User ManualTable of ContentsContents3Preface5About this Guide6Related Publications6Introduction9Integrity Clientless Security Features10Integrity Clientless Security Scanner10Reports10ICSInfo Utility10Supported Features11Unsupported Features11Prerequisites13End Point Prerequisites14Supported Operating Systems14Supported Browsers14Java Requirements14General Administration Tasks15Planning for Security16Security Scenario16Vulnerabilities16Risks17End Point Users and Disruption Tolerance17Sample Solution17Understanding Security Lifecycles17Supporting the End Point User19Logging In19Configuration Workflow20General Administration Tasks20Configuring ICS to Fail Open21Configuring Updates21Administering Security Scanner Policies23Understanding Integrity Clientless Security Scanner24Implementing Policies24Understanding Enforcement Rules24Enforcement Rule Types25Firewall Application Rules26Creating a Firewall Application Rule26Anti-virus Application Rules27Creating an Anti-virus Application Rule27Anti-Spyware Scan Rules29Creating an Anti-spyware Rule29Custom Application Rules30Custom Group Rules31Creating Custom Group Rules31Creating Policies32Activating Policies32Reports35Reports36Generating Reports36Access Statistics37Security Scan Results37Spyware Found37Rules Broken37Anti-Keylogger37Errors38The ICSInfo Utility39Troubleshooting End Point User Issues40Obtaining Anti-virus Application Information41Obtaining Application Checksums41Index43Size: 662 KBPages: 44Language: EnglishOpen manual