0% found this document useful (0 votes)
4 views

POC Sign Off Report (Example)

The document is a sign-off report for the InDefend Advanced Proof of Concept (PoC) deployment for a client, detailing approvals from both the customer and partner. It outlines the scope, client requirements, and the InDefend Advanced solution, including various use cases demonstrated during the PoC. Additionally, it provides recommendations for full-scale implementation based on the performance of the tested machines.

Uploaded by

rgupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

POC Sign Off Report (Example)

The document is a sign-off report for the InDefend Advanced Proof of Concept (PoC) deployment for a client, detailing approvals from both the customer and partner. It outlines the scope, client requirements, and the InDefend Advanced solution, including various use cases demonstrated during the PoC. Additionally, it provides recommendations for full-scale implementation based on the performance of the tested machines.

Uploaded by

rgupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

_______________________________

inDefend Advanced
POC Sign off Report

re
_______________________________

Table of Contents

Approval 1
From Customer 1
From Partner 1
PoC for (ABC) – InDefend Advanced Deployment 1
About The Document 1
Scope 1
Contact Links 1
High-level description of the client’s requirement 2
InDefend Advanced Solution 2
InDefend Versioning and Specs in (ABC) 2
Demonstration of Use Cases 3
PoC Use Cases Scenarios 3
1) Ten agents installed and visible on the Dashboard 3
2) Block USB / MTP / Bluetooth / CD / DVD access 4
3) Monitor Web Activity 4
4) Monitor all application activities 5
5) Monitor all SMTP emails 5
6) Monitor all attachments with shadow logs 6
7) Monitor all file uploads from Web 6
8) Get an alert for file upload based on defined Keywords (C, C++, C#, PHP, Dot Net, Java,
JavaScript, VB 6, MySQL, Oracle, MariaDB) 7
9) Configure screenshots for the specified user 8
PoC done on the machines with following conditions: 9
Further Best Practice Recommendations for Full Scale Implementation 9

re
_______________________________

Approval

From Customer
Table 2: Approval – (ABC)

Name Title Signature

./Ms. XYZ CISO

From Partner
Table 3: Approval – Partner (Partner)

Name Title Signature

Mr./Ms. XYZ Client Success Manager

PoC for (ABC) – InDefend Advanced Deployment

About The Document

Scope
The document covers the Solutions Design to demonstrate the product capability with defined set of
Use Cases.

 1 Server - management console & policy enforcer.


 10 Agents - deployed on end point.

Contact Links
At the time of writing this document, the current relevant documentation could be found on the
Data Resolve Website at the following links:
https://dataresolve.com/index.php

1
_______________________________

High-level description of the client’s requirement


 Source code upload restriction over Email channel

 Source code upload restriction over Application channel

 USB blocking for all agents except for Android Developers

 Screenshot monitoring for all the agents at an interval of 5 minutes

InDefend Advanced Solution


● InDefend is built to achieve full transparency over all the computers of the organization by
maintaining relevant data and network control. The application is designed to prevent
access to unauthorized removable media devices, websites and applications. The inDefend
capabilities include:

InDefend Versioning and Specs in (ABC)


The following details the versions and the endpoint specs deployed in (ABC).
● InDefend Agent Version(Windows): 7.32.0.8
● InDefend Agent Version(Linux): 2.15.0.2
● InDefend Server Version: 6.35.0.1

2
_______________________________

Demonstration of Use Cases


In this section we will detail the various use cases that were demonstrated during the POC for (ABC).
The use cases are listed below:
1. Ten agents installed and visible on the Dashboard
2. Block USB/ MTP / Bluetooth / CD/DVD access
3. Monitor all web activities
4. Monitor all application activities
5. Monitor all SMTP emails
6. Monitor all attachments with shadow logs
7. Monitor all file uploads from Web
8. Get an alert for a File Upload based on the defined Keywords (Source Code restriction -
(C, C++, C#, php, Dot Net, Java, JavaScript, VB 6, MySQL, Oracle, MariaDB)
9. Configured Periodic screenshot for all the agents

PoC Use Cases Scenarios

1) Ten agents installed and visible on the Dashboard

3
_______________________________

2) Block USB / MTP / Bluetooth / CD / DVD access


MTP (Media Transfer Protocol) used for transferring data via USB cable connected with mobile, can
be blocked.

Steps to configure policy: Policy & Control > Device Policies > Device Policy Template

3) Monitor Web Activity


Steps to monitor web activity: Activity Analytics > Browser Activity

4
_______________________________

4) Monitor all application activities


Steps to monitor application activity: Activity Analytics > Application Activity

5) Monitor all SMTP emails


Steps to monitor SMTP emails Activity: Activity Analytics > SMTP/Outlook activity

5
_______________________________

6) Monitor all attachments with shadow logs


Steps to monitor attachments from web-mails Activity: Activity Reports > Gmail Activity

7) Monitor all file uploads from Web


Steps to monitor file uploads Activity: Activity Analytics > File Uploads

6
_______________________________

8) Get an alert for file upload based on defined Keywords (C, C++,
C#, PHP, Dot Net, Java, JavaScript, VB 6, MySQL, Oracle,
MariaDB)
Steps to monitor alerts for specific keywords in file upload activity-: Incident Detail > File uploads
Activity

7
_______________________________

9) Configure screenshots for the specified user


Steps to monitor Title-triggered screenshots for specified user-: Activity Reports >
Screenshot Activity > Filter > Select Agent

8
_______________________________

PoC done on the machines with following conditions:


 Tested Machine Configurations

o Windows – 10 Enterprise, and i3 and i5 (No Antivirus)

o Linux – UB 18.04, and i3 (No Antivirus)

 Installed Prerequisites

o .Net framework version 3.5 (already shipped with Windows) must be enabled

o .Net framework version 4.6

o Microsoft Visual C++ 2013 Redistributable

o Microsoft Visual C++ 2015 Redistributable

Further Best Practice Recommendations for Full Scale Implementation


 Some Machines have Core2Duo processor which is not supported by inDefend Advanced. It is to be
ensured that the machines have the minimum hardware requirement if inDefend has to be run along
with other software in the end user machines.

 The machines which are supposed to run Android Studio on a regular basis, need to be upgraded to i5
or above processor and 8 GB RAM(Minimum)/12 GB RAM(recommended), because Android Studio is
very CPU and RAM intensive software.

 It is suggested that the Linux machines should have i5 or above processor as minimum hardware for
better experience.

----------------- END OF DOCUMENT -----------------

You might also like