Configuring Virus Signature Version Monitoring (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide

Configuring Virus Signature Version Monitoring (NSM Procedure)

Table 68: Configuring Virus Signature Version Monitoring Details
Options
Download path
Download interval
Username
248
You can configure Host Checker to monitor and verify that the virus signatures, operating
systems, software versions, and patches installed on client computers are up to date,
and remediate those endpoints that do not meet the specified criteria. Host Checker
uses the current virus signatures and patch assessment versions from the vendor(s) you
specify for predefined rules in a Host Checker policy.
You can automatically import either the current Virus signature version monitoring or
Patch Management Info Monitoring list from the Juniper Networks staging site at a
specified interval. Alternatively, you can download the files from Juniper Networks and
use your own staging server.
You can also configure a proxy server as a staging site between the device and the Juniper
Networks site. To use a proxy server, you must enter the servers network address, and
port and authentication credentials, if applicable.
To configure the device to automatically import the current virus signature version
monitoring:
In the navigation tree, select Device Manager > Devices. Click the Device Tree tab,
1.
and then double-click the Secure Access device for which you want to configure the
device to automatically import the current signature version monitoring.
Click the Configuration tab and select Authentication > Endpoint Security > Host
2.
Checker.
Click either Virus signature version monitoring or Patch Management Info Monitoring.
3.
Select either Auto-update virus signatures list or Auto-update Patch Management
4.
data.
Configure the device to automatically import the current signature version monitoring
5.
using the settings described in Table 68 on page 248.
Click one:
6.
OK—Saves the changes.
Cancel—Cancels the modifications.
Your Action
Specifies the existing URLs of the staging sites where the current lists are stored. The default
URLs are the paths to the Juniper Networks staging site:
https://download.juniper.net/software/av/uac/epupdate_hist.xml (for auto-update virus
signatures list).
Specifies how often you want the device to automatically import the current list(s).
Enter your Juniper Networks Support username.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager

Table of Contents