_______________________________
inDefend Advanced
POC Sign off Report
re
_______________________________
Table of Contents
Approval 1
From Customer 1
From Partner 1
PoC for (ABC) – InDefend Advanced Deployment 1
About The Document 1
Scope 1
Contact Links 1
High-level description of the client’s requirement 2
InDefend Advanced Solution 2
InDefend Versioning and Specs in (ABC) 2
Demonstration of Use Cases 3
PoC Use Cases Scenarios 3
1) Ten agents installed and visible on the Dashboard 3
2) Block USB / MTP / Bluetooth / CD / DVD access 4
3) Monitor Web Activity 4
4) Monitor all application activities 5
5) Monitor all SMTP emails 5
6) Monitor all attachments with shadow logs 6
7) Monitor all file uploads from Web 6
8) Get an alert for file upload based on defined Keywords (C, C++, C#, PHP, Dot Net, Java,
JavaScript, VB 6, MySQL, Oracle, MariaDB) 7
9) Configure screenshots for the specified user 8
PoC done on the machines with following conditions: 9
Further Best Practice Recommendations for Full Scale Implementation 9
re
_______________________________
Approval
From Customer
Table 2: Approval – (ABC)
Name Title Signature
./Ms. XYZ CISO
From Partner
Table 3: Approval – Partner (Partner)
Name Title Signature
Mr./Ms. XYZ Client Success Manager
PoC for (ABC) – InDefend Advanced Deployment
About The Document
Scope
The document covers the Solutions Design to demonstrate the product capability with defined set of
Use Cases.
1 Server - management console & policy enforcer.
10 Agents - deployed on end point.
Contact Links
At the time of writing this document, the current relevant documentation could be found on the
Data Resolve Website at the following links:
https://dataresolve.com/index.php
1
_______________________________
High-level description of the client’s requirement
Source code upload restriction over Email channel
Source code upload restriction over Application channel
USB blocking for all agents except for Android Developers
Screenshot monitoring for all the agents at an interval of 5 minutes
InDefend Advanced Solution
● InDefend is built to achieve full transparency over all the computers of the organization by
maintaining relevant data and network control. The application is designed to prevent
access to unauthorized removable media devices, websites and applications. The inDefend
capabilities include:
InDefend Versioning and Specs in (ABC)
The following details the versions and the endpoint specs deployed in (ABC).
● InDefend Agent Version(Windows): 7.32.0.8
● InDefend Agent Version(Linux): 2.15.0.2
● InDefend Server Version: 6.35.0.1
2
_______________________________
Demonstration of Use Cases
In this section we will detail the various use cases that were demonstrated during the POC for (ABC).
The use cases are listed below:
1. Ten agents installed and visible on the Dashboard
2. Block USB/ MTP / Bluetooth / CD/DVD access
3. Monitor all web activities
4. Monitor all application activities
5. Monitor all SMTP emails
6. Monitor all attachments with shadow logs
7. Monitor all file uploads from Web
8. Get an alert for a File Upload based on the defined Keywords (Source Code restriction -
(C, C++, C#, php, Dot Net, Java, JavaScript, VB 6, MySQL, Oracle, MariaDB)
9. Configured Periodic screenshot for all the agents
PoC Use Cases Scenarios
1) Ten agents installed and visible on the Dashboard
3
_______________________________
2) Block USB / MTP / Bluetooth / CD / DVD access
MTP (Media Transfer Protocol) used for transferring data via USB cable connected with mobile, can
be blocked.
Steps to configure policy: Policy & Control > Device Policies > Device Policy Template
3) Monitor Web Activity
Steps to monitor web activity: Activity Analytics > Browser Activity
4
_______________________________
4) Monitor all application activities
Steps to monitor application activity: Activity Analytics > Application Activity
5) Monitor all SMTP emails
Steps to monitor SMTP emails Activity: Activity Analytics > SMTP/Outlook activity
5
_______________________________
6) Monitor all attachments with shadow logs
Steps to monitor attachments from web-mails Activity: Activity Reports > Gmail Activity
7) Monitor all file uploads from Web
Steps to monitor file uploads Activity: Activity Analytics > File Uploads
6
_______________________________
8) Get an alert for file upload based on defined Keywords (C, C++,
C#, PHP, Dot Net, Java, JavaScript, VB 6, MySQL, Oracle,
MariaDB)
Steps to monitor alerts for specific keywords in file upload activity-: Incident Detail > File uploads
Activity
7
_______________________________
9) Configure screenshots for the specified user
Steps to monitor Title-triggered screenshots for specified user-: Activity Reports >
Screenshot Activity > Filter > Select Agent
8
_______________________________
PoC done on the machines with following conditions:
Tested Machine Configurations
o Windows – 10 Enterprise, and i3 and i5 (No Antivirus)
o Linux – UB 18.04, and i3 (No Antivirus)
Installed Prerequisites
o .Net framework version 3.5 (already shipped with Windows) must be enabled
o .Net framework version 4.6
o Microsoft Visual C++ 2013 Redistributable
o Microsoft Visual C++ 2015 Redistributable
Further Best Practice Recommendations for Full Scale Implementation
Some Machines have Core2Duo processor which is not supported by inDefend Advanced. It is to be
ensured that the machines have the minimum hardware requirement if inDefend has to be run along
with other software in the end user machines.
The machines which are supposed to run Android Studio on a regular basis, need to be upgraded to i5
or above processor and 8 GB RAM(Minimum)/12 GB RAM(recommended), because Android Studio is
very CPU and RAM intensive software.
It is suggested that the Linux machines should have i5 or above processor as minimum hardware for
better experience.
----------------- END OF DOCUMENT -----------------