Guía Para Administradores De

Guía Para Administradores De

Guide for Network Administrators Adaptive Defense 360 Guide for Network Administrators 1 Guide for Network Administrators Table of contents PREFACE .......................................................................................................................... 9 INTRODUCTION ...............................................................................................................10 WHO IS THE GUIDE AIMED AT? ...........................................................................................10 ICONS ...........................................................................................................................10 INTRODUCTION ..............................................................................................................11 INTRODUCTION ...............................................................................................................12 KEY FEATURES OF ADAPTIVE DEFENSE 360 ............................................................................12 ADAPTIVE DEFENSE 360 USER PROFILE .................................................................................13 ADAPTIVE DEFENSE 360 ARCHITECTURE: KEY COMPONENTS .....................................................13 ADAPTIVE DEFENSE 360 CLOUD SERVER FARM ........................................................................... 14 MANAGEMENT CONSOLE WEB SERVER ..................................................................................... 15 COMPUTERS PROTECTED WITH ADAPTIVE DEFENSE 360 .............................................................. 15 ADAPTIVE DEFENSE 360 SERVICES .......................................................................................19 ADVANCED REPORTING TOOL SERVICE ...................................................................................... 19 SIEMFEEDER SERVICE: INTEGRATION WITH THE CUSTOMER’S SIEM SERVICE .................................. 19 SAMPLES FEED ...................................................................................................................... 20 IP FEEDS .............................................................................................................................. 20 REMOTE CONTROL MODULE ................................................................................................... 20 2.6 ADAPTIVE DEFENSE 360: SUPPORTED DEVICES ........................................................................20 2.7 AVAILABLE RESOURCES AND DOCUMENTATION........................................................................21 THE ADAPTIVE PROTECTION FULL CYCLE ........................................................................22 INTRODUCTION ...............................................................................................................23 THE ADAPTIVE PROTECTION CYCLE .......................................................................................23 PHASE 1: COMPLETE PROTECTION OF THE IT NETWORK ............................................................24 ANTI-EXPLOIT PROTECTION ..................................................................................................... 24 PERMANENT ANTIVIRUS PROTECTION AND COLLECTIVE INTELLIGENCE ............................................ 25 PROTECTION AGAINST ADVANCED STEALTH TECHNIQUES AND MACRO VIRUSES ................................ 25 EMAIL AND WEB PROTECTION ................................................................................................. 26 FIREWALL AND INTRUSION DETECTION SYSTEM (IDS) .................................................................. 26 DEVICE CONTROL .................................................................................................................. 26 SPAM, VIRUS AND CONTENT FILTERING FOR EXCHANGE SERVERS ................................................... 26 WEB ACCESS CONTROL ........................................................................................................... 27 PROTECTION FOR VULNERABLE SYSTEMS ................................................................................... 27 PHASE 2: DETECTION AND MONITORING ...............................................................................27 ADVANCED PERMANENT PROTECTION ....................................................................................... 28 MONITORING DATA FILES ....................................................................................................... 29 VISIBILITY OF THE NETWORK STATUS ......................................................................................... 30 PHASE 3: REMEDIATION AND RESPONSE ...............................................................................30 PHASE 4: ADAPTATION .....................................................................................................31 CREATING PANDA ACCOUNTS ........................................................................................33 INTRODUCTION ...............................................................................................................34 CREATING A PANDA ACCOUNT ...........................................................................................34 2 Guide for Network Administrators ACTIVATING YOUR PANDA ACCOUNT ...................................................................................35 THE WEB MANAGEMENT CONSOLE ................................................................................36 INTRODUCTION ...............................................................................................................37 WEB CONSOLE REQUIREMENTS ................................................................................................ 37 IDP FEDERATION ................................................................................................................... 38 GENERAL STRUCTURE OF THE WEB MANAGEMENT CONSOLE .....................................................38 TOP MENU (1) ...................................................................................................................... 38 BROWSER PATH (2) ............................................................................................................... 41 SIDE MENU (3) ..................................................................................................................... 41 TABS (4) .............................................................................................................................. 41 GENERAL SETTINGS BUTTON (5) .............................................................................................. 41 LOGGED-IN USER (6) ............................................................................................................. 43 PANDA CLOUD BUTTON (7) .................................................................................................... 43 SETTINGS COMPONENTS (8) .................................................................................................... 43 NOTIFICATIONS (9) ................................................................................................................ 44 ACCESS TO THE ADVANCED REPORTING TOOL SERVICE (10) ....................................................... 44 LICENSES ........................................................................................................................45 INTRODUCTION ...............................................................................................................46 CONTRACTING AND RENEWING LICENSES...............................................................................46 LICENSE CONTRACTS .............................................................................................................. 46 PROTECTION STATUS ........................................................................................................48 ASSIGNING AND RELEASING LICENSES ...................................................................................49 LICENSE EXPIRY NOTIFICATIONS ...........................................................................................50 ACCOUNT MANAGEMENT ..............................................................................................51 INTRODUCTION ...............................................................................................................52 DELEGATING ACCOUNT MANAGEMENT .................................................................................52 POSSIBLE ERRORS WHEN DELEGATING ACCOUNT MANAGEMENT .................................................... 53 MERGING ACCOUNTS .......................................................................................................53 CONSEQUENCES OF MERGING ACCOUNTS .................................................................................. 53 REQUIREMENTS FOR MERGING ACCOUNTS ................................................................................. 54 HOW TO MERGE ACCOUNTS .................................................................................................... 54 EFFECTS OF ACCOUNT MERGING ON SERVICE CONFIGURATION ...................................................... 54 POSSIBLE ERROR MESSAGES WHEN MERGING ACCOUNTS ............................................................. 55 USERS ............................................................................................................................56 INTRODUCTION ...............................................................................................................57 CREATING USERS .............................................................................................................57

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    262 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us