Configuring Secure Desktop General For A Location - Cisco 5520 - ASA IPS Edition Bundle Configuration Manual

Asa 5500 series adaptive security appliance
Hide thumbs Also See for 5520 - ASA IPS Edition Bundle:
Table of Contents

Advertisement

Chapter 5
Setting Up CSD for Microsoft Windows Clients
Click Apply All to save the running CSD configuration.
Note

Configuring Secure Desktop General for a Location

Click Secure Desktop General under the location name to enable or disable the Secure Desktop features
and customize the user experience.
The Secure Desktop General pane appears.
Figure 5-12
Check the following attributes to configure the Secure Desktop General settings for the location you are
configuring, as required by your security policy:
OL-8607-02
Secure Delete—CSD encrypts and writes the cache to the remote client's disk. Upon termination of
the Secure Desktop, CSD converts all bits occupied by the cache to all 0's, then to all 1's, and then
to randomized 0's and 1's. Choose the number of times for CSD to perform this cleanup task. The
default setting, 1 pass, meets the US Department of Defense (DoD) standard for securely deleting
files. Following the completion of the task the number of times specified, CSD removes the pointer
to the file (that is, performs a "Windows-delete").
Secure Desktop General
Automatically switch to Secure Desktop after installation—Check to set the Secure Desktop to load
automatically after installation. This option forces users into the Secure Desktop.
Enable switching between Secure Desktop and Local Desktop—We strongly recommend that you
check this attribute to let users switch between Secure Desktop and the untrusted desktop. Called
desktop switching, this feature provides users with the flexibility they might need to respond to a
prompt from another application requiring an OK to let CSD continue processing. (The Cisco
Secure Tunneling Client is not one of those applications; it is accessible on both the local desktop
and the CSD.) Unchecking this attribute minimizes the potential security risk posed by a user who
leaves traces on the untrusted desktop. Thus, you might choose to uncheck this option if the security
Configuring the Secure Desktop for Clients that Match Location Criteria
Figure 5-12
shows the default settings.
Cisco Secure Desktop Configuration Guide
5-23

Advertisement

Table of Contents
loading

This manual is also suitable for:

Cisco secure desktop

Table of Contents