Endpoint Security Client 4.0 Overview
2
11
no
vd
ocx
(e
n)
13
Ma
y 20
09
2
Endpoint Security Client 4.0
Overview
The ZENworks
®
Security Client secures computers from data invasion attacks at home, at work,
and while traveling, through the enforcement of security policies created by the enterprise Endpoint
Security Management (ESM) administrator. The firewall settings assigned at individual locations
are automatically adjusted when laptop users move from the corporate network to their home
networks or go on the road and log on to a public or open network.
Security levels are applied to various user locations without requiring user expertise or
understanding of network security, port configurations, hidden shared files, or other technical
details. Immediate information on which locations and policies are available by simply mousing
over the taskbar icon to view the Endpoint Security Client ToolTip (see
Figure 2-1
).
Figure 2-1
Endpoint Security Client ToolTip
The following sections contain additional information:
Section 2.1, “ESM Terminology,” on page 11
Section 2.2, “Logging In to the Endpoint Security Client 4.0,” on page 12
2.1 ESM Terminology
The following terms are frequently used in this documentation:
Locations:
Locations are simple definitions that help users identify the network environment they
are in, provide immediate security settings (defined by the administrator), and permit the user to
save the network environment and change the applied firewall settings.
Each location is given unique security settings, denying access to certain network functionality and
hardware in more hostile network environments, and permitting broader access within trusted
environments. Locations define the following information:
How often the Endpoint Security Client checks for a policy update in this location
The location management permissions granted to a user
The firewall settings that are used at this location
The communication hardware that is permitted to connect
At what level the user is permitted to use removable storage devices (such as thumb drives and
memory cards) and to use CD/DVD-RW drives
Any network environments that can help to define the location
Содержание ZENworks Endpoint Security Client 4.0
Страница 4: ...4 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...
Страница 6: ...6 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...
Страница 8: ...8 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...
Страница 14: ...14 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...