BES Administrator's Guide
Total Page:16
File Type:pdf, Size:1020Kb
Trend Micro® Endpoint Security Platform Console Administrator’s Guide Version 8.0 August 2010 Trend Micro Endpoint Security Platform Suite Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation. Trend Micro, the Trend Micro t-ball logo, OfficeScan, Damage Cleanup Services, ScanMail, and TrendLabs are service marks, trademarks or registered trademarks of Trend Micro, Incorporated. BigFix®, Fixlet® and “Fix it before it fails”® are registered trademarks of Trend Micro, Inc. iprevention, Powered by BigFix, Relevance Engine, and related BigFix logos are trademarks of Trend Micro, Inc. All other product or company names may be trademarks or registered trademarks of their respective owners. Protected by U.S. Patent No. 5,623,600; 5,889,943; 5,951,698; 6.119,165 Copyright © 2010 Trend Micro Incorporated. All rights reserved. Document Part No.: APEM84654/100908 Release Date: September 2010 Trend Micro Endpoint Security Platform Suite Feedback Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp IMPORTANT NOTICE AND LIMITATION Your use of the Trend Micro Endpoint Security Platform is limited to supporting the Trend Micro Core Protection Module and other BigFix Products purchased from Trend Micro only as expressly described in and permitted by this user guide. You are only authorized and licensed to use the software distribution capabilities of the Trend Micro Endpoint Security Platform to distribute the Trend Micro Core Protection Module and other BigFix Products purchased from Trend Micro, but you are not authorized or licensed to use the Trend Micro Endpoint Security Platform to distribute any other Trend Micro, BigFix, or any third party software You are authorized and licensed to use the Trend Micro Endpoint Security Platform only to customize the Fixlets that are provided with the Trend Micro Core Protection Module and other BigFix Products purchased from Trend Micro, but you are not authorized to create completely new Fixlets unrelated to such software purchased from Trend Micro. However, you may at any time purchase an upgrade from Trend Micro which permits you to use the full and complete software distribution capabilities of the Trend Micro Endpoint Security Platform with any software application (any Trend Micro, BigFix, or third party software) and to create new Fixlets that are unrelated to the software purchased from Trend Micro. Administrator's Guide iii © 2010 Trend Micro, Inc. Trend Micro Endpoint Security Platform Suite Contents CONTEN TS Part One ................................................................................................................................................................................................ 7 Introduction ................................................................................... 7 Audience.................................................................................................................................7 Versions................................................................................................................................. 8 Overview of the ESP System ............................................................................................. 9 Using this Guide ..................................................................................................................10 ESP Operating Requirements............................................................................................11 ESP Server Requirements .............................................................................................11 ESP Console Requirements ......................................................................................... 13 ESP Agent Requirements ............................................................................................. 13 Database Requirements................................................................................................14 Security Requirements...................................................................................................14 The ESP system authenticates all Fixlet messages and actions using secure public-key infrastructure (PKI) signatures. PKI uses public/private key pairs to ensure authenticity. ........................................................................................................14 A Basic Installation..............................................................................................................16 ESP Message Level Encryption (MLE) Overview.......................................................... 17 A Typical Installation...........................................................................................................18 A Multiple Server Installation.............................................................................................18 Understanding Replication.................................................................................................19 Distributed Server Architecture (DSA) ............................................................................ 20 Automating Failover and Failback .................................................................................... 21 Administrative Roles...........................................................................................................22 Duties of the ESP Site Administrator ...............................................................................23 Part Two.............................................................................................................................................................................................. 24 Getting Started ........................................................................... 24 Getting Authorized ............................................................................................................. 24 Creating the Action Site Masthead.................................................................................. 24 Installing the Programs.......................................................................................................27 Running the Component Installers.................................................................................. 28 Installing the Primary ESP Server............................................................................... 29 Authenticating Additional Servers (DSA) ....................................................................35 Administrator's Guide iv © 2010 Trend Micro, Inc. Trend Micro Endpoint Security Platform Suite Installing Additional Servers (DSA)............................................................................. 36 Connecting the ESP Console to a Different Server ................................................. 38 Running the ESP Diagnostics Tool............................................................................. 39 Understanding the ESP Server Components.............................................................41 Installing the ESP Console........................................................................................... 42 Installing the ESP Agents............................................................................................. 43 Running the ESP Administration Tool ........................................................................ 50 Understanding Operator Rights ....................................................................................... 54 Site Administrators ........................................................................................................ 54 Master Operators........................................................................................................... 54 Operators .........................................................................................................................55 Operators and Analyses ................................................................................................55 Adding ESP Console Operators.................................................................................. 56 Part Three ...........................................................................................................................................................................................60 Configuring the ESP Components ..........................................60 Using ESP Relays...............................................................................................................61 Optimizing the ESP Server(s) .......................................................................................... 70 Managing Replication (DSA).............................................................................................72 Managing Bandwidth ..........................................................................................................73 Dynamic Throttling ............................................................................................................. 74 Creating Agent Dashboards ..............................................................................................75