ZyXEL Communications ZYWALL USG 20 Manual page 627

Unified security gateway
Hide thumbs Also See for ZYWALL USG 20:
Table of Contents

Advertisement

Table 189 Configuration > Object > Endpoint Security > Add (continued)
LABEL
Checking Item
- Anti-Virus
Software
Checking Item
- Windows
Registry
Checking Item
- Required
Processes
Checking Item
- Forbidden
Processes
ZyWALL USG 20/20W User's Guide
DESCRIPTION
If you selected Windows as the operating system, you can select whether
or not the user's computer is required to have anti-virus software
installed. Move the permitted anti-virus software packages from the
Available list to the Allowed Anti-Virus Software List. Use the [Shift]
and/or [Ctrl] key to select multiple entries. The user's computer must
have one of the listed anti-virus software packages to pass this checking
item. For some anti-virus software the ZyWALL can also detect whether
or not the anti-virus software is activated; in those cases it must also be
activated.
If you selected Windows as the operating system, you can use the table
to list Windows registry values to check on the user's computer.
Use the Operation field to set whether the value for the registry item in
the user's computer has to be equal to (==), greater than (>), less than
(<), greater than or equal to (>=), less than or equal to (<=), or not
equal to (!=) the value listed in the entry.
Click Add to create a new entry. Select one or more entries and click
Remove to delete it or them.
The user's computer must pass all of the listed Windows registry value
checks to pass this checking item.
If you selected Windows or Linux as the operating system, you can use
this section to list applications that a user's computer must be running.
Use the Processes Endpoints Must Have Running table to list
processes that the user's computer must have running. The user's
computer must have all of the listed applications running to pass this
checking item.
Include the filename extension for Linux operating systems.
Click Add to create a new entry. Select one or more entries and click
Remove to delete it or them.
If you selected Windows or Linux as the operating system, you can use
this section to list applications that a user's computer cannot be running.
Use the Processes Endpoints Must NOT Have Running table to list
processes that the user's computer are not permitted to have running.
The user's computer must not have any of the listed applications running
to pass this checking item.
Include the filename extension for Linux operating systems.
Click Add to create a new entry. Select one or more entries and click
Remove to delete it or them.
Chapter 42 Endpoint Security
627

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall usg 20wZywall usg 2000

Table of Contents