Cisco 5520 - ASA IPS Edition Bundle Configuration Manual page 78

Asa 5500 series adaptive security appliance
Hide thumbs Also See for 5520 - ASA IPS Edition Bundle:
Table of Contents

Advertisement

Index
Disable command prompt access
Disable printing, attribute
Disable registry modification, attribute
DoD delete See Secure Delete
Does not exist, criterion for a registry key or file
Do not encrypt files on network drives, attribute
Do not encrypt files on removable drives, attribute
drive access
5-25
Dword
5-9, 5-10
E
E certificate field
5-5, 5-6, 5-7
e-mail
5-26
Enable cancellation of cleaning, attribute
Enable identification using File or Registry criteria,
attribute
5-8 to 5-13
Enable identification using IP criteria, attribute
Enable Secure Desktop inactivity timeout, attribute
Enable switching between Secure Desktop and local
desktop, attribute
Enable Vault Reuse, attribute
Enable web browsing if Mac or Linux installation fails,
attribute
7-2
encryption
5-24, 5-25, A-5, A-6
Entry Path, criterion for a file
Entry Path, criterion for a registry key
eTrust Antivirus
A-4
example CSD configuration
Exists, criterion for a file
Exists, criterion for a registry key or file
F
FAQs
A-1 to A-6
fast user switching
A-1
favorites
5-27
Cisco Secure Desktop Configuration Guide
IN-8
5-26
5-26
5-26
5-10
5-25
5-25
7-2
5-7
5-23
5-24
5-11
5-9
4-1 to 4-3
5-12
5-9
File Access
Macintosh and Linux
Microsoft Windows CE
File access
VPN Feature Policy, Windows installation failure
VPN Feature Policy, Windows installation success
file criteria
firewall
A-6
Firewall, attribute
folders in favorites or bookmarks
Force admin control on list of safe modules, attribute
Force application uninstall upon Secure Desktop closing,
attribute
frequently asked questions
F-Secure Antivirus
Full Tunneling
Full tunneling
VPN Feature Policy, Windows installation failure
VPN Feature Policy, Windows installation success
5-24
G
GUI menu, figure
H
Hidden URL, attribute
hives
5-9
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
home location, example configuration
Home Page, attribute
host integrity See System Detection
7-2
6-1
5-4, 5-8
5-16, 5-18
5-27
5-24
A-1 to A-6
A-4
3-4
3-3
5-22
5-9
5-9
5-9, 5-10, 5-11
5-9
5-27
5-3
5-16
5-20
5-3
5-17
4-2, 5-1
OL-8607-02

Advertisement

Table of Contents
loading

This manual is also suitable for:

Cisco secure desktop

Table of Contents