Software Required; B.5.8 Software Required - Novell ZENWORKS NETWORK ACCESS CONTROL 5.0 - 09-22-2008 User Manual

Table of Contents

Advertisement

Description:
This test verifies that the endpoint attempting to connect to your system does not have the software
packages listed installed.
Test Properties
Enter a list of applications that are not allowed on connecting endpoints, separated with a carriage
return. The format for an application is vendor\software package[\version]. Using this format stores
the value in the HKEY_LOCAL_MACHINE\Software key.
For example:
Adobe\Acrobat Reader, Adobe\Acrobat Reader\6.0
You can also specify which key to use for the specific value by entering the key at the beginning of
the value. For example:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Messenger
How Does this Affect Me?
Some software is generally not appropriate for corporate use, and can create vulnerabilities in your
system, for example, peer-to-peer (P2P) software and instant messenging (IM) software.
What Do I Need to Do?
Remove the software that is not allowed.

B.5.8 Software Required

The following sections contain more information:
"Description" on page 434
"Test Properties" on page 434
"How Does this Affect Me?" on page 435
"What Do I Need to Do?" on page 435
Description
This test verifies that the endpoint attempting to connect to your system has the required software
packages installed.
Test Properties
Enter a list of applications that are required on all connecting endpoints, separated with a carriage
return. The format for an application is vendor\software package[\version]. Using this format stores
the value in the HKEY_LOCAL_MACHINE\Software key.
For example:
Adobe\Acrobat Reader, Adobe\Acrobat Reader\6.0
434 Novell ZENworks Network Access Control Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zenworks network access control 5.0

Table of Contents