Configuring Clients for Non-Persistent Desktops

General

The Solution:

Note - All endpoints connected to the Shared Signature Server must be on the same domain.

Recommended Steps:

  1. Configure a signature server machine.

  2. Configure a client machine (golden image).

  3. Create a test pool.

  4. Deploy the production pool.

Shared Signatures Server

A Shared Signatures Server:

  • Installs as a regular Endpoint Security Client and becomes a "signature server" later.

  • Responsible for holding the latest Anti-Malware signatures.

    The signatures store in a read-only shared folder and update according to policy.

  • Must run on a persistent virtual machine, preferably on the same storage as the clients.

  • Must connect to the Internet to update signatures.

Configuring the Signatures Server

For the Endpoint Security Clients version E84.20 (and higher), you can configure the Signature Server with a policy.

Setup Validation

Wait 20 minutes to make sure:

  • Anti-Malware Signatures version is current.

  • Shared Signatures folder exists with Anti-Malware signatures.

    Important - If the folder is empty, the setup is not valid.

Client Machine Configuration for Non-Persistent Desktops

Creating a Basic Golden Image for Non-Persistent Desktops

See Basic Golden Image Settings for the procedure to create a basic golden image.

Configuring the Client Machine

For the Endpoint Security Clients version E84.20 (and higher), you can configure up the client machines (the golden image) by policy.

  1. Disable the Anti-Malware Periodic Scan.

    See Appendix.

  2. Configure signature source for the VDI client.

Important:

  • When you apply VDI settings through Policy to Golden Image, you must apply VDI settings through Policy to cloned Virtual Machines.

Post Setup Actions

  • Make sure the Shared Signatures folder is accessible from the golden image and the folder has signatures.

  • Make sure the Anti-Malware signatures are current.

  • Scan for malwares with the latest signatures.

Creating a Pool for Non-Persistent Desktops

Note - Check Point recommends that each created pool will use a different machine naming pattern. This will prevent situations where Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. has duplicate machine entries from different pools.

VMware Horizon Key Points

This procedure is mandatory to create supported Horizon pools for Non-Persistent Virtual Desktops.

Citrix Xen-Desktop Key Points

  • When you select the Operating System type, use Single-Session OS.

  • When you select the User Experience type, use a non-dedicated desktop experience.

Pool Validation

Access a few cloned machines and make sure that:

Disabling the Anti-Malware Periodic Scan

"Anti-Malware Scan Storms" can occur when several anti-virus scans run simultaneously on multiple virtual machines on the same physical server. In such situation, a degradation of system performance is possible, which can affect disk I/O and CPU usage. It is then recommended that you disable the Anti-Malware periodic scan:

  1. Go to the Policy Page.

  2. In the right pane, click the Web & Files Protection tab.

  3. Scroll down and click the Advanced Settings button.

  4. From the left tree, select Files Protection > Scan.

  5. In the Perform Periodic Scan Every field, select Never.

Software Blades for Non-Persistent Desktops

The Endpoint Security client capabilities for non-persistent virtual desktops are:

  • Anti-Malware

    • Fully supported when configured with the Shared Signatures Server.

  • Compliance, Firewall and Application Control, Remote Access VPN, and URL Filtering

    • Fully supported.

  • Forensics

    • Partially supported.

      • The Forensics database contains data for the current session.

      • Forensics Reports generate as usual.

  • Threat Emulation and Anti-Exploit

    • Partially supported.

      • Signatures are not in cache.

      • Signatures download for each new instance.

  • Anti-Bot

    • Partially supported.

      • Signatures are not in cache.

      • Signatures download for each new instance.
      • Cached data (such as the URLs checked against Threat-Cloud and Detection List) are lost on logoff.

  • Ransomware "Honeypots"

    • Partially supported.

      • Part of the Golden Image.

  • Behavioral Guard

    • Partially supported.

      • Signatures are not in cache.

      • Signatures download for each new instance.

  • Full Disk Encryption and Capsule Docs

    • Not supported for non-persistent desktops.

  • Media Encryption & Port Protection