Contents
Sanctuary Setup Guide - Version 4.0.0 2
Chapter 3: Installing the SecureWave Application Server .................... 43
Before you install ...................................................................................... 43
The installation procedure ...........................................................................46
Upgrading from a previous SecureWave Application Server version ........................56
Chapter 4: Installing the Sanctuary Management Console ..................59
Before you install ......................................................................................60
The installation procedure ...........................................................................60
Chapter 5: Installing Sanctuary Client on your endpoint computers .....65
System requirements ..................................................................................65
Requirements for the overall system .........................................................65
Requirements for the client computer .......................................................66
The installation procedure ........................................................................... 67
Unattended installation of the Sanctuary Client ................................................ 75
Uninstalling the Sanctuary Client ................................................................... 75
Load balancing methods ..............................................................................77
What is load balancing ...........................................................................77
How does round robin DNS works?.............................................................77
Advantages of DNS Round Robin................................................................77
Chapter 6: The Authorization Service tool ....................................... 79
What is the Sanctuary Authorization Service tool?.............................................. 79
Installation ..............................................................................................80
Chapter 7: Testing your Sanctuary Device Control installation..............85
Permissions..............................................................................................85
Temporary permissions ...............................................................................86
Scheduled permissions................................................................................ 87
CD authorization........................................................................................88
Shadowing...............................................................................................89
Auditing ..................................................................................................90
Reporting.................................................................................................90
Summary ................................................................................................. 91
Chapter 8: Testing your Sanctuary Application Control Suite
installation ..............................................................................93
Performing an initial scan............................................................................ 93
Creating a Scan Template........................................................................ 93
Utilizing your new template....................................................................94
Authorizing your new file hashes .............................................................94
Authorizing Files........................................................................................95
Try to log on a machine with the client installed...............................................96
Auditing .................................................................................................. 97
Audit Logs Viewer ................................................................................. 97
Log Explorer ........................................................................................98
Database Exploration..................................................................................99
Local Authorization ...................................................................................100
Summary ................................................................................................ 102