Chapter 49 Endpoint Security
ZyWALL USG 300 User’s Guide
822
Checking Item
- Personal
Firewall
If you selected Windows as the operating system, you can select whether
or not the user’s computer is required to have personal firewall software
installed. Move the permitted personal firewalls from the
Available
list
to the
Allowed Personal Firewall List
. Use the [Shift] and/or [Ctrl]
key to select multiple entries. The user’s computer must have one of the
listed personal firewalls to pass this checking item. For some personal
firewalls the ZyWALL can also detect whether or not the firewall is
activated; in those cases it must also be activated.
Checking Item
- Anti-Virus
Software
If you selected Windows as the operating system, you can select whether
or not the user’s computer is required to have anti-virus software
installed. Move the permitted anti-virus software packages from the
Available
list to the
Allowed Anti-Virus Software List
. Use the [Shift]
and/or [Ctrl] key to select multiple entries. The user’s computer must
have one of the listed anti-virus software packages to pass this checking
item. For some anti-virus software the ZyWALL can also detect whether
or not the anti-virus software is activated; in those cases it must also be
activated.
Checking Item
- Windows
Registry
If you selected Windows as the operating system, you can use the table
to list Windows registry values to check on the user’s computer.
Use the
Operation
field to set whether the value for the registry item in
the user’s computer has to be equal to (
==
), greater than (
>
), less than
(
<
), greater than or equal to (
>=
), less than or equal to (
<=
), or not
equal to (
!=
) the value listed in the entry.
Click
Add
to create a new entry. Select one or more entries and click
Remove
to delete it or them.
The user’s computer must pass all of the listed Windows registry value
checks to pass this checking item.
Checking Item
- Application
If you selected Windows or Linux as the operating system, you can use
these tables to list applications that a user’s computer must be running
and other applications that it cannot be running.
Use the
Process that endpoint must execute
table to list processes
that the user’s computer must have running. The user’s computer must
have all of the listed applications running to pass this checking item.
Use the
Process that endpoint cannot execute
table to list processes
that the user’s computer are not permitted to have running. The user’s
computer must not have any of the listed applications running to pass
this checking item.
Include the filename extension for Linux operating systems.
Click
Add
to create a new entry. Select one or more entries and click
Remove
to delete it or them.
Table 232
Configuration > Object > Endpoint Security > Add (continued)
LABEL
DESCRIPTION
Содержание USG-300 - V2.20 ED 2
Страница 2: ......
Страница 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Страница 31: ...31 PART I User s Guide ...
Страница 32: ...32 ...
Страница 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Страница 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Страница 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Страница 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Страница 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Страница 128: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 128 Figure 73 Configuration Network Interface WLAN Add ...
Страница 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Страница 221: ...Chapter 8 L2TP VPN Example ZyWALL USG 300 User s Guide 221 ...
Страница 222: ...Chapter 8 L2TP VPN Example ZyWALL USG 300 User s Guide 222 ...
Страница 223: ...223 PART II Technical Reference ...
Страница 224: ...224 ...
Страница 238: ...Chapter 9 Dashboard ZyWALL USG 300 User s Guide 238 ...
Страница 282: ...Chapter 10 Monitor ZyWALL USG 300 User s Guide 282 ...
Страница 303: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 303 Figure 269 Configuration Network Interface Ethernet Edit ...
Страница 320: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 320 Figure 275 Configuration Network Interface Cellular Add ...
Страница 330: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 330 Figure 278 Configuration Network Interface WLAN Add No Security ...
Страница 345: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 345 Figure 286 Configuration Network Interface VLAN Edit ...
Страница 355: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 355 Figure 288 Configuration Network Interface Bridge Add ...
Страница 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Страница 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Страница 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Страница 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Страница 433: ...Chapter 20 HTTP Redirect ZyWALL USG 300 User s Guide 433 ...
Страница 434: ...Chapter 20 HTTP Redirect ZyWALL USG 300 User s Guide 434 ...
Страница 456: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 456 ...
Страница 474: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 474 ...
Страница 481: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 481 Figure 355 Configuration VPN IPSec VPN VPN Connection Edit IKE ...
Страница 492: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 492 Figure 358 Configuration VPN IPSec VPN VPN Gateway Edit ...
Страница 515: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 515 ...
Страница 516: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 516 ...
Страница 529: ...Chapter 26 SSL VPN ZyWALL USG 300 User s Guide 529 ...
Страница 530: ...Chapter 26 SSL VPN ZyWALL USG 300 User s Guide 530 ...
Страница 540: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 540 ...
Страница 542: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 542 ...
Страница 550: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 550 ...
Страница 635: ...Chapter 34 IDP ZyWALL USG 300 User s Guide 635 ...
Страница 636: ...Chapter 34 IDP ZyWALL USG 300 User s Guide 636 ...
Страница 646: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 646 Figure 448 Profiles Protocol Anomaly ...
Страница 657: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 657 ...
Страница 658: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 658 ...
Страница 690: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 690 ...
Страница 708: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 708 ...
Страница 730: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 730 ...
Страница 746: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 746 ...
Страница 752: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 752 ...
Страница 764: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 764 ...
Страница 780: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 780 ...
Страница 802: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 802 ...
Страница 814: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 814 ...
Страница 820: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 820 Figure 534 Configuration Object Endpoint Security Add ...
Страница 824: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 824 ...
Страница 876: ...Chapter 50 System ZyWALL USG 300 User s Guide 876 ...
Страница 916: ...Chapter 54 Reboot ZyWALL USG 300 User s Guide 916 ...
Страница 918: ...Chapter 55 Shutdown ZyWALL USG 300 User s Guide 918 ...
Страница 938: ...Chapter 56 Troubleshooting ZyWALL USG 300 User s Guide 938 ...
Страница 946: ...Chapter 57 Product Specifications ZyWALL USG 300 User s Guide 946 ...
Страница 1118: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1118 ...