Panda Endpoint Protection / Plus on Aether Administration Guide
Total Page:16
File Type:pdf, Size:1020Kb
Panda Endpoint Protection / Plus Administration Guide Panda Endpoint Protection Panda Endpoint Protection Plus Panda Endpoint Protection / Plus on Aether Administration Guide Version: 8.41.00-00 Author: Panda Security 1 Date: 16/10/2018 Panda Endpoint Protection / Plus Administration Guide Table of contents 1. PREFACE ..................................................................................................................... 11 1.1. INTRODUCTION ............................................................................................................... 12 1.2. WHO IS THIS GUIDE AIMED AT? ....................................................................................... 12 1.3. WHAT IS PANDA ENDPOINT PROTECTION / PLUS ON AETHER? ........................................ 12 1.4. PANDA ENDPOINT PROTECTION / PANDA ENDPOINT PROTECTION PLUS ........................ 12 1.5. ICONS .............................................................................................................................. 12 2. INTRODUCTION ........................................................................................................... 14 2.1. INTRODUCTION ............................................................................................................... 15 2.2. MAIN BENEFITS OF PANDA ENDPOINT PROTECTION / PLUS ON AETHER. ........................ 15 2.3. MAIN BENEFITS OF PANDA ENDPOINT PROTECTION PLUS ON AETHER. ........................... 16 2.4. AETHER PLATFORM: KEY FEATURES ................................................................................. 17 KEY BENEFITS OF AETHER ............................................................................................... 17 AETHER ARCHITECTURE .................................................................................................. 19 AETHER ON USERS' COMPUTERS .................................................................................... 19 2.5. PANDA ENDPOINT PROTECTION / PLUS ARCHITECTURE: KEY COMPONENTS ................... 21 COLLECTIVE INTELLIGENCE SERVERS .............................................................................. 22 MANAGEMENT CONSOLE WEB SERVER .......................................................................... 22 COMPUTERS PROTECTED WITH PANDA ENDPOINT PROTECTION / PLUS ...................... 23 PANDA PATCH MANAGEMENT SERVICE (OPTIONAL) ..................................................... 23 2.6. PANDA ENDPOINT PROTECTION / PLUS ON AETHER: USER PROFILE ................................ 23 2.7. PANDA ENDPOINT PROTECTION / PLUS ON AETHER: SUPPORTED DEVICES AND LANGUAGES ........................................................................................................................... 24 2.8. AVAILABLE RESOURCES AND DOCUMENTATION .............................................................. 25 3. PANDA ENDPOINT PROTECTION / PLUS TECHNOLOGIES ............................................... 26 3.1. INTRODUCTION ............................................................................................................... 27 3.2. TECHNICAL RESOURCES IMPLEMENTED IN PANDA ENDPOINT PROTECTION / PLUS ........ 27 ANTI-EXPLOIT PROTECTION ............................................................................................ 28 PERMANENT ANTIVIRUS PROTECTION AND COLLECTIVE INTELLIGENCE ....................... 28 PROTECTION AGAINST ADVANCED STEALTH TECHNIQUES AND MACRO VIRUSES ........ 29 EMAIL AND WEB PROTECTION........................................................................................ 29 FIREWALL AND INTRUSION DETECTION SYSTEMS (IDS) ................................................. 30 DEVICE CONTROL ............................................................................................................ 30 SPAM, VIRUS AND CONTENT FILTERING FOR EXCHANGE SERVERS ............................... 30 WEB ACCESS CONTROL ................................................................................................... 31 NETWORK STATUS VISIBILITY .......................................................................................... 31 DISINFECTION TECHNIQUES ............................................................................................ 32 VULNERABILITY PATCHING (PANDA PATCH MANAGEMENT) ......................................... 32 3.3. ADAPTATION PHASE ........................................................................................................ 32 4. THE MANAGEMENT CONSOLE ..................................................................................... 35 2 Panda Endpoint Protection / Plus Administration Guide 4.1. INTRODUCTION ............................................................................................................... 36 WEB CONSOLE REQUIREMENTS...................................................................................... 36 IDP FEDERATION ............................................................................................................. 37 4.2. GENERAL CHARACTERISTICS OF THE CONSOLE ................................................................. 37 4.3. GENERAL STRUCTURE OF THE WEB MANAGEMENT CONSOLE ......................................... 37 TOP MENU (1) ................................................................................................................. 38 SIDE MENU (2) ................................................................................................................. 40 WIDGETS (3) .................................................................................................................... 40 TAB MENU ....................................................................................................................... 40 ACTION BAR .................................................................................................................... 41 FILTERING AND SEARCH TOOLS ...................................................................................... 41 SETTINGS ELEMENTS (8).................................................................................................. 42 CONTEXT MENUS ............................................................................................................ 43 LISTS ................................................................................................................................ 43 5. LICENSES ..................................................................................................................... 45 5.1. INTRODUCTION ............................................................................................................... 46 5.2. DEFINITIONS AND KEY CONCEPTS FOR MANAGING LICENSES .......................................... 46 LICENSE CONTRACTS ....................................................................................................... 46 COMPUTER STATUS ........................................................................................................ 46 LICENSE STATUS AND GROUPS ....................................................................................... 47 TYPES OF LICENSES .......................................................................................................... 47 LICENSE MANAGEMENT .................................................................................................. 47 LICENSE RELEASE ............................................................................................................. 48 PROCESSES FOR ASSIGNING AND RELEASING LICENSES ................................................. 48 5.3. CONTRACTED LICENSES .................................................................................................... 49 WIDGET ........................................................................................................................... 50 LICENSE LIST .................................................................................................................... 51 5.4. EXPIRED LICENSES ............................................................................................................ 54 EXPIRY NOTIFICATIONS ................................................................................................... 54 WITHDRAWAL OF EXPIRED LICENSES ............................................................................. 54 5.5. ADDING TRIAL LICENSES TO COMMERCIAL LICENSES ....................................................... 54 5.6. SEARCHING FOR COMPUTERS BASED ON THE STATUS OF THEIR LICENSES ...................... 55 6. INSTALLING THE PANDA ENDPOINT PROTECTION / PLUS SOFTWARE ............................ 56 6.1. INTRODUCTION ............................................................................................................... 57 6.2. PROTECTION DEPLOYMENT OVERVIEW ........................................................................... 57 6.3. INSTALLATION REQUIREMENTS ....................................................................................... 60 REQUIREMENTS FOR EACH SUPPORTED PLATFORM ...................................................... 60 NETWORK REQUIREMENTS ............................................................................................. 61 6.4. MANUALLY DOWNLOADING AND INSTALLING THE PANDA ENDPOINT PROTECTION / PLUS SOFTWARE ..................................................................................................................... 61 DOWNLOADING THE INSTALLATION PACKAGE FROM THE WEB CONSOLE ................... 61 GENERATING A DOWNLOAD URL ..................................................................................