manuais Novell ZENworks Endpoint Security Management 3.5

Manuais de instruções e guias do utilizador para Software utilitário de uso geral Novell ZENworks Endpoint Security Management 3.5.
Disponibilizamos 1 manuais Novell ZENworks Endpoint Security Management 3.5 em pdf para descarga gratuita: Manual do Utilizador


Índice

ZENworks

1

Endpoint Security Management

1

Licenses

3

Contents

4

List of Figures

6

List of Tables

9

ESM Overview

11

System Requirements

12

About the ESM Manuals

13

USB/Wireless Security

13

Policy Distribution Service

14

Securing Server Access

15

Running the Service

16

Management Service

17

Management Console

20

Menu Bar

22

Permissions Settings

24

Administrative Permissions

25

Figure 8 : Publish To List

27

Configuration Window

28

Example:

29

Service Synchronization

32

Alerts Monitoring

33

Figure 14 : Alert Reporting

35

Reporting

36

Figure 18 : Report Toolbar

38

Figure 19 : Report list icon

38

Figure 20 : No data

38

Generating Custom Reports

48

Figure 36 : Select Style

55

New (see Figure 38)

56

Key Management

60

USB Drive Scanner

65

Updating the Encryption Keys

69

Client Self Defense

71

Upgrading the ZSC

71

Running the ZSC

72

Remove Temporary Files

75

Figure 54 : Logging Window

80

IMPORTANT:

84

Figure 61 : Show Usage Window

85

Creating Security Policies

87

Custom User Messages

88

Hyperlinks

89

Global Policy Settings

90

Wireless Control

92

Data Encryption

98

ZSC Update

100

VPN Enforcement

101

Locations

105

Location Settings

107

Location Components

109

Storage Device Control

112

Network Environments

113

Step 4: Click Save

115

Wi-Fi Management

116

Wi-Fi Security

121

Firewall Settings

123

TCP/UDP Ports

125

Associate Component

126

Table 3: TCP/UDP Ports

127

Access Control Lists

128

Network Address Macros List

130

Macro Description

131

Application Controls

132

File Sharing

134

Internet Media

134

Name Applications

134

Antivirus/Spyware Rules

136

Add New button

137

Figure 95 : Integrity Tests

138

Figure 96 : Integrity Checks

140

Advanced Scripting Rules

142

Associate New

143

Figure 98 : Script Variables

144

Rule Scripting Parameters

146

Trigger Events

148

Details:

155

Sample Scripts

195

WARNING:

203

Control

203

Compliance Reporting

204

Publishing Security Policies

206

Exporting a Policy

208

Importing Policies

209

Program

210

Troubleshooting

211

Figure 102 : Open IIS Manager

212

Figure 103 : Allowing ASP.NET

213

(server)

218

Figure 109 : Trace Log

219

Figure 112 : Database Tracing

229

Figure 113 : Trace Sample

230

Acronym Glossary

241