5-19
Cisco Secure Desktop Configuration Guide
OL-8607-02
Chapter 5 Setting Up CSD for Microsoft Windows Clients
Configuring the Secure Desktop for Clients that Match Location Criteria
Note
For the complete list of applications checked by System Detection, see
Figure 5-8
or refer to
“
System Detection Questions
.”
Configuring Keystroke Logger for a Location
You can configure a location type to scan for keystroke logging applications on the remote client.
You can list the keystroke logging applications that are safe or let the remote user approve of the
applications the scan identifies. Secure Desktop and Cache Cleaner launch only if the scan is clear, or
only if you assign administrative control to the user and the user approves of the applications the scan
identifies. It may not be possible for CSD to detect all keystroke loggers present, including hardware
keystroke logging devices.
By default, System Detection does not scan for keystroke loggers. Configure scanning for keystroke
loggers as follows:
Step 1
Click
Keystroke Logger
under the name of the location you are configuring in the menu on the left.
The Keystroke Logger window opens (
Figure 5-9
).