Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT Manual page 10

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT:
Table of Contents

Advertisement

providing security protection from the moment traffic enters the computer. Differences between
ESM and application-layer firewalls and filter drivers are illustrated in
Figure 1-2, "Effectiveness of
an NDIS-Layer Firewall," on page
10.
Effectiveness of an NDIS-Layer Firewall
Figure 1-2
Security decisions and system performance are optimized when security implementations operate at
the lowest appropriate layer of the protocol stack. With the Endpoint Security Client 3.5, unsolicited
traffic is dropped at the lowest levels of the NDIS driver stack by means of Adaptive Port Blocking
(stateful packet inspection) technology. This approach protects against protocol-based attacks,
including unauthorized port scans, SYN Flood attacks, and others.
It is recommended that you follow all operation and maintenance recommendations in this
document, in order to ensure that the endpoint security environment is protected.
10
ZENworks Endpoint Security Client 3.5 User Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT and is the answer not in the manual?

Questions and answers

Table of Contents