Intune is a cloud-based service that provides companies with security management for their devices, apps and data. Part 3: Remediation and outbreak containment The management console is designed specifically to handle large estates of clients, possibly on a global scale. Once it is up and running, a malware scan is run on the server to ensure it is clean. With antivirus disabled, ransomware-specific features missed one uncommon sample. Finally, the Settings tab allows control of the various underlying processes and configurations within the server product.
Managed Devices shows a list of the computers on the network, along with status and device information. It means the lab considered the product significant, and the vendor felt the cost of testing was worthwhile. The Hosts menu gives a dashboard of all the host installations, by version and platform, and allows immediate understanding of which hosts are offline or disconnected. There is clearly a role here for external expertise and consultancy, both in the planning and deployment stages, and all of them will require significant amounts of training and ongoing support. In this review, we have covered the Classic interface, shown above.
Business License is little different then the home user packs. We particularly liked the way that the Portlets can be rearranged, added to, and laid out to your preferences. These are not accounts for ordinary users, but administrative accounts for the management of the platform. Notifications collates all the main event information into one place, and you can take a malware event and go through to the Virus Chest on the affected computer from here too. Firewalls, Ransomware Protection, and More Firewalls and spam filtering aren't common antivirus features, but some of our top products include them as bonus features.
This is a useful, clear and obvious tool which should be within the capabilities of most any user. Please note that Kaspersky Lab also provide a cloud-based management platform, Kaspersky Endpoint Security Cloud. There is some welcome graphical reporting, but we felt that more could be done here, especially helping the administrator dig through the status of the network. Prepopulating it with those actually on this licensed server would help. Part 2: Ongoing use The management console is based in a web browser, as you would expect from a cloud-based solution. Kaspersky Security Center additionally offers an auto-deployment policy, which means that when devices are discovered and placed into a managed group, the appropriate endpoint protection software will be installed automatically.
It has quite a straightforward status view along with appropriate tools for scanning. Compared to other antivirus programs, this one performs system scan 60 faster. Good scores in our tests. We liked the strong graphical overview of the status of all clients, and this provided a clear indication of what was happening. We have notified Emsisoft of the bug, and they are working on a fix for it. Part 2: Ongoing use The management console has five key menu choices on the left-hand side. It is fairly straightforward to use the platform on a day to day basis, both getting reports of what is happening and initiating scans or remedial actions as required.
Accounts lets you monitor the activities of the user accounts that have been set up. It uses a combination of signature-based protection and behavioral-based protection. Dashboard gives an overview of the status of the entire estate of client devices, and reports how many alerts are in play at any one time. Client software has a simple interface, which allows users to run updates and various scans. Others might prefer to offer the end user the opportunity to do an update or run a scan, which might be more applicable to a roaming user, a travelling salesman away from the office, for example.
Our only criticism of the page is that we could not find a direct link to it — this would be a small but useful addition. Behavioral detection successfully blocked ransomware. This is a managed detection and response service responsible for proactively looking for malicious activities and adversaries nation state, eCrime, or hacktivist actors in Falcon customer environments. Undoing this bundle of settings is easy to do, and normal client operation will return. From here, you can create installer files for the endpoints and either choose to run the installer at the endpoint itself, or use a push installation.
The user is normally informed that such a protocol is in place and that the administrator is enforcing enhanced policy. Reporting options can be found under Administration ServerReports. These are then dispatched to the clients. Part 2: Ongoing use Kaspersky Lab make use of the Microsoft Management Console framework for the administration interface. Finally, we consider remediation and outbreak containment. All of these are clear and clean, but more designed to be used through the web console.
Part 3: Remediation and outbreak containment Understanding what is happening across a large installation base is the core functionality of CrowdStrike. The Assessment menu gives access to the underlying reports. User policies lets you define user profiles, with defaults set to either Read-only access, Basic access default for standard users or Full Access for administrators. The main console has a menu structure down the left-hand side which is clear and clean. If the timing had been just slightly different, we might have passed off the story as an April Fool's joke, but it really happened. This power comes with a need to thoroughly understand the platform, and it requires a layered multi-user security approach to its daily management. Most important is the ability to assign an event to a user to manage that alert, and ensure it is appropriately dealt with.
Targeted at medium to large enterprises and organizations. There is also a documentation download page: , but this not appear to have any documents relating to Business Antivirus Pro Plus. The Policies page lets the admin view, create and edit configuration policies for network computers. Dashboard, Network, Policies, Reports, Quarantine, Accounts. Part 1: Product Installation and deployment The product is wholly managed from a cloud-based console.