Tests Help
Security Settings – Windows
B-30
2.
Right-click on a service and select
Properties
.
3.
Select
Automatic
from the
Startup type
drop-down list.
4.
Click
OK
.
5.
Close the
Services
window.
6.
Close the
Administrative Tools
window.
Windows Bridge Network Connection
Description:
This test verifies that the endpoint attempting to connect to the
network does not have a bridged network connection present. A bridged
network connection allows the connecting endpoint to transparently send
traffic to and from another network. An example use of this type of connection
would be to bridge a high-speed cellular network connection in and out of the
local network. A bridged network connection poses a significant security risk.
Test Properties:
Any endpoint which has a Windows bridge Network Connec-
tion will fail this test.
How Does this Affect Me?:
Using network bridges can be useful in some envi-
ronments; however, they also create a security risk.
What Do I Need to Do? :
Do not use network bridges.
The following articles describe bridge networking:
http://technet2.microsoft.com/windowsserver/en/library/df594316-cd92-
4c38-9773-4c6d74e02a431033.mspx?mfr=true
http://www.microsoft.com/resources/documentation/windows/xp/all/prod-
docs/en-us/hnw_understanding_bridge.mspx?mfr=true
http://www.microsoft.com/windowsxp/using/networking/expert/
crawford_02april22.mspx
Windows Wireless Network SSID Connections
Description:
Checks for the presence of an unauthorized connection on an
endpoint. This might include connections to a rogue wireless access point,
VPN, or other remote network.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......