Bandwidth consumption: Adaptive Defense and Adaptive Defense 360



Similar documents
F-Secure Internet Security 2014 Data Transfer Declaration

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Avira Endpoint and Security. HowTo

System Management. What are my options for deploying System Management on remote computers?

Avira Small Business Security Suite. HowTo

McAfee DAT Reputation Implementation Guide. Version 1.0 for Enterprise

ParkingManagementSystems. Videobased Parking Management System INDOOR and OUTDOOR Description

Remote Deposit Capture Installation Guide

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

LAN TCP/IP and DHCP Setup

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)

McAfee Threat Intelligence Exchange Software

The Advantages of Security as a Service versus On-Premise Security

SecuraLive ULTIMATE SECURITY

How to Set Up Outlook 2007 and Outlook 2010 for Hosted Microsoft Exchange if the Program is Already Installed

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

Secure Your Mobile Workplace

McAfee Advanced Threat Defense 3.6.0

Deploying Dell OpenManage Server Administrator on VMware ESXi Using Dell Online Depot and VMware Update Manager

ivos Technical Requirements V For Current Clients as of June 2014

Patch Management. Module VMware Inc. All rights reserved

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

XRoads Networks Inc. HealthCare Solutions. Version 2

Intelligent, Scalable Web Security

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

Software and Hardware Requirements

Any Software Any Language Instantly!

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Guidance Regarding Skype and Other P2P VoIP Solutions

Securing and Accelerating Databases In Minutes using GreenSQL

Managed Antivirus Quick Start Guide

Astaro Gateway Software V7.5. What s New

IBM Tivoli Provisioning Manager V 7.1

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

BlackBerry Enterprise Server Express System Requirements

Kaseya Server Instal ation User Guide June 6, 2008

AVeS Cloud Security powered by SYMANTEC TM

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control

Release Notes for Websense Web Endpoint (32- and 64-bit OS)


Kaseya IT Automation Framework

Cyclope Internet Filtering Proxy. - Installation Guide -

InHand Device Cloud Service DN 4.0 Quick Start Guide

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec


Parallels Mac Management v4.0

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits

SAP Training System Access

Symantec Encryption Satellite for Windows Version 3.3 Release

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Installation Guide. (June 2014)

Introduction to the Mobile Access Gateway

Yealink VCS Network Deployment Solution

Lumension Endpoint Management and Security Suite. L.E.M.S.S. AntiVirus v8.2. Migration Guide & Frequently Asked Questions

Bubble Code Review for Magento

Cisco WAAS Context-Aware DRE, the Adaptive Cache Architecture

Conference Controller Deployment Guide

Upgrading Client Security and Policy Manager in 4 easy steps

Managing Enterprise Devices and Apps using System Center Configuration Manager

Cisco Cloud Web Security

Remote Deposit Capture Installation Guide

UNIFIED PERFORMANCE MANAGEMENT

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed Web security

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

Tips and Best Practices for Managing a Private Cloud

McAfee Web Gateway 7.4.1

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

McAfee Public Cloud Server Security Suite

Endpoint protection for physical and virtual desktops

E2BN Direct - Network Services for Schools and Academies

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

Managing your Red Hat Enterprise Linux guests with RHN Satellite

MailEnable Scalability White Paper Version 1.2

Symantec Endpoint Protection

Chapter 8 Router and Network Management

Microsoft Windows Server Update Services Questions & Answers About The Product

IT Security. Muscat 15+ ABOUT US IN A GLANCE

LabTech Integration Instructions

HyperQ Remote Office White Paper

Cisco EXAM Implementing Cisco Threat Control Solutions (SITCS) Buy Full Product.

End-user Security Analytics Strengthens Protection with ArcSight

Transcription:

Contents 1. 2. 3. 4. How Adaptive Defense communicates with the Internet... 3 Bandwidth consumption summary table... 4 Estimating bandwidth usage... 5 URLs required by Adaptive Defense... 6

1. How Adaptive Defense communicates with the Internet The following table shows a summary of how the endpoints protected with Adaptive Defense access the Internet for tasks that require communication over the Internet. Endpoint status Communication with the server Signature file updates Product installation and upgrades Access to Collective Intelligence and sending of the actions monitored on each endpoint Connected to the Internet From the endpoint or another endpoint configured for such purpose. It shares the signature files downloaded by other networked endpoints thanks to Adaptive Defense's P2P technologies. It only downloads signature files provided no other endpoint has done it previously. It is possible to specify an endpoint to download signature files from the server. This endpoint will also act as a signature repository, so that signature files will not be downloaded again when requested by another computer. It shares the upgrade packages downloaded by other networked endpoints thanks to Adaptive Defense's P2P technologies. It only downloads upgrade packages provided no other endpoint has done it previously. It is also possible to specify an endpoint to download product packages from the server. Outbound communications with Collective Intelligence and to send the actions monitored on each endpoint are established from each PC. PCs can connect to the Internet using the corporate proxy. For that, you just have to configure the relevant settings in Adaptive Defense. Not connected to the Internet (but at least one networked endpoint has an Internet connection) From the endpoint with the Internet connection, or the endpoint configured to channel all communications with the server. Updates take place from the endpoint with the Internet connection, or the endpoint configured to channel all communications with the server. Upgrades take place from the endpoint with the Internet connection, or the endpoint configured to channel all communications with the server. It is not possible to access Collective Intelligence from endpoints without an Internet connection.

2. Bandwidth consumption summary table The following table shows a summary of the bandwidth used by Adaptive Defense for each type of communication. Communication type Approximate bandwidth usage Product installation 8.18 MB: Installer and communications agent 61.60 MB: Endpoint protection package Communication with the server 240 KB every 12 hours (190 KB in messages sent every 15 minutes to check for configuration changes, and 50 KB in status, settings and report messages) Sending of the actions monitored from each running process 1MB per day per endpoint Signature file updates** 24.5 MB the first time only, after installing the protection 160 KB every 24 hours for signature file patches 8.18 MB: Communications agent Product upgrades** 61.6* MB: Endpoint protection package A product upgrade takes place every 6 months approximately. Real-time on-access protection: 500 KB: Bandwidth used on the first day, when the cache is empty Queries to Collective Intelligence 35-100 KB: Bandwidth used after the first day, once the information is cached. Full scan of the computer: 200-500 KB: First full scan of the computer. 50-200 KB: Subsequent full scans of the computer. *62.2 MB for the 64-bit installer * Signature file updates and product upgrades are downloaded by a single endpoint on the network, and shared by the other networked endpoints thanks to Adaptive Defense's P2P technologies. This is provided all endpoints require the same files. The signature file patches will be different depending on how outdated the signature files are. For example, if an endpoint has a two-day old signature file and another one has a one-day old signature file, the patches to download will be different.

3. Estimating bandwidth usage Suppose you have a local network consisting of N interconnected computers, and you install Adaptive Defense on them. The bandwidth usage will be approximately as follows: Communication type Bandwidth used by N PCs NOT connected in a local network Bandwidth used on a local network of N PCs Product installation (1 time only) 8.18 MB for the communications agent & the installer x N computers (if no distribution tool is used) package x N computers 8,18* MB for the endpoint protection package x N computers (if no distribution tool is used) package Communication with the server 240 KB every 12 hours x N computers 240 KB every 12 hours x N computers Sending of the actions monitored from each running process 1 MB every day x N computers 1 MB every day x N computers Signature file updates 24.5 MB the first time only, after installing the protection* x N computers 160 KB every 24 hours (signature file patches) x N computers. 24.5 MB the first time only, after installing the protection 160 KB every 24 hours for signature file patches Product upgrades (approx. every 6 months) 8.18 MB for the communications agent & the installer x N computers package x N computers 8.18 MB for the communications agent & the installer package Queries to Collective Intelligence 500 KB the first time x N computers + 35-100 KB every day x N computers 500 KB the first time x N computers + 35-100 KB every day x N computers *62.2 MB for the 64-bit installer If you select a computer to act as a proxy/repository server, all communications except queries to Collective Intelligence and sending of the actions monitored from each running process will take place through that computer. Additionally, signature files and product upgrades will be stored in the computer selected as the repository (it will not be necessary to download them again if requested by another computer on the network).

4. URLs required by Adaptive Defense For more information about the URLs used by Adaptive Defense to update, connect to the cloud platform and provide maximum protection thanks to Collective Intelligence, refer to the following article: Which URLs are required for Adaptive Defense / Adaptive Defense 360 to work?