
SIMPLY SECURE G DATA BUSINESS SOLUTIONS REFERENCE GUIDE G DATA APPLICATION DEVELOPMENT 13:47 08 - 06 - 2015 _ ReferenceGuide_Business_13.2 G Data Business Solutions Reference Guide Contents Introduction ....................................................................................................................................................... 5 Section A: Planning and deployment ................................................................................................................ 6 1. Network and client management .............................................................................................................. 6 1.1. Network layout ............................................................................................................................................................. 6 1.2. Security components ................................................................................................................................................. 10 2. Choosing a solution ..................................................................................................................................12 2.1. G Data business solutions ......................................................................................................................................... 12 2.2. System requirements ................................................................................................................................................. 13 2.3. Licensing ...................................................................................................................................................................... 14 3. Installation scenarios ...............................................................................................................................15 3.1. Local deployment ....................................................................................................................................................... 15 3.2. Managed Endpoint Security ..................................................................................................................................... 21 4. Deployment ..............................................................................................................................................22 4.1. Preparation .................................................................................................................................................................. 22 4.2. Clean installation ........................................................................................................................................................ 23 4.3. Upgrade installation .................................................................................................................................................. 25 4.4. Network configuration .............................................................................................................................................. 26 4.5. Initial configuration and default settings .............................................................................................................. 27 4.6. Server updates and registration .............................................................................................................................. 29 4.7. Server database backup and restore ...................................................................................................................... 30 4.8. Client deployment ...................................................................................................................................................... 31 4.9. Finalizing deployment............................................................................................................................................... 37 4.10. Subnet server(s) .......................................................................................................................................................... 38 5. Remote administration ............................................................................................................................40 5.1. Desktop application ................................................................................................................................................... 40 5.2. Browser ......................................................................................................................................................................... 41 5.3. Mobile ........................................................................................................................................................................... 43 5.4. MasterAdmin ............................................................................................................................................................... 43 Section B: Using G Data business solutions ....................................................................................................45 6. Dashboard and monitoring .....................................................................................................................45 2 Copyright © 2015 G Data Software AG Contents 6.1. Dashboard and Statistics .......................................................................................................................................... 45 6.2. Reports and Alarms .................................................................................................................................................... 47 6.3. ReportManager ........................................................................................................................................................... 49 7. Managing clients ......................................................................................................................................51 7.1. Using groups ............................................................................................................................................................... 51 7.2. Integrating Active Directory ..................................................................................................................................... 52 7.3. Signature and program file updates ...................................................................................................................... 52 7.4. End user security permissions.................................................................................................................................. 55 7.5. Performance ................................................................................................................................................................ 57 7.6. Managing Linux clients ............................................................................................................................................. 58 7.7. Removing a client ....................................................................................................................................................... 58 8. Real time protection.................................................................................................................................59 8.1. Internet traffic scans .................................................................................................................................................. 59 8.2. Monitor ......................................................................................................................................................................... 61 8.3. Performance ................................................................................................................................................................ 64 8.4. Operating system security ........................................................................................................................................ 65 9. On demand protection .............................................................................................................................67 9.1. Idle scan ........................................................................................................................................................................ 67 9.2. Scan jobs ...................................................................................................................................................................... 68 9.3. Exceptions .................................................................................................................................................................... 73 9.4. Local scan jobs ............................................................................................................................................................ 74 10. Handling a malware infection .................................................................................................................75 10.1. Automated detection and mitigation .................................................................................................................... 75 10.2. Extended mitigation .................................................................................................................................................. 77 10.3. Analysis ........................................................................................................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages153 Page
-
File Size-