Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT Manual

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT:

Advertisement

AUTHORIZED DOCUMENTATION
Endpoint Security Client 3.5 User Guide
Novell
®
ZENworks
Endpoint Security Management
®
3.5
March 31, 2009
www.novell.com
ZENworks Endpoint Security Client 3.5 User Guide

Advertisement

Table of Contents
loading

Summary of Contents for Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT

  • Page 1 AUTHORIZED DOCUMENTATION Endpoint Security Client 3.5 User Guide Novell ® ZENworks Endpoint Security Management ® March 31, 2009 www.novell.com ZENworks Endpoint Security Client 3.5 User Guide...
  • Page 2 Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes.
  • Page 3 Novell Trademarks For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/ trademarks/tmlist.html). Third-Party Materials All third-party trademarks are the property of their respective owners.
  • Page 4 ZENworks Endpoint Security Client 3.5 User Guide...
  • Page 5: Table Of Contents

    Contents About This Guide 1 Introduction Security Enforcement for Mobile Computers ........9 NDIS Layer Firewall Protection .
  • Page 6 ZENworks Endpoint Security Client 3.5 User Guide...
  • Page 7: About This Guide

    ZENworks Endpoint Security Management 3.5 documentation Web site (http://www.novell.com/documentation/zesm35). Documentation Conventions In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. ® A trademark symbol ( , etc.) denotes a Novell trademark.
  • Page 8 ZENworks Endpoint Security Client 3.5 User Guide...
  • Page 9: Introduction

    Introduction ® ® Novell ZENworks Endpoint Security Management (ESM) is designed to protect corporate data assets, through a centrally managed tool called the Endpoint Security Client. The Endpoint Security Client 3.5 is installed on Windows XP and Windows 2000 enterprise computers and enforces security policies written and sent down through the ESM management and distribution system.
  • Page 10 providing security protection from the moment traffic enters the computer. Differences between ESM and application-layer firewalls and filter drivers are illustrated in Figure 1-2, “Effectiveness of an NDIS-Layer Firewall,” on page Effectiveness of an NDIS-Layer Firewall Figure 1-2 Security decisions and system performance are optimized when security implementations operate at the lowest appropriate layer of the protocol stack.
  • Page 11: Endpoint Security Client 3.5 Overview

    Endpoint Security Client 3.5 Overview ® The ZENworks Security Client secures computers from data invasion attacks at home, at work, and while traveling, through the enforcement of security policies created by the enterprise Endpoint Security Management (ESM) administrator. The firewall settings assigned at individual locations are automatically adjusted when laptop users move from the corporate network to their home networks or go on the road and log on to a public or open network.
  • Page 12: Logging In To The Endpoint Security Client 3.5

    At what level the user is permitted to use removable storage devices (such as thumb drives and memory cards) and to use CD/DVD-RW drives Any network environments that can help to define the location Firewall Settings: Firewall settings control the connectivity of all networking ports (1-65535), network packets (ICMP, ARP, etc.), network addresses (IP or MAC), and which network applications (file sharing, instant messenger software, etc.) are permitted to get a network connection when the setting is applied.
  • Page 13 Endpoint Security Client 3.5 Login Figure 2-2 Enter your username and password for the domain, then click OK. NOTE: It is not necessary to log in to the Endpoint Security Client 3.5 when the Endpoint Security Client is running as Unmanaged. The ESM Administrator has a different method to deliver policies to unmanaged users.
  • Page 14 ZENworks Endpoint Security Client 3.5 User Guide...
  • Page 15: Using The Endpoint Security Client

    Using the Endpoint Security Client The following sections contain additional information about actions that you can perform using the ® ® Novell ZENworks Endpoint Security end-user application, the Endpoint Security Client 3.5: Section 3.1, “Moving Among Network Environments,” on page 15 Section 3.2, “Changing Locations,”...
  • Page 16: Changing Locations

    Update Policy = Permitted Default Firewall settings = All Adaptive The three adapter types, Wi-Fi, Wired, and Dialup are permitted in the Unknown location. This allows the computer to interface peripherally with its network environment, and attempt to associate a location policy as described above. 3.2 Changing Locations At startup, the Endpoint Security Client 3.5 switches to the Unknown location.
  • Page 17: Saving A Wi-Fi Environment

    If this network environment was saved at a previous location, the Endpoint Security Client 3.5 asks if the user wants to save the new location. Select Yes to save the environment to the current location and clear the environment from its prior location, or select No to leave the environment in the prior location.
  • Page 18: Removing A Saved Environment

    2 Specify any necessary security information (WEP or other security key), then click Connect. 3 Complete the steps outlined in Section 3.2.1, “Saving a Network Environment,” on page 16 save this environment. 3.2.3 Removing a Saved Environment To remove a saved network environment from a location: 1 Right-click the Endpoint Security Client icon in the taskbar to display the menu.
  • Page 19: Data Encryption

    2 Mouse over the current location to display the submenu, then click the selection to change the firewall setting. NOTE: The number of firewall settings available in a location is determined by policy. 3.4 Data Encryption When activated by policy, the Endpoint Security Client 3.5 manages the encryption of files placed in a specific directory on the endpoint and placed in removable storage devices.
  • Page 20 “What If I Don’t Want the Device Encrypted?” on page 20 “Password Encrypting Files” on page 21 “Changing the Password to Files in the Password Encrypted Files Folder” on page 21 “Using the File Decryption Utility” on page 22 Encrypting Files To encrypt added files on a removable storage device: 1 Plug the storage device into the appropriate port on your computer.
  • Page 21 Encryption Warning when a New Device is Inserted Figure 3-1 To prevent encryption, remove the drive before clicking Continue. Click Continue to either encrypt the drive or to close the window after removing the device. Password Encrypting Files Your administrator can enable the Security client to create a Password Encrypted Files folder on any removable device that connects to your computer.
  • Page 22 3 Select Encryption from the menu. 4 Click Clear Password. 5 Drag a file to the Password Encrypted Files folder and enter the new password and hint. All new files added to the folder now require the new password for access. Using the File Decryption Utility To use the File Decryption utility: 1 Plug the storage device into the appropriate port on your computer.
  • Page 23: Updating Policies

    3.5 Updating Policies New security policies are released to managed users as they are published. The Endpoint Security Client automatically receives updates at intervals determined by the ESM administrator. However, the managed user can check for policy updates when entering a new location. 1 Right-click the Endpoint Security Client icon in the taskbar to display the menu.
  • Page 24 The Endpoint Security Client 3.5 is equipped with a Password Override feature that temporarily disables the current security policy to permit the necessary activity. The Security Administrator distributes a single-use password key only when needed, and should be informed of any problems with a security policy.
  • Page 25: Diagnostics

    3.8 Diagnostics Novell provides diagnostics tools to allow the administrator to troubleshoot Endpoint Security Client 3.5 issues. Your ZENworks Endpoint Security administrator will guide you through the diagnostics process. Using the Endpoint Security Client 3.5...
  • Page 26 ZENworks Endpoint Security Client 3.5 User Guide...

Table of Contents