0
(0)
Panda Adaptive Defense 360 on Aether Platform Panda Adaptive Defense on Aether Platform
Panda Endpoint Protection on Aether Platform Panda Endpoint Protection Plus on Aether Platform
Panda Adaptive Defense 360 allows computers without direct Internet access to use the proxy server installed on the network. If no proxy is accessible, you can assign the proxy role to a computer with Adaptive Defense 360 installed. For further information, see Internet connections through proxy in products based on Aether article.

Requirements for the proxy server

  • Port 3128 open for inbound and outbound connections.
  • Short path 8.3 file system required. For further information, please refer to this Microsoft article.

Configuring a computer as a proxy server

  1. Click the Network settings tab. Select an existing Proxy and language settings profile or create a new one.
  2. Expand the Proxy section and select Adaptive Defense 360 proxy.
  3. Click Select computer…
  4. In the computer selection window, click Add proxy server. A list will be displayed with all managed computers that haven’t been designated as proxy server yet.
  5. Select the computers that will act as a proxy server for all other workstations and servers protected by Adaptive Defense 360.

    NOTE: For Linux, it is not possible to add more than one machine as proxy, therefore, there is no fallback mechanism in place.

Revoking the proxy role

  • Click the Network settings tab. Select an existing Proxy and language settings profile or create a new one.
  • Expand the Proxy section and select Adaptive Defense 360 proxy.
  • Click Select computer..
  • Click the icon of the computer that you want to stop acting as a proxy.

Fallback mechanism

When a Panda agent cannot connect to the Aether platform, in Windows, the following fallback logic is applied to restore the connection via other means:

  • If the Internet connection is configured via corporate proxy or Panda Adaptive Defense 360 proxy and there is no response, an attempt is made to connect directly.
  • Internet Explorer: The Panda agent tries to recover the Internet Explorer proxy settings with the profile of the user logged in to the computer.
    • If the configuration of the proxy credentials is defined explicitly, this method can?t be used.
    • If the Internet Explorer proxy settings use PAC (Proxy Auto-Config) the URL is obtained from the settings file, provided that the protocol is HTTP or HTTPS.
  • WinHTTP / WinInet: The default proxy settings are read.
  • WPAD (Web Proxy Auto-discovery Protocol): A request is sent to the network via DNS or DHCP to get the URL that points to the PAC settings file.
Help nº- 20210609 700030 EN

Source : Official Panda Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 27 times, 1 visits today)