IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Slides:



Advertisements
Similar presentations
WSUS Presented by: Nada Abdullah Ahmed.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 1: Installing Windows XP Professional
ADVANCED FUNCTIONALITY & TROUBLESHOOTING. Page 2 Agenda Main topics Advanced Policy Manager Server configuration Resolving Apache Web Server security.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Module 3 Windows Server 2008 Branch Office Scenario.
System and Network Security Practices COEN 351 E-Commerce Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 7 HARDENING SERVERS.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
VIRUS AND SPY PROTECTION ADMINISTRATION. Page 2 Agenda Main topics Administration interface Local user interface Administrating scanning remotely Tips.
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
ADMINISTERING INTERNET SHIELD. Page 2 Agenda What can Internet Shield be used for? Administering Internet Shield Firewall configuration Network Quarantine.
Clinic Security and Policy Enforcement in Windows Server 2008.
Test Review. What is the main advantage to using shadow copies?
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
INTRODUCING F-SECURE POLICY MANAGER
Virtual Company Group 8 Presentation Date: June /04/2017
ADMINISTRATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 7: Using Windows Servers to Share Information.
ADMINISTRATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way that allows you to work independently, but still giving.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Securing Microsoft® Exchange Server 2010
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Install IBM Express Runtime Development Environment.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Module 13: Maintaining Software by Using Windows Server Update Services.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 1: Installing and Upgrading to Exchange Server 2003.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Step By Step Windows Server 2003 Installation Guide Step By Step Windows Server 2003 Installation Guide.
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
EPolicy Orchestrator WNUG June Meeting 6/6/2002. Presentation Contents What is ePO? What are the requirements? ePO components Demo of ePO Where to get.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
BASIC FUNCTIONALITY. Page 2 Agenda Main topics Policy Manager Communication Understanding communication Information flow Communication modules F-Secure.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Module 1: Installing Microsoft Windows XP Professional.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
12/1/2015Faculty : Trần Thị Ngọc Hoa1 ISA server Overview 1. Introducing ISA Server 2. Deployment Scenario for ISA Server.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
NetTech Solutions Protecting the Computer Lesson 10.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Module 8 Implementing Security Using Group Policy.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Security fundamentals
Chapter 7: Using Windows Servers
Securing the Network Perimeter with ISA 2004
Design Unit 26 Design a small or home office network
Administering Your Network
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

IMPLEMENTING F-SECURE POLICY MANAGER

Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples Installing the environment Most critical installation steps Console configuration tips Point application rollout Point application rollout planning and piloting Most common rollout methods and examples

PRE-DEPLOYMENT PHASE

Page 4 Before you begin... Checklist 1.Network requirements Does the network support the required protocols? Is the network fast enough? 2.System requirements Does the existing hardware meet the requirements? Are the installed operating systems and service packs supported? 3.Policy Manager Implementation How many Policy Manager Servers, Consoles and Proxy Servers does the infrastructure require? Where to place them for best performance?

Page 5 Network Requirements Network 10Mbit Ethernet or faster In installations with more than 5000 managed hosts, 100Mbit networks are recommended Required Protocols UDP Used for virus definitions updates directly from F-Secure Root Update Server TCP Used for F-Secure Intelligent Installations (a.k.a push installations) Used for general Apache Web Server traffic

Page 6 System Requirements: Policy Manager Server Operating system Windows 2000 Server and Advanced Server (SP3 or higher), Windows Server 2003 Standard, Web Edition, or Small Business Server Processor Intel Pentium III 450 MHz or faster (1 GHz or more recommended, especially when managing big environments or when Web Reporting is enabled) Memory 256 MB RAM (512 MB or more recommended, especially when Web Reporting is enabled) Disk space 50 MB required (recommended 500 MB or more)

Page 7 System Requirements: Policy Manager Console Operating system Windows 2000 Professional (SP3 or higher), Windows XP Professional (SP2 or higher) or Windows 2003 Small Business Server Processor Intel Pentium III 450 MHz or faster (750 MHz or more recommended) Memory Dedicated computer 256 MB RAM (512 or more recommended) Single computer (same as PMS) 1 GB or more recommended Disk space 50 MB required

Page 8 System Requirements: Anti-Virus Client Security 6.x Operating system Microsoft Windows 2000 Professional (SP4 or higher) Microsoft Windows XP Professional and Home Edition (SP1 or higher) Memory 128 MB (Windows 2000), 256 MB (Windows XP) 256 MB an more recommended Disk space 120 MB (150 MB required during installation)

Page 9 Policy Manager Implementation Policy Manager Server and Console can be implemented in two different ways Both components on a single computer (recommended) Dedicated computers for each component Single Computer Dedicated Computers

Page 10 Policy Manager Implementation Depending on the size and structure of the company, it might be necessary to Install more than one Policy Manager Console Global company with slow internet connection Install more than one Policy Manager Server Single Policy Manager Server scales up to hosts It can handle significantly more host, but will be difficult to administer (policy distribution time increases) Install Policy Manager Proxies for virus definitions updates Solves bandwidth bottle-necks

Page 11 Policy Manager Server Location Location of the Policy Manager Server Place it in the internal network (recommended) Well protected from external attacks Access from external network only possible with authenticated, encrypted connections (e.g. VPN+) Place it in a DMZ network Server has a public IP address, FSMA can access the server from the external network without using VPN+ In general, the security in a DMZ is less restricted as it is in an internal network. The Server contains sensitive infomation of your policy domain and policies. There might be a security risk.

Page 12 Implementation in Basic Environment Managed hosts Policy Manager Server & Console Root Update Server

Page 13 Implementation in Global Environment Root Update Server Managed Hosts PMCPM Proxy PMC & PMS Managed Hosts Subsidiary Germany Headquarters Finland

POLICY MANAGER INSTALLATION

Page 15 Starting the Installation If you have a valid license of any F-Secure product you are entitled to use F-Secure Policy Manager You are entitled to use as many Console, Server and Reporting Option installations as you need

Page 16 Installation Order 1.Policy Manager Server 2.Policy Manager Console 3.Point Applications

Page 17 Critical Steps: Server Installation Select components to install Policy Manager Console Don’t forget to deselect in case you want to run it on a dedicated computer Policy Manager Update Server & Agent Without this components, database updates will not be possible

Page 18 Critical Steps: Server Installation Configure Apache Modules In general, default port settings work fine However, in some situations the ports are already taken and need to be changed The system will automatically inform Already taken ports Ports which might cause problems

Page 19 Critical Steps: Console Initialization Important: In this step you define the administration module The host module address has to be specified separately in the policy

Page 20 Critical Steps: Console Initialization Management key-pair generation Make sure to backup these keys after console initialization completed!

Page 21 Console Configuration Tips Lock most important settings Prevents problems with IPF overwriting Define Policy Manager Server Address Empty by default!

POINT APPLICATION ROLLOUT

Page 23 Before you Start the Rollout... Checklist Remove all conflicting software from target hosts Sidegrade detects and removes certain vendors automatically (AVCS only!) Test sidegrade during piloting phase! Check target host for third party firewalls (e.g. XP firewalls) and disable them (e.g through AD group policy) Start piloting Test different rollout methods and choose the one suited best for your environment Never rollout without careful testing – or to the whole domain at once!

Page 24 Rollout Methods Intelligent Installations Autodiscover windows hosts (recommended) Installation package created with PMC Transfers package separately to each host (no multicasting) Certain inbound traffic on hosts needs to be allowed RPC (TCP 135) and SMB (TCP 445) Push install to Windows host Advantage: needs no name resolution, if IP addresses are used Disadvantage: IP addresses have to be typed manually

Page 25 Rollout Methods Pre-configured package Using PMC to create a pre-configured package No inbound traffic on hosts required JAR: Installation of exported package by ilaunchr.exe through windows login script Make sure to run login sript silent (script includes password in cleartext!) MSI: Installation of exported package through windows group policy in active directory

Page 26 Anti-Virus Centrally Manageable Products F-Secure Anti-Virus for Citrix Servers (and for Microsoft Terminal Server) F-Secure Anti-Virus for SAMBA Servers Anti-Virus Server Computing Anti-Virus for HTTP, SMTP, FTP and POP Anti-Spam Content Filtering Anti-Virus Anti- Spam Content Filtering Anti-VirusVirus & Spy Protection Intrusion prevention F-Secure solutions and services provided Web & DNS Servers F-Secure Anti-Virus for MS Exchange F-Secure Spam Control for Microsoft Exchange F-Secure Spam Control for Internet Gatekeeper F-Secure Internet Gatekeeper F-Secure Anti-Virus for MIMEsweeper F-Secure Anti-Virus for Windows Servers F-Secure Anti-Virus for Linux Servers F-Secure Anti-Virus for Workstations F-Secure Anti-Virus Client Security Gateways Servers File & Print Servers Desktops & laptops Microsoft Platforms Linux Platforms

Page 27 Summary Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples Installing the environment Most critical installation steps Console configuration tips Point application rollout Point application rollout planning and piloting Most common rollout methods and examples