Panda Endpoint Protection / Plus on Aether Administration Guide

Panda Endpoint Protection / Plus on Aether Administration Guide

Panda Endpoint Protection / Plus Administration Guide Panda Endpoint Protection Panda Endpoint Protection Plus Panda Endpoint Protection / Plus on Aether Administration Guide Version: 8.41.00-00 Author: Panda Security 1 Date: 16/10/2018 Panda Endpoint Protection / Plus Administration Guide Table of contents 1. PREFACE ..................................................................................................................... 11 1.1. INTRODUCTION ............................................................................................................... 12 1.2. WHO IS THIS GUIDE AIMED AT? ....................................................................................... 12 1.3. WHAT IS PANDA ENDPOINT PROTECTION / PLUS ON AETHER? ........................................ 12 1.4. PANDA ENDPOINT PROTECTION / PANDA ENDPOINT PROTECTION PLUS ........................ 12 1.5. ICONS .............................................................................................................................. 12 2. INTRODUCTION ........................................................................................................... 14 2.1. INTRODUCTION ............................................................................................................... 15 2.2. MAIN BENEFITS OF PANDA ENDPOINT PROTECTION / PLUS ON AETHER. ........................ 15 2.3. MAIN BENEFITS OF PANDA ENDPOINT PROTECTION PLUS ON AETHER. ........................... 16 2.4. AETHER PLATFORM: KEY FEATURES ................................................................................. 17 KEY BENEFITS OF AETHER ............................................................................................... 17 AETHER ARCHITECTURE .................................................................................................. 19 AETHER ON USERS' COMPUTERS .................................................................................... 19 2.5. PANDA ENDPOINT PROTECTION / PLUS ARCHITECTURE: KEY COMPONENTS ................... 21 COLLECTIVE INTELLIGENCE SERVERS .............................................................................. 22 MANAGEMENT CONSOLE WEB SERVER .......................................................................... 22 COMPUTERS PROTECTED WITH PANDA ENDPOINT PROTECTION / PLUS ...................... 23 PANDA PATCH MANAGEMENT SERVICE (OPTIONAL) ..................................................... 23 2.6. PANDA ENDPOINT PROTECTION / PLUS ON AETHER: USER PROFILE ................................ 23 2.7. PANDA ENDPOINT PROTECTION / PLUS ON AETHER: SUPPORTED DEVICES AND LANGUAGES ........................................................................................................................... 24 2.8. AVAILABLE RESOURCES AND DOCUMENTATION .............................................................. 25 3. PANDA ENDPOINT PROTECTION / PLUS TECHNOLOGIES ............................................... 26 3.1. INTRODUCTION ............................................................................................................... 27 3.2. TECHNICAL RESOURCES IMPLEMENTED IN PANDA ENDPOINT PROTECTION / PLUS ........ 27 ANTI-EXPLOIT PROTECTION ............................................................................................ 28 PERMANENT ANTIVIRUS PROTECTION AND COLLECTIVE INTELLIGENCE ....................... 28 PROTECTION AGAINST ADVANCED STEALTH TECHNIQUES AND MACRO VIRUSES ........ 29 EMAIL AND WEB PROTECTION........................................................................................ 29 FIREWALL AND INTRUSION DETECTION SYSTEMS (IDS) ................................................. 30 DEVICE CONTROL ............................................................................................................ 30 SPAM, VIRUS AND CONTENT FILTERING FOR EXCHANGE SERVERS ............................... 30 WEB ACCESS CONTROL ................................................................................................... 31 NETWORK STATUS VISIBILITY .......................................................................................... 31 DISINFECTION TECHNIQUES ............................................................................................ 32 VULNERABILITY PATCHING (PANDA PATCH MANAGEMENT) ......................................... 32 3.3. ADAPTATION PHASE ........................................................................................................ 32 4. THE MANAGEMENT CONSOLE ..................................................................................... 35 2 Panda Endpoint Protection / Plus Administration Guide 4.1. INTRODUCTION ............................................................................................................... 36 WEB CONSOLE REQUIREMENTS...................................................................................... 36 IDP FEDERATION ............................................................................................................. 37 4.2. GENERAL CHARACTERISTICS OF THE CONSOLE ................................................................. 37 4.3. GENERAL STRUCTURE OF THE WEB MANAGEMENT CONSOLE ......................................... 37 TOP MENU (1) ................................................................................................................. 38 SIDE MENU (2) ................................................................................................................. 40 WIDGETS (3) .................................................................................................................... 40 TAB MENU ....................................................................................................................... 40 ACTION BAR .................................................................................................................... 41 FILTERING AND SEARCH TOOLS ...................................................................................... 41 SETTINGS ELEMENTS (8).................................................................................................. 42 CONTEXT MENUS ............................................................................................................ 43 LISTS ................................................................................................................................ 43 5. LICENSES ..................................................................................................................... 45 5.1. INTRODUCTION ............................................................................................................... 46 5.2. DEFINITIONS AND KEY CONCEPTS FOR MANAGING LICENSES .......................................... 46 LICENSE CONTRACTS ....................................................................................................... 46 COMPUTER STATUS ........................................................................................................ 46 LICENSE STATUS AND GROUPS ....................................................................................... 47 TYPES OF LICENSES .......................................................................................................... 47 LICENSE MANAGEMENT .................................................................................................. 47 LICENSE RELEASE ............................................................................................................. 48 PROCESSES FOR ASSIGNING AND RELEASING LICENSES ................................................. 48 5.3. CONTRACTED LICENSES .................................................................................................... 49 WIDGET ........................................................................................................................... 50 LICENSE LIST .................................................................................................................... 51 5.4. EXPIRED LICENSES ............................................................................................................ 54 EXPIRY NOTIFICATIONS ................................................................................................... 54 WITHDRAWAL OF EXPIRED LICENSES ............................................................................. 54 5.5. ADDING TRIAL LICENSES TO COMMERCIAL LICENSES ....................................................... 54 5.6. SEARCHING FOR COMPUTERS BASED ON THE STATUS OF THEIR LICENSES ...................... 55 6. INSTALLING THE PANDA ENDPOINT PROTECTION / PLUS SOFTWARE ............................ 56 6.1. INTRODUCTION ............................................................................................................... 57 6.2. PROTECTION DEPLOYMENT OVERVIEW ........................................................................... 57 6.3. INSTALLATION REQUIREMENTS ....................................................................................... 60 REQUIREMENTS FOR EACH SUPPORTED PLATFORM ...................................................... 60 NETWORK REQUIREMENTS ............................................................................................. 61 6.4. MANUALLY DOWNLOADING AND INSTALLING THE PANDA ENDPOINT PROTECTION / PLUS SOFTWARE ..................................................................................................................... 61 DOWNLOADING THE INSTALLATION PACKAGE FROM THE WEB CONSOLE ................... 61 GENERATING A DOWNLOAD URL ..................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    293 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us