Download presentation
Presentation is loading. Please wait.
Published byDorcas Dixon Modified over 9 years ago
1
Endpoint Control
2
Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications through FortiGate Endpoint Control Enforce the use of FortiClient on client computers Configure Endpoint Control profiles Define firewall policies using Endpoint Control profiles Configure vulnerability scanning
3
Endpoint Control Category: Internet browsers Vendor: Microsoft Application: Internet Explorer Action: Allow Category: Office Vendor: Microsoft Application: Office 2010 Action: Allow Category: Media Players Vendor: Apple Application: iTunes Action: Deny Category: Email Vendor: Mozilla Corp. Application: Thunderbird Action: Monitor Application Detection List
4
Endpoint Control Category: Internet browsers Vendor: Microsoft Application: Internet Explorer Action: Allow Category: Office Vendor: Microsoft Application: Office 2010 Action: Allow Category: Media Players Vendor: Apple Application: iTunes Action: Deny Category: Email Vendor: Mozilla Corp. Application: Thunderbird Action: Monitor Application Detection List Endpoint control can be used to enforce compliance of client software running on the client computer Allow the application Bock the application Monitor the application Warn allow application but display warning Applications available for use in application detection lists are predefined on FortiGate unit
5
FortiClient Compliance FortiClient installed and enabled? FortiClient minimum version? AV database version? Application signature database version? FortiClient
6
FortiClient Compliance FortiClient installed and enabled? FortiClient minimum version? AV database version? Application signature database version? FortiClient Use of FortiClient Endpoint Control can be enforced on the network Ensure client have most up-to-date versions of software and signatures
7
FortiClient Compliance
8
Application Detection Entry Condition: Installed Running Not installed Not running Action: Allow Block Monitor Warn
9
Allow Block Monitor Warn Application Detection Entry Condition: Installed Running Not installed Not running Action: Application detection entries define the applications to be detected and the action to be taken Endpoint Profiles can contain multiple application entries Optionally, specify the action to be taken on endpoints that have applications installed that are not on the detection list
10
Endpoint Control Profile
11
Endpoint operations defined through Endpoint control profiles Define FortiClient enforcement settings Specify an application detection list
12
Endpoint Control Profile Application Detection List Firewall policy Endpoint Control Profile: Endpoint_Profile_Example
13
Endpoint Control Profile Application Detection List: Sample_Endpoint_List Firewall policy Endpoint Control Profile: Sample_Endpoint_Profile Application Detection List applied through Endpoint profile Profile in turn applied to firewall policy Any traffic being examined by the policy will have the application control operations applied to it
14
Monitoring Endpoints Compliant Non-Compliant
15
Monitoring Endpoints Compliant Non-Compliant Endpoint Monitor displays a list of compliant and non-compliant client and server computers Computers remain on list until FortiGate unit is restarted Entry updated every time client or server computer attempts to access network services through the FortiGate unit
16
Vulnerability Scanning FortiGuard Vulnerability Compliance and Management Service
17
Vulnerability Scanning FortiGuard Vulnerability Compliance and Management Service Scan for vulnerabilities on clients and servers Determines whether client computers are vulnerable to attack FortiGuard Vulnerability Compliance and Management Service provides a database of common vulnerabilities Kept up-to-date through a subscription service
18
Asset Definition Identify individual hosts to be scanned by IP address Discover hosts to be scanned by identifying an IP address range 192.168.100 - 192.168.1.254
19
Asset Definition Identify individual hosts to be scanned by IP address Discover hosts to be scanned by identifying an IP address range 192.168.100 - 192.168.1.254 Administrator must identify the clients and servers to include in a vulnerability scan Identify computers to be scanned by specific IP address Discover computers to be scanned by identifying a range of IP addresses
20
Scan Schedule
21
Any client and server computers displayed in the asset list can be scanned regularly based on the schedule settings Scan modes: Full Standard Quick
22
Student Resources Click hereClick here to view the list of resources used in this module
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.