10.6. Deploying Virus Protection

Now that you have a good idea of how viruses work and what tools are available to prevent infection, let's take a look at some deployment methods to safeguard your network.

NOTE

These suggestions should only be considered a guide; feel free to make modifications that better fit your specific needs.

The network diagram in Figure 10.1 shows a mixed environment that uses a number of different server operating systems. The desktop environment utilizes a mixture of operating systems, as well. Let's assume that you are consulting for the organization that owns this environment and you have been charged with protecting it from viruses, as well as Trojans and worms. You have also been asked to perform this task with ...

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.