Endpoint Protection

 View Only
  • 1.  Basic Setup with SNAC and SonicWall VPN Client

    Posted Aug 04, 2009 04:24 PM
    I am pretty well versed in SEP as with the previous corporate versions. We aquired SNAC with our latest purchase of the Endpoint Protection Suite, or whatever Symantec is calling the product this week.
    I am hoping to setup my VPN clients without having to worry about the garbage on their PCs, so I installed SNAC (If you are using the latest version of SEP you may have to follow these instructions to install the currently-behind SNAC version: http://service1.symantec.com/support/ent-security.nsf/docid/2009060511434448 )

    I started playing with the host integrity policy on a new "VPN_Test" group.

    I am hoping to do this without any extra software or appliances... Of course my reseller assured me that wouldn't be the case
    • How do I ensure that the VPN client isn't installed without the SNAC/SEP components?
    • Perhaps should I try using a packaging app like WinInstall LE to bundle a custom SEP/SNAC package with the VPN client?
    • How does the Host Integrity Policy "fail" status actually block the remote VPN client from our corporate network?
    I am looking for simple instructions on this, so far in these couple-hundred page PDFs it keeps mentioning the "Enforcer" and "DHCP Enforcer" but no specific method of having SEP/SNAC do the blocking/allowing of the VPN client into the network.. Or perhaps if the HI policy fails it will implement an application blocking policy that blocks the VPN client.

    What are people doing in this or very similar remote access scenarios?


  • 2.  RE: Basic Setup with SNAC and SonicWall VPN Client

    Posted Aug 04, 2009 05:06 PM
    This KB may shed some light.
    Symantec Endpoint Protection 11.0 / Symantec Network Access Control 11.0 Host Integrity Overview

    http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2007092617440948

    Thomas



  • 3.  RE: Basic Setup with SNAC and SonicWall VPN Client

    Posted Aug 05, 2009 03:57 PM

    ha. I was already playing with the "Quarantine Policy When Host Integrity Fails" and setup a firewall policy that blocks access to all of our LAN IP schemes...

    This is not good as it blocks access to the mgmt server so when you remediate you cannot connect to do the check I believe. I am adjusting to leave access in the firewall rule only to the mgmt server. Later on I probably will only allow this firewall policy to the symantec required ports (2967, 80 and whatever)

    Still going to play with bundling the Sonicwall and SEP client install into a package...this seems like the only way to ensure both get installed. Then an uninstall password will help prevent people from just disabling it...