Alcatel-Lucent ics dissolvable agent for safeguard User Manual

Page of 44
ICS Dissolvable Agent for SafeGuard Administration Guide
30
Chapter 4: Administering Security Scanner Policies
3
Enter a Name and Description for the rule.
4
For each screened software type, choose the action you want ICS to take when it 
detects this kind of spyware.
If you warn or restrict the end point computer, it is recommended that you 
include a Remedy Message, informing the user of what they need to do to treat 
the spyware.
5
If you want ICS to ignore certain spyware applications, add them to the 
exclusions list.
6
Optionally, you can select Display SmartDefense Advisor article link.
Selecting this option will display a Check Point article to the end point users that 
will explain what the spyware is and offer treatment advice. It is highly 
recommended that you select this option.
7
Click Save Rule.
Custom Application Rules
While most of the common applications that you might want to control are governed by 
the other types of rules, you might wish to prohibit or require other applications.
If you wish to prohibit or require an application not covered by any of the other rule 
types, use a custom application rule. A typical use of a custom application rule is to create 
a rule requiring an anti-virus application that is not supported by the preconfigured 
antivirus application rules.
To Create a Custom Application Rule:
1
Log into the ICS Administrator Console and click Enforcement Rules.
2
On the Enforcement Rules page click New Rule and choose Custom Application.
3
Enter a Name and a Description for the rule.
4
Choose the end point computer operating system you want this rule to apply to.
5
Specify the conditions for this rule.
SECURITY:  
If you elect to present this information to end users, you 
must configure an EPV bypass policy to allow the users access to 
smartdefense.checkpoint.com. Configuration of bypass policies are 
discussed in the EPV chapter of the OmniAccess SafeGuard OS 
Administration Guide
.