SlideShare a Scribd company logo
1 of 21
Management Consulting | IAM and Data Protection | Governance Risk and Compliance

System Center
Endpoint Protection 2012 R2
Norman W. Mayes CISSP, MCSE: Private Cloud, ITIL-F
February 2014

© 2014 Edgile, Inc. – All Rights Reserved
Table of Contents

System Center Endpoint
Protection 2012 R2

1

Key Features and Benefits

2

Competitive Protection

2
System Center Endpoint Protection

Key Features and Benefits
Simplified
Administration

Comprehensive Protection Stack
Real time Endpoint Protection operations from console
Malware-driven operations from the console
Client-side merge of antimalware policies

Single administrator
experience for simplified
endpoint protection and
management

© 2014 Edgile, Inc. – All Rights Reserved

Simplified, 3X delivery of definitions through software updates
New and improved Endpoint Protection client

3
System Center Endpoint Protection

Comprehensive Protection Stack
Building on Windows Platform Security
System Center Configuration Manager and Endpoint Protection

Management

Software
Updates +
SCUP

Endpoint
Protection
Management

Settings
Management

Operating
System
Deployment

Software
Distribution

MDM

System Center 2012 Endpoint Protection

Antimalware

Antimalware

Behavior
Monitoring

Dynamic
Translation

Vulnerability
Shielding

Windows
Defender
Offline

Cloud Clean
Restore

ELAM and
Measured
Boot

Windows
AppLocker

BitLocker

Data
Execution
Prevention

Address Space
Layout
Randomization

Windows
Resource
Protection

Platform

Internet
Explorer

Secure Boot
Through UEFI

Early Launch
Antimalware
(ELAM)

Measured
Boot

User Access
Control

Available only in Windows 8.x
© 2014 Edgile, Inc. – All Rights Reserved

4
System Center Endpoint Protection

Real-Time Operations
 Endpoint protection operations
to clients in
<1 minute
 Available Endpoint
protection operations:
–
–
–
–
–
–

Run definition updates
Run quick scan
Run full scan
Allow threats
Exclude paths and/or files
Restore files quarantined by
threat

© 2014 Edgile, Inc. – All Rights Reserved

5
System Center Endpoint Protection

Malware Driven Operations
Admin can easily view and take follow up actions on
specific malware by type, and remediation status

© 2014 Edgile, Inc. – All Rights Reserved

6
System Center Endpoint Protection

Client-Side Merge
Endpoint Protection Policies
 Create granular policies
for specific scenarios and
have those merged on
the clients
 Removes overhead
of redundant policies
 Policies still honors relative
priority, and merge when
possible (exclusions, for
example)

© 2014 Edgile, Inc. – All Rights Reserved

7
System Center Endpoint Protection

Software Update Integration
Architectural Changes to Support Updates 3X per Day
 Category-based scans from clients
 Delta synchs between Software Update Point (SUP) and WSUS

Architectural Changes to Simplify SUP Setup
 Source top-level SUP from internal WSUS server
 Simplified, fault tolerant software update point setup (add multiple SUPs
as needed, up to 8 per Primary Site no NLB or active SUP requirements)
– Multiple SUP model is built for fault tolerance
– Best performance comes from using a shared SUSDB for your software update points
– Clients are optimized to NOT switch SUPs, and only do so after 4 failures (@ 30 minute
intervals)
– Full cross-forest support of SUPs including untrusted forests
– Clients optimized to fallback to SUPs within their own forest first
– Use Group Policy preferences if setting a WSUS server for client deployments

© 2014 Edgile, Inc. – All Rights Reserved

8
System Center Endpoint Protection

Software Update Overview
Hierarchy (Forest1)

Hierarchy (Forest2)

Primary Site
Software
Update Point 1

Software
Update Point 2

Software
Update Point 3

Software
Update Point 4

4X

Client

Client
Client.Forest1

© 2014 Edgile, Inc. – All Rights Reserved

Client.Forest2

9
System Center Endpoint Protection

Enhanced Protection
Enhanced Protection

Common antimalware platform across Microsoft AM clients

Proactive protection against known and unknown threats
Integration with UEFI Trusted Boot, early-launch antimalware
Reduced complexity while protecting clients
Protect against known and
unknown threats with
endpoint inspection at
behavior, application, and
network levels

© 2014 Edgile, Inc. – All Rights Reserved

Heterogeneous antimalware clients

Competitive protection: Endpoint Protection vs. Trend Micro

10
System Center Endpoint Protection

Common Antimalware Platform
Platform Overview
 Common platform for all of Microsoft’s antimalware clients
 Security Essentials alone has +100 million users (#1 in North America)
 +660 million executions of Malicious Software Removal Tool per month
 All of these clients service Microsoft’s protection services research
and response

Diagnostic
and Recovery
Toolkit

© 2014 Edgile, Inc. – All Rights Reserved

Windows
Defender
Offline

11
System Center Endpoint Protection

Reduced Complexity
Simple Interface
 Minimal, high-level user
interactions
Administrative Control
 User configurability options
 Central policy enforcement
 UI Lockdown and disable
Maintains High Productivity
 CPU throttling during scans
 Faster scans through
advanced caching
 Minimal network and client
© 2014 Edgile, Inc. – All Rights Reserved

12
System Center Endpoint Protection

Heterogeneous Antimalware Clients
Features
 Anti-virus and anti-malware support
 Machines connect directly to internet service for security content
 Client UI for user visibility and control
 SCOM monitoring pack for Linux with management control
Platforms
 Native support for Windows 8.1 and Windows Server 2012 R2
 Apple Mac (10.6-10.7)
 Linux Server: RedHat Enterprise 6, SuSE Linux 11

© 2014 Edgile, Inc. – All Rights Reserved

13
Table of Contents

System Center Endpoint
Protection 2012 R2

1

Key Features and Benefits

2

Competitive Protection

14
System Center Endpoint Protection

Competitive Protection
CHALLENGERS

Endpoint Protection

LEADERS
Symantec

McAfee

Trend
Micro

Kaspersky Lab
Sophos
Microsoft

Eset
Bitdefender

Ability to Execute

F-Secure

Panda Security
Webroot
IBM

Check Point
Software Technologies

LANDesk
Lumension
Security
ThreatTrack
Security

BeyondTrust

NICHE PLAYERS

Completeness of Vision

© 2014 Edgile, Inc. – All Rights Reserved

Arkoon
Network
Security

VISIONARIES

As of January 2014

 Microsoft's malware lab benefits from a vast
installation of the consumer version of the SCEP
engine and its online system check
utilities, which provide a large distribution of
malware samples
 System Center Configuration Manager
supports a dedicated endpoint protection role
configuration. SCEP also allows on-demand
signature updates from the cloud for suspicious
files and previously unknown malware
 Organizations licensed under Microsoft's
Enterprise CAL or Core CAL program receive
SCEP at no additional cost. Approximately onethird of enterprise customers are actively
considering Microsoft, during their next renewal
periods
 Microsoft offers advanced system file
cleaning, which replaces infected system files
with clean versions from a trusted Microsoft
cloud

15
System Center Endpoint Protection

Competitive Protection
Endpoint Protection Challenges
 Microsoft System Center Configuration Manager is
a prerequisite to SCEP
 Microsoft's client anti-malware protection approach:
– Industry test scores are not has high as some competitors
– Focused on reducing the impact of prevalent malware in the
Windows installed base with the lowest false-positive rates in
the industry

 SCEP does not have some advanced features other
endpoint security solutions include
– Microsoft leverages other Windows security features: Windows
Firewall, BitLocker, AppLocker and Group Policy Objects
© 2014 Edgile, Inc. – All Rights Reserved

16
System Center Endpoint Protection

Competitive Protection
Trend Micro’s Challenges
 Historically, Trend Micro has been very conservative with new EPP
capabilities, such as encryption and application control
 The core endpoint offerings – OfficeScan and Deep Security – are two
separate products from separate teams with separate consoles. Deep Security
has not been integrated into TMCM for deployment and policy
management, but it has been integrated from a security reporting perspective

 Some capabilities (like encryption) that have been integrated into TMCM still
require their native consoles to be deployed, but from that point
forward, they can be managed within TMCM
 Trend Micro's installed base and market share in North America and EMEA
are not as strong as in Asia/Pacific

 There is no out-of-the-box security state assessment beyond the EPP agent
status, and no significant integration with operations tools, such as
vulnerability assessments
© 2014 Edgile, Inc. – All Rights Reserved

17
System Center Endpoint Protection

Competitive Protection
Cost Avoidance Potential
System Center 2012 R2 server
management licensing maximizes value
while simplifying purchasing. All server
management licenses (SMLs) include the
same components and the ability to
manage any workload. System Center
2012 R2 SMLs are available in two
editions differentiated by virtualization
rights only:
 Datacenter: Maximizes cloud capacity
with unlimited virtualization for high
density private clouds

 Standard: For lightly or non-virtualized
private cloud workloads.

© 2014 Edgile, Inc. – All Rights Reserved

Edition

Components Included
Operations Manager

Microsoft
System Center
2012 R2
Datacenter

Configuration Manager
Data Protection Manager

Service Manager
Virtual Machine Manager

Microsoft
System Center
2012 R2
Standard

Endpoint Protection
Orchestrator
App Controller

18
System Center Endpoint Protection

Competitive Protection
Cost Avoidance Potential
 Server Management Licenses are required for
managed devices that run server Operating
System Environments (OSEs). Licenses are
processor-based, with each license covering up
to two physical processors.
 The number of Server MLs required for each
managed server is determined by the number of
physical processor in the server for Datacenter
Edition and either number of physical processors
in the server or number of OSEs being managed
for Standard Edition (whichever is greater).

Example
4 Servers with 4 Cores
Each to Support System Center Roles

4 Servers * 4 Cores / 2 = 6 Server ML Licenses

© 2014 Edgile, Inc. – All Rights Reserved

Server ML Edition Comparison:
Datacenter

Standard

# of physical processors
per license

2

2

# of Managed Operating
System Environments
(OSEs) per license

Unlimited

2

Includes all System Center
server management
components

Yes

Yes

Right to run management
server software and
supporting SQL Server
Runtime (SQL Server
Standard Edition)

Yes

Yes

Manage any type of
supported workload

Yes

Yes

$3,607

$1,323

Open No Level (NL) License
and Software Assurance
(L&SA) 2-year price

19
System Center Endpoint Protection

Competitive Protection
Configuration
Manager
Client ML

Cost Avoidance Potential
Client Management Licenses (MLs)
are required for managed devices
that run non-server OSEs. There are
three System Center 2012 R2 Client
ML offerings:

Components
Included

Endpoint
Protection
Subscription

Client
Management
Suite Client
ML

Configuration
Manager

Endpoint
Protection

Service
Manager

Virtual
Machine
Manager

Operations
Manager
Data
Protection
Manager

 Configuration Manager Client ML

Orchestrator

 Endpoint Protection Subscription
 Client Management Suite Client
ML

Included in
Core CAL
Suite

Yes

Yes

No

Core CAL and Enterprise CAL Suites
will continue to be the most cost
effective way to purchase client
management products.

Included in
Enterprise
CAL Suite

Yes

Yes

Yes

Open NL
L&SA 2-year
price

$62

$22

$121

© 2014 Edgile, Inc. – All Rights Reserved

20
Wrap Up | Questions and Answers

Norman W. Mayes
425.749.7447
Norman.Mayes@Edgile.com

© 2014 Edgile, Inc. – All Rights Reserved

21

More Related Content

What's hot

System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementC/D/H Technology Consultants
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012Amit Gatenyo
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical OverviewAmit Gatenyo
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewAmit Gatenyo
 
System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 OverviewAmit Gatenyo
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural OverviewBrian Dickhaus
 
System Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekSystem Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekC/D/H Technology Consultants
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012ebuc
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
System Center Data Protection Manager 2012 Overview
System Center Data Protection Manager 2012 OverviewSystem Center Data Protection Manager 2012 Overview
System Center Data Protection Manager 2012 OverviewAmit Gatenyo
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing ModelIvanti
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationShahab Al Yamin Chawdhury
 
System Center Orchestrator 2012 Overview
System Center Orchestrator 2012 OverviewSystem Center Orchestrator 2012 Overview
System Center Orchestrator 2012 OverviewAmit Gatenyo
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Abdelslam Elsobky
 

What's hot (20)

SCCM 2012 Presentation
SCCM 2012 PresentationSCCM 2012 Presentation
SCCM 2012 Presentation
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical Overview
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 
System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 Overview
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
 
System Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekSystem Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak Peek
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
scom
scomscom
scom
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
System Center Data Protection Manager 2012 Overview
System Center Data Protection Manager 2012 OverviewSystem Center Data Protection Manager 2012 Overview
System Center Data Protection Manager 2012 Overview
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing Model
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
 
System Center Orchestrator 2012 Overview
System Center Orchestrator 2012 OverviewSystem Center Orchestrator 2012 Overview
System Center Orchestrator 2012 Overview
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 

Viewers also liked

Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
Microsoft system center 2012 r2 configuration manager
Microsoft system center 2012 r2 configuration managerMicrosoft system center 2012 r2 configuration manager
Microsoft system center 2012 r2 configuration managerapponix1
 
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012ITCamp
 
World Population Datasheet 2008
World Population Datasheet 2008World Population Datasheet 2008
World Population Datasheet 2008richm711
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
What's New in System Center 2012
What's New in System Center 2012 What's New in System Center 2012
What's New in System Center 2012 Perficient, Inc.
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
 
Arun SCCM Profile
Arun SCCM Profile Arun SCCM Profile
Arun SCCM Profile Arun M
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overviewfannaq786
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012DDLS
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-labDPA
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012JasonCondo
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerDigicomp Academy AG
 
SolarWinds Patch Manager Compared to Shavlik / VMware
SolarWinds Patch Manager Compared to Shavlik / VMwareSolarWinds Patch Manager Compared to Shavlik / VMware
SolarWinds Patch Manager Compared to Shavlik / VMwareSolarWinds
 
Powershell Training
Powershell TrainingPowershell Training
Powershell TrainingFahad Noaman
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Herman Arnedo
 
Up is Down, Black is White: Using SCCM for Wrong and Right
Up is Down, Black is White: Using SCCM for Wrong and RightUp is Down, Black is White: Using SCCM for Wrong and Right
Up is Down, Black is White: Using SCCM for Wrong and Rightenigma0x3
 
Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1Unitek Eduation
 

Viewers also liked (20)

Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Microsoft system center 2012 r2 configuration manager
Microsoft system center 2012 r2 configuration managerMicrosoft system center 2012 r2 configuration manager
Microsoft system center 2012 r2 configuration manager
 
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
ITCamp 2011 - Adrian Stoian - System Center Configuration Manager 2012
 
World Population Datasheet 2008
World Population Datasheet 2008World Population Datasheet 2008
World Population Datasheet 2008
 
Ultima 14th March
Ultima 14th MarchUltima 14th March
Ultima 14th March
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
What's New in System Center 2012
What's New in System Center 2012 What's New in System Center 2012
What's New in System Center 2012
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
Arun SCCM Profile
Arun SCCM Profile Arun SCCM Profile
Arun SCCM Profile
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration Manager
 
SolarWinds Patch Manager Compared to Shavlik / VMware
SolarWinds Patch Manager Compared to Shavlik / VMwareSolarWinds Patch Manager Compared to Shavlik / VMware
SolarWinds Patch Manager Compared to Shavlik / VMware
 
Powershell Training
Powershell TrainingPowershell Training
Powershell Training
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
 
Up is Down, Black is White: Using SCCM for Wrong and Right
Up is Down, Black is White: Using SCCM for Wrong and RightUp is Down, Black is White: Using SCCM for Wrong and Right
Up is Down, Black is White: Using SCCM for Wrong and Right
 
Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1
 

Similar to System Center Endpoint Protection

System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
System Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerSystem Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerNorman Mayes
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET Journal
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application VirtualizationAmit Gatenyo
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk Corporation
 
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Jeff Fisher
 
Microsoft SoftGrid Application Virtualization
Microsoft SoftGrid Application VirtualizationMicrosoft SoftGrid Application Virtualization
Microsoft SoftGrid Application VirtualizationJeff Fisher
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieCor Ranzijn
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)Kimber Spradlin
 
Exploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by RamcoExploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by RamcoIndiaMART InterMESH Ltd
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1Paul O'Doherty
 

Similar to System Center Endpoint Protection (20)

System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
System Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerSystem Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine Manager
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Sudheendra
SudheendraSudheendra
Sudheendra
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
 
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
 
Microsoft SoftGrid Application Virtualization
Microsoft SoftGrid Application VirtualizationMicrosoft SoftGrid Application Virtualization
Microsoft SoftGrid Application Virtualization
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategie
 
Resume_Padmaja
Resume_PadmajaResume_Padmaja
Resume_Padmaja
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)
 
Exploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by RamcoExploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by Ramco
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1
 

More from Scientia Groups

Brute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupBrute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupScientia Groups
 
Delivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiDelivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiScientia Groups
 
NSA Best Practices Datasheets
NSA Best Practices DatasheetsNSA Best Practices Datasheets
NSA Best Practices DatasheetsScientia Groups
 
Cybercriminals target online banking
Cybercriminals target online bankingCybercriminals target online banking
Cybercriminals target online bankingScientia Groups
 
Partners Guide - System Center
Partners Guide - System CenterPartners Guide - System Center
Partners Guide - System CenterScientia Groups
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudScientia Groups
 
2010 1 22 Partner Marketing Call Welcome Rotating Deck
2010 1 22 Partner Marketing Call Welcome Rotating Deck2010 1 22 Partner Marketing Call Welcome Rotating Deck
2010 1 22 Partner Marketing Call Welcome Rotating DeckScientia Groups
 
Quarterly Marketing Call Presentation 1 22 10
Quarterly  Marketing  Call  Presentation 1 22 10Quarterly  Marketing  Call  Presentation 1 22 10
Quarterly Marketing Call Presentation 1 22 10Scientia Groups
 

More from Scientia Groups (11)

Brute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupBrute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected Setup
 
Delivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiDelivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefi
 
NSA Best Practices Datasheets
NSA Best Practices DatasheetsNSA Best Practices Datasheets
NSA Best Practices Datasheets
 
Zeus and Antivirus
Zeus and AntivirusZeus and Antivirus
Zeus and Antivirus
 
Cybercriminals target online banking
Cybercriminals target online bankingCybercriminals target online banking
Cybercriminals target online banking
 
Dgmdv 1
Dgmdv 1Dgmdv 1
Dgmdv 1
 
Partners Guide - System Center
Partners Guide - System CenterPartners Guide - System Center
Partners Guide - System Center
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
2010 1 22 Partner Marketing Call Welcome Rotating Deck
2010 1 22 Partner Marketing Call Welcome Rotating Deck2010 1 22 Partner Marketing Call Welcome Rotating Deck
2010 1 22 Partner Marketing Call Welcome Rotating Deck
 
Quarterly Marketing Call Presentation 1 22 10
Quarterly  Marketing  Call  Presentation 1 22 10Quarterly  Marketing  Call  Presentation 1 22 10
Quarterly Marketing Call Presentation 1 22 10
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

System Center Endpoint Protection

  • 1. Management Consulting | IAM and Data Protection | Governance Risk and Compliance System Center Endpoint Protection 2012 R2 Norman W. Mayes CISSP, MCSE: Private Cloud, ITIL-F February 2014 © 2014 Edgile, Inc. – All Rights Reserved
  • 2. Table of Contents System Center Endpoint Protection 2012 R2 1 Key Features and Benefits 2 Competitive Protection 2
  • 3. System Center Endpoint Protection Key Features and Benefits Simplified Administration Comprehensive Protection Stack Real time Endpoint Protection operations from console Malware-driven operations from the console Client-side merge of antimalware policies Single administrator experience for simplified endpoint protection and management © 2014 Edgile, Inc. – All Rights Reserved Simplified, 3X delivery of definitions through software updates New and improved Endpoint Protection client 3
  • 4. System Center Endpoint Protection Comprehensive Protection Stack Building on Windows Platform Security System Center Configuration Manager and Endpoint Protection Management Software Updates + SCUP Endpoint Protection Management Settings Management Operating System Deployment Software Distribution MDM System Center 2012 Endpoint Protection Antimalware Antimalware Behavior Monitoring Dynamic Translation Vulnerability Shielding Windows Defender Offline Cloud Clean Restore ELAM and Measured Boot Windows AppLocker BitLocker Data Execution Prevention Address Space Layout Randomization Windows Resource Protection Platform Internet Explorer Secure Boot Through UEFI Early Launch Antimalware (ELAM) Measured Boot User Access Control Available only in Windows 8.x © 2014 Edgile, Inc. – All Rights Reserved 4
  • 5. System Center Endpoint Protection Real-Time Operations  Endpoint protection operations to clients in <1 minute  Available Endpoint protection operations: – – – – – – Run definition updates Run quick scan Run full scan Allow threats Exclude paths and/or files Restore files quarantined by threat © 2014 Edgile, Inc. – All Rights Reserved 5
  • 6. System Center Endpoint Protection Malware Driven Operations Admin can easily view and take follow up actions on specific malware by type, and remediation status © 2014 Edgile, Inc. – All Rights Reserved 6
  • 7. System Center Endpoint Protection Client-Side Merge Endpoint Protection Policies  Create granular policies for specific scenarios and have those merged on the clients  Removes overhead of redundant policies  Policies still honors relative priority, and merge when possible (exclusions, for example) © 2014 Edgile, Inc. – All Rights Reserved 7
  • 8. System Center Endpoint Protection Software Update Integration Architectural Changes to Support Updates 3X per Day  Category-based scans from clients  Delta synchs between Software Update Point (SUP) and WSUS Architectural Changes to Simplify SUP Setup  Source top-level SUP from internal WSUS server  Simplified, fault tolerant software update point setup (add multiple SUPs as needed, up to 8 per Primary Site no NLB or active SUP requirements) – Multiple SUP model is built for fault tolerance – Best performance comes from using a shared SUSDB for your software update points – Clients are optimized to NOT switch SUPs, and only do so after 4 failures (@ 30 minute intervals) – Full cross-forest support of SUPs including untrusted forests – Clients optimized to fallback to SUPs within their own forest first – Use Group Policy preferences if setting a WSUS server for client deployments © 2014 Edgile, Inc. – All Rights Reserved 8
  • 9. System Center Endpoint Protection Software Update Overview Hierarchy (Forest1) Hierarchy (Forest2) Primary Site Software Update Point 1 Software Update Point 2 Software Update Point 3 Software Update Point 4 4X Client Client Client.Forest1 © 2014 Edgile, Inc. – All Rights Reserved Client.Forest2 9
  • 10. System Center Endpoint Protection Enhanced Protection Enhanced Protection Common antimalware platform across Microsoft AM clients Proactive protection against known and unknown threats Integration with UEFI Trusted Boot, early-launch antimalware Reduced complexity while protecting clients Protect against known and unknown threats with endpoint inspection at behavior, application, and network levels © 2014 Edgile, Inc. – All Rights Reserved Heterogeneous antimalware clients Competitive protection: Endpoint Protection vs. Trend Micro 10
  • 11. System Center Endpoint Protection Common Antimalware Platform Platform Overview  Common platform for all of Microsoft’s antimalware clients  Security Essentials alone has +100 million users (#1 in North America)  +660 million executions of Malicious Software Removal Tool per month  All of these clients service Microsoft’s protection services research and response Diagnostic and Recovery Toolkit © 2014 Edgile, Inc. – All Rights Reserved Windows Defender Offline 11
  • 12. System Center Endpoint Protection Reduced Complexity Simple Interface  Minimal, high-level user interactions Administrative Control  User configurability options  Central policy enforcement  UI Lockdown and disable Maintains High Productivity  CPU throttling during scans  Faster scans through advanced caching  Minimal network and client © 2014 Edgile, Inc. – All Rights Reserved 12
  • 13. System Center Endpoint Protection Heterogeneous Antimalware Clients Features  Anti-virus and anti-malware support  Machines connect directly to internet service for security content  Client UI for user visibility and control  SCOM monitoring pack for Linux with management control Platforms  Native support for Windows 8.1 and Windows Server 2012 R2  Apple Mac (10.6-10.7)  Linux Server: RedHat Enterprise 6, SuSE Linux 11 © 2014 Edgile, Inc. – All Rights Reserved 13
  • 14. Table of Contents System Center Endpoint Protection 2012 R2 1 Key Features and Benefits 2 Competitive Protection 14
  • 15. System Center Endpoint Protection Competitive Protection CHALLENGERS Endpoint Protection LEADERS Symantec McAfee Trend Micro Kaspersky Lab Sophos Microsoft Eset Bitdefender Ability to Execute F-Secure Panda Security Webroot IBM Check Point Software Technologies LANDesk Lumension Security ThreatTrack Security BeyondTrust NICHE PLAYERS Completeness of Vision © 2014 Edgile, Inc. – All Rights Reserved Arkoon Network Security VISIONARIES As of January 2014  Microsoft's malware lab benefits from a vast installation of the consumer version of the SCEP engine and its online system check utilities, which provide a large distribution of malware samples  System Center Configuration Manager supports a dedicated endpoint protection role configuration. SCEP also allows on-demand signature updates from the cloud for suspicious files and previously unknown malware  Organizations licensed under Microsoft's Enterprise CAL or Core CAL program receive SCEP at no additional cost. Approximately onethird of enterprise customers are actively considering Microsoft, during their next renewal periods  Microsoft offers advanced system file cleaning, which replaces infected system files with clean versions from a trusted Microsoft cloud 15
  • 16. System Center Endpoint Protection Competitive Protection Endpoint Protection Challenges  Microsoft System Center Configuration Manager is a prerequisite to SCEP  Microsoft's client anti-malware protection approach: – Industry test scores are not has high as some competitors – Focused on reducing the impact of prevalent malware in the Windows installed base with the lowest false-positive rates in the industry  SCEP does not have some advanced features other endpoint security solutions include – Microsoft leverages other Windows security features: Windows Firewall, BitLocker, AppLocker and Group Policy Objects © 2014 Edgile, Inc. – All Rights Reserved 16
  • 17. System Center Endpoint Protection Competitive Protection Trend Micro’s Challenges  Historically, Trend Micro has been very conservative with new EPP capabilities, such as encryption and application control  The core endpoint offerings – OfficeScan and Deep Security – are two separate products from separate teams with separate consoles. Deep Security has not been integrated into TMCM for deployment and policy management, but it has been integrated from a security reporting perspective  Some capabilities (like encryption) that have been integrated into TMCM still require their native consoles to be deployed, but from that point forward, they can be managed within TMCM  Trend Micro's installed base and market share in North America and EMEA are not as strong as in Asia/Pacific  There is no out-of-the-box security state assessment beyond the EPP agent status, and no significant integration with operations tools, such as vulnerability assessments © 2014 Edgile, Inc. – All Rights Reserved 17
  • 18. System Center Endpoint Protection Competitive Protection Cost Avoidance Potential System Center 2012 R2 server management licensing maximizes value while simplifying purchasing. All server management licenses (SMLs) include the same components and the ability to manage any workload. System Center 2012 R2 SMLs are available in two editions differentiated by virtualization rights only:  Datacenter: Maximizes cloud capacity with unlimited virtualization for high density private clouds  Standard: For lightly or non-virtualized private cloud workloads. © 2014 Edgile, Inc. – All Rights Reserved Edition Components Included Operations Manager Microsoft System Center 2012 R2 Datacenter Configuration Manager Data Protection Manager Service Manager Virtual Machine Manager Microsoft System Center 2012 R2 Standard Endpoint Protection Orchestrator App Controller 18
  • 19. System Center Endpoint Protection Competitive Protection Cost Avoidance Potential  Server Management Licenses are required for managed devices that run server Operating System Environments (OSEs). Licenses are processor-based, with each license covering up to two physical processors.  The number of Server MLs required for each managed server is determined by the number of physical processor in the server for Datacenter Edition and either number of physical processors in the server or number of OSEs being managed for Standard Edition (whichever is greater). Example 4 Servers with 4 Cores Each to Support System Center Roles 4 Servers * 4 Cores / 2 = 6 Server ML Licenses © 2014 Edgile, Inc. – All Rights Reserved Server ML Edition Comparison: Datacenter Standard # of physical processors per license 2 2 # of Managed Operating System Environments (OSEs) per license Unlimited 2 Includes all System Center server management components Yes Yes Right to run management server software and supporting SQL Server Runtime (SQL Server Standard Edition) Yes Yes Manage any type of supported workload Yes Yes $3,607 $1,323 Open No Level (NL) License and Software Assurance (L&SA) 2-year price 19
  • 20. System Center Endpoint Protection Competitive Protection Configuration Manager Client ML Cost Avoidance Potential Client Management Licenses (MLs) are required for managed devices that run non-server OSEs. There are three System Center 2012 R2 Client ML offerings: Components Included Endpoint Protection Subscription Client Management Suite Client ML Configuration Manager Endpoint Protection Service Manager Virtual Machine Manager Operations Manager Data Protection Manager  Configuration Manager Client ML Orchestrator  Endpoint Protection Subscription  Client Management Suite Client ML Included in Core CAL Suite Yes Yes No Core CAL and Enterprise CAL Suites will continue to be the most cost effective way to purchase client management products. Included in Enterprise CAL Suite Yes Yes Yes Open NL L&SA 2-year price $62 $22 $121 © 2014 Edgile, Inc. – All Rights Reserved 20
  • 21. Wrap Up | Questions and Answers Norman W. Mayes 425.749.7447 Norman.Mayes@Edgile.com © 2014 Edgile, Inc. – All Rights Reserved 21