Configuring Virus Signature Version Monitoring (NSM Procedure)
You can configure Host Checker to monitor and verify that the virus signatures, operating
systems, software versions, and patches installed on client computers are up to date,
and remediate those endpoints that do not meet the specified criteria. Host Checker
uses the current virus signatures and patch assessment versions from the vendor(s) you
specify for predefined rules in a Host Checker policy.
You can automatically import either the current Virus signature version monitoring or
Patch Management Info Monitoring list from the Juniper Networks staging site at a
specified interval. Alternatively, you can download the files from Juniper Networks and
use your own staging server.
You can also configure a proxy server as a staging site between the device and the Juniper
Networks site. To use a proxy server, you must enter the servers network address, and
port and authentication credentials, if applicable.
To configure the device to automatically import the current virus signature version
monitoring:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to configure the
device to automatically import the current signature version monitoring.
2.
Click the
Configuration
tab and select
Authentication > Endpoint Security > Host
Checker
.
3.
Click either
Virus signature version monitoring
or
Patch Management Info Monitoring
.
4.
Select either
Auto-update virus signatures list
or
Auto-update Patch Management
data
.
5.
Configure the device to automatically import the current signature version monitoring
using the settings described in Table 68 on page 248.
6.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 68: Configuring Virus Signature Version Monitoring Details
Your Action
Options
Specifies the existing URLs of the staging sites where the current lists are stored. The default
URLs are the paths to the Juniper Networks staging site:
https://download.juniper.net/software/av/uac/epupdate_hist.xml (for auto-update virus
signatures list).
Download path
Specifies how often you want the device to automatically import the current list(s).
Download interval
Enter your Juniper Networks Support username.
Username
Copyright © 2010, Juniper Networks, Inc.
248
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...