Summary of Contents for Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT
Page 1
AUTHORIZED DOCUMENTATION Endpoint Security Client 3.5 User Guide Novell ® ZENworks Endpoint Security Management ® March 31, 2009 www.novell.com ZENworks Endpoint Security Client 3.5 User Guide...
Page 2
Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes.
Page 3
Novell Trademarks For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/ trademarks/tmlist.html). Third-Party Materials All third-party trademarks are the property of their respective owners.
Page 4
ZENworks Endpoint Security Client 3.5 User Guide...
ZENworks Endpoint Security Management 3.5 documentation Web site (http://www.novell.com/documentation/zesm35). Documentation Conventions In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. ® A trademark symbol ( , etc.) denotes a Novell trademark.
Page 8
ZENworks Endpoint Security Client 3.5 User Guide...
Introduction ® ® Novell ZENworks Endpoint Security Management (ESM) is designed to protect corporate data assets, through a centrally managed tool called the Endpoint Security Client. The Endpoint Security Client 3.5 is installed on Windows XP and Windows 2000 enterprise computers and enforces security policies written and sent down through the ESM management and distribution system.
Page 10
providing security protection from the moment traffic enters the computer. Differences between ESM and application-layer firewalls and filter drivers are illustrated in Figure 1-2, “Effectiveness of an NDIS-Layer Firewall,” on page Effectiveness of an NDIS-Layer Firewall Figure 1-2 Security decisions and system performance are optimized when security implementations operate at the lowest appropriate layer of the protocol stack.
Endpoint Security Client 3.5 Overview ® The ZENworks Security Client secures computers from data invasion attacks at home, at work, and while traveling, through the enforcement of security policies created by the enterprise Endpoint Security Management (ESM) administrator. The firewall settings assigned at individual locations are automatically adjusted when laptop users move from the corporate network to their home networks or go on the road and log on to a public or open network.
At what level the user is permitted to use removable storage devices (such as thumb drives and memory cards) and to use CD/DVD-RW drives Any network environments that can help to define the location Firewall Settings: Firewall settings control the connectivity of all networking ports (1-65535), network packets (ICMP, ARP, etc.), network addresses (IP or MAC), and which network applications (file sharing, instant messenger software, etc.) are permitted to get a network connection when the setting is applied.
Page 13
Endpoint Security Client 3.5 Login Figure 2-2 Enter your username and password for the domain, then click OK. NOTE: It is not necessary to log in to the Endpoint Security Client 3.5 when the Endpoint Security Client is running as Unmanaged. The ESM Administrator has a different method to deliver policies to unmanaged users.
Page 14
ZENworks Endpoint Security Client 3.5 User Guide...
Using the Endpoint Security Client The following sections contain additional information about actions that you can perform using the ® ® Novell ZENworks Endpoint Security end-user application, the Endpoint Security Client 3.5: Section 3.1, “Moving Among Network Environments,” on page 15 Section 3.2, “Changing Locations,”...
Update Policy = Permitted Default Firewall settings = All Adaptive The three adapter types, Wi-Fi, Wired, and Dialup are permitted in the Unknown location. This allows the computer to interface peripherally with its network environment, and attempt to associate a location policy as described above. 3.2 Changing Locations At startup, the Endpoint Security Client 3.5 switches to the Unknown location.
If this network environment was saved at a previous location, the Endpoint Security Client 3.5 asks if the user wants to save the new location. Select Yes to save the environment to the current location and clear the environment from its prior location, or select No to leave the environment in the prior location.
2 Specify any necessary security information (WEP or other security key), then click Connect. 3 Complete the steps outlined in Section 3.2.1, “Saving a Network Environment,” on page 16 save this environment. 3.2.3 Removing a Saved Environment To remove a saved network environment from a location: 1 Right-click the Endpoint Security Client icon in the taskbar to display the menu.
2 Mouse over the current location to display the submenu, then click the selection to change the firewall setting. NOTE: The number of firewall settings available in a location is determined by policy. 3.4 Data Encryption When activated by policy, the Endpoint Security Client 3.5 manages the encryption of files placed in a specific directory on the endpoint and placed in removable storage devices.
Page 20
“What If I Don’t Want the Device Encrypted?” on page 20 “Password Encrypting Files” on page 21 “Changing the Password to Files in the Password Encrypted Files Folder” on page 21 “Using the File Decryption Utility” on page 22 Encrypting Files To encrypt added files on a removable storage device: 1 Plug the storage device into the appropriate port on your computer.
Page 21
Encryption Warning when a New Device is Inserted Figure 3-1 To prevent encryption, remove the drive before clicking Continue. Click Continue to either encrypt the drive or to close the window after removing the device. Password Encrypting Files Your administrator can enable the Security client to create a Password Encrypted Files folder on any removable device that connects to your computer.
Page 22
3 Select Encryption from the menu. 4 Click Clear Password. 5 Drag a file to the Password Encrypted Files folder and enter the new password and hint. All new files added to the folder now require the new password for access. Using the File Decryption Utility To use the File Decryption utility: 1 Plug the storage device into the appropriate port on your computer.
3.5 Updating Policies New security policies are released to managed users as they are published. The Endpoint Security Client automatically receives updates at intervals determined by the ESM administrator. However, the managed user can check for policy updates when entering a new location. 1 Right-click the Endpoint Security Client icon in the taskbar to display the menu.
Page 24
The Endpoint Security Client 3.5 is equipped with a Password Override feature that temporarily disables the current security policy to permit the necessary activity. The Security Administrator distributes a single-use password key only when needed, and should be informed of any problems with a security policy.
3.8 Diagnostics Novell provides diagnostics tools to allow the administrator to troubleshoot Endpoint Security Client 3.5 issues. Your ZENworks Endpoint Security administrator will guide you through the diagnostics process. Using the Endpoint Security Client 3.5...
Page 26
ZENworks Endpoint Security Client 3.5 User Guide...
Need help?
Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT and is the answer not in the manual?
Questions and answers