ebook img

Guide for network administrators - Amazon Web Services PDF

218 Pages·2016·8.81 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Guide for network administrators - Amazon Web Services

Panda Systems Management Administration Guide Version: 7.00.00-00 Author: Panda Security Date: 12/20/2019 Panda Systems Management Legal notice. Neither the documents nor the programs that you may access may be copied, reproduced, translated or transferred to any electronic or readable media without prior written permission from Panda Security, Santiago de Compostela, 12, 48003 Bilbao (Bizkaia) SPAIN Registered trademarks. Registered trademarks. Windows Vista and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. All other product names may be registered trademarks of their respective owners. © Panda Security 2019. All rights reserved. Contact information. Corporate Headquarters: Panda Security Calle Santiago de Compostela 12 Bilbao (Bizkaia) 48003 España. https://www.pandasecurity.com/spain/about/contact/ Guide for network Administrators i Panda Systems Management ii Guide for network Administrators Panda Systems Management About the Administration Guide • You can find the most recent version of this guide at: https://www.pandasecurity.com/rfiles/enterprise/documentation/pcsm/docswebpage/SYSTEMSMANAGEMENT- Guide-EN.pdf Release notes To find out what's new in the latest version of Panda Systems Management following URL: https://www.pandasecurity.com/UK/support/card?id=300121 Technical Support Panda Security provides global support services aimed at responding to specific questions regarding the operation of the company's products. The technical support team also generates documentation covering technical aspects of our products. This documentation is available in the eKnowledge Base portal. • To access specific information about the product, please go to the following URL: https://www.pandasecurity.com/uk/support/cloud-systems-management.htm • The eKnowledge Base portal can be accessed from the following link: https://www.pandasecurity.com/uk/support/#enterprise Survey on the Administration Guide Rate this guide and send us suggestions and requests for future versions of our documentation: https://www.pandasecurity.com/uk/support/#enterprise Administration Guide iii Panda Systems Management iv Administration Guide Panda Systems Management Contents Part 1: Introduction to Panda Systems Management Chapter 1: Preface - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -5 Target audience.......................................................................................................................................................................5 Icons...........................................................................................................................................................................................5 Chapter 2: Basic information about Panda Systems Management- - - - - - - - - - - - - - - 7 Main features of Panda Systems Management....................................................................................................................8 Panda Systems Management user profile.............................................................................................................................9 Main components of Panda Systems Management.........................................................................................................10 Key players of Panda Systems Management......................................................................................................................11 Chapter 3: Basic components of the Console- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 13 Management console components....................................................................................................................................14 General menu..............................................................................................................................................................14 Tab bar..........................................................................................................................................................................15 Icon bar........................................................................................................................................................................15 Drop-down menu........................................................................................................................................................16 Filters and groups panel.............................................................................................................................................17 Dashboards..................................................................................................................................................................18 Selection controls........................................................................................................................................................18 Lists.................................................................................................................................................................................19 Sections.........................................................................................................................................................................21 Hierarchy of levels within the Management Console........................................................................................................22 Account Level..............................................................................................................................................................22 Site Level.......................................................................................................................................................................23 Device Level................................................................................................................................................................25 Chapter 4: Getting started with Panda Systems Management - - - - - - - - - - - - - - - - - 27 Creating and configuring the first site..................................................................................................................................28 Manually installing the agent on a Windows computer ...................................................................................................29 Finding devices quickly using filters.......................................................................................................................................30 Viewing devices......................................................................................................................................................................31 Performing hardware, software and license audits............................................................................................................32 Monitoring Windows devices.................................................................................................................................................33 Deploying software using quick jobs....................................................................................................................................35 Managing patches.................................................................................................................................................................37 Resolving incidents remotely.................................................................................................................................................37 Part 2: Device installation and organization Chapter 5: Deploying and managing devices - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 43 Before integrating devices into the service.........................................................................................................................45 Deploying the PCSM agent via email..................................................................................................................................46 Deploying the PCSM agent centrally using a deployment tool.......................................................................................47 Deploying the PCSM agent remotely via another PCSM agent.......................................................................................47 Deploying the agent using image cloning..........................................................................................................................50 Installing the agent on workstations and servers.................................................................................................................51 Installing the Agent on Android and iOS..............................................................................................................................52 Integrating network devices .................................................................................................................................................55 Guide for network administrators v Panda Systems Management Managing ESXi servers............................................................................................................................................................56 Managing Hyper-V servers.....................................................................................................................................................57 Approving devices..................................................................................................................................................................58 Uninstalling the agent and deleting devices.......................................................................................................................59 Uninstalling the PCSM agent from the management console..............................................................................59 Uninstalling the PCSM agent from the target device.............................................................................................59 Configuring a Connection Broker.........................................................................................................................................60 Other Agent Connection parameters..................................................................................................................................62 Configuring a Network Node................................................................................................................................................63 Device discovery (network scanning)......................................................................................................................64 Configuring a local cache node..........................................................................................................................................67 Designating a local cache........................................................................................................................................67 Chapter 6: Device groupings- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 69 Sites...........................................................................................................................................................................................70 Groups......................................................................................................................................................................................72 Site device groups.......................................................................................................................................................72 Device groups..............................................................................................................................................................73 Site groups....................................................................................................................................................................74 Filters.........................................................................................................................................................................................75 Device filters.................................................................................................................................................................75 Account filters..............................................................................................................................................................80 Site filters.......................................................................................................................................................................81 Filter composition.........................................................................................................................................................82 Favorites...................................................................................................................................................................................88 Managing devices efficiently................................................................................................................................................88 Sites................................................................................................................................................................................89 Filters and groups.........................................................................................................................................................89 General organization of devices..........................................................................................................................................89 Part 3: Automatic process configuration on devices Chapter 7: Policies- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 93 Managing policies..................................................................................................................................................................94 Creating policies..........................................................................................................................................................94 Managing created policies.......................................................................................................................................94 Policy types..............................................................................................................................................................................97 Agent............................................................................................................................................................................97 ESXi................................................................................................................................................................................99 Monitoring Maintenance Window............................................................................................................................99 Mobile Device Management policies......................................................................................................................99 Monitoring..................................................................................................................................................................103 Patch management.................................................................................................................................................104 Power..........................................................................................................................................................................104 Windows update.......................................................................................................................................................104 Software management............................................................................................................................................104 Chapter 8: Monitoring - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 105 Creating monitors manually................................................................................................................................................106 Monitoring Windows, Linux and Mac OS X computers.....................................................................................................108 Monitoring devices using components.............................................................................................................................112 Monitoring printers................................................................................................................................................................113 Monitoring network devices using SNMP...........................................................................................................................113 Monitoring ESXi servers..........................................................................................................................................................115 Guide for network administrators vi Panda Systems Management Automatically configuring monitors ...................................................................................................................................117 Importing and exporting a monitoring policy...................................................................................................................118 Importing monitoring policies...................................................................................................................................118 Exporting monitoring policies...................................................................................................................................118 Managing monitors...............................................................................................................................................................119 Chapter 9: Jobs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 121 Job items................................................................................................................................................................................121 Launching a quick job..........................................................................................................................................................122 Launching scheduled jobs...................................................................................................................................................125 Managing active and completed jobs.............................................................................................................................126 Job status...............................................................................................................................................................................127 Chapter 10: Components and ComStore - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 129 Component types.................................................................................................................................................................129 Components developed by the administrator......................................................................................................130 Components developed by Panda Security: ComStore.....................................................................................131 Integrating components into the platform........................................................................................................................131 Developing components.....................................................................................................................................................135 Requirements for developing components...........................................................................................................135 Creating a monitor component.........................................................................................................................................136 Component presentation and purpose.................................................................................................................136 Necessary elements..................................................................................................................................................136 Communications protocol between the component and the Server...............................................................137 How to work with a monitor component...............................................................................................................139 How to use global variables.....................................................................................................................................142 Labels and user-defined fields.................................................................................................................................143 Creating a script component..............................................................................................................................................145 Editing components..............................................................................................................................................................145 Part 4: Device visibility Chapter 11: Assets Audit - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 149 Access and availability of the audit service......................................................................................................................150 Network audit........................................................................................................................................................................152 Hardware audit.....................................................................................................................................................................154 Account level.............................................................................................................................................................154 Site level......................................................................................................................................................................154 Device level...............................................................................................................................................................155 Software audit.......................................................................................................................................................................160 Account level.............................................................................................................................................................160 Site level......................................................................................................................................................................160 Device level...............................................................................................................................................................160 License audit.........................................................................................................................................................................160 Account level.............................................................................................................................................................160 Site level......................................................................................................................................................................161 Services audit........................................................................................................................................................................162 Device level...............................................................................................................................................................162 Changes audit.......................................................................................................................................................................162 Device level...............................................................................................................................................................162 Activity audit..........................................................................................................................................................................163 At Account level........................................................................................................................................................163 At Device level...........................................................................................................................................................163 Chapter 12: Device visibility and status - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 165 Guide for network administrators vii Panda Systems Management Device status..........................................................................................................................................................................166 General dashboard..............................................................................................................................................................166 Aim...............................................................................................................................................................................166 Access.........................................................................................................................................................................167 Data displayed...........................................................................................................................................................167 Site dashboards.....................................................................................................................................................................169 Aim...............................................................................................................................................................................169 Access.........................................................................................................................................................................169 Data displayed...........................................................................................................................................................169 Site list......................................................................................................................................................................................171 Device lists..............................................................................................................................................................................172 Device details........................................................................................................................................................................176 Aim...............................................................................................................................................................................176 Access.........................................................................................................................................................................176 Data displayed...........................................................................................................................................................176 Installed antivirus audit.........................................................................................................................................................181 Chapter 13: Reports- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 185 Accessing the reports system...............................................................................................................................................186 Creating reports.....................................................................................................................................................................186 Report structure.....................................................................................................................................................................188 Types of reports available and settings..............................................................................................................................189 Executive.....................................................................................................................................................................189 Audits...........................................................................................................................................................................191 Monitoring...................................................................................................................................................................193 Patch management..................................................................................................................................................194 Activity.........................................................................................................................................................................196 Export...........................................................................................................................................................................196 Part 5: Resolution of incidents and technical support Chapter 14: Patch Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 201 What patches can I deploy/apply?...................................................................................................................................202 Patch deployment and installation.....................................................................................................................................203 Patch categories based on the policy used..........................................................................................................203 Patch installation order.............................................................................................................................................204 Method I: Windows Update policy......................................................................................................................................204 Method II: Patch Management policy...............................................................................................................................207 General workflow and Patch Management policy override...............................................................................207 Creating a Patch Management policy..................................................................................................................209 Approving patches and creating filters..................................................................................................................211 Overriding the policies defined at Account Level................................................................................................214 Modifying Patch Management policies per device.............................................................................................215 Patch Management method: Usage scenarios....................................................................................................216 Device patch status..............................................................................................................................................................216 Managing the device patch status.........................................................................................................................217 Patch Management policy method: Usage scenarios ...................................................................................................220 Chapter 15: Centralized software deployment and installation - - - - - - - - - - - - - - - 221 Package deployment and installation procedure...........................................................................................................222 Deployment examples.........................................................................................................................................................223 Deploying documents using a script language.....................................................................................................224 Deploying documents without a script language.................................................................................................226 Deploying self-installing software.............................................................................................................................227 Deploying software without an installer..................................................................................................................229 Bandwidth usage optimization in software deployments................................................................................................231 viii Guide for network administrators

Description:
4. Basic components of the Console .. 26 4.1. Introduction
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.