background image

no

vd

ocx 

(e

n)

  

13

 Ma
y 20

09

Legal Notices

Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and 
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. 
Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time, 
without obligation to notify any person or entity of such revisions or changes.

Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims 
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., 
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to 
notify any person or entity of such changes.

Any products or technical information provided under this Agreement may be subject to U.S. export controls and the 
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required 
licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on 
the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. 
You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the 

Novell International Trade Services Web page (http://www.novell.com/info/exports/)

 for more information on 

exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export 
approvals. 

Copyright © 2007-2009 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, 
stored on a retrieval system, or transmitted without the express written consent of the publisher.

Novell, Inc., has intellectual property rights relating to technology embodied in the product that is described in this 
document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. 
patents listed on the 

Novell Legal Patents Web page (http://www.novell.com/company/legal/patents/)

 and one or 

more additional patents or pending patent applications in the U.S. and in other countries. 

Novell, Inc.
404 Wyman Street, Suite 500
Waltham, MA 02451
U.S.A.
www.novell.com

 

Online Documentation:

 To access the latest online documentation for this and other Novell products, see 

the 

Novell Documentation Web page (http://www.novell.com/documentation)

Summary of Contents for ZENworks Endpoint Security Client 4.0

Page 1: ...www novell com novdocx en 13 May 2009 AUTHORIZED DOCUMENTATION ZENworks Endpoint Security Client 4 0 User Guide ZENworks Endpoint Security Management 4 0 March 31 2009 Endpoint Security Client 4 0 Use...

Page 2: ...r re export to entities on the current U S export exclusion lists or to any embargoed or terrorist countries as specified in the U S export laws You agree to not use deliverables for prohibited nuclea...

Page 3: ...Trademarks For Novell trademarks see the Novell Trademark and Service Mark list http www novell com company legal trademarks tmlist html Third Party Materials All third party trademarks are the proper...

Page 4: ...4 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...

Page 5: ...entation or go to the Novell Documentation Feedback site http www novell com documentation feedback html and enter your comments there Additional Documentation ZENworks Endpoint Security Management is...

Page 6: ...6 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...

Page 7: ...iew 11 2 1 ESM Terminology 11 2 2 Logging In to the Endpoint Security Client 4 0 12 3 Using the Endpoint Security Client 4 0 15 3 1 Moving Among Network Environments 15 3 2 Changing Locations 16 3 3 D...

Page 8: ...8 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...

Page 9: ...ections contain additional information Section 1 1 Security Enforcement for Mobile Computers on page 9 Section 1 2 NDIS Layer Firewall Protection on page 10 1 1 Security Enforcement for Mobile Compute...

Page 10: ...illustrated in Figure 1 2 Effectiveness of an NDIS Layer Firewall on page 10 Figure 1 2 Effectiveness of an NDIS Layer Firewall Security decisions and system performance are optimized when security i...

Page 11: ...ontain additional information Section 2 1 ESM Terminology on page 11 Section 2 2 Logging In to the Endpoint Security Client 4 0 on page 12 2 1 ESM Terminology The following terms are frequently used i...

Page 12: ...her communication hardware that might be included on a computer such as infrared Bluetooth FireWire and serial and parallel ports Storage Devices Refers to external storage devices that can pose a sec...

Page 13: ...k OK The Directory Service Configuration Name needs to match the directory services you are authenticating to Use the drop down menu to see if you have more than one service available NOTE It is not n...

Page 14: ...14 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...

Page 15: ...nt parameters and switches to the appropriate location applying the needed protection levels according to the current security policy Network environment information is either stored or preset within...

Page 16: ...ill assist you in using ZENworks Endpoint Security on the endpoint Section 3 3 1 Managing Files on Non System Volumes on page 16 Section 3 3 2 Managing Files on Removable Storage on page 16 3 3 1 Mana...

Page 17: ...18 However files added to an encrypted removable storage device on another machine are not encrypted and must be encrypted manually The following sections contain more information Encrypting Files on...

Page 18: ...nds upon the amount of data stored on the device What If I Don t Want the Device Encrypted When you insert a removable storage device the Endpoint Security Client prompts asking if you want the drive...

Page 19: ...ut your home computer does not have the Security client installed You copy the files to the Password Encrypted Files folder on your USB thumb drive take the files home then access them using the ZENwo...

Page 20: ...ce panel click Browse navigate to the storage device s Password Encrypted Files directory select the desired file then click Save or To decrypt the entire Password Encrypted Files directory rather tha...

Page 21: ...display the menu 2 Click Check for Policy Update NOTE Automatic updates and checking for policy updates are not available features when the Endpoint Security Client is running as standalone The ESM A...

Page 22: ...bably caused by the security policy the Endpoint Security Client 4 0 is enforcing Changing locations or firewall settings usually lifts these restrictions and restores the interrupted functionality Ho...

Page 23: ...r the designated time Clicking Load Policy which replaces the Password Override button in the About window restores the previous policy If your administrator has updated your policy to resolve existin...

Page 24: ...y Client icon in the taskbar to display the menu then click About or double click the Endpoint Security Client icon 2 Click the Diagnostics button 3 Check everything in the Diagnostics Package pane or...

Reviews: