Technischer Support

Benötigen Sie Hilfe?

 

Best Practices regarding the upgrade process of your network environment

Information anzuwenden auf:

Produkts
Panda Adaptive Defense 360 on Aether PlatformPanda Adaptive Defense on Aether Platform
Panda Endpoint Protection on Aether PlatformPanda Endpoint Protection Plus on Aether Platform

Situation
This article provides you with guidelines and recommendations regarding the protection upgrade of Panda Adaptive Defense/Panda EndPoint Protection products in your network environment.

Panda Security products are extensively tested in our Quality department during pre-release phases. However, there may be custom applications and specific environments that may not be fully covered. The main objective of this guide is to provide instructions to put in place a controlled upgrade process that reduces the risk of potential issues and ensures a smooth upgrade of your network environment.

Considerations
Usually, administrators decide to plan the upgrade of their environment, either to be able to test a new product feature, or to install a new version that includes a fix for an existing issue. These specific upgrade requests are usually managed directly through an Account Manager or a Support representative.
As a general consideration, bear in mind that a version upgrade could potentially lead to the following:

  • Console version upgrade (transparent, at the Panda server side).
  • Agent version upgrade (transparent, does not require reboot, at the endpoint side).
  • Protection version upgrade.

    As it happens in other security software applications, the Panda Security protection runs in the background of the operating system and is the most sensitive module of our security products. Sometimes, upgrading the protection may require to uninstall or install drivers that may cause the computer to restart. Moreover, the protection upgrade can interact with other shutdown pending tasks scheduled at that time at the endpoint, for example, tasks triggered by Microsoft KB updates.

    IMPORTANT! In this case, clear those pending shutdown tasks by restarting the affected endpoints before the upgrade operation takes place.

NOTE: To enable/disable and configure upgrade settings, open the administration console, select the Settings tab, click on the left pane Per-computer settings menu, and access the Updates section:


Controlled Protection Upgrade Process
A controlled protection upgrade limits the scope of the process to a few endpoints and groups that you, as network administrator, designate. Once you verify everything is working as expected after you apply the limited upgrade to certain groups of computers, we recommend that you plan and execute the process for the rest of your network gradually.

Follow the steps below:

  1. Disable the Upgrade option in all your profiles.
  2. Create a profile or group and include a set of computers and devices that are representative of your environment, for example: regular endpoints, endpoints with key business applications, endpoints with settings that are specific to the management team, servers with key custom applications installed, etc.
  3. FOR SERVERS (AND ENDPOINTS THAT ARE NOT REBOOTED FREQUENTLY):
    To minimize
    the impact of the protection upgrade interacting with other shutdown pending tasks scheduled at that time, reboot the server at the beginning of the maintenance window before the Panda endpoint security protection upgrade takes place.
  4. Enable the upgrade settings for that group.
  5. Monitor the upgrade for a reasonable period of time, such as one or two weeks, to ensure the upgrade has been carried out succesfully and all the applications are working as expected. Be aware that, in most cases, upgrading requires a complete reboot. If you experience any issues, raise a case with your Support representative.
  6. Split the deployment of the protection upgrade of your network into progressive stages. The process can be done in two or three phases, depending on your network configuration (number of endpoints, servers, etc.).

Take into consideration that to ensure the best protection of your environment, all the endpoints of your network, including your servers, plus environments with gold images or virtual systems in place, must be migrated to the latest protection version and get the latest technologies available.

Artikelnummer- 20240730 700039 EN
IMMER ONLINE, UM IHNEN ZU HELFEN TWITTER FORUM
IMMER ONLINE, UM IHNEN ZU HELFEN < TWITTER FORUM