This topic provides an example scenario for how you can implement Endpoint Protection in Microsoft System Center 2012 Configuration Manager to protect computers in an organization from malware attacks.
John is the Configuration Manager administrator at Woodgrove Bank. The bank currently uses Microsoft Forefront Endpoint Protection 2010 to protect computers against malware attacks. Additionally, the bank uses Windows Group Policy to ensure that the Windows Firewall is enabled on all computers in the company and that users are notified when Windows Firewall blocks a new program.
John has been asked to upgrade the Woodgrove Bank antimalware software to System Center 2012 Endpoint Protection so that the bank can benefit from the latest antimalware features and be able to centrally manage the antimalware solution from the Configuration Manager console. This implementation has the following requirements:
- Use Configuration Manager to manage the
Windows Firewall settings that are currently managed by Group
Policy.
- Use Configuration Manager software updates to
download malware definitions to computers. If software updates are
not available, for example if the computer is not connected to the
corporate network, computers must download definition updates from
Microsoft Update.
- Users’ computers must perform a quick malware
scan every day. Servers, however, must run a full scan every
Saturday, outside business hours, at 1 A.M.
- Send an email alert whenever any one of the
following events occurs:
- Malware is detected on any computer
- The same malware threat is detected on more
than 5 percent of computers
- The same malware threat is detected more than
5 times in any 24 hour period
- More than 3 different types of malware are
detected in any 24 hour period
- Malware is detected on any computer
- Uninstall the existing antimalware
solution.
John then performs the following steps to implement Endpoint Protection:
Steps to implement Endpoint Protection
Process | Reference | ||||
---|---|---|---|---|---|
John reviews the available information about the basic concepts for Endpoint Protection in Configuration Manager. |
For overview information about Endpoint Protection, see Introduction to Endpoint Protection in Configuration Manager. |
||||
John reviews and implements the required prerequisites to use Endpoint Protection. |
For information about the prerequisites for Endpoint Protection, see Prerequisites for Endpoint Protection in Configuration Manager. |
||||
John installs the Endpoint Protection site system role on one site system server only, at the top of the Woodgrove Bank hierarchy. |
For more information about how to install the Endpoint Protection site system role, see the Step 1: Create an Endpoint Protection Point Site System Role section in the How to Configure Endpoint Protection in Configuration Manager topic. |
||||
John configures Configuration Manager to use an SMTP server to send the email alerts.
|
For more information, see How to Configure Alerts for Endpoint Protection in Configuration Manager.
|
||||
John creates a device collection that contains all computers and servers to install the Endpoint Protection client. He names this collection All Computers Protected by Endpoint Protection.
|
For more information about how to create collections, see How to Create Collections in Configuration Manager |
||||
He configures the following alerts for the collection:
He additionally selects the option View this collection in the Endpoint Protection dashboard so that he can monitor the alerts in the Configuration Manager console. |
For more information, see How to Configure Alerts for Endpoint Protection in Configuration Manager. |
||||
John configures Configuration Manager software updates to download and deploy definition updates three times a day by using an automatic deployment rule.
|
For more information, see the Using Configuration Manager Software Updates to Deliver Definition Updates section in the How to Configure Definition Updates for Endpoint Protection in Configuration Manager topic. |
||||
John examines the settings in the default antimalware policy, which contains recommended security settings from Microsoft. For computers to perform a quick scan every day to, he changes the following settings:
John notes that Updates distributed from Microsoft Update is selected by default as a definition update source. This fulfills the business requirement that computers download definitions from Microsoft Update when they cannot receive Configuration Manager software updates. |
For more information, see How to Create and Deploy Antimalware Policies for Endpoint Protection in Configuration Manager. |
||||
John creates a collection that contains only the Woodgrove Bank servers named Woodgrove Bank Servers. |
For more information about how to create collections, see How to Create Collections in Configuration Manager |
||||
John creates a custom antimalware policy named Woodgrove Bank Server Policy. He adds only the settings for Scheduled scans and makes the following changes:
|
For more information, see How to Create and Deploy Antimalware Policies for Endpoint Protection in Configuration Manager. |
||||
John deploys the Woodgrove Bank Server Policy custom antimalware policy to the Woodgrove Bank Servers collection. |
For more information, see the To deploy an antimalware policy to client computers section in the How to Create and Deploy Antimalware Policies for Endpoint Protection in Configuration Manager topic. |
||||
John creates a new set of custom client device settings for Endpoint Protection and names these Woodgrove Bank Endpoint Protection Settings.
|
For more information, see the Step 5: Configure Custom Client Settings for Endpoint Protection section in the How to Configure Endpoint Protection in Configuration Manager topic. |
||||
He configures the following settings for Endpoint Protection:
|
For more information, see the Step 5: Configure Custom Client Settings for Endpoint Protection section in the How to Configure Endpoint Protection in Configuration Manager topic. |
||||
John deploys the Woodgrove Bank Endpoint Protection Settings client settings to the All Computers Protected by Endpoint Protection collection. |
For more information, see the How to Create and Deploy Custom Client Settings section in the How to Configure Client Settings in Configuration Manager topic. |
||||
John uses the Create Windows Firewall Policy Wizard to create a policy by configuring the following settings for the domain profile:
|
For more information, see the To create a Windows Firewall policy section in the How to Create and Deploy Windows Firewall Policies for Endpoint Protection in Configuration Manager |
||||
John deploys the new firewall policy to the collection All Computers Protected by Endpoint Protection that he created earlier. |
For more information, see the To deploy a Windows Firewall policy section in the How to Create and Deploy Windows Firewall Policies for Endpoint Protection in Configuration Manager |
||||
John uses the available management tasks for Endpoint Protection to manage antimalware and Windows Firewall policies, perform on-demand scans of computers when necessary, force computers to download the latest definitions, and to specify any further actions to take when malware is detected. |
For more information about the Endpoint Protection management tasks, see How to Manage Antimalware Policies and Firewall Settings for Endpoint Protection in Configuration Manager. |
||||
John uses the following methods to monitor the status of Endpoint Protection and the actions that are taken by Endpoint Protection:
|
For more information about the System Center 2012 Endpoint Protection Status node, see the How to Monitor Endpoint Protection by Using the System Center 2012 Endpoint Protection Status Node section in the How to Monitor Endpoint Protection in Configuration Manager topic. For more information about how to monitor Endpoint Protection in the Assets and Compliance workspace, see the How to Monitor Endpoint Protection in the Assets and Compliance Workspace section in the How to Monitor Endpoint Protection in Configuration Manager topic. For more information about how to monitor Endpoint Protection by using reports, see the How to Monitor Endpoint Protection by Using Reports section in the How to Monitor Endpoint Protection in Configuration Manager topic. |
John reports a successful implementation of Endpoint Protection to his manager, and confirms that the computers at Woodgrove Bank are now protected from antimalware, according to the business requirements that he was given.