FortiClient Symantec Endpoint Protection

2y ago
30 Views
2 Downloads
1.45 MB
9 Pages
Last View : 16d ago
Last Download : 3m ago
Upload by : Rosa Marty
Transcription

DEPLOYMENT GUIDEFortinet FortiClient andSymantec Endpoint Protection

Table of ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Deployment Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Architecture Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3FortiClient Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4FortiGate Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Enforce Endpoint Telemetry and Compliance . . . . . . . . . . . . . . . . . . 5FortiClient Security Profile Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Check the FortiClient Security Fabric Agent . . . . . . . . . . . . . . . . . . . . . 7Symantec’s Installation and References . . . . . . . . . . . . . . . . . . . . . . . . 9References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

DEPLOYMENT GUIDE Fortinet FortiClient and Symantec Endpoint ProtectionOverviewThis document is a deployment guide that explains the installation and configurationsteps to install the FortiClient Security Fabric agent and Symantec EndpointProtection (SEP) on a corporate endpoint device protected by a FortiGate appliance.Deployment Prerequisites1. FortiGate—on FortiOS v5.6 2. FortiClient v5.6This integration allows customers who have Symantec Endpoint Protection in theirenvironment to leverage the Fortinet Security Fabric with the FortiClient’s capabilityto enforce network compliance with the FortiGate. Compliance rules are defined bythe administration into a FortiGate Security Profile. It contains the requirements theendpoint must satisfy prior to accessing the network. By forcing endpoints to matchthe security profile, the FortiGate and FortiClient help to reduce the attack surfacevector. In addition, the FortiClient Security Fabric agent will feed the FortiGate withtelemetry data, enabling the automatic updates to the Security Fabric and providingcomprehensive visibility of the endpoints.3. Symantec Endpoint ProtectionManager4. Symantec Endpoint ProtectionClient5. OptionalnnFortiClientEMSFor licenses to SymantecEndpoint Protection, pleasecontact Symantec’s respectivesales team.These actions are complemented by Symantec Endpoint Protection, which blocksvirus, malware, and other threats from infecting the endpoints.The joint solution combines Symantec’s enhanced endpoint protection platform withFortinet’s best-in-class network security platform, to deliver unparalleled protectionand security without compromises for your entire deployment.This guide will focus on the required components, the architectural overview, andthe configurations on the FortiClient and Symantec Endpoint Protection. This guidealso assumes an environment of FortiGate with FortiOS v5.6, FortiClient v5.6, andSymantec Endpoint Protection 14 MP2 (14.0.2415.0200) running on either Windows7, 8, or 10 with Symantec Endpoint Protection Manager.NOTE: This guide is pertinent to the integration between the relevant portions of the FortiGate, the FortiClient, and SymantecEndpoint Protection Client only. For integration details on the Symantec Endpoint Protection Manager and further administrationof the FortiGate, please refer to the relevant guides linked in the References section of this guide.Architecture OverviewThis is a simple topology of what an enterprise network may look like with Symantec Endpoint Protection and the FortiClient,where the Symantec Endpoint Protection Manager is located in the data center and the endpoints are located behind anAccess Layer FortiGate ISFW, with the FortiGate NGFW at the core of the network.Data CenterFortiGate ISFWdata centerFortiGate NGFWSymantec EndpointManagerFortiGate ISFWaccess layerFortiClient EMS User EndpointFortiClient SEP Client3

DEPLOYMENT GUIDE Fortinet FortiClient and Symantec Endpoint ProtectionThe FortiClient Security Fabric agent registers on the FortiGate and gets the FortiClient Security Profile in order to perform itscompliance checks. It sends regular keep-alive messages including telemetry information aiming to feed the Security Fabriccomputed by the FortiGate.The Symantec Endpoint Protection Client is connected to the Symantec Endpoint Protection Manager, which administers theclient with profiles and signature updates and receives reports on the client’s malware, viruses, and other threat activity.Note: The order of installation of either the FortiClient or Symantec Endpoint Protection does not matter. The joint solutionworks if either of the solutions is preinstalled on the endpoint.FortiClient InstallationThe latest version of FortiClient for Windows is available for download on http://www.forticlient.com/.1.Download and run the FortiClient Installer.2.In the initial Welcome window, select “Yes, I have read and accept the License Agreement,” then click Next.3.Next, uncheck the “Secure Remote Access” option and click Next.4.In the “Destination Folder” window, click Next.4

DEPLOYMENT GUIDE Fortinet FortiClient and Symantec Endpoint Protection5.In the “Ready to install FortiClient” window, click Install.6.In the “Completed the FortiClient Setup Wizard,” click Finish.FortiGate ConfigurationEnforce Endpoint Telemetry and ComplianceThe FortiGate needs the following functionalities enabled in order to enforce compliance checking and gaining devicesvisibility in order to populate the Security et statusDetectionllFortiClientCompliance Check Enforcement1. Go to Network Interfaces.2. Edit the interface connected to the LAN network.3. In the section Administrative Access, enable FortiTelemetry.5

DEPLOYMENT GUIDE Fortinet FortiClient and Symantec Endpoint Protection4. Enable DHCP Server.nnDefinean Address Range.nnEnableFortiClient On-Net Status.5. In the section Networked Devices, enable Device Detection and Active Scanning.6. In the section Admission Control, enable Enforce FortiClient Compliant Check.7. Click OK.FortiClient Security Profile DefinitionThe FortiClient Security Profile contains the compliance rules the endpoint must satisfy prior to being granted access onthe network.1.Go to Security Profiles FortiClient Profiles.2.Create a new profile with the parameters listed in the table below.3.Click OK.Profile NameCorporateAssign Profile ToWindows PCOn-Net Detection By AddressDisabledEndpoint Vulnerability Scan on ClientVulnerability levelHighNon-compliance actionWarningSystem ComplianceMinimum FortiClient versionEnabledWindows endpoints5.4.1Mac endpoints5.4.1Upload Logs to FortiAnalyzerDisabledNon-compliance actionWarningSecurity Posture CheckRealtime ProtectionDisabledThird party AntiVirus on WindowsEnabledWeb FilterDisabledApplication FirewallDisabledNon-compliance actionWarning6

DEPLOYMENT GUIDE Fortinet FortiClient and Symantec Endpoint ProtectionCheck the FortiClient Security Fabric AgentThe FortiGate is configured to enforce the FortiClient compliance check. As such, it prevents connected devices, which arenot registered, to access the internet.Users who attempt to navigate the internet will be presented with a warning page in their browser.The FortiGate sends FortiTelemetry probes on the LAN network on a regular basis. Once the FortiClient is started, it detectsthese probes and displays a registration pop-up the user has to accept in order to register.Once registered, the FortiGate sends the FortiClient Security profiles that have been defined. The FortiClient performs therequired checks and transmits the result to the FortiGate, which decides whether or not the device is compliant.7

DEPLOYMENT GUIDE Fortinet FortiClient and Symantec Endpoint ProtectionOpen FortiClient Console and go the Compliance tab in order to check your compliance status. A compliant registeredendpoint should display in this window.FortiGate FortiView drill-down pages are useful to view the relevant information in the Security Fabric. For instance, thelogical view gives the detected topology and a mouse over one of the detected devices gives you the elements collected bythe FortiGate.In the following screenshot, the detail for our endpoint is displayed. We can review some information like the username, avatar, IP address, and MAC address, etc. This will also display other important statistics about the client such asvulnerabilities discovered, malware quarantined, etc.From here it is possible to drill down. For instance, you can right-click and access the details of the detected vulnerabilities.8

DEPLOYMENT GUIDE Fortinet FortiClient and Symantec Endpoint ProtectionSymantec’s Installation and ReferencesFor instructions on the installation and configuration of Symantec Endpoint Protection 14 MP2, please refer to Symantec’s guides:System requirements for Endpoint Protection 14 MP1 and MP2Best practices for Symantec Endpoint ProtectionSEPM 14.0 Fresh install with SQL database - graphical overviewSEPM 14.0 Fresh install with Embedded database - graphical overviewSymantec Endpoint Protection 14 Installation and Administration GuideSymantec Endpoint Protection 14 Windows Client GuideReferencesHow to get help:FortiGate/FortiOS Administration idesFortiClient Administration 6.0-admin-guideFuse—FortiClient and Enterprise Management Server (EMS)https://fuse.fortinet.com/p/fo/si/topic 476www.fortinet.comCopyright 2021 Fortinet, Inc. All rights reserved. Fortinet , FortiGate , FortiCare and FortiGuard , and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other productor company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and otherconditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaserthat expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, anysuch warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwiserevise this publication without notice, and the most current version of the publication shall be applicable.June 10, 2021 2:46 AM116395-B-0-EN

3. Symantec Endpoint Protection Manager 4. Symantec Endpoint Protection Client 5. Optional nnFortiClient EMS For licenses to Symantec Endpoint Protection, please contact Symantec’s respective sales team. NOTE: This guide is pertinent to the integration between the relevant portions of the FortiGate, the FortiClient, and Symantec Endpoint .

Related Documents:

clients and is configured with Symantec Endpoint Protection Manager Console. The Symantec Endpoint Protection client is installed on the scan nodes, which are used to protect the file data that resides on SONAS. Symantec Endpoint Protection Manager Console lets users centrally manage Symantec Endpoint Protection clients, known as . scan nodes

Installing Symantec Endpoint Protection Manager on the Amazon EC2 platform Symantec Endpoint Protection Manager is installed by deploying the Symantec Endpoint Protection Manager AMI (Amazon Machine Image) from AWS Marketplace. Symantec Endpoint Protection Manager AMI can be

Endpoint Protection Manager (SEPM) operations from a remote application, such as Symantec Advanced Threat Protection (ATP) and Symantec Web Gateway (SWG). You use the APIs if you do not have access to Symantec Endpoint Protection Manager. If you use the Symantec Endpoint Protection

Keywords: Symantec , antivirus, endpoint protection 1.2 Overview The TOE is Symantec Endpoint Protection Version 11.0, which delivers a comprehensive antivirus/endpoint security solution with a single agent and a single, centralized management console. Symantec Endpoint Protection

ESET Endpoint Protection Standard v6.5.522.0 FireEye Endpoint Security v4 Fortinet FortiClient v5.6.2 G DATA EndPoint Protection Business v14.1.0.67 Kaspersky Lab Kaspersky Endpoint Security v10 Malwarebytes Endpoint Protection v1.1.1.0 McAfee Endpoint Security v10.5 Palo Alto Networks Traps v4.1 Panda Security Panda Adaptive Defense 360 v2.4.1

TOE Identifier Symantec Endpoint Protection (SEP) TOE Software Version Version 14.2 TOE Developer Symantec Corporation Key Words Endpoint Security, Client, Application, Cyber Defense Table 1 TOE/ST Identification 1.2 TOE Overview The Symantec Endpoint Protection client (hereafter referred to as the TOE or SEP) is a multifaceted endpoint threat .

1. Open Symantec Endpoint Protection Manager. The Symantec Endpoint Protection Manager window appears. 2. On the left side of the Symantec Endpoint Protection Manager window, select the Clients icon. 3. In the Tasks list in the lower left area of the window, select Install a client. The Client Deployment Wizard dialog box appears.

brother’s life ended in death by the hands of his brother. We are going to see what the Holy Spirit revealed that caused the one to murder his flesh and blood. We are also going to see God’s expectation and what he needed to operate in as his brother’s keeper. My desire is for us to all walk away with a greater burden for each other as we see each other as ourselves and uphold each other .