Tests Help
Browser Security Policy – Windows
B-5
Browser Version
Description:
This test verifies that the endpoint attempting to connect to your
system has the latest browser version installed.
Test Properties:
Select the check box for the required browser software. Enter
a version in the text box. If no version is specified in the text box, the default
version shown in the square brackets is required.
How Does this Affect Me?:
Older browsers may not have adequate security or
fixes against vulnerabilities.
What Do I Need to Do?:
Install a required browser or update your browser to
the required version. See the following links for browser information:
http://www.mozilla.com/en-US/firefox/
http://www.microsoft.com/windows/ie/ie6/default.mspx
Active scripting / ActiveX
Active scripting / ActiveX extends other programming languages (such
as Java) by providing re-usable "controls" that enable developers to make
Web pages "active". ActiveX is Microsoft's brand for active scripting.
The following links provide more detailed information about ActiveX:
•
http://www.active-x.com/articles/whatis.htm
•
http://www.active-x.com/
•
http://www.newportinc.com/software/activex/
whatisAX.htm
Java
Java is a programming language and a collection of platforms that are
targeted toward a specific hardware platform. Java programs are not
limited by the operating system (OS) as they are interpreted (run) by
another program called the Java Virtual Machine (JVM). This enables
Java programs to be portable—that is, they can be run on a server,
desktop, personal digital assistant (PDA), or in the browser.
The following links provide more information about Java:
•
http://java.sun.com/learning/new2java/index.html
•
http://www.javaworld.com/channel_content/jw-topical-
index.shtml
•
http://java.sun.com/
Item
Description
Table B-1.
Browser Vulnerabilities
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......