Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
WSUS Presented by: Nada Abdullah Ahmed.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Maintaining and Updating Windows Server 2008
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Small Business Edition 4 C707 – Technical overview.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Introduction to Group Policy
Hands-On Microsoft Windows Server 2008
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Using Windows Firewall and Windows Defender
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Chapter Fourteen Windows XP Professional Fault Tolerance.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
Module 14: Configuring Server Security Compliance
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
PC MANAGER MEETING January 23, Agenda  Next Meeting  Training  Windows Policy  Main Topic: Windows AV Service Review.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
BASIC FUNCTIONALITY. Page 2 Agenda Main topics Policy Manager Communication Understanding communication Information flow Communication modules F-Secure.
Computer Emergency Notification System (CENS)
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Module 6: Configuring User Environments Using Group Policy.
ADMINISTRATION HANDS-ON. Page 2 Agenda Task 1: Initial Configuration Task 2: Testing disinfection with eicar.com HTTP traffic scanning, manual scanning.
Avira Endpoint Security. Introduction of Avira Management Center (AMC)
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 Session Number Presentation_ID © 2002, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Website for Security and Virtual Private Network.
Microsoft Management Seminar Series SMS 2003 Change Management.
1.Nattawut Chaibuuranapankul M.2/6 No. 8 2.Poonnut Sovanpaiboon M.2/6 No.11 3.Sarin Jirasinvimol M.2/6 No Attadej Rujirawannakun M.2/6 No.28.
NetTech Solutions Protecting the Computer Lesson 10.
Module 10: Windows Firewall and Caching Fundamentals.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Page PearsonAccess™ Technology Training Online Test Configuration.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
Introduction : This Spyware remover software that keep all time your computer completely clean.Spyware remover software This software can secure your.
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
How to remove Ransomware on windows 10 ?
Article Source:
Information Security Session October 24, 2005
Security through Group Policy
Presentation transcript:

Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology Support Services

Agenda Symantec AntiVirus Corporate Edition 10 –New Features –Spyware Detection and Removal Test Results –Deployment Plans Managed SAV –Definition –Benefits –How It Works –Implementation –Management –Requirements

SAVCE 10 New Features –Real-time protection to reduce the risk of spyware reaching the system –Automatic removal for easy disposal of security risks –Side-effect repair to clean up registry entries, files, and browser settings after hard-to-find spyware infection –Control over spyware settings via existing Symantec™ AntiVirus Corporate Edition management interface (for managed SAV)

First Impressions Mixed –Symantec’s first effort in this arena –Expect them to get major feedback and adapt –Not at this point a comprehensive spyware protection tool, but a good additional measure How Effective is This New Feature?

Testing Performed by both NUIT and Kellogg Information Systems (Zach McHenry and Nick Bennett) Test Environment included: –Windows XP SP2 –Isolated Port –Short duration tests – infect, monitor, assess impact –Monitoring Equipment (Kellogg)

How Effective is This New Feature? Example of a Test Session: –Access various Web sites and allow ActiveX queries to load and install –Seek out trojans/viruses and infect the machine –Click on popups offering help with processor performance, spyware removal, etc. –Install programs known to have spyware –Install P2P programs Within 30 minutes: –Many Popups –Search Toolbars –Startup page changed –Some sites redirected to “search” sites

How Effective is This New Feature? What Did SAVCE 10 Do? –During the infection phase: SAVCE notified us of adware/spyware/malware infections and would either quarantine them or leave them alone. Sometimes these Symantec notifications could not be stopped except by pressing a “Repair Now” button. That, at times, caused SAVCE to freeze. –Rebooted in safe mode: Ran a full scan – found 90 infections –Rebooted in normal mode: Opened IE Nonstop popups and SAVCE notifications

How Effective is This New Feature? Summary observations about SAVCE: –Detected and corrected a lot of spyware. –Notifications are persistent and will at times require IT intervention. Many of these notifications are cryptic: “Access Denied: Quarantine Succeeded?” –Good prevention and correction tool for moderate cases. –Any significant malware removal will require trained IT support; other tools may be more effective in some of these cases.

Recommendations SAVCE good as an additional tool Users will be more aware of extent of their infections Monitor SAVCE performance and provide feedback to Symantec Educate users about the cause of these infections

Deployment Plans SAVCE 10 and configuration instructions were distributed to UNITS for testing on 8/4/2005 – feedback is due 8/12/2005 General Availability before the end of August Managed SAV update available for deployment after we receive feedback on client

Questions About SAVCE 10 Mark Reynolds

Managed SAV- Definition A managed Symantec AntiVirus (SAV) environment creates two-way communication between your clients and your parent server. This allows for direct oversight and management of client configuration and virus definitions.

Managed SAV- Benefits More timely and controlled distribution of virus definitions Allows for oversight of all managed client’s antivirus protection and status Eliminates the need for individual computer visits to manually update or verify virus definitions Downloads occur in the background This software is available at no additional cost (NU site-licensed)

Managed SAV- How it works “Push” and “Pull” technology- on demand administrators can: –Initiate a server push of new virus definitions –Start a virus sweep of all managed clients On the hour clients will check-in to: –Pull new virus definitions and configuration changes –Report current individual status to server

Managed SAV- Implementation Install server version of SAV Install Symantec System Center Console Convert clients to managed: Login scripts or manual install on each client Determine virus definition source: LiveUpdate vs. Intelligent Updater

Managed SAV- Management Management through Symantec System Center Console View and modify client configuration and status Verify clients virus definitions Push updates or start a virus sweep

Managed SAV- Requirements Server –Windows XP Professional; Windows 2000 Professional/Server/Advanced Server; Windows Server 2003 –Static IP addresses (recommended) –Can be an existed file server or domain controller Client firewall –For full functionality, desktop firewall software needs to have port 2967/UDP open

Examples School of Communication –Large user base –Difficult and time consuming to visit all machines as often as needed for antivirus updates Crown –Small user base, but high profile –Needed to decrease lag time and increase security

Bottom line Installation of this service will reduce client visits and increase your overall security baseline. This is not a complete solution. It is still important to: –Educate your users –Regularly update both operating systems and applications –Consider both software and hardware based firewalls –Use strong passwords on all accounts –Disable unnecessary services

Questions About Managed SAV Michael Satut More information on SAV –\\chocolate.tss.northwestern.edu\NAVAdmin\Docs\\chocolate.tss.northwestern.edu\NAVAdmin\Docs