Forescout CounterACT Console User Manual

About This Forescout CounterACT Console User Manual

This manual is a guide for new users and a reference tool for experienced users.The manual is designed for users who have logged in to the Console from a ForeScout CounterACT® Enterprise Manager or   Appliance. Instructions and explanations in the manual refer to both login scenarios, unless specifically noted.Refer to the CounterACT Installation Guide for information on software installation, post-installation and other installation procedures for CounterACT components, including the Enterprise Manager, Appliance and Console. Access the Guide in the Documentation Portal or the Customer Support Portal, Installation Guides page

The Forescout CounterACT Console User Manual consists of the following chapters:

Chapter 1: Welcome to CounterACT

 This chapter presents general information about CounterACT functionally and components

Chapter 2: Working with the Initial Setup Wizard This chapter details the initial steps required to configure CounterACT.The Initial Setup wizard provides critical configurations to ensure that you get your system up and running quickly and efficiently.
Chapter 3: Working at the Console This chapter details the basic Console tools that you should be familiar with before you begin working
Chapter 4: CounterACT Policy Templates

CounterACT provides a full range of templates to help you create NAC policies quickly and effectively using default settings.This chapter instructs you how to work with templates in general and then provides step-by-step procedures for creating template-based policies   that cover important network security tasks, for example:

  • Primary classification and asset classification
  • Antivirus, Peer-to-Peer
  • Corporate and guest control
  • Windows and Macintosh update compliance
  • Mobile device classification
  • External disk drive compliance
  • Virtual machine classification
Chapter 5: Policy Management This chapter describers how to create and manage custom policies.
Chapter 6: Working with Policy Conditions This chapter describes how to work with CounterACT policy conditions.
Chapter 7: Working with Actions This chapter describes how to work with CounterACT policy actions, used to control network endpoints.
Chapter 8: Base Plugins and Extended Modules This chapter describes base plugins and licensed plugins included in  ForeScout Extended Modules.
Chapter 9: Assets Portal

The Assets Portal is a web-based search and discovery tool that allows you to leverage extensive network information collected and correlated by CounterACT and plugins. This includes not only endpoint information, but also Policy violations, login histories, User Directory details, organizational mapping details and endpoint device connections. The information is useful across your organization, especially for:

  • Security teams
  • IT departments
  • Help Desk

This chapter describes how to set up and work with the Assets Portal.

Chapter 10: Generating Reports and Logs This chapter describes CounterACT report generation tools. These tools provide you with important compliance information, as well as detailed information about malware and self-propagating code. Reports about policy compliance, inventory and vulnerabilities can be generated from the Reports site.In addition, user audit trail and system event logs can also be generated.
Chapter 11: Managing Your Virtual Firewall Policy This chapter contains information about working with Virtual Firewall rules. Network Virtual Firewall protection allows you to easily create network security zones to give you more control over network traffic and provides all the benefits of an inline fir  ewall without being located inline
Chapter 12: Threat Protection

CounterACT’s Active Response technology fights worms and other self-p ropagating malware by:

  • Pinpointing threats at the earliest stage of the infection process
  • Providing real-time protection against zero-day worms
  • Protecting your network against infection methods known and unknown to the security community

This chapter provides basic information about the Active Response malicious endpoints technology, including how CounterACT defines, detects and handles threats. It also describes how to define legitimate traffic as part of your Threat Protection policy, i.e., traffic to be ignored for requirements that compel you to grant full access to specific addresses.

Chapter 13: Threat Protection, Advanced Tools This chapter provides information regarding advanced tools available for handling threats including: defining naming conventions for marks, defining virtual site endpoint operating system distribution and density, and parsing event information displayed in email alerts.
Chapter 14: Managing Users

This chapter describes how to:

  • Create and manage CounterACT users.
  • Define user permissions.
  • Create password protection policies.
  • Audit user activity.
Chapter 15: Managing Appliances, Enterprise Managers and Consoles Use the tools described in this chapter to update settings defined during your setup. Additional options, such as upgrading your software version and installing new licenses are also detailed.
Chapter 16: The Executive Dashboar

CounterACT provides a web-based information center for both executives and IT professionals that delivers dynamic at-a-glance information about:

  • Network compliance
  • Network threats
  • Network guests

This chapter describes how to set up and use the executive dashboard.

Chapter 17: Additional Options This chapter describes additional CounterACT options.
Appendix 1: Handling Network Connectivity Failures This appendix details how to handle network connectivity failures between the Appliance and your network
Appendix 2: Remote Access to Endpoints This appendix details how to gain remote access to an endpoint’s registry service. You must perform these steps to take advantage of the policy scanning processes.
Appendix 3: Generating and Importing a Trusted Web Server Certificate This appendix describes how to generate and import a trusted certificate and remove the browser security warning that opens when trying to access the CounterACT Web Portals.
Appendix 4: HTTP Redirection For browser notification, login and remediation actions the Appliance must see traffic going to the web. This appendix details how to make these actions work properly, including how to set the IP address used by the HTTP redirection features, for example the Assets Portal, Dashboard and Reports Portal
Appendix 5: SNMP Support and Integration This appendix describes CounterACT SNMP support.
Appendix 6: SNMP MIB for Counter

This appendix describes:

  • About the SNMP MIB for CounterACT Appliances
  • MIB Table Objects for CounterACT Appliances
  • SNMP Trap Notifications for CounterACT Appliances

Read and Download Forescout CounterACT Console User Manual PDF

Title : Forescout CounterACT Console User Manual
Format : PDF
Pages : 763 Pages
Language : English
File Size : 13 MB


 Forescout CounterACT Console User Manual

Download PDF