Symantec 360R Administration Guide - Page 104

How antivirus policy enforcement (AVpe) works

Page 104 highlights

104 Advanced network traffic control How antivirus policy enforcement (AVpe) works How antivirus policy enforcement (AVpe) works AVpe monitors the AV configuration of supported Symantec connected policy masters and client workstations attempting to gain access to your corporate network. See the Symantec Gateway Security 300 Series Release Notes for the version of the product you are using to determine the supported AV products and how their configuration and usage differs from the following information. AVpe works in two different environments: a network with an internal Symantec AntiVirus Corporate Edition server that maintains antivirus information or a network of clients that are unmanaged. If your network has an internal Symantec AntiVirus Corporate Edition server, when you configure AVpe, you designate a primary and (optionally) a secondary antivirus server that is accessible to your network through LAN or WAN connections. If your network has clients that are unmanaged, you designate one client as master, and all other clients verify their versions against the master. The first time an internal client requests a DHCP connection, attempts an external connection, or any time a client initiates a VPN tunnel (originating from your LAN or remotely through the Internet), the appliance retrieves the client's antivirus policy configuration and compares it against the current antivirus policy requirements. If the client is not in compliance, the traffic is warned or blocked (as indicated when you configure AVpe) and a message is logged. You can configure the appliance to monitor client or server configurations at specified intervals (the default setting is every 10 minutes). Once a client is connected, the appliance rechecks the client's antivirus compliance at userdefined intervals. After the specified interval (the default interval is eight hours), clients are re-queried to check for compliance. If the AV policy master shows updates were made, the clients are allowed an eight-hour grace period (the default LiveUpdate interval on unmanaged clients) where they will still be compliant if they have the last AV policy master definition version. After this period, the clients will be considered non-compliant with the AV policy. Table 7-1 describes client compliance and the subsequent actions taken. Table 7-1 Client compliance actions If the client is Compliant with current antivirus policies Antivirus protection is outof-date Then Client is granted access to the firewall. The connection is allowed to pass, but the appliance logs a warning or completely blocks access, depending on the option you select.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

104
Advanced network traffic control
How antivirus policy enforcement (AVpe) works
How antivirus policy enforcement (AVpe) works
AVpe monitors the AV configuration of supported Symantec connected policy
masters and client workstations attempting to gain access to your corporate
network. See the Symantec Gateway Security 300 Series Release Notes for the
version of the product you are using to determine the supported AV products
and how their configuration and usage differs from the following information.
AVpe works in two different environments: a network with an internal
Symantec AntiVirus Corporate Edition server that maintains antivirus
information or a network of clients that are unmanaged.
If your network has an internal Symantec AntiVirus Corporate Edition server,
when you configure AVpe, you designate a primary and (optionally) a secondary
antivirus server that is accessible to your network through LAN or WAN
connections. If your network has clients that are unmanaged, you designate one
client as master, and all other clients verify their versions against the master.
The first time an internal client requests a DHCP connection, attempts an
external connection, or any time a client initiates a VPN tunnel (originating
from your LAN or remotely through the Internet), the appliance retrieves the
client’s antivirus policy configuration and compares it against the current
antivirus policy requirements. If the client is not in compliance, the traffic is
warned or blocked (as indicated when you configure AVpe) and a message is
logged.
You can configure the appliance to monitor client or server configurations at
specified intervals (the default setting is every 10 minutes). Once a client is
connected, the appliance rechecks the client’s antivirus compliance at user-
defined intervals. After the specified interval (the default interval is eight
hours), clients are re-queried to check for compliance. If the AV policy master
shows updates were made, the clients are allowed an eight-hour grace period
(the default LiveUpdate interval on unmanaged clients) where they will still be
compliant if they have the last AV policy master definition version. After this
period, the clients will be considered non-compliant with the AV policy.
Table 7-1
describes client compliance and the subsequent actions taken.
Table 7-1
Client compliance actions
If the client is
Then
Compliant with current
antivirus policies
Client is granted access to the firewall.
Antivirus protection is out-
of-date
The connection is allowed to pass, but the appliance logs
a warning or completely blocks access, depending on the
option you select.