Alcatel-Lucent ics dissolvable agent for safeguard User Manual
ICS Dissolvable Agent for SafeGuard Administration Guide
30
Chapter 4: Administering Security Scanner Policies
3
Enter a Name and Description for the rule.
4
For each screened software type, choose the action you want ICS to take when it
detects this kind of spyware.
detects this kind of spyware.
If you warn or restrict the end point computer, it is recommended that you
include a Remedy Message, informing the user of what they need to do to treat
the spyware.
include a Remedy Message, informing the user of what they need to do to treat
the spyware.
5
If you want ICS to ignore certain spyware applications, add them to the
exclusions list.
exclusions list.
6
Optionally, you can select Display SmartDefense Advisor article link.
Selecting this option will display a Check Point article to the end point users that
will explain what the spyware is and offer treatment advice. It is highly
recommended that you select this option.
will explain what the spyware is and offer treatment advice. It is highly
recommended that you select this option.
7
Click Save Rule.
Custom Application Rules
While most of the common applications that you might want to control are governed by
the other types of rules, you might wish to prohibit or require other applications.
the other types of rules, you might wish to prohibit or require other applications.
If you wish to prohibit or require an application not covered by any of the other rule
types, use a custom application rule. A typical use of a custom application rule is to create
a rule requiring an anti-virus application that is not supported by the preconfigured
antivirus application rules.
types, use a custom application rule. A typical use of a custom application rule is to create
a rule requiring an anti-virus application that is not supported by the preconfigured
antivirus application rules.
To Create a Custom Application Rule:
1
Log into the ICS Administrator Console and click Enforcement Rules.
2
On the Enforcement Rules page click New Rule and choose Custom Application.
3
Enter a Name and a Description for the rule.
4
Choose the end point computer operating system you want this rule to apply to.
5
Specify the conditions for this rule.
SECURITY:
If you elect to present this information to end users, you
must configure an EPV bypass policy to allow the users access to
smartdefense.checkpoint.com. Configuration of bypass policies are
discussed in the EPV chapter of the OmniAccess SafeGuard OS
Administration Guide.
smartdefense.checkpoint.com. Configuration of bypass policies are
discussed in the EPV chapter of the OmniAccess SafeGuard OS
Administration Guide.