mcafee endpoint security 10 - meecmeec-edu.org/files/2017/07/meec-bell-mcafee-2017.pdf · mcafee...

24
McAfee Confidential McAfee Endpoint Security 10.5 The Why’s and How’s of Upgrading Frank Snyder| Mcafee Account Executive Clayton Mathews| Sales Engineer Sarah Taggert | MEEC Account Executive BELLTechlogix

Upload: others

Post on 14-Jun-2020

35 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

111/16/2017 McAfee Confidential

McAfee Confidential

McAfee Endpoint Security 10.5The Why’s and How’s of Upgrading

Frank Snyder| Mcafee Account ExecutiveClayton Mathews| Sales EngineerSarah Taggert | MEEC Account Executive BELLTechlogix

Page 2: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

211/16/2017 McAfee Confidential

Q & AEnter any questions in chat or Ask Please enter your

School in Chat if you would be so kind

Housekeeping and Agenda

50’ or less

Page 3: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

311/16/2017 McAfee Confidential

So, what is McAfee Endpoint Security 10.5?

Page 4: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

411/16/2017 McAfee Confidential

What you have today on the legacy endpoint

Page 5: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

511/16/2017 McAfee Confidential

ENS 10.5 is Completely RearchitectedModular in Nature

You own this!!!it is the normal next version

Page 6: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

611/16/2017 McAfee Confidential

Okay, that’s great…Why should I upgrade?

Page 7: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

711/16/2017 McAfee Confidential

Why should I upgrade?Better efficiency, smaller footprint and more powerful

• New AV engine with smaller DATs• Zero-impact scanning for ODS• Integrated HIPS functionality• Consolidated On-Access Scanning policy• Shared policy for Windows, Linux, and Mac

• Block applications by GTI reputation• Streamlined policy creation

• Integration with McAfee Client Proxy• Support for latest browsers

Page 8: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

811/16/2017 McAfee Confidential

Why Should I Upgrade?

• Unified interface for multiple technologies

• Unified event log for easier troubleshooting

• Event log entries “translated into English”

New interface

Page 9: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

911/16/2017 McAfee Confidential

Let’s do this!How do I get upgraded?

Page 10: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1011/16/2017 McAfee Confidential

How do I upgrade?

Endpoint Migration AssistantMigrates legacy product policies to new Endpoint Security policies. There are two methods of migration; Manual and Automatic.

Endpoint Upgrade Assistant Analyzes environment to identify systems that meet

the requirements to upgrade

Identifies incompatible products and versions and prescribes required steps to prepare those systems for upgrade

Tags machine in ePO based on their upgrade readiness

Automatically upgrades endpoints to Endpoint Security including other solutions (e.g. DLP, Drive Encryption, DXL, etc)

Tracks progress of endpoint upgrades

Package builder available for 3rd-party deployment

Tools to upgrade to Endpoint Security 10.5

Page 11: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1111/16/2017 McAfee Confidential

How do I upgrade?

Endpoint Upgrade Assistant

Endpoint Upgrade Assistant

Page 12: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1211/16/2017 McAfee Confidential

Live DemoEndpoint Migration Assistant (EMA) andEndpoint Upgrade Assistant (EUA)

Page 13: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1311/16/2017 McAfee Confidential

…..you can turn on the “Secure Schools” features Just ask BellTechLogix……

Page 14: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1411/16/2017 McAfee Confidential

Q & AEnter any questions in chat

Page 15: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1511/16/2017 McAfee Confidential

• Local and Global File Reputation• Local prevalence and age• Certificate reputation• External reputation sources

Threat Intelligence Exchange (TIE)

Page 16: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1611/16/2017 McAfee Confidential

TIE Server

Threat Intelligence Exchange

Web Gateway

Network Security Platform (NSP)

Global Threat Intelligence (GTI)

Advanced Threat Defense (ATD)

McAfee Endpoints

File visibility• Profile information• Prevalence tracking

? 3rd Party Products

McAfee Security for Exchange

Cloud Threat Defense (CTD)

Administrator

Unknown files• Automatic submission• Offline analysis

Page 17: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1711/16/2017 McAfee Confidential

TIE Server

Threat Intelligence Exchange

Web Gateway

Network Security Platform (NSP)

Global Threat Intelligence (GTI)

Advanced Threat Defense (ATD)

McAfee Endpoints

Threat Updates

? 3rd Party Products

McAfee Security for Exchange

Cloud Threat Defense (CTD)

Administrator

Automatic Block

Page 18: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1811/16/2017 McAfee Confidential

• Pre-execution scan using machine learned algorithms

• Post-execution cloud behavioral monitoring

• Cleans up after convicted malware

Real Protect – Machine LearningCloud Behavioral Analysis

Page 19: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

1911/16/2017 McAfee Confidential

Features and Feature Vectors in Real Protect

19

;CreateProcess("c:\user\roaming\fsdfsd.exe")CreateRegistryKey("HKLM","Software\KeyKill)

SetRegistryValue("InstallDate","213355533");;

Behavioral Trace

AF12ACE76D

F2A212AC6E

22F1CAFFA8;;

Features Hash

AF12ACE76D F2A212AC6E 22F1CAFFA8 ; ;

Feature Vector

Page 20: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

2011/16/2017 McAfee Confidential

• Allows unknown files to run• Constrains unknown processes• Saves patient zero• Protection without detection

Dynamic Application Containment (DAC)

Page 21: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

2111/16/2017 McAfee Confidential

• Threat Hunter• Deep forensics• Continuous monitoring• Automated capture • Trace Analysis• Find dormant threats

Endpoint Detect and Response(MAR) Active Response

Page 22: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

2211/16/2017 McAfee Confidential

What is McAfee Endpoint Security 10?An example threat scenario

Web ControlThreatPrevention

FirewallThreatPrevention

McAfee TIE DACReal Protect

Known Good Unknown Suspicious Likely Bad

Risk Rating

Came from an unknown website

Suspicious but not known bad

Suspiciously packed, but I’m not sure yet

It tried to establish persistence, but I blocked it.

ATD convicted it with high confidence.

McAfee Labs says this is malicious behavior.

No known reputation, patient zero. I’m submitting to ATD.

Page 23: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

2311/16/2017 McAfee Confidential

Additional Resources

McAfee Expert Center (https://community.mcafee.com/community/business/expertcenter)

Sales Engineer “Tech Check” Program

Endpoint Migration Guide (https://kc.mcafee.com/corporate/index?page=content&id=pd26801)

Endpoint Upgrade Assistant Product Guide (https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/27000/PD27281/en_US/eua_150_pg_0-00_en-us.pdf)

Page 24: McAfee Endpoint Security 10 - MEECmeec-edu.org/files/2017/07/MEEC-Bell-McAfee-2017.pdf · McAfee Endpoint Security 10.5. The Why’s and How’s of Upgrading. Frank Snyder| Mcafee

2411/16/2017 McAfee Confidential

McAfee, the McAfee logo and [insert <other relevant McAfee Names>] are trademarks or registered trademarks of McAfee LLC or its subsidiaries in the U.S. and/or other countries.Other names and brands may be claimed as the property of others. Copyright © 2017 McAfee LLC.