Panda Managed Office Protection. Web console walkthrough
Revisión 0.2 2009 © Panda Security 2009 Page 3 of 53
Contents
1.Web console walkthrough .................................................................................................................. 4
2. The console in detail .......................................................................................................................... 8
2.1. Centralized security management ................................................................................................. 8
Installing the protection locally or remotely ................................................................................................... 8
Administering centralized security policies.................................................................................................. 12
Creating groups of computers and assigning security policies remotely ..................................................... 27
Local or remote installation of the protection with predefined security policies ........................................... 29
2.2. Centralized security monitoring ...................................................................................................30
Consolidated network dashboard ............................................................................................................... 30
Centralized monitoring of licenses: contracted, used and free.................................................................... 30
Monitoring the security status of the network .............................................................................................. 33
Filtering of computers and analysis of the security status ........................................................................... 34
Exporting the computers’ status to file ........................................................................................................ 36
Centralized monitoring of detections ........................................................................................................... 37
Quick search for detections and firewall events .......................................................................................... 39
Exporting information on detections and firewall events to file.................................................................... 42
2.3. Consolidated reports ....................................................................................................................43
Consolidated executive report about network detection activities and license status ................................. 43
High-level consolidated and detailed report of clients’ network security status ........................................... 47
High-level consolidated and detailed report of firewall detections and events ............................................ 49
2.4. Users and centralized administration profiles ..............................................................................51
2.5. In-depth malware audits. Panda Malware Radar ........................................................................53