New possibilities in latest OfficeScan and OfficeScan plug-in architecture



Similar documents
Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6

Trend Micro OfficeScan Best Practice Guide for Malware

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Virtual Patching: a Proven Cost Savings Strategy

Best Practice Configurations for OfficeScan 10.0

Virtual Patching: a Compelling Cost Savings Strategy

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

How To Protect A Virtual Desktop From Attack

Deep Security Vulnerability Protection Summary

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops

Netzwerkvirtualisierung? Aber mit Sicherheit!

NetDefend Firewall UTM Services

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

FortKnox Personal Firewall

Total Defense Endpoint Premium r12

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Devising a Server Protection Strategy with Trend Micro

The Challenge of a Comprehensive Network Protection. Introduction

GFI White Paper PCI-DSS compliance and GFI Software products

Gateway Security at Stateful Inspection/Application Proxy

Devising a Server Protection Strategy with Trend Micro

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Best Practices for Deploying Behavior Monitoring and Device Control

How To Prevent Hacker Attacks With Network Behavior Analysis

Protecting the un-protectable Addressing Virtualisation Security Challenges

NetDefend Firewall UTM Services

Networking for Caribbean Development

Intrusion Defense Firewall

Virtualization Journey Stages

24/7 Visibility into Advanced Malware on Networks and Endpoints

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware

Chapter 9 Firewalls and Intrusion Prevention Systems

Section 12 MUST BE COMPLETED BY: 4/22

Did you know your security solution can help with PCI compliance too?

Trend Micro Solutions for PCI DSS Compliance

Cisco Advanced Malware Protection

Automated Protection on UCS with Trend Micro Deep Security

Industrial Security for Process Automation

IBM Endpoint Manager Product Introduction and Overview

Locking down a Hitachi ID Suite server

Advantages of Managed Security Services

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

PART D NETWORK SERVICES

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Nessus and Antivirus. January 31, 2014 (Revision 4)

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

Get Started Guide - PC Tools Internet Security

Critical Security Controls

Windows Remote Access

Quick Heal Exchange Protection 4.0

Network Instruments white paper

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Symantec Endpoint Protection

PICO Compliance Audit - A Quick Guide to Virtualization

Host/Platform Security. Module 11

How To Protect Your Cloud From Attack

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

Firewall Firewall August, 2003

FISMA / NIST REVISION 3 COMPLIANCE

Cisco RSA Announcement Update

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Next Generation Firewalls and Sandboxing

Deploying Firewalls Throughout Your Organization

Windows Operating Systems. Basic Security

Building A Secure Microsoft Exchange Continuity Appliance

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

The Hillstone and Trend Micro Joint Solution

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

On and off premises technologies Which is best for you?

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Transcription:

New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion

Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping option» Multi-tier Client Trees» WRS integrated with Smart Scan servers» Expanded compliance-assessment reporting» Role options for Update Agents» Application filtering for firewall» Exception lists for device control» Highly granular admin-user access settings» Performance & other incremental enhancements» IDF - Intrusion Defense Firewall» TMAgent Manager» Trend Micro Mobile Security» Trend Micro Security (for Mac)» Trend Micro Virtual Desktop Support

New features and enhancements in OfficeScan 10.5

More Active Directory support Expanded Active Directory support for multiple forests and trusted domains Version 10.0 allows to specify only Active Directory domain where OfficeScan server belongs. In OfficeScan 10.5 it is possible to define multiple Active Directory domains

Administration > Active Directory > Active Directory Integration

New automated client grouping option Different than legacy NetBIOS, AD & DNS options Rules based on: Active Directory scope IP address range Rules can be prioritized, activated & deactivated Can schedule domain re-sort/re-creation If used: Cannot manually add groups on the Client Management Page Cannot move clients with drag and drop Can still delete groups

Networked Computers > Client Grouping

Networked Computers > Client Grouping > Automatic Client Grouping > Add > Active Directory/ IP Address

Multi-tier Client Trees In OfficeScan 10.0 and earlier versions domains/ groups could be added only under root domain OfficeScan 10.5 allows to create multi-level domain/ group trees

Networked Computers > Client Management > select domain > Manage Client Tree > Add Domain

Web Reputation Service integrated with Smart Scan servers OfficeScan 10.0 introduced Smart Scan server In-the-cloud pattern-file query Integrated and standalone Smart Scan servers in your network Web Reputation Service requests web pages score from Trend Micro global server in 10.0 and earlier version OfficeScan 10.5 integrated Web Reputation Service with Smart Scan server- file and web reputation services both can now be in your network

Smart Protection > Smart Protection Sources > Internal Clients > click on standard list > Launch console

Expanded compliance-assessment reporting OfficeScan 10.5 allows to make clients installed or nor installed compliance reports based on Active Directory and also IP addresses Expanded Compliance Reporting ensures that computers which are part of the OfficeScan client tree: have correct services have latest components have consistent settings successfully perform scanning

Security Compliance > Compliance Assessment > Compliance Report > choose domain from Client Tree Scope and press Assess

Role options for Update Agents Update agents: Offload the update process from OfficeScan Decrease LAN and WAN backbone traffic Update agent hierarchy OfficeScan server distributes to update agents Update agents distribute to clients In OfficeScan 10.5 it is possible to choose what update agents distribute Component updates Domain settings Client programs and hot fixes

Networked Computers > Client Management > choose computer > Settings > Update Agent Settings

Application filtering for firewall Added feature to the client firewall that allows to block or allow network traffic based on the application

Networked Computers > Firewall > Policies > Add > under Exception section press Add > Application: section

Exception lists for device control Two types of exceptions: Approved Application List Applications in this list are exempt from Device Control policies and have full access to external storage devices and network resources Executable Program List Applications in this list can be run from external storage devices, but do not have access to external devices.

Networked Computers > Client Management > choose domain/ group or computer > Settings > Device Control Settings > Exceptions section

Highly granular admin-user access settings Delegate tasks to child domains to restrict administrative users to specific tasks without interfering with parent domains Limit the presentation of the management console Define roles that allow administrative users to focus only on their specific responsibilities Assign view only access to pages without granting an administrator the ability to modify the associated configuration parameters

Administration > User Roles > Add

Performance & other incremental enhancements For example: More granular Web reputation settings which now allow to configure web reputation policies and assign them to one, several, or all OfficeScan clients Added controls for scan settings for clients with the privilege to configure scan exclusions

OfficeScan plug-in architecture

Open OfficeScan management console > Plug-in Manager

IDF - Intrusion Defense Firewall IDF is a host intrusion defense system that plugs in to existing OfficeScan solution It supplements OfficeScan clients with advanced firewall, virtual patching features and provides deep packet inspection, along with advanced application vulnerability protection IDF allows to create and manage comprehensive intrusion defense security policies, track threats, and log actions taken in response to these threats

IDF - management console

IDF - firewall Sophisticated, bi-directional stateful firewall, provides complete support for all network protocols. Firewall Rules are fully configurable to allow or deny traffic on a per-interface basis, and restrict communication to allowed IP or MAC addresses.

IDF - virtual patching Virtual patching is a host-based security capability that shields applications from vulnerabilities until permanent corrections from procedures such as patch management and software maintenance can be applied. Virtual patching operates on network streams, inspecting inbound traffic and shielding applications from exploits, even though the vulnerability has not been permanently patched

IDF - virtual patching Smart - one or more known and unknown (zero day) vulnerabilities Exploit - an exact exploit, usually signature based Vulnerability - a specific vulnerability for which one or more exploits may exist

TMAgent Manager (new in OfficeScan 10.5)

Trend Micro Mobile Security Trend Micro Mobile Security protects smartphones and PDAs from infections and attacks. Anti-malware features block viruses, worms, trojans and SMS text message spam Built-in firewall and Intrusion Detection System protects against hackers, intrusions and DoS attacks- potential threats to the increasing number of WiFi- enabled mobile devices

Trend Micro Mobile Security

Trend Micro Security (for Mac) Management of up to 1 000 Mac endpoints Standard AV technology Detection and blocking of malware Uses also Web Reputation Seemless integration into MacOS Supports Mac OS X version 10.4.11 (Tiger ) or later Mac OS X version 10.5.5 (Leopard ) or later

Trend Micro Security (for Mac)

VDI - Virtual Desktop Infrastructure Support (new in OfficeScan 10.5) Simultaneous activity can overload VM platforms Plugin serializes OfficeScan client activity Full system scans Component updates

Impact of Simultaneous Scanning

Results of Sequencing Activity

Simple, Straightforward Configuration

Thank you!