Chapter 49 Endpoint Security
ZyWALL USG 300 User’s Guide
812
The following table gives an overview of the objects you can configure.
Table 233
Configuration > Object > Endpoint Security > Add
LABEL
DESCRIPTION
Show Advance
Settings / Hide
Advance
Settings
Click this button to display a greater or lesser number of configuration
fields.
General Settings
Object
Name
Specify a descriptive name for identification purposes. You can enter up
to 31 characters (“0-9”, “a-z”, “A-Z”, “-”, “_” with no spaces allowed).
Description Enter a description of this object. It is not used elsewhere. You can use
alphanumeric and
()+/:=?!*#@$_%-
characters, and it can be up to 60
characters long.
Endpoint
Operating
System
Select the type of operating system the user’s computer must be using.
The checking items in the rest of the screen vary depending on the
selected operating system. If you select
Mac OSX
, there are no other
checking items.
Others
allows access for computers not using Windows, Linux, or Mac
OSX operating systems. For example you create Windows, Linux, and
Mac OSX endpoint security objects to apply to your LAN users. An
“others” object allows access for LAN computers using Solaris, HP,
Android, or other operating systems.
Windows
Version
If you selected Windows as the operating system, select the version of
Windows here.
Endpoint
must
update to
Windows
Service
Pack
If you selected Windows as the operating system, you can enter the
minimum Windows service pack number the user’s computer must have
installed. The user’s computer must have this service pack or higher. For
example, “2” means service pack 2. Leave the field blank to have the
ZyWALL ignore the Windows service pack number.
Passing
Criterion
Select whether the user’s computer has to match just one of the
endpoint security object’s checking criteria or all of them.
Checking Item
- Windows
Update
If you selected Windows as the operating system, you can select whether
or not the user’s computer must have the Windows Auto Update feature
activated.
Checking Item
- Security
Patch
Use the table to list Windows security patches that the user’s computer
must have installed. The user’s computer must have all of the listed
Windows security patches installed to pass this checking item. Click
Add
to create a new entry. Select one or more entries and click
Remove
to
delete it or them.
Checking Item
- Personal
Firewall
If you selected Windows as the operating system, you can select whether
or not the user’s computer is required to have personal firewall software
installed. Move the permitted personal firewalls from the
Available
list
to the
Allowed Personal Firewall List
. Use the [Shift] and/or [Ctrl]
key to select multiple entries. The user’s computer must have one of the
listed personal firewalls to pass this checking item. For some personal
firewalls the ZyWALL can also detect whether or not the firewall is
activated; in those cases it must also be activated.
Summary of Contents for Unified Security Gateway ZyWALL 300
Page 2: ......
Page 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Page 31: ...31 PART I User s Guide ...
Page 32: ...32 ...
Page 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Page 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Page 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Page 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Page 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Page 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Page 221: ...221 PART II Technical Reference ...
Page 222: ...222 ...
Page 288: ...Chapter 11 Registration ZyWALL USG 300 User s Guide 288 ...
Page 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Page 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Page 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Page 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Page 454: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 454 ...
Page 472: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 472 ...
Page 534: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 534 ...
Page 536: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 536 ...
Page 544: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 544 ...
Page 638: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 638 Figure 448 Profiles Protocol Anomaly ...
Page 682: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 682 ...
Page 700: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 700 ...
Page 722: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 722 ...
Page 738: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 738 ...
Page 744: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 744 ...
Page 756: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 756 ...
Page 772: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 772 ...
Page 794: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 794 ...
Page 806: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 806 ...
Page 811: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 811 ...
Page 866: ...Chapter 50 System ZyWALL USG 300 User s Guide 866 ...
Page 873: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 873 ...
Page 886: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 886 ...
Page 916: ...Chapter 54 Packet Flow Explore ZyWALL USG 300 User s Guide 916 ...
Page 918: ...Chapter 55 Reboot ZyWALL USG 300 User s Guide 918 ...
Page 920: ...Chapter 56 Shutdown ZyWALL USG 300 User s Guide 920 ...
Page 948: ...Chapter 58 Product Specifications ZyWALL USG 300 User s Guide 948 ...
Page 1014: ...Appendix A Log Descriptions ZyWALL USG 300 User s Guide 1014 ...
Page 1124: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1124 ...