Top Banner
IMPLEMENTING F-SECURE POLICY MANAGER
27

IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Jan 12, 2016

Download

Documents

Meghan Wood
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

IMPLEMENTING F-SECURE POLICY MANAGER

Page 2: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 2

Agenda

Main topics

• Pre-deployment phase

• Is the implementation possible?

• Implementation scenarios and examples

• Installing the environment

• Most critical installation steps

• Console configuration tips

• Point application rollout

• Point application rollout planning and piloting

• Most common rollout methods and examples

Page 3: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

PRE-DEPLOYMENT PHASE

Page 4: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 4

Before you begin...

Checklist

1. Network requirements

• Does the network support the required protocols?

• Is the network fast enough?

2. System requirements

• Does the existing hardware meet the requirements?

• Are the installed operating systems and service packs supported?

3. Policy Manager Implementation

• How many Policy Manager Servers, Consoles and Proxy Servers does the infrastructure require?

• Where to place them for best performance?

Page 5: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 5

Network Requirements

Network

• 10Mbit Ethernet or faster

• In installations with more than 5000 managed hosts, 100Mbit networks are recommended

Required Protocols

• UDP

• Used for virus definitions updates directly from F-Secure Root Update Server

• TCP

• Used for F-Secure Intelligent Installations (a.k.a push installations)

• Used for general Apache Web Server traffic

Page 6: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 6

System Requirements:Policy Manager Server

Operating system

• Windows 2000 Server and Advanced Server (SP3 or higher), Windows Server 2003 Standard, Web Edition, or Small Business Server

Processor

• Intel Pentium III 450 MHz or faster (1 GHz or more recommended, especially when managing big environments or when Web Reporting is enabled)

Memory

• 256 MB RAM (512 MB or more recommended, especially when Web Reporting is enabled)

Disk space

• 50 MB required (recommended 500 MB or more)

Page 7: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 7

System Requirements:Policy Manager Console

Operating system

• Windows 2000 Professional (SP3 or higher), Windows XP Professional (SP2 or higher) or Windows 2003 Small Business Server

Processor

• Intel Pentium III 450 MHz or faster (750 MHz or more recommended)

Memory

• Dedicated computer

• 256 MB RAM (512 or more recommended)

• Single computer (same as PMS)

• 1 GB or more recommended

Disk space

• 50 MB required

Page 8: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 8

System Requirements:Anti-Virus Client Security 6.x

Operating system

• Microsoft Windows 2000 Professional (SP4 or higher)

• Microsoft Windows XP Professional and Home Edition (SP1 or higher)

Memory

• 128 MB (Windows 2000), 256 MB (Windows XP)

• 256 MB an more recommended

Disk space

• 120 MB (150 MB required during installation)

Page 9: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 9

Policy Manager Implementation

Policy Manager Server and Console can be implemented in two

different ways

• Both components on a single computer (recommended)

• Dedicated computers for each component

Single Computer

Dedicated Computers

Page 10: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 10

Policy Manager Implementation

Depending on the size and structure of the company, it might be

necessary to

• Install more than one Policy Manager Console

• Global company with slow internet connection

• Install more than one Policy Manager Server

• Single Policy Manager Server scales up to 10000 hosts

• It can handle significantly more host, but will be difficult to administer (policy distribution time increases)

• Install Policy Manager Proxies for virus definitions updates

• Solves bandwidth bottle-necks

Page 11: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 11

Policy Manager Server Location

Location of the Policy Manager Server

• Place it in the internal network (recommended)

• Well protected from external attacks

• Access from external network only possible with authenticated, encrypted connections (e.g. VPN+)

• Place it in a DMZ network

• Server has a public IP address, FSMA can access the server from the external network without using VPN+

• In general, the security in a DMZ is less restricted as it is in an internal network. The Server contains sensitive infomation of your policy domain and policies. There might be a security risk.

Page 12: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 12

Implementation in Basic Environment

Managed hosts

Policy Manager Server & Console

Root Update Server

Page 13: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 13

Implementation in Global Environment

Root Update Server

Managed Hosts PMC PM Proxy PMC & PMS Managed Hosts

Subsidiary Germany Headquarters Finland

Page 14: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

POLICY MANAGER INSTALLATION

Page 15: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 15

Starting the Installation

If you have a valid license of any F-Secure product you are entitled to

use F-Secure Policy Manager

You are entitled to use as many Console, Server and Reporting

Option installations as you need

Page 16: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 16

Installation Order

1. Policy Manager Server

2. Policy Manager Console

3. Point Applications

Page 17: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 17

Critical Steps:Server Installation

Select components to install

• Policy Manager Console

• Don’t forget to deselect in case you want to run it on a dedicated computer

• Policy Manager Update Server & Agent

• Without this components, database updates will not be possible

Page 18: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 18

Critical Steps:Server Installation

Configure Apache Modules

• In general, default port settings work fine

• However, in some situations the ports are already taken and need to be changed

• The system will automatically inform

• Already taken ports

• Ports which might cause problems

Page 19: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 19

Critical Steps:Console Initialization

Important: In this step you define

the administration module

• The host module address has to be specified separately in the policy

Page 20: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 20

Critical Steps:Console Initialization

Management key-pair

generation

• Make sure to backup these keys after console initialization completed!

Page 21: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 21

Console Configuration Tips

• Lock most important settings• Prevents problems with IPF overwriting

• Define Policy Manager Server Address• Empty by default!

Page 22: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

POINT APPLICATION ROLLOUT

Page 23: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 23

Before you Start the Rollout...

Checklist

• Remove all conflicting software from target hosts

• Sidegrade detects and removes certain vendors automatically (AVCS only!)

• Test sidegrade during piloting phase!

• Check target host for third party firewalls (e.g. XP firewalls) and disable them (e.g through AD group policy)

• Start piloting

• Test different rollout methods and choose the one suited best for your environment

• Never rollout without careful testing – or to the whole domain at once!

Page 24: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 24

Rollout Methods

Intelligent Installations

• Autodiscover windows hosts (recommended)

• Installation package created with PMC

• Transfers package separately to each host (no multicasting)

• Certain inbound traffic on hosts needs to be allowed

• RPC (TCP 135) and SMB (TCP 445)

• Push install to Windows host

• Advantage: needs no name resolution, if IP addresses are used

• Disadvantage: IP addresses have to be typed manually

Page 25: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 25

Rollout Methods

Pre-configured package

• Using PMC to create a pre-configured package

• No inbound traffic on hosts required

• JAR: Installation of exported package by ilaunchr.exe through windows login script

• Make sure to run login sript silent (script includes password in cleartext!)

• MSI: Installation of exported package through windows group policy in active directory

Page 26: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 26

Anti-Virus

Centrally Manageable Products

F-Secure Anti-Virus for Citrix Servers (and for Microsoft Terminal Server)

F-Secure Anti-Virus for SAMBA Servers

Anti-Virus

Server Computing

Anti-Virus for HTTP, SMTP, FTP and POPAnti-SpamContent Filtering

Anti-VirusAnti-SpamContent Filtering

Anti-VirusVirus & SpyProtection Intrusion prevention

F-Secure solutions and services provided

Web & DNS

Servers

F-Secure Anti-Virus for MS Exchange

F-Secure Spam Control for Microsoft Exchange

F-Secure Spam Control for Internet Gatekeeper

F-Secure Internet Gatekeeper

F-Secure Anti-Virus for MIMEsweeper

F-Secure Anti-Virus for Windows Servers

F-Secure Anti-Virus for Linux Servers

F-Secure Anti-Virus for Workstations

F-Secure Anti-Virus Client Security

GatewaysEmail Servers

File & Print

Servers

Desktops & laptopsMicrosoft Platforms

Linux Platforms

Page 27: IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.

Page 27

Summary

Main topics

• Pre-deployment phase

• Is the implementation possible?

• Implementation scenarios and examples

• Installing the environment

• Most critical installation steps

• Console configuration tips

• Point application rollout

• Point application rollout planning and piloting

• Most common rollout methods and examples