Configuring Advanced Endpoint Defense Policy (Nsm Procedure); Configuring New Client-Side Policies (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 Manual

Configuring infranet controllers guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01:
Table of Contents

Advertisement

Configuring Advanced Endpoint Defense Policy (NSM Procedure)

Related
Documentation

Configuring New Client-Side Policies (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
Host Checker includes integrated antispyware functionality that can detect and remediate
Windows endpoints with spyware and keyloggers. Advanced endpoint defense (AED)
ensures that malware, spyware, viruses or worms are not present on endpoints that
attempt to connect to the Infranet Controller, and you can restrict or quarantine these
endpoints depending on your Host Checker policy configuration.
AED antispyware functionality is available on Windows platforms (including Vista) with
Odyssey Access Client or with the agentless Host Checker component.
To enable and use AED antispyware:
In the NSM navigation tree, select Device Manager > Devices.
1.
Click the Device Tree tab, and then double-click the Infranet Controller for which you
2.
want to configure an AED policy.
Click the Configuration tab. In the configuration tree, select Authentication > Endpoint
3.
Security > Host Checker.
Under Policies, click the Add button.
4.
Enter a policy name and select Advanced Endpoint Defense Policy.
5.
From the Policy Info tab, select Enable Signature definitions check.
6.
In the Check that Signature definitions are update in (days) box, enter the frequency
7.
in days of the signature definitions database update.
Click one:
8.
OK—Saves the changes.
Cancel—Cancels the modifications.
When you create or configure realm or role Host Checker restrictions, you can select the
AED policy to apply to that role or realm.
Configuring New Client-Side Policies (NSM Procedure) on page 157
Configuring Infranet Controller Host Checker Access Restrictions (NSM Procedure) on
page 67
Creating Infranet Controller Global Host Checker Policies Overview on page 155
You can create a variety of policies through the Host Checker client that check for antivirus
software, firewalls, malware, spyware, and specific operating systems from a wide variety
of industry leaders. You can also create Host Checker policies that use third-party integrity
measurement verifiers (IMVs) and third-party DLLs, or check for ports, processes, files,
registry keys, and the NetBIOS name, MAC addresses, or certificate of the client machine.
Chapter 15: Configuring Host Checker Policies
157

Advertisement

Table of Contents
loading

Table of Contents