Integrity Client Management Guide
Total Page:16
File Type:pdf, Size:1020Kb
Integrity Client Management Guide Deploying and Managing Integrity Flex and Integrity Agent A Check Point Company ZLD 1-0218-0501-2005-04-21 Smarter Security™ Preface This document is the Integrity Client Management Guide for Integrity Server version 5.0. About Zone Labs, LLC. Zone Labs®, a Check Point® company (Nasdaq: CHKP), is one of the most trusted brands in Internet security. Zone Labs is a leading creator of endpoint security solutions protecting millions of PCs and the valuable, personally-identifiable information on those PCs, from hackers, spyware and data theft. The company's award-winning endpoint security product line is deployed in global enterprises, small businesses and consumers' homes, protecting them from Internet-borne threats. Check Point Integrity™ is an endpoint security management platform that protects corporate data and productivity. The ZoneAlarm family of products is among the most popular and successful Internet security products available today while IMsecure® Pro offers comprehensive security for instant messaging. Please visit http:// www.zonelabs.com for more information. Integrity Client Management Guide i ZLD 1-0218-0501-2005-04-21 Editor's Notes: ©2005 Check Point Software Technologies Ltd. All rights reserved. Check Point, Application Intelligence, Check Point Express, the Check Point logo, AlertAdvisor, ClusterXL, Cooperative Enforcement, ConnectControl, Connectra, CoSa, Cooperative Security Alliance, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, IMsecure, INSPECT, INSPECT XL, Integrity, InterSpect, IQ Engine, Open Security Extension, OPSEC, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureKnowledge, SecurePlatform, SecurRemote, SecurServer, SecureUpdate, SecureXL, SiteManager-1, SmartCenter, SmartCenter Pro, Smarter Security, SmartDashboard, SmartDefense, SmartLSM, SmartMap, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, TrueVector, UAM, User-to-Address Mapping, UserAuthority, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 VSX, Web Intelligence, ZoneAlarm, Zone Alarm Pro, Zone Labs, and the Zone Labs logo, are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726 and 6,496,935 and may be protected by other U.S. Patents, foreign patents, or pending applications. This product includes software developed by the Apache Software Foundation http:// www.apache.org. This product includes software developed by the Apache Software Foundation http://www.apache.org. Integrity Client Management Guide ii ZLD 1-0218-0501-2005-04-21 Contents Chapter 1 Preparing for Deployment and Installation Choosing an Integrity Client Type ....................................................................... 2 About Integrity Flex............................................................................................ 2 About Integrity Agent.......................................................................................... 3 Installation Requirements.................................................................................. 3 About the Windows Installer Executables .................................................................. 4 About the InstallShield Scripting Engine................................................................... 4 Integrity/Windows Firewall Compatibility ............................................................. 4 Using Security Policies...................................................................................... 5 Chapter 2 Integrity Client Installation Options Installation Command-Line Syntax ..................................................................... 8 MSI String Requirements..................................................................................... 8 Limitations on Installation Command Line Length........................................................ 9 Using Standard InstallShield and MSI Parameters ............................................. 10 Silent Mode to Install or Upgrade ......................................................................... 10 Changing the Installation Directory........................................................................ 11 Controlling the Reboot Behavior ........................................................................... 12 Integrity Client MSI Installation Parameters ...................................................... 13 Setting Start Up Behavior .................................................................................. 15 Configuring Client to Automatically Start............................................................. 15 Configuring the Firewall Start Up...................................................................... 16 Configuring EAP Type ................................................................................... 16 Automatically Starting the Integrity client Tutorial.................................................. 17 Automatically Starting the Configuration Wizard .................................................... 17 Display the Integrity client Control Center after Installation or Upgrade ......................... 18 Installing Instance Messenging Security Feature........................................................ 18 Providing a Nortel VPN Icon on the Desktop............................................................. 19 Setting the Integrity client Registry Key .................................................................. 19 Using a License Key......................................................................................... 20 Using a Configuration and Policy File..................................................................... 21 Configuring the Client from a File ..................................................................... 21 Specifying a Policy File ................................................................................. 21 Password Protecting the Client Installation and Configuration ........................................ 23 Protecting the Installation .............................................................................. 23 Protecting the Configuration Settings................................................................. 24 Setting the Alert Display Behavior......................................................................... 25 Setting a New Upgrade Key ................................................................................ 25 Upgrade and Reinstallation Options ...................................................................... 26 Providing the Installation Password to Upgrade ..................................................... 26 Providing the User Password to Change Configuration Settings ................................... 28 Providing an Upgrade Key .............................................................................. 28 Prompting Users to Reboot After Silent Upgrade.................................................... 29 Integrity Client Management Guide iii ZLD 1-0218-0501-2005-04-21 Reverting to the Default Settings ...................................................................... 30 Using an INI File when CLI Limit Exceeded ............................................................. 30 Chapter 3 Configuring Client Packages Creating Client Packages ................................................................................. 33 Configuring a Package .................................................................................. 34 Creating a New Package or Copying an Existing Package .......................................... 34 Deleting Packages........................................................................................... 41 Chapter 4 Deploying Clients to End-Users Using the Integrity Server Sandbox page ........................................................... 44 How Client Deployment Works ............................................................................. 44 The End-User Experience................................................................................... 45 Client Deployment View Panel ............................................................................. 46 Using an Enterprise Software Distribution Tool .................................................. 47 Using Microsoft System Management Server ........................................................ 47 Using Tivoli ................................................................................................... 48 Using a Remote Administration Tool...................................................................... 48 Using Active Directory to Deploy Integrity Clients....................................................... 49 Step 1: Create a Distribution Point.................................................................... 49 Step 2: Create a Group Policy Object ................................................................. 49 Step 3: Assign the installation package to the group policy ....................................... 50 Chapter 5 Supporting Integrity Client Users The Sandbox URL ..........................................................................................