Tests Help
Software – Windows
B-37
Test Properties:
Select the check box for one or more Microsoft Office packages. Any
software package selected that does not have the latest version installed fails the
test.
How Does this Affect Me?:
Some companies may support only the software listed.
Using the most recently updated version of software can help protect your system
from known vulnerabilities.
What Do I Need to Do? :
Verify that you have updated software by visiting the follow-
ing link:
http://office.microsoft.com/en-us/downloads/default.aspx
P2P
Description:
This test verifies that the endpoint attempting to connect to your system
has only approved peer-to-peer (P2P) software installed.
Test Properties:
Select the P2P software allowed on your network. If none of the P2P
packages are selected, this means that you do not allow P2P software and any
endpoint with P2P software enabled will fail this test.
How Does this Affect Me?:
A Peer-to-peer (P2P) network is one that is comprised of
peer nodes (computers) rather than clients and servers. These peer nodes function
both as clients and servers to other nodes and can perform any client or server
function. P2P software allows users to connect directly to other users and is used
for file sharing. Many P2P software packages are considered spyware and their use
is generally discouraged.
What Do I Need to Do?:
Remove or disable any disallowed P2P software.
Personal Firewalls
Description:
This test verifies that the endpoint attempting to connect to your system
has the latest personal firewall software installed and running.
Test Properties:
Select the personal firewalls that meet your requirements. Any end-
point that does not have at least one of the personal firewalls selected will fail this
test.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......