Trend Micro, The Trend Micro T-ball Logo, Deep Security .

3y ago
41 Views
4 Downloads
3.51 MB
88 Pages
Last View : 6d ago
Last Download : 3m ago
Upload by : Bennett Almond
Transcription

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Beforeinstalling and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation,which are available from the Trend Micro Web site at:http://www.trendmicro.com/downloadTrend Micro, the Trend Micro t-ball logo, Deep Security, Control Server Plug-in, Damage Cleanup Services, eServer Plug-in, InterScan,Network VirusWall, ScanMail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. Allother product or company names may be trademarks or registered trademarks of their owners.Document version: 1.4Document number: APEM97209 150921Release date: November 2015Document last updated: January 19, 2017

Table of ContentsIntroduction . 4About This Document . 5About Deep Security . 6What's New . 9System Requirements . 12Preparation . 15What You Will Need (Basic Components) . 16Database Considerations . 19Installation . 21Installing the Deep Security Manager . 22Manually Installing the Deep Security Agent . 29Installing and Configuring a Relay-enabled Agent. 40Upgrading . 41Upgrading an Agent-based Installation from 9.0 SP1 to 9.6 SP1. 42Upgrading an Agent-based Installation from 9.5 SP1 or 9.6 to 9.6 SP1 . 45Appendices . 47Deep Security Manager Memory Usage . 48Silent Install of Deep Security Manager . 49Deep Security Manager Settings Properties File . 51Deep Security Manager Performance Features . 57Creating an SSL Authentication Certificate . 58Protecting a Mobile Laptop . 61Enable Multi-Tenancy . 70Multi-Tenancy (Advanced) . 78Installing a Database for Deep Security (Multi-Tenancy Requirements) . 80Uninstalling Deep Security . 84

Introduction

Deep Security 9.6 SP1 Installation Guide (Basic Components)About This DocumentAbout This DocumentDeep Security Installation Guide (Basic)This document describes the installation and configuration of the basic Deep Security software components necessary to provide basic agentbased protection to your computers:1.The Deep Security Manager2.The Deep Security Agent (with optional Relay functionality)This document covers:1.System Requirements2.Preparation3.Database configuration guidelines4.Installing the Deep Security Manager management console5.Installing Deep Security Agents6.Implementing Deep Security protection using Security Policies and Recommendation Scans7.Guidelines for monitoring and maintaining your Deep Security installationIntended AudienceThis document is intended for anyone who wants to implement Agent-based Deep Security protection. The information is intended forexperienced system administrators who have good experience with software deployments and scripting languages.Other Deep Security DocumentationYou can find other Deep Security documentation, including Installation Guides for other platforms and administrator documentation -security.aspx. In addition, Deep Security Manager includes a help system that is availablefrom within the Deep Security Manager console.5

Deep Security 9.6 SP1 Installation Guide (Basic Components)About Deep SecurityAbout Deep SecurityDeep Security provides advanced server security for physical, virtual, and cloud servers. It protects enterprise applications and data frombreaches and business disruptions without requiring emergency patching. This comprehensive, centrally managed platform helps you simplifysecurity operations while enabling regulatory compliance and accelerating the ROI of virtualization and cloud projects. The following tightlyintegrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, aswell as virtual desktops.Protection ModulesAnti-MalwareIntegrates with VMware environments for agentless protection, or provides an agent to defend physical servers and virtual desktops.Integrates new VMware vShield Endpoint APIs to provide agentless anti-malware protection for VMware virtual machines with zero in-guestfootprint. Helps avoid security brown-outs commonly seen in full system scans and pattern updates. Also provides agent-based anti-malwareto protect physical servers, Hyper-V and Xen-based virtual servers, public cloud servers as well as virtual desktops. Coordinates protectionwith both agentless and agent-based form factors to provide adaptive security to defend virtual servers as they move between the data centerand public cloud.Web ReputationTrend Micro Web Reputation Service blocks access to malicious web sites.Trend Micro assigns a reputation score based on factors such as a website's age, historical location changes and indications of suspiciousactivities discovered through malware behavior analysis.The Web Reputation Service: Blocks users from accessing compromised or infected sites Blocks users from communicating with Communication & Control servers (C&C) used by criminals Blocks access to malicious domains registered by criminals for perpetrating cybercrimeFirewallDecreases the attack surface of your physical and virtual servers.Centralizes management of server firewall policy using a bi-directional stateful firewall. Supports virtual machine zoning and prevents Denialof Service attacks. Provides broad coverage for all IP-based protocols and frame types as well as fine-grained filtering for ports and IP and MACaddresses.Intrusion PreventionShields known vulnerabilities from unlimited exploits until they can be patched.Helps achieve timely protection against known and zero-day attacks. Uses vulnerability rules to shield a known vulnerability -- for examplethose disclosed monthly by Microsoft -- from an unlimited number of exploits. Offers out-of-the-box vulnerability protection for over 100applications, including database, web, email and FTP servers. Automatically delivers rules that shield newly discovered vulnerabilities withinhours, and can be pushed out to thousands of servers in minutes, without a system reboot.Defends against web application vulnerabilities6

Deep Security 9.6 SP1 Installation Guide (Basic Components)About Deep SecurityEnables compliance with PCI Requirement 6.6 for the protection of web applications and the data that they process. Defends against SQLinjections attacks, cross-site scripting attacks, and other web application vulnerabilities. Shields vulnerabilities until code fixes can becompleted.Identifies malicious software accessing the networkIncreases visibility into, or control over, applications accessing the network. Identifies malicious software accessing the network and reducesthe vulnerability exposure of your servers.Integrity MonitoringDetects and reports malicious and unexpected changes to files and systems registry in real time.Provides administrators with the ability to track both authorized and unauthorized changes made to the instance. The ability to detectunauthorized changes is a critical component in your cloud security strategy as it provides the visibility into changes that could indicate thecompromise of an instance.Log InspectionProvides visibility into important security events buried in log files.Optimizes the identification of important security events buried in multiple log entries across the data center. Forwards suspicious events to aSIEM system or centralized logging server for correlation, reporting and archiving. Leverages and enhances open-source software available atOSSEC.Deep Security ComponentsDeep Security consists of the following set of components that work together to provide protection: Deep Security Manager, the centralized Web-based management console which administrators use to configure security policyand deploy protection to the enforcement components: the Deep Security Virtual Appliance and the Deep Security Agent. Deep Security Virtual Appliance is a security virtual machine built for VMware vSphere environments that Agentlessly providesAnti-Malware and Integrity Monitoring protection modules for virtual machines in a vShield environment. In an NSX environment,the Anti-Malware, Integrity Monitoring, Firewall, Intrusion Prevention, and Web Reputation modules are available Agentlessly. Deep Security Agent is a security agent deployed directly on a computer which provides Anti-Malware, Web Reputation Service,Firewall, Intrusion Prevention, Integrity Monitoring, and Log Inspection protection to computers on which it is installed. The Deep Security Agent contains a Relay Module. A Relay-enabled Agent distributes Software and Security Updatesthroughout your network of Deep Security components. Deep Security Notifier is a Windows System Tray application that communicates information on the local computer about securitystatus and events, and, in the case of Relay-enabled Agents, also provides information about the Security Updates being distributedfrom the local machine.Deep Security ManagerDeep Security Manager ("the Manager") is a powerful, centralized web-based management system that allows security administrators to createand manage comprehensive security policies and track threats and preventive actions taken in response to them. Deep Security Managerintegrates with different aspects of the datacenter including VMware vCenter and Microsoft Active Directory. To assist in deployment andintegration into customer and partner environments, Deep Security has a Web Service API that is exposed to allow for an easy, language-neutralmethod to externally access data and programming configurations.7

Deep Security 9.6 SP1 Installation Guide (Basic Components)About Deep SecurityPoliciesPolicies are templates that specify the settings and security rules to be configured and enforced automatically for one or more computers.These compact, manageable rule sets make it simple to provide comprehensive security without the need to manage thousands of rules. DefaultPolicies provide the necessary rules for a wide range of common computer configurations.DashboardThe customizable, web-based UI makes it easy to quickly navigate and drill down to specific information. It provides: Extensive system, event and computer reporting Graphs of key metrics with trends Detailed event logs Ability to save multiple personalized dashboard layoutsBuilt-in SecurityRole-based access allows multiple administrators (Users), each with different sets of access and editing rights, to edit and monitor differentaspects of the system and receive information appropriate to them. Digital signatures are used to authenticate system components and verifythe integrity of rules. Session encryption protects the confidentiality of information exchanged between components.Deep Security Virtual ApplianceThe Deep Security Virtual Appliance runs as a VMware virtual machine and protects the other virtual machines on the same ESXi Server, eachwith its own individual security policy.Deep Security AgentThe Deep Security Agent ("the Agent") is a high performance, small footprint, software component installed on a computer to provideprotection.The Deep Security Agent contains a Relay module (off by default). At least one Relay-enabled Agent is required in any Deep Securityinstallation to distribute Security and Software Updates throughout your Deep Security network. You can enable multiple Relay-enabled Agentsand organize them into hierarchical groups to more efficiently distribute Updates throughout your network.Deep Security NotifierThe Deep Security Notifier is a Windows System Tray application that communicates the state of the Deep Security Agent and Relay-enabledAgent to client machines. The Notifier displays pop-up user notifications when the Deep Security Agent begins a scan, or blocks malware oraccess to malicious web pages. The Notifier also provides a console utility that allows the user to view events and configure whether pop-upsare displayed.8

Deep Security 9.6 SP1 Installation Guide (Basic Components)What's NewWhat's NewDeep Security 9.6 SP1Increased NSX Policy Integration To allow for NSX certification, Deep Security Manager can now be configured to synchronize its policies with NSX. This creates amatching NSX Service Profile (which we call a "Mapped Service Profile" in Deep Security) for each of the Deep Security policies. TheMapped Service Profiles are available as a choice when creating NSX Security Policies. vRealize Blueprints can be configured with either an NSX Security Group or an NSX Security Policy that uses a Mapped ServiceProfile. This will result in VMs being activated and assigned particular Deep Security policies.Multi-factor Authentication with Google AuthenticatorYou can now enable multi-factor authentication when logging in to Deep Security Manager.Windows 10 SupportThe Deep Security Agent can protect computers that are running Microsoft Windows 10.Note:Agentless support requires an update from VMware and is currently unavailable.Real-Time Anti-Malware Support for Amazon LinuxReal-time Anti-Malware support is now available on Amazon Linux.Terms and ConditionsDeep Security Manager can be configured to require users to accept Terms and Conditions before logging in to the Deep Security Manager.Report ClassificationsThe Reports feature has a new option that allows you to classify and mark reports using: Top Secret Secret Confidential For Official Use Only Law Enforcement Sensitive (LES) Limited Distribution Unclassified Internal Use Only9

Deep Security 9.6 SP1 Installation Guide (Basic Components)What's NewSecurity Module Usage Cumulative ReportA new “Security Module Usage Cumulative” report extends the current Security Module Usage report. The new report provides a cumulativetotal and the total in blocks of 100, of the protection modules that were active over the course of a specified timeframe.Deep Security 9.6VMware vSphere 6 Support Deep Security 9.6 now supports vSphere 6. NSX 6.1.4 Support and Integration: Agentless Anti-Malware, Integrity Monitoring, Firewall, Intrusion Prevention, and Web Reputation are available withNSX. vCNS 5.5.4 Support: Agentless Anti-Malware and Integrity Monitoring are available for vCNS. Combined Mode with Agentless Anti-Malware and Integrity Monitoring and Agent-based support for Firewall, IntrusionPrevention, Web Reputation, and Log Inspection.SAP Protection For LinuxDeep Security has integrated the SAP adapter into the Deep Security Agent. The SAP adapter works seamlessly with the SAP VSI interface (alsoreferred to as NW-VSI-2.0). The VSI interface is available in applications and platforms such as NetWeaver, HANA and Fiori.The SAP adapter has been fully incorporated in to Deep Security 9.6 as part of the Red Hat Enterprise Linux and SUSE Enterprise Linux buildsand can now be licensed directly through Deep Security Manager.IBM QRadar SupportDeep Security can now output syslog messages in Log Event Extended Format (LEEF 2.0) for integration with IBM QRadar.Real-Time Anti-Malware for CloudLinuxReal-time Anti-Malware is available on CloudLinux 7.Additional Platform SupportDeep Security 9.6 adds support for the following platforms:10 Debian 6 and 7 Windows 2012 Server Core CloudLinux 7 Oracle Linux 7 SUSE Enterprise Linux 12

Deep Security 9.6 SP1 Installation Guide (Basic Components)What's NewDeep Security Database Support for Oracle 12cDeep Security Manager now supports Oracle 12c for its back-end database.Active Directory Synchronization on LoginNew users created in Active Directory can now log in to Deep Security Manager before the Active Directory Sync task has been run.Deep Security Relay Downloads from Trend Micro Download CenterIn situations where the Deep Security Relay cannot directly access the Deep Security Manager, the Relay can now download updates from TrendMicro Download Center.Minor Report EnhancementsThe Security Module usage report now has columns for the Computer Group and the Instance Type (for AWS workloads).Automatic Updates of Online HelpThe Deep Security online help can now be updated seamlessly in Deep Security Manager through a new Online Help package.11

Deep Security 9.6 SP1 Installation Guide (Basic Components)System RequirementsSystem RequirementsDeep Security Manager Minimum Memory: 8GB, which includes: 4GB heap memory 1.5GB JVM overhead 2GB operating system overhead Minimum Disk Space: 1.5GB

Deep Security Manager now supports Oracle 12c for its back-end database. Active Directory Synchronization on Login New users created in Active Directory can now log in to Deep Security Manager before the Active Directory Sync task has been run. Deep Security Relay Downloads from Trend Micro Download Center

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. Crawford M., Marsh D. The driving force : food in human evolution and the future.

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. 3 Crawford M., Marsh D. The driving force : food in human evolution and the future.