Applying security policies to agents
You must apply at least one security policy to every agent group. Several secondary policies can also be added, and will apply when certain conditions are met.
EXAMPLE
You can add a conditional policy for mobile users, which applies when some workstations are no longer located within the internal corporate network. You could also define a quarantine policy that applies as soon as an agent's health indicators reach unsatisfactory levels.
To apply one or several security policies to an agent group:
- Go to the Policies tab in an agent group.
- Choose the main security policy that you want to apply to all agents in the group from the Policy drop-down list.
TIP
A blank policy is offered in the drop-down list. When one is used, the protection of an agent group (except self-protection) can be temporarily disabled, for example for tests and troubleshooting. - Click on Add a conditional policy if you need one, and give the policy a name.
- Choose the policy that will apply under certain conditions from the Policy drop-down list.
- Click on Add a condition and give the condition a name.
- Click on Add a test and choose from one of the following tests:
IP address
Enter an IP address, address range or subnet and choose whether it needs to be within range or out of range for the test to be validated.
You can define several ranges separated by commas, e.g., 172.16.16.0/0.0.0.24,10.10.0.0/16.
Reachable agent handler
Enable this option to indicate that the agent must be able to reach the agent handler for the test to be validated.
Ping
Indicate the IP address or network name of the host that you want to reach using pings, whether the agent must be able to reach it for the test to be validated, number of tries, and frequency of tries.
Result of custom script
Click on
to add a script, and specify its path, arguments and where to run it. Indicate what its Result must be for the test to be validated. This result must correspond to an output code of the script.
It is best to use Local service as this is an account with restricted privileges. Do not choose Interactive session or System accounts unless absolutely necessary.Do note that even if you have prevented scripts from being run in your security policies, SES Evolution will assume that your internal custom scripts are trustworthy and allow them to be executed.
Login to a domain
Enter the name of the domain and indicate whether the agent needs to be connected for the test to be validated. A value of Not connected indicates that:
- The agent is not linked to the domain in question,
- If the agent is linked to the domain, that it is not connected to the domain network.
Status of a network interface
Click on
to add a network interface, and specify its name, unique ID (GUID) or description. Indicate as well what its status must be for the test to be validated: Connected or Offline or idle.
The Name and Description of an interface can be seen in the Windows Network & Internet panel.
In Windows 10, to obtain all the information about an interface including its GUID, run the following Powershell command:
Get-NetAdapter | Select Name, InterfaceName, InterfaceGUID, InterfaceDescription, Status - Add other tests if necessary, and click on OK. The sequence of the tests does not matter because ALL tests must be validated before the condition can be met.
- Add other conditions if necessary. As soon as one condition is met, the corresponding policy will apply.
Conditions apply in the order of their appearance. - If you want to run a custom script every time the conditional policy is applied, click on Add a task. When the script is added, specify its path, arguments and where to run it.
It is best to use Local service as this is an account with restricted privileges. Do not choose Interactive session or System accounts unless absolutely necessary. - Under Triggers, select one or several events that will trigger the verification of conditions:
- Enable Every to check conditions at the regular interval that you specify.
- Enable Network event to check conditions if the network interface does not stay the same on the workstation, e.g., if it is connected to a WiFi network, if it is a laptop plugged into a docking station, etc.
- Click on OK. A summary of the conditions will appear in the Policies tab of the agent group.
- Arrange the conditions in the sequence of your choice using the arrows on the left. The sequence of conditional policies is important.
EXAMPLE 1
Quarantining a workstation if its health indicators are unsatisfactory.
In this example, every 10 minutes, a script will run on the agents and check their health status. If an agent's results are unsatisfactory, the Quarantine policy will be applied to the agent and a second repair script will run. A quarantine policy isolates an agent by blocking, for example, its communications over the network and all removable devices, except those used by administrators.
Applying a specific policy for laptop computers.
In this example, every time a network event occurs on a workstation, SES Evolution will launch all the tests defined for this condition:
- The workstation is not connected to its domain network,
- The agent handler cannot be reached.
If the results of the tests are positive, the Mobility policy will be applied.
