Page 666 / 944 Scroll up to view Page 661 - 665
Chapter 44 Endpoint Security
ZyWALL USG 50 User’s Guide
666
44.1.1
What You Can Do in this Chapter
Use the
Configuration > Object > Endpoint Security
screens (
Section 44.2 on
page 667
) to create and manage endpoint security objects.
44.1.2
What You Need to Know
What Endpoint Security Can Check
The settings endpoint security can check vary depending on the OS of the user’s
computer. Depending on the OS, EPS can check user computers for the following:
Operating System (Windows, Linux, Mac OSX, or others)
Windows version and service pack version
Windows Auto Update setting and installed security patches
Personal firewall installation and activation
Anti-virus installation and activation
Windows registry settings
Processes that the endpoint must execute
Processes that the endpoint cannot execute
The size and version of specific files
Multiple Endpoint Security Objects
You can configure an authentication policy or SSL VPN policy to use multiple
endpoint security objects. This allows checking of computers with different OSs or
security settings. When a client attempts to log in, the ZyWALL checks the client’s
computer against the endpoint security objects one-by-one. The client’s computer
must match one of the force authentication or SSL VPN policy’s endpoint security
objects in order to gain access.
Requirements
User computers must have Sun’s Java (Java Runtime Environment or ‘JRE’)
installed and enabled with a minimum version of 1.4.
Finding Out More
See
Section 7.7 on page 133
for an example of how to use endpoint security and
authentication policies.
Page 667 / 944
Chapter 44 Endpoint Security
ZyWALL USG 50 User’s Guide
667
44.2
Endpoint Security Screen
The
Endpoint Security
screen displays the endpoint security objects you have
configured on the ZyWALL.
Click
Configuration > Object > Endpoint Security
to display the screen.
Figure 380
Configuration > Object > Endpoint Security
The following table gives an overview of the objects you can configure.
Table 207
Configuration > Object > Endpoint Security
LABEL
DESCRIPTION
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click
Edit
to open a screen where
you can modify the entry’s settings.
Remove
To remove an entry, select it and click
Remove
. The ZyWALL confirms you
want to remove it before doing so.
Object
References
Select an entry and click
Object References
to open a screen that shows
which settings use the object. See
Section 11.3.2 on page 230
for an
example.
Object Name
This field displays the descriptive name that identifies this object.
Description
If the entry has a description configured, it displays here.
Endpoint
Operating
System
This is the type of operating system that the user’s computer must be
using.
Checking
Failure
Message
Enter a message to display when a user’s computer fails the endpoint
security check. Use up to 1023 characters (0-9a-zA-Z;/?:@=+$\.-
_!*'()%,”). For example, “Endpoint Security checking failed. Please
contact your network administrator for help.”.
Page 668 / 944
Chapter 44 Endpoint Security
ZyWALL USG 50 User’s Guide
668
Apply
Click this button to save your changes to the ZyWALL.
Reset
Click this button to return the screen to its last-saved settings.
Table 207
Configuration > Object > Endpoint Security (continued)
LABEL
DESCRIPTION
Page 669 / 944
Chapter 44 Endpoint Security
ZyWALL USG 50 User’s Guide
669
44.3
Endpoint Security Add/Edit
Click
Configuration > Object > Endpoint Security
and then the
Add
(or
Edit
)
icon to open the
Endpoint Security Edit
screen. Use this screen to configure an
endpoint security object.
Page 670 / 944
Chapter 44 Endpoint Security
ZyWALL USG 50 User’s Guide
670
Figure 381
Configuration > Object > Endpoint Security > Add

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top