F-Secure Policy Manager Proxy Administrator's Guide

Similar documents
F-Secure Policy Manager Administrator's Guide

F-Secure Policy Manager Proxy. Administrator's Guide

F-Secure Client Security. Quick Installation Guide

F-Secure Client Security. Administrator's Guide

Kaspersky Security Center 10

NGFW Security Management Center

NGFW Security Management Center

NGFW Security Management Center

NGFW Security Management Center

Acronis Backup & Recovery 11.5

NGFW Security Management Center

NGFW Security Management Center

NGFW Security Management Center

NGFW Security Management Center

Acronis Backup & Recovery 11 Beta Advanced Editions

Recommended System Requirements for Microsoft Dynamics SL 2018

NGFW Security Management Center

NGFW Security Management Center

NGFW Security Management Center

RightNow May 08 Workstation Specifications

Premium Pro Enterprise Local Installation Guide for Database Installation on a desktop PC (Cloudscape)

ComTrader 2.7 Setup Guide. Version 1.2

Seqrite Endpoint Security

Stonesoft Management Center. Release Notes Revision A

NGFW Security Management Center

RightNow August 08 Workstation Specifications

NGFW Security Management Center

Stonesoft Management Center. Release Notes Revision A

NGFW Security Management Center

Ekran System System Requirements and Performance Numbers

Metasploit. Installation Guide Release 4.4

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements

DELL EMC VMAX UNISPHERE 360

Stonesoft Management Center. Release Notes Revision B

Kaspersky Security Center Web-Console

10ZiG Manager Cloud Setup Guide

TechNote AltitudeCDN Multicast+ and OmniCache Support for Citrix

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)

Comodo Endpoint Manager Software Version 6.25

Ekran System v.6.1 Deployment Guide

Platform Compatibility...1 New Features...2 Known Issues...4 Related Technical Documentation...5

SNOW LICENSE MANAGER (7.X)... 3

ElasterStack 3.2 User Administration Guide - Advanced Zone

Patch Manager INSTALLATION GUIDE. Version Last Updated: September 25, 2017

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

F-Secure PSB Getting Started Guide

SNOW LICENSE MANAGER (7.X)... 3

Configuration Guide for Exchange Reporter Plus

VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5

ESET SHARED LOCAL CACHE

System recommendations for version 17.1

EMC VMAX UNISPHERE 360

McAfee Policy Auditor Installation Guide

System recommendations for version 17.1

Microsoft Windows Apple Mac OS X

Comodo Endpoint Manager Software Version 6.25

Comodo Endpoint Manager Software Version 6.26

Getting Started Guide. Version 4.4

Server Monitoring. AppDynamics Pro Documentation. Version 4.1.x. Page 1

Client Installation Guide

System Requirements. SAS Profitability Management 2.3. Deployment Options. Supported Operating Systems and Versions. Windows Server Operating Systems

Synchronizer Quick Installation Guide

Installation Guide GWAVA 6

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

System Requirements. SAS Activity-Based Management Deployment

Installing Cisco APIC-EM on a Virtual Machine

Sophos for Virtual Environments. startup guide -- Sophos Central edition

NGFW Security Management Center

Wireless LAN. SmartPass Quick Start Guide. Release 9.0. Published: Copyright 2013, Juniper Networks, Inc.

ForeScout Extended Module for IBM BigFix

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

Acronis Backup Advanced Version 11.5 Update 6

SYSTEM REQUIREMENTS M.APP ENTERPRISE

Earth Observation Innovation Platform _. Price List

Blackberry Enterprise Server Pre-installation and Checklist Guide

Dell Multi-UPS Management Console and UPS Local Node Manager Software Version User Guide Update

RightNow February 09 Workstation Specifications

Visual Nexus Version 4.0

Introduction. Architecture Overview

SOLUTION MANAGEMENT GROUP

System Requirements 2008 R2

WhatsConnected v3.5 User Guide

You can administer Policy and Distribution Services by using the following:

System Requirements. SAS Activity-Based Management 7.2. Deployment

VMware AirWatch Content Gateway Guide for Linux For Linux

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.

VMware vcloud Air User's Guide

Sophos Enterprise Console advanced startup guide

Deployment Guide. 3.1 For Windows For Linux Docker image Windows Installation Installation...

System Requirements. System Requirements for Cisco DCNM, Release 10, page 1 Deployment Best Practices for Cisco DCNM, Release 10.

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

Parallels Virtuozzo Containers 4.6 for Linux Readme

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

Tips and Tricks: Installing Sage Pastel Accounting

Next Generation Firewall

TechNote AltitudeCDN OmniCache Integration with Microsoft Teams Live Events

Stonesoft Management Center. Release Notes Revision B

Help with F5 Networks Virtual Classroom. Troubleshooting your client connection to the remote Windows PC

VMware AirWatch Content Gateway Guide for Windows

Transcription:

F-Secure Policy Manager Proxy Administrator's Guide 17-10-24

TOC F-Secure Policy Manager Proxy Contents Chapter 1: Policy Manager Proxy...3 1.1 System requirements...4 1.2 Overview...4 1.2.1 When should you use Policy Manager Proxy?...5 1.2.2 Setting up Policy Manager Proxy...5 1.2.3 Centralized management of Policy Manager Proxy...6

Chapter 1 Policy Manager Proxy Topics: System requirements Overview This section provides a brief introduction to installing and using Policy Manager Proxy in your managed network.

4 Policy Manager Proxy 1.1 System requirements In order to install Policy Manager Proxy, your system must meet the minimum requirements given here. Operating system: Microsoft Windows: Windows Server 2008 SP1 (64-bit); Standard, Enterprise, Web Server, Small Business Server or Essential Business Server editions Windows Server 2008 R2 with or without SP1; Standard, Enterprise or Web Server editions Windows Server 2012; Essentials, Standard or Datacenter editions Windows Server 2012 R2; Essentials, Standard or Datacenter editions Windows Server 2016; Essentials, Standard or Datacenter editions Linux (only 64-bit versions of all distributions listed are supported): Red Hat Enterprise Linux 5, 6 and 7 CentOS 6, 7 opensuse 13.2 SUSE Linux Enterprise Server 10 and 11 SUSE Linux Enterprise Desktop 11 Debian GNU Linux 7, 8 and 9 Ubuntu 12.04, 14.04, 16.04 Processor: Dual-core 2Ghz CPU or higher. Memory: 2 GB RAM. Disk space: 10 GB of free disk space. For managing Premium clients, an additional 10 GB of space is required for serving software updates. Network: 100 Mbit network. 1.2 Overview Policy Manager Proxy offers a solution to bandwidth problems in distributed installations of Client Security by significantly reducing load on networks. Policy Manager Proxy offloads the heaviest traffic from the master server, allowing you to optimize costly, high-latency traffic. For example, the proxy node gets the necessary installation packages for software updates from the master server, and the managed hosts then retrieve the packages from the proxy node so that the master server no longer needs to handle the distribution load. Secure connections are used both between hosts and proxy, and proxy and master server. This means that the proxy node certificates must be pre-configured. Managed hosts connect to the configured proxy nodes using the Policy Manager Proxies table.

F-Secure Policy Manager Proxy 5 Note: Although the installation packages are distributed to hosts by the proxy node, Software Updater XML databases are always downloaded from the master Policy Manager Server, bypassing proxy nodes at all times. Policy Manager Proxy can be configured to function as a reverse proxy. Reverse versus forward types define if data requested by hosts, such as anti-virus definitions and software updates, is retrieved directly from the Internet or from the configured upstream Policy Manager or other proxy. Forward proxy is used to minimize traffic between networks, for example a branch office and headquarters. Reverse proxy is used for example in environments where the proxy has no direct connection to the Internet, or to minimize the load on the master server (or other forward proxy). By default the proxy is installed in forward mode. 1.2.1 When should you use Policy Manager Proxy? You do not have to use Policy Manager Proxy in your managed network, but it can provide certain advantages. The effects of Policy Manager Proxy are most obvious in large, vastly spread networks; for example, a large corporation with remote offices in different parts of the globe. The following figure is an example of a situation where Policy Manager Proxy is useful: The benefits of using Policy Manager Proxy include: Less network bandwidth consumption. In particular, you should use Policy Manager Proxy when you have a group of workstations that are located far away from your Policy Manager Server. Quicker delivery of malware definition updates. This is especially true when you have a group of workstations separated from your Policy Manager Server by a slow connection. Less load on Policy Manager Server. In large-scale networks, Policy Manager Proxy can take care of the majority of requests from managed hosts. 1.2.2 Setting up Policy Manager Proxy Follow these steps to install Policy Manager Proxy for either Windows or Linux. 1. Fetch admin.pub from the master Policy Manager: Download it from the master Policy Manager using your browser (https://<policy manager server IP/host name>:<https port number>);

6 Policy Manager Proxy Export it from Policy Manager Console; or Retrieve it from the host if the Policy Manager Proxy host is already running Server Security or Linux Security and is connected to the master Policy Manager. 2. Run the Policy Manager Proxy installer. 3. When prompted, enter the path to the retrieved admin.pub file. 4. Enter the credentials for your administrator account on the master Policy Manager Server. This is required for authorizing the enrollment of the TLS certificate. 5. Complete the installation wizard. Note: By default the proxy is installed in forward proxy mode. To switch to reverse mode, set the following additional Java argument in the fspms.conf configuration file, after the additional_java_args parameter: -DreverseProxy=true You can check that the installation was successful by going to the Proxy welcome page (https://proxy_name:<https_port>, where <HTTPS_port> is the HTTPS port that you entered during installation) in your browser. You can now configure endpoints to use the proxy by specifying the priority order of proxy nodes in the Policy Manager Proxy table. 1.2.3 Centralized management of Policy Manager Proxy Policy Manager Proxy instances are shown in the Policy Manager domain tree as ordinary hosts with a dedicated icon to distinguish them. The installed proxies are included alongside other products in the Policy Manager tabs and reports. Installed proxies report their status to the server, and in addition to the basic host properties, the following information is delivered: Malware and Software Updater definitions distributed to connected hosts Amount of free disk space Used disk space by data type Statistics of proxied traffic Policy Manager Proxy receives the following policy settings from Policy Manager Server: Communication polling interval Maximum disk space allocated to caching Software Updater updates Installed proxies generate host alerts if the malware or Software Updater definitions are out of date. Note: If Server Security is installed on the same machine as Policy Manager Proxy, the two products are shown as separate hosts in the domain tree so that they can be organized differently.