G DATA Business Solutions Reference Guide
Total Page:16
File Type:pdf, Size:1020Kb
G DATA Business Solutions Reference Guide G DATA Software AG | October 2017 G DATA Business Solutions Reference Guide Contents Introduction .......................................................................................................................... 6 Section A: Planning and deployment ........................................................................................ 7 1. Network and client management ....................................................................................... 7 1.1. Network layout ................................................................................................................................ 7 1.2. Security components ..................................................................................................................... 12 2. Choosing a solution ........................................................................................................ 13 2.1. G DATA business solutions ............................................................................................................ 13 2.2. System requirements .................................................................................................................... 14 2.3. Licensing ........................................................................................................................................ 15 3. Installation scenarios ..................................................................................................... 16 3.1. Local deployment .......................................................................................................................... 16 3.2. Managed Endpoint Security and Managed Endpoint Security Powered by Microsoft Azure ..... 22 4. Deployment ................................................................................................................... 23 4.1. Preparation .................................................................................................................................... 23 4.2. Clean installation ........................................................................................................................... 24 4.3. Upgrade installation ...................................................................................................................... 27 4.4. Network configuration .................................................................................................................. 29 4.5. Initial configuration ....................................................................................................................... 30 4.6. Server updates and registration.................................................................................................... 32 4.7. Server database backup and restore ............................................................................................ 33 4.8. Client deployment ......................................................................................................................... 35 4.9. Finalizing deployment ................................................................................................................... 43 4.10. Subnet server(s) ............................................................................................................................. 44 5. Remote administration ................................................................................................... 46 5.1. Desktop application....................................................................................................................... 46 5.2. Browser .......................................................................................................................................... 47 5.3. Mobile ............................................................................................................................................. 49 5.4. MasterAdmin .................................................................................................................................. 50 2 Copyright © 2017 G DATA Software AG Contents Section B: Using G DATA business solutions ............................................................................. 51 6. Dashboard and monitoring .............................................................................................. 51 6.1. Overview, Dashboard and Statistics ............................................................................................. 51 6.2. Reports and Alarms ....................................................................................................................... 54 6.3. ReportManager .............................................................................................................................. 56 7. Managing clients ............................................................................................................ 58 7.1. Using groups .................................................................................................................................. 58 7.2. Integrating Active Directory .......................................................................................................... 59 7.3. Signature and program file updates ............................................................................................. 60 7.4. End user security permissions ....................................................................................................... 64 7.5. Performance .................................................................................................................................. 65 7.6. Malware Information Initiative ...................................................................................................... 66 7.7. Managing Linux/Mac clients .......................................................................................................... 66 7.8. Removing a client .......................................................................................................................... 67 8. Real time protection ....................................................................................................... 68 8.1. Internet traffic scans ...................................................................................................................... 69 8.2. Monitor ........................................................................................................................................... 71 8.3. Performance .................................................................................................................................. 74 8.4. Operating system security ............................................................................................................. 75 8.5. Web proxy protection .................................................................................................................... 77 9. On demand protection .................................................................................................... 78 9.1. Idle scan ......................................................................................................................................... 78 9.2. Scan jobs ........................................................................................................................................ 79 9.3. Exceptions ...................................................................................................................................... 85 9.4. Local scan jobs ............................................................................................................................... 86 10. Handling a malware infection .......................................................................................... 87 10.1. Automated detection and mitigation ........................................................................................... 87 10.2. Extended mitigation ...................................................................................................................... 89 10.3. Analysis .......................................................................................................................................... 90 11. Mobile device management ............................................................................................. 93 11.1. Android ........................................................................................................................................... 93 11.2. iOS .................................................................................................................................................. 98 Copyright © 2017 G DATA Software AG 3 G DATA Business Solutions Reference Guide 12. Backups ....................................................................................................................... 102 12.1. Managing backups ....................................................................................................................... 103 12.2. Create a backup ........................................................................................................................... 104 12.3. Restore a backup ......................................................................................................................... 109 13. Firewall ........................................................................................................................ 111 13.1. Managing firewall clients ............................................................................................................