using SCCM 2012 RC in a LAB – Part 5. Enable the Endpoint Protection Role and configure Endpoint Protection settings

In Part 1 of this series we got our AD and SCCM servers ready, and then we installed System Center 2012 Configuration Manager as a standalone Primary site. In Part 2 we configured the SCCM server further by adding some Windows Server roles necessary for the following Configuration Manager 2012 functionality, Software Update Point (SUP) and Operating System Deployment. In Part 3 we configured the server further by Enabling some Discovery methods and creating Boundary’s and Boundary Groups. In Part 4 we configured Client Settings, Added roles and Distributed the Configmgr Client to our Computers within the LAB, now we will enable the Endpoint Protection Role and configure Endpoint Protection settings and we will target All Windows 7 Computers with these settings and policies.

Note: In Part 2 we selected Definition Updates in the Classifications
screen to support Endpoint Protection as part of the SUP role setup, if
you havn’t completed that part then do so now before continuing.

Below is an Introduction to Endpoint Protection in Configuration Manager, for more info see the following on Technet – http://technet.micro…y/hh508781.aspx

When you use Endpoint Protection with Configuration Manager, you benefit from the following:

  • You
    can configure antimalware policies and Windows Firewall settings to
    selected groups of computers, by using custom antimalware policies and
    client settings.
  • You can use Configuration Manager software
    updates to download the latest antimalware definition files to keep
    client computers up-to-date.
  • You can send email
    notifications, use in-console monitoring, and view reports to keep
    administrative users informed when malware is detected on client
    computers.

Endpoint Protection installs its own client, which is in addition to the
Configuration Manager client. The Endpoint Protection client has the
following capabilities:

  • Malware and Spyware detection and remediation.
  • Rootkit detection and remediation.
  • Critical vulnerability assessment and automatic definition and engine updates.
  • Integrated Windows Firewall management.
  • Network vulnerability detection via Network Inspection System.

Recommended Reading:-

Prerequisites for Endpoint Protection in Configuration Manager – http://technet.micro…y/hh508780.aspx
Best Practices for Endpoint Protection in Configuration Manager – http://technet.micro…y/hh508771.aspx
Administrator Workflow for Endpoint Protection in Configuration Manager – http://technet.micro…y/hh526775.aspx

Step 1. Configure the Endpoint Protection Role

Perform the following on the SCCM server as SMSadmin

Note: The Endpoint Protection point site system role must be installed before you can use Endpoint Protection or before you can set EndPoint Protection client settings. It must be installed on one site system server only and it must be installed at the top of the hierarchy on a central administration site or a standalone primary site.

In the configmgr console, click on Administration, expand Overview and expand Site Configuration, select Servers and Site System Roles and click on Home in the Ribbon and click on Add Site System Roles.

Attached Image: monthly_11_2011/post-1-0-94399500-1320494351.png

when the wizard appears click next

Attached Image: monthly_11_2011/post-1-0-25941900-1320494506.png

Select the Endpoint Protection Point role and click next

Attached Image: monthly_11_2011/post-1-0-39892300-1320494581.png

Read and then accept the License Agreement terms

Attached Image: monthly_11_2011/post-1-0-05427200-1320494953.png

Next you get some choices about Microsoft Active Protection service, you can opt in, or opt out, let’s select Basic Membership.

Attached Image: monthly_11_2011/post-1-0-31005600-1320495294.png

click next at the summary and review the status on the completion screen.

Attached Image: monthly_11_2011/post-1-0-11115200-1320495418.png

within a few minutes you’ll see the Endpoint Protection client appear in
the System Tray of your ConfigMgr Server (this is normal behaviour and
is expected, you must have the SCEP client installed on your ConfigMgr
Server hosting the Endpoint Protection role).

Attached Image: monthly_11_2011/post-1-0-40302600-1320495651.png

Note: you can review the EPSetup.log on the server to monitor role installation progress.

Step 2. Configure alerts for Endpoint Protection

Perform the following on the SCCM server as SMSadmin

Note: Alerts inform the administrator when specific events have
occurred, such as a malware infection. Alerts can be displayed in the
Configuration Manager console, through reports, or optionally can be
emailed to specified users. You can configure Endpoint Protection alerts in System Center 2012 Configuration Manager to notify administrative users when specific security events occur in your hierarchy. Notifications display in the Endpoint Protection dashboard in the Configuration Manager console, in reports, and you can configure them to be emailed to specified recipients.

Configure Email Notification (Optional)

If you have access to an SMTP server then you can optionally configure Email Notification Alerts. In the configmgr console, click on Administration, expand Overview and expand Site Configuration, select Sites and click on Settings in the ribbon and click on Configure Site Components and select Email Notification.

Attached Image: monthly_01_2012/post-1-0-79731900-1325432012.png

enter your desired settings for SMTP and click Apply. Note that you can test your SMTP settings also.

Attached Image: monthly_01_2012/post-1-0-97369800-1325429138.png

Configure Alerts for Collections

Next let’s configure Alerts for a Collection, but first let’s create a collection called All Windows 7 Computers (in a LAB this is fine for what we want to do, in Production you should create EndPoint Protection specific Collections).

Note:- You cannot configure alerts for User Collections.Click on Assets and Complicance in the console,click on Device Collections and in the ribbon click on Create Device Collection.

Attached Image: monthly_11_2011/post-1-0-80791600-1320497289.png

Call the collection All Windows 7 Computers and limit it to All Systems

Attached Image: monthly_11_2011/post-1-0-30364400-1320497447.png

click next, choose Query Rule from the drop down menu and fill in a Query like so (edit query statement, criteria, show query language and replace the code with the below)

select *  from  SMS_R_System where SMS_R_System.OperatingSystemNameandVersion like "%Workstation 6.1%"

Attached Image: monthly_11_2011/post-1-0-62881100-1320497601.png

set the schedule as follows (it’s a LAB)

Attached Image: monthly_11_2011/post-1-0-64953300-1321278523.png

click next through the wizard, the collection is now created.

Attached Image: monthly_11_2011/post-1-0-53142400-1320497938.png

In Assets and Compliance select Devices and choose Device Collections, select the All Windows 7 Computers collection (we have no computers in this collection yet but we will have soon), choose properties

Attached Image: monthly_11_2011/post-1-0-98805700-1320498042.png

Click on the Alerts tab and place a checkmark in View this collection in the Endpoint Protection Dashboard

Attached Image: monthly_11_2011/post-1-0-90669000-1320498259.png

click on Add and select all the options

Attached Image: monthly_11_2011/post-1-0-50472000-1320498329.png

click ok and leave the other Alert settings as they are

Attached Image: monthly_11_2011/post-1-0-33476600-1320498451.png

Step 3. Configure the SUP Products to Sync and Perform a Sync

Perform the following on the SCCM server as SMSadmin

Click on Administration, expand Overview and expand Site Configuration, select Sites and click on Settings in the ribbon and click on Configure Site Components and select Software Update Point.

Attached Image: monthly_11_2011/post-1-0-35445300-1320503044.png

In the Products tab ensure that the product Forefront Endpoint Protection 2010 check box is selected.

Attached Image: monthly_11_2011/post-1-0-65920600-1320503320.png

change the Sync Schedule to 1 days

Attached Image: monthly_11_2011/post-1-0-11498900-1320503381.png

Click on Software Library, Software Updates, right click on All Software Updates and choose Synchronize Software Updates

Attached Image: monthly_11_2011/post-1-0-65754700-1320503499.png

answer Yes to the Sync

Attached Image: monthly_11_2011/post-1-0-33544900-1320503585.png

at this point you can review the Wsyncmgr.log in CMtrace

Attached Image: monthly_11_2011/post-1-0-90024400-1320503874.png

Step 4. Configure SUP to deliver Definition Updates using an Automatic Deployment Rule

Perform the following on the SCCM server as SMSadmin

In the Configuration Manager console, click Software Library, expand Software Updates and click on Automatic Deployment Rules

Attached Image: monthly_11_2011/post-1-0-42068800-1320499462.png

in the Ribbon click on Create Automatic Deployment Rule and the wizard appears, give the rule a suitable name like Automatic Deployment Rule for Endpoint Protection and point it to our previously created All Windows 7 Computers collection, select add to an exisiting software update group

Attached Image: monthly_01_2012/post-1-0-37079700-1325755495.png

On the Deployment Settings page of the wizard select Minimal from the Detail level drop-down list and then click Next this reduces State Messages returned and thus reduces Configuration Manager server load

Attached Image: monthly_11_2011/post-1-0-56084100-1320499984.png

on the Software Updates page select Date Released or Revised

Attached Image: monthly_11_2011/post-1-0-12767000-1320500225.png

in the Search Criteria pane, click on Value to find and select Last 1 day

Attached Image: monthly_11_2011/post-1-0-64302400-1320500325.png

In the Products tab ensure that the product Forefront Endpoint Protection 2010 check box is selected.
Attached Image: monthly_01_2012/post-1-0-71495700-1325759725.png

for Evaluation Schedule, click on Customize and set it to run every 1 days

Attached Image: monthly_11_2011/post-1-0-87110600-1320501115.png

for Deployment Schedule set Time based on: UTC
(if you want all clients in the hierarchy to install the latest
definitions at the same time. This setting is a recommended best
practice.), for software available select 2 hours to allow sufficient time for the Deployment to reach all Distribution Points and select As soon as possible for the installation Deadline.

Attached Image: monthly_01_2012/post-1-0-32653800-1325759859.png

for the User Visual Experience select Hide from the drop down menu

Attached Image: monthly_11_2011/post-1-0-92104200-1320501653.png

for Alerts enable the option to generate an alert

Attached Image: monthly_11_2011/post-1-0-69551100-1320501964.png

for download settings as the definition updates are important let’s download them even if on slow networks

Attached Image: monthly_11_2011/post-1-0-57283400-1320502056.png

For Deployment Package we are creating a new one so give it a suitable name like Endpoint Protection Definition Updates and point it to a previously created folder

Note: Make sure that \\sccm\sources\updates\Endpoint
(or whatever path you choose) exists otherwise the wizard will fail
below when it tries to Download as the Network Path won’t exist. In
addition
Everytime this ADR runs it
will want to create a new deployment package as specified above, we do
not want this to happen so after running the ADR once, retire it and
create a new ADR except this time point the deployment package to the
packaged which is now created called Endpoint Protection Definition
Updates.

Attached Image: monthly_11_2011/post-1-0-80928100-1320502419.png

click your way through the rest of the Wizard till completion

Attached Image: monthly_11_2011/post-1-0-05498300-1320502516.png

if you scroll to the right you’ll see nothing has been downloaded, yet…(because our Automatic Deployment Rule hasn’t run yet since the sync)

Attached Image: monthly_11_2011/post-1-0-66201900-1320504574.png

so let’s force the Automatic Deployment Rule to run now, right click on our ADR and choose Run Now

Attached Image: monthly_11_2011/post-1-0-40052400-1320504689.png

and after a few minutes look at our Definition Updates again, notice the difference ?

Attached Image: monthly_11_2011/post-1-0-28830000-1320504782.png

Step 5. Configure Custom Client Settings for Endpoint Protection

Perform the following on the SCCM server as SMSadmin

Note: Do not configure the default Endpoint Protection client settings unless you are sure that you want these applied to all computers in your hierarchy.

Below is an explanation of the EndPoint Protection settings available:-

Quote

Manage Endpoint Protection client on client computers

  • Select True if you want to manage existing Endpoint Protection clients on computers in your hierarchy.
  • Select
    this option if you have already installed the Endpoint Protection
    client and want to manage it with Configuration Manager.
  • You
    should also select this option if you want to create a script to
    uninstall an existing antimalware solution, install the Endpoint
    Protection client and deploy this script using a Configuration Manager
    application or package and program.

Install Endpoint Protection client on client computers

  • Select True to install and enable the Endpoint Protection client on client computers where it is not already installed.

Automatically remove previously installed antimalware software before Endpoint Protection is installed

  • Select True to uninstall existing antimalware software.

Posted ImageNote Endpoint Protection uninstalls the following antimalware software only:

All current Microsoft antimalware products except for Windows InTune and Microsoft Security Essentials
Symantec AntiVirus Corporate Edition version 10
Symantec Endpoint Protection version 11
Symantec Endpoint Protection Small Business Edition version 12
Mcafee VirusScan Enterprise version 8
Trend Micro OfficeScan

Suppress any required computer restart after the Endpoint Protection client installed

  • Select True to suppress a computer restart if it is required after the Endpoint Protection client installs.

Allowed period of time users can postpone a required restart to complete the Endpoint Protection installation (hours)

  • Specify
    the number of hours that users can postpone a computer restart if this
    is required after the Endpoint Protection client installs.

Disable alternate sources (such as Windows Update,
Microsoft Windows Server Update Services or UNC shares) for the initial
definition update on client computers

  • Select True
    if you want to allow only Configuration Manager to install the initial
    definition update on client computers. This setting can be helpful to
    avoid unnecessary network connections and reduce network bandwidth
    during the initial installation of the definition update.

In the Configuration Manager console, click Administration, click Client Settings and on the Home tab in the Create group, click Create Custom Client Device Settings.

Attached Image: monthly_11_2011/post-1-0-56209000-1320505088.png

Select Endpoint Protection and call it Custom Client Device Endpoint Protection Settings

Attached Image: monthly_11_2011/post-1-0-76132700-1320505290.png

click on Endpoint Protection and review the settings, change them to as follows:-

  • Manage Endpoint Protection Client on Client Computers = True
  • Install Endpoint Protection Client on Client Computers = True
  • Automatically remove previously installed antimalware software before Endpoint Protection is installed = True
  • Suppress any required computer restart after the Endpoint Protection client installed = False
  • Allowed period of time users can postpone a required restart to complete the Endpoint Protection installation (hours) = 1
  • Disable
    alternate sources (such as Windows Update, Microsoft Windows Server
    Update Services or UNC shares) for the initial definition update on
    client computers = True

Attached Image: monthly_11_2011/post-1-0-55874600-1321538221.png

click ok when done, right click on the new custom settings and choose Deploy

Attached Image: monthly_11_2011/post-1-0-67026200-1320505634.png

select our All Windows 7 Computers collection and choose Ok.

Attached Image: monthly_11_2011/post-1-0-21133700-1320505701.png

Step 6. Configure Custom AntiMalware Policies

Perform the following on the SCCM server as SMSadmin

Note: Do not configure the default client Malware Policy unless you are sure that you want these applied to all computers in your hierarchy.

There are several pre-created AntiMalware Policies available, to review/use them click on Import. (see screenshot below)

Attached Image: monthly_11_2011/post-1-0-44349500-1321906796.png

We will create our own policy in this LAB so in the Configuration Manager console, click Assets and Compliance, click Endpoint Protection, select Antimalware Policies. In the ribbon select Create Antimalware Policy

Attached Image: monthly_11_2011/post-1-0-09880800-1320506036.png

give the policy a name like Custom Endpoint Protection Antimalware Policy

Attached Image: monthly_11_2011/post-1-0-39905100-1320506161.png

for Scheduled scans change to Daily at 12 pm
(default was Saturday, 2am) and set it to check for latest definition
updates before the scan and to randomize the scan start time

Attached Image: monthly_11_2011/post-1-0-98359700-1320506488.png

for Definition Updates set the check to 2 hours and click on set source, only select Updates distributed from Configuration Manager (deselet the other options)

Note: if your SCCM server has no internet access you can configure it to check for updates from UNC file shares

Attached Image: monthly_11_2011/post-1-0-71619300-1320506687.png

Click Ok, Ok.

Right click our Custom Endpoint Protection Antimalware Policy and select Deploy, choose our All Windows 7 Computers Collection as we did for the Device settings above.

Attached Image: monthly_11_2011/post-1-0-03882300-1320506828.png

that’s it we are done !

we have now created custom Client Device settings and a Custom Antimalware Policy for our All Windows 7 Computers collection, in further posts we will add some computers to that collection and verify our Endpoint Protection settings.

The original post is here on windows-noob.com

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.