1 / 46

VIRUS AND SPY PROTECTION ADMINISTRATION

VIRUS AND SPY PROTECTION ADMINISTRATION. Agenda. Main topics Administration interface Local user interface Administrating scanning remotely Tips Updating databases Handling infections. ADMINISTRATION INTERFACE. Remote Administration.

lboone
Télécharger la présentation

VIRUS AND SPY PROTECTION ADMINISTRATION

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VIRUS AND SPY PROTECTION ADMINISTRATION

  2. Agenda • Main topics • Administration interface • Local user interface • Administrating scanning remotely • Tips • Updating databases • Handling infections

  3. ADMINISTRATION INTERFACE

  4. Remote Administration • The Policy Manager Console offers two different graphical interfaces • Anti-Virus Mode • Optimized for administering F-Secure Anti-Virus Client Security • Advanced Mode • Used for deeper product configurations • Products other than AVCS have to be administered with this mode • Some settings are only available in this mode!

  5. Management tabs • Host configuration and monitoring • Operations management • Policy domain tab • Displays policy domain structure • Message view • Informative messages • e.g. virus definitions update info Anti-Virus Mode

  6. Policy properties pane • Host configuration and monitoring • Operations management • Product view pane • Provides most common settings • Functions differ for selected properties tabs (e.g. policy tab) • Product help • Field focus help, if policy properties tab selected • Message view • Informative messages • e.g. virus definitions update info Advanced Mode

  7. Policy Manager section • Policy distribution status • Virus and spyware definitions status • Autoregistration request • Domain/Host section • Displays most important information • More detailed for hosts (e.g. UID) • Host alert summary • Virus protection section • Real-time protection status • Infections (host or whole domain) • Virus definitions status (host or domain) • Internet Shield section • Active security level (if host selected) • Latest Attack (host or whole domain) Anti-Virus ModeSummary Tab

  8. Security News • Radar Security News from F-Secure • Shows what definitions needes to protect • Shows if hosts are updated • Security News Details • Shows the selected news item in detail • Shows which hosts are connected Anti-Virus ModeOutbreak Tab

  9. Automatic Updates • Enable or disable automatic updates and update methods • Specify the time interval for polling updates from PMS • Real-Time Scanning • Configure what is scanned • Settings for file scanning, spyware and boot sector scanning • Manual Scanning • Configure what is scanned • Settings for file scanning, spyware and boot sector scanning • Scheduled scanning • Spyware Control • Configure real-time and manual spyware handling (redundancy) • Manage allowed and reported spyware from hosts Anti-Virus ModeVirus & Spy Protection Settings

  10. E-mail Scanning • Configure incoming and outgoing email settings • Configure file handling settings • Web Traffic Scanning • Enable web traffic scanning • Configure trusted sites and action on infected files • Alert Sending • Policy Manager settings • Configure where alerts are forwarded • Centralized Management • Policy Manager setting • Configure PMS connection settings Anti-Virus ModeVirus & Spy Protection Settings

  11. LOCAL USER INTERFACE

  12. Select main interfaces • Home • Virus & Spy Protection • Internet Shield • Automatic Updates • Central Management • Settings • Basic settings • Status notifications • Advanced • Open advanced settings Help Local User Interface: Basic

  13. Virus & Spy Protection • Real-Time Scanning • E-mail Scanning • Scheduled Scanning • Manual Scanning • Browser Control • System Control • Automatic updates • Policy Manager Proxy • Connection • HTTP Proxy • Restriction Setting, editing frame Help Local User Interface: Advanced

  14. ADMINISTRATING SCANNING REMOTELY

  15. Adminstering Virus and Spy Protection • Finding the right level of security for a corporation is a challenge • In practice the administration is a balancing act between security and usability, as the tighter the security, the more the users and admin need to actively know about all things security related • F-Secure Anti-Virus Client Security and Policy Manager are tools to implement the decision the administrator makes

  16. Real-Time Scanning • Should all files be scanned for viruses? • Extension list includes most commonly infected file types • Does something need to be specifically excluded ? • How transparent should the operation be to the end-user? • Different actions on detection • Should some users have the ability to change their settings? • Users rarely raise the level of security, so this is in effect giving the user the possibility to lower the level

  17. Manual Scanning • Should manual scans be performed inside archives? • Archives cannot be disinfected! • If the scanning operation is configured transparent, the secondary action will be applied automatically (remove or delete archive) • Scanning archives has a performance impact! • It is very important to run regular manual virus and spyware scans on all hosts! • For example through PMC operations • Scheduled scans include no spyware scanning!

  18. HTTP Traffic Scanning • Should HTTP traffic scanning be used? • Certain folders cannot be scanned by the real-time scanner (e.g. Java cache or IE cache) • HTTP scanning will inspect the data stream and remove viruses on the fly (no spyware detection!) • Enabling this feature is recommended!

  19. Spyware Scanning • Should some “Spyware” be tolerated? • Possibility to exclude specific applications from spyware scanning • Carefully check the spyware category, before excluding it from scanning (e.g. never exclude “Malware” categories) • Excluded spyware rules can be deleted after creation

  20. Email Scanning • Are the setting for incoming and outgoing email scanning the same? • If there is an infection, we don’t want to risk to infect other internal hosts or outsiders

  21. Monitoring Hosts:Status • The Administrator has a number of different ways to follow what is happening on the hosts • The Status leaf on Policy Manager Console shows the latest infection date, infection name, infected object, action taken for each host as well as the number of all time infections

  22. Monitoring Hosts:Alerts • Alerts leaf in Policy Manager Console displays security alerts from selected host(s) and domain(s) • Can also be used to manage alert reports

  23. Monitoring Hosts:Reports • Reports tab displays virus scanning reports from a selected host or sub-domain(s) • Displays the severity, date/time, description, host/user and the related product • More detailed scanning information can be revealed from the report details

  24. Taking Action:Operations • Remotely Scan for Viruses and Spyware • With this operation you can order a selected host sub-domain(s) to be scanned for viruses and spyware • Local scans will be launched once the policy has been fetched! • Remotly trigger virus definitions updates • Update only happens once the policy has been fetched • Uses the configured update channels

  25. TIPS

  26. Tips:Enabling HTTP Traffic Scanning • HTTP traffic scanning is disabled by default • Enabling is easy

  27. Tips:Browser Control and System Control • Browser Control and System Control are also disabled by default • Enabling is only possible from Advanced Mode

  28. Effects on the Host • When Browser control or System control blocks a hijack attempt or HTTP traffic scanner picks up a virus, a flyer is shown to the user • More info available if user clicks link on flyer • Notification flyers can be disabled

  29. Tips:Prevent Users from Changing Settings • If you want to restrict user settings you can either • Lock the specific settings, or • Lock all settings with “Do not allow userd to change any settings…” in Settings/Centralized Management

  30. Tips:Excluding Outlooks's .pst File • If you have real-time scanning set to scan all files, you might want to exclude large files (e.g. Outlook .pst files) • In Settings/Real-Time Scanning mark the “Enable excluded extensions” checkbox and add the extension PST in the “Excluded extensions” text box

  31. Tips:Disabling All AVCS Alert Pop-Ups • It is possible to configure AVCS in such way that the end-user never gets any security alert pop-ups • Clear all the boxes on the “Local User Interface” column in Settings/Alert Sending

  32. Tips:Custom Messages • It is possible to show the end-user a custom message on virus infections (by default disabled) • The message is configured in the Advanced Mode

  33. Tips:Testing Anti-Virus with eicar.com • To test whether F-Secure Anti-Virus Client Security operates correctly, download a special test file that is detected by F-Secure Anti-Virus Client Security as though it were a real virus • http://www.europe.f-secure.com/virus-info/eicar_test_file.shtml

  34. UPDATING DATABASES

  35. Database Updates • Numerous methods to update virus definitions updates • Update changes in Anti-Virus Client Security 6! • FSMA no longer responsible for virus updates • Components in the updating infrastructure • F-Secure Root Update Server • F-Secure Automatic Update Agent • If on PMS, connects to the Root Server on hourly bases and downloads the update differentially • If on host, connects to the PMS regularly – and if that fails, connects direcly to F-Secure Root Update Server • F-Secure Automatic Update Server

  36. Automated Database UpdateCentrally Managed Host Old Databases New Databases Local Host Centrally managed AVCS • Databases are updated on F-Secure Update Server • Automatic Update Agent compares databases on PMS and Root Server, notices change, downloads new databases (using UDP as primary protocol!) • Host AUA compares local databases to those on PMS, notices change, download databases (always using HTTP!) Automatic Update Agent Old Databases New Databases PMS Policy Manager Server Automatic Update Agent Old Databases New Databases F-Secure Root Server

  37. Automated Database UpdateStand-alone Host Old Databases New Databases Host Stand-alone AVCS • F-Secure Automatic Update Agent is a mandatory component on each host (only in AVCS 6.x)! • In stand-alone mode, AUA communicates directly with the F-Secure Root Update Server to download the new virus definitions differentially • Uses UDP as a primary protocol, with automatic fail-over to HTTP Automatic Update Agent Old Databases New Databases F-Secure Root Update Server

  38. Manually Database UpdateStand-alone Host Old Databases New Databases Host Stand-alone AVCS • Click on F-Secure Anti Virus Client Security/Automatic Updates/Check Now Automatic Update Agent Old Databases New Databases F-Secure Root Update Server

  39. Policy Manager Proxy (PMP) • Alternative source of virus definition updates for networks behind slow connections • Resides in the same remote network as the hosts that use it as a database distribution point • Contacts PMS and F-Secure's distribution server when needed • FSAVCS hosts fetch virus definition updates from PMP and policies from PMS • Since the heavy database update traffic is redirected through the PMP in the same local network, the network connection between managed workstations and PMS has a substantially lighter load

  40. HANDLING INFECTIONS

  41. Virus Outbreaks • Monitor the global situation (on a daily basis) • http://www.f-secure.com/weblog/ • http://www.f-secure.com/virus-info/virus-news/ • Update your knowledge on the latest threat, read virus descriptions from F-Secure website • Type of malware • Detection • Behavior • Removal

  42. Standard Disinfection • With Virus & Spy Protection enabled, the host is protected; when files are accessed they are automatically scanned for viruses and spyware • If a virus or spyware is found during the real-time scan it is also removed automatically • If admin has chosen not to remove the infection automatically, then Virus & Spy Protection displays a virus or spyware detection dialog where the user can select what to do

  43. Cleaning Infected Computers • Check the system before scanning • Is product working properly? • Does the computer have the latest virus signature database? • Are both the real-time and manual scanning actions on infected file set to “Ask what to do” • Perform manual system scan • Do a target scan to save time if the customer knows the location of the infected file • Scans both for viruses and spyware

  44. Why Are Some Files Skipped in Scans? • It is normal that certain files are skipped during scannning • Files are locked by the system • Not possible to open them for scanning • Scan time limit exceeded

  45. Removing Viruses and Spyware Manually • Make sure you have the latest virus and spyware definitions updates • Check the F-Secure Computer Virus Info Center for information on the virus • Removal tools, instructions, tips, etc. • http://www.f-secure.com/v-descs/ • If a suspected new virus, send sample to F-Secure Anti-Virus Research

  46. Summary • Main topics • Administration interface • Local user interface • Administrating Scanning remotely • Updating databases • Handling infections

More Related