12
ZENworks Endpoint Security Client 4.0 User Guide
no
vd
ocx
(e
n)
13
Ma
y 20
09
Firewall Settings:
Firewall settings control the connectivity of all networking ports (1-65535),
network packets (ICMP, ARP, etc.), network addresses (IP or MAC), and which network
applications (file sharing, instant messenger software, etc.) are permitted to get a network
connection when the setting is applied. Three firewall settings are included as defaults for ESM, and
can be implemented at a location. The ESM Administrator can also create specific firewall settings,
which cannot be listed here.
All Adaptive:
This firewall setting sets all networking ports as stateful (all unsolicited inbound
network traffic is blocked; all outbound network traffic is allowed). ARP and 802.1x packets
are permitted, and all network applications are permitted a network connection.
All Open:
This firewall setting sets all networking ports as open (all network traffic is
allowed). All packet types are permitted. All network applications are permitted a network
connection.
All Closed:
This firewall setting closes all networking ports, and restricts all packet types.
Adapters:
Refers to three communication adapters normally found on an endpoint:
Wired Adapters (LAN connections)
Wi-Fi Adapters (PCMCIA Wi-Fi cards, and built-in Wi-Fi radios)
Also refers to other communication hardware that might be included on a computer, such as
infrared, Bluetooth*, FireWire*, and serial and parallel ports.
Storage Devices:
Refers to external storage devices that can pose a security threat when data is
copied to, or introduced from, these devices on an endpoint. USB thumb drives, flash memory cards,
and SCSI PCMCIA memory cards, along with traditional Zip*, floppy, and external CDR drives and
the installed CD/DVD drives (including CD-ROM, CD-R/RW, DVD, DVD R/RW), can all be
blocked, permitted, or rendered to Read-Only at a single location.
Network Environments:
A network environment is the collection of network services and service
addresses required to identify a network location.
2.2 Logging In to the Endpoint Security Client 4.0
If you are a member of the corporate Active Directory domain, the Endpoint Security Client 4.0 uses
your Windows* username and password to log you in to the Policy Distribution Service (no pop-up
window displays). If you are member of a Novell eDirectory tree, the Endpoint Security Client 4.0
prompts you for your username and password for the tree (see
Figure 2-2
).
NOTE:
With Novell eDirectory, the user receives a pop-up login window once after the Endpoint
Security Client 4.0 installs. This allows you to provide your username and password for the tree.
If you are not a member of the domain that the Policy Distribution Service is hosted on, the
Endpoint Security Client 4.0 prompts you for your username and password for that domain (see
Figure 2-2
).
Содержание ZENworks Endpoint Security Client 4.0
Страница 4: ...4 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...
Страница 6: ...6 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...
Страница 8: ...8 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...
Страница 14: ...14 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...