Host Checker. Configuration Guide
|
|
|
- Drusilla Reynolds
- 10 years ago
- Views:
Transcription
1 Host Checker Configuration Guide Overview... 2 Client Side requirements for Host Checker:... 2 Qualified platforms:... 2 Compatible platforms:... 2 Windows clients... 3 Installer Package Files and File Location:... 4 Additional Installer Package Files and File Locations:... 4 Files Remaining After Uninstall:... 5 Registry Modifications:... 5 Log File Locations... 6 Macintosh Clients:... 6 Application and Additional Files Installed by Host Checker:... 6 Files Remaining After Uninstal:... 6 Log files Installed by Host Checker:... 6 Linux Clients:... 6 Application and Additional Files Installed by Host Checker... 6 Files Remaining After Uninstall... 7 Log Files Installed by Host Checker:... 7 Required rights to run and install applications:... 7 Configuring Global Host Checker settings:... 7 Perform check every X mins... 8 Client-side process, login inactivity timeout... 8 Auto-upgrade Host Checker... 8 Perform dynamic policy reevaluation... 8 Create Host Checker Connection Control Policy... 8 Advanced Endpoint Defense: Malware Protection... 9 Pre 6.5:... 9 Post 6.5: Virus signature version monitoring Patch Management Info monitoring: Host Checker policies Configuring a Host Checker policy Predefined Antivirus check Juniper Networks, Inc.
2 Predefined Firewall Policy Predefined Malware policy Predefined Anti-Spyware policy Predefined: OS Checks Custom: 3rd Party NHC Check Custom: Ports policy Custom Process policy Custom File Policy Custom Registry Settings policy Custom NetBIOS policy Custom MAC Address policy Custom Machine Certificate Policy Configuring Host Checker Restrictions If you want to implement Host Checker at the realm level: If you want to implement Host Checker at the role level: If you want to create role-mapping rules based on a user s Host Checker status: If you want to implement Host Checker at the resource policy level: Step by Step configuration for a test scenario Objective: Configuration: Juniper Networks, Inc. 1
3 Overview: Host Checker is a client-side agent that performs endpoint checks on hosts that connect to the IVE. You can invoke Host Checker before displaying an IVE sign-in page to a user and when evaluating a role mapping rule or resource policy. The IVE and Host Checker comply with the standards produced by the Trusted Network Connect (TNC) subgroup of the Trusted Computing Group. For more information about IMVs and IMCs, see The IVE can check hosts for endpoint properties using a variety of rule types, including rules that check for and install advanced malware protection; predefined rules that check for antivirus software, firewalls, malware, spyware, specific operating systems, third party DLLs, ports, processes, files, registry key settings, and the NetBIOS name, MAC address, or certificate of the client machine. Client Side requirements for Host Checker: Qualified platforms: The platforms listed in the qualified category have been systematically tested by Juniper QA department as part of the 6.5 release. Platform Operating System : list of browsers and Java Environment Windows XP Professional SP3 32 bit: Internet Explorer 7.0, 8.0 and Firefox 3.0.Sun JRE 6 Vista Enterprise SP1 32 bit: Internet Explorer 7.0, 8.0 and Firefox 3.0.Sun JRE 6 Windows 7 Enterprise 32 bit: Internet Explorer 8.0 and Firefox 3.5 Sun JRE 6 (6.5R2 and above) Mac Mac OS X , 32 and 64 bit : Safari 3.2.Sun JRE 6 Mac OS X , 32 bit only: Safari 2.0. Sun JRE 5 Linux OpenSuse 11, 32 bit only: Firefox 3.0.Sun JRE 6 Ubuntu 8.10, 32 bit only: Firefox 3.0.Sun JRE 6 Compatible platforms: The platforms listed in the compatible category have not been systematically tested by Juniper QA department in the 6.5 but based on testing in previous releases and knowledge of the platform Juniper expects that the functionality will work and will fully support these platforms Juniper Networks, Inc. 2
4 Platform Operating System Browsers and Java Environment Windows Mac Linux Vista Enterprise/Ultimate/Business/Home Basic/Home Premium with Service Pack 1 or 2 on 32 bit or 64 bit platforms Windows 7 Enterprise/Ultimate/Professional/Home Basic/Home Premium on 32bit or 64 bit platforms (6.5R2 and above) XP Professional with SP2 or SP3 on 32 bit or 64 bit 2000 Professional SP4 XP Home SP3 XP Media Center 2005 Windows 2003 server SP2, 32bit and 64 bit Mac OS X 10.6, 32 bit and 64 bit Mac OS X 10.5.x, 32 bit and 64 bit Mac OS X 10.4.x, 32 bit only Mac OS X 10.3.x, 32 bit only OpenSuse 10.x, 32 bit only Ubuntu 7.10, 32 bit only Red Hat Enterprise Linux 5, 32 bit only Internet Explorer 8.0 * Internet Explorer 7.0 * Internet Explorer 6.0 * Firefox 3.5 Firefox 3.0 Firefox 2.0 Sun JRE 5/ and above Microsoft JVM for Windows 2000 ( * Whereverapplicable) Safari 1.2 and above Sun JRE 5/ and above Firefox 2.0 and above Solaris Solaris 10, 32 bit only Mozilla 2.0 and above Windows clients: To run Host Checker, the IVE downloads the dshostcheckersetup.exe.cab package to the user s client. This package is responsible for downloading additional files to the user s system in order to run Host Checker. Host Checker deletes the dshostcheckersetup.exe.cab package after installation is complete. Juniper Networks, Inc. 3
5 Installer Package Files and File Location: Host Checker installs the following CAB file: %TEMP%\dsHostCheckerSetup.exe.cab Additional Installer Package Files and File Locations: Host Checker installs the following additional files on the client in C:\Documents and Settings\username\Application Data\Juniper Networks\Host Checker: CertAuthIMC.dll dshostchecker.exe dshostcheckerproxy.exe dshostcheckerresource_de.dll dshostcheckerresource_en.dll dshostcheckerresource_es.dll dshostcheckerresource_fr.dll dshostcheckerresource_ja.dll dshostcheckerresource_ko.dll dshostcheckerresource_zh.dll dshostcheckerresource_zh_cn.dll dsnsisdll.dll dswinclient.dll dswinclientresource_de.dll dswinclientresource_en.dll dswinclientresource_es.dll dswinclientresource_fr.dll dswinclientresource_ja.dll dswinclientresource_ko.dll dswinclientresource_zh.dll dswinclientresource_zh_cn.dll EPCheck.dll hcimc.dll Juniper Networks, Inc. 4
6 install.log JSystemIMC.dll msvcp60.dll restore_win2k.txt restore_win98.txt ShavlikIMC.dll tnc_config uninstall.exe versioninfo.ini In addition, if you implement policies that download or check for third-party software, Host Checker may install additional DLLs in subdirectories of: C:\Documents and Settings\username\Application Data\Juniper Networks\Host Checker. Files Remaining After Uninstall: jnprvamgr.sys. Registry Modifications: Host Checker sets the following registry values: String LogFile level Language InstallPath Set in HKEY_CURRENT_USER\SOFTWARE\Juniper Networks\Host Checker\Debug\dsHostChecker HKEY_CURRENT_USER\SOFTWARE\Juniper Networks\Host Checker\Debug\dsHostChecker HKEY_CURRENT_USER\SOFTWARE\Juniper Networks\Host Checker HKEY_CURRENT_USER\SOFTWARE\Juniper Networks\Host Checker Additionally, Host Checker sets the following values in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Neoteris_Host_Checker: String DisplayName Set to Juniper Networks Host Checker DisplayVersion current product version number Juniper Networks, Inc. 5
7 Publisher Juniper Networks QuietUninstallString C:\Documents and Settings\username\Application Data\Juniper Networks\Host Checker <version number>\uninstall.exe" /S" StartupApp StopApp UninstallString URLInfoAbout C:\Documents and Settings\username\Application Data\Juniper Networks\Host Checker\dsHostChecker.exe C:\Documents and Settings\username\Application Data\Juniper Networks\Host Checker\dsHostChecker.exe -stop C:\Documents and Settings\username\Application Data\Juniper Networks\Host Checker\uninstall.exe Log File Locations You can enable or disable client-side logs through the System > Log/Monitoring > Client Logs > Settings tab of the Web console. When you enable logging, Host Checker adds log files to the following locations: C:\Documents and Settings\All Users\Application Data\Juniper Networks\Logging\debuglog.log (Windows XP) C:\users\username\AppData\Roaming\Juniper Networks\Logging\debuglog.log (Windows Vista and Windows 7) C:\Users\Public\Juniper Networks\Logging\debuglog.log (Windows Vista and Windows 7) Macintosh Clients: The following information applies to Macintosh clients only. Application and Additional Files Installed by Host Checker: Host Checker installs the following files on the Macintosh client: ~/Library/Application Support/Juniper Networks/tncc.jar ~/Library/Application Support/Juniper Networks/hcport.txt Files Remaining After Uninstal: There is no Host Checker uninstall on the Macintosh client. Log files Installed by Host Checker: Host Checker stores the log files in the following location on the Macintosh client: ~/Library/Logs/Juniper Networks Linux Clients: The following information applies to Linux clients only. Application and Additional Files Installed by Host Checker Juniper Networks, Inc. 6
8 Host Checker installs $HOME/.juniper_networks/tncc.jar on the Linux client. Files Remaining After Uninstall The following files remain on the Linux client after uninstall: $HOME/.juniper_networks/dsHCLauncher_linux1.log $HOME/.juniper_networks/dsHostChecker_linux1.log Log Files Installed by Host Checker Host Checker installs the following log files on Linux systems. $HOME/.juniper_networks/dsHCLauncher_linux1.log $HOME/.juniper_networks/dsHostChecker_linux1.log Log Files Installed by Host Checker: Host Checker installs the following log files on Linux systems. $HOME/.juniper_networks/dsHCLauncher_linux1.log $HOME/.juniper_networks/dsHostChecker_linux1.log Required rights to run and install applications: The following table outlines the rights that are required to install and run the Host Checker client-side components using the IVE s ActiveX, ActiveX installer service, and Java mechanisms. ActiveX ActiveX: Installer Service Java Java Action Windows Windows Windows Mac/Linux Install Restricted, Power User or Admin Restricted, Power User or Admin Restricted, Power User or Admin Not Applicable Run Restricted, Power User or Admin Restricted, Power User or Admin Restricted, Power User or Admin Not Applicable Configuring Global Host Checker settings: Below is a brief of the various options available in the Host Checker configuration page. Juniper Networks, Inc. 7
9 Perform check every X mins: Specify the interval at which you want Host Checker to perform policy evaluation on a client machine. If the client machine fails to meet the requirements of the Host Checker policies required by a role or resource policy, then the IVE denies the associated user requests. NOTE: If you enter a value of zero, Host Checker only runs on the client machine when the user first signs into the IVE. Client-side process, login inactivity timeout: This option specifies an interval to control timing out in the following situations: If the user navigates away from the IVE sign-in page after Host Checker starts running but before signing in to the IVE, Host Checker continues to run on the user s machine for the interval you specify. If the user is downloading Host Checker over a slow connection, increase the interval to allow enough time for the download to complete. Auto-upgrade Host Checker: Allows you to automatically upgrade the Host Checker component on the client machines once the IVE software is upgraded. Perform dynamic policy reevaluation: This option allows you to automatically refresh the roles of individual users by enabling dynamic policy evaluation for Host Checker. Host Checker can trigger the IVE to evaluate resource policies whenever a user s Host Checker status changes. Create Host Checker Connection Control Policy: This policy prevents attacks on Windows client computers from other infected computers on the same physical network. The Host Checker connection control policy blocks all incoming TCP connections. This policy allows all outgoing TCP and Network Connect traffic, as well as all connections to DNS servers, WINS servers, DHCP servers, proxy servers, and the IVE. Juniper Networks, Inc. 8
10 Advanced Endpoint Defense: Malware Protection: Pre 6.5: In versions prior to 6.4, Host Checker would download and run Whole Security Confidence Online software on your users computers. This software scans for malicious programs, including: Trojan horses Hackers write trojan horses to remotely administer an infected machine. Trojan horses almost always install themselves on a user s computer without the authorized user s knowledge. Key logger software Hackers write key logger software to eavesdrop on a user by capturing and logging his typed keystrokes. Key logger software installs itself on a user s computer without the authorized user s knowledge. Monitoring applications Monitoring applications are end-user software applications that monitor and record user activity. Users typically install this software themselves to monitor the activity of children, spouses, and other users who share their computers. Remote controls Remote control applications are commercial applications such as VNC that offer easy remote access to an authorized user for computer administration activities. Note: Each user s computer must be able to access the Whole Security site (update.wholesecurity.com) so that Confidence Online can periodically download the latest definition files. The options here are explained below, Enable Silent Enforcement of Signature Scan: If you do not want Confidence Online to notify users when it blocks trojan horse, key logger software, and other applications that it deems malicious. (Note that Confidence Online accesses a Whole Security server on a daily basis in order to keep its list of malicious applications current.) Enable User Control over disabling Behavior Blocker: If you want to enable users to choose whether or not to block monitoring applications, remote control software, and other potentially legitimate applications. If you select this option, users can view and control blocked applications through a Confidence Online icon in their system trays. (For more information, see the Confidence Online end-user help system.) If you do not select this option, Confidence Online simply blocks these applications without user interaction. Once you enable these options, Host Checker would automatically create the necessary policies for you. These appear under the User Realms > Select Realm > Authentication Policies > Host Checker and under User Roles > Select Role > Authentication Policies > Host Checker. Below are a list of the policies created by the IVE and their descriptions. Juniper Networks, Inc. 9
11 Advanced Endpoint Defense: Malware Protection.Behavior Blocker This policy is created by Whole Security. It enables the Confidence Online behavior blocker software to block keystroke logger software, screen capture software, and other applications that try to eavesdrop on user sessions. Only administrators can install and run the behavior blocker feature in Confidence Online. The behavior blocker feature is supported on Windows 2000 and Windows XP systems. Advanced Endpoint Defense: Malware Protection.Category One Threats (Trojan Horses and Key Loggers) This policy is created by Whole Security. It enables the Confidence Online software to block trojan horse programs, spyware, malware, and other malicious applications. Restricted users, power users, and administrators can install and run the scanning feature in Confidence Online. The scanning feature is supported on Windows NT4, Windows 2000, and Windows XP systems. Advanced Endpoint Defense: Malware Protection.Category Two Threats (Monitoring Applications and Remote Controls) This policy is created by Whole Security. It enables the Confidence Online software to block monitoring applications, remote control software, and other potentially legitimate applications. Restricted users, power users, and administrators can install and run the scanning feature in Confidence Online. The scanning feature is supported on Windows NT4, Windows 2000, and Windows XP systems. Post 6.5: From release 6.5 onwards, Host Checker includes integrated antispyware functionality provided by Web Root that can detect and remediate Windows endpoints with spyware and keyloggers. Advanced Endpoint Defense (AED) ensures that malware, spyware, viruses or worms are not present on endpoints that attempt to connect to the IVE, and you can restrict or quarantine these endpoints depending on your Host Checker policy configuration. This feature uses a signature database that is automatically downloaded from Web Root Spy Sweeper servers on the Internet. You can configure the age of the database on the IVE to determine the frequency of updates. The age of the database is the threshold used to determine if a user can access resources by passing a Host Checker policy. Juniper Networks, Inc. 10
12 By default, with the base license, 2 simultaneous endpoints can use this feature. You can purchase a separate license to enable additional users. Note that if you configure an AED policy for endpoints, a separate installer is downloaded to endpoints. User endpoints are scanned for offending software, and signatures may be automatically installed. Once you enable these options, Host Checker would automatically create the necessary policies for you. These appear under the User Realms > Select Realm > Authentication Policies > Host Checker and under User Roles > Select Role > Authentication Policies > Host Checker as shown below. Note: EES log messages are included in the Juniper debug log files on the end-user systems. WebRoot debug logs are located in <%AllUsersProfile%\Application Data\Webroot\WRSSMini\Logs>. Only the last three logs are saved to conserve disk space. WebRoot memory dumps are also located in <%AllUsersProfile%\Application Data\Webroot\WRSSMini\Logs>. Virus signature version monitoring: You can configure Host Checker to monitor and verify that the virus signatures installed on client computers are up to date, and remediate those endpoints that do not meet the specified criteria. Host Checker uses the current virus signatures versions from the vendor(s) you specify for pre-defined rules in a Host Checker policy. You can automatically import the current Virus signature version monitoring lists from the Juniper Networks staging site at a specified interval, or you can download the files from Juniper and use your own staging server. Juniper Networks, Inc. 11
13 The default staging site for Juniper Networks is To access the Juniper Networks staging site for updates, you must enter the credentials for your Juniper Networks Support account. Note: Please note that all connections towards the Download path configured is made from the IVE internal interface ONLY. Patch Management Info monitoring: Similar to the Virus Signature version monitoring, you could also configure Host Checker to monitor and verify that the operating systems, software versions, and patches installed on client computers are up to date, and remediate those endpoints that do not meet the specified criteria. You can automatically import the current Patch Management Info Monitoring lists from the Juniper Networks staging site at a specified interval, or you can download the files from Juniper and use your own staging server. The default URLs are the paths to the Juniper Networks staging site is You must enter the credentials for your Juniper Networks Support account. Note: Please note that all connections towards the Download path configured is made from the IVE internal interface ONLY. Host Checker policies: Below is a description of the various endpoint checks supported by Host Checker on various OS platforms.. Juniper Networks, Inc. 12
14 Windows Mac Linux Solaris Windows Mobile Predefined: Antivirus Custom: Ports Custom: Ports Custom: Ports Custom: Ports Predefined: Firewall Custom: Process Custom: Process Custom: Process Custom: Process Predefined: Malware Custom: Files Custom: Files Custom: Files Custom: Files Predefined: AntiSpyware Predefined: OS Checks Custom: 3rd Party NHC Checks Predefined: OS Checks Custom: Registry Setting Custom: Machine Certificates Custom: Ports Custom: Process Custom: Files Custom: Registry Setting Custom: NetBIOS Custom: MAC Address Custom: Machine Certificates Custom: Patch Assessment Configuring a Host Checker policy Go under Authentication > Endpoint Security > Host Checker on the Admin GUI. Go under Policies and click on New. Choose the appropriate OS you require to configure the checks for. Select the appropriate Rule Type. Below is a brief on how to configure the various Rule Types. Predefined Antivirus check: This check helps you configure checks for Antivirus products on the client machine. Juniper Networks, Inc. 13
15 Enter a name for this antivirus rule. To determine if your software vendor s product is supported for the System Scan check, click these Antivirus products. A new window will open with a list of all of the products that support the feature. Select or clear the check box next to Successful System Scan must have been performed in the last _ days, and enter the number of days in the field. If you select this check box, a new option appears. If the remediation action to start an antivirus scan has been successfully begun, you can override the previous check. Select or clear the check box next to Consider this rule as passed if Full System Scan was started successfully as remediation. Select or clear the check box next to Virus definition files should not be older than _ updates. Enter a number between 1 and 10. If you enter 1, the client must have the latest update. You must import the virus signature list for the supported vendor. Select your antivirus vendor(s) and product(s) by using either the Require any supported product or Require specific products/vendors option buttons. Note: In case you donot see the Antivirus product you wish to check for listed, please make sure that you are running the latest ESAP version. You could check the Juniper Support portal () for the latest version of ESAP along with the documentation showing all the supported products on this ESAP version. In case you still donot find the Antivirus product you are looking for, please open a Support case with Juniper Support. Require any supported product allows you to check for any product (rather than requiring you to select every product separately). This option button reveals a list of products in the remediation section to allow you to enable remediation options which are product specific. Juniper Networks, Inc. 14
16 Require specific products/vendors allows you to define compliance by allowing any product by a specific vendor (for example, any Symantec product). Require specific products provides functionality that allows you to select individual products to define compliance. After you select your vendor(s) and product(s), remediation options will appear on the page. For each of the following remediation actions: Download latest virus definition files obtains the latest available file for the specified vendor from the vendor s website Turn on Real Time Protection launches the virus scanning mechanism for the specified vendor Start Antivirus Scan performs a real-time virus scan for the specified vendor the check box is active (clickable) if the action is supported for your product. If your antivirus product is not supported, you can click the remediation column headers to determine what vendors and products are supported. Under Optional, select Monitor this rule for change in result to continuously monitor the policy compliance of endpoints. If this check box is selected, and a change in compliance status on an endpoint that has successfully logged in occurs, the IVE initiates a new handshake to re-evaluate realm or role assignments. Predefined Firewall Policy: You can configure firewall remediation actions with Host Checker after you create a Host Checker firewall rule that requires the endpoint to have a specific firewall installed and running prior to connecting to the network. After you enforce the Host Checker rule with firewall remediation actions, if an endpoint attempts to log in without the required firewall running, Host Checker can attempt to enable the firewall on the client machine. The remediation option is not supported for all firewall products. All available products are displayed by using the Require any supported product or Require specific products/vendors option buttons. Juniper Networks, Inc. 15
17 Enter a name for the firewall rule. Select your firewall vendor(s) and product(s) by using either the Require any supported product or Require specific products/vendors option buttons. Require any supported product allows you to check for any product (rather than requiring you to select every product separately). This option button reveals a list of products in the remediation section to allow you to enable remediation options which are product specific. When you add an available product to Selected Products, the remediation option appears, and you can determine if the remediation option is available for your selected firewall. Require specific products/vendors allows you to define compliance by allowing any product by a specific vendor (for example, any Symantec product). Require specific products provides functionality that allows you to select individual products to define compliance. After you select your vendor(s) and product(s), the remediation options on will appear on the page. The Turn on Firewall check box is active (clickable) if the action is supported for your product. If your firewall is supported, select the check box to Turn on Firewall. Under Optional, select Monitor this rule for change in result to continuously monitor the policy compliance of endpoints. If this check box is selected, and a change in compliance status on an endpoint that has successfully logged in occurs, the IVE initiates a new handshake to re-evaluate realm or role assignments. Predefined Malware policy: Select this option to check for the malware protection software you specify. Juniper Networks, Inc. 16
18 Predefined Anti-Spyware policy: You can configure Host Checker to check for installed spyware on endpoints. After you enforce the Host Checker rule, if an endpoint attempts to log in without the required spyware, the Host Checker rule will fail. The option is not supported for all spyware products. All available products are displayed by using the Require any supported product or Require specific products/vendors option buttons. Enter a name for the firewall rule. Select one of the following options: Select the Require any supported product option button to check for any product (rather than requiring you to select every product separately). Select the Require specific products/vendors option button to specify the spyware that you want to check for. Choose either the Require any supported product from a specific vendor or Require specific products to select your spyware. Add your available spyware from Available Products to Selected Products. Juniper Networks, Inc. 17
19 Under Optional, select Monitor this rule for change in result to continuously monitor the policy compliance of endpoints. If this check box is selected, and a change in compliance status on an endpoint that has successfully logged in occurs, the IVE initiates a new handshake to re-evaluate realm or role assignments. Predefined: OS Checks Select this option to create a rule that checks for the Windows operating systems and minimum service pack versions that you specify. (Any service pack whose version is greater than or equal to the version you specify satisfies the policy.) Custom: 3rd Party NHC Check: Host Checker has the ability to call the NHC implementation of a supported endpoint security application or a custom DLL that implements NHC. Use this rule type to specify the location of a custom DLL. Host Checker calls the DLL to perform customized client-side checks. If the DLL returns a success value to Host Checker, then the IVE considers the rule met. Please go through the Endpoint Defense Integration Guide available at the Juniper Support Portal ( ) to understand the configurations for 3 rd Party NHC Checks. Custom: Ports policy: Use this rule type to control the network connections that a client can generate during a session. This rule type ensures that certain ports are open or closed on the client machine before the user can access the IVE. In the Ports configuration page: Juniper Networks, Inc. 18
20 Enter a name for the port rule. Enter a comma delimited list (without spaces) of ports or port ranges, such as: 1234, ,1235. Select Required to require that these ports are open on the client machine or Deny to require that they are closed. Under Optional, select Monitor this rule for change in result to continuously monitor the policy compliance of endpoints. If this check box is selected, and a change in compliance status on an endpoint that has successfully logged in occurs, the IVE initiates a new handshake to re-evaluate realm or role assignments Custom Process policy: Use this rule type to control the software that a client may run during a session. This rule type ensures that certain processes are running or not running on the client machine before the user can access resources protected by the IVE. In the Processes configuration page: Enter a name for the process rule. Enter the name of a process (executable file), such as: good-app.exe. You can use a wildcard character to specify the process name. For example: good*.exe Juniper Networks, Inc. 19
21 Select Required to require that this process is running or Deny to require that this process is not running. Specify the MD5 checksum value of each executable file to which you want the policy to apply (optional). For example, an executable may have different MD5 checksum values on a desktop, laptop, or different operating systems. On a system with OpenSSL installed many Macintosh, Linux and Solaris systems have OpenSSL installed by default you can determine the MD5 checksum by using this command: openssl md5 <processfilepath> NOTE: For Linux, Macintosh and Solaris systems, the process that is being detected must be started using an absolute path. Custom File Policy: Use this rule type to ensure that certain files are present or not present on the client machine before the user can access the IVE. You may also use file checks to evaluate the age and content (through MD5 checksums) of required files and allow or deny access accordingly. In the Files configuration page: Enter a name for the file rule. Enter the name of a file (any file type), such as: c:\temp\bad-file.txt or /temp/bad-file.txt. You can use a wildcard character to specify the file name. For example: *.txt You can also use an environment variable to specify the directory path to the file. (You cannot use a wildcard character in the directory path.) Enclose the variable between the <% and %> characters. For example: <%windir%>\bad-file.txt Select Required to require that this file is present on the client machine or Deny to require that this file is not present. Specify the minimum version of the file (optional). For example, if you require notepad.exe to be present on the client, you can enter 5.0 in the field. Host Checker accepts version 5.0 and above, of notepad.exe. Specify the maximum age (File modified less than n days) (in days) for a file (optional). If the file is older than the specified number of days, then the client does not meet the attribute check requirement. Specify the MD5 checksum value of each file to which you want the policy to apply (optional). On Macintosh, Linux and Solaris, you can determine the MD5 checksum by using this command: openssl md5 <filepath> Select Monitor this rule for change in result to continuously monitor the policy compliance of endpoints. If this check box is selected, and a change in compliance status on an endpoint that has successfully logged in occurs, the IVE initiates a new handshake to re-evaluate realm or role assignments. Juniper Networks, Inc. 20
22 Custom Registry Settings policy: Use this rule type to control the corporate PC images, system configurations, and software settings that a client must have to access the IVE. This rule type ensures that certain registry keys are set on the client machine before the user can access the IVE. You may also use registry checks to evaluate the age of required files and allow or deny access accordingly Enter a name for the registry setting rule. Select a root key from the drop-down list. Enter the path to the application folder for the registry subkey. Enter the name of the key s value that you want to require (optional). This name appears in the Name column of the Registry Editor. Select the key value s type (String, Binary, or DWORD) from the drop-down list (optional). This type appears in the Type column of the Registry Editor. Specify the required registry key value (optional). This information appears in the Data column of the Registry Editor. If the key value represents an application version, select Minimum version to allow the specified version or newer versions of the application. For example, you can use this option to specify version information for an antivirus application to make sure that the client antivirus software is current. The IVE uses lexical sorting to determine if the client contains the specified version or higher. For example: is newer than 3.3, 4.0 is newer than 3.3 Under Optional, select Monitor this rule for change in result to continuously monitor the policy compliance of endpoints. If this check box is selected, and a change in compliance status on an endpoint that has successfully logged in occurs, the IVE initiates a new handshake to re-evaluate realm or role assignments. You can configure registry setting remediation actions with Host Checker. If a client attempts to login, and the client machine does not meet the requirements you specify, Host Checker can attempt to correct the discrepancies to allow the client to login. Select the check box for Set Registry value specified in criteria. NOTE: If you specify only the key and subkey, Host Checker simply verifies the existence of the subkey folder in the registry. Juniper Networks, Inc. 21
23 Custom NetBIOS policy: Use this rule type to check the NetBIOS name of the client machine before the user can access the IVE. In the NetBIOS configuration page: Enter a name for the NetBIOS rule. Enter a comma-delimited list (without spaces) of NetBIOS names. The name can be up to 15 characters in length. You can use wildcard characters in the name and it is not case-sensitive. For example, md*, m*xp and *xp all match MDXP. Select Required to require that NETBIOS name of the client machine match one of the names you specify, or Deny to require that the name does not match any name. Custom MAC Address policy: Use this rule type to check the MAC addresses of the client machine before the user can access the IVE. In the MAC Address configuration page: Juniper Networks, Inc. 22
24 Enter a name for the MAC address rule. Enter a comma-delimited list (without spaces) of MAC addresses in the form XX:XX:XX:XX:XX:XX where the X s are hexadecimal numbers. For example: 00:0e:1b:04:40:29 You can use a * wildcard character to represent a two-character section of the address. For example, you can use a * to represent the 04, 40, and 29 sections of the previous example address: 00:0e:1b:*:*:* But you cannot use a * to represent a single character. For example, the * in the following address is not allowed: 00:0e:1b:04:40:*9 Select Required to require that a MAC address of the client machine matches any of the addresses you specify, or Deny to require that the all addresses do not match. A client machine will have at least one MAC address for each network connection, such as Ethernet, wireless, and VPN. This rule s requirement is met if there is a match between any of the addresses you specify and any MAC address on the client machine. Custom Machine Certificate Policy: Use this rule type to check that the client machine is permitted access by validating the machine certificate stored on the client machine. In the Machine Certificate configuration page: Enter a name for the machine certificate rule. From the Select Issuer Certificate list, select the certificate that you want to retrieve from the user s machine and validate. Or, select Any Certificate to skip the issuer check and only validate the machine certificate based on the optional criteria that you specify below. From the Optional fields (Certificate field and Expected value), specify any additional criteria that Host Checker should use when verifying the machine certificate. Note: If more than one certificate is installed on the client machine that matches the specified criteria, The Host Checker client passes the first certificate it finds to the IVE for validation. Configuring Host Checker Restrictions If you want to implement Host Checker at the realm level: Navigate to: Juniper Networks, Inc. 23
25 o o Administrators > Admin Realms > Select Realm > Authentication Policy > Host Checker (for Admin Realms) Users > User Realms > Select Realm > Authentication Policy > Host Checker (for User Realms) Choose one of the following options for either all available policies or for individual policies listed in the Available Policies column: o o Evaluate Policies Evaluates without enforcing the policy on the client and allows user-access. This option does not require Host Checker to be installed during the evaluation process; however, Host Checker is installed once the user signs in to the IVE. Require and Enforce Requires and enforces the policy on the client in order for the user to log in to the specified realm. Requires that Host Checker is running the specified Host Checker policies in order for the user to meet the access requirement. Requires the IVE to download Host Checker to the client machine. If you choose this option for a realm s authentication policy, then the IVE downloads Host Checker to the client machine after the user is authenticated and before the user is mapped to any roles in the system. Selecting this option automatically enables the Evaluate Policies option. Select the Allow access to realm if any ONE of the selected Require and Enforce policies is passed check box if you do not want to require users to meet all of the requirements in all of the selected policies. Instead, the user can access the realm if he meets the requirements of any one of the selected Host Checker policies. If you want to implement Host Checker at the role level: Navigate to: o o Administrators > Admin Roles > Select Role > General > Restrictions > Host Checker (for Admin Roles) Users > User Roles > Select Role > General > Restrictions > Host Checker (for User Roles) Choose one of the following options: o Allow all users Does not require Host Checker to be installed in order for the user to meet the access requirement. Juniper Networks, Inc. 24
26 o Allow only users whose workstations meet the requirements specified by these Host Checker policies Requires that Host Checker is running the specified Host Checker policies in order for the user to meet the access requirement. Select the Allow access to role if any ONE of the selected Require and Enforce policies is passed check box if you do not want to require users to meet all of the requirements in all of the selected policies. Instead, the user can access the role if he meets the requirements of any one of the selected Host Checker policies. If you want to create role-mapping rules based on a user s Host Checker status: Navigate to: Users > User Realms > Select Realm > Role Mapping. Click New Rule, select Custom Expressions from the Rule based on list, and click Update. Or, to update an existing rule, select it from the When users meet these conditions list. Click Expressions. Write a custom expression for the role mapping rule to evaluate Host Checker s status using the hostcheckerpolicy variable. For help writing the custom expressions, use tips in the Expressions Dictionary. Or, see Custom Expressions. In the...then assign these roles section, select the roles that the IVE should map users to when they meet the requirements specified in the custom expression and click Add. Select the Stop processing rules when this rule matches if you want the IVE to stop evaluating role mapping rules if the user successfully meets the requirements defined in this rule. Juniper Networks, Inc. 25
27 If you want to implement Host Checker at the resource policy level: Navigate to: Users > Resource Policies > Select Resource > Select Policy > Detailed Rules. Click New Rule or select an existing rule from the Detailed Rules list. Write a custom expression for the detailed rule to evaluate Host Checker s status using the hostcheckerpolicy variable. For help writing the custom expressions, use tips in the Conditions Dictionary. Or, see Custom Expressions. Step by Step configuration for a test scenario Objective: All users connecting to the IVE Should have the Norton Antivirus 10 installed and running with the AV updates not older than 3 on their machines. If the end user machines donot fulfill the above requirements, they should get an appropriate message informing them of this requirement. Configuration: Go under Endpoint Security > Host Checker. Create a New Policy. Provide a policy name (say "Policy AV") and click continue. Under the Rule Type, select Predefined Antivirus and click Add. Provide a Rule Name (say Norton). Choose the option "Require specific product/vendors" and "Require specific products". Under Available Products, choose Norton AntiVirus (10.x). Juniper Networks, Inc. 26
28 Under the Optional section, choose the option "Virus Definition files should not be older than 3 updates" and save changes. Save changes on the next page as well. Now go under User Realms > Select Realm > Authentication Policies > Host Checker. Enable the Require and Enforce option and save changes. The above steps would ensure that users would be able to only login from machines which has the Norton Antivirus 10 installed/running with updates not older than 3. Juniper Networks, Inc. 27
29 Juniper Networks, Inc. 28
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4)
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6)
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets
Pulse Policy Secure. Endpoint Security Feature Guide. Product Release 5.2. Document Revision 1.0 Published: 2015-03-31
Pulse Policy Secure Endpoint Security Feature Guide Product Release 5.2 Document Revision 1.0 Published: 2015-03-31 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 http://www.pulsesecure.net
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Accessing Restricted University Online Resources Using Network Connect Table of Contents Overview... 1 Connecting to the Secure Remote
Network Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
Java Secure Application Manager
Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Junos Pulse Secure Access Service
Junos Pulse Secure Access Service Client-Side Changes Release 7.3 Published: 2012-10-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Cox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
Juniper SSL VPN Notes Page 1
Juniper SSL VPN Notes Page 1 The Juniper SSL VPN is a full-featured appliance using SSL protocol to allow remote computers to securely access our organization s resources with a standard browser. The types
SecureAnywhereTM Business Global Site Manager
SecureAnywhereTM Business Global Site Manager Webroot SecureAnywhere Business MSP... 3 Requirements... 3 Management Console Access Requirements... 3 WSA Agent - System Requirements... 3 Workstations...
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
Comodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
5.0 Secure Meeting Error Messages
Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Contents 5.0 Secure Meeting Error Messages...1 Contacting Juniper...1 Administrator
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
System Administrator Guide
System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
Symantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Using Spy Sweeper for Windows Author: Jocelyn Kasamoto
WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Tutorial: Assigning Prelogin Criteria to Policies
CHAPTER 4 This tutorial provides an overview of the CSD configuration sequence. The configuration chapters that follow provide detailed instructions on the attributes. The sections are as follows: Overview
Platform Guide. SA Supported Platforms. Service Package Version 7.4R1
Platform Guide Service Package Version 7.4R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net February 2013 Pageiof9 Contents Introduction...
Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later
Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the
User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1
User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
CTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
Platform Guide. SA Supported Platforms. Service Package Version 7.3R1
Platform Guide Service Package Version 7.3R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net September 2012 Pageiof9 Contents Introduction...
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Verizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
SA Supported Platforms
Guide SA Supported s Service Package Version 6.5 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 or 888 JUNIPER www.juniper.net April 16, 2010 Contents Introduction...
Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition
Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
ViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition
Quickstart Guide First Edition, Published September 2009 Remote Administrator / NOD32 Antivirus 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection
User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Kaspersky Security Center Web-Console
Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
Secure Access Using VPN
Secure Access Using VPN WHAT IS CISCO SSL VPN? Cisco is the brand name of the VPN appliance (hardware). The SSL VPN stands for Secure Sockets Layer Virtual Private Network. SSL VPN is a service that allows
Aspera Connect 2.4.7. Linux 32/64-bit. Document Version: 1
Aspera Connect 2.4.7 Linux 32/64-bit Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment... 5 Basic
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
F-Secure Policy Manager. Administrator's Guide
F-Secure Policy Manager Administrator's Guide F-Secure Policy Manager TOC 2 Contents Chapter 1: Introduction...8 1.1 System requirements...9 1.1.1 Policy Manager Server...9 1.1.2 Policy Manager Console...10
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Platform Guide. SA Supported Platforms. Service Package Version 7.3R1
Platform Guide Service Package Version 7.3R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net September 2012 Pageiof9 Contents Introduction...
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.
Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4
Accessing TP SSL VPN
Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos
User's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
FAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
Setting up an icap Server for ISG- 1000/2000 AV Support
Application Note Setting up an icap Server for ISG- 1000/2000 AV Support Version 1.1 Ronald Ng AJTAC Engineer AV/DI/UF Specialist Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA
Endpoint Protection Administrator Guide
Endpoint Protection Administrator Guide Copyright Endpoint Protection Administrator Guide June, 2013 2012-2013 Webroot, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
ez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide
Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide ii Preface Copyright Information: Symantec Corporation Copyright
Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished
Platform Guide. SA Supported Platforms Service Package Version 7.4R7
Platform Guide Service Package Version 7.4R7 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net June 2014 Pageiof9 Contents Introduction...
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
User Guide for the Identity Shield
User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and
F-Secure Policy Manager. Administrator's Guide
F-Secure Policy Manager Administrator's Guide TOC F-Secure Policy Manager Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8
Configure Posture. Note. Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.1 1
The AnyConnect Secure Mobility Client offers an ASA Posture Module and an ISE Posture Module. Both provide the Cisco AnyConnect Secure Mobility Client with the ability to assess an endpoint's compliance
Sophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
new Business Online Technical Troubleshooting Guide
new Business Online Technical Troubleshooting Guide TABLE OF CONTENTS How to install Java 1.6 Page 3 How to install Java 1.6 without ActiveX control Page 6 How to uninstall Java Runtime Environment Page
MyAccess installation guide for non-myplace clients
MyAccess installation guide for non-myplace clients Table of Contents 1. WHAT IS MYACCESS?... 3 2. RULES OF CONNECTION... 4 3. PREREQUISITES... 4 3.1. User registration and authorization... 4 3.2. Firewall
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
Network Antivirus Training Setup, Configuration and Troubleshooting
Network Antivirus Training Setup, Configuration and Troubleshooting Prepared by Joseph K. Magochi the African Virtual University Page 1 Network Antivirus Training Setup, Configuration & Troubleshooting
How To Use Secureanything On A Mac Or Ipad (For A Mac)
User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is
F-Secure Client Security. Administrator's Guide
F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Best Practices for Deploying Behavior Monitoring and Device Control
Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
DOE VPN Client Installation and Setup Guide March 2011
DOE VPN Client Installation and Setup Guide March 2011 Table of Contents Introduction... 3 System Requirements... 3 Microsoft Windows... 3 Mac OS X... 4 Windows... 4 Installation for the Cisco AnyConnect
Product Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
