NAC Policies
About NAC 800 Tests
6-20
You can enter any combination of these keys in the NAC 800 text entry fields
to detect a vendor, software package and version on an endpoint (for example,
you can also enter
Mozilla\Firefox
or simply
Mozilla
) and NAC 800
searches for them in the
HKEY_LOCAL_MACHINE\Software
registry key
sub-tree.
TIP:
The entries are not case sensitive. This test simply checks to see if the registry
key exists in HKEY_LOCAL_MACHINE\Software or
HKEY_CURRENT_USER\Software. So, these values must match the registry
keys as displayed in the registry editor. If you just specify Mozilla (or mozilla)
and HKEY_LOCAL_MACHINE\Software\Mozilla exists in the registry, the test
would match.
To find the software registry keys on the endpoint:
1.
Select
Start>>Run
2.
Type:
regedit
3.
Click
OK
.
4.
Expand the
HKEY_LOCAL_MACHINE
key.
5.
Expand the SOFTWARE key.
6.
View the sub-trees for various vendors software and versions.
TIP:
If you’re looking for a registry key, you enter a trailing slash. If you’re looking
for a registry value, you do not enter a trailing slash.
Entering Service Names Required/Not Allowed
Services are Windows operating system applications that run automatically,
without manual intervention.
To find the services names on the endpoint:
Service names must be entered exactly as they appear in
Control panel>>Admin-
istrative tools>>Services application
.
TIP:
Enter the names of software and services in the NAC 800 text entry field
separated by a carriage return.
For example, the following are examples of services:
■
Telnet
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......