Configuring General Host Checker Remediation (NSM Procedure)
You can specify general remediation actions that you want the Host Checker to take if
an endpoint does not meet the requirements of a policy. For example, you can display a
remediation page to the user that contains specific instructions and links to resources
to help the user bring their endpoint into compliance with Host Checker policy
requirements.
To configure general Host Checker remediation:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to configure
general Host Checker remediation.
2.
Click the
Configuration
tab. Select
system
>
Authentication
>
Endpoint Security
.
3.
In the Endpoint Security screen, select
Settings
>
Policies
and click the
Add
icon.
4.
Create new client–side policies and enable customized server-side policies.
5.
Click the tab that corresponds to the operating system for which you want to specify
Host Checker options—
Windows
,
Mac
,
Linux
,
Solaris
, or
Windows Mobile
.
6.
Add or modify settings as specified in Table 64 on page 233 to specify the remediation
actions that you want Host Checker to perform if a user’s computer does not meet
the requirements of the current policy.
7.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 64: Configuring General Host Checker Remediation Details
Your Action
Function
Option
Remediation tab
Select the
Enable Custom
Instructions
option to enable this
feature, and than enter the
instructions.
NOTE: You can use the following
HTML tags to format text and add
links to resources such as policy
servers or web sites: <i>, <b>, <br>,
<font>, and <a href>.
Specifies the instructions you want to
display to the user on the Host Checker
remediation page.
Enable
Custom
Instructions
Select the
Enable Custom Actions
option to enable this feature, and
then select the alternate policy and
click
Add
to move from the
Non-members to the Members list.
Allows you to select one or more alternate
policies that you want Host Checker to
evaluate if the user’s computer does not
meet the current policy requirements. The
alternate policy must be either a third-party
policy that uses a J.E.D.I. package or a
Secure Virtual Workspace policy.
Enable
Custom
Actions
233
Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Configuring Secure Access Host Checker Policies
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...