Sony FIU-900 Manual
Chapter 5: Using SecureSuite
SecureSuite XS Workstation Guide
20
Chapter 4: SecureSuite Key Features
System Integrity Verification
On every system restart, SecureSuite makes sure all installed SecureSuite
binaries have not been tampered with, replaced, etc. If any corrupt or missing files
are detected, SecureSuite will display a message alerting you of the problem. At
this point, only an administrator will be able to log on to the computer and either
repair or uninstall SecureSuite via the Windows
binaries have not been tampered with, replaced, etc. If any corrupt or missing files
are detected, SecureSuite will display a message alerting you of the problem. At
this point, only an administrator will be able to log on to the computer and either
repair or uninstall SecureSuite via the Windows
Add/Remove
application in the
Control Panel
, or by re-running the SecureSuite installation program
(
Setup.exe
).
RAS Support
SecureSuite supports Remote Access Service (RAS) connections. Using a RAS
connection, a client computer can operate as if it were physically connected to a
LAN. RAS makes it possible to connect a remote client workstation to a network
server. This can be accomplished over a Wide Area Network (WAN) link or a
Virtual Private Network (VPN) using a dial-up connection. The user authentication
required in order to establish RAS and/or VPN connections are not controlled by
SecureSuite.
connection, a client computer can operate as if it were physically connected to a
LAN. RAS makes it possible to connect a remote client workstation to a network
server. This can be accomplished over a Wide Area Network (WAN) link or a
Virtual Private Network (VPN) using a dial-up connection. The user authentication
required in order to establish RAS and/or VPN connections are not controlled by
SecureSuite.
The user may notice a delay corresponding to certain activities. The initial logon
will take longer. Use of some SecureSuite features may also take longer as the
bandwidth available over RAS is limited compared to that available over Ethernet
or other network topology.
will take longer. Use of some SecureSuite features may also take longer as the
bandwidth available over RAS is limited compared to that available over Ethernet
or other network topology.
Policy Management
A computer’s configuration is defined in terms of policies. A policy is a permission
or attribute for a particular item, action, or object. The ability to consistently
manage policies is an essential feature in SecureSuite. All administrator tools are
centralized and easy to use. This will lead to lower administration overhead and
an enhanced network/server security system. SecureSuite defines four levels of
policies: system-level policies, user-level policies, application policies, and user-
level application policies. For the two SecureSession applications, there is a
another level of policies called “site-level” or “application-level” policies, which are
only relevant for and applied to the website or application for which they are set.
The settings of some policies affect (and are affected by) the settings of others.
See Appendix 3: A Table of SecureSuite Policies for an overview of the policies
and the dependencies they have on each other.
or attribute for a particular item, action, or object. The ability to consistently
manage policies is an essential feature in SecureSuite. All administrator tools are
centralized and easy to use. This will lead to lower administration overhead and
an enhanced network/server security system. SecureSuite defines four levels of
policies: system-level policies, user-level policies, application policies, and user-
level application policies. For the two SecureSession applications, there is a
another level of policies called “site-level” or “application-level” policies, which are
only relevant for and applied to the website or application for which they are set.
The settings of some policies affect (and are affected by) the settings of others.
See Appendix 3: A Table of SecureSuite Policies for an overview of the policies
and the dependencies they have on each other.