McAfee Security. Management Client



Similar documents
Forcepoint Stonesoft Management Center

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Next Generation Firewall (NGFW) Administration Course

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

McAfee SMC Reference Guide 5.7. Security Management Center

McAfee Web Reporter Turning volumes of data into actionable intelligence

White Paper. Network Management and Operational Efficiency

McAfee Network Security Platform Administration Course

STONEGATE 5.3 SMC REFERENCE GUIDE S TONEGATE MANAGEMENT CENTER

How To Manage Sourcefire From A Command Console

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

NMS300 Network Management System

Vistara Lifecycle Management

HP PCM Plus v4 Network Management Software Series

McAfee Security Information Event Management (SIEM) Administration Course 101

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features

HP Intelligent Management Center Enterprise Software. Platform. Key features. Data sheet

HP TippingPoint Security Management System User Guide

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

HP E-PCM Plus Network Management Software Series

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Introduction to Junos Space Network Director

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Check Point Security Administrator R70

WhatsUp Gold vs. Orion

Clavister InSight TM. Protecting Values

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

WatchGuard SSL 2.0 New Features

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

PROPALMS TSE 6.0 March 2008

vcloud Director User's Guide

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course

Nasuni Management Console Guide

VCE Vision Intelligent Operations Version 2.5 Technical Overview

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere

Cisco Application Networking Manager Version 2.0

VMware Mirage Web Manager Guide

Cisco Prime Data Center Network Manager Release 6.1

VMware vcloud Networking and Security Overview

HP PCM Plus v3 Network Management Software Series Overview

SOLARWINDS NETWORK PERFORMANCE MONITOR

McAfee Next Generation Firewall

HP IMC Firewall Manager

Violin Symphony Abstract

About Network Data Collector

XpoLog Center Suite Data Sheet

Netwrix Auditor for Windows Server

Kaseya IT Automation Framework

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Netwrix Auditor for Active Directory

What s New in Security Analytics Be the Hunter.. Not the Hunted

Cisco UCS Central Software

About the VM-Series Firewall

UNISYS. Server Management 2.0. Software Release Announcement. imagine it. done. Server Management 2.0 and Higher. May

FireMon Security Manager Fact Sheet

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

JUNOS SPACE SECURITY DIRECTOR

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

SolarWinds Network Performance Monitor

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Network Management Deployment Guide

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

How To Buy Nitro Security

SolarWinds Network Performance Monitor powerful network fault & availabilty management

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version /12/13. Product Information. Version & Platform SGOS 6.

Junos WebApp Secure (formerly Mykonos)

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

IBM QRadar Security Intelligence Platform appliances

EPICenter Network Management Software

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Leveraging Best Practices for SolarWinds IP Address Manager

Portal Administration. Administrator Guide

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Overview and Deployment Guide. Sophos UTM on AWS

MSP Dashboard. Solution Guide

Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

EMC Data Protection Advisor 6.0

Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

SSL VPN Technical Primer

Providing Secure IT Management & Partnering Solution for Bendigo South East College

OnCommand Unified Manager

SapphireIMS 4.0 BSM Feature Specification

Multi-Domain Security Management

The Purview Solution Integration With Splunk

Oracle Communications Session Delivery Manager

HP A-IMC Firewall Manager

Netwrix Auditor. Administrator's Guide. Version: /30/2015

VCE Vision Intelligent Operations Version 2.6 Technical Overview

Cisco Wireless Control System (WCS)

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

TORNADO Solution for Telecom Vertical

Transcription:

Security Management Center Efficient, centralized management of Next Generation Firewalls in distributed enterprise environments Key Benefits Centralized, single-paneof-glass management of Next Generation Firewalls in distributed environments. Flexibility and scalability for deployment in large distributed enterprise environments. High availability supports demanding uptime requirements. Unified Network Security Management Security Management Center ( SMC) provides unified, centralized management of Next Generation Firewalls, in all operational modes across large geographically distributed enterprise environments. Superior flexibility, scalability, and easeof-use support dynamic network security environments and aggressive business growth plans. Optimized workflows streamline daily administrative tasks and security management for high efficiency and low TCO. SMC also supports third-party devices, gathering event management and status monitoring information for generating detailed reports. This open approach provides administrators with a comprehensive view of their environment. SMC consists of two components Management Server and Log Server which can reside on the same or separate servers. Efficient workflow automation provides fast and accurate deployment and maintenance of Next Generation Firewalls. Provides situational awareness and visibility across your entire network, including branch and remote sites. Customer Help Desk Server Management Server Administrator Security Management Client Log Server SMC 3rd Party Device Next Generation Firewall Layer 2 Firewall Next Generation Firewall in IPS mode Firewall/VPN Figure 1. Key components in the SMC architecture.

Figure 2. Policy editor. Figure 3. Real-time monitoring with customizable overviews. High Availability Today s businesses have zero tolerance for disruption, demanding 24/7/365 access to critical resources. SMC High Availability features enable reliable deployment of extremely resilient management infrastructure with continuous access to log resources. Security Management Client Regardless of geographic location, administrators can access SMC with the Security Management Client. The client provides a simple graphical user interface for configuration, monitoring, logging/alerts, reports, updates, and upgrades to Next Generation Firewalls. The Security Management Client provides administrators with a holistic view of the network and drill-down actions for effective management of your entire security environment. Security Connected Security Connected makes it possible for security solutions to share threat information. SMC enables fast and simple interconnection and intelligence sharing among supported devices. Security Management Center 2

Security Management Center Specifications Management Server Number of Managed Devices Number of Administrators Number of Elements Number of Policies Number of Log Servers Number of Servers Administrator Authentication Device Connections Log Server Number of Supported Devices Log Records per Second Device Connections Log Storage Size Number of Log Forwardings per Log Server Features General Management Client SMC Application Programming Interface (API) Simultaneous Administrators High Availability Automatic Updates and Upgrades Backups Navigation Search Tools Quick Filtering Multiselection Support System Clean-Up Tools Administration Alert Escalations Alert Thresholds Audit Logs System Reports Plug-and-Play Installation Automated Tasks SMC Domain License Import/Export License limited: 2 to 2,000 nodes with one management server Local database, RADIUS SSL-encrypted The high-performance logging system can process more than 500,000 records per second SSL-encrypted Java-based client program with Java Web Start support Documented API enabling easy third-party product and service integration Uses REST architecture where data can be XML or JSON coded Several administrators can perform changes at the same time Critical elements like policies are locked for editing Supports up to four standby management servers Management automatically downloads the latest next-generation firewall upgrades and dynamic updates Integrated backup tool for taking backups from the whole system, including all nextgeneration firewall configurations Intuitive browser-like navigation with browsing history, tabs, and bookmarks Efficient element and references search tools Convenient type-ahead filtering in element lists, tables, and policy cells Perform actions and commit changes to hundreds of elements at the same time Enables administrator to easily find which elements and rules are not used Allows administrator to forward alerts from the system using email, SMS, SNMP trap, and custom scripts Automatic alert thresholds for overview statistics Extensive audit information about all changes in the system Inventory and audit reports about administrators activities Automatic installation: cloud (or USB stick)-based installation with initial policy push Refresh policies; archive, export, and delete logs; make backups with automated tasks Allows division of the environment into isolated configuration domains XML and CSV export and import with intelligent conflict handling between SMC installations Security Management Center 3

Messenger Tool Remote Upgrades Roles-Based Access Control License Management Troubleshooting Tools Policy Management Virtual Contexts Hierarchical Policy Management Application Identification URL Filtering Domain Names User Identification Zones Inspection Policies Quality of Service (QoS) Policies Policy-Based File Filtering Network Address Translation (NAT) Policy Validation Tool Policy Snapshots Policy Restoration Rule Usage Optimization Tool Rule Search Tool Rule Names Fail-Safe Policy Uploads Configuration Authentication Server Routing Automatic Anti-spoofing IPsec VPN SSL VPN Route-Based VPN Incident Case Management Firewall Element Creation Wizard Browser-Based User Authentication Integrated administrator messaging tool One-click fail-safe remote upgrade Flexible and accurate administrators permission control Automatic online license updates and maintenance contract status reports Extensive remote diagnostic capabilities: integrated traffic capture tool, diagnostics, configuration snapshot download from next-generation firewall, and session monitoring views Share same master context across several Security Management Center domains up to 250 virtual contexts, and each has its own policies and routing tables Policy templates, sub-policies, aliases, and rule comment sections keep the policy organized and understandable Restrict access based on network and/or client applications: Identify applications by payload, and restrict access accordingly Use client application information from Endpoint Intelligence Agent Restrict access by URL categories Restrict access dynamically by using domain names Create user-based rules either with or without authentication Physical interfaces can be tagged with zones and referred in the policies Granular control for deep packet inspection and easy ways to toggle off false positives QoS class-based policy configuration Define how file types are inspected using Global Threat Intelligence file reputation, Anti-Malware Scan, and Advanced Threat Defense Default NAT Element-based NAT NAT policies Helps administrator find configuration mistakes before policy activation Allows for exploration and comparison of Next Generation Firewall configuration history A previous policy version can be recovered and uploaded to the next-generation firewall Enables administrators to see how many times each rule has matched within a specified time period Integrated tool for searching rules in policies Ability to create rule names that are visible in logs, statistics, and reports System automatically restores the previous policy version if the new version fails SMC server provides four RADIUS-based strong authentication methods and automatic user linking capabilities for your existing AD/LDAP server Drag-and-drop routing configuration for the firewalls and specific widgets to add routes and default routes Anti-spoofing configuration is created automatically based on routing Easy-to-use VPN editor and VPN diagrams reveal the underlying topology SSL VPN Portal and SSL VPN full tunnel configuration support Define tunnel interfaces and use them in route-based VPN Integrated tools for collaborative network incident management Create hundreds of firewall elements through a firewall creation wizard Configure and customize an easy browser-based authentication service for users Security Management Center 4

Status, Statistics, and Reporting System Status Monitoring Appliance Status Monitoring Networks Diagrams Session Monitoring Overviews Geolocations Reporting Third-Party Event Management Third-Party Device Monitoring Third-Party Device Log Reception NetFlow/IPFIX Reception Third-Party Device Statistics Number of Supported Third-Party Devices Licensing Logs Log Browser Drag-and-Drop Filtering Log Statistics Log Visualizations Log Aggregations Archiving Backups Log Exports Log Forwarding Log Data Contexts High Availability Real-time status information about network devices and their connections Graphical view on the hardware status of the appliances Visualize configurations, topologies, and status connectivity with drawings Dedicated views to monitor connections, VPN security associations (SAs), authenticated users, active alerts, and dynamic and static routes Customize dashboards of network statistics for real-time monitoring Show the country information for all IP addresses with the help of country flags and geolocation statistics. Show where network attacks come from Customize and schedule reports that provide detailed information about network statistics Lightweight web access to policies, logs, and reports Allows administrator to monitor and view status changes in third-party device availability Log parsing and reception in syslog format for third-party devices and out-of-the box support for CEF, LEEF, CLF, and WELF format Ability to receive and consolidate data in NetFlow v9 and IPFIX formats Graphical statistics and reports based on third-party log data and simple network management protocol (SNMP) counters 200 per log server Each third-party device consumes 0.2 from management server license device count Common log browsing view for all log data Efficient log filtering drag and drop any log data cell to the query panel Create log statistics on the fly and see the top trends Find the anomalies in logged traffic in filterable log visualizations Summarize the large amount of filtered log data by any columns Archive logs in multiple directories by using filtering Integrated backup mechanism for log server configuration and log data CSV, XML, CEF, LEEF, and Enterprise Security Manager log exporting; logs can also be exported to PDF and ZIP files directly from the log browser Real-time log redirection in syslog; CEF, LEEF, XML, CSV, IPFIX, NetFlow, and Enterprise Security Manager formats; configuration for filtering, data type; and log field selection available Shortcuts to browse different types of logs with dedicated column sets Support for backup log servers Security Management Center 5

Key Advantages Multiple customers and organizations can share a single network for greater efficiency. Highly granular and flexible administrative access rights, including domains. Safe and optimized control and management of multidomain environments. SMC Domain License Provides Centralized Management of Multiple Customer Environments Managed Security Service Providers (MSSPs) need to reduce the high administrative costs associated with managing multiple servers across multiple domains. SMC Domain License enables management of multiple customer environments through a single management server. Configurations can be reused and shared across domains for rapid and efficient distribution of changes. Security Management Center The unique architecture of the SMC Domain License solution simplifies enterprise and MSSP environments, making them easier to maintain. Role-based access management (RBAC) ensures accurate definition of administrator responsibilities and domain access limitations. Domain-based customers can access reports, policy configurations, and logs easily via a secure, lightweight web portal. Customer 1 Shared Domain Customer 2 Administrators Define Administrator responsibilities Customer 3 Customer 1 Read-only access for customers or local administrators Figure 4. Logical layouts of managed domains. SMC Domain License Specifications Domains Maximum Number of Domains 200 Number of Administrators Number of Managed Devices per Domain Number of Elements per Domain Features Configuration Separation Configuration Sharing Access Control Monitoring Customization Migration Tools Import/Export Virtual Contexts Isolate customer environments to different domains, and make sure that customers network elements never get mixed up Share elements such as policy templates for all domains Configure the administrators visibility and responsibilities with the help of domains Monitor the status of all granted domains with the help of the domain overview Customize the PDF style templates Move elements between domains with the integrated move-to tool Import and export elements between different SMC installations and domains Share the same master context across domain boundaries of up to 250 virtual contexts, which can each have their own policies and routing tables Security Management Center 6

Key Advantages Clientless, read-only access to logs, reports, policies, and policy change history. Real-time network status available for defined users. Support for mobile devices. Server Server provides customers, administrators, and management with a lightweight web-based portal for viewing logs, scheduled reports, current policies, and policy change history. MSSP administrators can configure the amount of information displayed on the portal based on customer needs or to reduce support requests. Server supports English, Spanish, and French natively, with the ability to add new languages. Figure 5. Web portal login screen. Server Specifications Specifications Maximum Number of Concurrent Users Number of Administrators Number of Users User Authentication Device Connections Features Security Policies Reports Log Browsing Log Details PDF Export Announcements Policy Comparison Localization Customization 250 per license License limited Management server database, RADIUS SSL-encrypted View next-generation firewalls latest configurations in HTML format View reports that are scheduled to be published in the web portal in HTML format Browse and filter the logs in HTML format View log event visualizations and other log details in a separate HTML page Print reports and logs to PDF documents Administrators can specify announcements to be shown in the web portal Compare the different next-generation firewall configuration versions to see if the change request has been implemented The web portal can be easily translated to any language Customize the look-and-feel of web portals. Part of Intel Security. 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.intelsecurity.com Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. and the logo are registered trademarks or trademarks of, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2015 Intel Security, Inc. 61887ds_smc_0415_fnl_ETMG