A four

By Cameron Sturdevant  |  Posted 2005-10-31 Print this article Print

-server set-up"> We installed LANDesk Security Suite 8.6 on one virtual server and on three other servers running Microsoft Corp.s Windows Server 2003. We used one of these servers as a normal DHCP server; one as a LANDesk Security Suite 8.6 posture validation server; one as a remediation server; and, finally, one as a LANDesk DHCP server. Companies can assign several functions to a single server for testing LANDesk prior to widescale deployment, but we found it much easier to allocate functions to separate servers.

In our tests, the LANDesk DHCP server acted as the network access control point that brokered device admittance to our protected network. Although it was finicky to set up, the whole thing did eventually work as promised. LANDesk Security Suite 8.6 ably downloaded security content, including patches and vulnerability and spyware definitions, as well as a wide variety of anti-virus and firewall configuration definitions.

This information comprised the threat definitions, and we were able to create policies that allowed or denied end-user device access to our networks based on these definitions.

We configured security policies that specified the required patch level and configuration of anti-virus programs, plus a variety of other factors, including firewall configuration and checks for spyware on end-user systems. The results of the policy check were examined, along with the length of time since the last scan of the end-user device. If the end-user device passed the posture check, then LANDesk ensured that all other authorizations and user authentications were correct and then the end-user device was admitted to our test network.

Next Page: Tons of tinkering.

Cameron Sturdevant Cameron Sturdevant has been with the Labs since 1997, and before that paid his IT management dues at a software publishing firm working with several Fortune 100 companies. Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility, with a focus on Android in the enterprise. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his reviews and analysis are grounded in real-world concern. Cameron is a regular speaker at Ziff-Davis Enterprise online and face-to-face events. Follow Cameron on Twitter at csturdevant, or reach him by email at csturdevant@eweek.com.

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel