Faronics Anti-Executable Enterprise: Complete Deployment Guide

How to Configure Faronics Anti-Executable Enterprise: Best Practices

1. Pre-deployment planning

  • Inventory: Scan endpoints to list OS versions, installed applications, user roles, and hardware.
  • Scope: Start with a pilot group (10–50 devices) representing different OSes and user types.
  • Policy model: Choose whitelist-by-default for highest security; consider hybrid (whitelist for workstations, more permissive for developer machines).
  • Backups & rollback: Ensure system restore points and configuration backups exist and document rollback steps.

2. Installation & initial setup

  • Server components: Install the Anti-Executable Enterprise Console on a dedicated management server with recommended resources.
  • Agent deployment: Use your existing software distribution (SCCM, Intune, GPO) to deploy agents to pilot endpoints.
  • Console access: Restrict console access with strong admin accounts; enable MFA if available.

3. Baseline application discovery

  • Automated discovery: Run an initial discovery scan in “learning” or “monitor” mode to capture legitimate application usage without blocking.
  • Cataloging: Classify discovered executables as trusted, unknown, or malicious. Prioritize common system binaries and productivity apps for immediate trust rules.
  • Hashing & signing: Prefer publisher-signature and certificate rules over simple hashes where possible to reduce maintenance.

4. Policy creation & rule design

  • Least privilege: Create policies that allow only the minimum required applications and scripts per user group.
  • Rule types: Use a combination of publisher rules, path rules, hash rules, and folder exclusions to balance security and manageability.
  • Default deny: Implement default-deny for executable launches; explicitly allow required apps.
  • Script control: Restrict script interpreters (PowerShell, cmd, Python, scripts) and allow signed or approved scripts only.

5. Testing & rollout strategy

  • Pilot validation: Run pilot in report-only mode for 1–2 weeks, review blocked attempts, and adjust rules.
  • Staged rollout: Expand to larger groups incrementally (e.g., by department) and monitor for business-impacting blocks.
  • Communication: Notify users about upcoming enforcement and provide a simple request process for blocked apps.

6. Handling exceptions & application requests

  • Approval workflow: Define a fast approval path for legitimate blocked apps (ticketing integration recommended).
  • Temporary exceptions: Use time-limited exceptions for testing new apps; avoid permanent wide exceptions.
  • Whitelist hygiene: Periodically review whitelisted entries, removing unused or risky allowances.

7. Monitoring, logging & incident response

  • Central logging: Forward Anti-Executable logs to your SIEM for correlation and long-term retention.
  • Alerting: Create alerts for repeated blocked attempts, new unsigned executables, or tampering of agents.
  • Forensics: Keep executable samples and hashes when investigating incidents; snapshot affected endpoints if needed.

8. Maintenance & updates

  • Policy reviews: Quarterly policy reviews to adjust for new business needs and software updates.
  • Agent & console updates: Apply product updates and patches promptly, testing on a small group first.
  • Certificate management: Monitor code-signing certificate expirations and update publisher rules accordingly.

9. Performance & reliability

  • Resource tuning: Ensure endpoints meet minimum resource requirements; adjust scan schedules to off-peak hours.
  • High availability: If supported, configure redundant management servers and backup consoles.

10. Compliance & documentation

  • Audit trails: Maintain change logs for policy updates and exception approvals.
  • Documentation: Document baseline policies, rollout plan, exception workflows, and rollback procedures for audits.

Quick checklist

  1. Inventory endpoints and choose pilot group
  2. Install console and deploy agents to pilot in monitor mode
  3. Discover and classify applications, create whitelist policies
  4. Test, adjust, and follow staged rollout with user communication
  5. Integrate logging, set alerts, and define exception workflows
  6. Regularly review policies, update agents, and maintain documentation

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *