Languardeval en
Languardeval en
Evaluator’s Guide - Getting the best benefits out of a GFI LanGuard Trial
The information and content in this document is provided for informational purposes only and is provided "as is"
with no warranty of any kind, either express or implied, including but not limited to the implied warranties of
merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages,
including any consequential damages, of any kind that may result from the use of this document. The information is
obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data
provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of
information and is not responsible for misprints, out-of-date information, or errors. GFI makes no warranty, express or
implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained
in this document.
If you believe there are any factual errors in this document, please contact us and we will review your concerns as
soon as practical.
All product and company names herein may be trademarks of their respective owners.
GFI LanGuard is copyright of GFI SOFTWARE - 1999-2016 GFI Software. All rights reserved.
Document Version: 12.0
Last updated (month/day/year): 09/05/2016
Contents
1 Introduction 4
1.1 GFI LanGuard overview 4
1.2 The GFI LanGuard Central Management Server 5
1.3 Why do customers purchase GFI LanGuard? 5
1.4 Obtaining an evaluation key 9
5 Automate tasks 40
5.1 Automatically discover new devices in the network 40
5.2 Automate security audits 41
5.3 Automate patch download 43
5.4 Automate remediation operations 44
5.5 Automate reports generation 49
6 Glossary 50
7 Index 57
1 Introduction
Thank you for evaluating GFI LanGuard. The aim of this guide is to help you get the maximum benefit out of your GFI
LanGuard trial.
In the next sections, our guidelines will help you prove the benefits to yourself and anyone else involved in the
decision-making process.
Use Reports > Mobile Device Audit report to get an overview of what smartphones and tablets connect to the
company’s Microsoft Exchange servers and detect if they have outdated operating systems, with known security issues
Reports can be configured to generate on a regular basis
GFI LanGuard ships, out of the box, with a set of predefined reports dedicated to compliance with PCI DSS, HIPAA, SOX,
GLBA and PSN CoCo amongst others. More details on PCI DSS are available here.
Here is a list with some of the most important standards related to IT infrastructure security:
Payment Card Industry Data Security Standard (PCI DSS)
Health Insurance Portability and Accountability Act (HIPAA)
Sarbanes–Oxley Act (SOX)
Gramm–Leach–Bliley Act (GLB/GLBA)
Federal Information Security Management Act (FISMA)
Family Educational Rights and Privacy Act (FERPA)
Children's Internet Protection Act (CIPA)
Public Sector Network - Code of Connection (PSN CoCo)
European Union Data Protection Directive
European Union Directive on Privacy and Electronic Communications
Note:
Administrative access to the remote machines is required for comprehensive security audit results.
2. Progress of scheduled scans can be followed using Activity Monitor > Security Scans:
Important:
An Agent may be designated a Relay Agent, which allows remediation to be performed more efficiently and using
less network bandwidth for multi-site or large networks. The Relay Agent stores a local copy of the patch data
(normally stored on the GFI LanGuard server) and this is used to remediate nearby computers.
Note:
For more information about Relay Agents refer to the Administrator Guide that can be downloaded from here.
To enable agents:
1. Click Configuration > Manage Agents
Note:
If a refresh of the security information is required,you can trigger on-demand agent scans using the Scan and
refresh now option from the Dashboard.
Note:
Mobile devices audit is agent-less. The supported systems are: Google Android, Apple iOS and Windows Phone.
Use Configuration > Mobile Devices to add or edit mobile device management sources.
Mobile device scans can be monitored using Activity Monitor > Security Scans. Scan results for mobile devices can be
seen in the dashboard or by generating reports. Mobile device audit report is dedicated to the scan results retrieved for
smartphones and tablets.
Note:
Email notifications can be sent to mobile device owners to inform them about operating system security updates
available for their device.
Feature Description
Scan and This option immediately triggers a security audit that runs in background for the selected computers. On the com
refresh puters where the agent is installed, the scan will be performed by the agent and under the scanning profile defined
information for the agent. For the computers where the agent is not available an agent-less scan is scheduled to run in back
now ground using Full Scan profile. Use Activity Monitor > Security Scans to monitor both agent-based scans and agent-
less scheduled scans.
Custom This option will select the Scan tab with the scan target already prefilled with the list of computers that were selec
scan ted in the Dashboard.
Section Description
This section provides information about how area to view and manage devices scanned and protected by GFI LanGuard:
Servers and workstations are listed under Entire Network node, as well as virtual machines and IP based network
devices such as routers, switches, printers, etc.
Smartphones and tablets that connect to the Microsoft Exchanger servers of the company to check work email are lis
ted under Mobile Devices node
The icon on the right side of the tree indicates the vulnerability level or if an audit is in progress
Computers having blue text are virtual machines
Use <CTRL> + click to select multiple computers
This section allows the user to trigger actions for the devices selected in the tree.
This section allows the user to select different views with statistics and scan results for the devices selected in the tree.
This section provides information about viewing statistics and scan results details for the devices selected in the tree:
Security sensors indicate how many devices are affected by different security issues
Click on the security sensors or the charts from Dashboard Overview area to drill down to more specific data
Note:
If a valid email recipient is configured in Alerting Options configuration, GFI LanGuard by default sends a Daily
Digest report containing the history view of the entire network for the last 24 hours.
To audit smartphones and tablets use Configuration > Mobile Devices to add or edit mobile device management
sources (provide details on Microsoft Exchange servers).
Search results can be grouped by a particular category. It is also possible to exclude results found in other categories.
3.8 Reporting
GFI LanGuard comes with a large set of predefined executive, technical and statistical reports. All reports can be
customized, rebranded, scheduled to be generated on a regular basis and exported to various popular formats amongst
which PDF, HTML, RTF, XLS.
In addition,GFI LanGuard ships with a large set of reports dedicated to compliance with various standards and laws,
amongst which PCI DSS, HIPAA, SOX, GLBA, PSN CoCo.
Note:
Multiple items can be selected in the computers tree using <CTRL> + click.
To locate computers more easily in large networks, computers from the tree can be filtered by a large number of
criteria. For more information, refer to How to filter devices (page 23).
In the Deploy Software Updates screen you can see all missing updates for the selected computers with details for each
update on which of the selected computers is missing. It is possible to fine tune the deployment by selecting or
deselecting patches or computers.
4. Rescan the machines to get their security status after the deployment was done.
Note:
A large number of updates require a reboot of the target machine for the deployment to complete.
If an update is still seen as missing after a deployment operation, make sure the machine was rebooted.
Note:
GFI LanGuard can be configured to automatically deploy missing updates. For more information, refer to
Automate remediation operations (page 44).
Note:
It is possible to add unauthorized applications even if they are not detected as installed in the network by using the
“Add…” button.
2. Use Configuration > Auto-Uninstall Validation to test if GFI LanGuard is able to successfully uninstall an unau
thorized application silently.
Note:
Some applications do not support silent uninstall and they cannot be removed by GFI LanGuard because the
uninstall process will show dialogs to the end users of the target machines, waiting for their input and interfering
with their work.
5. Rescan the machines to get their security status once uninstall is done.
Note:
GFI LanGuard can be configured to automatically detect and remove any unauthorized application from your
network. For more information, refer to Automate remediation operations (page 44).
Note:
Custom software must be specified manually, together with parameters for silent installation and configuration files,
if necessary.
To automatically detect when new computers are added to a certain domain or organizational unit:
1. From Dashboard, right click on the domain or organizational unit in the computers tree and select Network Dis
covery…
2. From Dashboard select History to investigate what new devices were detected in the network and when they were
seen for the first time.
Note:
New mobile devices are automatically detected on regular basis once a Mobile Device Management Source is
defined. For more information see auditing smartphones and tablets section.
Note:
Define unauthorized applications and approve security updates for auto deployment before continuing.
A
Access™
A Microsoft® desktop relational database management system included in the Microsoft® Office package.
Access™ is normally used for small databases.
Anti-spyware
A software countermeasure that detects spyware installed on a computer without the user's knowledge.
Antivirus
A software countermeasure that detects malware installed on a computer without the user's knowledge.
Applications auto-uninstall
An action that enables the auto-uninstall of applications that support silent uninstall from GFI LanGuard.
Auto-download
A GFI LanGuard technology that automatically downloads missing patches and service packs in all 38 lan
guages.
Auto-patch management
A GFI LanGuard technology that automatically downloads missing Microsoft® updates and deploys them
over the network.
Auto-remediation
A GFI LanGuard technology that automatically downloads and deploy missing patches. If an application
is blacklisted in GFI LanGuard, auto-remediation will uninstall the application from the target computer
during scheduled operations.
B
Backdoor program
An alternative method used to access a computer or computer data over a network.
Batch-files
A text files containing a collection of instructions to be carried out by an operating system or an applic
ation.
Blacklist
A list of USBs or Network devices names that are considered as dangerous. When a USB\Network device
name contains a blacklisted entry while scanning a network, GFI LanGuard will report the device as a
security threat (High security vulnerability).
Bulletin Information
Contains a collection of information about a patch or a Microsoft® update. Used in GFI LanGuard to
provide more information on an installed patch or update. Information includes; Bulletin id, title, descrip
tion, URL and file size.
C
Common Gateway Interface (CGI)
A communication script used by web servers to transfer data to a client internet browser.
D
Dashboard
A graphical representation that indicates the status of various operations that might be currently active,
or that are scheduled.
deploycmd.exe
A GFI LanGuard command line tool, used to deploy Microsoft® patches and third party software on target
computers.
DMZ
A section of a network that is not part of the internal network and is not directly part of the Internet. Its
purpose typically is to act as a gateway between internal networks and the internet.
DNS
A database used by TCP/IP networks that enables the translation of hostnames into IP numbers and to
provide other domain related information.
F
File Transfer Protocol
A protocol used to transfer files between network computers.
FTP
A protocol used to transfer files between network computers.
G
GFI EndPointSecurity
A security solution developed by GFI that helps organizations to maintain data integrity by preventing
unauthorized access and transfers from removable devices.
GPO
An Active Directory centralized management and configuration system that controls what users can and
cannot do on a computer network.
I
ICMP pings
The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite. It
is used by the operating systems of networked computers to send error messages indicating, for example,
that a requested service is not available or that a host or router could not be reached. ICMP can also be
used to relay query messages.
impex.exe
A Command line tool, used to Import and Export profiles and vulnerabilities from GFI LanGuard.
L
Linux
An open source operating system that is part of the Unix operating system family.
lnsscmd.exe
A GFI LanGuard command line tool that allows running vulnerability checks against network targets.
Local Host
In networking, the local host is the computer you are currently using. One can reference to the local host
by using the reserved IP address 127.0.0.1. In this manual the Local host is the machine where GFI
LanGuard is installed.
M
Mail server
The server that manages and stores client emails.
Malware
Composed from malicious and software, malware is a general term used for all software developed to
harm and damage a computer system. Viruses, worms and Trojans are all type of malware.
Microsoft® IIS
A set of Internet-based services created by Microsoft® Corporation for internet servers.
Microsoft® WSUS
An acronym for Microsoft® Windows Server Update Services. This service enables administrators to man
age the distribution of Microsoft® updates to network computers.
N
NETBIOS
An acronym for Network Basic Input/output. This system provides services to allow applications on dif
ferent computers within a network to communicate with each other.
Netscape
A web browser originally developed by Netscape Communications Corporation.
OVAL
A standard that promotes open and publicly available security content, and standardizes the transfer of
this information across the entire spectrum of security tools and services.
P
Patch agent
A background service that handles the deployment of patches, service packs and software updates on
target computers.
Python scripting
A high-level computer programming scripting language.
R
Remote Desktop Protocol
A protocol developed by Microsoft® to enable clients to connect with the user interface of a remote com
puter.
S
SANS
An acronym for System Administration, Networking and Security research organization. An institute that
shares solutions regarding system and security alerts.
Scan profiles
A collection of vulnerability checks that determine what vulnerabilities are identified and which inform
ation will be retrieved from scanned targets.
Script Debugger
A GFI LanGuard module that allows you to write and debug custom scripts using a VBScript-compatible
language.
SNMP
Acronym for Simple Network Management Protocol, a technology used to monitor network devices such
as, routers, hubs and switches.
Spyware
A form of malware intended to collect information from a computer without notifying the user.
SQL Server®
A Microsoft® relational database management system. Microsoft® included extra functionality to the SQL
Server® (transaction control, exception handling and security) so that Microsoft SQL Server® can support
large organizations.
SSH Module
A module used to determine the result of vulnerability checks through the console (text) data produced
by an executed script. This means that you can create custom Linux/UNIX vulnerability checks using any
scripting method that is supported by the target-s Linux/UNIX OS and which outputs results to the con
sole in text.
T
TCP ports
Acronym for Transmitting Control Protocol. This protocol is developed to allow applications to transmit
and receive data over the internet using the well-known computer ports.
Terminal Services
A service that allows connecting to a target computer and managing its installed applications and
stored data.
Traceroute tool
A tool used to identify the path that GFI LanGuard followed to reach a target computer.
Trojans
A form of malware that contains a hidden application that will harm a computer.
U
UDP ports
An acronym for User Datagram Protocol, these used to transfer UDP data between devices. In this pro
tocol received packets are not acknowledged.
URL
The Uniform Resource Locator is the address of a web page on the world wide web.
Virus
A form of malware that infects a computer. The aim of a virus is to harm a computer by corrupting files
and applications. A virus is a self-replicating program and can copy itself all over the computer system.
W
Web server
A server that provides web pages to client browsers using the HTTP protocol.
White-list
A list of USBs or Network devices names that are not considered as dangerous. When a USB/Network
device name contains a white-listed entry while scanning a network, GFI LanGuard will ignore the device
and consider it as a safe source.
Whois tool
A tool that enables you to look up information on a particular domain or IP address.
Wi-Fi/Wireless LAN
A technology used commonly in local area networks. Network nodes use data transmitted over radio
waves instead of cables to communicate with each other.
X
XML
An open text standard used to define data formats. GFI LanGuard uses this standard to import or export
scanned saved results and configuration.