Novell ZENworks Endpoint Security Management 3.5 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Obecný obslužný software Novell ZENworks Endpoint Security Management 3.5. Novell ZENworks Endpoint Security Management 3.5 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 245
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Endpoint Security Management

NovellZENworks®Endpoint Security Management3.5July 26, 2007 ADMINISTRATOR’S MANUAL

Strany 2

ZENworks® ESM 3.5 Administrator’s Manual 10ZENworks Endpoint Security ManagementNovell's ZENworks Endpoint Security Management (ESM) provides com

Strany 3 - Licenses

ZENworks® ESM 3.5 Administrator’s Manual 100ZSC UpdatePatches to repair any minor defects in the ZENworks Security Client are made available with regu

Strany 4 - Contents

ZENworks® ESM 3.5 Administrator’s Manual 101VPN EnforcementThis rule enforces the use of either an SSL or a client-based VPN (Virtual Private Network)

Strany 5

ZENworks® ESM 3.5 Administrator’s Manual 102Step 7: Enter the IP address(es) for the VPN Server in the provided field. If multiple addresses are enter

Strany 6 - List of Figures

ZENworks® ESM 3.5 Administrator’s Manual 103Advanced VPN SettingsAdvanced VPN controls are used to set Authentication Timeouts to secure against VPN f

Strany 7

ZENworks® ESM 3.5 Administrator’s Manual 104Note: VPN clients that generate virtual adapters (e.g., Cisco Systems VPN Client 4.0) will display the: &q

Strany 8

ZENworks® ESM 3.5 Administrator’s Manual 105LocationsLocations are rule-groups assigned to network environments. These environments can be set in the

Strany 9 - List of Tables

ZENworks® ESM 3.5 Administrator’s Manual 106Defined LocationsDefined locations may be created for the policy, or existing locations (those created for

Strany 10

ZENworks® ESM 3.5 Administrator’s Manual 107Location SettingsSetting the Location IconThe location icon provides a visual cue to the user which identi

Strany 11 - ESM Overview

ZENworks® ESM 3.5 Administrator’s Manual 108• Show Location in Client Menu - this setting allows the location to display in the cli-ent menu. If this

Strany 12 - System Requirements

ZENworks® ESM 3.5 Administrator’s Manual 109Location ComponentsThe firewall settings, Wi-Fi Connectivity Control, and network environment settings are

Strany 13 - USB/Wireless Security

ZENworks® ESM 3.5 Administrator’s Manual 11ESM OverviewESM consists of five high-level functional components: Policy Distribution Service, Management

Strany 14 - Policy Distribution Service

ZENworks® ESM 3.5 Administrator’s Manual 110Communication Hardware SettingsCommunication hardware controls by location which hardware types are permit

Strany 15 - Securing Server Access

ZENworks® ESM 3.5 Administrator’s Manual 111Enable allows complete access to the communication port.Disable denies all access to the communication por

Strany 16 - Running the Service

ZENworks® ESM 3.5 Administrator’s Manual 112Storage Device ControlThis control overrides the global setting at this location. To access this control,

Strany 17 - Management Service

ZENworks® ESM 3.5 Administrator’s Manual 113Network EnvironmentsIf the network parameters (Gateway server(s), DNS server(s), DHCP server(s), WINS serv

Strany 18

ZENworks® ESM 3.5 Administrator’s Manual 114Step 4: Enter the following information for each service: • The IP address(es) - Limited to 15 characters,

Strany 19

ZENworks® ESM 3.5 Administrator’s Manual 115Note: Changing the settings in a shared component will affect ALL OTHER instances of this same component.

Strany 20 - Management Console

ZENworks® ESM 3.5 Administrator’s Manual 116Wi-Fi ManagementWi-Fi management allows the administrator to create Access Point (AP) lists. The wireless

Strany 21

ZENworks® ESM 3.5 Administrator’s Manual 117Managed Access PointsESM provides a simple process to automatically distribute and apply Wired Equivalent

Strany 22 - Menu Bar

ZENworks® ESM 3.5 Administrator’s Manual 118Filtered Access PointsAccess points entered into the Filtered Access Points list are the ONLY APs which wi

Strany 23

ZENworks® ESM 3.5 Administrator’s Manual 119Wi-Fi Signal Strength SettingsWhen more than one WEP-managed access points (APs) are defined in the list,

Strany 24 - Permissions Settings

ZENworks® ESM 3.5 Administrator’s Manual 12System RequirementsASP.NETThe Policy Distribution, Management, and Client Location Assurance services requi

Strany 25 - Administrative Permissions

ZENworks® ESM 3.5 Administrator’s Manual 120Note: Although the above signal strength names match those used by Microsoft's Zero Configuration Ser

Strany 26

ZENworks® ESM 3.5 Administrator’s Manual 121Wi-Fi SecurityIf Wi-Fi Communication Hardware (Wi-Fi adapter PCMCIA or other cards, and/or built-in Wi-Fi

Strany 27 - Figure 8 : Publish To List

ZENworks® ESM 3.5 Administrator’s Manual 122Preference AP Selection by...A preference can be set to connect to APs by order of encryption level or by

Strany 28 - Configuration Window

ZENworks® ESM 3.5 Administrator’s Manual 123Firewall SettingsFirewall Settings control the connectivity of all networking ports, Access Control lists,

Strany 29 - Example:

ZENworks® ESM 3.5 Administrator’s Manual 124Additional ports and lists may be added to the firewall settings, and given unique behaviors which will ov

Strany 30

ZENworks® ESM 3.5 Administrator’s Manual 125TCP/UDP PortsEndpoint data is primarily secured by controlling TCP/UDP port activity. This feature allows

Strany 31

ZENworks® ESM 3.5 Administrator’s Manual 126• Open - All network inbound and outbound traffic is allowed. Because all net-work traffic is allowed your

Strany 32 - Service Synchronization

ZENworks® ESM 3.5 Administrator’s Manual 127Several TCP/UDP port groups have been bundled and are available at installation:Table 3: TCP/UDP PortsName

Strany 33 - Alerts Monitoring

ZENworks® ESM 3.5 Administrator’s Manual 128Access Control ListsThere may be some addresses which require unsolicited traffic be passed regardless of

Strany 34

ZENworks® ESM 3.5 Administrator’s Manual 129• IP - This type limits the address to 15 characters, and only containing the num-bers 0-9 and periods (ex

Strany 35 - Figure 14 : Alert Reporting

ZENworks® ESM 3.5 Administrator’s Manual 13About the ESM ManualsThe ZENworks Endpoint Security Management manuals provide three levels of guidance for

Strany 36 - Reporting

ZENworks® ESM 3.5 Administrator’s Manual 130Network Address Macros ListThe following is a list of special Access Control macros. These can be associat

Strany 37

ZENworks® ESM 3.5 Administrator’s Manual 131[Dns] Represents current client IP configuration Default DNS server address. When this value is entered, t

Strany 38 - Figure 20 : No data

ZENworks® ESM 3.5 Administrator’s Manual 132Application ControlsThis feature allows the administrator to block applications either from gaining networ

Strany 39

ZENworks® ESM 3.5 Administrator’s Manual 133• All Allowed - all applications listed will be permitted to execute and have net-work access • No Executi

Strany 40

ZENworks® ESM 3.5 Administrator’s Manual 134If the same application is added to two different application controls in the same firewall setting (i.e.,

Strany 41

ZENworks® ESM 3.5 Administrator’s Manual 135Integrity and Remediation RulesESM provides the ability to verify required software is running on the endp

Strany 42

ZENworks® ESM 3.5 Administrator’s Manual 136Antivirus/Spyware RulesAntivirus/spyware Rules verify that designated antivirus or spyware software on the

Strany 43

ZENworks® ESM 3.5 Administrator’s Manual 137Custom tests for software not on the default list may be created. A single test can be created to run chec

Strany 44

ZENworks® ESM 3.5 Administrator’s Manual 138Integrity TestsEach integrity test can run two checks, File Exists and Process Running. Each test will hav

Strany 45

ZENworks® ESM 3.5 Administrator’s Manual 139• Message - select a custom user message to be displayed at test failure. This can include remediation ste

Strany 46

ZENworks® ESM 3.5 Administrator’s Manual 14Policy Distribution ServiceThe Policy Distribution Service is a web service application that, when requeste

Strany 47

ZENworks® ESM 3.5 Administrator’s Manual 140Integrity ChecksThe checks for each test determine if one or more of the antivirus/spyware process is runn

Strany 48 - Generating Custom Reports

ZENworks® ESM 3.5 Administrator’s Manual 141• None • Equal • Equal or Greater • Equal or Less • Compare by - Age or Date• Date ensures the file is no

Strany 49

ZENworks® ESM 3.5 Administrator’s Manual 142Advanced Scripting RulesESM includes an advanced rule scripting tool which gives administrators the abilit

Strany 50

ZENworks® ESM 3.5 Administrator’s Manual 143• Timer Run Every- set the time to run every minute, hour, or day • Miscellaneous Events - the script will

Strany 51

ZENworks® ESM 3.5 Administrator’s Manual 144Script VariablesThis is an optional setting, which permits the Administrator to define a variable (var) fo

Strany 52

ZENworks® ESM 3.5 Administrator’s Manual 145Script TextThe ESM Administrator is not limited to the type of script the ZENworks Security Client may exe

Strany 53

ZENworks® ESM 3.5 Administrator’s Manual 146Rule Scripting ParametersThe ZENworks Endpoint Security Management (ESM) supports standard Jscript and VBS

Strany 54

ZENworks® ESM 3.5 Administrator’s Manual 147The interfaces are as follows:1. IClientAdapter. This interface describes an adapter in the client networ

Strany 55 - Figure 36 : Select Style

ZENworks® ESM 3.5 Administrator’s Manual 148Trigger EventsTriggers are events that cause the Endpoint Security Client to determine when and if a rule

Strany 56 - New (see Figure 38)

ZENworks® ESM 3.5 Administrator’s Manual 149• ProcessChangeDesc: Trigger whenever a process is created or deleted.Parameters: None.• St

Strany 57

ZENworks® ESM 3.5 Administrator’s Manual 15Securing Server AccessPhysical Access ControlPhysical access to the Distribution Service Server should be c

Strany 58

ZENworks® ESM 3.5 Administrator’s Manual 150Script NamespacesGeneral Enumerations and File substitutionsEAccessStateeApplyGlobalSetting = -1eDisableAc

Strany 59

ZENworks® ESM 3.5 Administrator’s Manual 151EMATCHTYPE eUNDEFINED eLOCALIP eGATEWAY eDNS

Strany 60 - Key Management

ZENworks® ESM 3.5 Administrator’s Manual 152 eRUN eSTOP ePAUSE ePENDING eNO

Strany 61

ZENworks® ESM 3.5 Administrator’s Manual 153Action NamespaceCheckForUpdateJScriptAction.CheckForUpdate();VBScriptAction.CheckForUpdate()ClearFixedShie

Strany 62

ZENworks® ESM 3.5 Administrator’s Manual 154else Action.Trace("ret = false");VBScriptAction.SetShieldStateByName "Closed",trueAct

Strany 63

ZENworks® ESM 3.5 Administrator’s Manual 155VBScriptAction.SwitchLocationByName("Base")Action.Stamp()Action.Trace("Begin 20 second slee

Strany 64

ZENworks® ESM 3.5 Administrator’s Manual 156var ret = Action.DeleteRegistryKey(eLOCAL_MACHINE,"Software\\Novell\\Tester");if(ret == true) A

Strany 65 - USB Drive Scanner

ZENworks® ESM 3.5 Administrator’s Manual 157NoteThe first parameter of the DisplayMessage call is a unique integer identifier for each action. When ca

Strany 66

ZENworks® ESM 3.5 Administrator’s Manual 158Action.EnableAdapterType true, eWIREDAction.EnableAdapterType false, eDIALUPCONNAction.EnableAdapterType t

Strany 67

ZENworks® ESM 3.5 Administrator’s Manual 159Details:Preliminary setup required creating a policy which included a new Integrity rule with a custom mes

Strany 68

ZENworks® ESM 3.5 Administrator’s Manual 16Running the ServiceThe Policy Distribution Service launches immediately following installation, with no reb

Strany 69 - Updating the Encryption Keys

ZENworks® ESM 3.5 Administrator’s Manual 160Action.Message "Display sync message"Synchronous Message (displayed and waits for user respond b

Strany 70

ZENworks® ESM 3.5 Administrator’s Manual 161StartServiceJScriptAction.StartService("lanmanworkstation","");VBScriptAction.StartSer

Strany 71 - Upgrading the ZSC

ZENworks® ESM 3.5 Administrator’s Manual 162dim retret = Action.CreateRegistryKey(eLOCAL_MACHINE,"Software\\Novell","Tester")if(re

Strany 72 - Running the ZSC

ZENworks® ESM 3.5 Administrator’s Manual 163Query NamespaceFileExistsVersionJScriptvar ret;ret = Query.FileExistsVersion("C:","ocalco.e

Strany 73

ZENworks® ESM 3.5 Administrator’s Manual 164adplength = adplist.Length;Action.Trace("adplength = " + adplength);if(adplength > 0){ adp =

Strany 74

ZENworks® ESM 3.5 Administrator’s Manual 165 Action.Trace("IP = " & adp.IP) Action.Trace("MAC = " & adp.MAC) Action.Tra

Strany 75 - Remove Temporary Files

ZENworks® ESM 3.5 Administrator’s Manual 166envdatalength = Query.LocationMatchCount;Action.Trace("MatchCount = " + envdatalength);if(envdat

Strany 76

ZENworks® ESM 3.5 Administrator’s Manual 167This script requires an environment to be defined for a location in the policy in order to provide useful

Strany 77

ZENworks® ESM 3.5 Administrator’s Manual 168ret = Query.IsAuthenticated()Action.Trace("Is authenticated = " & ret)IsWindowsXPJScriptvar

Strany 78

ZENworks® ESM 3.5 Administrator’s Manual 169Action.Trace("Is Win2000 = " & ret)RegistryKeyExistsJScriptvar ret;ret = Query.RegistryKeyEx

Strany 79

ZENworks® ESM 3.5 Administrator’s Manual 17Management ServiceThe Management Service is the central service for ESM. It is used to create authenticatio

Strany 80 - Figure 54 : Logging Window

ZENworks® ESM 3.5 Administrator’s Manual 170RegistryValueExistsJScript var ret; ret = Query.RegistryKeyExists(eLOCAL_MACHINE,"Softw

Strany 81

ZENworks® ESM 3.5 Administrator’s Manual 171dim retret = Query.RegistryKeyExists(eLOCAL_MACHINE,"Software\\Novell\\Logging")Action.Trace(&qu

Strany 82

ZENworks® ESM 3.5 Administrator’s Manual 172ret = Query.PolicyUuid;Action.Trace("PolicyUuid = " + ret);ret = Query.LocationIsStamped;Action.

Strany 83

ZENworks® ESM 3.5 Administrator’s Manual 173RemovableMediaStateCDMediaStateHDCStateWiFiDisabledStateWiFiDisabledWhenWiredStateAdHocDisabledStateAdapte

Strany 84 - IMPORTANT:

ZENworks® ESM 3.5 Administrator’s Manual 174Action.Trace("WiFiDisabledWhenWiredState = " + ret);ret = Action.AdHocDisabledState(eApplyGlobal

Strany 85 - Figure 61 : Show Usage Window

ZENworks® ESM 3.5 Administrator’s Manual 175Action.Trace("AdHocDisabledState = " + ret);ret = Action.AdapterBridgeDisabledState(eApplyGlobal

Strany 86

ZENworks® ESM 3.5 Administrator’s Manual 176ret = Action.AdHocDisabledState(eApplyGlobalSetting, ePolicyChange)Action.Trace("AdHocDisabledState =

Strany 87 - Creating Security Policies

ZENworks® ESM 3.5 Administrator’s Manual 177ret = Action.AdapterBridgeDisabledState(eApplyGlobalSetting, eLocationChange)Action.Trace("AdapterBri

Strany 88 - Custom User Messages

ZENworks® ESM 3.5 Administrator’s Manual 178ret = Query.HDCState(eBlueTooth);Action.Trace("HDCState(eBlueTooth) = " + ret);ret = Query.HDCSt

Strany 89 - Hyperlinks

ZENworks® ESM 3.5 Administrator’s Manual 179Action.Trace("HDCState(e1394) = " & ret)ret = Query.HDCState(eBlueTooth)Action.Trace("H

Strany 90 - Global Policy Settings

ZENworks® ESM 3.5 Administrator’s Manual 18Securing Server AccessPhysical Access ControlPhysical access to the Management Server should be controlled

Strany 91

ZENworks® ESM 3.5 Administrator’s Manual 180Example - "global" variable between scripts: "boolWarnedOnPreviousLoop"Storage.Persist

Strany 92 - Wireless Control

ZENworks® ESM 3.5 Administrator’s Manual 181Action.Trace("GetPersistString = " + ret);VBScriptdim retStorage.SetPersistString "teststr&

Strany 93

ZENworks® ESM 3.5 Administrator’s Manual 182Storage.RetrySeconds = 30ret = Storage.RetrySecondsAction.Trace("RetrySeconds = " & ret)Inte

Strany 94

ZENworks® ESM 3.5 Administrator’s Manual 183 ret = env.GatewayCount; Action.Trace("GatewayCount = " + ret); ret = env.WINSCount; Action.

Strany 95

ZENworks® ESM 3.5 Administrator’s Manual 184DeviceIDSee Query Namespace - GetAdaptersEnabledSee Query Namespace - GetAdaptersIPSee Query Namespace - G

Strany 96

ZENworks® ESM 3.5 Administrator’s Manual 185JScriptvar adplist;var adplength;var adp;var env;var ret;var item;adplist = Query.GetAdapters();adplength

Strany 97

ZENworks® ESM 3.5 Administrator’s Manual 186dim adpdim envdim retdim itemset adplist = Query.GetAdapters()adplength = adplist.LengthAction.Trace("

Strany 98 - Data Encryption

ZENworks® ESM 3.5 Administrator’s Manual 187adplist = Query.GetAdapters();adplength = adplist.Length;Action.Trace("adplength = " + adplength

Strany 99

ZENworks® ESM 3.5 Administrator’s Manual 188Action.Trace("adplength = " & CInt(adplength))if(CInt(adplength) > 0) then set adp = adp

Strany 100 - ZSC Update

ZENworks® ESM 3.5 Administrator’s Manual 189{ adp = adplist.Item(0); env = adp.GetNetworkEnvironment(); ret = env.GatewayCount; Action.Trace("

Strany 101 - VPN Enforcement

ZENworks® ESM 3.5 Administrator’s Manual 19Running the ServiceThe Management Service launches immediately following installation, with no reboot of th

Strany 102

ZENworks® ESM 3.5 Administrator’s Manual 190 ret = env.GatewayCount Action.Trace("GatewayCount = " & ret) if(ret > 0) then set

Strany 103

ZENworks® ESM 3.5 Administrator’s Manual 191 { item = env.GetWINSItem(0); ret = item.IP; Action.Trace("IP = " + ret); }}VBScript

Strany 104

ZENworks® ESM 3.5 Administrator’s Manual 192end ifGetWirelessAPItemWirelessAPCountJScriptvar adplist;var adplength;var adp;var env;var apitem;var adpt

Strany 105 - Locations

ZENworks® ESM 3.5 Administrator’s Manual 193 env = adp.GetNetworkEnvironment(); apcount = env.WirelessAPCount; Action.Trace("Wirel

Strany 106

ZENworks® ESM 3.5 Administrator’s Manual 194 if(adptype = eWIRELESS) then Action.Trace("Wireless index = " & i) adpname = a

Strany 107 - Location Settings

ZENworks® ESM 3.5 Administrator’s Manual 195See IClientNetEnv Interface - GetWirelessAPItemMaxRssiSee IClientNetEnv Interface - GetWirelessAPItemMinRs

Strany 108

ZENworks® ESM 3.5 Administrator’s Manual 196strStartMenu = WshShell.SpecialFolders("AllUsersPrograms")Dim strDesktopstrDesktop = WshShell.Sp

Strany 109 - Location Components

ZENworks® ESM 3.5 Administrator’s Manual 197oShellLinkStartMenu.Hotkey = "CTRL+SHIFT+W"oShellLinkStartMenu.IconLocation = "C:\Program F

Strany 110

ZENworks® ESM 3.5 Administrator’s Manual 198fileHandle.WriteLine "WshShell.RegWrite ""HKLM\SOFTWARE\Novell\MSC\STUWA"", "

Strany 111

ZENworks® ESM 3.5 Administrator’s Manual 199Action.Trace("CurLoc is: " + CurLoc);if (CurLoc == "Desired Location"){//only run thi

Strany 112 - Storage Device Control

The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.PN: AM30

Strany 113 - Network Environments

ZENworks® ESM 3.5 Administrator’s Manual 20Management ConsoleThe Management Console is the central access and control for the Management Service. Doub

Strany 114

ZENworks® ESM 3.5 Administrator’s Manual 200//Action.EnableAdapterType (false, eWIRELESS );}else{Action.Trace("NO Wired connection found.");

Strany 115 - Step 4: Click Save

ZENworks® ESM 3.5 Administrator’s Manual 201//Action.EnableAdapterType (false, eWIRELESS );}else{Action.Trace("NO Dialup connection found.")

Strany 116 - Wi-Fi Management

ZENworks® ESM 3.5 Administrator’s Manual 202Stamp Once ScriptThe Stamp Once script enforces a single network environment save at a designated location

Strany 117

ZENworks® ESM 3.5 Administrator’s Manual 203Block Gray List ScriptThis script will block ALL non-approved software from executing. This script is a Gl

Strany 118

ZENworks® ESM 3.5 Administrator’s Manual 204Compliance ReportingBecause of the level and access of the ZSC's drivers, virtually every transaction

Strany 119

ZENworks® ESM 3.5 Administrator’s Manual 205• Detected network environments - the ZENworks Security Client will report all detected network environmen

Strany 120

ZENworks® ESM 3.5 Administrator’s Manual 206Publishing Security PoliciesCompleted security policies are sent to the end-users using the publishing mec

Strany 121 - Wi-Fi Security

ZENworks® ESM 3.5 Administrator’s Manual 207To publish a policy, perform the following steps:Step 1: Select a user group (or single users) from the di

Strany 122

ZENworks® ESM 3.5 Administrator’s Manual 208Exporting a PolicyPolicies may be exported from the Management Console and distributed via email or throug

Strany 123 - Firewall Settings

ZENworks® ESM 3.5 Administrator’s Manual 209Importing PoliciesA policy can be imported from any file location on the available network. Step 1: In the

Strany 124

ZENworks® ESM 3.5 Administrator’s Manual 21Policy TasksThe Primary function of the Management Console is the creation and dissemination of Security Po

Strany 125 - TCP/UDP Ports

ZENworks® ESM 3.5 Administrator’s Manual 210Exporting Policies to Unmanaged UsersIf Unmanaged ZENworks Security Clients have been deployed within the

Strany 126 - Associate Component

ZENworks® ESM 3.5 Administrator’s Manual 211TroubleshootingOverviewCommon issues with ESM can be traced to problems with server operability. The follo

Strany 127 - Table 3: TCP/UDP Ports

ZENworks® ESM 3.5 Administrator’s Manual 212Allowing ASP.NET 1.1 FunctionsTo run the ESM back-end services on a Windows 2003 web server, ASP.NET 1.1 f

Strany 128 - Access Control Lists

ZENworks® ESM 3.5 Administrator’s Manual 213Figure 103 : Allowing ASP.NETStep 4: This will activate the ASP.NET functions, and allow the Policy Distri

Strany 129

ZENworks® ESM 3.5 Administrator’s Manual 214Server Communication ChecksFigure 104 : Communications ConsoleThe Communications Console is an initializat

Strany 130 - Network Address Macros List

ZENworks® ESM 3.5 Administrator’s Manual 215bution Service. If this test fails, the file is missing or an incorrect path may have been specified by th

Strany 131 - Macro Description

ZENworks® ESM 3.5 Administrator’s Manual 216• Create Management Signature KeysThis test verifies that the unique signature keys used for information s

Strany 132 - Application Controls

ZENworks® ESM 3.5 Administrator’s Manual 217• (DS) https://machinename/policyserver/policyserver.soap?wsdl (server)Figure 106 : Distribution Service -

Strany 133

ZENworks® ESM 3.5 Administrator’s Manual 218• (MS) https://machinename/authenticationhelper/authenicationhelper.soap?wsdl (server)Figure 108 : Managem

Strany 134 - Name Applications

ZENworks® ESM 3.5 Administrator’s Manual 219Getting Trace Information from the Management Server AgentSome of the services have tracing built into the

Strany 135

ZENworks® ESM 3.5 Administrator’s Manual 22configurable, granting total control over when and how frequently alerts are triggered. See “Alerts Monitor

Strany 136 - Antivirus/Spyware Rules

ZENworks® ESM 3.5 Administrator’s Manual 220<system.diagnostics> <trace autoflush="true"> <listeners> <

Strany 137 - Add New button

ZENworks® ESM 3.5 Administrator’s Manual 221Troubleshooting SQL Server IssuesSystem Monitor System Monitor is a MMC snap-in that lets you view real-ti

Strany 138 - Figure 95 : Integrity Tests

ZENworks® ESM 3.5 Administrator’s Manual 222• Computer - This option allows you to select whether to add counters from the local computer or any remot

Strany 139

ZENworks® ESM 3.5 Administrator’s Manual 223• Processor• Physical Disk•NetworkFor a managed installation of ESM, the objects that you should monitor i

Strany 140 - Figure 96 : Integrity Checks

ZENworks® ESM 3.5 Administrator’s Manual 224Securing SQL Database PasswordsThe SQL database passwords (if used) are stored as clear text in many of th

Strany 141

ZENworks® ESM 3.5 Administrator’s Manual 225Microsoft SQL Profiler SQL Profiler is a graphical tool that allows system administrators to monitor event

Strany 142 - Advanced Scripting Rules

ZENworks® ESM 3.5 Administrator’s Manual 226running, the event classes and data columns that describe the event data are displayed in SQL Profiler.Tem

Strany 143 - Associate New

ZENworks® ESM 3.5 Administrator’s Manual 227• An opened cursor.• Security permissions checks. All of the data that is generated as a result of an even

Strany 144 - Figure 98 : Script Variables

ZENworks® ESM 3.5 Administrator’s Manual 228Step 2: On the File menu, click Stop Trace, or close a trace window. To Save Trace results:Step 1: On the

Strany 145

ZENworks® ESM 3.5 Administrator’s Manual 229Tracing Novell Database InstallationsThe Novell Database architecture uses stored procedures extensively t

Strany 146 - Rule Scripting Parameters

ZENworks® ESM 3.5 Administrator’s Manual 23• About - launches the About window, which displays the installation type (ESM or UWS (see “USB/Wireless Se

Strany 147

ZENworks® ESM 3.5 Administrator’s Manual 230In this example we see that the user has a schema, policies, SUS files and an EFS key published (determine

Strany 148 - Trigger Events

ZENworks® ESM 3.5 Administrator’s Manual 23151 = Component40 = Encryption Key49 = Policy Signature58 = Schema54 = License48 = SUS File

Strany 149

ZENworks® ESM 3.5 Administrator’s Manual 232Event LogsThe Servers all log very extensive information on exception, for example:General Information ***

Strany 150

ZENworks® ESM 3.5 Administrator’s Manual 233 at Novell.ApplicationBlocks.Data.OleDbHelper.ExecuteNonQuery(OleDbConnection connection, CommandType co

Strany 151

ZENworks® ESM 3.5 Administrator’s Manual 234Microsoft SQL Enterprise ManagerSQL Server Enterprise Manager is the primary administrative tool for Micro

Strany 152

ZENworks® ESM 3.5 Administrator’s Manual 235Figure 114 : Example Configuration TableREPOSITORY: Contains the binary data for reporting, policies, etc.

Strany 153

ZENworks® ESM 3.5 Administrator’s Manual 236Figure 116 : Example Organization TableORG_REP: Contains the Item to User and Item to Group assignments.Fi

Strany 154

ZENworks® ESM 3.5 Administrator’s Manual 237Figure 118 : Example Event TableEVENT_CLIENTDATA: Contains the data uploaded by the client (can be manuall

Strany 155 - Details:

ZENworks® ESM 3.5 Administrator’s Manual 23829. Distribution Server Reporting Poll Frequency30. Report Server Notification Poll Frequency (future)31.

Strany 156

ZENworks® ESM 3.5 Administrator’s Manual 239ORGANIZATION: Contains the user and group information. The ORG_UID represents the credential assigned to t

Strany 157

ZENworks® ESM 3.5 Administrator’s Manual 24Permissions SettingsThis control is found in the Tools menu, and is only accessible by the primary administ

Strany 158

ZENworks® ESM 3.5 Administrator’s Manual 240PUBLISH_ORGANIZATION_AUDIT: Contains the user to policy (poa_ref_id) association to be published to the us

Strany 159

ZENworks® ESM 3.5 Administrator’s Manual 241Acronym GlossaryACL Access Control ListAP Access PointARP Address Request ProtocolCLAS Client Locations A

Strany 160

ZENworks® ESM 3.5 Administrator’s Manual 242SNAP Scalable Node Address ProtocolSNR Signal to Noise RatioSQL Structured English Query LanguageSSID Ser

Strany 161

ZENworks® ESM 3.5 Administrator’s Manual 243IndexNumerics1394 (FireWire™) ... 110AAccess Control Lists ...

Strany 162

ZENworks® ESM 3.5 Administrator’s Manual 244IrDA® ... 110KKey ...

Strany 163

ZENworks® ESM 3.5 Administrator’s Manual 245VView Policy ... 76VPN Adapter Controls ...

Strany 164

ZENworks® ESM 3.5 Administrator’s Manual 25Administrative PermissionsTo set the Administrative Permissions, perform the following steps:Step 1: Open t

Strany 165

ZENworks® ESM 3.5 Administrator’s Manual 26b. Select the appropriate users/groups from the list. To select multiple users, select individually by hold

Strany 166

ZENworks® ESM 3.5 Administrator’s Manual 27 Figure 8 : Publish To ListStep 4: To remove a selected user/group, highlight the name in the list, and cli

Strany 167

ZENworks® ESM 3.5 Administrator’s Manual 28Configuration WindowThe Configuration window gives the ESM Administrator access to the Infrastructure and S

Strany 168

ZENworks® ESM 3.5 Administrator’s Manual 29Example:If the current URL is listed as http:\\ACME\PolicyServer\ShieldClient.asmx and the Policy Distribut

Strany 169

LicensesFIPS Certified AES CryptoCompilation Copyright (c) 1995-2003 by Wei Dai. All rights reserved. This copyright applies only to this software di

Strany 170

ZENworks® ESM 3.5 Administrator’s Manual 30Authenticating DirectoriesPolicies are distributed to end-users by interrogating the Enterprise's exis

Strany 171

ZENworks® ESM 3.5 Administrator’s Manual 31• No authentication - login and password not required for connection to direc-tory service• Secure authenti

Strany 172

ZENworks® ESM 3.5 Administrator’s Manual 32Service SynchronizationThis control lets you to force a synchronization of the Management Service and Polic

Strany 173

ZENworks® ESM 3.5 Administrator’s Manual 33Alerts MonitoringAlerts monitoring allows the ESM Administrator to effortlessly gauge at a glance the secur

Strany 174

ZENworks® ESM 3.5 Administrator’s Manual 34Configuring ESM for AlertsAlerts monitoring requires reporting data be collected and uploaded at regular in

Strany 175

ZENworks® ESM 3.5 Administrator’s Manual 35Step 2: Adjust the trigger threshold by first, selecting condition from the drop down list. This states whe

Strany 176

ZENworks® ESM 3.5 Administrator’s Manual 36any potential corporate security issues. Additional information can be found by opening Reporting. Once rem

Strany 177

ZENworks® ESM 3.5 Administrator’s Manual 37ReportingThe Reporting Service provides Adherence and Status reports for the Enterprise. The available data

Strany 178

ZENworks® ESM 3.5 Administrator’s Manual 38Figure 18 : Report ToolbarWhen reviewing reports, the arrow buttons will help you navigate through each pag

Strany 179

ZENworks® ESM 3.5 Administrator’s Manual 39Adherence ReportsAdherence Reports provide compliance information regarding the distribution of security po

Strany 180

ZENworks® ESM 3.5 Administrator’s Manual 4ContentsContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 181

ZENworks® ESM 3.5 Administrator’s Manual 40Alert Drill-Down ReportsAdditional alert information is available in these drill-down reports. These report

Strany 182

ZENworks® ESM 3.5 Administrator’s Manual 41Application Control Report Reports all unauthorized attempts by blocked applications to access the network

Strany 183

ZENworks® ESM 3.5 Administrator’s Manual 42Encryption Solution ReportsWhen endpoint encryption is activated, reports on the transference of files to a

Strany 184

ZENworks® ESM 3.5 Administrator’s Manual 43Chart Percentage of ZSC Update FailuresCharts the percentage of ZSC Update that have failed (and not been r

Strany 185

ZENworks® ESM 3.5 Administrator’s Manual 44Information gathered from individual clients about what locations are used, and when. Dates displayed in UT

Strany 186

ZENworks® ESM 3.5 Administrator’s Manual 45Outbound Content Compliance ReportsProvides information regarding the use of removable drives and identifie

Strany 187

ZENworks® ESM 3.5 Administrator’s Manual 46Administrative Overrides ReportReports instances where client self-defence mechanisms have been administrat

Strany 188

ZENworks® ESM 3.5 Administrator’s Manual 47Figure 24 : Sample Wireless Environment History report

Strany 189

ZENworks® ESM 3.5 Administrator’s Manual 48Generating Custom ReportsSoftware RequirementsODBC-compliant reporting tools (i.e., Crystal Reports, Brio,

Strany 190

ZENworks® ESM 3.5 Administrator’s Manual 49 Figure 26 : Report Document Properties• The report may not contain any sub-reports.• Filtering parameters

Strany 191

ZENworks® ESM 3.5 Administrator’s Manual 5Hyperlinks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 192

ZENworks® ESM 3.5 Administrator’s Manual 50may also be a member of an organization unit or security groups. Each row represents a relationship of orga

Strany 193

ZENworks® ESM 3.5 Administrator’s Manual 51EVENT_CLIENTRULE_FACT_VW: This view describes the generic reporting mechanism for integrity and scripting r

Strany 194

ZENworks® ESM 3.5 Administrator’s Manual 52Step 2: The simplest method for this example is to create a report using the wizard (see Figure 29) Figure

Strany 195 - Sample Scripts

ZENworks® ESM 3.5 Administrator’s Manual 53Step 4: Using the connection definition wizard (see Figure 31), define an OLEDB ADO connection to the Repor

Strany 196

ZENworks® ESM 3.5 Administrator’s Manual 54Step 6: Select the source table or view that you will be using for your report by expanding the tree nodes

Strany 197

ZENworks® ESM 3.5 Administrator’s Manual 55Step 8: If you are planning to group or summarize your data, click the Group tab and select the columns you

Strany 198

ZENworks® ESM 3.5 Administrator’s Manual 56 Figure 37 : Visual Basic Report BuilderStep 10: To set up a filter, right click on the Parameter Fields it

Strany 199

ZENworks® ESM 3.5 Administrator’s Manual 57Step 11: The following filter allows you to select multiple users to filter by with the prompting text of &

Strany 200

ZENworks® ESM 3.5 Administrator’s Manual 58Step 13: So, using the new parameter, specify only the records where the field equals the values selected i

Strany 201

ZENworks® ESM 3.5 Administrator’s Manual 59ZENworks Storage Encryption SolutionZENworks Storage Encryption Solution (SES) provides complete, centraliz

Strany 202

ZENworks® ESM 3.5 Administrator’s Manual 6List of FiguresFigure 1: Effectiveness of NDIS-layer firewall . . . . . . . . . . . . . . . . . . . . . . .

Strany 203 - Control

ZENworks® ESM 3.5 Administrator’s Manual 60Key ManagementKey management permits you to backup, import, and update an encryption key. It is recommended

Strany 204 - Compliance Reporting

ZENworks® ESM 3.5 Administrator’s Manual 61Export Encryption KeysFor backup purposes, and to send the key to another Management Service instance, the

Strany 205

ZENworks® ESM 3.5 Administrator’s Manual 62ZENworks File Decryption UtilityThe ZENworks File Decryption Utility is used to extract protected data from

Strany 206 - Publishing Security Policies

ZENworks® ESM 3.5 Administrator’s Manual 63Override-Password Key GeneratorProductivity interruptions that a user may experience due to restrictions to

Strany 207

ZENworks® ESM 3.5 Administrator’s Manual 64Step 1: Open the Override-Password Key Generator through Start\All Programs\Novell\ESM Management Console\O

Strany 208 - Exporting a Policy

ZENworks® ESM 3.5 Administrator’s Manual 65USB Drive ScannerAn authorized USB device list can be generated and imported into a policy using the option

Strany 209 - Importing Policies

ZENworks® ESM 3.5 Administrator’s Manual 66 Figure 45 : Scan for Device Name and Serial NumberStep 4: Repeat steps 2 and 3 until all devices have been

Strany 210 - Program

ZENworks® ESM 3.5 Administrator’s Manual 67Client Location Assurance ServiceThe Client Location Assurance Service (CLAS) is an optional feature that p

Strany 211 - Troubleshooting

ZENworks® ESM 3.5 Administrator’s Manual 68Securing Server AccessPhysical Access ControlPhysical access to the CLAS Server should be controlled to pre

Strany 212 - Figure 102 : Open IIS Manager

ZENworks® ESM 3.5 Administrator’s Manual 69Optional Server ConfigurationsMultiple CLAS iterations may be installed on servers throughout the enterpris

Strany 213 - Figure 103 : Allowing ASP.NET

ZENworks® ESM 3.5 Administrator’s Manual 7Figure 52: Client Driver Status Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 214

ZENworks® ESM 3.5 Administrator’s Manual 70ZENworks Security Client ManagementESM utilizes an installed client application to enforce complete securit

Strany 215

ZENworks® ESM 3.5 Administrator’s Manual 71Note:To specify the uninstall password you can also pass this MSI Property: STUIP=\”password goes here\”It

Strany 216

ZENworks® ESM 3.5 Administrator’s Manual 72Setting the Upgrade SwitchStep 1: Open the new installation package for the ZSC and right-click setup.exe.S

Strany 217

ZENworks® ESM 3.5 Administrator’s Manual 73Note:The machine must be a member of the Policy Distribution Service's domain for the first policy sen

Strany 218 - (server)

ZENworks® ESM 3.5 Administrator’s Manual 74ZENworks Security Client Diagnostics ToolsThe ZENworks Security Client features several diagnostics tools w

Strany 219 - Figure 109 : Trace Log

ZENworks® ESM 3.5 Administrator’s Manual 75To create a diagnostics package, perform the following steps:Step 1: Right-click on the ZSC icon and select

Strany 220

ZENworks® ESM 3.5 Administrator’s Manual 76check individual logs. Otherwise, the files generated will unnecessarily take up disk space over time.Admin

Strany 221

ZENworks® ESM 3.5 Administrator’s Manual 77The policy display divides the policy components into the following tabs:• General - displays the global an

Strany 222

ZENworks® ESM 3.5 Administrator’s Manual 78Variables are created by clicking Add, which will display a second window (see Figure 51) where the variabl

Strany 223

ZENworks® ESM 3.5 Administrator’s Manual 79SettingsAdministrators can adjust the settings for the ZENworks Security Client without having to perform a

Strany 224

ZENworks® ESM 3.5 Administrator’s Manual 8Figure 106: Distribution Service - Server Communication. . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 225

ZENworks® ESM 3.5 Administrator’s Manual 80Reset Uninstall PasswordResets the password required to uninstall the ZSC. The administrator will be prompt

Strany 226

ZENworks® ESM 3.5 Administrator’s Manual 81Figure 55 : Comment WindowNote:If the Comments option in logging is unchecked, the Add Comments button will

Strany 227

ZENworks® ESM 3.5 Administrator’s Manual 82The duration settings for each report type are:• Off - data will not be gathered • On - data will be gather

Strany 228

ZENworks® ESM 3.5 Administrator’s Manual 83Creating and Distributing ESM Security PoliciesSecurity Policies are used by the ZENworks Security Client t

Strany 229 - Figure 112 : Database Tracing

ZENworks® ESM 3.5 Administrator’s Manual 84Policy ToolbarThe policy toolbar (see Figure 59) provides four controls. The Save control is available thro

Strany 230 - Figure 113 : Trace Sample

ZENworks® ESM 3.5 Administrator’s Manual 85IMPORTANT: Changes made to associated components will affect all other instances of that component. Example

Strany 231

ZENworks® ESM 3.5 Administrator’s Manual 86Error NotificationWhen the administrator attempts to save a policy with incomplete or incorrect data in a c

Strany 232

ZENworks® ESM 3.5 Administrator’s Manual 87Creating Security PoliciesTo create a new policy, click Create Policy. The Create Policy window displays. E

Strany 233

ZENworks® ESM 3.5 Administrator’s Manual 88Custom User MessagesCustom User Messages allow the ESM Administrator to create messages which directly answ

Strany 234

ZENworks® ESM 3.5 Administrator’s Manual 89HyperlinksAn administrator can incorporate hyperlinks in custom messages to assist in explaining security p

Strany 235

ZENworks® ESM 3.5 Administrator’s Manual 9List of TablesTable 1: System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 236

ZENworks® ESM 3.5 Administrator’s Manual 90Global Policy SettingsThe global policy settings are applied as basic defaults for the policy. To access th

Strany 237

ZENworks® ESM 3.5 Administrator’s Manual 91• Policy Update Message - A Custom User Message can be displayed whenever the policy is updated. Click on t

Strany 238

ZENworks® ESM 3.5 Administrator’s Manual 92Wireless ControlWireless Control globally sets adapter connectivity parameters to secure both the endpoint

Strany 239

ZENworks® ESM 3.5 Administrator’s Manual 93• Disable AdHoc NetworksThis setting globally disables all AdHoc connectivity, thereby enforcing Wi-Fi con-

Strany 240

ZENworks® ESM 3.5 Administrator’s Manual 94Global Communication Hardware ControlThis component sets the policy defaults for all communication hardware

Strany 241 - Acronym Glossary

ZENworks® ESM 3.5 Administrator’s Manual 95Storage Device ControlThis control sets the default storage device settings for the policy, where all exter

Strany 242

ZENworks® ESM 3.5 Administrator’s Manual 96• Disable - The device type is disallowed. When users attempt to access files on a defined storage device,

Strany 243

ZENworks® ESM 3.5 Administrator’s Manual 97Preferred DevicesPreferred Removable Storage Devices may be optionally entered into a list, permitting only

Strany 244

ZENworks® ESM 3.5 Administrator’s Manual 98Data EncryptionData Encryption determines whether file encryption will be enforced on the endpoint, and wha

Strany 245

ZENworks® ESM 3.5 Administrator’s Manual 99Determine what levels of encryption will be permitted by this policy: • Enable “Safe Harbor” encrypted fold

Komentáře k této Příručce

Žádné komentáře