Managing The Endpoint Security Client; Understanding The Endpoint Security Client; Launches Nominated Applications In Policy-Defined Situations; Completely Configurable By The Endpoint Security Management Administrator. For Endpoint - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION Administration Manual

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION:
Table of Contents

Advertisement

Managing the Endpoint Security
8
Client 4.0
®
®
Novell
ZENworks
Endpoint Security Management uses the Endpoint Security Client, installed
on each endpoint device, to enforce complete security. There are two versions: Endpoint Security
Client 3.5 and Endpoint Security Client 4.0.
The Endpoint Security Client 3.5 is installed on Windows XP and Windows 2000 enterprise
computers. The Novell ZENworks Endpoint Security Client 4.0 is a client release to support
Microsoft Windows Vista with Support Pack 1 running in 32-bit mode. Both Endpoint Security
Clients use the ZENworks Endpoint Security Management 3.5 Server and Management Console.
This section discusses managing Endpoint Security Client 4.0. For managing Endpoint Security
Client 3.5, see
Chapter 7, "Managing the Endpoint Security Client 3.5," on page

8.1 Understanding the Endpoint Security Client

The Endpoint Security Client protects client data by determining, in real-time, the network location
of the endpoint. Based on that location, the Endpoint Security Client does the following:
Implements policy-based filtering for all incoming and outgoing network traffic.
Implements policy-based control over hardware use (such as WLAN network adapters' ad hoc
connections).
Launches nominated applications in policy-defined situations (for example, if a policy is set to
require a VPN program in order to access the network, that program is launched).
If the network environment is not recognized, the Endpoint Security Client sets the location to a
default Unknown location, and applies the Unknown security policy. Security policies are

completely configurable by the Endpoint Security Management Administrator. For Endpoint

Security Client operating instructions, see the
and
All Endpoint Security Client security functionality is determined by the security policy.

Managing the Endpoint Security Client 4.0

175.
8
191

Advertisement

Table of Contents
loading

Table of Contents