Configuring General Host Checker Remediation (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring General Host Checker Remediation (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
You can specify general remediation actions that you want the Host Checker to take if
an endpoint does not meet the requirements of a policy. For example, you can display a
remediation page to the user that contains specific instructions and links to resources
to help the user bring their endpoint into compliance with Host Checker policy
requirements.
To configure general Host Checker remediation:
In the navigation tree, select Device Manager > Devices. Click the Device Tree tab,
1.
and then double-click the Secure Access device for which you want to configure
general Host Checker remediation.
Click the Configuration tab. Select system >Authentication > Endpoint Security.
2.
In the Endpoint Security screen, select Settings > Policies and click the Add icon.
3.
Create new client–side policies and enable customized server-side policies.
4.
Click the tab that corresponds to the operating system for which you want to specify
5.
Host Checker options—Windows, Mac, Linux, Solaris, or Windows Mobile.
Add or modify settings as specified in Table 64 on page 233 to specify the remediation
6.
actions that you want Host Checker to perform if a user's computer does not meet
the requirements of the current policy.
Click one:
7.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 64: Configuring General Host Checker Remediation Details
Option
Function
Remediation tab
Enable
Specifies the instructions you want to
Custom
display to the user on the Host Checker
Instructions
remediation page.
Enable
Allows you to select one or more alternate
Custom
policies that you want Host Checker to
Actions
evaluate if the user's computer does not
meet the current policy requirements. The
alternate policy must be either a third-party
policy that uses a J.E.D.I. package or a
Secure Virtual Workspace policy.
Chapter 15: Configuring Secure Access Host Checker Policies
Your Action
Select the Enable Custom
Instructions option to enable this
feature, and than enter the
instructions.
NOTE: You can use the following
HTML tags to format text and add
links to resources such as policy
servers or web sites: <i>, <b>, <br>,
<font>, and <a href>.
Select the
option to enable this feature, and
then select the alternate policy and
click Add to move from the
Non-members to the Members list.
Enable Custom Actions
233

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents