Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 956 Categories, Downloaded 50.234.075 Times

Forefront Endpoint Protection Tools 2.1.1116.0

Company: Microsoft
Date Added: September 14, 2012  |  Visits: 752

Forefront Endpoint Protection Tools

Report Broken Link
Printer Friendly Version


Product Homepage
Download (421 downloads)



These tools make it easier for Forefront Endpoint Protection 2010 customers to use Group Policy for centralized management, provide optimized settings for various server roles, and diagnose and troubleshoot support issues.

FEP Group Policy Tools (fep2010grouppolicytools-en-us.exe)
The FEP Group Policy tool is used to import settings from FEP policy XML files into a Group Policy Object (GPO) in an Active Directory domain, or into the Local Group Policy object on a Windows computer. The tool can also be used to export FEP settings from a GPO into a FEP policy XML file. The FEP ADMX template is used in conjunction with Group Policy Editor in order to manage FEP antimalware settings with Group Policy.

FEP Server Role Policies for Use with System Center Configuration Manager (fepserverrolepoliciesforusewithconfigmgrui.exe)
These files are FEP policy XML files, each with optimized settings for a particular server role such as SQL, Exchange or Active Directory. The settings enable exclusions and change other FEP antimalware engine settings to minimize the impact of FEP on the designated server workload.

The policy files for use with ConfigMgr are designed to be used only in conjunction with the FEP management node in the ConfigMgr management console. Each file contains role-optimized settings for a particular server role, as well as default settings appropriate for any Windows server.

These files should not be used with the FEP Group Policy tool, as Group Policy merging might not result in the desired configuration being applied to the system if two or more policies are applicable to the same system.

FEP Server Role Policies for Use with Group Policy (fepserverrolepoliciesforusewithgpo.exe)

These files are FEP policy XML files, each with optimized settings for a particular server role such as SQL, Exchange or Active Directory. The settings enable exclusions and change other FEP antimalware engine settings to minimize the impact of FEP on the designated server workload.

The policy files for use with Group Policy are designed to be used only in conjunction with the FEP Group Policy tool, and specifically are designed so that Group Policy merging will result in the correct Resultant Set of Policy. Each file contains only role-optimized settings for a particular server role; the default settings applicable for all Windows servers are provided in a separate file.

These files should not be used with FEP management node in the ConfigMgr console, as the policy files don't contain all settings required by the policy management UI and might result in error messages when the UI attempts to parse the files.

Microsoft Security Support tool
The Microsoft Security Support tool gathers support data necessary to help the Microsoft Support team to resolve support issues.

Run The Microsoft Security Support tool on the problematic FEP computer (client or server). Send the cab file that is created to the Microsoft Support team to enable them to diagnose and resolve the support issues.

FEP 2010 Best Practice Analyzer
The Microsoft Forefront Endpoint Protection 2010 Best Practice Analyzer (BPA) tool scans the System Center Configuration Manager 2007 and Forefront Endpoint Protection (FEP) configuration settings to identify problematic or missing settings that may prevent optimized use of FEP. The tool is based on the Microsoft Baseline Configuration Analyzer (MBCA) 2.0.

Requirements: No special requirements
Release Date: September 14, 2012
Platforms: Windows XP, 2003, Vista, 2008, 7, 2008R2
Keyword: Fep Fep Group Policy Forefront Endpoint Protection Forefront Endpoint Protection Tools Group Policy Server Role Server Role Policy
Users rating: 0/10

License: Freeware
USER REVIEWS
More Reviews or Write Review


FOREFRONT ENDPOINT PROTECTION TOOLS RELATED
Server Tools  -  Microsoft Forefront Protection 2010 for Exchange Server 1.75.505.0
Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses, worms, spyware, and spam by integrating multiple scanning engines from industry-leading security partners in a single solution. Its comprehensive...
159 MB  
Virus Removers  -  Trustport Antivirus for Servers 2012 12.0.0.4828
Antivirus solution tailored for the needs of the file server. It is designed to use the capacity of the server and to work simultaneously with multiple files. Protects the key element of the network, where the most valuable corporate data is...
 
Code Management Tools  -  ASProtect 1.58 Build 11.1
ASProtect is the system of software protection of applications, designed for quick implementation of application protection functions, especially targeted for software developers. ASProtect was designed for such specific tasks as the creation of...
 
Modules  -  OG User Roles 5.x-3.2 1.0
In other words, using this module, you can assign the role "contributor" to a user in a group, and the user will only have the permissions of that role while he is in that particular group. This module does not affect other site-wide roles...
 
Programming  -  repoze-oauth-plugin 0.1.1
repoze-oauth-plugin is a repoze.who and repoze.what plugin implementing the server side of the OAuth 1.0 protocol. Currently it supports only 2-legged flow where the client is at the same time a resource owner. This happens when a client...
10.24 KB  
Windows Software  -  SWF Decrypt 1.0
You've worked hard on your Flash project and thought that software like Amayeta SWF Encrypt and DComSoft SWF Protector will protect your SWF files from decompilers. Guess again! SWF Decrypt will reverse and remove the few junk code these...
316.52 KB  
Database Tools  -  Microsoft SQL Server 2012 11.0.1750.32 RC 0
Microsoft SQL Server 2012 empowers organizations to be more agile in today's competitive market. Customers can efficiently deliver mission-critical solutions through a highly scalable and available platform. Industry-leading tools help developers...
 
Multimedia Integration Tools  -  Axmedis Multiskin Player 1.9.1
This installer provides a Multiskin Player for AXMEDIS MPEG-21 Cross-media Contents. Customize your AXMEDIS Player according to your needs and style. The package contains AXMEDIS MPEG-21 demostrative contents as well.The AXMEDIS player with SKIN...
91.29 MB  
Audio Tools  -  AXMEDIS PC Player 1. 9. 2001
AXMEDIS MPEG-21 player for PC is capable of: Loading and playing protected and non protected AXMEDIS objects. The AXMEDIS objects may contain any kind of digital resources. Those that can be directly played the AXMEDIS PC player can be: images...
116.5 MB  
Modules  -  OG promote 1.0
Choose one role that all users who join the groups you select will be promoted to. Should a user leave that group, he will be demoted again.Installation - Unpack in your modules folder (usually /sites/all/modules/) and enable under Administer >...
 
NEW DOWNLOADS IN WINDOWS SOFTWARE, SECURITY TOOLS
Windows Software  -  iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them...
144.59 MB  
Windows Software  -  Lock Cursor Tools 7.0
Lock Cursor Tools simply locks the mouse cursor. You may choose a predetermined area, the primary or secondary monitor screen or part of the window of a particular application. Lock Cursor Tools makes your computer work more productively by...
1.34 MB  
Windows Software  -  Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without...
28.29 MB  
Windows Software  -  WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible...
2.27 MB  
Windows Software  -  WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,...
223 KB  
Security Tools  -  Privacy Eraser Free 6.4
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,...
9.41 MB  
Security Tools  -  WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:...
9.39 MB  
Security Tools  -  USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock...
11 KB  
Security Tools  -  Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and...
407 KB  
Security Tools  -  Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should...
29.53 MB