About This Guide - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION Administration Manual

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION:
Table of Contents

Advertisement

About This Guide

®
This Novell
ZENworks
ZENworks Endpoint Security Management Administrators who are required to manage the
Endpoint Security Management services, create security policies for the enterprise, generate and
analyze reporting data, and provide troubleshooting for end users. Instructions for completing these
tasks are provided in this manual.
The information in this guide is organized as follows:
Chapter 1, "ZENworks Endpoint Security Management," on page 11
Chapter 2, "Policy Distribution Service," on page 17
Chapter 3, "Configuring the Directory Service," on page 21
Chapter 4, "Using the ZENworks Endpoint Security Management Service," on page 37
Chapter 5, "Using the ZENworks Storage Encryption Solution Management Console," on
page 41
Chapter 6, "Creating and Distributing Security Policies," on page 75
Chapter 7, "Managing the Endpoint Security Client 3.5," on page 175
Chapter 8, "Managing the Endpoint Security Client 4.0," on page 191
Chapter 9, "Using ZENworks Endpoint Security Management Utilities," on page 203
Appendix A, "Acronym Glossary," on page 207
Audience
This guide is written for the ZENworks Endpoint Security Management administrators.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation, or go to the
documentation/feedback.html)
Additional Documentation
ZENworks Endpoint Security Management is supported by other documentation (in both PDF and
HTML formats) that you can use to learn about and implement the product. For additional
documentation, see the
ZENworks Endpoint Security Management 3.5 documentation Web site
(http://www.novell.com/documentation/zesm35).
Documentation Conventions
In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and
items in a cross-reference path.
®
A trademark symbol (
,
trademark.
®
Endpoint Security Management Administration Guide is written for
Novell Documentation Feedback site (http://www.novell.com/
and enter your comments there.
, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party
TM
About This Guide
9

Advertisement

Table of Contents
loading

Table of Contents