Table Of ContentPanda Systems
Management
Administration Guide
Version: 7.00.00-00
Author: Panda Security
Date: 12/20/2019
Panda Systems Management
Legal notice.
Neither the documents nor the programs that you may access may be copied, reproduced,
translated or transferred to any electronic or readable media without prior written permission from
Panda Security, Santiago de Compostela, 12, 48003 Bilbao (Bizkaia) SPAIN
Registered trademarks.
Registered trademarks. Windows Vista and the Windows logo are trademarks or registered trademarks
of Microsoft Corporation in the United States and/or other countries. All other product names may be
registered trademarks of their respective owners.
© Panda Security 2019. All rights reserved.
Contact information.
Corporate Headquarters:
Panda Security
Calle Santiago de Compostela 12
Bilbao (Bizkaia) 48003 España.
https://www.pandasecurity.com/spain/about/contact/
Guide for network Administrators i
Panda Systems Management
ii Guide for network Administrators
Panda Systems Management
About the Administration Guide
• You can find the most recent version of this guide at:
https://www.pandasecurity.com/rfiles/enterprise/documentation/pcsm/docswebpage/SYSTEMSMANAGEMENT-
Guide-EN.pdf
Release notes
To find out what's new in the latest version of Panda Systems Management following URL:
https://www.pandasecurity.com/UK/support/card?id=300121
Technical Support
Panda Security provides global support services aimed at responding to specific questions regarding
the operation of the company's products. The technical support team also generates documentation
covering technical aspects of our products. This documentation is available in the eKnowledge Base
portal.
• To access specific information about the product, please go to the following URL:
https://www.pandasecurity.com/uk/support/cloud-systems-management.htm
• The eKnowledge Base portal can be accessed from the following link:
https://www.pandasecurity.com/uk/support/#enterprise
Survey on the Administration Guide
Rate this guide and send us suggestions and requests for future versions of our documentation:
https://www.pandasecurity.com/uk/support/#enterprise
Administration Guide iii
Panda Systems Management
iv Administration Guide
Panda Systems Management
Contents
Part 1: Introduction to Panda Systems Management
Chapter 1: Preface - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -5
Target audience.......................................................................................................................................................................5
Icons...........................................................................................................................................................................................5
Chapter 2: Basic information about Panda Systems Management- - - - - - - - - - - - - - - 7
Main features of Panda Systems Management....................................................................................................................8
Panda Systems Management user profile.............................................................................................................................9
Main components of Panda Systems Management.........................................................................................................10
Key players of Panda Systems Management......................................................................................................................11
Chapter 3: Basic components of the Console- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 13
Management console components....................................................................................................................................14
General menu..............................................................................................................................................................14
Tab bar..........................................................................................................................................................................15
Icon bar........................................................................................................................................................................15
Drop-down menu........................................................................................................................................................16
Filters and groups panel.............................................................................................................................................17
Dashboards..................................................................................................................................................................18
Selection controls........................................................................................................................................................18
Lists.................................................................................................................................................................................19
Sections.........................................................................................................................................................................21
Hierarchy of levels within the Management Console........................................................................................................22
Account Level..............................................................................................................................................................22
Site Level.......................................................................................................................................................................23
Device Level................................................................................................................................................................25
Chapter 4: Getting started with Panda Systems Management - - - - - - - - - - - - - - - - - 27
Creating and configuring the first site..................................................................................................................................28
Manually installing the agent on a Windows computer ...................................................................................................29
Finding devices quickly using filters.......................................................................................................................................30
Viewing devices......................................................................................................................................................................31
Performing hardware, software and license audits............................................................................................................32
Monitoring Windows devices.................................................................................................................................................33
Deploying software using quick jobs....................................................................................................................................35
Managing patches.................................................................................................................................................................37
Resolving incidents remotely.................................................................................................................................................37
Part 2: Device installation and organization
Chapter 5: Deploying and managing devices - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 43
Before integrating devices into the service.........................................................................................................................45
Deploying the PCSM agent via email..................................................................................................................................46
Deploying the PCSM agent centrally using a deployment tool.......................................................................................47
Deploying the PCSM agent remotely via another PCSM agent.......................................................................................47
Deploying the agent using image cloning..........................................................................................................................50
Installing the agent on workstations and servers.................................................................................................................51
Installing the Agent on Android and iOS..............................................................................................................................52
Integrating network devices .................................................................................................................................................55
Guide for network administrators v
Panda Systems Management
Managing ESXi servers............................................................................................................................................................56
Managing Hyper-V servers.....................................................................................................................................................57
Approving devices..................................................................................................................................................................58
Uninstalling the agent and deleting devices.......................................................................................................................59
Uninstalling the PCSM agent from the management console..............................................................................59
Uninstalling the PCSM agent from the target device.............................................................................................59
Configuring a Connection Broker.........................................................................................................................................60
Other Agent Connection parameters..................................................................................................................................62
Configuring a Network Node................................................................................................................................................63
Device discovery (network scanning)......................................................................................................................64
Configuring a local cache node..........................................................................................................................................67
Designating a local cache........................................................................................................................................67
Chapter 6: Device groupings- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 69
Sites...........................................................................................................................................................................................70
Groups......................................................................................................................................................................................72
Site device groups.......................................................................................................................................................72
Device groups..............................................................................................................................................................73
Site groups....................................................................................................................................................................74
Filters.........................................................................................................................................................................................75
Device filters.................................................................................................................................................................75
Account filters..............................................................................................................................................................80
Site filters.......................................................................................................................................................................81
Filter composition.........................................................................................................................................................82
Favorites...................................................................................................................................................................................88
Managing devices efficiently................................................................................................................................................88
Sites................................................................................................................................................................................89
Filters and groups.........................................................................................................................................................89
General organization of devices..........................................................................................................................................89
Part 3: Automatic process configuration
on devices
Chapter 7: Policies- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 93
Managing policies..................................................................................................................................................................94
Creating policies..........................................................................................................................................................94
Managing created policies.......................................................................................................................................94
Policy types..............................................................................................................................................................................97
Agent............................................................................................................................................................................97
ESXi................................................................................................................................................................................99
Monitoring Maintenance Window............................................................................................................................99
Mobile Device Management policies......................................................................................................................99
Monitoring..................................................................................................................................................................103
Patch management.................................................................................................................................................104
Power..........................................................................................................................................................................104
Windows update.......................................................................................................................................................104
Software management............................................................................................................................................104
Chapter 8: Monitoring - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 105
Creating monitors manually................................................................................................................................................106
Monitoring Windows, Linux and Mac OS X computers.....................................................................................................108
Monitoring devices using components.............................................................................................................................112
Monitoring printers................................................................................................................................................................113
Monitoring network devices using SNMP...........................................................................................................................113
Monitoring ESXi servers..........................................................................................................................................................115
Guide for network administrators vi
Panda Systems Management
Automatically configuring monitors ...................................................................................................................................117
Importing and exporting a monitoring policy...................................................................................................................118
Importing monitoring policies...................................................................................................................................118
Exporting monitoring policies...................................................................................................................................118
Managing monitors...............................................................................................................................................................119
Chapter 9: Jobs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 121
Job items................................................................................................................................................................................121
Launching a quick job..........................................................................................................................................................122
Launching scheduled jobs...................................................................................................................................................125
Managing active and completed jobs.............................................................................................................................126
Job status...............................................................................................................................................................................127
Chapter 10: Components and ComStore - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 129
Component types.................................................................................................................................................................129
Components developed by the administrator......................................................................................................130
Components developed by Panda Security: ComStore.....................................................................................131
Integrating components into the platform........................................................................................................................131
Developing components.....................................................................................................................................................135
Requirements for developing components...........................................................................................................135
Creating a monitor component.........................................................................................................................................136
Component presentation and purpose.................................................................................................................136
Necessary elements..................................................................................................................................................136
Communications protocol between the component and the Server...............................................................137
How to work with a monitor component...............................................................................................................139
How to use global variables.....................................................................................................................................142
Labels and user-defined fields.................................................................................................................................143
Creating a script component..............................................................................................................................................145
Editing components..............................................................................................................................................................145
Part 4: Device visibility
Chapter 11: Assets Audit - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 149
Access and availability of the audit service......................................................................................................................150
Network audit........................................................................................................................................................................152
Hardware audit.....................................................................................................................................................................154
Account level.............................................................................................................................................................154
Site level......................................................................................................................................................................154
Device level...............................................................................................................................................................155
Software audit.......................................................................................................................................................................160
Account level.............................................................................................................................................................160
Site level......................................................................................................................................................................160
Device level...............................................................................................................................................................160
License audit.........................................................................................................................................................................160
Account level.............................................................................................................................................................160
Site level......................................................................................................................................................................161
Services audit........................................................................................................................................................................162
Device level...............................................................................................................................................................162
Changes audit.......................................................................................................................................................................162
Device level...............................................................................................................................................................162
Activity audit..........................................................................................................................................................................163
At Account level........................................................................................................................................................163
At Device level...........................................................................................................................................................163
Chapter 12: Device visibility and status - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 165
Guide for network administrators vii
Panda Systems Management
Device status..........................................................................................................................................................................166
General dashboard..............................................................................................................................................................166
Aim...............................................................................................................................................................................166
Access.........................................................................................................................................................................167
Data displayed...........................................................................................................................................................167
Site dashboards.....................................................................................................................................................................169
Aim...............................................................................................................................................................................169
Access.........................................................................................................................................................................169
Data displayed...........................................................................................................................................................169
Site list......................................................................................................................................................................................171
Device lists..............................................................................................................................................................................172
Device details........................................................................................................................................................................176
Aim...............................................................................................................................................................................176
Access.........................................................................................................................................................................176
Data displayed...........................................................................................................................................................176
Installed antivirus audit.........................................................................................................................................................181
Chapter 13: Reports- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 185
Accessing the reports system...............................................................................................................................................186
Creating reports.....................................................................................................................................................................186
Report structure.....................................................................................................................................................................188
Types of reports available and settings..............................................................................................................................189
Executive.....................................................................................................................................................................189
Audits...........................................................................................................................................................................191
Monitoring...................................................................................................................................................................193
Patch management..................................................................................................................................................194
Activity.........................................................................................................................................................................196
Export...........................................................................................................................................................................196
Part 5: Resolution of incidents and technical support
Chapter 14: Patch Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 201
What patches can I deploy/apply?...................................................................................................................................202
Patch deployment and installation.....................................................................................................................................203
Patch categories based on the policy used..........................................................................................................203
Patch installation order.............................................................................................................................................204
Method I: Windows Update policy......................................................................................................................................204
Method II: Patch Management policy...............................................................................................................................207
General workflow and Patch Management policy override...............................................................................207
Creating a Patch Management policy..................................................................................................................209
Approving patches and creating filters..................................................................................................................211
Overriding the policies defined at Account Level................................................................................................214
Modifying Patch Management policies per device.............................................................................................215
Patch Management method: Usage scenarios....................................................................................................216
Device patch status..............................................................................................................................................................216
Managing the device patch status.........................................................................................................................217
Patch Management policy method: Usage scenarios ...................................................................................................220
Chapter 15: Centralized software deployment and installation - - - - - - - - - - - - - - - 221
Package deployment and installation procedure...........................................................................................................222
Deployment examples.........................................................................................................................................................223
Deploying documents using a script language.....................................................................................................224
Deploying documents without a script language.................................................................................................226
Deploying self-installing software.............................................................................................................................227
Deploying software without an installer..................................................................................................................229
Bandwidth usage optimization in software deployments................................................................................................231
viii Guide for network administrators
Description:4. Basic components of the Console .. 26 4.1. Introduction