Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 157

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 33: Configuring File Rewriting Resource Policies Details (continued)
Option
Read-only
Windows ACL > Detailed Rules tab
Action
Read-only
Windows SSO > General tab
Chapter 10: Configuring Secure Access Resource Policies
Function
Prevents users from saving
files on the server.
NOTE: This box displays only
if you select Allow in the
Action drop-down list.
Specifies the action to perform
if the user request matches a
resource in the Resources list.
Prevents users from saving
files on the server.
NOTE: This box is enabled
only when you select Allow
from the Action drop-down
list.
Your Action
Select the Read-only check
box to enable this feature.
Select one of the following
options from the drop-down
list:
Allow—Allows the user
access to the resource.
Deny—Denies the user
access to the resource.
Select the Read-only check
box to enable this feature.
139

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents