Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 Manual page 181

Configuring infranet controllers guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 51: Custom Rules Configuration Details (continued)
Rule
File Rule
Chapter 15: Configuring Host Checker Policies
Usage
Your Action
Ensures that certain files
1.
are present or not present
2. Enter the file name such as:
on the client machine
before the user can access
the Infranet Controller.
You may also use file
3. Select the Required option to
checks to evaluate the
age and content (through
MD5 checksums) of
4. Enter the minimum version of the
required files and allow or
deny access accordingly.
5. Enter the maximum age of files in
6. Enter the MD5 checksums value of
7. Select the Monitor this rule for
8. Click OK.
Enter the rule name.
c:\temp\bad-file.txt or
/temp/bad-file.txt.
specify that these ports are open
or closed.
file (optional). For example, if you
require notepad.exe to be present
on the client, you can enter 5.0 in
the box. Host Checker accepts
version 5.0 and later of
notepad.exe.
the File modified less than (days
ago) box.
each executable file to which you
want the policy to apply (optional).
change in result check box to
continuously monitor the policy
compliance of endpoints.
163

Advertisement

Table of Contents
loading

Table of Contents