© 2012 Microsoft Corporation. All rights reserved. Microsoft Confidential System Center 2012 Configuration Manager Concepts & Administration Lesson 8: System Center Endpoint Protection (SCEP) Your Name Premier Field Engineer Microsoft Conditions and Terms of Use Microsoft Confidential This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software is provided to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content and/or software included in such packages is strictly prohibited. The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and noninfringement. Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft must respond to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Copyright and Trademarks © 2012 Microsoft Corporation. All rights reserved. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. For more information, see Use of Microsoft Copyrighted Content at http://www.microsoft.com/about/legal/permissions/ Microsoft®, Internet Explorer®, and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other Microsoft products mentioned herein may be either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. System Center 2012 Configuration Manager System Center Endpoint Protection (SCEP) in Configuration Manager 3 Microsoft Confidential Objectives In this module you will learn about : Endpoint Protection in System Center 2012 Configuration Manager Capabilities of Endpoint Protection Features of Endpoint Protection client 4 Microsoft Confidential Endpoint Protection Endpoint Protection in System Center 2012 Configuration Manager Now fully integrated with Configuration Manager Configured as a Configuration Manager Role Capabilities of Endpoint Protection Configure antimalware policies and Windows Firewall settings Use Software Updates to download the latest antimalware definition files to keep clients up-to-date Stay updated on client status via email notifications, in-console monitoring, and reports Endpoint Protection client Installs in addition to Configuration Manager client Malware/Spyware/rootkit detection and remediation Critical vulnerability assessment and automatic definition and engine updates Network vulnerability detection via Network Inspection System Integration with Microsoft Active Protection Services 5 Microsoft Confidential Managing Malware Create antimalware policies containing Endpoint Protection settings Deploy antimalware policies to client computers Managing Windows Firewall with Endpoint Protection 6 Microsoft Confidential Changes from Forefront Endpoint Protection 2010 No longer an add-on Install the Endpoint Protection client by using Configuration Manager client settings, or you can manage existing Endpoint Protection clients Role-Based Administration Endpoint Protection reports integrated with Configuration Manager reporting Update definitions and the definition engine using automatic deployment rules Classification: Definition updates Product: Forefront protection category Configure multiple malware alert types for malware notification Endpoint Protection dashboard is integrated with the Configuration Manager console 7 Microsoft Confidential Prerequisites for Endpoint Protection Deployment Dependencies Windows Server Update Services (WSUS) The following update methods require client computers to have Internet access: Updates distributed from Microsoft Update Updates distributed from Microsoft Malware Protection Center Clients download definition updates by using the built-in System account You must configure a proxy server for this account to enable these clients to connect to the Internet You can use Windows Group Policy to configure a proxy server on multiple computers 8 Microsoft Confidential Prerequisites for Endpoint Protection Deployment Dependencies Endpoint Protection point can only be enabled on the Central Administration Site (or a Standalone Primary) If using software updates to deliver definition and engine updates, you will need a Software Update Point 9 Microsoft Confidential Configure Endpoint Protection Steps to configure Endpoint Protection Create an Endpoint Protection point site system role Configure alerts for Endpoint Protection Optional: configure Software Updates to deliver definition updates to client computers Configure the default antimalware policy and create custom antimalware policies Configure custom client settings for Endpoint Protection 10 Microsoft Confidential DEMO: Enable and configure an Endpoint Protection Point Scenario You are the Administrator of the Contoso Configuration Manager hierarchy and you wish to enable and configure an Endpoint Protection Point Goals Ensure prerequisites are met Enable and configure the Endpoint Protection Point 11 Microsoft Confidential Creating and deploying antimalware policies Deploy antimalware policies to collections of Configuration Manager clients to determine how Endpoint Protection protects them from malware and threats Policies include information about the scan schedule, the types of files and folders to scan, and the actions to take when malware is detected Upon enabling Endpoint Protection: A default antimalware policy is applied to client computers You can use additional policy templates that are supplied or Create custom antimalware policies to customize the settings for your environment 12 Microsoft Confidential Modifying the default antimalware policy 13 Microsoft Confidential Creating a new antimalware policy 14 Microsoft Confidential Importing an antimalware policy 15 Microsoft Confidential Deploying an antimalware policy 16 Microsoft Confidential Create and deploy Windows Firewall policies Firewall policies for Endpoint Protection allow you to perform basic Windows Firewall configuration and maintenance tasks on client computers in your hierarchy You can use Windows Firewall policies to perform the following tasks: Control whether Windows Firewall is turned on or off Control whether incoming connections are allowed to client computers Control whether users are notified when Windows Firewall blocks a new program Group Policy settings will override any Configuration Manager settings for the Firewall 17 Microsoft Confidential Creating a Windows Firewall policy 18 Microsoft Confidential DEMO: Configuring and Deploying Antimalware and Windows Firewall Settings Scenario You are the Administrator of the Contoso Configuration Manager hierarchy and you wish to deploy antimalware and Windows Firewall settings in your client environment Goals Create new antimalware policy Import antimalware policy Configure policies for deployment Create new Windows Firewall policies Deploy specific policies to clients 19 Microsoft Confidential Monitor Endpoint Protection in Configuration Manager 20 Microsoft Confidential What’s new SP1 ? Endpoint Protection client setting can be enabled to commit the changes on Windows Embedded devices that are write filter enabled Definition updates deployed by software updates can be configured to write to the overlay on Windows Embedded devices, without a restart immediately Endpoint Protection client can be installed only during configured maintenance windows. Maintenance window must be at least 30 minutes long to allow installation to occur. Endpoint Protection now uses client notification to start the following actions ASAP, instead of during the normal client policy polling interval Force antimalware definition updates Run quick scans Run full scans Allow threats Exclude folders and files Restore quarantined files With SP1, CM can handle Evaluation Schedule settings within Automatic Deployment Rule up to 3 times a day without impacting server performance to align with the Microsoft System Center Endpoint Protection definition updates publishing frequency. 21 Microsoft Confidential What’s new SP1 ? ….continued Improvements to software updates to allow more frequent distribution of Endpoint Protection definition updates Multiple antimalware deployed to a client computer are merged on the client When settings conflict, the setting with highest priority option is used. some settings are merged, such as exclusion lists from separate antimalware policies. Client-side merge also honors the priority that are configured for each antimalware policy. A software update deployment template named Definition Updates is included in the Deploy Software Updates Wizard and Automatic Deployment Rule Wizard. 22 Microsoft Confidential Lesson Review What would happen when there is a conflict between Group Policy settings and Configuration Manager EP Firewall policy settings? Are there anything added in SP1 with respect to Deployment Template? If yes then what is the name of that Deployment Template? Where can you install Endpoint Protection Point? 23 Microsoft Confidential Module Summary In this module you learned about : Endpoint Protection in System Center 2012 Configuration Manager Capabilities of Endpoint Protection Features of Endpoint Protection client 24 Microsoft Confidential APPENDIX 25 Microsoft Confidential List of Antimalware Policy Settings: Scheduled Scans Setting name Description You can specify one of two scan types to run on client computers: Quick scan: This type of scan checks in-memory processes and folders where malware is typically found. It requires fewer resources than a full scan. Scan type Full Scan: This type of scan adds a full check of all local files and folders to the items scanned in the quick scan. This scan takes longer than a quick scan and uses more CPU processing and memory resources on client computers. In most cases, use Quick scan to minimize the use of system resources on client computers. If malware removal requires a full scan, Endpoint Protection generates an alert that is displayed in the Configuration Manager console. The default value is Quick scan. Select True if you want to help avoid flooding the network if all computers send their antimalware scans results to the Configuration Manager database at the same time. Randomize the scheduled scan start times This setting is also useful when you run multiple virtual machines on a single host. (within 30 minutes) Select this option to reduce the number of simultaneous disk accesses for antimalware scanning. 26 Microsoft Confidential List of Antimalware Policy Settings: Scan Settings Setting name Scan network drives when running a full scan 27 Description Set to True if you want to scan any mapped network drives on client computers. Microsoft Confidential List of Antimalware policy settings: Default Actions The following actions can be selected to be taken when malware is detected on client computers: Recommended Use the action recommended in the malware definition file Quarantine Quarantine the malware but do not remove it Remove Remove the malware from the computer Allow Do not remove nor quarantine the malware 28 Microsoft Confidential List of Antimalware policy settings: Real-time Protection Setting name Enable real-time protection Monitor file and program activity on your computer Scan system files 29 Description Set to True if you want to configure real-time protection settings for client computers. We recommend that you enable this setting. Set to True if you want to monitor when files and programs start to run on client computers and alerts you about any actions that they perform or actions taken on them. This setting lets you to configure whether incoming, outgoing, or incoming and outgoing system files are monitored for malware. You might have to change the default value of Scan incoming and outgoing files for performance reasons if a server has high incoming or outgoing file activity. Enable behavior monitoring Enable this setting to use computer activity and file data to detect unknown threats. When enabled, this setting might increase the time taken to scan computers for malware. Enable protection against networkbased exploits Enable this setting to protect computers against known network exploits by inspecting network traffic and blocking any suspicious activity. Enable script scanning Set to True if you want to scan any scripts that run on computers for suspicious activity. Microsoft Confidential List of Antimalware policies: Threat Overrides 30 Setting name Description Threat name and override action Click Set to customize the remediation action to take for each threat ID when it is detected during a scan. Microsoft Confidential List of Antimalware policies: Threat Overrides Setting name Set sources and order for Endpoint Protection client updates 31 Description Click Set Source to specify the sources for definition and scanning engine updates, and the order in which they are used. If Configuration Manager is specified as one of the sources, other sources are used only if software updates fails to download the client updates. If you use any of the following methods to update definitions on client computers, the client computer must be able to access the Internet. •Updates distributed from Microsoft Update •Updates distributed from Microsoft Malware Protection Center Microsoft Confidential