Xem mẫu

Endpoint Security Server (Secure Access) R73 Administration Guide 13 July 2011 © 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks. Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses. Important Information Latest Software We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks. Latest Documentation The latest version of this document is at: http://supportcontent.checkpoint.com/documentation_download?ID=10635 For additional technical information, visit the Check Point Support Center (http://supportcenter.checkpoint.com). Revision History Date 13 July 2011 23 February 2010 Description Improved formatting and document layout First release of this document Feedback Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments (mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Endpoint Security Server (Secure Access) R73 Administration Guide). Contents Important Information.............................................................................................3 Introduction...........................................................................................................10 Policies...............................................................................................................10 Policy Components and Settings........................................................................10 Using Endpoint Security Administrator Console..................................................11 Modes and Views ..........................................................................................11 Switching Views.............................................................................................11 Integration With Other Check Point Products......................................................11 System Architecture ...........................................................................................12 Endpoint Security Server...............................................................................13 Administrator Console....................................................................................13 Endpoint Security Clients...............................................................................13 Getting Started......................................................................................................15 Choosing Your Enterprise Policy Types..............................................................15 Choosing Your Security Model ...........................................................................15 Gathering Topology Information .........................................................................16 Planning User Support .......................................................................................16 Distributing First Client .......................................................................................16 Configuring and Deploying the Default Policy.....................................................17 Policy Stages.................................................................................................17 Default Policy.................................................................................................17 Creating a Basic Policy..................................................................................17 Deploying the Policy ......................................................................................20 Testing Policy and Zones...............................................................................20 Creating a More Advanced Policy..................................................................20 Testing Program and Enforcement Rules ......................................................24 Assigning Policies ..............................................................................................24 Creating Catalogs..........................................................................................24 Assigning a Custom Policy ............................................................................25 Managing Domains...............................................................................................26 Multi-Domain Administrators...............................................................................26 System Domain and Non-System Domains........................................................26 Checking Your Domain.......................................................................................27 Switching Domains.............................................................................................28 Creating Domains...............................................................................................28 Deleting Domains...............................................................................................28 Managing Administrators.....................................................................................29 Administrator Roles............................................................................................29 Default Roles and Customized Roles.............................................................31 Privileges.......................................................................................................31 Planning Administrator Configuration .................................................................31 Creating Roles....................................................................................................31 Creating Administrator Accounts ........................................................................33 Editing Administrator Accounts...........................................................................34 Deleting Administrator Accounts.........................................................................34 SmartCenter Administrators ...............................................................................34 Managing Catalogs...............................................................................................35 Supported Catalog Types...................................................................................35 User Catalogs.....................................................................................................35 Custom Catalogs...........................................................................................35 LDAP Catalogs..............................................................................................36 NT Domain Catalogs......................................................................................39 RADIUS Catalogs..........................................................................................41 Authenticating Users......................................................................................43 Synchronizing User Catalogs.........................................................................43 IP Catalogs.........................................................................................................44 Groups...............................................................................................................44 Managing Security Policies..................................................................................46 Understanding Policies.......................................................................................46 Connected Policies........................................................................................47 Disconnected Policies....................................................................................47 Personal Policies...........................................................................................47 Policy Arbitration............................................................................................48 Policy Packages ............................................................................................48 Security Policy Component Overview............................................................48 Policy Objects................................................................................................50 Rule Evaluation and Precedence...................................................................50 Policy Lifecycles ............................................................................................51 Using a Default Policy ........................................................................................55 Creating Policies Using a Policy Template .........................................................55 Creating a Policy Using a File.............................................................................56 Creating Access Zones as Policy Objects ..........................................................57 Locations.......................................................................................................57 Trusted Zone.................................................................................................57 Blocked Zone.................................................................................................58 Internet Zone.................................................................................................58 Security Rules................................................................................................58 Setting Security Levels ..................................................................................58 Configuring New Network Detection Options.................................................59 Defining Zones...............................................................................................59 Configuring Advanced Packet Handling Settings...........................................60 Creating Firewall Rules as Policy Objects ..........................................................61 Firewall Rule Rank in Security Policies..........................................................61 Example of Rank ...........................................................................................62 Creating Firewall Rules..................................................................................62 Adding Firewall Rules to Policies...................................................................64 Ranking Firewall Rules..................................................................................64 Enabling and Disabling Firewall Rules...........................................................64 Editing Firewall Rules ....................................................................................65 Removing Firewall Rules from a Policy..........................................................65 Deleting a Firewall Rule.................................................................................65 Creating Enforcement Rules as Policy Objects...................................................65 Enforcement Rule Types ...............................................................................65 Enforcement Rules Process...........................................................................66 What a Restricted User Experiences .............................................................67 Planning Enforcement Rules..........................................................................67 Providing Remediation Resources for Users..................................................67 Using Rules that Observe or Warn.................................................................69 Enabling Enforcement Rule Alerts and Logging.............................................70 Creating Enforcement Rules for Programs, Files and Keys............................70 Anti-virus Rules..............................................................................................72 Creating Client Enforcement Rules................................................................76 Editing Enforcement Rules ............................................................................77 Deleting Enforcement Rules ..........................................................................78 Grouping Enforcement Rules.........................................................................78 Adding Enforcement Rules to Policies...........................................................78 Configuring Compliance Check Settings........................................................79 Adding Restriction Firewall Rules to Your Policy............................................79 Configuring the Heartbeat Interval .................................................................79 Tracking Enforcement Rule Compliance........................................................80 Creating Program Rules.....................................................................................81 ... - tailieumienphi.vn
nguon tai.lieu . vn