
3.
Click the
Configuration
tab and select
Authentication > Endpoint Security > Host
Checker
. The corresponding workspace appears.
4.
Create a new policy or click an existing policy in the Policies section of the page.
5.
Click the tab that corresponds to the operating system for which you want to specify
Host Checker options—
Windows
,
Mac
,
Linux
,
Solaris
and
Windows Mobile
. In the
same policy, you can specify different Host Checker requirements for each operating
system.
6.
Add and modify settings as specified inTable 65 on page 235.
7.
Specify the support products or vendors for a system scan check.
8.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 65: Configuring Host Checker Third-Party Applications Using
Predefined Rules Details
Your Action
Function
Option
Predefined Antivirus Rules
Enter the rule name.
Specifies the name for
Antivirus rule.
Rule Name
Select one of the following options:
•
Require any supported
product
—Specifies the software
vendor’s product that is
supported for the system scan
check.
•
Require specific
products/Vendors
—Specifies
the specific vendor for the
system scan check.
Specifies the support
products or vendors for
system scan check.
Select Products
Select the
Require any supported
product from a specific vendor
to
enable this feature.
Checks for any product
(rather than requiring you
to select every product
separately).
Require any supported
product from a specific
vendor
Select the
Require specific
products
to enable this feature.
Checks for specific
products/vendors to define
compliance by allowing any
product by a specific vendor
(for example, any
Symantec product).
Require specific products
Select the
Enable Scan period
check
to enable this feature.
Enables the System scan
for the product.
Enable Scan period check
235
Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Configuring Secure Access Host Checker Policies
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...