SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Lumension®
Content Wizard:
Eliminating Security Gaps
and Automating Tedious
Tasks

•Rene Gonzalez, Product Management
•Andrea Hilwig, Solution Marketing



March 6, 2012




          PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Introduction to LCW
Business Challenges

                                            • Many vulnerability solutions cover specific
                                              software and applications, but don’t expand to
                                              custom in-house software detection and
                                              remediation.

                                            • PC configuration-related issues continuously
                                              increase your IT staff’s workload and introduce
                                              new sources of risk every day

                                            • Tedious manual system management tasks
                                              consume too much time, effort, and resources

                                            • Organizations are more distributed than ever
                                              before, making software distribution and
                                              management a major challenge



3
       PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
What is Lumension® Content Wizard (LCW)?

LCW simplifies the creation and management of custom software patches,
scripts, and desktop configurations to improve IT efficiencies and your overall
security posture.

                                                        » Extends the capabilities of Lumension®
                                                          Patch and Remediation (Add-On) and
                                                          L.E.M.S.S.
                                                        » Automates tedious and time-consuming
                                                          system and desktop management tasks
                                                        » Simplifies policy creation and baseline
                                                          enforcement through the use of wizards –
                                                          without requiring additional tools or
                                                          expertise
                                                        » Create and centrally manage power
                                                          policy settings to reduce IT power
                                                          consumption


4
            PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Key Features & Benefits
Feature                                                       Benefit
Flexible Content Creation and                                 Optimizes IT Efficiencies & Reduces IT Costs
Management                                                    and Ensures Entire Network Security
Wizard-based Content Authoring                                Optimizes IT Resources by Simplifying Patch
                                                              Creation
Centralized Power Management                                  Reduces Endpoint Energy Costs and
                                                              Enforces Green Policies
Custom Script Management and                                  Simplifies remediation package development
Development                                                   and provides centralized deployment,
                                                              management and reporting on all custom IT
                                                              scripts.
Enforcement of Local Security                                 Increases the overall security posture
Configuration Policy
Software Deployment, Upgrades and                             Optimizes IT Efficiencies and Improves
Removal                                                       Software Usage Compliance
Centralized Management of System                              Optimizes IT Resources and Increases
Desktop Configuration Tasks and Policies                      Compliance


5
           PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
LCW Wizards
• Simple wizard-based policy creation
  and baseline enforcement – without
  requiring additional tools:

    »   Patch Creation
    »   Software Installs and Uninstalls
    »   Windows Security Policies
    »   Power Management Policies
    »   NEW! Windows Firewall Policies




6
               PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Inside The Content
Content Signature Structure


                                  Content




              Signature                              Signature




Fingerprint         Fingerprint        Fingerprint          Prerequisite


              Package                                Package


8
Content Signature Structure
.PLF is a compressed archive that contains the
Signatures, Fingerprint, Prerequisites, and the Remediation Script

• Signature
    » Determines Operating System
      Applicability
       •   Ex: Windows Vista, 7, Server
           2008

• Fingerprint
    » Determines detection status
       •   Patched, Not Patched
                                                                  • Package
• Prerequisite                                                        » Remediation
    » Another Layer of Applicability                                      •   Fix it or make a change to the system
       •   Ex: Detect for Adobe Reader,                               » Script
           MS Outlook
                                                                          •   Script Engine to execute the patch or
                                                                              make a change to the system
                                                                                    .VBS, .JS, Command or BAT
9
               PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Demo
Q&A
For more Information…
Go to www.lumension.com > Products > Lumension Content Wizard

                                     • Decreased IT complexity
• More   on Lumension® Content Wizard
                                     • Security-Optimized Infrastructure
    »   On-Demand Demos              • Increased ROI for System Center
    »   Guided Tour
    »   Datasheet
    »   Free 1-on-1 Demonstrations
    »   Free Trial Evaluation


• Contact   Lumension Today!
    » 1.888.725.7828
    » info@lumension.com
Appendix
What’s new in 7.1?

Feature                                        Benefit
Windows Firewall Wizard                        Administrators are now able to detect and define
                                               Windows Firewall Policies for Windows Vista and higher
                                               operating systems.
Role-Based Access Control for                  Content authors can now create and modify content
LCW                                            without requiring SQL SysAdmin fixed server role.
MSU Compatibility                              Windows Stand-alone Installer (MSU) was first
                                               introduced by Microsoft in Windows Vista and higher.
                                               MSU is a new Package Manager that is designed to
                                               patch the base operating system. 7.1 extends the
                                               existing New Patch Wizard capabilities to support this
                                               new file type so the wizard can easily create the
                                               detection and remediation signatures.
Compiled HTML Help (.chm)                      Get instant help by pressing <f1> within the LCW User
                                               Interface.


14
           PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
LCW Best Practices

• Create a custom group for testing your content
     » Make sure your group represents your environment
        • Windows XP / 2003
        • Windows 7 / Windows 2008


• Assign a custom Agent Policy Set and change the Patch Module
  communication interval to 5 minutes
     » Reduces the time to wait for the detection results to appear in the L.E.M.S.S.
       Web Console, or Leverage the Listener Port.

• Turn off the following settings in the Tools > Options > Agents Page
     » DAU should be run after subscription replication
        •   Improves system performance
     » DAU should be run after inventory change
        •   Improves system performance



15
               PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255

1.888.725.7828
info@lumension.com




        PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Weitere ähnliche Inhalte

Andere mochten auch

The Future of Employee Benefits
The Future of Employee BenefitsThe Future of Employee Benefits
The Future of Employee Benefits
hitexoma
 

Andere mochten auch (11)

Open Enrollment for 2017 Benefits
Open Enrollment for 2017 BenefitsOpen Enrollment for 2017 Benefits
Open Enrollment for 2017 Benefits
 
The Future of Employee Benefits
The Future of Employee BenefitsThe Future of Employee Benefits
The Future of Employee Benefits
 
Intertwined Guidelines: Untangling Your Enrollment Notice Requirement
Intertwined Guidelines: Untangling Your Enrollment Notice RequirementIntertwined Guidelines: Untangling Your Enrollment Notice Requirement
Intertwined Guidelines: Untangling Your Enrollment Notice Requirement
 
Automating Employee Benefits Administration and Management
Automating Employee Benefits Administration and ManagementAutomating Employee Benefits Administration and Management
Automating Employee Benefits Administration and Management
 
The Benefits of Working at The Hershey Company (US Version 2015)
The Benefits of Working at The Hershey Company (US Version 2015)The Benefits of Working at The Hershey Company (US Version 2015)
The Benefits of Working at The Hershey Company (US Version 2015)
 
Starting Your Corporate Wellness Program: Ideas and Compliance for HR Pros
Starting Your Corporate Wellness Program: Ideas and Compliance for HR ProsStarting Your Corporate Wellness Program: Ideas and Compliance for HR Pros
Starting Your Corporate Wellness Program: Ideas and Compliance for HR Pros
 
My benefits icon
My benefits iconMy benefits icon
My benefits icon
 
Shifting Gears: The Post-Open Enrollment Landscape
Shifting Gears: The Post-Open Enrollment LandscapeShifting Gears: The Post-Open Enrollment Landscape
Shifting Gears: The Post-Open Enrollment Landscape
 
Your budget wizard
Your budget wizard Your budget wizard
Your budget wizard
 
Proving Grounds: Answer the Call with Effective FMLA Administration
Proving Grounds: Answer the Call with Effective FMLA AdministrationProving Grounds: Answer the Call with Effective FMLA Administration
Proving Grounds: Answer the Call with Effective FMLA Administration
 
Constructing HRA: Blueprints for Solid Administration
Constructing HRA: Blueprints for Solid AdministrationConstructing HRA: Blueprints for Solid Administration
Constructing HRA: Blueprints for Solid Administration
 

Mehr von Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 

Mehr von Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Lumension Content Wizard: Eliminating Security Gaps and Automating Tedious Tasks

  • 1. Lumension® Content Wizard: Eliminating Security Gaps and Automating Tedious Tasks •Rene Gonzalez, Product Management •Andrea Hilwig, Solution Marketing March 6, 2012 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 3. Business Challenges • Many vulnerability solutions cover specific software and applications, but don’t expand to custom in-house software detection and remediation. • PC configuration-related issues continuously increase your IT staff’s workload and introduce new sources of risk every day • Tedious manual system management tasks consume too much time, effort, and resources • Organizations are more distributed than ever before, making software distribution and management a major challenge 3 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 4. What is Lumension® Content Wizard (LCW)? LCW simplifies the creation and management of custom software patches, scripts, and desktop configurations to improve IT efficiencies and your overall security posture. » Extends the capabilities of Lumension® Patch and Remediation (Add-On) and L.E.M.S.S. » Automates tedious and time-consuming system and desktop management tasks » Simplifies policy creation and baseline enforcement through the use of wizards – without requiring additional tools or expertise » Create and centrally manage power policy settings to reduce IT power consumption 4 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 5. Key Features & Benefits Feature Benefit Flexible Content Creation and Optimizes IT Efficiencies & Reduces IT Costs Management and Ensures Entire Network Security Wizard-based Content Authoring Optimizes IT Resources by Simplifying Patch Creation Centralized Power Management Reduces Endpoint Energy Costs and Enforces Green Policies Custom Script Management and Simplifies remediation package development Development and provides centralized deployment, management and reporting on all custom IT scripts. Enforcement of Local Security Increases the overall security posture Configuration Policy Software Deployment, Upgrades and Optimizes IT Efficiencies and Improves Removal Software Usage Compliance Centralized Management of System Optimizes IT Resources and Increases Desktop Configuration Tasks and Policies Compliance 5 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 6. LCW Wizards • Simple wizard-based policy creation and baseline enforcement – without requiring additional tools: » Patch Creation » Software Installs and Uninstalls » Windows Security Policies » Power Management Policies » NEW! Windows Firewall Policies 6 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 8. Content Signature Structure Content Signature Signature Fingerprint Fingerprint Fingerprint Prerequisite Package Package 8
  • 9. Content Signature Structure .PLF is a compressed archive that contains the Signatures, Fingerprint, Prerequisites, and the Remediation Script • Signature » Determines Operating System Applicability • Ex: Windows Vista, 7, Server 2008 • Fingerprint » Determines detection status • Patched, Not Patched • Package • Prerequisite » Remediation » Another Layer of Applicability • Fix it or make a change to the system • Ex: Detect for Adobe Reader, » Script MS Outlook • Script Engine to execute the patch or make a change to the system .VBS, .JS, Command or BAT 9 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 10. Demo
  • 11. Q&A
  • 12. For more Information… Go to www.lumension.com > Products > Lumension Content Wizard • Decreased IT complexity • More on Lumension® Content Wizard • Security-Optimized Infrastructure » On-Demand Demos • Increased ROI for System Center » Guided Tour » Datasheet » Free 1-on-1 Demonstrations » Free Trial Evaluation • Contact Lumension Today! » 1.888.725.7828 » info@lumension.com
  • 14. What’s new in 7.1? Feature Benefit Windows Firewall Wizard Administrators are now able to detect and define Windows Firewall Policies for Windows Vista and higher operating systems. Role-Based Access Control for Content authors can now create and modify content LCW without requiring SQL SysAdmin fixed server role. MSU Compatibility Windows Stand-alone Installer (MSU) was first introduced by Microsoft in Windows Vista and higher. MSU is a new Package Manager that is designed to patch the base operating system. 7.1 extends the existing New Patch Wizard capabilities to support this new file type so the wizard can easily create the detection and remediation signatures. Compiled HTML Help (.chm) Get instant help by pressing <f1> within the LCW User Interface. 14 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 15. LCW Best Practices • Create a custom group for testing your content » Make sure your group represents your environment • Windows XP / 2003 • Windows 7 / Windows 2008 • Assign a custom Agent Policy Set and change the Patch Module communication interval to 5 minutes » Reduces the time to wait for the detection results to appear in the L.E.M.S.S. Web Console, or Leverage the Listener Port. • Turn off the following settings in the Tools > Options > Agents Page » DAU should be run after subscription replication • Improves system performance » DAU should be run after inventory change • Improves system performance 15 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 16. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION