Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 4.0 - 03-31-2009 Manual

Advertisement

Quick Links

AUTHORIZED DOCUMENTATION
Endpoint Security Client 4.0 User Guide
Novell
®
ZENworks
Endpoint Security Management
®
4.0
March 31, 2009
www.novell.com
ZENworks Endpoint Security Client 4.0 User Guide

Advertisement

Table of Contents
loading

Summary of Contents for Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 4.0 - 03-31-2009

  • Page 1 AUTHORIZED DOCUMENTATION Endpoint Security Client 4.0 User Guide Novell ® ZENworks Endpoint Security Management ® March 31, 2009 www.novell.com ZENworks Endpoint Security Client 4.0 User Guide...
  • Page 2 Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes.
  • Page 3 Novell Trademarks For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/ trademarks/tmlist.html). Third-Party Materials All third-party trademarks are the property of their respective owners.
  • Page 4 ZENworks Endpoint Security Client 4.0 User Guide...
  • Page 5: About This Guide

    ZENworks Endpoint Security Management 3.5 documentation Web site (http://www.novell.com/documentation/zesm35). Documentation Conventions In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. ® A trademark symbol ( , etc.) denotes a Novell trademark.
  • Page 6 ZENworks Endpoint Security Client 4.0 User Guide...
  • Page 7: Table Of Contents

    Contents About This Guide 1 Introduction Security Enforcement for Mobile Computers ........9 NDIS Layer Firewall Protection .
  • Page 8 ZENworks Endpoint Security Client 4.0 User Guide...
  • Page 9: Introduction

    Windows Vista with Support Pack 1 running in 32-bit mode. The Endpoint Security Client 4.0 uses the ZENworks Endpoint Security Management 3.5 Server and Management Console. Novell ZENworks Endpoint Security Management (ESM) is designed to protect corporate data assets, through a centrally managed tool called the ZENworks Security Client. The ZENworks Endpoint Security Client 4.0 is installed on Windows Vista enterprise computers and enforces...
  • Page 10: Ndis Layer Firewall Protection

    1.2 NDIS Layer Firewall Protection In securing mobile devices, ESM is superior to typical personal firewall technologies that operate only in the application layer or as a firewall-hook driver. ESM client security is integrated into the Network Driver Interface Specification (NDIS) driver for each network interface card (NIC), providing security protection from the moment traffic enters the computer.
  • Page 11: Endpoint Security Client 4.0 Overview

    Endpoint Security Client 4.0 Overview ® The ZENworks Security Client secures computers from data invasion attacks at home, at work, and while traveling, through the enforcement of security policies created by the enterprise Endpoint Security Management (ESM) administrator. The firewall settings assigned at individual locations are automatically adjusted when laptop users move from the corporate network to their home networks or go on the road and log on to a public or open network.
  • Page 12: Logging In To The Endpoint Security Client 4.0

    Windows* username and password to log you in to the Policy Distribution Service (no pop-up window displays). If you are member of a Novell eDirectory tree, the Endpoint Security Client 4.0 prompts you for your username and password for the tree (see Figure 2-2).
  • Page 13 Endpoint Security Client 4.0 Login Figure 2-2 Enter your username and password for the domain or for the eDirectory tree, then click OK. The Directory Service Configuration Name needs to match the directory services you are authenticating to. Use the drop-down menu to see if you have more than one service available. NOTE: It is not necessary to log in to the Endpoint Security Client when the Endpoint Security Client is running as standalone.
  • Page 14 ZENworks Endpoint Security Client 4.0 User Guide...
  • Page 15: Using The Endpoint Security Client

    Using the Endpoint Security Client The following sections contain additional information about actions that you can perform using the ® ® Novell ZENworks Endpoint Security end-user application, the Endpoint Security Client 4.0: Section 3.1, “Moving Among Network Environments,” on page 15 Section 3.2, “Changing Locations,”...
  • Page 16: Changing Locations

    3.2 Changing Locations At startup, the Endpoint Security Client 4.0 switches to the Unknown location. It then attempts to detect the current network environment and to change the location automatically. If the network environment is either unrecognized, or has not been preset, the location must be changed manually. If you cannot perform the following steps, your ZENworks Endpoint Security administrator might have prevented you from changing locations manually.
  • Page 17 When you are running ZENworks Endpoint Security, files stored on these devices are encrypted as they are accessed by the operating system or the user. Files copied to the device are immediately encrypted. When the removable storage device is connected to a computer not managed by the ZENworks Endpoint Security system, the files remain encrypted and cannot be decrypted.
  • Page 18 The amount of time needed to encrypt the files depends upon the amount of data stored on the device. What If I Don’t Want the Device Encrypted? When you insert a removable storage device, the Endpoint Security Client prompts, asking if you want the drive encrypted, or if you prefer to remove it and not encrypt all files.
  • Page 19 WARNING: To prevent encryption, remove the drive before clicking Continue. Click Continue to either encrypt the drive or to close the window after removing the device. Password Encrypting Files Your administrator can enable the Security client to create a Password Encrypted Files folder on any removable device that connects to your computer.
  • Page 20 5 Drag a file to the folder and enter the new password and hint. Shared Files All new files added to the folder now require the new password for access. Using the File Decryption Utility To use the File Decryption utility: 1 Plug the storage device into the appropriate port on your computer.
  • Page 21: Updating Policies

    3.4 Updating Policies New security policies are released to managed users as they are published. The Endpoint Security Client automatically receives updates at intervals determined by the ESM administrator. However, the managed user can check for policy updates anytime if the policy allows it. 1 Right-click the Endpoint Security Client icon in the taskbar to display the menu.
  • Page 22: Viewing Help

    If you do not have rights to perform a check in, the Check In button is greyed out. The Check In window displays the current state of the check in process. It shows the management and distribution servers if this is a managed client, the policy type, the last time a check in was attempted and the last time it succeeded, and the check in status.
  • Page 23: Diagnostics

    WARNING: Encryption services are never overridden. 3.7 Diagnostics Novell provides diagnostics tools to allow the administrator to troubleshoot Endpoint Security Client issues. Your ZENworks Endpoint Security administrator will guide you through the diagnostics process. Contact Novell Support for further questions.
  • Page 24 You might be asked for a diagnostics package. Your ZENworks Endpoint Security administrator will tell you what to include in it. To create a diagnostics package: 1 Right-click the Endpoint Security Client icon in the taskbar to display the menu, then click About, or double-click the Endpoint Security Client icon.

This manual is also suitable for:

Zenworks endpoint security client 4.0

Table of Contents