals, reports may not reflect the most recent information. Forefront Endpoint Protection presents the information gathered in the reporting database in summary and detailed reports, and contain links that can be clicked to view the related reports. There are several predefined reports located under the Forefront Endpoint Protection Reports node and under the standard Configuration Manager Reporting node. Reports broadly divide into security reports and operational reports respectively. The following table is a list of the available reports. Report name Description Type Antimalware Activity Report This report provides an overview of antimalware status, malware alerts, and malware detections. Security Antimalware Protection Summary Report This report provides an overview of antimalware deployment and health. Security Reports Overview

18 Page number 17 Malware Details Report This report displays further details about a specific malware. Security Computer List Report This report displays a list of computers that can be filtered by collection, name, protection status, security state, antimalware signature version, detected malware, and last antimalware scan time. Security Computer Details Report This report displays further details about a specific computer. Security Deployment Overview This report displays the breakdown of the Microsoft Forefront Endpoint Protection 2010 client deployment status per collection. Operational Deployment for a specific collection This report displays the breakdown of the Microsoft Forefront Endpoint Protection 2010 client deployment status for a specific collection. Operational Computers with a specific deployment state This report displays a list of computers in a collection and the specific deployment state. Operational Policy Distribution Overview This report displays the breakdown of policy distribution states per collection. The report will only enumerate computers with Microsoft Forefront Endpoint Protection 2010 deployed. Operational Policy Distribution for a specific collection This report displays the policy distribution states for a specific collection. Operational Computers with a specific policy distribution state This report displays a list of computers in a collection and the specific policy state. Operational FEP information for a specific computer This report displays a summary of Forefront Endpoint Protection information for a specific computer. Operational Reports Overview

19 Page number System Requirements To get started with Microsoft Forefront Endpoint Protection 2010, your computers must meet the minimum requirements for installing the Forefront Endpoint Protection server and deploying the Forefront Endpoint Protection client. Use the following topics to help you prepare the computers in your environment: Prerequisites for Installing Forefront Endpoint Protection on a Server Prerequisites for Deploying Forefront Endpoint Protection on a Client Prerequisites for Importing the Forefront Endpoint Protection Security Management Pack Prerequisites for Installing Forefront Endpoint Protection on a Server The Forefront Endpoint Protection Setup wizard includes a prerequisites verification that checks that the prerequisites are already installed before you continue with the installation. If the prerequisites verification check identifies missing prerequisites, the check points you to locations where you can download and install the required components. Forefront Endpoint Protection Server Prerequisites The following table is the list of minimum requirements for installing the Forefront Endpoint Protection server. Prerequi site Minimum requirements Notes Memory 2 GB of RAM Available disk space Forefront Endpoint Protection server: 600 MB Forefront Endpoint Protection database: 1.25 GB Forefront Endpoint Protection reporting database: 1.25 GB For large scale deployments comprised of more than 10,000 client computers, on the computer running Microsoft SQL Server where the Forefront Endpoint Protection reporting database resides, the tempdb must be configured with a 500 GB Logical Unit Number (LUN) for its data file. For more information about configuring the tempdb data file, see Optimizing tempdb Performance ( Operatin g system Windows Server 2003 Standard, Enterprise, or Datacenter Edition Service Pack 2 (x86 or x64), or Windows Server 2008 System Requirements

20 Page number 19 Standard, Enterprise, or Datacenter Service Pack 1 (x86 or x64), or Windows Server 2008 R2 Standard, Enterprise, or Datacenter (x64) Databas e servers Microsoft SQL Server 2005 Standard or Enterprise Edition Service Pack 3 (x86 or x64), or Microsoft SQL Server 2008 Standard or Enterprise (x86 or x64), or Microsoft SQL Server 2008 R2 Standard or Enterprise (x86 or x64) When using an RTM release of SQL Server 2008, make sure that the default instance is defined. If the default instance is not defined, reporting and alerting does not function, because data cannot flow up to the Configuration Manager site server. Verify that all computers that are running SQL Server are joined to the domain, that the user account running Setup is a member of sysadmin SQL server role, and that all SQL Server services are running. Additionally, in nonclustered SQL Server environments, the SQL Server services should be configured to start automatically. The user account running Setup will be set as the owner of the following SQL Server databases and jobs: FEPDB_XXX (database) FEPDW_XXX (database) FEP_DataWarehouseMaintenance _FEPDW_XXX (job) FEP_DB_Maintenance_FEPDB_XX X (job) FEP_GetNewData_FEPDW_XXX (job) FEP_GetNewDataOnInstall_FEPD W_XXX (job) System Requirements

21 Page number 20 Addition al require ments for installing Forefron t Endpoint Protecti on reportin g database SQL Server Analysis Services SQL Server Integration Services SQL Server Reporting Services SQL Server Agent For SQL Server Analysis Services, the user account running Setup, or a domain group that it is a member of, must belong to the server administrator role on your specified SQL Server Analysis Server. For more information, see Analysis Server Properties Dialog Box ( ). The Forefront Endpoint Protection reporting database and server running SQL Server Analysis Services must be installed on the same SQL Server instance. On the computer that is running SQL Server Analysis Services, the following ports must be open for incoming traffic: SQL Server (TCP 1433) SQL Server Analysis Services (TCP 2383) For more information, see Configuring the Windows Firewall to Allow SQL Server Access ( For Forefront Endpoint Protection reporting to function, you must make sure that the Forefront Endpoint Protection client that is installed as part of Forefront Endpoint Protection has access to definition updates via the Configuration Manager client agent, Windows Server Update Services, or Microsoft Update. Addition al require ments for installing Forefron t The name you entered in the SQL Network Name box for your SQL Server cluster must be registered in the domain. SQL Server Integration Services must be installed System Requirements

22 Page number 21 Endpoint Protecti on reportin g database on a SQL Server cluster on all nodes and must be part of the cluster group. Configur ation Manager Microsoft System Center Configuration Manager 2007 Service Pack 2 installed with default roles, and either Microsoft System Center Configuration Manager 2007 R2 installed and configured to use SQL Server Reporting Services, or Microsoft System Center Configuration Manager 2007 R3 installed and configured to use SQL Server Reporting Services The following client agents are installed and configured: Hardware Inventory Software Distribution System Requirements

23 Page number 22 Desired Configuration Management Addition al require ments No other version of Forefront Endpoint Protection is installed Microsoft Windows Installer version 3.1 Microsoft.Net Framework 3.5 Service Pack 1 Configuration Manager Hotfix KB ( wlink/?linkid=203936) SQL Server Analysis Management Objects The computer where Setup is run is not pending a restart from a previous install or update The user account running Setup is a domain account for the domain of which the Forefront Endpoint Protection server is a member, has local administrative credentials, and has Configuration Manager administrative credentials You must install SQL Server Analysis Management Objects on the computer where Setup is run when the Forefront Endpoint Protection reporting database is being installed on a remote computer. You can download the SQL Server Analysis Management Objects for your version of SQL Server from the following locations: For SQL Server 2008 R2, visit Microsoft SQL Server 2008 R2 Feature Pack ( LinkId=206861), go to the Microsoft SQL Server 2008 R2 Analysis Management Objects section, and download the appropriate file based on your system architecture. For SQL Server 2008, visit Microsoft SQL Server 2008 Feature Pack ( LinkId=206625), go to the Microsoft Analysis Management Objects section, and download the appropriate file based on your system architecture. For SQL Server 2005, visit Feature Pack for Microsoft SQL Server 2005 ( LinkId=206624), go to the Microsoft SQL Server 2005 Management Objects Collection section, and download the appropriate file based on your System Requirements

24 Page number 23 system architecture. Forefront Endpoint Protection Console Prerequisites The following table is the list of minimum requirements for installing the Forefront Endpoint Protection console. Prerequisite Minimum requirements Configuration Manager Microsoft System Center Configuration Manager 2007 Service Pack 2 Console, or Microsoft System Center Configuration Manager 2007 R2, or Microsoft System Center Configuration Manager 2007 R3 Additional requirements Microsoft.Net Framework 3.5 Service Pack 1 Configuration Manager Hotfix KB ( The computer running Setup is not pending a restart from a previous install or update The user account running Setup is a domain account for the domain of which the Forefront Endpoint Protection server is a member, has local administrative credentials, and has Configuration Manager administrative credentials Prerequisites for Deploying Forefront Endpoint Protection on a Client The following table is a list of the prerequisites for deploying the Forefront Endpoint Protection on client computers. Prerequisite Requirement Configuration Manager A Microsoft System Center Configuration Manager 2007 site that has Forefront Endpoint Protection server installed. Note: If you have client computers that do not require the central deployment and management features of Forefront Endpoint Protection server, and you System Requirements

25 Page number 24 intend to manually install the Forefront Endpoint Protection client, the Configuration Manager prerequisites stated for client computers are not required. For more information, see Deploying the Client Software by Using the Command Prompt. Operating system Windows 7 (x86 or x64), or Windows 7 XP mode, or Windows Vista (x86 or x64) or later versions, or Windows XP Service Pack 2 (x86 or x64) or later versions, or Windows Server 2008 R2 (x64) or later versions, or Windows Server 2008 R2 Server Core (x64), or Windows Server 2008 (x86 or x64) or later versions, or Windows Server 2003 Service Pack 2 (x86 or x64) or later versions, or Windows Server 2003 R2 (x86 or x64) or later versions Note: On the following operating systems, the Forefront Endpoint Protection client software can be installed manually. However, policies cannot be applied to them, nor can they be centrally managed by Forefront Endpoint Protection. Windows 7 Starter Windows 7 Home Premium Windows Vista Basic Windows Vista Home Premium Windows XP Home Edition Available disk space 255 MB Additional Windows Installer 3.1 or later versions System Requirements

26 Page number 25 requirements Filter manager rollup package for Windows XP Service Pack 2 (x86) KB ( Competitive uninstall The client installation checks for and uninstalls the following existing antimalware clients: Symantec Endpoint Protection version 11 Symantec Corporate Edition version 10 McAfee VirusScan Enterprise version 8.5 and version 8.7 and its agent Forefront Client Security version 1 and the Operations Manager agent TrendMicro OfficeScan version 8 and version 10 Prerequisites for Importing the Forefront Endpoint Protection Security Management Pack The following table lists the minimum requirements for importing the Forefront Endpoint Protection Security Management Pack. Prerequisite Minimum requirement System Center Operations Manager 2007 System Center Operations Manager 2007 R2 The following table lists the minimum requirements for the Reporting management pack for use with the Forefront Endpoint Protection Security Management Pack. Prerequisite Minimum requirement Reporting components Reporting components must be installed for System Center Operations Manager 2007 R2 in order to use the Reporting feature. 7. Getting Started Before deploying Microsoft Forefront Endpoint Protection 2010, you should read the documentation carefully and plan your deployment according to your business needs. If planned correctly, Forefront Endpoint Protection can reduce your administrative overhead and total cost of ownership. If Forefront Endpoint Protection is deployed without sufficient planning you can disrupt your whole Getting Started

27 Page number 26 network, because Forefront Endpoint Protection has the potential to affect every computer in your organization. Because Forefront Endpoint Protection is built on System Center Configuration Manager, you should be familiar with Configuration Manager before you deploy Forefront Endpoint Protection. For more information, see System Center Configuration Manager 2007 ( Because the FEP Security Management Pack is built on System Center Operations Manager, you should be familiar with Operations Manager before deploying the FEP Security Management Pack. For more information, see System Center Operations Manager R2 ( Note: If you are new to Forefront Endpoint Protection, you should experiment in a test network environment before you deploy the product. Next Steps Plan the Forefront Endpoint Protection installation. For more information, see Planning and Architecture. Install Forefront Endpoint Protection on your Configuration Manager Site server. For more information, see FEP Import the FEP Security Management Pack on your Operations Manager server. For more information, see FEP 2010 Security Management Pack. Deploy Forefront Endpoint Protection policies and clients. For more information, see Client Deployment. Learn about routine operations. For more information, see Operations. Getting Assistance The Forefront Endpoint Protection online help and assistance options are available to you when you're planning, deploying, administering, and troubleshooting Forefront Endpoint Protection. Where to find Forefront Endpoint Protection Help and Assistance: Forefront Endpoint Protection TechNet Library ( The FEP TechNet library contains the most up-to-date product documentation. This documentation is updated as Forefront Endpoint Protection features evolve and new troubleshooting information becomes available. Forefront Endpoint Security Blog ( The Forefront Endpoint Security blog contains technical articles written by the Forefront Endpoint Protection team, in addition to product announcements and updates. Getting Started

28 Page number 27 Forefront Endpoint Protection Forum ( The forum provides a place to discuss Forefront Endpoint Protection with customers and Forefront Endpoint Protection team members. The Forefront Endpoint Protection forum is an excellent way to interact with the Forefront Endpoint Protection team and with other customers worldwide. The Forefront Endpoint Protection section of the TechNet Wiki ( The TechNet Wiki contains communitygenerated content about various Microsoft products, including Forefront Endpoint Protection. Through the use of the TechNet Wiki, you can share your knowledge and experience with other members of the community. Providing Feedback Your feedback about Microsoft Forefront Endpoint Protection 2010 will be greatly appreciated and will help Microsoft improve Forefront Endpoint Protection. Please submit all feedback to the Forefront Endpoint Protection Forum ( 8. Planning and Architecture The content in this section is designed to help you plan your Microsoft Forefront Endpoint Protection 2010 installation and the infrastructure required to support it. Before you install Forefront Endpoint Protection, it is recommended that you review the following sections: Planning Your Deployment Migrating from Forefront Client Security to Forefront Endpoint Protection Forefront Endpoint Protection 2010 Forefront Endpoint Protection easily installs into your existing Configuration Manager 2007 deployment. The Forefront Endpoint Protection server installation process automatically installs the required components to the correct servers based upon the Configuration Manager deployment. The following is a list of items that are installed during Forefront Endpoint Protection Setup. Installation item Description Forefront Endpoint Protection Site Server Extensions for Configuration Manager The Forefront Endpoint Protection Site server extensions for Configuration Manager. Forefront Endpoint Protection Console Extensions for The Forefront Endpoint Protection extensions to the Configuration Manager management console add views to Planning and Architecture

29 Page number 28 Configuration Manager manage and monitor Forefront Endpoint Protection client deployments. Forefront Endpoint Protection Database An auxiliary database used by Forefront Endpoint Protection. Forefront Endpoint Protection Reporting role Provides historical reports on Forefront Endpoint Protection client malware activity and client protection status. Forefront Endpoint Protection Reporting database The database for storing Forefront Endpoint Protection client protection status and malware activity historical data. Forefront Endpoint Protection Security Client The Forefront Endpoint Protection client is installed for access to antimalware metadata. The following items are installed during the installation of Forefront Endpoint Protection Site Server Extensions for Configuration Manager: The FEP Deployment package. The FEP Policies package. The FEP Operations package. Forefront Endpoint Protection Operations tasks are added to the Configuration Manager right-click context menu, and the Actions pane for a computer objects. Forefront Endpoint Protection desired configuration management configuration baselines and configuration items. Forefront Endpoint Protection related collections. Forefront Endpoint Protection client deployment and policy distribution reports are added to Configuration Manager reporting. Forefront Endpoint Protection and High Availability Forefront Endpoint Protection is installed on top of Configuration Manager and is dependent on the availability of the Configuration Manager services. The following items are Forefront Endpoint Protection server deployment recommendations for high availability: Use clustered SQL Server for the Forefront Endpoint Protection reporting database. Use the System Center Operations Manager Forefront Endpoint Protection Monitoring Management Pack to monitor Forefront Endpoint Protection services. Planning and Architecture

30 Page number 29 About Configuration Manager Site Topologies and FEP 2010 Forefront Endpoint Protection can be deployed to a Configuration Manager stand-alone (single) site or to a hierarchical site environment. Installation of Forefront Endpoint Protection on secondary sites is not supported. For more information about Configuration Manager sites, see Understanding Configuration Manager Sites ( Single-Site Deployment In a single-site Configuration Manager deployment, Forefront Endpoint Protection is installed on the Configuration Manager site server. The Configuration Manager administrator will perform the following tasks from the Configuration Manager console: Create or modify Forefront Endpoint Protection policies. Assign Forefront Endpoint Protection policies to collections. Deploy Forefront Endpoint Protection clients to collections. Monitor Forefront Endpoint Protection via the Forefront Endpoint Protection dashboard. Configure Forefront Endpoint Protection alerts. Assign the Forefront Endpoint Protection Desired Configuration Management baselines to collections. Hierarchical Deployment In a hierarchical Configuration Manager deployment, there is a parent site that has one or more sites (children) attached to it in the hierarchy. A parent site contains pertinent information about its lower-level sites and it can control many operations at the child sites. A site that has no parent site is known as a central site. For more information about planning and deploying Configuration Manager, see Planning and Deploying the Server Infrastructure for Configuration Manager 2007 ( Forefront Endpoint Protection can be installed in the following combinations: Parent and child sites Parent site Child sites The administrative control requirements will determine where Forefront Endpoint Protection should be installed: For centralized policy creation and control, install Forefront Endpoint Protection on the parent site. When Forefront Endpoint Protection is also installed on the child sites, policies are replicated from the parent site to the child sites. Installing Forefront Endpoint Protection on the child sites allows the administrator to view the FEP dashboard when connected to the child site via the Configuration Manager console. Planning and Architecture

1. Server 2008 - Microsoft FEP 2010 - Instalation

1. Server 2008 - Microsoft FEP 2010 - Instalation 1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements

More information

Microsoft Forefront Endpoint Protection 2010 Evaluation Guide

Microsoft Forefront Endpoint Protection 2010 Evaluation Guide Forefront Endpoint Protection 2010, the next version of Forefront Client Security, enables businesses to simplify and improve endpoint protection while greatly reducing infrastructure costs. It builds

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Maintaining, Updating, and Protecting Windows 7

Maintaining, Updating, and Protecting Windows 7 Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

System Center Configuration Manager

System Center Configuration Manager System Center Configuration Manager Software Update Management Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010. Situation Microsoft IT had limited monitoring and reporting functionality with its existing antimalware system. Although the system could scan for malware, there was no reporting capability or configurable

More information

Windows Server Update Services 3.0 SP2 Operations Guide

Windows Server Update Services 3.0 SP2 Operations Guide Windows Server Update Services 3.0 SP2 Operations Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide describes how to manage Windows Server Update Services 3.0

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Installing and Administering VMware vsphere Update Manager

Installing and Administering VMware vsphere Update Manager Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

Client Manager for Endpoint Protection (CMEP) User s Guide

Client Manager for Endpoint Protection (CMEP) User s Guide Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

BitDefender Security for Exchange

BitDefender Security for Exchange Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Backup Exec System Recovery Management Solution 2010 FAQ

Backup Exec System Recovery Management Solution 2010 FAQ Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation

More information

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol... Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Using WMI Scripts with BitDefender Client Security

Using WMI Scripts with BitDefender Client Security Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

How To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook

How To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook Page 1 of 285 User Guide - Exchange Mailbox idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX IDATAAGENT DEPLOYMENT -

More information

System Center Configuration Manager 2007

System Center Configuration Manager 2007 System Center Configuration Manager 2007 Software Distribution Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has

More information

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013 Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management

More information

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Authoring for System Center 2012 Operations Manager

Authoring for System Center 2012 Operations Manager Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack

More information

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment... Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Forefront Client Security. Ronald Beekelaar Beekelaar Consultancy ronald@beekelaar.com

Forefront Client Security. Ronald Beekelaar Beekelaar Consultancy ronald@beekelaar.com Forefront Client Security Ronald Beekelaar Beekelaar Consultancy ronald@beekelaar.com Introductions Presenter Ronald Beekelaar MVP Windows Security MVP Virtual Machine Technology E-mail: ronald@beekelaar.com

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide A P P L I C A T I O N V E R S I O N : 9. 0 Dear User! Thank you for choosing our product. We hope that this document will help

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Core Protection Module 1.6 powered by. User s Guide

Core Protection Module 1.6 powered by. User s Guide Core Protection Module 1.6 July, 2010 BigFix Core Protection Module 1.6 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix

More information

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in

More information

GFI Product Manual. Version 6.0. Getting Started Guide

GFI Product Manual. Version 6.0. Getting Started Guide GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

GFI Cloud User Guide A guide to administer GFI Cloud and its services

GFI Cloud User Guide A guide to administer GFI Cloud and its services GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is

More information

Sophos Cloud Migration Tool Help. Product version: 1.0

Sophos Cloud Migration Tool Help. Product version: 1.0 Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How

More information

Microsoft Corporation. Project Server 2010 Installation Guide

Microsoft Corporation. Project Server 2010 Installation Guide Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

User Guide - Exchange Public Folder idataagent

User Guide - Exchange Public Folder idataagent Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

What is Windows Intune? The Windows Intune Administrator Console. System Overview

What is Windows Intune? The Windows Intune Administrator Console. System Overview What is Windows Intune? Windows Intune helps you manage and secure computers in your environment through a combination of Windows cloud services and upgrade licensing. Windows Intune delivers cloud-based

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Providing Patch Management With N-central. Version 7.2

Providing Patch Management With N-central. Version 7.2 Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012

Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012 coursemonster.com/me Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012 View training dates» Overview Elements of this syllabus may be subject to change

More information

Sophos Computer Security Scan startup guide

Sophos Computer Security Scan startup guide Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4

More information

How To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X

How To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

Enterprise Manager. Version 6.2. Administrator s Guide

Enterprise Manager. Version 6.2. Administrator s Guide Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version

More information

Welcome to the QuickStart Guide

Welcome to the QuickStart Guide QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Table of Contents. 10.0 Release Notes 2013/04/08. Introduction ... 3. in OS Deployment Manager. in Security Manager ... 7. Known issues ... 9 ...

Table of Contents. 10.0 Release Notes 2013/04/08. Introduction ... 3. in OS Deployment Manager. in Security Manager ... 7. Known issues ... 9 ... Release Notes Release Notes 2013/04/08 Table of Contents Introduction... 3 Deployment Manager... 3 New Features in Deployment Manager... 3 Security Manager... 7 New Features in Security Manager... 7 Known

More information

SafeGuard Enterprise upgrade guide. Product version: 6.1

SafeGuard Enterprise upgrade guide. Product version: 6.1 SafeGuard Enterprise upgrade guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6

More information

Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition

Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition ADMINISTRATOR'S GUIDE PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this document

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide APPLICATION VERSION: 9.0 MAINTENANCE RELEASE 1 Dear User! Thank you for choosing our product. We hope that this document will

More information