Many
Manuals
search
Categorias
Marcas
Inicio
Novell
Software De Utilidad General
ZENworks Endpoint Security Management 3.5
Manual de usuario
Novell ZENworks Endpoint Security Management 3.5 Manual de usuario Pagina 218
Descarga
Compartir
Compartiendo
Añadir a mis manuales
Imprimir
Pagina
/
245
Tabla de contenidos
SOLUCIÓN DE PROBLEMAS
MARCADORES
Valorado
.
/ 5. Basado en
revisión del cliente
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
ZENworks® ESM 3.5
Administrator’s Manual
218
•
(MS) https://machinename/authenticati
onhelper/authenicationhelper
.soap?wsdl
(server)
Figure 108 : Management Serv
ice - Server Communication
1
2
...
213
214
215
216
217
218
219
220
221
222
223
...
244
245
ZENworks
1
Endpoint Security Management
1
Licenses
3
Contents
4
List of Figures
6
List of Tables
9
ESM Overview
11
System Requirements
12
About the ESM Manuals
13
USB/Wireless Security
13
Policy Distribution Service
14
Securing Server Access
15
Running the Service
16
Management Service
17
Management Console
20
Menu Bar
22
Permissions Settings
24
Administrative Permissions
25
Figure 8 : Publish To List
27
Configuration Window
28
Example:
29
Service Synchronization
32
Alerts Monitoring
33
Figure 14 : Alert Reporting
35
Reporting
36
Figure 18 : Report Toolbar
38
Figure 19 : Report list icon
38
Figure 20 : No data
38
Generating Custom Reports
48
Figure 36 : Select Style
55
New (see Figure 38)
56
Key Management
60
USB Drive Scanner
65
Updating the Encryption Keys
69
Client Self Defense
71
Upgrading the ZSC
71
Running the ZSC
72
Remove Temporary Files
75
Figure 54 : Logging Window
80
IMPORTANT:
84
Figure 61 : Show Usage Window
85
Creating Security Policies
87
Custom User Messages
88
Hyperlinks
89
Global Policy Settings
90
Wireless Control
92
Data Encryption
98
ZSC Update
100
VPN Enforcement
101
Locations
105
Location Settings
107
Location Components
109
Storage Device Control
112
Network Environments
113
Step 4: Click Save
115
Wi-Fi Management
116
Wi-Fi Security
121
Firewall Settings
123
TCP/UDP Ports
125
Associate Component
126
Table 3: TCP/UDP Ports
127
Access Control Lists
128
Network Address Macros List
130
Macro Description
131
Application Controls
132
File Sharing
134
Internet Media
134
Name Applications
134
Antivirus/Spyware Rules
136
Add New button
137
Figure 95 : Integrity Tests
138
Figure 96 : Integrity Checks
140
Advanced Scripting Rules
142
Associate New
143
Figure 98 : Script Variables
144
Rule Scripting Parameters
146
Trigger Events
148
Details:
155
Sample Scripts
195
WARNING:
203
Control
203
Compliance Reporting
204
Publishing Security Policies
206
Exporting a Policy
208
Importing Policies
209
Program
210
Troubleshooting
211
Figure 102 : Open IIS Manager
212
Figure 103 : Allowing ASP.NET
213
(server)
218
Figure 109 : Trace Log
219
Figure 112 : Database Tracing
229
Figure 113 : Trace Sample
230
Acronym Glossary
241
Comentarios a estos manuales
Sin comentarios
Publish
Imprimir documento
Imprimir pagina 218
Comentarios a estos manuales