Trend Micro Round Table May 19, 2006. Agenda Introduction – why switch? Timeline for implementation Related policies Trend Micro product descriptions.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Campus Wide Microsoft Agreement for Desktop Suite Education Enrolment Solutions (EES agreement)
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Secure | Resolutions Over 1 million computers are currently protected by Secure Resolutions’ technology.
Saving Money by Recycling Existing Computers with LTSP Peter Billson Linux Terminal Server Project (LTSP.org) Linux User Group in Princeton LUG/IP July.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Information and Technology Services Customer Services.
CAH Technology Office Technology Office Technology Support Web, Programming and Communication Network and Security Support Research Provides hardware.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
CNIL Report April 4 th, CNIL Report (Apr 4 th, 2005) Two Major Goals: –Improvement of Instructional Services –Strengthening research IT infrastructure.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
Chris Sfanos Program Manager Forefront Client Security Microsoft Session Code: SW17.
Bear Access Fall 2006 Dan Bartholomew Lee Brink April 19, 2006.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Automating Endpoint Security Policy Enforcement Computing and Networking Services University of Toronto.
Norman Endpoint Protection Advanced security made easy.
Overview Symantec Endpoint Protection Suite Deployment Plans.
EDUCAUSE Security 2006 Internet John Brown University.
Information Security Information Technology and Computing Services Information Technology and Computing Services
File System Project Conversion from Netware to Windows December 2010.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
FNAL Configuration Management Jack Schmidt Cyber Security Workshop May th 2006.
Laptop Survival and Management Help Desk Services Pat Valiquette Mark Miller Campus tools – Fall 2006.
Small Business Edition 4 C707 – Technical overview.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
©2003 CNET Networks, Inc. All rights reserved. Virus Basics Created by: Robert L. Bogue, MCSE: Security, etc. Crowe Chizek.
University of Management & Technology Operating Systems & Utility Programs.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
Randy Diddel A+ Certified Technician Apple Certified Associate-Mac Integration OS X ITIL Foundations v3 Mac Team Technical Support Analyst II UNM IT Workstation.
Module 2 Part I Introduction To Windows Operating Systems Intro & History Introduction To Windows Operating Systems Intro & History.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Chapter 9: Novell NetWare
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 1/20/05 iCommand & Remedy Update SESA Overview &
Honeypot and Intrusion Detection System
Presented by: Eric Rosenberg – Student Manager Client Support Behzad Barzideh – Network Manager Stony Brook Remote Support For Students.
Vantage Report 3.0 Product Sales Guide
Explain the purpose of an operating system
ServerProtect 5.58 for NT Tech Support Dep.. Table of Contents Introduction and Installation Managing ServerProtect Configuring ServerProtect Maintaining.
PC MANAGER MEETING January 23, Agenda  Next Meeting  Training  Windows Policy  Main Topic: Windows AV Service Review.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Peter Chochula ALICE DCS Workshop, October 6,2005 DCS Computing policies and rules.
NAL and ZEN: Drew’s history of application and computer management Mike Richichi, Director of Computing and Network Services Paul Coen, Manager of Systems.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
Technology Update TSAG Meeting 7/8/04. Announcements New Interim Director of User Support Services: Bill Hardy Outage on July 17 Udrive status Anyone.
Two Types of Software.
Module 2 Part I Introduction To Windows Operating Systems Intro & History Introduction To Windows Operating Systems Intro & History.
Google Apps and Education Jack Nieporte St James of the Valley
NetTech Solutions Protecting the Computer Lesson 10.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
Creating and Managing Networks CSC February, 1999.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Leading Computer, Laptop Repair Company. Neon Computers has certified technicians which have years of experience in repairing laptops and desktops, PC.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
What’s New in WatchGuard Mobile VPN with IPSec WatchGuard Training.
Nassau Community College
Trend Micro Updates SIRT IT Security Roundtable
Connecting Remotely Winter 2014.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Microsoft Virtual Academy
Presentation transcript:

Trend Micro Round Table May 19, 2006

Agenda Introduction – why switch? Timeline for implementation Related policies Trend Micro product descriptions Configuration options Early adopters Q&A

History Using Symantec since 2001 SIRT evaluated antivirus products Recommended Trend Micro for Windows Apple Macs will continue to use Symantec Trend purchased April 2006 Unlimited use for faculty, staff, students in office and at home

Why Switch? Better protection Better licensing Lower cost Better management/reporting functionality Installation comparable to a Symantec version upgrade Personal firewall included Better support

Timeline Symantec license expires Oct. 27, 2006 Soon:  Early adopters to help with testing  Finish training materials and documentation  Distribute software to campus system administrators

Timeline cont. Before the fall semester:  Available to students in residence halls  Available for home users  Central management servers available By October 27, 2006:  All campus Windows computers using managed version of Trend Micro  All home Windows users converted  Stop distributing, supporting Symantec AV for Windows

Policies All university-owned Macintosh computers must run Symantec AV All other university-owned computers must use the managed version of Trend Micro Student computers in residence halls also must use the managed version Home users will initially use unmanaged version

Policies cont. All computers connected to campus network must run spyware/adware protection software The personal firewall in Trend Micro must be enabled when installed Departments running their own Trend Micro management environment must send reports to the central management server servers must provide antivirus protection

Client Management Trend Office Scan v.7.3 (TOS) Protects Windows desktops from:  Viruses  Trojans  Worms  Spyware  Adware Also includes:  A personal firewall  Limited intrusion detection NOTE: Mac users will continue to use Symantec Norton Antivirus for Macintosh

Server Management Trend Server Protect v.5.58 (TSP) Protects Windows Server 2003, Windows 2000 Servers, Novell Netware Servers, and Linux Servers. Provides real time protection from viruses, Trojans, and worms.

Reporting Trend Control Manager v.3.5 (TCM) Manages, monitors and collects data from Trend Micro servers (TOS & TSP). Provides graphical and detailed reports on virus events or unusual activities. Provides a centralized management console for the Trend Micro Products.

What are my options? Option 1: Local Managed & Reporting Option 2: Local Managed & Central Reporting Option 3: Central Managed & Reporting

Option 1: Local Managed & Reporting Departments/Colleges will support their own Trend Control Manager, Trend Server Protect, and Trend Office Scan servers. The Trend Micro products may be installed on one server or separate servers. The Local Trend Control Manager will report to the Central Trend Control Manager.

Option 2: Local Managed & Central Reporting Departments/Colleges will support their own Trend Server Protect and/or Trend Office Scan servers. The Trend Micro products may be installed on one server or separate servers. Trend Server Protect and/or Trend Office Scan servers will report to the Central Trend Control Manager Parent server.

Option 3: Central Managed & Reporting Departments/Colleges will use the central reporting and managed servers. Managed Trend Office Scan Clients will be provided via website or central IT staff.

Before You Leave Today Sign Option Sheets  Let us know which option you are thinking of implementing Early Adopters –  Volunteer for our scalability testing  Option 1 & 2 environments only

Questions ?