Table 65: Configuring Host Checker Third-Party Applications Using
Predefined Rules Details
(continued)
Your Action
Function
Option
Select the vendor, and then click
Add
to move the vendor from the
Non-members to the Members list.
Allows you to select the
specific vendors.
Selected Vendors
Specific Products Selected tab
Select the product, and then click
Add
to move the product from the
Non-members to the Members list.
Allows you to select the
specific products.
Specific Products Selected
Selected Products
Select the product from the
Product name drop-down list.
Allows you to select the
product.
Product name
Select the
turn-on-firewall
option
to enable this feature.
Turns on the Firewall for the
product.
turn-on-firewall
Predefined Malware Rules
Enter the Malware rule name.
Specifies the name of the
Malware rule.
Rule Name
Select the
Monitor this role for
change in result
to enable this
feature.
Continuously monitors the
policy compliance of
endpoints.
Monitor this role for change
in result
Select the product, and then click
Add
to enable this feature.
Allows you to select the
products.
Selected Products
Predefined Spyware Rules
Enter the name.
Enter the name for the
spyware rule.
Rule Name
Select one of the following options
from the drop-down list:
•
Require any supported
product
—Specifies the software
vendor’s product that is
supported for the system scan
check.
•
Require specific
products/vendors
—Specifies
the specific vendor for the
system scan check.
Allows you to select
products or vendors
Select Products
Select the
Require any supported
product from a specific vendor
option to enable this feature.
Checks for any product
(rather than requiring you
to select every product
separately).
Require any supported
product from a specified
vendor
Copyright © 2010, Juniper Networks, Inc.
238
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...