Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Size: px
Start display at page:

Download "Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010."

Transcription

1 Situation Microsoft IT had limited monitoring and reporting functionality with its existing antimalware system. Although the system could scan for malware, there was no reporting capability or configurable means to alert administrators when a specified number of machines became infected. The system also was limited in supporting policy changes. Microsoft IT needed a centralized antimalware management solution that could alert the team as soon as an infection was detected and then identify whether the system was successful in quarantining or removing the malware. The solution also needed to provide robust reporting and a more flexible means of applying policies. Solution Using Microsoft Forefront Endpoint Protection 2010 as the foundation of a new antimalware monitoring and reporting solution, Microsoft IT can easily target a set of machines across many collections of systems and configure them to any number of policies at any time. And because Forefront Endpoint Protection 2010 installs on top of Microsoft System Center Configuration Manager 2007, Microsoft IT was able to deploy the new technology to its existing Configuration Manager network with minimal new hardware. Benefits Simplified implementation of largescale endpoint protection with centralized administration Faster response to infections and better knowledge of the type of malware Improved SLA for antimalware policy deployment from more than a day to four hours Use of existing infrastructure with minimal impact to network performance; bandwidth usage is from 50 KB to 100 KB per client Products and Technologies Microsoft Forefront Endpoint Protection 2010 Microsoft System Center Configuration Manager 2007 R2, R3 Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint Protection 2010 Published: December 2010 The following content may no longer reflect Microsoft s current position or infrastructure. This content should be viewed as reference documentation only, to inform IT business decisions within your own company or organization. Microsoft Information Technology (Microsoft IT) deployed Microsoft Forefront Endpoint Protection 2010 to simplify and improve endpoint protection. Because Forefront Endpoint Protection 2010 builds on Microsoft System Center Configuration Manager 2007 R2 and R3, Microsoft IT was able to use its existing infrastructure to implement a centralized antimalware management and reporting solution that provides a holistic view of more than 100,000 clients' malware status and reduces the number of systems running outdated malware definitions. Using Forefront Endpoint Protection, Microsoft IT improved their SLA for antimalware policy deployment from more than a day to four hours. Situation One of the core responsibilities of Microsoft Information Technology (Microsoft IT) is to help maintain a highly secure corporate network and protect end users. The ever-increasing onslaught of viruses, Trojan horses, and other malicious software collectively termed malware requires that computers be properly protected with antimalware software running the most up-to-date definitions. Microsoft IT had been using endpoint protection technology that supported scanning for malware but did not include any out-of-the-box detailed reporting capabilities. Of special concern was the inability of the earlier technology to report when a particular machine became infected by malware. Furthermore, the technology did not offer a dashboard, data collection, or the ability to drill down into infected machines to identify the nature of the malware and the extent of the infection, and then initiate remediation. Another challenge with the previous antimalware was that antimalware policy was included with the installation package. This model required deploying the policy at the time of client installation with little opportunity for updates during the life of the client software. Interim policy changes required a laborious, manual effort on a system-by-system basis. Microsoft IT needed a centralized antimalware management and reporting solution that could quickly alert the team whenever a client machine encountered malware and then identify whether the system was successful in quarantining or removing the malware. The solution

2 needed to provide data collection, which is critical to enabling Microsoft IT to effectively manage and improve the security of the corporate network. From cost and ease of management perspectives, Microsoft IT wanted the solution to run on top of the current infrastructure and integrate seamlessly with existing management consoles. The new solution also needed to be able to apply multiple policies in a managed way for various collections of machines across a large environment. Finally, the solution needed to be deployed to employees without affecting their work environment due to system performance or security issues. Solution As the company s first and best customer, Microsoft IT regularly adopts early releases of Microsoft technologies, tests them in a real-world environment, and provides critical feedback to improve products before they are generally available to the public. In order to improve its ability to manage antimalware across the network, Microsoft IT worked closely with the Microsoft Forefront Endpoint Protection 2010 product group to deploy the beta and then later the release candidate of Forefront Endpoint Protection Why Forefront Endpoint Protection and System Center Configuration Manager? By using Forefront Endpoint Protection 2010, which is the next version of Forefront Client Security, businesses can simplify and improve endpoint protection while limiting infrastructure costs. The product builds on Microsoft System Center Configuration Manager 2007 R2 and R3, enabling Microsoft IT to use their existing client management infrastructure to deploy and maintain endpoint protection. Microsoft IT saw Forefront Endpoint Protection 2010 as the foundation of a new antimalware monitoring and reporting solution. With Forefront Endpoint Protection, Microsoft IT administrators would be able to roll out a large-scale endpoint protection solution to all managed user desktop and portable computers. The product comes with recommended policies and deployment packaging that is ready to use, taking the guesswork out of security management. Microsoft IT was especially interested in the product s ability to easily target a set of machines across many collections of systems and configure that set to any number of security policies at any time. Because an important aspect of the deployment was to test the impact that Forefront Endpoint Protection 2010 had on System Center Configuration Manager, Microsoft IT planned to use its existing set of System Center Configuration Manager 2007 R2 and R3 servers. This would enable the implementation of the new technology with minimal new hardware requirements and confirm that the addition of Forefront Endpoint Protection components would not significantly degrade server performance. Implementation Microsoft IT implemented its new antimalware monitoring and reporting solution by installing the beta and release candidate of Forefront Endpoint Protection 2010 on top of existing System Center Configuration Manager 2007 servers. As illustrated in Figure 1, the implementation involved utilizing the existing network of Configuration Manager servers across multiple continents. Increasing Security and Streamlining Antimalware Management Using Forefront Endpoint Protection Page 2

3 Figure 1. Microsoft IT's implementation of Forefront Endpoint Protection The Forefront Endpoint Protection 2010 environment was deployed in the following manner: 1. The Forefront Endpoint Protection 2010 was added to the Configuration Manager Console in the System Center Configuration Manager central site server (see Figure 2). Figure 2. Forefront Endpoint Protection 2010 extension added to the Configuration Manager Console tree Increasing Security and Streamlining Antimalware Management Using Forefront Endpoint Protection Page 3

4 2. A Forefront Endpoint Protection 2010 database that holds current systems health states was added to the Configuration Manager database server (running Microsoft SQL Server 2008 SP1 Enterprise edition data management software). 3. The Forefront Endpoint Protection 2010 reporting database was provisioned on a dedicated server running SQL Server 2008 Reporting Services. This was the only new piece of hardware added for the Forefront Endpoint Protection deployment. Note: The Forefront Endpoint Protection 2010 reporting database can reside on the Configuration Manager database server and run alongside the Configuration Manager databases, or be deployed to a dedicated server running SQL Server 2008 Reporting Services. Microsoft IT chose the latter implementation option because the Forefront Endpoint Protection 2010 reporting database can grow quickly when a large number of clients are being managed. 4. Through the use of Configuration Manager software distribution, Forefront Endpoint Protection 2010 client software was pushed to client systems via regional Configuration Manager distribution points. 5. Once the client systems were running the Forefront Endpoint Protection 2010 client, Microsoft IT security and Configuration Manager administrators used Forefront Endpoint Protection policy management capabilities to push out a standard security policy. 6. After the security policy was deployed, Microsoft IT security administrators used the server-side Forefront Endpoint Protection user interface an extension to their Configuration Manager console to monitor and manage antimalware across the system (see Figure 3). Figure 3. Forefront Endpoint Protection 2010 dashboard showing system-wide antimalware status Increasing Security and Streamlining Antimalware Management Using Forefront Endpoint Protection Page 4

5 Results Microsoft IT used the existing System Center Configuration Manager software distribution capability on 72 existing physical and virtual servers across multiple continents to push the Forefront Endpoint Protection 2010 client software to more than 100,000 client systems. In addition, Microsoft IT added one dedicated physical server to their deployment for Forefront Endpoint Protection SQL Server 2008 Reporting Services data warehouse reporting, bringing the total number of servers to 73. System Deployment Summary The following list identifies the System Center Configuration Manager servers and Forefront Endpoint Protection clients involved in the deployment: System Center Configuration Manager central site - System Center Configuration Manager (physical server) - SQL Server (physical server) Corporate headquarters - Serving 46,000 clients - 6 software update points (virtual servers) - 6 management points (virtual servers) - 16 distribution points (4 physical servers, 12 virtual servers) - System Center Configuration Manager (physical server) - SQL Server (physical server) Australia and Asia - Serving 59,000 clients - 2 software update points (virtual servers) - 3 management points (virtual servers) - 22 distribution points (10 physical servers, 12 virtual servers) - 6 secondary sites with distribution role (4 physical servers, 2 virtual servers) - System Center Configuration Manager (virtual server) - SQL Server (physical server) Forefront Endpoint Protection SQL Server 2008 Reporting Services data warehouse reporting server (physical server) Performance Impact to System Center Configuration Manager Microsoft IT successfully pushed the Forefront Endpoint Protection 2010 client software to more than 100,000 machines in a single deployment without creating significant impact to daily System Center Configuration Manager operations. By carefully monitoring bandwidth usage, Microsoft IT was able to confirm the minimal impact that Forefront Endpoint Protection had on the existing Configuration Manager infrastructure: Average network traffic generated by Forefront Endpoint Protection 2010 during installation and ongoing daily operation was minimal 101 KB per client Average network traffic caused by malware events generated even less traffic approximately 49 KB per client Increasing Security and Streamlining Antimalware Management Using Forefront Endpoint Protection Page 5

6 Database growth caused by the initial client deployment was minimal 51 KB per client - Microsoft IT projects database growth of approximately 12 gigabytes (GB) across 250,000 clients Database growth generated by malware events was minimal an average 17 KB per client - Microsoft IT projects database growth of approximately 4 GB across 250,000 clients Note: This minimal database growth occurred on the existing Configuration Manager database that contains current Forefront Endpoint Protection state information. The separate Forefront Endpoint Protection data warehouse that stores all historical malware details can quickly grow much larger, but it was not part of Microsoft IT s existing set of Configuration Manager servers. Best Practices In the course of working with Forefront Endpoint Protection 2010 to design, implement, and operate the new malware monitoring solution, Microsoft IT followed these best practices: Implementation Deploy in phases to reduce potential for negative impact to the environment. In its rollout, Microsoft IT used three environments user acceptance testing, pre-production, and full production and deployed one at a time in that order, scaling up by a factor of 3 or 4 per phase. Allow an opt-out option. During initial deployment, consider providing an opt-out option for users because security-related deployments might affect some people's working processes. These machines can be added to a security group, which then can be imported into a System Center Configuration Manager collection and excluded in the client targeting logic. When it comes time to enforce use of Forefront Endpoint Protection, a custom policy can be deployed to this machine collection that excludes the offending directories or processes. Re-deploy the client to failed machines. A common remediation for several installation failure types is to re-deploy the client to the collection of failed machines. Microsoft IT found a significant percentage of initial failures succeeded on subsequent attempts. Security Separate development, test, and production domains. To maximize security and performance, allocate resources to separate domains as appropriate to support development and test activities while maintaining a security-enabled and stable production network. Monitoring and Reporting Identify multiple sources for malware definitions. Know where you want your definition updates to come from, such as Windows Server Update Services, a local server, or even an Internet source. Using multiple sources will provide fallback opportunities to help keep more machines up to date. Determine the best times for scanning. Do your employees leave machines on at night? If not, consider setting weekly scans to occur when the maximum amount of client machines are running, while reducing scanning CPU usage in order to consume minimal system resources. Increasing Security and Streamlining Antimalware Management Using Forefront Endpoint Protection Page 6

7 Consider installing the reporting database on a dedicated server. When possible, Microsoft IT allocates dedicated hardware for hosting of specific functions (such as data warehousing). The addition of a separate reporting data warehouse for Forefront Endpoint Protection 2010 enables the collection of historical data for in-depth analysis and reporting. It also provides a mechanism for importing additional machine metadata from other data sources to aid in malware forensics and incident management. Benefits By implementing Forefront Endpoint Protection 2010, Microsoft IT derived a number of benefits: Simplified implementation of large-scale endpoint protection. Use of Forefront Endpoint Protection 2010 simplified Microsoft IT's effort to roll out a large-scale endpoint protection solution to all managed desktop and portable computers. Unified protection. Forefront Endpoint Protection 2010 delivers single-agent, multithreat protection for desktop and portable computers. It includes: - Antimalware - Rootkit detection (a rootkit is malicious software that takes control of a computer at the administrator or root level, where it can hide from detection from standard antimalware scans and would require a full scan to be detected) - Critical vulnerability assessment and automatic updates - Integrated host firewall management - Network vulnerability shielding - Device lockdown Faster response to malware infections. By using the configurable alerts capability, Microsoft IT security administrators receive alerts when a specified number of systems become infected within a given period of time. Administrators also can set alerts on specific collections of sensitive machines, sending whenever these machines are infected with a specific threat level of malware (low, medium, high, or severe). Holistic view of all managed clients. With the combination of live status views in the System Center Configuration Manager Console and detailed reports that display malware trends over time including specific malware names, infection rates, and severity Microsoft IT administrators can more quickly and accurately gauge the overall health of the corporate environment. Insight into the nature of malware. Forefront Endpoint Protection 2010 provides detailed forensics data about the nature of detected malware, including type, number of systems infected, and locations within clients where the infection occurs, helping Microsoft IT more effectively manage and secure the corporate environment. Enhanced IT management with improved SLA. With Forefront Endpoint Protection 2010, Microsoft IT gained a scalable security solution that integrates seamlessly with existing management of desktop and portable computers. Thanks to the ability to target a set of machines across many collections of systems and configure that set to any number of policies at any time, the team improved its SLA for antimalware policy deployment from more than a day to four hours. Increasing Security and Streamlining Antimalware Management Using Forefront Endpoint Protection Page 7

8 Note: The four-hour SLA is based on an organizational agreement; it is not a technical requirement. Microsoft IT s SLA includes a separation of duties based on security best practices. The key driver enabling the faster SLA is the efficiency gained by using the Forefront Endpoint Protection 2010 extension in the System Center Configuration Manager console. Use of existing infrastructure. Forefront Endpoint Protection 2010 is a cost-effective enterprise security solution for Microsoft IT, because it was deployed to the existing System Center Configuration Manager 2007 R2 and R3 environments. The implementation that Microsoft IT designed required only a single new piece of hardware dedicated to the reporting database. Conclusion Using Microsoft Forefront Endpoint Protection 2010, Microsoft IT created a new centralized antimalware management and reporting solution. Running on existing System Center Configuration Manager 2007 R2 and R3 servers, Microsoft IT deployed the beta and release candidate of the Forefront Endpoint Protection 2010 client software and definitions to more than 100,000 client systems across the globe, as of December Careful monitoring of the Configuration Manager servers confirmed that the installation and operation of Forefront Endpoint Protection components provided negligible impact to overall performance, averaging approximately 101 KB per client in network traffic during installation and 49 KB per client during malware events. Before implementing the antimalware monitoring and reporting solution, Microsoft IT had no means by which it could view the entire set of managed clients across the corporate environment. Once Forefront Endpoint Protection 2010 was deployed, Microsoft IT security administrators for the first time could get a holistic view of overall system health and obtain deep forensic details about the nature of infections, specific files and folders under attack, and other key data that are critical to system health management. The ability to monitor malware status and generate reports is also a new benefit; such functionality was not available in the previous system. Because Forefront Endpoint Protection 2010 is an extension in the familiar System Center Configuration Manager Console, Microsoft IT security administrators now are able to view summary health information for all managed clients within a single window. Response times to malware infections have improved because administrators receive alerts as soon as certain malware conditions occur anywhere in the managed network. Microsoft IT now has much more control over its antimalware software, defining a variety of policies and applying them to various collections of systems based on type of usage and potential impact of an infection. As a result of incorporating Forefront Endpoint Protection 2010, Microsoft IT's SLA for applying policy changes has improved from more than a day to four hours. As Forefront Endpoint Protection 2010 approaches general availability, Microsoft IT plans to update its servers and clients with the final release of the software, moving the implementation to full-scale operations by the end of fiscal year By that time, Microsoft IT estimates the number of managed clients will increase to more than 200,000. By widely deploying Forefront Endpoint Protection, Microsoft IT anticipates higher productivity due to increased efficiencies, reduced downtime from infected systems, and potential cost savings from overlaying the solution on existing infrastructure. Increasing Security and Streamlining Antimalware Management Using Forefront Endpoint Protection Page 8

9 For More Information For more information about Microsoft products or services, call the Microsoft Sales Information Center at (800) In Canada, call the Microsoft Canada Order Centre at (800) Outside the 50 United States and Canada, please contact your local Microsoft subsidiary. To access information via the World Wide Web, go to: Microsoft Corporation. All rights reserved. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Forefront, SQL Server, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Increasing Security and Streamlining Antimalware Management Using Forefront Endpoint Protection Page 9

Lumension Endpoint Management and Security Suite. L.E.M.S.S. AntiVirus v8.2. Migration Guide & Frequently Asked Questions

Lumension Endpoint Management and Security Suite. L.E.M.S.S. AntiVirus v8.2. Migration Guide & Frequently Asked Questions Lumension Endpoint Management and Security Suite L.E.M.S.S. AntiVirus v8.2 Migration Guide & Frequently Asked Questions [FOR INTERNAL USE ONLY - DO NOT DISTRIBUTE] Copyright 2015, Lumension Introduction

More information

Forefront Endpoint Protection. Jack Cobben

Forefront Endpoint Protection. Jack Cobben Forefront Endpoint Protection Jack Cobben Page number 1 1. Contents 2. Release Notes... 8 Microsoft Forefront Endpoint Protection 2010... 8 Running a repair on Microsoft Forefront Endpoint Protection 2010

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

How Microsoft IT Deployed System Center 2012 Configuration Manager

How Microsoft IT Deployed System Center 2012 Configuration Manager Situation The business of Microsoft IT is changing. Challenged by the growing number of computers and mobile devices connecting to the corporate network, requests for more end-user control over employees'

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes

More information

Integrating F5 Application Delivery Solutions with VMware View 4.5

Integrating F5 Application Delivery Solutions with VMware View 4.5 APPLICATION READY SOLUTION GUIDE What s inside: 2 Improving user experience 2 Enhancing security and access control 3 Application Performance and Availability 4 F5 and global configuration diagram 5 More

More information

What is Windows Intune? The Windows Intune Administrator Console. System Overview

What is Windows Intune? The Windows Intune Administrator Console. System Overview What is Windows Intune? Windows Intune helps you manage and secure computers in your environment through a combination of Windows cloud services and upgrade licensing. Windows Intune delivers cloud-based

More information

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure. McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,

More information

Symantec Mobile Security

Symantec Mobile Security Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

Best Practices for Auditing Changes in Active Directory WHITE PAPER

Best Practices for Auditing Changes in Active Directory WHITE PAPER Best Practices for Auditing Changes in Active Directory WHITE PAPER Table of Contents Executive Summary... 3 Needs for Auditing and Recovery in Active Directory... 4 Tracking of Changes... 4 Entitlement

More information

Endpoint Security for DeltaV Systems

Endpoint Security for DeltaV Systems DeltaV Systems Service Data Sheet Endpoint Security for DeltaV Systems Essential protection that consolidates endpoint and data security. Reduces the time and effort spent deploying and managing security

More information

Microsoft Forefront Endpoint Protection 2010 Evaluation Guide

Microsoft Forefront Endpoint Protection 2010 Evaluation Guide Forefront Endpoint Protection 2010, the next version of Forefront Client Security, enables businesses to simplify and improve endpoint protection while greatly reducing infrastructure costs. It builds

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Datasheet FUJITSU Cloud Monitoring Service

Datasheet FUJITSU Cloud Monitoring Service Datasheet FUJITSU Cloud Monitoring Service FUJITSU Cloud Monitoring Service powered by CA Technologies offers a single, unified interface for tracking all the vital, dynamic resources your business relies

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

IBM Endpoint Manager for Core Protection

IBM Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

User-Centric Client Management with System Center 2012 Configuration Manager in Microsoft IT

User-Centric Client Management with System Center 2012 Configuration Manager in Microsoft IT Situation Microsoft IT needed to evolve their Configuration Manager 2007-based environment that used homegrown application distribution services to meet the self-service needs of Microsoft personnel. Solution

More information

Access to easy-to-use tools that reduce management time with Arcserve Backup

Access to easy-to-use tools that reduce management time with Arcserve Backup Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Microsoft IT Deploys and Manages Office 365 ProPlus

Microsoft IT Deploys and Manages Office 365 ProPlus Microsoft IT Deploys and Manages Office 365 ProPlus Technical White Paper Published: June 2013 The following content may no longer reflect Microsoft s current position or infrastructure. This content should

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

State Agency Reduces Time to Set Up New Users by 85 to 90 Percent

State Agency Reduces Time to Set Up New Users by 85 to 90 Percent Microsoft System Center Customer Solution Case Study State Agency Reduces Time to Set Up New Users by 85 to 90 Percent Overview Country or Region: United States Industry: Government Customer Profile Headquartered

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

Maximizing Configuration Management IT Security Benefits with Puppet

Maximizing Configuration Management IT Security Benefits with Puppet White Paper Maximizing Configuration Management IT Security Benefits with Puppet OVERVIEW No matter what industry your organization is in or whether your role is concerned with managing employee desktops

More information

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND

More information

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with

More information

Unifying IT How Dell Is Using BMC

Unifying IT How Dell Is Using BMC Unifying IT Management: How Dell Is Using BMC Software to Implement ITIL ABSTRACT Companies are looking for ways to maximize the efficiency with which they plan, deliver, and manage technology services.

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

1. Server 2008 - Microsoft FEP 2010 - Instalation

1. Server 2008 - Microsoft FEP 2010 - Instalation 1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements

More information

Patch Management SoftwareTechnical Specs

Patch Management SoftwareTechnical Specs Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Microsoft Windows Server Update Services Questions & Answers About The Product

Microsoft Windows Server Update Services Questions & Answers About The Product Microsoft Windows Server Update Services Questions & Answers About The Product General Information Q. What is Windows Server Update Services (WSUS)? A. WSUS (previously called Windows Update Services)

More information

G DATA TechPaper #0275. G DATA Network Monitoring

G DATA TechPaper #0275. G DATA Network Monitoring G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration

More information

Performance Optimization Guide

Performance Optimization Guide Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.

More information

McAfee Web Reporter Turning volumes of data into actionable intelligence

McAfee Web Reporter Turning volumes of data into actionable intelligence McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access

More information

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

McAfee Endpoint Protection Products

McAfee Endpoint Protection Products McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough

More information

EMC Virtual Infrastructure for Microsoft SQL Server

EMC Virtual Infrastructure for Microsoft SQL Server Microsoft SQL Server Enabled by EMC Celerra and Microsoft Hyper-V Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the information in this publication is accurate

More information

Automated, centralized management for enterprise servers

Automated, centralized management for enterprise servers IBM Software Thought Leadership White Paper February 2012 Automated, centralized management for enterprise servers Servers present unique management challenges but IBM Endpoint Manager is up to the job

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Configuration Management in the Data Center

Configuration Management in the Data Center Configuration Management in the Data Center Using Microsoft System Center Published: May 2008 For the latest information, please see http://www.microsoft.com/systemcenter Contents Executive Summary...1

More information

3 keys to effective service availability management. Visibility. Proactivity. Collaboration.

3 keys to effective service availability management. Visibility. Proactivity. Collaboration. 3 keys to effective service availability management Visibility. Proactivity. Collaboration. Managing service availability without visibility into downtime and data loss risks is like flying at night without

More information

Core Protection Module 1.6 for Mac powered by. User s Guide

Core Protection Module 1.6 for Mac powered by. User s Guide Core Protection Module 1.6 for Mac July, 2010 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are

More information

Product Brief SysTrack VMP

Product Brief SysTrack VMP for VMware View Product Brief SysTrack VMP Benefits Optimize VMware View desktop and server virtualization and terminal server projects Anticipate and handle problems in the planning stage instead of postimplementation

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

SolarWinds Network Performance Monitor powerful network fault & availabilty management

SolarWinds Network Performance Monitor powerful network fault & availabilty management SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Microsoft Windows Intune: Cloud-based solution

Microsoft Windows Intune: Cloud-based solution Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Symantec Desktop and Laptop Option 7.6

Symantec Desktop and Laptop Option 7.6 Automated protection for desktops and laptops Data Sheet: Backup and Disaster Recovery Overview With the majority of business-critical information residing outside the data centers or on off corporate

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Managing Microsoft Hyper-V Server 2008 R2 with HP Insight Management

Managing Microsoft Hyper-V Server 2008 R2 with HP Insight Management Managing Microsoft Hyper-V Server 2008 R2 with HP Insight Management Integration note, 4th Edition Introduction... 2 Overview... 2 Comparing Insight Management software Hyper-V R2 and VMware ESX management...

More information

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage PRODUCT BRIEF: CA ANTI-VIRUS CA Anti-Virus r8.1 CA ANTI-VIRUS IS THE NEXT GENERATION IN COMPREHENSIVE ANTI-VIRUS SECURITY FOR BUSINESS PCS, SERVERS AND PDAS. IT COMBINES PROACTIVE PROTECTION AGAINST MALWARE

More information

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus

More information

NAC at the endpoint: control your network through device compliance

NAC at the endpoint: control your network through device compliance NAC at the endpoint: control your network through device compliance Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic

More information

What s New in VMware vcenter 5.0

What s New in VMware vcenter 5.0 What s New in VMware vcenter 5.0 Effective Virtualization Management TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated April 2011 Table of Contents Introduction.... 3 vsphere Web Client.... 4 Web Client

More information

Whitepaper. DriveLock. Endpoint Security for IGEL Thin-Clients

Whitepaper. DriveLock. Endpoint Security for IGEL Thin-Clients Whitepaper DriveLock Endpoint Security for IGEL Thin-Clients CenterTools Software SE 2015 Contents 1 INTRODUCTION... 2 2 MULTI-DIMENSIONAL INTERFACE CONTROL... 2 3 PROACTIVE MALWARE PROTECTION... 3 4 DRIVELOCK

More information

Subhakanta Satpathy, Senior Vice President IT, CIO Axis Bank

Subhakanta Satpathy, Senior Vice President IT, CIO Axis Bank Microsoft Project Server 2010 Customer Solution Case Study Bank Centralizes Information, Achieves Significant Project Visibility Overview Country or Region: India Industry: Financial Services Customer

More information

Scalability in Log Management

Scalability in Log Management Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework Mobile workforce management software solutions Empowering the evolving workforce with an end-to-end framework 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information