IBM Endpoint Manager: Client Manager For Endpoint Protection User's Guide

1y ago
9 Views
2 Downloads
4.10 MB
48 Pages
Last View : 30d ago
Last Download : 3m ago
Upload by : Callan Shouse
Transcription

IBM Endpoint ManagerVersion 9.1Client Manager for Endpoint ProtectionUser's Guide

IBM Endpoint ManagerVersion 9.1Client Manager for Endpoint ProtectionUser's Guide

NoteBefore using this information and the product it supports, read the information in “Notices” on page 37.This edition applies to version 9, release 1, modification 0 of IBM Endpoint Manager (product number 5725-C44)and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright IBM Corporation 2003, 2014.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contractwith IBM Corp.

ContentsChapter 1. Overview . . . . . . . . . 1System requirements.Dashboards . . . . 1. 3McAfee On-Demand Scan Wizard .Configuration tasks. . . . . . .Disable and enable system restore . 24. 27. 27Chapter 2. Installation . . . . . . . . . 7Chapter 4. Device control. . . . . . . 29Subscribe to the CMEP siteActivate analyses and tasksUSB storage . 7. 7. 31Appendix A. Support. . . . . . . . . 33Chapter 3. Using CMEP. . . . . . . 11Reports . . . . . . . . . . . . . .Overview . . . . . . . . . . . .Using the computer filter . . . . . . .Creating new computer filters . . . . .Updating existing filters . . . . . . .Exporting to PDF . . . . . . . . .How to update . . . . . . . . . . .Wizards . . . . . . . . . . . . .Create Update Task Wizard . . . . . .Windows Defender and Microsoft ForefrontUpdate Wizards . . . . . . . . . . Copyright IBM Corp. 2003, 2014.111114141515181919. 22Appendix B. Frequently askedquestions . . . . . . . . . . . . . 35Notices . . . . . . . . . . . . . . 37Programming interface information . . . . .Trademarks . . . . . . . . . . . . .Terms and conditions for product documentation. 39. 39. 40iii

ivIBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Chapter 1. OverviewEndpoint Manager Client Manager for Endpoint Protection (CMEP) encompassesAnti-Virus, spyware tools, and device control capabilities.This application enables the management of endpoint security clients from vendorssuch as McAfee, Symantec, IBM, and Trend Micro. More than just a way to putanti-malware defense under a Endpoint Manager umbrella, Client Manager forEndpoint Protection brings unprecedented scalability, speed, and thoroughness tokeep organizations steps ahead of external threats.The CMEP application includes the following features:v Real-time visibility into the current health and status of vendor-acquiredendpoint security clientsv Management and remediation of unhealthy, vendor-acquired endpoint securityclients where possiblev Uninstall tools to enable easy switch-out of incumbent endpoint protection toolsv Web-based reporting to monitor migration progress in real time, with drill-downdetailsv Closed-loop verification of updates, signature definition files, and more—even ifendpoints are disconnected from the networkv Unparalleled scalability and speed—a single management server can support upto 250,000 endpoints with updates made in minutesCMEP is intended to supersede the BigFix Client Manager for Anti-Virus (CMAV)content site. CMEP contains all of the functions of CMAV, including someadditional features:v New and improved dashboard interface to manage each functional areav Support for Windows 7 on Symantec, McAfee, and Trend Micro supportedproductsv Support for Windows 2008 on Symantec, Trend Micro, and Sophosv Support for Mac on McAfee and ofofofdevice control capabilitythe computer filtering featurethe export to PDF featurethe Microsoft Forefront Update WizardSystem requirementsIBM Endpoint Manager Client Manager for Endpoint Protection (CMEP) offerssupport for a variety of operating systems and products.The following table highlights each supported product, version, and operatingenvironment. This table includes the most current system requirements for thisproduct. However, as system requirements are likely to change, check the EndpointManager support website for the most current CMEP system requirements.VendorProduct Copyright IBM Corp. 2003, 2014VersionSupported OS1

eTrust Antivirus 6, 7.x, 8.xx86eTrust (CA Antivirus)ComputerAssociatesIBMCA Antivirus R12 (Auditonly *)eTrust Antivirus 7.x, 8.xx64CA Antivirus forMACx86IBM ProventiaDesktopCA Antivirus R12 (Auditonly *)8.x (Audit only *)Mac OS X 10.2 and laterx868.0, 9.0, 10.0 (Audit only *)Windows 2000 SP3 , Windows XPProfessional SP 1 , Windows VistaEnterprise, Windows 7 SP1x64Not supportedNot supportedx864.03 - 8.xWindows 98, Me, Windows NT 4SP6 , Windows XP, Windows 2000SP4 , Windows Server 2003 SP1 ,Windows Vista, Windows 7x644.03 - 8.xWindows XP, Windows 2000 SP4 ,Windows Server 2003 SP1 , WindowsVista, Windows 78.xMac OS X 10.4.6 and laterx864.5 and laterWin NT/2000x64Not supportedNot supportedx86McAfee Group Shield 7.x /McAfee Security forMicrosoft Exchange 7.6x64McAfee Security forMicrosoft Exchange 7.6/8.0x86All known versionsx64All known versionsx86All known versionsWindows XP, Windows Vista,Windows Server 2003, Windows 7,Windows Server 2008x64Not supportedNot supportedx86All known versionsWindows XP, Windows Server 2003,Windows Vista, Windows Server 2008,Windows Server 2008 R2, Windows 7x64Not supportedNot supportedx64VirusScanVirusScan for MacMcAfeeNetShieldMcAfee GroupShieldfor MicrosoftExchange / McAfeeSecurity for MicrosoftExchangex86x64AVERT StingerWindows DefenderMicrosoftForefront ClientSecurity / ForefrontEndpoint Protection20102Windows NT 4 SP6 , Windows 2000,Windows XP Professional, WindowsServer 2003, Windows Vista, WindowsServer 2008, Windows Server 2008 R2,Windows 7IBM Endpoint Manager: Client Manager for Endpoint Protection User's GuideWindows 2000 SP1 , Windows Server2003, Windows Server 2008, WindowsServer 2008 R2Windows 2000, Windows XPProfessional, Windows Server 2003,Windows Vista, Windows Server 2008,Windows Server 2008 R2, Windows 7

x867.6, 8, 9, 10, 10.1, 10.2Windows 95, Windows 98, WindowsMe, Windows NT 4 SP6,Windows2000, Windows XP Professional,Windows Server 2003x64All known versionsWindows XP 64-Bit Version 2003,Windows Server 2003 64-Bit,Windows Vista, Windows Server 200810.2Mac OS X 10.3.9 and laterx8611, 12.1Windows 2000, Windows 2008,Windows Vista, Windows 2000 SP3 ,Windows Server 2003, WindowsServer 2008, Windows 7x64Not supportedNot supported12Mac OS X 10.5 and laterAnti-Virus CorporateEditionAntiVirus forMacintoshSymantecEndpoint ProtectionEndpoint Protectionfor Macintoshx86x64x86x64Anti-Virus / Endpoint x86ProtectionSophosx64Antivirus for Macx86x64Windows 95 OSR2, Windows 98 SE,Windows NT 4 SP6 , Windows XPSP1 , Windows Vista, WindowsAntivirus 3.x, 4.1.x, 4.6.x, 6.x,7.x, 9.x, 10.xServer 2003, Windows Server 2003 R2,Windows Server 2008, WindowsServer 2008 R2, Windows 7Not supportedNot supported7.x, 8.x (Audit only *)Mac OS X 10.4 and later7, 8, 10, 10.5, 10.6Windows 2000, Windows XP ProSP2 , Windows XP Home SP3 ,Windows Server 2003 SP2 WindowsServer 2003 R2 SP2 , Windows VistaSP1 , Windows Server 2008 SP1 ,Windows 7x86OfficeScanx64Trend MicroServerProtectTrend Micro Securityfor Macx865.5, 5.8x645.8Windows 2000 SP4 , Windows Server2003 SP1 , Windows Server 20081.5Mac OS X 10 and laterx86x64*Audit only means that CMEP detects when virus definitions are more than sevendays old.Note: CMEP also requires Flash Player 9 or later.DashboardsThe Dashboards in CMEP include overview pie chart reports that summarize theanti-malware products within your deployment.You can view an overview of all anti-malware products, or view each pie chartindividually.Chapter 1. Overview3

The CMEP Overview dashboard is located at the top of the CMEP navigation tree,which is found under the Endpoint Protection Domain. The remaining dashboardsare located under the Reports node.The CMEP Overview dashboard contains an Anti-Virus Health Status pie chart, anda graph displaying the vendor products installed in your deployment. Each chartcontains a corresponding summary table below it.4IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

The following image displays individual dashboards by vendor:Chapter 1. Overview5

6IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Chapter 2. InstallationBefore beginning the installation, log in to the Endpoint Manager console andbecome familiar with its basic operation. If you have questions about how to usethe Endpoint Manager console, see the IBM Endpoint Manager Console Operator'sGuide before using this publication.Installation and setup of CMEP involves two basic steps:v Site subscriptionv Activating tasks and analysesSubscribe to the CMEP siteThe CMEP site contains tasks, analyses, wizards and Fixlets for protecting yourdeployment from malware.You must be subscribed to the CMEP site to collect data from the Tivoli EndpointManager clients. This data is used for reporting and analysis.The process for site subscription depends on the version of the Tivoli EndpointManager Console that you have. Click here to get specific site subscriptiondirections from the Knowledge Base.Activate analyses and tasksAfter the applicable tasks and analyses have been gathered from the content server,you must deploy those tasks and activate those analyses to make them visible inthe Tivoli Endpoint Manager console.Start by viewing the All Endpoint Protection node in the navigation tree. ClickAnalyses, and then click By Site and select Client Manager for Endpoint Protection.The corresponding number in parentheses indicates how many analyses areavailable and applicable to the CMEP site. Copyright IBM Corp. 2003, 20147

Click Client Manager for Endpoint Protection to display the list of related Analyses inthe window on the right.This is a composite view:To activate a number of analyses at the same time, highlight the list of analysesand select Activate from the right-click menu. Enter your Private Key Password.After all analyses have been activated, they display with an Activated status in thewindow:8IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

For more detailed information about deploying tasks and activating analyses, seethe Tivoli Endpoint Manager Console Operator’s Guide.Chapter 2. Installation9

10IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Chapter 3. Using CMEPReportsOverviewThe Anti-Virus Overview Report provides a summary of Anti-Virus health andAnti-Malware products in your deployment. The left side of the Overview windowcontains an Anti-Virus Health Status pie chart and Anti-Virus DeploymentInformation statistics. The right side contains an Anti-Malware Vendor Productsbar graph with dates of the latest available Anti-Malware definitions.The top of the report shows the Computer Filter, which sets the criteria of what isshown in the Overview Report. The upper-right corner includes the Refresh,Printer, and the Export PDF buttons.The table below illustrates the color-coding used for the Anti-Virus Health Statuspie chart, as well as a brief description of each category: Copyright IBM Corp. 2003, 201411

Note: For detailed information about how CMEP defines healthy in the HealthStatus pie chart, see the related Knowledge Base article on the Endpoint Managersupport website.The Anti-Malware Vendor Products bar graph is color-coded according to vendor, asshown in the image above.You can select individual vendors to display a customized pie chart and summary.For example, by selecting to view the Symantec Health Status report, thedashboard displays the Symantec health status pie chart, the date of the latestdefinition release, and a list of related analyses with either Activated or NotActivated status.12IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

The Agent Status section displays pie charts representing the health and status ofyour Anti-Virus according to each vendor. Status is measured by the followingcriteria:Healthy – Anti-Virus applications are running correctly on this machine.Need Update – Virus definitions need to be updated on this machine.Not Running – The required Anti-Virus application or service is not running.Chapter 3. Using CMEP13

Using the computer filterUse the computer filter feature to set the criteria of what to include in theOverview report. The Computer Filter section can be found above the Agent Statussection. From this section, you can select, apply, create, and update filters.By default, the computer filter is set to All Computers.Creating new computer filtersTo create a new computer filter, click (edit), next to the Computer Filter pull-downlist. The Create Filter window opens.Enter a name for the filter criteria in the Name field. Select the Visibility checkboxto make the filter criteria available to all operators.14IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

From the first pull-down list in the Include computers with the followingproperty section, select the computer properties that will apply the filter criteriayou are creating.From the next pull-down list, select either contains or does not contain. Enter thestring in the next field. To add more filtering criteria, click the “ ” button. A newrow is added. Follow the same steps to create a new filter criteria.Click Create. The Overview report updates to show the set computer filter settings.Updating existing filtersTo make changes to existing filters, select the filter from the Computer Filter:pull-down list, then click (edit). The Edit Filter window opens. Edit the filtercriteria settings, and click Update.Exporting to PDFYou can export Overview reports to PDF format. At the upper right corner of theOverview reports dashboard, click Export to PDF.Chapter 3. Using CMEP15

The PDF Generation status window opens. When the status shows FinishedGeneration (100%), click Save.The Select location for download by localhost window opens.16IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

In the Save in pull-down list, navigate to the location where the PDF file will besaved. Fill in the File name field and click Save.Chapter 3. Using CMEP17

How to updateIf one of your Anti-Malware vendors displays a yellow “Need Update” status inthe Agent Status pie chart, you must update your virus definitions to ensure thatall applicable computers are adequately protected.Start by clicking directly on the pie chart to open a new window where you canupdate the related Fixlets. Click the applicable computer listed under the ComputerName column on the right side of the window.Next, click the Relevant Fixlet Messages tab on the left to display a list of allapplicable Fixlets associated with this computer. Scan the list to find the relevantupdate Fixlet.18IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Double-click the Fixlet name in the displayed list to open the Fixlet window.Review the description, and click where indicated in the Actions box to start thedeployment process.The Take Action dialog opens, where you can set specific parameters for thisaction. As an alternative, you can also click the Take Action pull-down in the topleft of the panel. For detailed information about the Take Action dialog, see theTivoli Endpoint Manager Console Operator’s Guide.WizardsCMEP Anti-Malware wizards offer an easy, step-by-step guided process forupdating virus definitions and setting up on-demand virus scans on yourendpoints.Create Update Task WizardThe Create Update Task wizard allows you to create anti-virus definition updatesfor a number of McAfee and Symantec applications.Chapter 3. Using CMEP19

Access the wizard by expanding the Manage Definition Updates sub-node in thenavigation tree. Click Create Update Task. This action opens the wizard in the lowerwindow.Selecting any anti-virus product from the list displays more information at thebottom of the panel. You can either retrieve the package from a URL or browse tolocate the package from your computer.The box in the lower left corner allows you to either create a reusable Fixlet or aone-time action. Click Finish.20IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Note: To enter the correct URL, go to the virus definitions page on the McAfee orSymantec website and paste the link into the dialog field. You can also downloadthe virus definition to your computer and browse to its location by selecting thesecond button.You see the following screen as the virus definitions are downloaded to yoursystem:The Create Task window opens. Review the content in the Description, Actions,Relevance, and Properties tabs, click OK, and enter your Private Key Password.Chapter 3. Using CMEP21

In the next task window, click in the Actions box to initiate deployment to openthe Take Action dialog.Windows Defender and Microsoft Forefront Update WizardsTo access the Windows Defender Update Wizard or the Microsoft Forefront UpdateWizard, click the Wizard from the Manage Definition Updates subnode in thenavigation tree. In this example, we are using Microsoft Forefront Update Wizard.The Wizard opens in the Work Panel on the right. In this example, the MicrosoftForefront Update Wizard opens.22IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Click Download to see a progress window while the wizard retrieves spywareupdates.After spyware signatures have been downloaded, you see a window displaying theversion number of the latest update. Click Next to take additional actions.Chapter 3. Using CMEP23

From this window, you can choose to edit or create a Fixlet, or create a one-timeaction.Click Next to proceed through the Wizard.McAfee On-Demand Scan WizardAccess the McAfee On-Demand Scan Wizard from the Manage Scanning node in thenavigation tree.24IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

The Wizard allows you to configure McAfee On-Demand scan on Windowscomputers that have McAfee VirusScan Enterprise 8.0i and the Endpoint Managerclient installed.When you click to open the Wizard, you can either generate a task to change thedefault behavior, or generate a Fixlet to run the scan. Make a selection and clickNext.If you click Generate a Task to change default behavior, you will see the followingscreen. Select a scan location, and then make a drive selection from the pull-downlist. You can select multiple drives by using the Add and Remove buttons.Chapter 3. Using CMEP25

You can also choose to select additional scan options, and then click Next.Use the Next, Back, and Quit navigation buttons at the bottom of each window toproceed through the Wizard. The remaining windows allow you to select scan26IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

inclusions and exclusions, specify advanced scan options, specify virus detectionoptions, specify destination options for unwanted programs, and specify log fileoptions.Configuration tasksUse Anti-Malware configuration tasks to manage aspects of McAfee AVERTStinger, Symantec UPX Parsing Engine, and Windows Defender.Click any title in the list of Anti-Malware tasks to display the related Fixletwindow.Disable and enable system restoreAccess the Disable/Enable System Restore task from the Configuration node of thenavigation tree.Click the task to display the task window in the lower panel. If System Restore iscurrently enabled, using this task allows you to disable it, and vice versa. Reviewthe text in the Description, and then click the applicable link in the Actions box todisable System Restore. You can also select an Action from the Take Action menu atthe top of the panel.Chapter 3. Using CMEP27

You can also click the bottom two links in the Actions box to read about howMicrosoft System Restore affects other anti-virus products.28IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Chapter 4. Device controlDevice Control manages and controls various devices in your deployment,including USB storage devices and CD-ROM drives.To view applicable tasks related to Device Control, click the Device Control sitelocated below the Client Manager for Endpoint Protection site within the EndpointProtection domain.Click Device Control to display a list of tasks, analyses, or Fixlets related to DeviceControl.Click each category to display the related tasks, or use the top right panel in theconsole to deploy these actions from a single list. Any tasks beginning withRemovable Media are related to the Device Control component of CMEP.The tasks listed in the Device Control node allow you to control removable mediadevices by either disabling or restoring future use of the devices. These devicesinclude:v USB Storagev CD-ROMsv Floppy Disk drives Copyright IBM Corp. 2003, 201429

v High Capacity Floppy Disk Drivesv Parallel Port Devicesv PCMCIA DevicesClick each name in the list to display the related Fixlet in the following window:After reviewing the information displayed in the Description box, click in theActions box to deploy the task and enter your Private Key Password.This link displays the Take Action dialog, where you can set specific parameters ofthe task. For more information about using the Take Action dialog, see the IBMEndpoint Manager Console Operator's Guide.30IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Use this same method to work with all existing content in Device Control,including analyses, Fixlets, and tasks.USB storageRemovable media, such as CDs, USB drives, and memory sticks can be considereda security risk, because they can potentially introduce malware or transportsensitive information out of your network. The Device Control configuration taskscontrol future use of USB storage devices by disabling the usbstor.sys driver ontargeted computers.To disable the future use of a USB Storage device, click the applicable taskdisplayed under the Device Control node in the navigation tree.A Fixlet opens in the following window. Click where indicated in the Actions boxto either start this task or to view the related article on the Microsoft website.Chapter 4. Device control31

Note: Affected computers might report back as Pending Restart after the Actionhas run successfully. The setting might not take effect until the computer isrebooted.Use this same method for restoring or disabling CD-ROM drives, Floppy Diskdrives, High Capacity Floppy Disk drives, Parallel Port Devices, or PCMCIADevices.32IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Appendix A. SupportFor more information about this product, see the following resources:v opic/com.ibm.tem.doc 9.1/welcome/welcome.htmlv IBM Endpoint Manager Support sitev IBM Endpoint Manager wikiv Knowledge Basev Forums and Communities Copyright IBM Corp. 2003, 201433

34IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

Appendix B. Frequently asked questionsWhy are my Windows 7 and Windows 2008 machines, which have a supportedAnti-Virus installed, showing up as Other/None in the Health Status overview piechart?If you have BES 7.2.4 (or an earlier version) installed, Windows 7 and Windows2008 are not supported. If you upgrade to BES 7.2.5 or later, those operatingsystems will display as expected in the pie chart.If I already have Client Manager for Anti-Virus, how do I get the new dashboardfor Client Manager for Endpoint Protection?You can get to the new CMEP dashboard in two ways:v In the bottom of the Domain Panel, click the Endpoint Protection domain. Thiswill display the Client Manager for Endpoint Protection site at the top of thenavigation bar.v The Client Manager for Anti-Virus dashboard contains a note with a link to thecurrent CMEP dashboard:Note: If your console is open and displaying the old dashboard, you must closeand then re-open the old dashboard for the “This dashboard has been superseded"message to display.How do I get back to the CMEP navigation tree from within the wizards?The domain panel, which contains the navigation tree for all Endpoint Managerproducts, is always visible on the left side of your window. When Fixlets or tasksdisplay, they open in a window on the lower right part of your screen. Copyright IBM Corp. 2003, 201435

36IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

NoticesThis information was developed for products and services that are offered in theUSA.IBM may not offer the products, services, or features discussed in this document inother countries. Consult your local IBM representative for information on theproducts and services currently available in your area. Any reference to an IBMproduct, program, or service is not intended to state or imply that only that IBMproduct, program, or service may be used. Any functionally equivalent product,program, or service that does not infringe any IBM intellectual property right maybe used instead. However, it is the user's responsibility to evaluate and verify theoperation of any non-IBM product, program, or service.IBM may have patents or pending patent applications covering subject matterdescribed in this document. The furnishing of this document does not grant youany license to these patents. You can send license inquiries, in writing, to:IBM Director of LicensingIBM CorporationNorth Castle Drive, MD-NC119Armonk, NY 10504-1785United States of AmericaFor license inquiries regarding double-byte character set (DBCS) information,contact the IBM Intellectual Property Department in your country or sendinquiries, in writing, to:Intellectual Property LicensingLegal and Intellectual Property LawIBM Japan Ltd.19-21, Nihonbashi-Hakozakicho, Chuo-kuTokyo 103-8510, JapanThe following paragraph does not apply to the United Kingdom or any othercountry where such provisions are inconsistent with local law:INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THISPUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHEREXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESSFOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express orimplied warranties in certain transactions, therefore, this statement may not applyto you.This information could include technical inaccuracies or typographical errors.Changes are periodically made to the information herein; these changes will beincorporated in new editions of the publication. IBM may make improvementsand/or changes in the product(s) and/or the program(s) described in thispublication at any time without notice.Any references in this information to non-IBM websites are provided forconvenience only and do not in any manner serve as an endorsement of those Copyright IBM Corp. 2003, 201437

websites. The materials at those websites are not part of the materials for this IBMproduct and use of those websites is at your own risk.IBM may use or distribute any of the information you supply in any way itbelieves appropriate without incurring any obligation to you.Licensees of this program who wish to have information about it for the purposeof enabling: (i) the exchange of information between independently createdprograms and other programs (including this one) and (ii) the mutual use of theinformation which has been exchanged, should contact:IBM Corporation2Z4A/10111400 Burnet RoadAustin, TX 78758 U.S.A.Such information may be available, subject to appropriate terms and conditions,including in some cases, payment of a fee.The licensed program described in this document and all licensed materialavailable for it are provided by IBM under terms of the IBM Customer Agreement,IBM International Program License Agreement or any equivalent agreementbetween us.Any performance data contained herein was determined in a controlledenvironment. Therefore, the results obtained in other operating environments mayvary significantly. Some measurements may have been made on development-levelsystems and there is no guarantee that these measurements will be the same ongenerally available systems. Furthermore, some measurements may have beenestimated through extrapolation. Actual results may vary. Users of this documentshould verify the applicable data for their specific environment.Information concerning non-IBM products was obtained from the suppliers ofthose products, their published announcements or other publicly available sources.IBM has not tested those products and cannot confirm the accuracy ofperformance, compatibility or any other claims related to non-IBM products.Questions on the capabilities of non-IBM products should be addressed to thesuppliers of those products.All statements regarding IBM's future direction or intent are subject to change orwithdrawal without notice, and represent goals and objectives only.All IBM prices shown are IBM's suggested retail prices, are current and are subjectto change without notice. Dealer prices may vary.This information is for planning purposes only. The information herein is subject tochange before the products described become available.This information contains examples of data and reports used in daily businessoperations. To illustrate them as completely as possible, the examples include thenames of individuals, companies, brands, and products. All of these names arefictitious and any similarity to the names and addresses used by an actual businessenterprise is entirely coincidental.COPYRIGHT LICENSE:38IBM Endpoint Manager: Client Manager for Endpoint Protection User's Guide

This information contains sample application programs in source language, whichillustrate programming techniques on various operating platforms. You may copy,modify, and distri

This application enables the management of endpoint security clients from vendors such as McAfee, Symantec, IBM, and Trend Micro. More than just a way to put anti-malware defense under a Endpoint Manager umbrella, Client Manager for Endpoint Protection brings unprecedented scalability, speed, and thoroughness to

Related Documents:

Modi ed IBM IBM Informix Client SDK 4.10 03/2019 Modi ed IBM KVM for IBM z Systems 1.1 03/2019 Modi ed IBM IBM Tivoli Application Dependency Discovery Manager 7.3 03/2019 New added IBM IBM Workspace Analyzer for Banking 6.0 03/2019 New added IBM IBM StoredIQ Suite 7.6 03/2019 New added IBM IBM Rational Performance Test Server 9.5 03/2019 New .

relays and the IBM Endpoint Manager console to manage the devices in your deployment. Relay Relays are network components that distribute the download burden from the IBM Endpoint Manager server and compile and compress data received from clients. Management Extenders Management Extenders allow devices to be managed without an agent on the device.

ESET Endpoint Protection Standard v6.5.522.0 FireEye Endpoint Security v4 Fortinet FortiClient v5.6.2 G DATA EndPoint Protection Business v14.1.0.67 Kaspersky Lab Kaspersky Endpoint Security v10 Malwarebytes Endpoint Protection v1.1.1.0 McAfee Endpoint Security v10.5 Palo Alto Networks Traps v4.1 Panda Security Panda Adaptive Defense 360 v2.4.1

Moderators - LeeWei, IBM, Chip Mason, IBM Maximizing the Value of IBM Endpoint Manager 2:00-3:00pm 2224 Masa Okumura, Toshiba Smart Service Management for Endpoints 3:30-4:30pm 1841 Adam Cahn, Lily Wang, Martin Latz, Deloitte (BP) License Optimization and Compliance in Today's Virtualized World IBM Endpoint Manager Sessions - Room 318

Vendor Product Version Endpoint Security 10.x Endpoint Security for Mac 10.x VirusScan 8.x VirusScan for Mac 9.x McAfee McAfee Security for Mi crosoft Exchange 8.5 Microsoft Windows Defender All known versions Symantec Endpoint Protection 12.1, 14 Endpoint Protection for Macintosh 12, 14 Sophos Endpoint Security 9.x, 10.x

clients and is configured with Symantec Endpoint Protection Manager Console. The Symantec Endpoint Protection client is installed on the scan nodes, which are used to protect the file data that resides on SONAS. Symantec Endpoint Protection Manager Console lets users centrally manage Symantec Endpoint Protection clients, known as . scan nodes

IBM 360 IBM 370IBM 3033 IBM ES9000 Fujitsu VP2000 IBM 3090S NTT Fujitsu M-780 IBM 3090 CDC Cyber 205 IBM 4381 IBM 3081 Fujitsu M380 IBM RY5 IBM GP IBM RY6 Apache Pulsar Merced IBM RY7

python is an excellent choice as a first programming language without sacri- ficing the power and advanced capabilities that users will eventually need. Although pictures of snakes often appear on python books and websites,