CCES Flashcards
SmartEndpoint Combines what elements into package
Data
Network
Remote Access
Threat
SmartEndpoint Allows access control over
Company data
Attacks
Zero Day threats
Admins can perform what tasks in SmartEndpoint
- Centrally monitor, manage, and enforce user and machine based company policy
- Quickly deploy protections for users
- customize policies
- Monitor end user devices for malicious software
- Control access to corporate data and apps
- Protect sensitive data from virus and threats on the web and in attachements
- perform risk assessment to ensure compliance
- inform and remediate attacks on end user machines
- view and report security events
How does SmartEndpoint communicate with SmartEndpoint management server
SIC
How does the endpoint security management server communicate to clients.
Http/Https
main components of a SmartEndpoint deployment
- SmartEndpoint
- Endpoint management server
- Endpoint clients
Endpoint security database houses
Policy User and computer data Mgmt data Licenses Ad node objects
What is the default communication interval between client and mgmt server
60 seconds
What 2 components make up the endpoint agent
Agent
DA Framework
What are the activities performed by endpoint client
Communication
Deployment
EMON state info
Updating files and Drivers
What does the DA framework do?
Policy activation / updating
Log collection
What functions does the SmartEndpoint management interface
Deployment
Monitoring
Configuration endpoint clients
Manage policies
What are the 3 main components of an Endpoint security environment?
- Endpoint management server
- SmartEndpoint
- Endpoint Clients
How does the security management server work in the environment
Endpoint SMS contains security software and database
The server communicates with the endpoint to manage policies and update protections.
SmartEndpoint Management has 5 tabs, what are they?
Overview Policy User and Computers Reporting Deployment
The deployment tab shows what information
Security Summary
Active Alerts (10 Minute Update)
Security Status
The policy tab shows
Collection of security rules. This includes the default rules (cannot be deleted)
The users and computers tab shows
Hierarchical Tree of organization
Review of the status of the current blade
The reports tabs shows?
Pre-defined reports
The deployment tab shows?
Create deployment rules and manage packages
What does endpoint firewall blade do?
Controls inbound and outbound traffic
What does the URL filtering blade do
Limits and blocks access to websites by
- category
- user
- group
What’s does the Anti-Malware blade do?
Signature base for (scans all files accessed)
Viruses
Spyware
Trojans
What does the data security blades do?
- Capsule docs: Protects, track and restricts access to buisness doc
- FDE Encrypt Storage and provides access protection (pre-boot protection)
- Media & Port Protection: Strong encryption USB, CD/DVD/SD
What does the sandblast agent do?
Zero Day:
Anti-bot
Ransomware
Threat Extraction & Threat Emulation
What are the 3 licenses required for endpoint deployment
- Mgmt
- Container
- Software blade
What features does the management license components
Policy management
Logging & status
User directory
Container license components
FW
Appctl
Compliance (annual or perpetual)
Do you have to license each blade that you want to provide to a client
Yes
What places can you add/remove licenses
- Smart update
- Gai
- Colic
- Cpconfig
How do you recoup licenses from stale machines
Delete the client computers
What are the 5 areas of the users and computers tab
- All organization folder
- Global Action folder
- Favorites
- Blades Status
- Rule and status pane
What populates the directories node
After the initial AD scan
**objects can be part of AD and the virtual groups
Where are objects that are not part of AD places
Others users & computers
How do you manage users
Select from the tree, and then add blades and follow steps
Can anyone log into a computer with endpoint
No only authorized pre-boot users can log into machines
What happens when you reset a client
Removes license
Deletes settings
FDE and Recovery are removed
**must be reformatted before can connect machine back to endpoint
Where can push operations be accomplished from
Reporting
Global Actions
What things can be accomplished through push operations
Anti-malware scans Anti-malware updates Restore Files Sandblast forensics and analysis Restart /shutdown
Where is the initial client exported from in the console
Deployment tab
What does the initial client do?
Provides communication
Deployment
Client state
Policy and client status updates
Types of blade packages:
Master full- all blades
Master full without network protection: FDE & MEPP only
Master SBA: Sandblast with FW, Compliance, App protection
NEWDA: 32 bit initial client without blades (cannot be distributed via deployment rule)
How many packages are created when a new package created
- Desktop
- Laptop
* *done as laptops often have stricter policies
Does client install interfere with normal user operation
No
**FDE is an exception as might require reboot
What tab allows you to modify or upgrade protections
Policy tab
Two methods of mod or upgrade
Deployment Rules or Exported package
how do you get new version into mgmt server
- Download
2. Upload
Does the client and blade package need to be upgraded at the same time.
Yes
How would you allow postpone of client upgrade
Client settings allow postpone upgrade
Deployment rules characteristics
- Automatically download and install preconfigured client packages
- Deploy to individual or all nodes
- Policy needs to be installed for rules to apply
- Must do initial install before blade deployment
User Authentication settings are done in what tab in the console?
Reporting tab
What are the predefined actions in OneCheck
- User predefined windows recommended password complexity
- Pre-boot password updates
- Temp lock failed attempts
- Use default login settings
- Allow remote help
What is pre-boot
User must login before the OS boots
What are the pre-boot authentication options
- Passwords
- Smart cards
- Dynamic tokens
Why use FDE
When machines are shared amongst users
How and what type of encryption FDE
AES, HDD is encrypted, but data is not.
What feature is used for FDE authentication
OneCheck Logon policies manage FDE user logins and password security
When using AD recommended to use which authentication components
User Acquisition
OneCheck Logon
Password Sync (same creeds SSO login)
Is user acquisition enable by default for FDE
Yes
***Requires users log in and out to acquire pre-boot credentials
OneCheck Logon
SSO solution VPN and FDE password Sync
Password Sync
Pre-boot prevents OS from booting until user authenticated
Can passwords be changed at preboot.
Yes, and it automatically sent to all computers the user is authorized to access pre-boot.
Endpoint had monitoring built-in for what?
Connection State:Compliance:other data connected clients
Provide system-wide reporting or granular user and computers
monitoring reports for compliance, activity, software, deployments…etc
Name the 5 tabs in the SmartEndpoint GUI
- Overview
- Policy
- Users & computers
- Reporting
- Deployement
What are blades included in the data protections for endpoint
FDE, MEEP, Capsule docs, VPN
What licenses are required for endpoint security
Mgmt
Blades
Container
Where are endpoint historic logs kept
Smart console
What do OneCheck users settings define
How users authenticate to endpoint security. More specifically, how a user log into his/her computer and what happens with failed attempts
ESM Components
SmartEndpoint ESM blade Endpoint blades Endpoint DB Directory Scanner
Installation methods for ESM
- Standalone- with the network management server
2. Distributed - Helps ensures no hotfix upgrades
Things to watch out for during instalation
1: Network Security management and smart console must be installed
2: Ad structure can be replicated into EMD DB
3: Ad scanner will require AF permission to read only