CCES Flashcards
SmartEndpoint Combines what elements into package
Data
Network
Remote Access
Threat
SmartEndpoint Allows access control over
Company data
Attacks
Zero Day threats
Admins can perform what tasks in SmartEndpoint
- Centrally monitor, manage, and enforce user and machine based company policy
- Quickly deploy protections for users
- customize policies
- Monitor end user devices for malicious software
- Control access to corporate data and apps
- Protect sensitive data from virus and threats on the web and in attachements
- perform risk assessment to ensure compliance
- inform and remediate attacks on end user machines
- view and report security events
How does SmartEndpoint communicate with SmartEndpoint management server
SIC
How does the endpoint security management server communicate to clients.
Http/Https
main components of a SmartEndpoint deployment
- SmartEndpoint
- Endpoint management server
- Endpoint clients
Endpoint security database houses
Policy User and computer data Mgmt data Licenses Ad node objects
What is the default communication interval between client and mgmt server
60 seconds
What 2 components make up the endpoint agent
Agent
DA Framework
What are the activities performed by endpoint client
Communication
Deployment
EMON state info
Updating files and Drivers
What does the DA framework do?
Policy activation / updating
Log collection
What functions does the SmartEndpoint management interface
Deployment
Monitoring
Configuration endpoint clients
Manage policies
What are the 3 main components of an Endpoint security environment?
- Endpoint management server
- SmartEndpoint
- Endpoint Clients
How does the security management server work in the environment
Endpoint SMS contains security software and database
The server communicates with the endpoint to manage policies and update protections.
SmartEndpoint Management has 5 tabs, what are they?
Overview Policy User and Computers Reporting Deployment
The deployment tab shows what information
Security Summary
Active Alerts (10 Minute Update)
Security Status
The policy tab shows
Collection of security rules. This includes the default rules (cannot be deleted)
The users and computers tab shows
Hierarchical Tree of organization
Review of the status of the current blade
The reports tabs shows?
Pre-defined reports
The deployment tab shows?
Create deployment rules and manage packages
What does endpoint firewall blade do?
Controls inbound and outbound traffic
What does the URL filtering blade do
Limits and blocks access to websites by
- category
- user
- group
What’s does the Anti-Malware blade do?
Signature base for (scans all files accessed)
Viruses
Spyware
Trojans
What does the data security blades do?
- Capsule docs: Protects, track and restricts access to buisness doc
- FDE Encrypt Storage and provides access protection (pre-boot protection)
- Media & Port Protection: Strong encryption USB, CD/DVD/SD