Cloud Security for Endpoints by Bitdefender Administrator's Guide
Total Page:16
File Type:pdf, Size:1020Kb
ENTERPRISE CLOUD SECURITY FOR ENDPOINTS Administrator's Guide ›› ENTERPRISE CLOUD SECURITY FOR ENDPOINTS Cloud Security for Endpoints by Bitdefender Administrator's Guide Publication date 2013.07.29 Copyright© 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from an authorized representative of Bitdefender. The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source. The content can not be modified in any way. Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the preparation of this document, the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work. This book contains links to third-party Websites that are not under the control of Bitdefender, therefore Bitdefender is not responsible for the content of any linked site. If you access a third-party website listed in this document, you will do so at your own risk. Bitdefender provides these links only as a convenience, and the inclusion of the link does not imply that Bitdefender endorses or accepts any responsibility for the content of the third-party site. Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document are the sole property of their respective owners, and are respectfully acknowledged. ENTERPRISE CLOUD SECURITY FOR ENDPOINTS 89504E470D0A1A0A0000000D494844520000002000000020010300000049 B4E8B7000000017352474200AECE1CE900000006504C5445FFFFFF000000 55C2D37E0000009A4944415408D76370FB7BCF85E1BDE2321706DE847DDF 185A5B5858189454BBAA18EAFFEFBFCF90FFF7DF3F0630F8CCA42DC9A0C0 14A7CC30E58C763FC3751EAFC50C0C4E40C5F5F54075E5E7ECE743D4ED0A 4ECC62B831977D06C365F5E3090C13AE262932743330CE60F80F52575DBF FC3644DDEB695EDB19AC4D2EB533342D5BB198C1E5E9AA030C960C01EC40 75FFFF31FC2FFFF51DAC0C00A09339A3914312FC0000000049454E44AE42 60827A3431793A70666765303133406F316771337333617133652E70307A ENTERPRISE CLOUD SECURITY FOR ENDPOINTS Table of Contents 1. About Cloud Security for Endpoints . 1 1.1. Architecture . 1 1.2. User Accounts . 2 1.3. Threat Protection . 3 1.3.1. Antimalware . 3 1.3.2. Antiphishing . 5 1.3.3. Firewall and Intrusion Detection . 5 1.3.4. Data Protection . 6 1.3.5. User Control . 6 1.4. Workflow . 6 1.4.1. Deployment . 7 1.4.2. Endpoint Management . 7 1.4.3. Security Policies . 7 1.4.4. Scan Tasks . 8 1.4.5. Reports . 8 2. Getting Started . 9 2.1. Connecting to Cloud Security Console . 9 2.2. Cloud Security Console Overview . 10 2.3. First Steps . 10 2.4. Changing Default Login Password . 12 2.5. Managing Your Account . 12 2.6. Working with Table Data . 13 3. Service Subscription . 15 3.1. Activating a License . 15 3.2. Renewing a License . 16 3.3. Extending the Number of Licensed Endpoints . 16 3.4. Checking Your Subscription Status . 16 4. Installing Protection on Endpoints . 17 4.1. System Requirements . 17 4.2. Preparing for Installation . 18 4.3. Local Installation . 19 4.4. Remote Installation . 20 4.5. Customizing the Installation Package . 22 4.6. How Network Discovery Works . 23 4.6.1. More about the Microsoft Computer Browser Service . 24 4.6.2. Network Discovery Requirements . 25 5. Managing Computers . 26 5.1. About Managed, Unmanaged and Excluded Computers . 27 5.2. About Offline Computers . 27 iv ENTERPRISE CLOUD SECURITY FOR ENDPOINTS 5.3. Using Computer Groups . 28 5.4. Searching and Sorting Computers . 30 5.5. Checking Computer and Protection Details . 30 5.6. Checking and Changing Security Settings . 31 5.7. Creating Quick Reports . 31 5.8. Excluding Computers from Management . 31 5.9. Restoring/Deleting Excluded Computers . 32 5.10. Deleting Managed Computers . 32 5.11. Deleting Unmanaged Computers . 33 6. Running and Managing Tasks . 34 6.1. Installing Protection on Unmanaged Computers . 34 6.2. Scanning Managed Computers . 35 6.3. Uninstalling Protection from Computers . 36 6.4. Configuring Installed Modules . 37 6.5. Upgrading the Endpoint Client . 38 6.6. Viewing and Managing Tasks . 39 6.6.1. Checking Execution Status and Results . ..