Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 257

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Table 65: Configuring Host Checker Third-Party Applications Using
Predefined Rules Details (continued)
Option
Require specific products
Monitor this rule for change
in result
Selected Vendors tab
Selected Vendors
Specific Products Selected tab
Specific Products Selected
Selected Products
Product name
Predefined OS Checks Rules
Rule Name
OS Selections
Configuring the Remote Integrity Measurement Verifier Server (NSM Procedure) on
page 240
Configuring Host Checker Customized Requirements Using Custom Rules (NSM
Procedure) on page 241
Configuring General Host Checker Remediation (NSM Procedure) on page 233
Chapter 15: Configuring Secure Access Host Checker Policies
Function
Specifies specific
products/vendors, and
defines compliance by
allowing any product by a
specific vendor (for
example, any Symantec
product).
Continuously monitors the
policy compliance of
endpoints.
Allows you to select the
vendors.
Allows you to select
specific products.
Allows you to select the
product.
Specifies the name for the
OS Checks rule.
Specifies the operating
systems.
Your Action
Select the Require specific
products option to enable this
feature.
Select the Monitor this rule for
change in result option to enable
this feature.
Select the vendor, and then click
Add to move the vendor from the
Non-members to the Members list.
Select the product, and then click
Add to move the product from the
Non-members to the Members list.
Select the product from the
Product name drop-down list.
Enter the name.
Select the operating system, and
then click Add to move from the
Non-members to the members list.
239

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents