•
Cancel
—Cancels the modifications.
Table 63: Host Checker Options Configuration Details
Your Action
Function
Option
Enter the interval in
minutes.
NOTE: If you enter a value
of zero, Host Checker runs
only on the client machine
when the user first signs
into the Secure Access
device.
Specifies the interval at which you want the
Host Checker to perform policy evaluation on
a client machine.
Perform check
every (minutes)
Enter the interval in
minutes.
Specifies an interval to control timing out in
the following situations:
•
If the user navigates away from the Secure
Access device sign-in page after Host
Checker starts running but before signing in
to the Secure Access device, Host Checker
continues to run on the user’s machine for
the interval you specify.
•
If the user is downloading Host Checker over
a slow connection, increase the interval to
allow enough time for the download to
complete.
Client-side
process, login
inactivity timeout
(minutes)
Select the
Auto-upgrade
Host Checker
to enable this
feature.
Secure Access device automatically
downloads the Host Checker application to a
client computer when the version of Host
Checker on the Secure Access device is newer
than the version installed on the client.
Auto-upgrade
Host Checker
Select the
Perform
dynamic policy
reevaluation
to enable this
feature.
Secure Access device automatically refreshes
the roles of individual users by enabling
dynamic policy evaluation for Host Checker.
Perform dynamic
policy
reevaluation
Related
Documentation
Configuring General Host Checker Remediation (NSM Procedure) on page 233
•
•
Configuring Host Checker Third-Party Applications Using Predefined Rules (NSM
Procedure) on page 234
Copyright © 2010, Juniper Networks, Inc.
232
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...