Agilent Technologies Electronic Measurements Group Computer Virus Control Program



Similar documents
Malware Protection II White Paper Windows 7

Malware Protection White Paper

Basic Virus Removal Steps

Managed Antivirus Quick Start Guide

Patch and Vulnerability Management Program

Trusteer Rapport Virtual Implementation Scenarios

Driving Company Security is Challenging. Centralized Management Makes it Simple.

How to easily clean an infected computer (Malware Removal Guide)

Getting Ahead of Malware

Net Protector Admin Console

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

Managing a Malware Outbreak

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

User Manual. HitmanPro.Kickstart User Manual Page 1

Security Industry Market Share Analysis

How To Manage A System Vulnerability Management Program

AVG File Server. User Manual. Document revision ( )

(Self-Study) Identify How to Protect Your Network Against Viruses

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Data and Network Security

Comodo Endpoint Security Manager SME Software Version 2.1

Security on Embedded Systems

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

End-user Security Analytics Strengthens Protection with ArcSight

Introduction. PCI DSS Overview

ANTIVIRUS EVALUATION GUIDE. AntivirusBusiness. Make the Right Choice the First Time

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Office of Education Technology (OET) Security Best Practices Guideline for Districts

User Guide Max Secure Recovery CD/USB creation

Industrial Security for Process Automation

Yamaha 01V96 Version2 Upgrade Guide

Basic Computer Maintenance

Sophos Computer Security Scan startup guide

SECURITY IN OPERATING SYSTEM VIRTUALISATION

You can protect your computer against attacks from the Internet with Windows Vista integrated Firewall.

Managing Remote Access

Client Manager for Endpoint Protection (CMEP) User s Guide

Endpoint Security Management

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices

Trend Micro OfficeScan Best Practice Guide for Malware

An Oracle Technical White Paper January How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance

What Do You Mean My Cloud Data Isn t Secure?

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

Best Practices for DanPac Express Cyber Security

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

Sophos for Microsoft SharePoint startup guide

SAFEGUARDING YOUR WINDOWS COMPUTER

Quarantine Network for Specialised Equipment.

AVG File Server User Manual. Document revision (8/19/2011)

Endpoint Security: Moving Beyond AV

Software Testing Methodology: Anti-spyware and AntiVirus

Release Version 4.1 The 2X Software Server Based Computing Guide

Dell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing

Developing A Successful Patch Management Process

Microsoft Security Essentials Installation and Configuration Guide

Did you know your security solution can help with PCI compliance too?

Data Management Policies. Sage ERP Online

A guide to CLARiSUITE TM network solutions

Cox Business Premium Security Service FAQs

Security Industry Market Share Analysis

Virtual COM Port Driver Installation Manual

Patch Management Policy

Airtel PC Secure Trouble Shooting Guide

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

AVG File Server User Manual. Document revision (11/13/2012)

Real World and Vulnerability Protection, Performance and Remediation Report

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

IBM Endpoint Manager for Core Protection

Medical Device Security Health Group Digital Output

Installation and Configuration Guide

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

Two Great Ways to Protect Your Virtual Machines From Malware

Lecture 6: Operating Systems and Utility Programs

What you can do prevent virus infections on your computer

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Home Use Installation Guide For Symantec Endpoint Protection (SEP) 11 For Mac

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Understand Backup and Recovery Methods

Best Practice Configurations for OfficeScan 10.0

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

FAQ. Safe Anywhere PC. Disclaimer:

Avaya Modular Messaging 5.x

ViPNet ThinClient 3.3. Quick Start

Endpoint protection for physical and virtual desktops

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

An Oracle Technical White Paper May How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Best Practice Configurations for OfficeScan (OSCE) 10.6

Kaspersky Endpoint Security 10 for Windows. Deployment guide

OPERATION MANUAL. ValueJet Print Server. Read This Manual Before Using The Application VPSE-C-01. 管 理 No.

Seven for 7: Best practices for implementing Windows 7

Use Bring-Your-Own-Device Programs Securely

Security appliances with integrated switch- Even more secure and more cost effective

Core Protection for Virtual Machines 1

Discovering Computers

Getting Started with Symantec Endpoint Protection

Transcription:

Agilent Technologies Electronic Measurements Group Computer Virus Control Program Agilent Technologies Electronic Measurements Group (EMG) recognizes the potential risk of computer virus infection that may be posed by instruments which are capable of connecting to computers or networks. We take the threat very seriously and have taken action to address and minimize the threat. The following Frequently Asked Questions addresses key areas of concern. 1. What steps do you take to protect your instruments from infection by computer viruses? a. EMG has enacted a number of measures to take all reasonable precautions to prevent the spread of viruses from instruments to our customers computers and networks. In addition to implementation of centrally managed firewall and anti-virus programs for all business computers, all computers used in operations that touch instruments destined for customers maintain the latest virus definitions and are scanned regularly. b. Strict virus control protocols have been enacted in manufacturing, service, support, sales, distribution and demonstration environments which include the use of isolated LANs, control of removable memory devices, scanning of instruments and removable memory devices and/or reimaging hard drives, as appropriate depending upon instrument configuration. c. EMG wide training of all personnel who come in contact with customer instruments to reinforce anti-virus security protocols. These employees include manufacturing, service, support, sales, distribution and demonstration equipment management personnel. 2. How does Agilent s Electronic Measurements Group respond to reports of viruses on their instruments? a. All reports of potential instrument infections are escalated to Vice President of Quality and Customer Experience, the same as any safety related incident that poses a threat to a customers personnel or property would be reported. In the event that either a customer reports an infection OR Agilent reports that an instrument is infected upon receipt (for service, or from demonstration), the following steps are followed: i. Immediate Mitigation/Vector Control Agilent works with the customer to mitigate the threat, by either taking the unit back and replacing it with a clean instrument, or working with the customer to scan and eliminate the viral threat. ii. Trace source of infection and extent of the infection to understand where and when the virus was introduced, the nature of the virus and potential damage that could be caused. Where appropriate, a thorough report of findings is presented along with recommendations for necessary corrective actions to prevent the future spread of viruses. iii. Once the threat is thoroughly understood and the infection vectors are determined, internal preventative actions are updated to adjust to the new threat(s). In the event it is determined that the virus originated outside of Agilent, Agilent will make recommendations on actions that should be taken to protect our customers instruments. 3. What can I do to protect my instruments from viruses? a. As with personal and business computers, the user must take appropriate steps to protect their instruments from infection. This may include; installing the latest Operating System security patches, Installing and running anti-virus software, use of

strong firewall settings, and eliminating the use of detachable memory devices (ie. USB Thumbdrives, portable hard disks), and regular scanning of any memory device used with an Agilent instrument. While Agilent does NOT recommend running anti-virus software in the background on Windows i based instruments, due to potentially degrading performance, it does recommend installation of anti-virus software and running it during non-critical hours at least once per week. 4. Where can I learn more details about my instrument, how it is configured and how to protect it? a. EMG offers more than 600 models of instruments to our customers, with tens of thousands of possible option combinations and configurations. With respect to those attributes that make instruments potentially vulnerable to computer viruses, our instruments may contain any combination of; hard disk and solid state memory, USB and LAN ports for both general purpose and proprietary communications, Windows and non-windows operating systems of various vintages. With the variety of possible configurations, it is impractical to list details for each and every configuration. In order to help our customers understand potential virus control measures, we classify our instruments into the following categories: Category 1: A Windows XP/Vista based machine. Description: PC based instrument running XP, VISTA or Seven Windows or Windows Embedded Operating System. Characteristics: Typically behaves the same as a desktop PC, with ability to connect to LAN, USB devices, keyboard, external monitor, etc. Typically boots from an internal hard disk drive. Are Susceptible to current generation of wild viruses, which may either reside or execute on the instrument. - Install customer preferred anti-virus scanning (AVS) software, scan regularly. Not recommended to run AVS in background mode as it will impact instrument performance. - Instrument may also be mounted as a disk drive on a network and scanned from another PC. - Deactivate Autorun.inf to prevent inadvertent execution of malicious code on portable memory devices. - Enable strong firewall settings. Category 2: A Windows98/2000/CE based machine Description: PC based instrument running 98, 2000 or CE Windows or Windows Embedded Operating System. Characteristics: Typically behaves the same as a desktop or handheld PC, may have ability to connect to LAN, USB devices, keyboard, external monitor, etc. Typically boots from an internal hard disk drive or solid state memory. May be Susceptible to current generation of wild viruses, but less likely than current generation OS. Viruses may either reside or execute on the instrument. - Due to age, Anti-virus software and current definitions may not be available.. - Instrument may be mounted as a disk drive on a network or over USB and scanned from another PC. - Deactivate Autorun.inf to prevent inadvertent execution of malicious code on portable memory devices. - Enable strong firewall settings. Category 3: A non-windows machine that can share files and can be mounted as a drive. Description: PC based instrument running non-windows operating systems such as LINUX, UNIX, VxWorks, etc.

Characteristics: Special purpose computing engine and operating system optimized for specific task. May have LAN connectivity. May have USB connection for data transfer, license and firmware uploads. Not susceptible to current generation wild viruses but may harbor viruses and pass to host computer. - Instrument may be mounted as a disk drive on a network or over USB and scanned from another PC. Category 4: A non-windows machine that can share files but can t be mounted as a drive. Description: Microprocessor controlled instrument running proprietary firmware or non-windows operating systems such as LINUX, UNIX, VxWorks, etc. Characteristics: Special purpose computing engine and operating system optimized for specific task. May have LAN connectivity. May have USB connection for data transfer, license and firmware uploads. Cannot be mounted as a disk drive on a network, LAN communications may only allow instrument control and data transfers. Not susceptible to current generation wild viruses but may harbor viruses and pass to host computer. - Virus files would have to be copied intentionally to these types of instruments, scanning would require copying files to removable memory device and scanning resultant image. Guidelines for Installing and Running Antivirus Software on PC based instruments NOTE: While Agilent Technologies recommends periodically running anti-virus software on Windows Operating Systems based instruments and scanning non-windows based instruments, it does not endorse or recommend specific Anti-Virus software. It is up to the consumer to evaluate and select an anti-virus product which best suits their needs. The instructions given below are intended to provide a generic process to guide customers through a typical process. Read and follow the instructions provided by your anti-virus software vendor. - Close all applications on the instrument so you are left with only Windows running. - Install anti-virus software per vendor instructions. - Reboot the instrument some AV software requires a reboot, Agilent recommends rebooting for all installations. - Install any virus definition updates available - Run virus scan software. o o Allow AV software to quarantine or erase any malware found during the scan If any analysis of viruses is required, follow AV software vendor directions. Agilent is not set up to, nor has the expertise to evaluate computer viruses. - When scan is completed, follow AV software vendor s directions for disposing of viruses. - Close Anti-virus software. NOTE: Agilent does not recommend routinely running anti-virus software in the background while instruments are in use, as there may be an impact on instrument performance. Depending upon your

anti-virus vendor s licensing terms, you may be required to remove the anti-virus software before deployment. If so, please follow anti-virus vendors procedure for uninstalling. Special Note Concerning Windows CE Based Products Based on current information, Windows CE has not become a wide spread target for viruses, worms or malware, and programs written for non-ce based Windows operating systems (ie. Win98, Win2000, Win XP, Vista, etc.) will not run on Win CE based instruments. But, it is possible for a Win CE devices to transfer a file between two Windows based machines either through direct connect or via a network connection. As a result, Agilent strongly recommends that all Windows based computers that may connect to a Windows CE Embedded device utilize the most current versions of anti-virus software available. Further, Windows CE virus scanners are available, but have not been tested by Agilent. Guidelines for Scanning Non-Windows Based Instruments Many non-windows based instruments may be addressed as a mountable drive by windows based PCs for the purpose of uploading and downloading data. As such, these instruments can potentially become infected by computer viruses if they are in contact with an infected PC or instrument. As a result, Agilent Technologies recommends periodically scanning non-windows based instruments for viruses to maintain a secure computing environment. Agilent recommends using a PC or Windows based instrument that is capable of communicating with the instrument of interest over LAN or USB. - Determine if the instrument is recognized as a removable memory device by the host computer. - If the PC or Instrument recognizes the newly connected instrument AND assigns it a drive letter, it has been recognized, and is ready for scanning. o If the Host does NOT recognize the instrument, using information based in the manual, determine if it should be recognizable. If not, then the instrument should not pose a threat to a Windows based PC, Instrument or Network. - Scan the instrument as a removable drive using Anti-virus vendor s procedures. o For example: Open My Computer Locate the Instrument in the list Right click on the instrument, select Scan for Viruses from the list o Allow virus scan to complete o Dispose of viruses per vendor s recommendations - Close Anti-virus software - Disconnect scanned instrument. Agilent does not recommend running a virus scan while instruments are in use. Periodic scans using updated virus definitions are recommended.

i Windows and MS Windows are U.S. registered trademarks of Microsoft Corporation.