1 © Copyright 11/5/2015 BMC Software, Inc Click-through Demonstration BMC + McAfee = Automated Policy Compliance.

Slides:



Advertisements
Similar presentations
Publication Module using back end interface. Institution Data Entry Add Documents. Edit/Delete Documents that are added but not yet sent to Institution.
Advertisements

Murach's MySQL, C1© 2012, Mike Murach & Associates, Inc.Slide 1.
Getting started with ENDNOTE Compiled by Helene van der Sandt.
Lesson 17: Configuring Security Policies
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 11 - Monitoring Server Performance1 Ch. 11 – Monitoring Server Performance MIS 431 – created Spring 2006.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
With Microsoft Access 2010© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Lesson 19: Configuring Windows Firewall
Lesson 18: Configuring Application Restriction Policies
Collaboration Suite Business Process Management
Service Request Management HOW TO CREATE. SRM – How to Create Login to system using your windows credentials.
Module 16: Software Maintenance Using Windows Server Update Services.
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
1 Creating an Online Test Session 1.Go to Test Management>Manage Test Sessions.
Student Employment Student Training Note: This is a template that can be utilized to create your own institutional specific Student Employment Student.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Copyright © 2008 Rockwell Automation, Inc. All rights reserved. Rockwell Automation Knowledgebase Notification Signup PSAs, Product Notices, etc.
April, 2013 Configuration Logging Project Excalibur Miho Hoshino, WW Support Readiness.
HELP… Login Enter your username and password here. Alternatively, click on the Athens login link below.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
TEAM Basic TotalElectrostatic ManagementAwareness&
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Instructors begin using McGraw-Hill’s Homework Manager by creating a unique class Web site in the system. The Class Homepage becomes the entry point for.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Module 6: Configuring User Environments Using Group Policy.
Supporting and Maintaining Desktop Applications Lesson 13.
Module 5: Implementing Group Policy
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
SMS Software Distribution. Overview  Explaining How SMS Distributes Software  Managing Distribution Points  Configuring Software Distribution and the.
Microsoft Management Seminar Series SMS 2003 Change Management.
THIS PRESENTATION: WINDOWS UPDATES VIA AUTOMATIC DEPLOYMENT RULES BEST PRACTICES SYSTEM CENTER CONFIGURATION MANAGER 2012 R2 Jodie Gaver Jodie Gaver Working.
Module 8: Managing Software Distribution. Collections Packages Programs Advertisements Collections Packages Programs Advertisements How Software.
Package & Deploy. OBJECTIVES Package Deploy Way to package.
Administering Microsoft Windows Server 2003 Chapter 2.
PubMed/How to Search, Display, Download & (module 4.1)
Copyright © 2002 OSI Software, Inc. All rights reserved. PI Application Framework Example Applying the Application Framework.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
PubMed/How to Search, Display, Download & (module 4.1)
Module 6: Configuring User Environments Using Group Policies.
Primenumbers.co.uk This presentation will help you get the most out of this service.
30 Copyright © 2009, Oracle. All rights reserved. Using Oracle Business Intelligence Delivers.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
Interactions & Automations
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
22 Copyright © 2009, Oracle. All rights reserved. Filtering Requests in Oracle Business Intelligence Answers.
Top-performing urban school district in Florida Introduction to TIDE 1.
IBM Software Group © 2006 IBM Corporation Confidentiality/date line: 13pt Arial Regular, white Maximum length: 1 line Information separated by vertical.
WMUG Presents System Center 2012 Configuration Manager Software Updates Management Presented by Robert Marshall MVP ConfigMgr
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
How to configure alarm system
1. Begin Quick Start 2. Administration 3. Good to Know 4. Slightly Technical 5. User Experience 6. You are ready to go !
Maintaining and Updating Windows Server 2008 Lesson 8.
Creating an Online Test Session
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
Houston Methodist Diagnostic Laboratories
Utilize Group Policy Terminal Server Settings
Borderless Networks Services Supported
Planning a Group Policy Management and Implementation Strategy
Click on the Create Student Account Link
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Tivoli Common Reporting v1.2 Overview
Bethesda Cybersecurity Club
BMC Automation Portal Update
Planning a Group Policy Management and Implementation Strategy
Effective Communication
OSL150 – Get Hands on with Ivanti Endpoint Security
Presentation transcript:

1 © Copyright 11/5/2015 BMC Software, Inc Click-through Demonstration BMC + McAfee = Automated Policy Compliance

2 © Copyright 11/5/2015 BMC Software, Inc Automated Policy Compliance Let’s take a look out one of our Windows Client machines! So, where’s the problem?

3 © Copyright 11/5/2015 BMC Software, Inc This Windows Service should not be running

4 © Copyright 11/5/2015 BMC Software, Inc Automated Policy Compliance Now, let’s go fix it!

5 © Copyright 11/5/2015 BMC Software, Inc Automated Policy Compliance Authorized administrators login to access BMC Security Policy Manager

6 © Copyright 11/5/2015 BMC Software, Inc Pre-defined Remediation Groups – Sourced directly from McAfee The Security Policy Manager Main Page

7 © Copyright 11/5/2015 BMC Software, Inc Select and Publish an out-of-the-box remediation group - OR -

8 © Copyright 11/5/2015 BMC Software, Inc Filter your own results based on criteria

9 © Copyright 11/5/2015 BMC Software, Inc Click on a remedy content line See a summary of the remediation content Click here for remediation details

10 © Copyright 11/5/2015 BMC Software, Inc Remedy and Bulletin ID Summary of content Description of the fix Scanner details Descriptions of actions to be taken

11 © Copyright 11/5/2015 BMC Software, Inc Select a remediation entry

12 © Copyright 11/5/2015 BMC Software, Inc Click here to create a new remediation group Give the new group a name – For example: MY XP SECURITY CONTENT

13 © Copyright 11/5/2015 BMC Software, Inc New group is created Group contains 1 remediation entry

14 © Copyright 11/5/2015 BMC Software, Inc Publish the new remediation group

15 © Copyright 11/5/2015 BMC Software, Inc Remediation content is brought down in real- time, automatically packaged and published for distribution

16 © Copyright 11/5/2015 BMC Software, Inc Automated Policy Compliance The content is ready! Who needs it?

17 © Copyright 11/5/2015 BMC Software, Inc We want to target the content to all Windows XP boxes This query returns a list we can now target via policy

18 © Copyright 11/5/2015 BMC Software, Inc Automated Policy Compliance Now, time to define deployment policy! Subscription Policy Definition

19 © Copyright 11/5/2015 BMC Software, Inc First, select the target group from the list of collections Edit the policy

20 © Copyright 11/5/2015 BMC Software, Inc Manage all policy compliance activities in a single interface

21 © Copyright 11/5/2015 BMC Software, Inc Select the Remediation tab Click here to add our remediation content

22 © Copyright 11/5/2015 BMC Software, Inc Here is the Remediation Group created earlier Click to select

23 © Copyright 11/5/2015 BMC Software, Inc Remediation Group Assigned

24 © Copyright 11/5/2015 BMC Software, Inc Policy defined: Assignment state = Assign or Exclude Click here to preview policy assignment

25 © Copyright 11/5/2015 BMC Software, Inc Policy assignment complete Click here to save the policy

26 © Copyright 11/5/2015 BMC Software, Inc Policy assignment completed successfully

27 © Copyright 11/5/2015 BMC Software, Inc Automated Policy Compliance After policy assignment, agent receives new policy …and executes the policy

28 © Copyright 11/5/2015 BMC Software, Inc Client Remediation Log Endpoint installs remediation content and creates a full audit log of activity

29 © Copyright 11/5/2015 BMC Software, Inc Problem solved!!! Service stopped and disabled

30 © Copyright 11/5/2015 BMC Software, Inc Automated Policy Compliance Mission Accomplished!!!

31 © Copyright 11/5/2015 BMC Software, Inc