Solved

Iron Port / Symentac End Point hardening guidelines

Posted on 2011-09-21
5
1,233 Views
Last Modified: 2012-05-12
Hi ,

Does anyone have secure configuration best practice document / hardening guidelines for following 2 security products -

Ironport: version 7.0.1

Symenac Endpoint Protection : version 11.0.6/11.0.7
0
Comment
Question by:nitpatel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 30

Accepted Solution

by:
Sudeep Sharma earned 250 total points
ID: 36589647
IronPort Email Security Appliance are in itself runs on Hardened OS called AsyncOS which is in background modified and customized version of FreeBSD.

In my opinion you would just need to configure it properly to make it work better.

Same is the case with SEP which you need to configure properly as per your requirements or issue which you might be facing.

Generally it is advisable to go through the "Best Practices" which are easily available on Symantec Knowledge Base. Below are few of them:

Title :Best Practices for Installing Symantec Endpoint Protection on Windows Servers
Web link : http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2009021811070448

Best practices regarding Intrusion Prevention System technology
http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2009080314433948

Security Best Practice Recommendations
http://service1.symantec.com/support/ent-security.nsf/docid/2009010808340848?Open&seg=ent

Best Practices with Symantec Endpoint Protection (SEP) Group Update Providers (GUP)
http://service1.symantec.com/support/ent-security.nsf/docid/2009050510573148

Best Practices guide for Installing the Symantec Endpoint Protection Manager with a SQL Server 2005 Database
http://service1.symantec.com/support/ent-security.nsf/docid/2008031504445748?Open&seg=ent

Best Practices for Symantec Endpoint Protection Location Awareness
http://service1.symantec.com/support/ent-security.nsf/docid/2009122010495848?Open&seg=ent

Top 10 Symantec Best Practices - Deploying Symantec Endpoint Protection Architecture
http://service1.symantec.com/support/ent-security.nsf/docid/2009012721190648?Open&seg=ent

I hope that would help

Sudeep
0
 

Author Comment

by:nitpatel
ID: 36594442
Thanks Sudeep for all the useful links. Do you also have pointer/links for Ironport Best Practice configuration/installation.

0
 
LVL 30

Assisted Solution

by:Sudeep Sharma
Sudeep Sharma earned 250 total points
ID: 36601427
See if this helps you. You would need to login to Cisco.com website and if you are registered then go to Ironport Email Security Appliance by clicking Support and go to IronPort knowledgebase.

From there you could find the followings:
Which User Guides and Knowledge Base articles apply to the IronPort Spam & Virus Blocker?
Answer ID 555

What is the best way to install an IronPort appliance.
Answer ID 553

What are the best practices for configuring Sophos Anti-Virus?
Answer ID 73

What are the best practices for using SenderBase?
Answer ID 1137

SNMP best practices
Answer ID 1339

Best practices for email campaigns
Answer ID 1696

Best Practices for securing an C-series IronPort Appliance.
Answer ID 768

IronPort Anti-Spam Efficacy Checklist
Answer ID 493

I hope that would help

Sudeep
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 37169419
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Samsung dvr sdr-5102n2t not working 7 59
Tool to stimulate spoof email 3 56
Lost or Stolen Laptops 13 47
Windows 10 14 39
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
A hard and fast method for reducing Active Directory Administrators members.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question