OSL150 – Get Hands on with Ivanti Endpoint Security

Slides:



Advertisements
Similar presentations
SIM348. “ConfigMgr appeared in Gartner client buying decisions more frequently than any other product in the market in 2010.”
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Lesson 17: Configuring Security Policies
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Designed By: Technical Training Department
VMware vCenter Server Module 4.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
April WebEx Intel ® Active Management Technology (AMT) LANDesk Provisioning LANDesk Server Manager.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Hands-On Microsoft Windows Server 2008

Ch 8. The Control Panel Window –Category View The Control Panel Window –Small icons View.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Deploying Chromebooks RICK NICHOLAS A.
An Introduction to IBM Systems Director
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Troubleshooting Windows Vista Security Chapter 4.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Module 6: Configuring User Environments Using Group Policy.
1 © Copyright 11/5/2015 BMC Software, Inc Click-through Demonstration BMC + McAfee = Automated Policy Compliance.
Microsoft Management Seminar Series SMS 2003 Change Management.
BSG Group - Dau Anh Trong1 Introduction about MS SQL Server 2005.
Administering Microsoft Windows Server 2003 Chapter 2.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Software Version: DSS ver up45 Presentation updated: September 2010 Backup of data residing on Open-E Data Storage Software with Backup Exec.
Windows Tutorial 5 Protecting Your Computer
Intercept X Early Access Program Sophos Tester
Presented by [Harshit Agrawal] 04/03/2017
Core ELN Training: Office Web Apps (OWA)
Introducing, Installing, and Upgrading Windows 7
Course Objectives After completing this course, you should be able to:
Project Management: Messages
Using E-Business Suite Attachments
CARA 3.10 Major New Features
HP SmartStream Production Center
Online password manager By: Anthony diveronica
Configuring Windows 10 for Your Studio
IBM Software Group | Tivoli Brand Software
Deploying and Configuring SSIS Packages
Dynamic Web Page A dynamic web page is a kind of web page that has been prepared with fresh information (content and/or layout), for each individual viewing.
How to Fix Windows 10 Update Error 0x ?.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Utilize Group Policy Terminal Server Settings
Intercept X for Server Early Access Program Sophos Tester
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
HC Hyper-V Module GUI Portal VPS Templates Web Console
SCC Supplier Performance Management (SPM) Training
Administering Your Network
Bethesda Cybersecurity Club
Planning a Group Policy Management and Implementation Strategy
Features - Benefits Major Release March 2019
Administrator’s Manual
Features Overview.
Getting Started With LastPass Enterprise
ADMINISTRATION A guide to setup and manage your innovation platform…
IT Management, Simplified
Presentation transcript:

OSL150 – Get Hands on with Ivanti Endpoint Security David Murray Rob Kelsall

What is Ivanti Endpoint Security? Ivanti Endpoint Security is a single platform that is endpoint security focused offering best of breed solutions for: Patch Management Application Control Device Control AntiVirus One suite solution Single, Modular, Extensible Architecture Single Workflow-based Console Asset Discovery and Agent Deployment Installation Manager AD Integration and Synchronization Role-based Access Control Reporting and Notification

A single suite that covers it all…

Lab Agenda Discover endpoints and install agents Create custom groups and add endpoints to these groups Create AntiVirus policies and scan for malware Patch vulnerable applications Application Control blocking and Denied Applications Install an application with Trusted Updater Create a Local Authorization policy Protect against memory-based attacks Protect data with device control Dashboard widgets & reports

Orientation Ivanti Endpoint Security Workflow Let’s get started Work from left to right Discover – Assets, Malware Review – Vulnerabilities, Virus Alerts, Discovered Assets, Logs Manage – Endpoints, Groups, Users, Policies, Libraries, Quarantine Reports – Standard & Enhanced Reports Tools – Roles, Installers, Subscriptions, DB maintenance, Notifications, Options Help – which hopefully you don’t need to use too much Let’s get started Logon credentials contained in your lab guide Turn off Windows Defender on Windows 10 endpoint

Exercise 1 – Discover Endpoints & Install Agents Goal The goal of this exercise is to discover new endpoints and to bring them under control Discover > Assets Select “Immediate” under scheduling Use IP address range 192.168.100.10 to 192.168.100.99 Review > Job Results Go to Completed tab when job is finished (page auto-refreshes) Manage Agents > Install Agents, for any assets (Win7) with “No Agent Found”

Exercise 2 – Create Groups & Add Endpoints Goal As we generally manage by groups rather than endpoints, the goal of this exercise is to create a number of custom groups so we can use these groups in subsequent exercises Create three custom groups Manage > Groups > Group Membership view Select “Custom Groups” from panel on left Delete/ignore any existing groups (I forgot to do so!) Create the following groups – Server, Desktop, All Systems Add endpoints to each group Manage > Groups > Endpoint Membership view Use Membership button or right-click on group Server – Ivanti Endpoint Server & CentOS Desktop – Win10 and Win7 All systems – all four endpoints

Exercise 3 – Create AV policies & scan for malware Goal Discover and remove any malware that exists Create policies to provide ongoing protection Scan for malware Discover > Scan Now – Virus and Malware Scan Select Immediate scan option and assign to the Desktop group Add a “folder” exclude for C:\ drive to minimize scan duration Follow progress on Win10 endpoint via Agent Control Panel Review “Centralized Quarantine” when completed Create policies for ongoing protection Manage > AntiVirus Policies Create Real time Monitoring Policy Create Recurring Virus and Malware Scan Policy Set policy to run at the weekend (not during Interchange!)

Exercise 4 – Patch Vulnerable Applications Goal Understand what vulnerabilities exist Apply patches to remediate (some of) these vulnerabilities Understand vulnerabilities Navigate to Manage > Endpoints Select Endpoint and select Vulnerabilities/Patch Content tab Select filters (Detection Status = Not Patched) Select (1 or 2) cached packages and “Add to List” called Interchange Remediate Vulnerabilities Manage > Groups (Vulnerabilities/Patch Content view) Select All Systems group Select Interchange Custom Patch List (and select all content) Click “Deploy” Cached Not cached

Exercise 4 – Patch Vulnerable Applications

Exercise 5 – App Control Blocking and Denied Apps Goal Demonstrate that non-whitelisted applications are blocked Deny a whitelisted application Non-whitelisted applications Log on to Win10 endpoint Open “Test Files” folder on the desktop (added after lockdown) Try to run any of these applications -> receive blocked dialog Deny whitelisted application Open Mozilla Firefox and confirm that it opens correctly Go to Manage > Application Library and search for Firefox.exe in “Ungrouped files” Move file to “Prohibited Applications” Go to Manage > Application Control policies Create Denied Applications policy and add “Prohibited Applications” application to it Assign to Desktop group and confirm Mozilla Firefox is blocked (once policy delivered)

Exercise 6 – Install an application with Trusted Updater Goal Install a blocked application on a locked-down endpoint Try to install application on locked-down endpoint Open Test Files folder on Win10 desktop Try to launch one or more of the installers (you may already have completed this step earlier) Add installer to a Trusted Updater policy Go to Review > Application Control Log Queries Create “All Denied Application Events” log query for Desktop group Review results and locate denied installer (refresh the query if it is not there yet) Select the installer in the log query results and click on “Trust” button Assign to Desktop group Once policy delivered, confirm that application gets installed correctly and can be opened

Exercise 7 – Local Authorization Goal Enable endpoint users to decide whether to launch/install application on their endpoint Create Local Authorization policy Go to Manage > Application Control policies and select “Trusted Change” tab Create Local Authorization policy and assign to Desktop group Locally authorize an application Once policy is delivered, go the Test Files folder on the Win10 endpoint Select an application or an installer and try to open it You should now receive a local authorization dialog and can decide whether to allow or deny

Exercise 8 – Protect against Memory-based attacks Goal Implement a Memory Protection policy to detect and block a memory injection Create Memory Protection Policy in Audit Mode Go to Manage > Application Control policies and select Memory Protection tab Create a Memory Protection policy in Audit Mode and assign to the Desktop group Launch application and inject into memory Follow lab guide to launch target application (view in Task Manager) Launch injector application and inject into process of target application Go to Review > Application Control log queries and create All Memory Injection Events query Convert Memory Protection Policy to Enforcement Mode Edit Memory Protection policy and switch to Enforce from Audit mode Confirm Target Application is terminated (via logs and Task Manager)

Exercise 9 – Protect data with Device Control Goal Create policies to protect data when copied to removable media (e.g. USB sticks) Confirm current read/write behaviour Copy files to and from E:\ and F:\ drives on Win10 endpoint and confirm both read & write work Create Unencrypted and Encrypted drives policy Go to Manage > Device Control policies and create policies per lab guide Test Device Control policies Disable default policy for Removable Storage Devices and set Global policy to Enforce Attempt to copy files to (unencrypted) E:\ or F:\ drives and confirm that they are read-only Encrypt F:\ drive and confirm both read and write work on encrypted drive Reboot Win10 endpoint to see behaviour when E:\ and F:\ drives connected Option provided to encrypt E:\ drive Need to enter encryption password for F:\ drive

Exercise 10 – Dashboard Widgets and Reports Goal Enable Dashboard widgets to provide overall system summary on login Create reports for more detailed analysis or for management Dashboard widgets Go to Home page on console Select “Configure Dashboard Settings” and select dashboards to display Drag and drop dashboards as needed Reports Go to Reports > Enhanced Reports Run reports to report on earlier exercises and review results

Thank you Don’t forget to provide feedback Go get some lunch