contact

Print

Prerequisites:

  •  Materials: 1 PC per person, a server machineLandesk
  •  Software: Operating system Windows Server 2003 or 2008, vmware, framework latest version, IIS version 6 or later

Days of Training: 5 days training
PURPOSE: CENTRALIZE COMPUTER PARK MANAGEMENT

INVENTORY:

  •  Motor inventory based on different standards: SMBIOS, DMI, WMI and APIs "Plug & Play"
  •  Programming inventories or demand.
  •  Put together information on:

♣ The equipment (motherboard, network card, disk, ...)
♣ The system (BIOS, OS, environment variable, ...)
♣ The installed devices (mice, keyboards, screen, ...)
♣ The network (MAC address, IP, Domain / Workgroup, ...)
♣ The software installed

  •  Ability to provide feedback Custom (forms)

 


SOFTWARE DISTRIBUTION

  •  Benefits LANDesk

♣ Multiple distribution method (push, pull, at the request ...)
♣ Managing and Using Intelligent Network:
Peer download,
Targeted Multicast,
Dynamic bandwidth management,
Go on delivery failure
♣ Management of different geographic locations and via mobile download servers Preferred - No specific infrastructure!

  •  Manage interactions with users (silent timing, early warning of distribution, customized message in case of problems, success message, user portal)

REMOTE CONTROL FOR ASSISTANCE:

  •  Various connection modes:

♣ Decision-hand
♣ Discussion
♣ File Exchange
♣ View Only
♣ Drawing (teaching method)
♣ Remote Command Execution

  •  Different security mode
  •  Manage user permissions
  •  Managing Network Connections
  •  Logs

MASS DEPLOYMENT OF OPERATING SYSTEMS AND MIGRATION PATTERNS OF USERS:

  •  Includes a tool for imaging system

♣ ImageW and ImageW.v2

  •  Supports other tools of imaging market system:

♣ Symantec Ghost, Microsoft ImageX, ...

  •  Supports pre-boot environments:

♣ Win PE, PE DOS, Lunix and OSX PE PE

  •  Includes a tool for capturing user profile: system and applications.

MONITORING OF LICENSE APPLICATIONS

  •  Detection of applications on machines
  •  Define customizable application
  •  Monitoring the use of applications in machine
  •  Control software license compliance

MANAGEMENT OF SAFETY PATCH MANAGER IS A UNIT OF:

  •  Analysis of vulnerabilities and update
  •  Vulnerabilities systems: Microsoft Windows - Mac OS - Linux - ...
  •  Vulnerabilities software: Microsoft, Adobe, Mozilla, Java, Flash
  •  Custom definitions custom
  •  Collection and dissemination of patches
  •  Centralized patch
  •  Dissemination programmed, selective, automatic
  •  reporting and alerting.
  •  Generating reports
  •  Archiving
  •  Overview of the state park / accurate view of a machine
  •  Workflow - Workflow

♣ Download / update the definitions of vulnerability
♣ Configuring managed devices for analysis
♣ Reading and Organizing Information
♣ Creating and configuring security policies and analysis tasks
♣ Analysis of the results of scan
♣ Download patches for vulnerabilities found
♣ Deployment and installation of patches on vulnerable positions
♣ Checking the installation state and the history of corrections


BLOCKING APPLICATIONS

  •  Detection

♣ List of predefined application block provided by LANDesk
♣ Personal applications can be added to this list

  •  Refusal to comply

♣ Blocking unwanted applications by the administrator or not corresponding to standards (blacklist)
♣ Allows to raise the level of security
♣ Blocking the signing of the application and not on behalf

ANTI-VIRUS

  •  Detecting rootkits
  •  Right-click in Windows Explorer
  •  Temporarily disable the antivirus
  •  Mini scan memory
  •  Pause possible analysis
  •  Detection and elimination of hazards ("database extension")
  •  Content Engine Kaspersky
  •  Quarantine malicious files (on server)
  •  Updated definition files (deployment definitions "pilot")
  •  driver gradual deployment of updates
  •  Analysis of the Outlook email
  •  Reporting / Alerts / Scoreboard

HIPS (HOST INTRUSION PREVENTION-BASED SOLUTIONS)
Purpose: Checks and automatically restricts the behavior of certain applications so that any malicious code cannot compromise the safety or stability of the system

  •  Multiple levels of protection

♣ Protection against abnormal behavior
♣ Filtering attachments to emails and downloads
♣ Protection of vital files against changes
♣ Protection against changes in the system boot the machine
♣ Certification life applications using the MD5 algorithm from RSA Data Security
♣ Blocking execution of applications from removable drives

  •  Security based on a principle of White List

♣ Contains the list of authorized applications
♣ Allows to refuse any application

  •  Protection against Buffer Overflow
  •  Benefits

♣ Active protection when no patch is available to counter attack
♣ Protection against zero-day attacks
♣ Overall LANDesk Management Console
♣ Integration of security policies HIPS with the strategies of other modules (integrating in the same agent LANDesk)
♣ Reporting module integrated in the same administrative console
♣ Provides control over what applications can be executed on a workstation
♣ Detects and removes rootkits and hidden processes
♣ Detects and warned of problems with services, the startup process and ActiveX controls
♣ Used to prevent accidental starting or stopping processes
♣ Protection of system files and registry