GRAVITYZONE UNIFIED SECURITY MANAGEMENT. Use Cases for Beta Testers



Similar documents
BITDEFENDER ENDPOINT SECURITY TOOLS

BITDEFENDER SECURITY FOR AMAZON WEB SERVICES

GRAVITYZONE HERE. Deployment Guide VLE Environment

Xopero Backup Build your private cloud backup environment. Getting started

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

UP L17 Virtualization: Security Without Sacrificing Performance

Migrating from Legacy to New Business Solutions

GRAVITYZONE UNIFIED SECURITY MANAGEMENT

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Unitrends Virtual Backup Installation Guide Version 8.0

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

BITDEFENDER GRAVITYZONE

Bitdefender GravityZone Sales Presentation

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA)

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual

Installing and Using the vnios Trial

Consolidated Monitoring, Analysis, and Automated Remediation For Hybrid IT Infrastructures

Installing and Configuring vcloud Connector

BITDEFENDER GRAVITYZONE

BITDEFENDER GRAVITYZONE

How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6.

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

PHD Virtual Backup for Hyper-V

1. Installation Overview

CTERA Agent File Sync and Share for Mac

User Management Tool 1.5

Hyperoo 2.0 A (Very) Quick Start

Installing and Configuring vcloud Connector

BITDEFENDER SMALL OFFICE SECURITY

Product Version 1.0 Document Version 1.0-B

19 Virtualization in ThinManager

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

McAfee MOVE AntiVirus Multi-Platform 3.5.0

Installing and Configuring vcenter Support Assistant

GMS. 1 Create the virtual machine 2 Configure the virtual machine 3 Configure the virtual GMS server. Quick Start Guide. Microsoft Hyper-V Hypervisor

How to install and use the File Sharing Outlook Plugin

How To - Implement Single Sign On Authentication with Active Directory

VMware vcenter Log Insight Getting Started Guide

F-Secure Internet Gatekeeper Virtual Appliance

SonicWALL SRA Virtual Appliance Getting Started Guide

Virtual Appliance Setup Guide

VMTurbo Operations Manager 4.5 Installing and Updating Operations Manager

Quick Start Guide. Apptix Online Backup by Mozy (AOBM) Live Support:

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

User Guide. Version R91. English

IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

EMC Data Domain Management Center

Sophos Anti-Virus for NetApp Storage Systems startup guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Getting Started with ESXi Embedded

SecureAnywhereTM Business Global Site Manager

How to Migrate Citrix XenApp to VMware Horizon 6 TECHNICAL WHITE PAPER

Comodo Endpoint Security Manager SME Software Version 2.1

VMware Data Recovery. Administrator's Guide EN

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

GX-V. Quick Start Guide. VMware vsphere / vsphere Hypervisor. Before You Begin SUMMARY OF TASKS WORKSHEET

NAS 253 Introduction to Backup Plan

QUANTIFY INSTALLATION GUIDE

WatchGuard Dimension v1.1 Update 1 Release Notes

This Deployment Guide is intended for administrators in charge of planning, implementing and

POD INSTALLATION AND CONFIGURATION GUIDE. EMC CIS Series 1

vcloud Suite Licensing

TERAcloud w w w. t e r a c l o u d. u k

Getting Started Guide

Installing and Configuring vcenter Multi-Hypervisor Manager

Configuration Guide - OneDesk to SalesForce Connector

Before You Begin: NOTE: Please read each step of these instructions carefully as not all steps include accompanying pictures.

NETGEAR ReadyRECOVER Offsite Data Protection: Replication Overview and Configuration Guide

WEB HELP DESK GETTING STARTED GUIDE

Core Protection for Virtual Machines 1

Contents. VPN Instructions. VPN Instructions... 1

Setting up Hyper-V for 2X VirtualDesktopServer Manual

XenDesktop Implementation Guide

Core Protection Suite

Configure SQL database mirroring

Evaluation of Multi-Hypervisor Management with HotLink SuperVISOR

, InnerApps, LLC. ALL RIGHTS RESERVED. Install Guide

VMware vsphere 5.5: Install, Configure, Manage Lab Addendum. Lab 4: Working with Virtual Machines

VMware vcenter Configuration Manager and VMware vcenter Application Discovery Manager Integration Guide

CommandCenter Secure Gateway

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Virtual Web Appliance Setup Guide

Thinspace deskcloud. Quick Start Guide

Snow Active Directory Discovery

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact

Vodafone Secure Device Manager Administration User Guide

OnCommand Performance Manager 1.1

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

User Management Tool 1.6

Request Manager Installation and Configuration Guide

VMware vcenter Operations Standard Installation and Administration Guide

Using WhatsUp IP Address Manager 1.0

Transcription:

GRAVITYZONE UNIFIED SECURITY MANAGEMENT Use Cases for Beta Testers

Introduction This document provides beta testers with guidelines for testing Bitdefender GravityZone solutions. To send your feedback, use the Feedback link in GravityZone Control Center. Use Case 1 New Customer Deploys GravityZone to Protect Computers Description: A customer downloads the GravityZone Virtual Appliance and starts to deploy it to protect the company computers. 1. Import the virtual appliance image in a VMware vsphere, Citrix XenServer or Microsoft Hyper-V virtual environment. 2. Start the machine and complete the setup from the CLI interface: configure the network settings and install all roles (Database, Update Server, Web Console and Communication Server) on the same machine. 3. Access the Control Center web interface and log in with MyBitdefender username and password. 4. Go to Settings and configure the integration with Active Directory (AD). 5. Go to Accounts, import a user from AD and grant the user Administrator permissions over Computers (with access to all groups). 6. Log out and then log in to the Control Center web interface with the username and 7. Go to Network, select a computer and perform an installation task (note the need to add credentials). 8. From the Network section: a. Check synchronization with Active Directory. b. Check Custom Groups operations: add, edit, remove and show all computers. c. Check group filters: Managed, Unmanaged, Deleted. d. Search for a computer using available filters. e. Assign a quick scan task. f. Assign an update task. g. View task progress and results in the Tasks section (scan tasks may take a while). 9. Go to Network -> Packages and add (customize) an Endpoint Security installation package. 10. Run the Setup Downloader on a workstation and observe the local installation process: a. Measure the installation process time and tell us what you think. b. Check that a scan is performed during installation (follow the setup wizard progress). c. Check if the installation has finished successfully. d. In Control Center, go to Network and check if the endpoint has synced (it must appear in the Managed Computers list). e. Tell us about your overall installation experience. 11. Go to Policies and create a new template policy. 2

12. Go to Network and assign the new policy. a. Select a computer or a group of computers. b. Open the policy assignment options and note the current settings. c. Stop the policy inheritance and assign the new policy. 13. Test the Quarantine feature: a. On a protected workstation, try to download an Eicar test file from: c. In Control Center, go to Quarantine and delete or restore the file. 14. Test Control Center reporting feature: a. Create new scheduled reports: Now, Daily, Weekly, Monthly. b. Create a quick report from the Network section. 15. Go to Dashboard and customize it: 16. Go to Logs and check your actions in Control Center. Use Case 2 Computer User Interacts with the Client Software Description: My IT department installed the new security software, Endpoint Security by Bitdefender, on my workstation. 1. Open the Endpoint Security by Bitdefender interface by using the Notification Area (System Tray) icon and observe the following: - Minimal vs. Extended view: what do you think about it? - Status tab: does this section provide the necessary info from the end-user s point of view? What about the administrator s point of view? What would you add or remove? - Tasks tab: what do you think about the tasks available here? - Events tab: use the information filtering and search. 2. Go to the Tasks tab and run a Quick Scan task, then a Custom Scan. Tell us what you think about the scan wizard: - Are the scan wizard steps and options clear for the Custom Scan? What else would you add or remove? - At the end of the scan, click the Show Log button does the Log File include all the information you need? - What do you think about the scan speed? - Tell us about your overall scan experience. 3. Right-click the Notification Area (System Tray) icon, click About and: - Check that the software is up-to-date (automatic updates). - Check the displayed information. 4. With Endpoint Security by Bitdefender installed, please use your system as before and tell us about the product impact on your computer: - CPU and Memory consumption - Slowdowns or application crashes - Slow Internet access 3

Use Case 3 Existing Customer Adopts Virtualization (VMware with vshield) protection to virtual machines within their recently implemented virtualized environment (VMware vcenter with vshield Endpoint). 2. Go to Settings -> Virtualization and add a new virtual server. 3. Go to Accounts, edit an administrator user and grant the user access permissions over Virtual Machines, with the new server set as target. 4. Log out and then log in to the Control Center web interface with the username and 5. Go to Network and install a Security Virtual Appliance (SVA) on a host. 6. Go to Network, select a virtual machine and perform an installation task (note the need to add credentials). 7. From the Network section: a. Check integration with vcenter Server. b. Change views. c. Assign a Scan task and check the scan report. d. Assign an Update task. 8. Go to Policies and create a new template policy. 9. Go to Network and assign the new policy to a specific host. 10. Test the Quarantine feature: a. On a protected machine, try to download an Eicar test file from: c. In Control Center, go to Quarantine and delete/restore/download the file. 11. Go to Reports and create new scheduled reports: Now, Daily, Weekly, Monthly. 12. Go to Dashboard and customize it: 13. Go to Logs and check your actions in Control Center. 4

Use Case 4 Existing Customer Adopts Virtualization (VMware without vshield) protection to virtual machines within their recently implemented virtualized environment (VMware vcenter without vshield Endpoint). 2. Go to Settings -> Virtualization and add a new virtual server. 3. Go to Accounts, edit an administrator user and grant the user access permissions over Virtual Machines, with the new server set as target. 4. Log out and then log in to the Control Center web interface with the username and 5. Go to Network and install a Security Virtual Appliance (SVA) on a host. 6. Go to Network -> Packages and add (customize) a Silent Agent installation package. 7. Download and install the Silent Agent on a virtual machine. 8. Go to Network, select a virtual machine and perform an installation task (note the need to add credentials). 9. From the Network section: a. Check vcenter Server inventory. b. Change views. c. Assign a Scan task and check the scan report. d. Assign an Update task. 10. Go to Policies and create a new template policy. 11. Go to Network and assign the new policy to a specific host. 12. Test the Quarantine feature: a. On a protected machine, try to download an Eicar test file from: c. In Control Center, go to Quarantine and delete/restore/download the file. 13. Go to Reports and create new scheduled reports: Now, Daily, Weekly, Monthly. 14. Go to Dashboard and customize it: 15. Go to Logs and check your actions in Control Center. 5

Use Case 5 Existing Customer Adopts Virtualization (Citrix XenServer) protection to virtual machines within their recently implemented virtualized environment (Citrix XenServer). 2. Go to Settings -> Virtualization and add a new virtual server. 3. Go to Accounts, edit an administrator user and grant the user access permissions over Virtual Machines, with the new server set as target. 4. Log out and then log in to the Control Center web interface with the username and 5. Go to Network and install a Security Virtual Appliance (SVA) on a host. 6. Go to Network -> Packages and add (customize) a Silent Agent installation package. 7. Download and install the Silent Agent on a virtual machine. 8. Go to Network, select a virtual machine and perform an installation task (note the need to add credentials). 9. From the Network section: a. Check XenServer inventory. b. Change views. c. Assign a Scan task and check the scan report. d. Assign an Update task. 10. Go to Policies and create a new template policy. 11. Go to Network and assign the new policy to a specific host. 12. Test the Quarantine feature: a. On a protected machine, try to download an Eicar test file from: c. In Control Center, go to Quarantine and delete/restore/download the file. 13. Go to Reports and create new scheduled reports: Now, Daily, Weekly, Monthly. 14. Go to Dashboard and customize it: 15. Go to Logs and check your actions in Control Center. 6

Use Case 6 Existing Customer Secures Mobile Devices protection to the mobile devices of its employees. 2. Go to Accounts and create a new user (or edit an existing user), granting the user Administrator permissions over Mobile Devices (with access to all users). 3. Log out and then log in to the Control Center web interface with the username and 4. Go to Network and add a new device to a user. 5. The Admin or the user installs the GravityZone Mobile Client on the device (from App Store / Play Market), launches it, then enters the activation code or scans the QR code (available on the user s email or on the mobile device properties). 6. Device is now active and can be controlled from the Control Center. 7. Go to Policies and create a new template policy. 8. Go to Network and assign the new policy to a user or a group of users. Use Case 7 Company Employee Loses Mobile Device Description: A company employee reports to the IT department that his company s mobile device was stolen. The mobile device is protected by Bitdefender. 1. The IT admin with administrator permissions over Mobile Devices logs in to the Control Center web interface. 2. From the Network section: a. Lock the device. b. Locate the device in order to identify if it is really stolen. c. Wipe data on the device. 7