Solved

Iron Port / Symentac End Point hardening guidelines

Posted on 2011-09-21
5
1,220 Views
Last Modified: 2012-05-12
Hi ,

Does anyone have secure configuration best practice document / hardening guidelines for following 2 security products -

Ironport: version 7.0.1

Symenac Endpoint Protection : version 11.0.6/11.0.7
0
Comment
Question by:nitpatel
  • 2
5 Comments
 
LVL 29

Accepted Solution

by:
Sudeep Sharma earned 250 total points
ID: 36589647
IronPort Email Security Appliance are in itself runs on Hardened OS called AsyncOS which is in background modified and customized version of FreeBSD.

In my opinion you would just need to configure it properly to make it work better.

Same is the case with SEP which you need to configure properly as per your requirements or issue which you might be facing.

Generally it is advisable to go through the "Best Practices" which are easily available on Symantec Knowledge Base. Below are few of them:

Title :Best Practices for Installing Symantec Endpoint Protection on Windows Servers
Web link : http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2009021811070448

Best practices regarding Intrusion Prevention System technology
http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2009080314433948

Security Best Practice Recommendations
http://service1.symantec.com/support/ent-security.nsf/docid/2009010808340848?Open&seg=ent

Best Practices with Symantec Endpoint Protection (SEP) Group Update Providers (GUP)
http://service1.symantec.com/support/ent-security.nsf/docid/2009050510573148

Best Practices guide for Installing the Symantec Endpoint Protection Manager with a SQL Server 2005 Database
http://service1.symantec.com/support/ent-security.nsf/docid/2008031504445748?Open&seg=ent

Best Practices for Symantec Endpoint Protection Location Awareness
http://service1.symantec.com/support/ent-security.nsf/docid/2009122010495848?Open&seg=ent

Top 10 Symantec Best Practices - Deploying Symantec Endpoint Protection Architecture
http://service1.symantec.com/support/ent-security.nsf/docid/2009012721190648?Open&seg=ent

I hope that would help

Sudeep
0
 

Author Comment

by:nitpatel
ID: 36594442
Thanks Sudeep for all the useful links. Do you also have pointer/links for Ironport Best Practice configuration/installation.

0
 
LVL 29

Assisted Solution

by:Sudeep Sharma
Sudeep Sharma earned 250 total points
ID: 36601427
See if this helps you. You would need to login to Cisco.com website and if you are registered then go to Ironport Email Security Appliance by clicking Support and go to IronPort knowledgebase.

From there you could find the followings:
Which User Guides and Knowledge Base articles apply to the IronPort Spam & Virus Blocker?
Answer ID 555

What is the best way to install an IronPort appliance.
Answer ID 553

What are the best practices for configuring Sophos Anti-Virus?
Answer ID 73

What are the best practices for using SenderBase?
Answer ID 1137

SNMP best practices
Answer ID 1339

Best practices for email campaigns
Answer ID 1696

Best Practices for securing an C-series IronPort Appliance.
Answer ID 768

IronPort Anti-Spam Efficacy Checklist
Answer ID 493

I hope that would help

Sudeep
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 37169419
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question