Table 68: Configuring Virus Signature Version Monitoring Details
(continued)
Your Action
Options
Enter your Juniper Networks Support password.
Password
Related
Documentation
Importing Virus Signature Version Monitoring or Patch Management Version Monitoring
List (NSM Procedure) on page 249
•
•
Assigning a Proxy Server an Auto-Update Server (NSM Procedure) on page 250
Importing Virus Signature Version Monitoring or Patch Management Version Monitoring
List (NSM Procedure)
To manually import either the current virus signature version monitoring or the patch
management version monitoring list:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to import either
the virus signature version monitoring or the patch management version monitoring
list.
2.
Click the
Configuration
tab and select
Authentication > Endpoint Security > Host
Checker
.
3.
Click either
Virus signature version monitoring
or
Patch Management Info Monitoring
.
4.
Download the list from the Juniper Networks staging site to a network server or local
drive on your computer by entering the Juniper Networks URLs in a browser window.
https://download.juniper.net/software/av/uac/epupdate_hist.xml
https://download.juniper.net/software/hc/patchdata/patchupdate.dat
5.
Under Manually import virus signatures list, click
Browse
, select the list, and then click
OK
.
6.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
NOTE:
If you use your own staging site for storing the current list, you must
upload the trusted root certificate of the CA that signed the staging’s server
certificate to the device.
Related
Documentation
Configuring Virus Signature Version Monitoring (NSM Procedure) on page 248
•
•
Assigning a Proxy Server an Auto-Update Server (NSM Procedure) on page 250
249
Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Configuring Secure Access Host Checker Policies
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...