Print

Prerequisites:

Days of Training: 5 days training
PURPOSE: CENTRALIZE COMPUTER PARK MANAGEMENT

INVENTORY:

♣ The equipment (motherboard, network card, disk, ...)
♣ The system (BIOS, OS, environment variable, ...)
♣ The installed devices (mice, keyboards, screen, ...)
♣ The network (MAC address, IP, Domain / Workgroup, ...)
♣ The software installed

 


SOFTWARE DISTRIBUTION

♣ Multiple distribution method (push, pull, at the request ...)
♣ Managing and Using Intelligent Network:
Peer download,
Targeted Multicast,
Dynamic bandwidth management,
Go on delivery failure
♣ Management of different geographic locations and via mobile download servers Preferred - No specific infrastructure!


REMOTE CONTROL FOR ASSISTANCE:

♣ Decision-hand
♣ Discussion
♣ File Exchange
♣ View Only
♣ Drawing (teaching method)
♣ Remote Command Execution


MASS DEPLOYMENT OF OPERATING SYSTEMS AND MIGRATION PATTERNS OF USERS:

♣ ImageW and ImageW.v2

♣ Symantec Ghost, Microsoft ImageX, ...

♣ Win PE, PE DOS, Lunix and OSX PE PE

MONITORING OF LICENSE APPLICATIONS


MANAGEMENT OF SAFETY PATCH MANAGER IS A UNIT OF:

♣ Download / update the definitions of vulnerability
♣ Configuring managed devices for analysis
♣ Reading and Organizing Information
♣ Creating and configuring security policies and analysis tasks
♣ Analysis of the results of scan
♣ Download patches for vulnerabilities found
♣ Deployment and installation of patches on vulnerable positions
♣ Checking the installation state and the history of corrections


BLOCKING APPLICATIONS

♣ List of predefined application block provided by LANDesk
♣ Personal applications can be added to this list

♣ Blocking unwanted applications by the administrator or not corresponding to standards (blacklist)
♣ Allows to raise the level of security
♣ Blocking the signing of the application and not on behalf

ANTI-VIRUS


HIPS (HOST INTRUSION PREVENTION-BASED SOLUTIONS)
Purpose: Checks and automatically restricts the behavior of certain applications so that any malicious code cannot compromise the safety or stability of the system

♣ Protection against abnormal behavior
♣ Filtering attachments to emails and downloads
♣ Protection of vital files against changes
♣ Protection against changes in the system boot the machine
♣ Certification life applications using the MD5 algorithm from RSA Data Security
♣ Blocking execution of applications from removable drives

♣ Contains the list of authorized applications
♣ Allows to refuse any application

♣ Active protection when no patch is available to counter attack
♣ Protection against zero-day attacks
♣ Overall LANDesk Management Console
♣ Integration of security policies HIPS with the strategies of other modules (integrating in the same agent LANDesk)
♣ Reporting module integrated in the same administrative console
♣ Provides control over what applications can be executed on a workstation
♣ Detects and removes rootkits and hidden processes
♣ Detects and warned of problems with services, the startup process and ActiveX controls
♣ Used to prevent accidental starting or stopping processes
♣ Protection of system files and registry