Tech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2. Presented by Martin Gannon June 21, 2015



Similar documents
Software License Monitoring

Proven LANDesk Solutions

LANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities

Custom Vulnerabilities. NA Channel SE Team Lead landesk.com

Resolving the Top Three Patch Management Challenges

Terminal Emulation Productivity Continues

Self Service. Jeff Hance LANDESK Software

LANDesk Data Analytics

Managing Security Risks in Modern IT Networks

Endpoint Security for DeltaV Systems

Chief Security Strategist Symantec Public Sector

Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant

LANDESK Service Desk. Desktop Manager

Software License Asset Management (SLAM) Part III

Reducing the cost and complexity of endpoint management

LANDesk Management Suite 8.7 Extended Device Discovery

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

LANDESK Service Desk. Supported Platforms and Feature Compatibility

IBM Endpoint Manager for Core Protection

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Windows Hard Disk Encryption

Mobility Manager 9.5. Installation Guide

IBM Tivoli Endpoint Manager for Security and Compliance

System Image Recovery* Training Foils

Mobility Manager 9.5. Users Guide

Secure User Management

AntiVirus. Administrator Guide

INFORMATION PROTECTED

Managing Wireless Clients with the Administrator Tool. Intel PROSet/Wireless Software 10.1

Endpoint protection for physical and virtual desktops

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

2012 Endpoint Security Best Practices Survey

Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA)

Intel Identity Protection Technology (IPT)

Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

IBM Tivoli Endpoint Manager for Lifecycle Management

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Endpoint protection for physical and virtual desktops

IBM Tivoli Endpoint Manager for Security and Compliance

What s New in LANDESK Service Desk Version 7.8. Abstract

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Insight. Security Response. Deployment Best Practices

Intel HTML5 Development Environment. Article - Native Application Facebook* Integration

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Reducing Risk Through Effective Certificate Management

Accelerating Your Distributed Environment with LANDesk Systems Management

Samsung Portable SSD T1

Addressing the United States CIO Office s Cybersecurity Sprint Directives

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

IBM Lotus Protector for Mail Encryption. User's Guide

Classroom Management, part of Intel Education User Manual

IBM Endpoint Manager Product Introduction and Overview

Configuring and Monitoring SNMP Generic Servers. eg Enterprise v5.6

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

New Security Features

Security Industry Market Share Analysis

Intel Media SDK Library Distribution and Dispatching Process

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

IT Security Cost Reduction

IBM Tivoli Endpoint Manager for Lifecycle Management

Abila Nonprofit Online. Connection Guide

Best Practices in Deploying Anti-Malware for Best Performance

On and off premises technologies Which is best for you?

Intel Platform and Big Data: Making big data work for you.

Getting Ahead of Malware

October Application Control: The PowerBroker for Windows Difference

Intel Matrix Storage Console

How Are Certificates Used?

IBM Lotus Protector for Mail Encryption

Endpoint Security More secure. Less complex. Less costs... More control.

Desktop Authority vs. Group Policy Preferences

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

A Layperson s Guide To DoS Attacks

Eight Ways Better Software Deployment and Management Can Save You Money

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Symantec Endpoint Protection

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

Key Technology Trends

Intel SSD 520 Series Specification Update

How To Get A Client Side Virtualization Solution For Your Financial Services Business

Mastering the Mobile Revolution with Total User Management

Trusted Platform Module (TPM) Quick Reference Guide

End to End Security do Endpoint ao Datacenter

A Superior Hardware Platform for Server Virtualization

Peer Research Desktop Virtualization Insights for IT Strategic Planning

OS Deployment and Migration

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Server Virtualization with QNAP Turbo NAS and Citrix XenServer How to Set up QNAP Turbo NAS as Storage Repositories on Citrix XenServer via iscsi

Symantec Enterprise Vault for Lotus Domino

Business Process Management The Key to ITIL Success

Software License Asset Management (SLAM) Part 1

Transcription:

Tech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2 Presented by Martin Gannon June 21, 2015

Contents Questions and Answers from the Live Webinar... 3 About LANDesk Software... 5 To the maximum extent permitted under applicable law, LANDESK assumes no liability whatsoever, and disclaims any express or implied warranty, relating to the sale and/or use of LANDESK products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right, without limiting the rights under copyright. LANDESK retains the right to make changes to this document or related product specifications and descriptions, at any time, without notice. LANDESK makes no warranty for the use of this document and assumes no responsibility for any errors that can appear in the document nor does it make a commitment to update the information contained herein. For the most current product information, please visit www.landesk.com. Copyright 2014, LANDESK Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks of LANDESK Software, Inc. and its affiliates in the United States and/or other countries. Other brands and names may be claimed as the property of others. 2

Questions and Answers from the Live Webinar Q Can run EPS without the epsui.exe? A You can run EPS without having the system tray icon show up in the system tray, and also have it not show up in the LANDESK program group on the client. Q How frequently is the list updated? A The list is updated every two minutes by the Softmon process on the client, and/or every time vulscan runs. Evidence of the activity will show up in the Security activity. Q If the agent is deployed without the UI is epsui.exe not installed or is it installed and disabled? A The If the Agent is deployed without the UI, EPSUI goes down, but it is disabled. Q Is there a way [outside of LANDesk File Reputation] to scan your Trusted lists [md5 hash for example] for malicious content?? A You can take the MD5 hash from your trusted file list and input it into http://www.virustotal.com Q Is EPS provided as part of the standard LDMS license or Security Suite, or is it a separate license that must be purchased? A EPS is provided as part of the Security Suite license. Q Does it learn it to the trusted file list or to a learn mode list? A You can set the learning to go to a main globally used list, or you can have it learned to the learning list. Q Just like the App Blocking feature, Can this product be used to block OS Updates on endpoints - Windows & Macs OR will this be done via Patch & Compliance? A EPS is Windows only. Q Where does it store the shadow copied files? A It is configurable by default I believe it is under System32\ShadowCopy Q Is there a faster way to have devices send their "user requested apps" in Security Activity to report back to the core [to add an app to the whitelist] 3

A The user can run the security scan manually and this will send back the information to the core with the patch data Q Will items on the trusted vendors list be exempted from the rules if you are in HIPS mode? A Specific rules per file will be enforced regardless of the Trusted Vendor setting. Q Should the Trusted File list be purged of older entries? Is there is size/performance concern to be aware of? A You shouldn t worry about purging older entries. You will want to set a threshold on the length of information you want to keep in the security activity. Q What prevents malware from using a Trust Vendor name such as Microsoft or LANDESK? A The Trusted Vendor list is based on Digital Signatures in the files. It is very difficult for malware to spoof a digital signature. There have been a few instances, but it is very rare. Q So what does the trusted vendor list allow? A The trusted vendor list allows for any vendors that are digitally assigned with that vendor name to be given full control. This can be overwritten by manually set permissions per file. All LANDESK files are automatically trusted. Q Does LANDESK Endpoint protection integrate with Symantec EPP and TrendMicro? A Yes, it is compatible with running with Symantec EPP and TrendMicro. Q End Point Protection is a separate add-on to Antivirus correct? A Yes, EPS is a part of LANDESK Security Suite and LANDESK antivirus is a separate license. 4

About LANDesk Software Simple IT environments are a thing of the past. IT departments juggle too many tools from too many vendors while facing pressure to cut costs, reduce risk and boost productivity. Workers are adding smart phones and tablets to PC or notebook use, dramatically increasing the number of endpoints and operating systems that must be managed. Organizations need intelligent, integrated control over diverse systems and devices. Customers worldwide use LANDesk systems lifecycle management, endpoint security and IT service management (ITSM) solutions to simplify IT complexity and manage mobility mayhem; discover, track and safeguard assets and endpoints; and enable IT staff to improve service levels all while reducing costs and requiring less infrastructure. An IDC study found that on average, LANDesk customers realized a three-year return on investment of 698% for their deployed LANDesk solutions a nearly sevenfold return. The average payback period to recover the initial investment averaged a short 5.1 months. 5