Using The Endpoint Security Client; Moving Among Network Environments; Section 3.1, "Moving Among Network Environments - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 4.0 - 03-31-2009 Manual

Table of Contents

Advertisement

Using the Endpoint Security Client

3
4.0
The following sections contain additional information about actions that you can perform using the
®
®
Novell
ZENworks
Endpoint Security end-user application, the Endpoint Security Client 4.0:
NOTE: The actions listed above can be restricted by the administrator at any location.

3.1 Moving Among Network Environments

Each network an end user travels to might require different security measures. The Endpoint
Security Client 4.0 provides security and protection in locations identified by available network
connections. The Endpoint Security Client 4.0 detects the network environment parameters and
switches to the appropriate location, applying the needed protection levels according to the current
security policy.
Network environment information is either stored or preset within a location. This allows the
Endpoint Security Client 4.0 to switch to a location automatically when the environment parameters
are detected.
Preset Environment: Defined by the enterprise ESM Administrator through a published
security policy.
When the user enters a new network environment, the client compares the detected network
environment to any stored and preset values in the security policy. If a match is found, the Endpoint
Security Client 4.0 activates the assigned location. When the detected environment cannot be
identified as a stored or preset environment, the client activates the default Unknown location.
The Unknown location has the following presets:
Change Locations = Permitted
Update Policy = Permitted
Default Firewall settings = All Open
By default, all adapter types (wired, Wi-Fi, and modem) are permitted in the Unknown location.
This allows the computer to interface peripherally with its network environment, and attempt to
associate a location policy as described above.
Using the Endpoint Security Client 4.0
3
15

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zenworks endpoint security client 4.0

Table of Contents