Lumension Endpoint Management and Security Suite

Size: px
Start display at page:

Download "Lumension Endpoint Management and Security Suite"

Transcription

1 Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension

2 L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module Description... 3 Objective... 4 Evaluation Scenarios... 4 Prepare Test Environment... 4 Scan Your Endpoint Environment... 8 Remediate Selected Vulnerabilities... 9 Deploy Software to Endpoints Create a Mandatory Baseline Set up Hours of Operation and Wake-on-LAN Reporting Evaluation Wrap-up

3 Introduction This document is designed to assist you in implementing the Lumension Endpoint Management and Security Suite (L.E.M.S.S.) Patch and Remediation Module and to use it as an ongoing record of your observations and feedback during the evaluation process. Module Description Lumension Patch and Remediation is the market-leading solution that identifies and patches vulnerabilities across the entire organization, supporting heterogeneous operating systems, configurations and all major 3rd party applications, and managed through a single console. Lumension Patch and Remediation seamlessly integrates with Lumension Endpoint Management and Security Suite, which simplifies endpoint management and control and reduces TCO by consolidating different product modules into a single console, server and agent platform architecture. Lumension Patch and Remediation provides: Heterogeneous OS support for easy patch and remediation administration across multiple platforms - Windows, Unix, Linux and Mac OS. The industry s broadest third party vulnerability content available, including the largest repository of Adobe vulnerability content. Integrated asset discovery for full network visibility and continuous control across both physical and virtual environments. Automated policy baselines to ensure that patches, configurations, remediations, and other tasks are continuously enforced. Enhanced Wake-on-LAN to ensure complete control over the patching process, provide flexibility for when patches are deployed and to bring powered down systems back online to ensure that critical patches and software updates are successfully deployed. Power management reporting to effectively demonstrate power consumption savings and to provide necessary information to apply for utility rebate programs through local utility providers. 1 Patented Fingerprinting 2 technology which determines whether an endpoint is patched or un-patched across a variety of OS s and applications. Extensibility and customization via Lumension Content Wizard including power policy management, software deployment and removal, desktop configuration templates and custom task scripting. IT risk management integration via Lumension Risk Manager to automatically assess controls and potential deficiencies for IT risk management prioritization and compliance reporting. Lumension Patch and Remediation uniquely addresses the 3 main challenges you face in regards to the tidal wave of software vulnerabilities that exist in your organization: 1. Accurately identifying and analyzing all the software vulnerabilities on all endpoints, physical or virtual, online or offline; 2. Rapidly patching vulnerabilities with minimal user impact; 3. Monitoring patch efficacy and demonstrating policy compliance. 1 This is a separately licensed capability available through Lumension Patch and Remediation. 2 U.S. Classification: ; ; ; International Classification: G06F011/30; G06F009/44; G06F009/445 3

4 Objective The goal of this evaluation guide is to assist you in implementing Lumension Endpoint Management and Security Suite (L.E.M.S.S.): Patch and Remediation and to guide you through the evaluation process. We recommend that you implement this solution on a small group of endpoints. The task list includes the following: 1. Prepare test environment 2. Scan your endpoint environment 3. Mitigate the threat remediate selected vulnerabilities 4. Create a mandatory baseline 5. Set up Hours of Operation and Wake-on-LAN Evaluation Scenarios Prepare Test Environment Business Context: Install the L.E.M.S.S. software onto the server and L.E.M.S.S. agent onto a small group of endpoints, per the L.E.M.S.S. platform evaluation guide. Once installed, create an additional Patch Administrator role for someone to be in charge of Patch and Remediation policies. Next, deploy Patch agent plugin to endpoint agents. Finally, create a custom group for test endpoints. Expected Outcome: L.E.M.S.S. and the Patch module are fully operational and ready for evaluation on the server and a small group of endpoints. A new role has been defined on the server for the purpose of enforcing IT security and administration of Patch and Remediation policies. A custom group of endpoints has been created for group management purposes. Create Patch Administrator role 1. Navigate to Tools > Users/Roles and select the Roles tab 2. Click the Create button 3. Enter a name for the role (i.e. Patch Manager) and use the Manager role as a template 4. On the access rights tab remove all rights in the Jobs, content, antivirus, device control, application control, and application library sections 5. Click OK 6. Verify that the new role was created 7. Go to the Users tab and click Create 8. Click Next and enter the user name PatchManager 9. Enter any password you like and select the newly created role 10. Click Finish 11. Verify that the new user has been created 4

5 5

6 Deploy Patch Agent Plugin 1. Navigate to Discover > Assets to perform an asset discovery by computer name or IP range 2. Based on the results of the asset discovery, install the patch agent plugin on a small group of endpoints. 3. Review the results of the job 4. Verify that the agent plugin is installed. 6

7 ENDPOINT TASKS 1. Check endpoint performance and CPU utilization 2. Launch the Agent Control Panel and verify that the Patch module agent plugin was installed successfully. REVIEW RESULTS 7

8 Create Custom Group for Endpoints 1. Navigate to Manage > Groups and select the Group Membership view 2. Select Custom Groups in the Group Browser section 3. Click the Create button 4. Enter a name for the group called Public Use Desktops and save 5. Click Public Use Desktops, then change the view to Endpoint Membership 6. Click the Manage button 7. Select the endpoints for the group then click the Assign button 8. Once all endpoints are assigned, click the OK button Scan Your Endpoint Environment Business Context: With over 30,000 known software vulnerabilities, accurately identifying and analyzing all of the possible threats to all of your computers can appear to be an insurmountable challenge. In this task, you will scan your computer for any known vulnerabilities. Expected Outcome: Lumension Patch and Remediation returns all the vulnerabilities identified on the scanned assets, both physical and virtual, online. Vulnerabilities include security configurations, OS and application vulnerabilities patch-level related vulnerabilities, and P2P software checks. 8

9 Lumension Patch and Remediation supports all major OS platforms (Windows XP to Windows 7 and Server 2008 R2; Linux; MacOS; Sun Solaris; HP; etc.). LPR also addresses all your software application vulnerability patching needs to strengthen your endpoint security posture. 1. Open the LEMSS HomePage from any compatible web browser. 2. Navigate to Manage > Groups and select the custom group previously created 3. Right click and set you view to Vulnerabilities 4. Review Vulnerabilities provides a scorecard of vulnerabilities to the number of machines applicable. The Vulnerabilities view shows a list of all of the vulnerabilities that the agent discovered from its latest internal machine scan, per the filtering criteria as defined in the filter options in the upper right hand corner. Lumension Patch and Remediation provides an automated mechanism for gathering software updates from most leading operating system and application developers, with multiple thousands of vulnerability signatures currently available, ensuring broad coverage for today s heterogeneous environments. REVIEW RESULTS Remediate Selected Vulnerabilities Business Context: Once the identification and analysis is complete, you may discover a sizeable number of known vulnerabilities that could afford cybercriminals a means to penetrate your environment. How do you effectively remediate all of these threats in order to dramatically improve your risk posture and avoid costly, embarrassing attacks? Get ready to deploy patches to all affected endpoints. You ll want to prioritize your remediations by groups, business impact, and level of importance of the patches. Use LEMSS to deploy the latest Patch Tuesday security releases. Expected Outcome: Once vulnerabilities have been identified and analyzed, you can remediate them easily by using the Lumension Patch and Remediation deployment wizard. All critical and recommended updates (shown as vulnerable ) will be deployed and installed on all common-use computers. Additionally, for a specified group or individual endpoint, review the Vulnerabilities list to see what is missing and schedule these deployments as well. 9

10 1. On the Manage > Groups Vulnerabilities page view, check the box next to the vulnerability name and click the Deploy button. 2. Click Next to enter the wizard. 3. Within the wizard, the system has already identified the vulnerable computers that require the patch for the selected vulnerability. 4. Continue to click Next to move through the wizard to show a. Deployment Options i. How you can select the date and time of deployment ii. How you can set bandwidth throttling to control how many agents can communicate with the server simultaneously. (Note: you must name the deployment to move to the next screen) b. Package Deployment Order and Behavior i. Ability to auto-qchain patches together ii. Control of whether computers are to be rebooted c. Notification Options i. Ability to notify users of deployments and provide them with the ability to delay deployments for a period of time that you define. 5. At the end of the wizard process, the Deployment Confirmation screen appears. The deployment is now ready to be scheduled. This means that each agent now picks up its deployment the next time it checks in with the server. 6. The flexibility of the Wizard allows the administrator granular control over all aspects of the deployment, or the ability to simply accept the system defaults and deploy patches with a few mouse clicks. 10

11 11

12 ENDPOINT TASKS: 1. Navigate to and log on to your endpoint in the custom group 2. Once deployments are completed, verify that the endpoint has been updated and is working properly 3. Confirm that the patches were installed. REVIEW RESULTS: Log on to the L.E.M.S.S. endpoint management console to verify that the patches have been deployed successfully. Deploy Software to Endpoints Business Context: Install the latest software, such as Firefox or Chrome web browsers, Adobe Reader, etc. to ensure all endpoints are up to date with the most recent version. Expected Outcome: The latest version of the selected software, such as Firefox or Chrome, will be installed on all common-use computers. 1. Run a Discover Applicable Updates task in your group of endpoints 2. Create a deployment based on Software Installers for the group (use Mozilla Firefox Google Chrome or any other applicable application) 3. Review the progress of deployments as they are delivered to endpoints. ENDPOINT TASKS 1. Navigate to and log on to your endpoint in the custom group. 2. Once deployments are completed, verify that the endpoint has been updated and is working properly 3. Confirm that the application was installed. 12

13 REVIEW RESULTS 1. Log on to the L.E.M.S.S. endpoint management console and verify that the software installation was successful. Create a Mandatory Baseline Business Context: Once endpoints have been patched and properly configured per your business policy, you ll want to ensure that endpoints will remain in this compliant state as well as allow new endpoints in your environment to adopt the same configuration rules. Lumension Patch and Remediation utilizes mandatory baselines to accomplish this goal. Mandatory baselines represent the absolute minimum set of content or locally-created distribution packages that must be installed on a group s endpoints. Baselines continually verify that the applicable content items are installed on group endpoints. If a group endpoint is found in a Non-compliant state (does not have an item defined in the baseline installed), L.E.M.S.S. automatically deploys the applicable content until the endpoint is once again compliant. For example, you can set a Mandatory Baseline for all endpoints within a group that must have Microsoft Windows Messenger installed. If Messenger is deleted on a group member s endpoint, L.E.M.S.S. reinstalls Messenger. Expected Outcome: After content items are added to a group's Mandatory Baseline, Lumension Endpoint Management and Security Suite schedules a series of scans and deployments until the group complies with the baseline. Your endpoints will maintain their patched status and configuration per your business policy, and new endpoints that are added to your endpoint environment will be configured to reflect the mandatory baseline. 1. Navigate to Manage > Groups 2. Select your custom group Public Use Desktops 3. Right click on your group and change the view to Mandatory Baseline 4. Click on Manage to build your Mandatory Baseline 5. From the bottom of the screen, select the vulnerabilities or content you would like to add to your Mandatory Baseline 6. Click Assign, then OK when done 13

14 ENDPOINT TASKS 1. Navigate to and log on to your endpoint in the custom group. 2. Once deployments are completed, verify that the endpoint has been updated and is working properly. 14

15 3. Confirm that the endpoint complies with the baseline. REVIEW RESULTS 1. Log on to the L.E.M.S.S. endpoint management console and verify that the endpoints are compliant with your business policy. Set up Hours of Operation and Wake-on-LAN Business Context: Performing maintenance tasks on endpoints can have a tremendous impact on business operations if performed during regular business hours. Users will be inconvenienced and have downtime, while maintenance tasks could negatively impact network performance. However, if you set up Hours of Operation for each user group, you can schedule maintenance tasks during off-hours and don t have to impact your user community. Since many machines may be powered down during off-hours due to power conservation policies, waking up these machines prior to deploying patches and performing maintenance will be critical. Expected Outcome: Your groups of endpoints will be set up to follow group-specific hours of operation. When performing maintenance tasks on these endpoint groups, you will be able to schedule them during off-hours and take advantage of Enhanced Wake-on-LAN to wake up any offline machine and power them down again once maintenance is complete. As a result, you will minimizes business disruptions and thus improve the productivity of your organization. 1. Navigate to Manage > agent Policy Sets 2. Click on Create to generate a new policy 3. Scroll down to the Patch agent Communication section and click on the Define button to enter the Hours of Operations configuration window 4. You can select the Day or time to set the operational hours 5. You can set the Hours of Operations in 30 minute increments, 24 hours a day, 7 days a week 6. The areas in red are the times when the agent will be asleep and not communicating to the server. 15

16 ENDPOINT TASKS 1. Navigate to and log on to your endpoint in the custom group. 2. Once deployments are completed, verify that the endpoint has been updated and is working properly. 3. Confirm that the endpoint complies with the baseline. REVIEW RESULTS 1. Log on to the L.E.M.S.S. endpoint management console and verify that the endpoints are compliant with your business policy. Reporting Business Context: With mounting pressure to comply with internal security policies and external regulations, identifying and removing vulnerabilities is no longer enough. Now you must be able to prove ongoing patch efficacy and easily report on all aspects of their vulnerability management process. Expected Outcome: Lumension Patch and Remediation enables you to prove the effectiveness of your vulnerability management process though ongoing patch monitoring and rapid, flexible report generation. The agent continuously scans the machine to determine the efficacy of the remediation activities it has performed, on a pre-defined schedule set by the administrator. The information from these DAU (Discover Applicable Update) scans is propagated to the server(s), where it is available for analysis and reporting. Powerful and flexible reporting options are available to both assist in the vulnerability management process and prove compliance with internal security policies and external regulatory requirements. 1. Access the report window by navigating to the Reports tab. 2. Reports are arranged by categories for easy reporting. By selecting the individual categories, the various reports are displayed. Or, of course, you can list all for an alphabetical listing. 3. In the reports window that opens, the Patch and Remediation server contains 29 standard application report templates that provide a wide range of information on vulnerabilities, deployments, policy compliance and with multiple configurable items and a description of the type of report and the export type, as well. 4. Click on the Deployment Summary Report. The flexible structure of the report template allows for the selection of a wide range of criteria at different levels of aggregation. 5. Select all Available Deployments by clicking on the 2 downward pointing arrows and click Generate Report to run the report. 16

17 Evaluation Wrap-up Lumension Endpoint Management and Security Suite: Patch and Remediation is a powerful rolebased application that provides a wide range of capabilities, some that were not discussed, including detailed inventory assessments, software distribution, custom package creation, and many more. In addition to Lumension Patch and Remediation, Lumension offers Lumension Content Wizard that extends the capabilities of Lumension Patch and Remediation with custom scripting capabilities. The included Content Wizards include custom detection, deployment, patching, and remediation of 3rd party and in-house content, as well as creating custom checks and remediation to detect and alleviate security risks and operational efficiency issues in your environment. Examples include: making sure AV is installed, distributing 3rd party patches, following application deltas, and more. LCW improves your operational efficiency by simplifying remediation package development and providing centralized deployment, management and reporting on all custom IT scripts. 17

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation Version 7.0 SP1 Evaluation Guide September 2010 Version 2.4 Copyright 2010, Lumension, Inc. Table of Contents Lumension Endpoint

More information

Lumension Guide to Patch Management Best Practices

Lumension Guide to Patch Management Best Practices Lumension Guide to Patch Management Best Practices With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security

More information

Vulnerability Management ROI Calculator User Guide. v2.0 Monday, September 29, 2008. www.lumension.com. Copyright 2008, Lumension Security

Vulnerability Management ROI Calculator User Guide. v2.0 Monday, September 29, 2008. www.lumension.com. Copyright 2008, Lumension Security Vulnerability Management ROI Calculator User Guide v2.0 Monday, September 29, 2008 Copyright 2008, Lumension Security www.lumension.com Vulnerability Management ROI Calculator Overview The Lumension Security

More information

UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab

UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab Description The objective of this course is to introduce students to the various concepts of 3rd party patching. Students will

More information

Patch Management SoftwareTechnical Specs

Patch Management SoftwareTechnical Specs Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Patch Management Reference

Patch Management Reference www.novell.com/documentation Patch Management Reference ZENworks 11 SP3 February 2014 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Patch Management Reference

Patch Management Reference Patch Management Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Actualtests.C2010-508.40 questions

Actualtests.C2010-508.40 questions Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got

More information

Why Free Patch Management Tools Could Cost You More

Why Free Patch Management Tools Could Cost You More Why Free Patch Management Tools Could Cost You More Selecting the right solution can save your organization time and money By KACE & Lumension Table of Contents 1.0 Introduction... 3 2.0 Point Patching

More information

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006 How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management White Paper Sept. 2006 Introduction It happens, five, ten, twenty times a month: A hardware or software vendor

More information

Complete Patch Management

Complete Patch Management Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia

More information

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time 1 Tivoli Endpoint Manager Increasing the Business Value of IT, One Endpoint at a Time Endpoint Management Cost Today s Endpoint Management Challenges Drive IT Costs Up More than 50% of end users change

More information

Dell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide

Dell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide Dell KACE K1000 System Management Appliance Version 5.4 Patching and Security Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

ALTIRIS Patch Management Solution 6.2 for Windows Help

ALTIRIS Patch Management Solution 6.2 for Windows Help ALTIRIS Patch Management Solution 6.2 for Windows Help Notice Altiris Patch Management Solution 6.2 2001-2006 Altiris, Inc. All rights reserved. Document Date: February 13, 2007 Protected by one or more

More information

mystanwell.com Installing Citrix Client Software Information and Business Systems

mystanwell.com Installing Citrix Client Software Information and Business Systems mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

Dell KACE K1000 Management Appliance. Patching and Security Guide. Release 5.3. Revision Date: May 13, 2011

Dell KACE K1000 Management Appliance. Patching and Security Guide. Release 5.3. Revision Date: May 13, 2011 Dell KACE K1000 Management Appliance Patching and Security Guide Release 5.3 Revision Date: May 13, 2011 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and agreements,

More information

Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions

Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions Disclaimer: As with any software upgrade or new release, it is strongly encouraged to fully test the new build within your environment prior

More information

Northwestern University Dell Kace Patch Management

Northwestern University Dell Kace Patch Management Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.

More information

Installing and Administering VMware vsphere Update Manager

Installing and Administering VMware vsphere Update Manager Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Citrix : Remediation - MAC

Citrix : Remediation - MAC Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing

More information

Novell ZENworks Patch Management Powered by PatchLink Corporation

Novell ZENworks Patch Management Powered by PatchLink Corporation Novell ZENworks Patch Management Powered by PatchLink Corporation V6.0 Administration Guide Novell, Inc. 404 Wyman Street, Suite 500 Waltham, MA 02451 2004 Novell, Inc. All Rights Reserved. http://www.novell.com

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014 Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products

More information

Patch Management Reference

Patch Management Reference www.novell.com/documentation Patch Management Reference ZENworks 11 SP4 November 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

VMware vcenter Update Manager Administration Guide

VMware vcenter Update Manager Administration Guide VMware vcenter Update Manager Administration Guide Update 1 vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust

More information

RMM/MDM. Quick Reference Guide

RMM/MDM. Quick Reference Guide RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators

More information

Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide

Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Planning your migration with Service Pack 1 This document provides guidance for customers who plan

More information

Closing the Vulnerability Gap of Third- Party Patching

Closing the Vulnerability Gap of Third- Party Patching SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

CA Vulnerability Manager r8.3

CA Vulnerability Manager r8.3 PRODUCT BRIEF: CA VULNERABILITY MANAGER CA Vulnerability Manager r8.3 CA VULNERABILITY MANAGER PROTECTS ENTERPRISE SYSTEMS AND BUSINESS OPERATIONS BY IDENTIFYING VULNERABILITIES, LINKING THEM TO CRITICAL

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

HP Server Automation Enterprise Edition

HP Server Automation Enterprise Edition HP Server Automation Enterprise Edition Software Version: 10.0 User Guide: Server Patching Document Release Date: June 13, 2013 Software Release Date: June 2013 Legal Notices Warranty The only warranties

More information

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016 ZENworks 11 Support Pack 4 Management Zone Settings Reference May 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

LabTech Integration Instructions

LabTech Integration Instructions LabTech Integration Instructions Overview... 2 Requirements... 2 Webroot Activation... 3 Plug-In Installation... 5 Global Site Manager Integration... 6 Usage... 8 Information by Computer/Device... 8 Reference...

More information

Key Considerations for Vulnerability Management: Audit and Compliance

Key Considerations for Vulnerability Management: Audit and Compliance Key Considerations for Vulnerability Management: Audit and Compliance October 5, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

Policy Compliance. Getting Started Guide. January 22, 2016

Policy Compliance. Getting Started Guide. January 22, 2016 Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Publish Cisco VXC Manager GUI as Microsoft RDS Remote App

Publish Cisco VXC Manager GUI as Microsoft RDS Remote App Publish Cisco VXC Manager GUI as Microsoft RDS Remote App This appendix provides a step-by-step guide to publish the Cisco Cisco VXC Manager GUI as a Microsoft Remote Desktop Services (RDS) RemoteApp application.

More information

Managing Software Updates with System Center 2012 R2 Configuration Manager

Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES

More information

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

15. juli 2013. Norman Enterprise Security NESEC

15. juli 2013. Norman Enterprise Security NESEC Norman Enterprise Security NESEC Agenda What is NESEC Product overview Pricing Campaigns Migration Collaterals Norman Enterprise Security What is NESEC? An agile solution suite that reduces complexity

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10 QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10 About This Guide The intention of this guide is to provide a step through of the initial installation of Kaspersky Security

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

EML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1

EML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1 EML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1 Description Maintianing consistant and current patch status is a critical part of any security strategy. In this lab,

More information

User Guide. Lumension Endpoint Management and Security Suite Patch and Remediation 8.0

User Guide. Lumension Endpoint Management and Security Suite Patch and Remediation 8.0 User Guide Lumension Endpoint Management and Security Suite Patch and Remediation 8.0 Lumension Endpoint Management and Security Suite: Patch and Remediation - 2 - Notices Version Information Lumension

More information

Best Practices. Understanding BeyondTrust Patch Management

Best Practices. Understanding BeyondTrust Patch Management Best Practices Understanding BeyondTrust Patch Management February 2014 Contents Overview... 3 1 - Configure Retina CS... 4 2 - Enable Patch Management for Smart Groups... 6 3 Identify and Approve Patches...

More information

IBM Endpoint Manager for Lifecycle Management

IBM Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Installation Guide. Help Desk Manager. Version v12.1.0

Installation Guide. Help Desk Manager. Version v12.1.0 Installation Guide Help Desk Manager Version v12.1.0 Documentation published: March 12, 2014 Contents Introduction to Help Desk Manager 3 Help Desk Manager Key Features 3 Do-It-Yourself Installation and

More information

PacketTrap One Resource for Managed Services

PacketTrap One Resource for Managed Services Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It

More information

VMware vcenter Support Assistant 5.1.1

VMware vcenter Support Assistant 5.1.1 VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following

More information

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Simplify Your Windows Server Migration

Simplify Your Windows Server Migration SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Release Notes. Norman Enterprise Security 7.3 Suite Version: 7.3.8.10

Release Notes. Norman Enterprise Security 7.3 Suite Version: 7.3.8.10 Release Notes Norman Enterprise Security 7.3 Suite Version: 7.3.8.10 Norman Enterprise Security - 2 - Notices Version Information Norman Enterprise Security Release Notes - Norman Enterprise Security Version

More information

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out CounterACT: Powerful, Contents Introduction...3 Automated Threat Protection against Conficker... 3 How the Conficker Worm Works.... 3 How to Use CounterACT to Protect vs. the Conficker Worm...4 1. Use

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Patch Management for Red Hat Enterprise Linux. User s Guide

Patch Management for Red Hat Enterprise Linux. User s Guide Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,

More information

How To Monitor Your Entire It Environment

How To Monitor Your Entire It Environment Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

QualysGuard Asset Management

QualysGuard Asset Management QualysGuard Asset Management Quick Start Guide January 28, 2014 Dynamic Asset Tagging provides a flexible and scalable way to automatically discover and organize the assets in your environment and make

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

Novell. ZENworks Patch Management Design, Deployment and Best Practices. Allen McCurdy Sr. Technical Specialist amccurdy@novell.

Novell. ZENworks Patch Management Design, Deployment and Best Practices. Allen McCurdy Sr. Technical Specialist amccurdy@novell. Novell ZENworks Patch Management Design, Deployment and Best Practices Steve Broadwell Sr. Solutions Architect sbroadwell@novell.com Allen McCurdy Sr. Technical Specialist amccurdy@novell.com Agenda General

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

System Planning, Deployment, and Best Practices Guide

System Planning, Deployment, and Best Practices Guide www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Anti-Executable Dashboard. Last modified: August 2012

Anti-Executable Dashboard. Last modified: August 2012 1 Last modified: August 2012 2 1999-2012 Faronics Corporation. All rights reserved. Faronics, Deep Freeze, Faronics Core, Anti-Executable, Faronics Device Filter, Faronics Power Save, Faronics Insight,

More information

VMware vcenter Update Manager Administration Guide

VMware vcenter Update Manager Administration Guide VMware vcenter Update Manager Administration Guide vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

vrealize Air Compliance OVA Installation and Deployment Guide

vrealize Air Compliance OVA Installation and Deployment Guide vrealize Air Compliance OVA Installation and Deployment Guide 14 July 2015 vrealize Air Compliance This document supports the version of each product listed and supports all subsequent versions until the

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

GFI Cloud User Guide A guide to administer GFI Cloud and its services

GFI Cloud User Guide A guide to administer GFI Cloud and its services GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

Shakambaree Technologies Pvt. Ltd.

Shakambaree Technologies Pvt. Ltd. Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Remote Access Services Microsoft Windows - Installation Guide

Remote Access Services Microsoft Windows - Installation Guide Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3

More information

LIBRARY MEMBER USER GUIDE

LIBRARY MEMBER USER GUIDE LIBRARY MEMBER USER GUIDE CONTENTS PAGE Part 1) How to create a new account... 2 Part 2) How to checkout a magazine issue... 4 Part 3) How to download and use Zinio Reader 4... 8 a) For your PC... 8 b)

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information