Logging In To The Endpoint Security Client 4.0 - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 4.0 - 03-31-2009 Manual

Table of Contents

Advertisement

Firewall Settings: Firewall settings control the connectivity of all networking ports (1-65535),
network packets (ICMP, ARP, etc.), network addresses (IP or MAC), and which network
applications (file sharing, instant messenger software, etc.) are permitted to get a network
connection when the setting is applied. Three firewall settings are included as defaults for ESM, and
can be implemented at a location. The ESM Administrator can also create specific firewall settings,
which cannot be listed here.
All Adaptive: This firewall setting sets all networking ports as stateful (all unsolicited inbound
network traffic is blocked; all outbound network traffic is allowed). ARP and 802.1x packets
are permitted, and all network applications are permitted a network connection.
All Open: This firewall setting sets all networking ports as open (all network traffic is
allowed). All packet types are permitted. All network applications are permitted a network
connection.
All Closed: This firewall setting closes all networking ports, and restricts all packet types.
Adapters: Refers to three communication adapters normally found on an endpoint:
Wired Adapters (LAN connections)
Wi-Fi Adapters (PCMCIA Wi-Fi cards, and built-in Wi-Fi radios)
Also refers to other communication hardware that might be included on a computer, such as
infrared, Bluetooth*, FireWire*, and serial and parallel ports.
Storage Devices: Refers to external storage devices that can pose a security threat when data is
copied to, or introduced from, these devices on an endpoint. USB thumb drives, flash memory cards,
and SCSI PCMCIA memory cards, along with traditional Zip*, floppy, and external CDR drives and
the installed CD/DVD drives (including CD-ROM, CD-R/RW, DVD, DVD R/RW), can all be
blocked, permitted, or rendered to Read-Only at a single location.
Network Environments: A network environment is the collection of network services and service
addresses required to identify a network location.

2.2 Logging In to the Endpoint Security Client 4.0

If you are a member of the corporate Active Directory domain, the Endpoint Security Client 4.0 uses
your Windows* username and password to log you in to the Policy Distribution Service (no pop-up
window displays). If you are member of a Novell eDirectory tree, the Endpoint Security Client 4.0
prompts you for your username and password for the tree (see
NOTE: With Novell eDirectory, the user receives a pop-up login window once after the Endpoint
Security Client 4.0 installs. This allows you to provide your username and password for the tree.
If you are not a member of the domain that the Policy Distribution Service is hosted on, the
Endpoint Security Client 4.0 prompts you for your username and password for that domain (see
Figure
2-2).
12
ZENworks Endpoint Security Client 4.0 User Guide
Figure
2-2).

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zenworks endpoint security client 4.0

Table of Contents