Sign In
Upload
Manuals
Brands
NOVELL Manuals
Software
ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5
NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 Manuals
Manuals and User Guides for NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5. We have
3
NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 manuals available for free PDF download: Administration Manual, Installation Manual, Manual
NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 Administration Manual (208 pages)
Brand:
NOVELL
| Category:
Software
| Size: 5 MB
Table of Contents
Table of Contents
5
About this Guide
9
1 Zenworks Endpoint Security Management
11
Zenworks Endpoint Security Management Overview
12
System Requirements
13
Asp.net
14
Reliable Time Stamp
14
About the Zenworks Endpoint Security Management Manuals
14
Usb/Wireless Security
14
2 Policy Distribution Service
17
About the Policy Distribution Service
17
Server Selection and Installation
18
Server Maintenance
18
Upgrading the Software
18
Uninstall
18
Securing Server Access
18
Physical Access Control
18
Network Access Control
19
High Availability
19
Running the Service
19
3 Configuring the Directory Service
21
Configuring the Directory Service for Novell Edirectory
21
Configuring the Directory Service for Microsoft Active Directory
28
4 Using the Zenworks Endpoint Security Management Service
37
About the Management Service
37
Server Selection and Installation
37
Server Maintenance
38
Upgrading the Software
38
Uninstall
38
Securing Server Access
38
Physical Access Control
38
Network Access Control
39
High Availability
39
Running the Service
39
Distributing and Renewing Zenworks Endpoint Security Management Credentials
39
Distributing Endpoint Security Management Credentials (Key Management Key)
39
Periodic Renewal of the Key Management Key (KMK)
40
5 Using the Zenworks Storage
41
5 Using the Zenworks Storage Encryption Solution Management Console
41
Using the Console Taskbar
41
Section 5.1, "Using the Console Taskbar
41
Policy Tasks
42
Resources
43
Configuration
43
Endpoint Auditing
43
Using the Console Menu Bar
43
Section 5.2, "Using the Console Menu Bar
43
Using the Configuration Window
44
Infrastructure and Scheduling
44
Section 5.3, "Using the Configuration Window
44
Authenticating Directories
46
Service Synchronization
47
Using Alerts Monitoring
47
Section 5.4, "Using Alerts Monitoring
47
Configuring Endpoint Security Management for Alerts
48
Configuring Alert Triggers
49
Managing Alerts
50
Using Reports
51
Using the Reports Tools
51
Section 5.5, "Using Reports
51
Adherence Reports
53
Alert Drill-Down Reports
55
Application Control Reports
56
Endpoint Activity Reports
56
Encryption Solutions Reports
57
Client Self Defense Reports
57
Integrity Enforcement Reports
57
Location Reports
58
Outbound Content Compliance Reports
58
Administrative Overrides Reports
59
Endpoint Updates Reports
59
USB Devices Reports
60
Wireless Enforcement Reports
60
Generating Custom Reports
60
Section 5.6, "Generating Custom Reports
60
Software Requirements
61
Creating a Zenworks Endpoint Security Management Compliant Report
61
Available Reporting Information
62
Creating a Report
65
Using the Zenworks Storage Encryption Solution
71
Understanding the Zenworks Storage Encryption Solution
71
Sharing Encrypted Files
71
Section 5.7, "Using the Zenworks Storage Encryption Solution
71
Managing Keys
72
Section 5.8, "Managing Keys
72
Exporting Encryption Keys
73
Importing Encryption Keys
74
Generating a New Key
74
6 Creating and Distributing Security Policies
75
Navigating the Management Console UI
75
Using the Policy Tabs and Tree
76
Using the Policy Toolbar
78
Creating Security Policies
79
Global Policy Settings
80
Locations
98
Integrity and Remediation Rules
109
Compliance Reporting
118
Publishing Security Policies
121
Managing Policies
122
Show Usage
122
Error Notification
122
Custom User Messages
123
Hyperlinks
124
Defined Location Settings
125
Network Environments
126
Firewall Settings
128
TCP/UDP Ports
130
Access Control Lists
134
Application Controls
136
Rule Scripting Parameters
138
Importing and Exporting Policies
169
Importing Policies
169
Exporting a Policy
169
Exporting Policies to Unmanaged Users
169
Sample Scripts
170
Create Registry Shortcut (VB Script)
170
Allow Only One Connection Type (Jscript)
172
Stamp Once Script
173
7 Managing the Endpoint Security
175
7 Managing the Endpoint Security Client
175
Understanding the Endpoint Security Client
175
Section 7.1, "Understanding the Endpoint Security Client
175
Installing and Uninstalling the Zenworks Security Agent
176
Installing the Endpoint Security Client 3.5
176
Uninstalling the Endpoint Security Client 3.5
176
Section 7.2, "Installing and Uninstalling the Zenworks Security Agent
176
Understanding Client Self Defense
177
Section 7.3, "Understanding Client Self Defense
177
Upgrading the Endpoint Security Client 3.5
178
Setting the Upgrade Switch
178
Running the Endpoint Security Client 3.5
178
The Following Sections Contain more Information
178
Section 7.4, "Upgrading the Endpoint Security Client
178
Section 7.5, "Running the Endpoint Security Client
178
Multiple User Support
179
Machine-Based Policies (Active Directory Only)
179
Distributing Unmanaged Policies
179
Using the Endpoint Security Client Diagnostics Tools
180
Creating a Diagnostics Package
180
Section 7.6, "Using the Endpoint Security Client Diagnostics Tools
180
Administrator Views
182
Logging
186
Reporting
187
8 Managing the Endpoint Security Client
191
Understanding the Endpoint Security Client
191
Launches Nominated Applications in Policy-Defined Situations
191
Completely Configurable by the Endpoint Security Management Administrator. for Endpoint
191
Zenworks Endpoint Security Client 3.5 User Guide
191
Zenworks Endpoint Security Client 4.0 User Guide
191
Section 8.1, "Understanding the Endpoint Security Client
191
Installing and Uninstalling the Zenworks Security Agent
192
Installing the Endpoint Security Client 4.0
192
Uninstalling the Endpoint Security Client 4.0
192
The Following Sections Contain more Information
192
Section 8.2, "Installing and Uninstalling the Zenworks Security Agent
192
Running the Endpoint Security Client 4.0
193
Section 8.3, "Running the Endpoint Security Client
193
Zenworks Endpoint Security Client 3.5 User Guide
193
Zenworks Endpoint Security Client 4.0 User Guide
193
Multiple User Support
194
Machine-Based Policies (Active Directory Only)
194
Distributing Unmanaged Policies
195
Using the Endpoint Security Client Diagnostics Tools
195
Creating a Diagnostics Package
195
Section 8.4, "Using the Endpoint Security Client Diagnostics Tools
195
Administrator Views
197
Module List
200
Logging
201
9 Using Zenworks Endpoint Security Management Utilities
203
Using the Zenworks File Decryption Utility
203
Using the File Decryption Utility
203
Using the Administrator Configured Decryption Utility
204
Using the Override-Password Key Generator
204
Advertisement
NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 Installation Manual (76 pages)
Brand:
NOVELL
| Category:
Software
| Size: 2 MB
Table of Contents
Table of Contents
5
About this Guide
7
1 Zenworks Endpoint Security Management Overview
9
Chapter 1, "Zenworks Endpoint Security Management Overview
9
System Requirements
10
About the Zenworks Endpoint Security Management Manuals
11
2 Installing Zenworks Endpoint Security Management
13
Pre-Installation Information
13
Installation Packages
13
About the Master Installer Program
13
Chapter 2, "Installing Zenworks Endpoint Security Management
13
Installation Options
14
Installation Order
14
Before Installing Zenworks Endpoint Security Management
14
Chapter 3, "Performing a Single-Server Installation," on
18
Chapter 5, "Performing the Policy Distribution Service Installation," on
18
Chapter 6, "Performing the Management Service Installation," on
18
Chapter 7, "Performing the Management Console Installation," on
18
Chapter 8, "Endpoint Security Client 3.5 Installation," on
18
3 Performing a Single-Server Installation
19
Installation Steps
20
Starting the Service
21
4 Performing a Multi-Server Installation
23
Chapter 4, "Performing a Multi-Server Installation
23
5 Performing the Policy Distribution Service Installation
25
Installation Steps
26
Typical Installation
27
Custom Installation
29
Starting the Service
32
6 Performing the Management Service Installation
33
Installation Steps
34
Typical Installation
35
Custom Installation
39
Starting the Service
43
7 Performing the Management Console Installation
45
Installation Steps
45
Typical Installation
46
Custom Installation
46
Starting the Console
49
Adding Edirectory Services
49
Configuring the Management Console's Permissions Settings
50
Publishing a Policy
54
8 Endpoint Security Client 3.5 Installation
55
Basic Endpoint Security Client 3.5 Installation
55
MSI Installation
57
Command-Line Variables
60
Distributing a Policy with the MSI Package
61
User Installation of the Endpoint Security Client 3.5 from MSI
62
Running the Endpoint Security Client 3.5
62
9 Endpoint Security Client 4.0 Installation
63
Basic Endpoint Security Client 4.0 Installation
63
Chapter 9, "Endpoint Security Client 4.0 Installation
63
MSI Installation
66
Using the Master Installer
66
Using the Setup.exe File
66
Completing the Installation
67
Command Line Variables
68
Distributing a Policy with the MSI Package
69
Running the Endpoint Security Client 4.0
70
Features Not Supported in the Endpoint Security Client 4.0
70
10 Zenworks Endpoint Security Management Unmanaged Installation
71
Unmanaged Endpoint Security Client Installation
71
Stand-Alone Management Console
71
Chapter 10, "Zenworks Endpoint Security Management Unmanaged Installation
71
Distributing Unmanaged Policies
72
11 Upgrading
73
A Documentation Updates
75
July 31, 2009
75
January 5, 2009
75
A.2 January 5, 2009
75
NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 Manual (26 pages)
Brand:
NOVELL
| Category:
Software
| Size: 0 MB
Table of Contents
Table of Contents
5
About this Guide
7
1 Introduction
9
Security Enforcement for Mobile Computers
9
NDIS Layer Firewall Protection
9
2 Endpoint Security Client 3.5 Overview
11
ESM Terminology
11
Logging in to the Endpoint Security Client 3.5
12
3 Using the Endpoint Security Client
15
Moving Among Network Environments
15
Section 3.1, "Moving Among Network Environments
15
Changing Locations
16
Saving a Network Environment
16
Section 3.2, "Changing Locations
16
Saving a Wi-Fi Environment
17
Removing a Saved Environment
18
Changing Firewall Settings
18
Section 3.3, "Changing Firewall Settings
18
Data Encryption
19
Managing Files on Fixed Disks
19
Managing Files on Removable Storage
19
Section 3.4, "Data Encryption
19
Overriding a Password
23
Section 3.5, "Updating Policies
23
Section 3.6, "Viewing Help
23
Section 3.7, "Overriding a Password
23
Updating Policies
23
Viewing Help
23
Diagnostics
25
Section 3.8, "Diagnostics
25
Advertisement
Advertisement
Related Products
NOVELL POLICY IN DESIGNER 3.5 - 09-18-2009
NOVELL ACCESS MANAGER 3.1 SP2 BETA 1 - SCENARIOS 2009
NOVELL CLIENT LOGIN EXTENSION 3.7 - ADMINISTRATION
NOVELL IDENTITY ASSURANCE SOLUTION 3.0.2 - ADMINISTRATION
NOVELL IDENTITY MANAGER 3.6.1 - STAGING BEST PRACTICES GUIDE 2010
NOVELL IDENTITY MANAGER 3.6.1 - NULL SERVICE AND LOOPBACK SERVICE DRIVERS
NOVELL IFOLDER 3 - ADMINISTRATION
NOVELL IFOLDER 3.8 - CROSS-PLATFORM
NOVELL POLICIES IN IMANAGER 3.6.1 - 06-05-2009
NOVELL ACCESS MANAGER 3.1 SP1 - IDENTITY SERVER
NOVELL Categories
Software
Server
Desktop
Printer
Recording Equipment
More NOVELL Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL