Table 65: Configuring Host Checker Third-Party Applications Using
Predefined Rules Details
(continued)
Your Action
Function
Option
Select the
live-update
option to
enable this feature.
Allows live-update for the
product.
live-update
Select the
set-real-time-protection on
option
to enable this feature.
Allows real-time protection
for the product.
set-real-time-protection-on
Select the
start-scan
option to
enable this feature.
Starts the scanning process
for the product.
start-scan
Predefined Firewall Rules
Enter the name.
Specifies the name for the
firewall rule.
Rule Name
Select one of the following options
from the drop-down list:
•
Require any supported
product
—Specifies the software
vendor’s product that is
supported for the system scan
check.
•
Require specific
products/vendors
—Specifies
the specific vendor for the
system scan check.
Allows you to select your
firewall vendor(s) and
product(s).
Select Products
Select the
Require any supported
product from a specific vendor
to
enable this feature.
Checks for any product
(rather than requiring you
to select every product
separately)
Require any supported
product from a specific
vendor
Select the
Require specific
products
to enable this feature.
Specifies specific
products/vendors, and
defines compliance by
allowing any product by a
specific vendor (for
example, any Symantec
product).
Require specific products
Select the
Monitor this rule for
change in result
to enable this
feature.
Continuously monitors the
policy compliance of
endpoints.
Monitor this rule for change
in result
Select the
Turn on firewall for all
supported products
to enable this
feature.
Turns on the Firewall.
Turn on firewall for all
supported products
Selected Vendors tab
237
Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Configuring Secure Access Host Checker Policies
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...