Endpoint Security Client 3.5 Overview; Esm Terminology - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT Manual

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT:
Table of Contents

Advertisement

Endpoint Security Client 3.5
2
Overview
®
The ZENworks
Security Client secures computers from data invasion attacks at home, at work,
and while traveling, through the enforcement of security policies created by the enterprise Endpoint
Security Management (ESM) administrator. The firewall settings assigned at individual locations
are automatically adjusted when laptop users move from the corporate network to their home
networks or go on the road and log on to a public or open network.
Security levels are applied to various user locations without requiring user expertise or
understanding of network security, port configurations, hidden shared files, or other technical
details. Immediate information on which location and firewall setting the Endpoint Security Client
3.5 is in and which adapters are presently active or permitted is available by simply mousing over
the taskbar icon to view the Endpoint Security Client ToolTip (see
Endpoint Security Client ToolTip
Figure 2-1
The following sections contain additional information:
Section 2.1, "ESM Terminology," on page 11
Section 2.2, "Logging In to the Endpoint Security Client 3.5," on page 12

2.1 ESM Terminology

The following terms are frequently used in this documentation:
Locations: Locations are simple definitions that help users identify the network environment they
are in, provide immediate security settings (defined by the administrator), and permit the user to
save the network environment and change the applied firewall settings.
Each location is given unique security settings, denying access to certain network functionality and
hardware in more hostile network environments, and permitting broader access within trusted
environments. Locations define the following information:
How often the Endpoint Security Client 3.5 checks for a policy update in this location
The location management permissions granted to a user
The firewall settings that are used at this location
The communication hardware that is permitted to connect
How Wi-Fi connectivity and security is handled at this location
Figure
2-1).

Endpoint Security Client 3.5 Overview

2
11

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ENDPOINT SECURITY CLIENT and is the answer not in the manual?

Questions and answers

Table of Contents