Table 65: Configuring Host Checker Third-Party Applications Using
Predefined Rules Details
(continued)
Your Action
Function
Option
Select the
Require specific
products
option to enable this
feature.
Specifies specific
products/vendors, and
defines compliance by
allowing any product by a
specific vendor (for
example, any Symantec
product).
Require specific products
Select the
Monitor this rule for
change in result
option to enable
this feature.
Continuously monitors the
policy compliance of
endpoints.
Monitor this rule for change
in result
Selected Vendors tab
Select the vendor, and then click
Add
to move the vendor from the
Non-members to the Members list.
Allows you to select the
vendors.
Selected Vendors
Specific Products Selected tab
Select the product, and then click
Add
to move the product from the
Non-members to the Members list.
Allows you to select
specific products.
Specific Products Selected
Selected Products
Select the product from the
Product name
drop-down list.
Allows you to select the
product.
Product name
Predefined OS Checks Rules
Enter the name.
Specifies the name for the
OS Checks rule.
Rule Name
Select the operating system, and
then click
Add
to move from the
Non-members to the members list.
Specifies the operating
systems.
OS Selections
Related
Documentation
Configuring the Remote Integrity Measurement Verifier Server (NSM Procedure) on
page 240
•
•
Configuring Host Checker Customized Requirements Using Custom Rules (NSM
Procedure) on page 241
•
Configuring General Host Checker Remediation (NSM Procedure) on page 233
239
Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Configuring Secure Access Host Checker Policies
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...