G Data Business Solutions Reference Guide

G Data Business Solutions Reference Guide

SIMPLY SECURE G DATA BUSINESS SOLUTIONS REFERENCE GUIDE G DATA APPLICATION DEVELOPMENT 13:47 08 - 06 - 2015 _ ReferenceGuide_Business_13.2 G Data Business Solutions Reference Guide Contents Introduction ....................................................................................................................................................... 5 Section A: Planning and deployment ................................................................................................................ 6 1. Network and client management .............................................................................................................. 6 1.1. Network layout ............................................................................................................................................................. 6 1.2. Security components ................................................................................................................................................. 10 2. Choosing a solution ..................................................................................................................................12 2.1. G Data business solutions ......................................................................................................................................... 12 2.2. System requirements ................................................................................................................................................. 13 2.3. Licensing ...................................................................................................................................................................... 14 3. Installation scenarios ...............................................................................................................................15 3.1. Local deployment ....................................................................................................................................................... 15 3.2. Managed Endpoint Security ..................................................................................................................................... 21 4. Deployment ..............................................................................................................................................22 4.1. Preparation .................................................................................................................................................................. 22 4.2. Clean installation ........................................................................................................................................................ 23 4.3. Upgrade installation .................................................................................................................................................. 25 4.4. Network configuration .............................................................................................................................................. 26 4.5. Initial configuration and default settings .............................................................................................................. 27 4.6. Server updates and registration .............................................................................................................................. 29 4.7. Server database backup and restore ...................................................................................................................... 30 4.8. Client deployment ...................................................................................................................................................... 31 4.9. Finalizing deployment............................................................................................................................................... 37 4.10. Subnet server(s) .......................................................................................................................................................... 38 5. Remote administration ............................................................................................................................40 5.1. Desktop application ................................................................................................................................................... 40 5.2. Browser ......................................................................................................................................................................... 41 5.3. Mobile ........................................................................................................................................................................... 43 5.4. MasterAdmin ............................................................................................................................................................... 43 Section B: Using G Data business solutions ....................................................................................................45 6. Dashboard and monitoring .....................................................................................................................45 2 Copyright © 2015 G Data Software AG Contents 6.1. Dashboard and Statistics .......................................................................................................................................... 45 6.2. Reports and Alarms .................................................................................................................................................... 47 6.3. ReportManager ........................................................................................................................................................... 49 7. Managing clients ......................................................................................................................................51 7.1. Using groups ............................................................................................................................................................... 51 7.2. Integrating Active Directory ..................................................................................................................................... 52 7.3. Signature and program file updates ...................................................................................................................... 52 7.4. End user security permissions.................................................................................................................................. 55 7.5. Performance ................................................................................................................................................................ 57 7.6. Managing Linux clients ............................................................................................................................................. 58 7.7. Removing a client ....................................................................................................................................................... 58 8. Real time protection.................................................................................................................................59 8.1. Internet traffic scans .................................................................................................................................................. 59 8.2. Monitor ......................................................................................................................................................................... 61 8.3. Performance ................................................................................................................................................................ 64 8.4. Operating system security ........................................................................................................................................ 65 9. On demand protection .............................................................................................................................67 9.1. Idle scan ........................................................................................................................................................................ 67 9.2. Scan jobs ...................................................................................................................................................................... 68 9.3. Exceptions .................................................................................................................................................................... 73 9.4. Local scan jobs ............................................................................................................................................................ 74 10. Handling a malware infection .................................................................................................................75 10.1. Automated detection and mitigation .................................................................................................................... 75 10.2. Extended mitigation .................................................................................................................................................. 77 10.3. Analysis ........................................................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    153 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us