Managing The Endpoint Security Client; Understanding The Endpoint Security Client; Section 7.1, "Understanding The Endpoint Security Client - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION Administration Manual

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION:
Table of Contents

Advertisement

Managing the Endpoint Security
7
Client 3.5
®
®
Novell
ZENworks
Endpoint Security Management uses the Endpoint Security Client, installed
on each endpoint device, to enforce complete security. There are two versions: Endpoint Security
Client 3.5 and Endpoint Security Client 4.0.
The Endpoint Security Client 3.5 is installed on Windows XP and Windows 2000 enterprise
computers. The Novell ZENworks Endpoint Security Client 4.0 is a client release to support
Microsoft Windows Vista with Support Pack 1 running in 32-bit mode. Both Endpoint Security
Clients use the ZENworks Endpoint Security Management 3.5 Server and Management Console.
This section discusses managing Endpoint Security Client 3.5. For managing Endpoint Security
Client 4.0, see
Chapter 8, "Managing the Endpoint Security Client 4.0," on page

7.1 Understanding the Endpoint Security Client

The Endpoint Security Client protects client data by determining in real-time the network location of
the endpoint. Based on that location, the Endpoint Security Client does the following:
Implements policy-based filtering of all incoming and outgoing traffic.
Implements policy-based control over hardware use (such as WLAN adaptor connections to
access points, removable media, and network adapters).
Validates anti-virus software status.
Collects security-centric statistics and event traps, and passes that information to centralized
servers for collation and analysis.
that in a certain location, a VPN program must be used to access the network, that program is
launched).
If the network environment is not recognized, the Endpoint Security Client sets the location to a
default Unknown location, and applies the Unknown security policy. Security policies are
Security Client operating instructions, see the
the
All Endpoint Security Client security functionality is determined by the security policy.
191.
or
7
175

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Table of Contents