Manual De UsuarioTabla de contenidosContents4List of Figures6List of Tables9ZENworks Endpoint Security Management10ESM Overview11System Requirements12ASP.NET12Reliable Time Stamp12About the ESM Manuals13USB/Wireless Security13Policy Distribution Service14Server Selection and Installation14Server Maintenance14Upgrading the Software14Uninstall14Securing Server Access15Physical Access Control15Network Access Control15High Availability15Running the Service16Management Service17Server Selection and Installation17Server Maintenance17Upgrading the Software17Uninstall17Securing Server Access18Physical Access Control18Network Access Control18High Availability18Running the Service19Distributing ESM Credentials (Key Management Key)19Management Console20Task Bar20Policy Tasks21Resources21Configuration21Endpoint Auditing21Menu Bar22Permissions Settings24Administrative Permissions25Publish To Settings26Configuration Window28Infrastructure and Scheduling28Authenticating Directories30Service Synchronization32Alerts Monitoring33Configuring ESM for Alerts34Configuring Alert Triggers34Managing Alerts35Reporting37Adherence Reports39Alert Drill-Down Reports40Application Control Report41Encryption Solution Reports42Endpoint Activity Reports42Endpoint Updates Report42Client Self Defense Report43Integrity Enforcement Report43Location Reports43Outbound Content Compliance Reports45Administrative Overrides Report46Endpoint Updates Report46Wireless Enforcement Reports46Generating Custom Reports48Software Requirements48Creating a ESM Compliant Report48What reporting information is available?49So how do I create a report?51ZENworks Storage Encryption Solution59Understanding Storage Encryption Solution59Sharing Encrypted Files59Key Management60Export Encryption Keys61Import Encryption Keys61Generate a New Key61ZENworks File Decryption Utility62Common Use of the File Decryption Utility62Administrator Configured Decryption Utility62Override-Password Key Generator63USB Drive Scanner65Client Location Assurance Service67Server Selection and Installation67Server Maintenance67Upgrading the Software67Uninstall67Securing Server Access68Physical Access Control68Network Access Control68High Availability68Optional Server Configurations69Transferring the Public Key to the Management Service69Updating the Encryption Keys69ZENworks Security Client Management70Prior to Installing the ZENworks Security Client70Uninstall70Client Self Defense71Upgrading the ZSC71Setting the Upgrade Switch72Running the ZSC72Multiple User Support72Machine-Based Policies72Distributing Unmanaged Policies73ZENworks Security Client Diagnostics Tools74Creating a Diagnostics Package74Administrator Views76Logging80Reporting81Creating and Distributing ESM Security Policies83Policy Tabs and Tree83Policy Toolbar84Show Usage85Error Notification86Creating Security Policies87Custom User Messages88Hyperlinks89Global Policy Settings90Wireless Control92Global Communication Hardware Control94Storage Device Control95Preferred Devices97Importing Device Lists97Data Encryption98ZSC Update100VPN Enforcement101The Switch-to Location102Advanced VPN Settings103Locations105The Unknown Location105Defined Locations106Location Settings107Setting the Location Icon107Update Interval107User Permissions107Client Location Assurance108Use Location Message108Location Components109Communication Hardware Settings110Storage Device Control112Network Environments113Wi-Fi Management116Managed Access Points117Filtered Access Points118Prohibited Access Points118Wi-Fi Signal Strength Settings119Wi-Fi Security121Preference AP Selection by...122Firewall Settings123TCP/UDP Ports125Access Control Lists128Network Address Macros List130Application Controls132Integrity and Remediation Rules135Antivirus/Spyware Rules136Integrity Tests138Integrity Checks140Advanced Scripting Rules142Script Variables144Script Text145Rule Scripting Parameters146Rule Scripting146Script Namespaces150Storage Namespace179Interfaces182Sample Scripts195Create Registry Shortcut (VB Script)195Allow Only One Connection Type (JScript)198Stamp Once Script202Block Gray List Script203Compliance Reporting204Publishing Security Policies206Updating a Published Policy207Exporting a Policy208Importing Policies209Exporting Policies to Unmanaged Users210Troubleshooting211Overview211Allowing ASP.NET 1.1 Functions212Server Communication Checks214Getting Trace Information from the Management Server Agent219Troubleshooting SQL Server Issues221System Monitor221Securing SQL Database Passwords224Microsoft SQL Profiler225Common SQL Profiler Actions227Tracing Novell Database Installations229Event Logs232Microsoft SQL Enterprise Manager234Acronym Glossary241Index243Tamaño: 4 MBPáginas: 245Language: EnglishManuales abiertas