Overview; Table 2: Test Methods - Extreme Networks Sentriant AG Software User's Manual

Version 5.2
Hide thumbs Also See for Sentriant AG:
Table of Contents

Advertisement

Overview

Sentriant AG protects the network by ensuring that endpoints are free from threats and in compliance
with the organization's IT security standards. Sentriant AG systematically tests endpoints—with or
without the use of a client or agent—for compliance with organizational security policies, quarantining
non-compliant machines before they damage the network.
Sentriant AG ensures that the applications and services running on endpoints (such as LAN, RAS, VPN,
and WiFi endpoints) are up-to-date and free of worms, viruses, trojans, P2P and other potentially
damaging software. It dramatically reduces the cost and effort of securing your network's weakest
links—the endpoints your IT group might not adequately control.
There are advantages and disadvantages inherent with each of the test method technologies. Having a
choice of testing solutions enables you to maximize the advantages and minimize the disadvantages.
NOTE
Agentless testing uses an existing Windows service (RPC). ActiveX testing uses an ActiveX control. Extreme
Networks, Inc. agent testing installs an agent (Sentriant AG Agent) and runs as a new Windows service.
The trade-offs in the test methods are described in the following table:

Table 2: Test Methods

Trade-offs
Test method
Pros
Agentless
Truly agentless, no install or
download.
No extra memory load on the client
machine.
Can begin testing, view test results,
and give network access without any
end-user interaction for
your Windows domains.
Easiest of the three test methods to
deploy.
Saves administration time and is
therefore less expensive than
agent-based solutions.
Sentriant AG Software Users Guide, Version 5.2
Cons
Requires RPC Service to be
available to the Sentriant AG server
(ports 139 or 445).
Requires file and print sharing to be
enabled.
Not supported by legacy Windows™
on
operating systems and non-Windows
endpoints
operating systems.
If the endpoint is not on a domain,
the user must specify local
credentials. A user often does not
know what credentials to enter.
Introduction
29

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentriant ag 5.2

Table of Contents