Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 Manual page 187

Configuring infranet controllers guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
NOTE: This feature is primarily provided for backwards compatibility. We
recommend that you use integrity measurement collectors (IMCs) and
integrity measurement verifiers (IMVs) instead.
To enable a customized server-side Host Checker policy:
In the NSM navigation tree, select Device Manager > Devices.
1.
Click the Device Tree tab, and then double-click the Infranet Controller for which you
2.
want to enable a customized server-side Host Checker policy.
Click the Configuration tab. In the configuration tree, select Authentication > Endpoint
3.
Security > Host Checker > Settings.
Under Policies, create a new policy and select 3rd Party Policy.
4.
Add or modify settings as specified in Table 53 on page 169.
5.
Click one:
6.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 53: Customized Server-Side Policies Configuration Details
Option
Package
File Name
Enable Custom Instructions
Remediate
Kill Processes
Chapter 15: Configuring Host Checker Policies
Function
Your Action
Specifies the 3rd party
Select the package from the
policy package.
drop-down or browse for the package
using the browse (+) button.
Specifies the filename.
Enter a filename.
Specifies that custom
Select this option and enter the
instructions can be
custom instructions you want to
displayed to the user on
display to the user on the Host
the Host Checker
Checker remediation page. You can
remediation page.
use the following HTML tags to
format text and add links to resources
such as policy servers or Web sites:
<i>, <b>, <br>, <font>, and <a href>.
Specifies that remediation
Select this option.
actions are enabled.
Specifies the processes
Select this option and on each line
you want to kill if the user's
enter the name of one or more
computer does not meet
processes you want to kill.
the policy requirements.
NOTE: You cannot use wildcards in
You can include an
the process name.
optional MD5 checksum
for the process.
169

Advertisement

Table of Contents
loading

Table of Contents