HP t5710 HP Sygate Security Agent and Symantec Embedded Security:Frequently As
HP t5710 - Thin Client Manual
View all HP t5710 manuals
Add to My Manuals
Save this manual to your list of manuals |
HP t5710 manual content summary:
- HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 1
HP Sygate Security Agent and Symantec Embedded Security: Frequently Asked Questions Question and answers 2 Overview 2 Firewall questions 4 Log files 9 Intrusion detection 10 For more information 10 1 - HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 2
reboot cycle clears the system RAM and returns the client to its original state from the protected Flash memory. HP believes the thin client computing model is an effective solution for the security conscious enterprise. However, the Windows XP Embedded operating system may have vulnerabilities that - HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 3
an industry leader: Symantec Embedded Security. Q: How can I obtain antivirus support for my thin clients? A: Symantec Embedded Security (HP Part Number EL390AA) is available as a one year, renewable, subscription service. With both antivirus and firewall protection, the Symantec Embedded Security - HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 4
questions Q: What approach has HP taken to secure my thin client? A: In addition to following strict security-centric image design policies, HP provides Sygate Firewall software on all new t57x0 series thin clients with Windows XPe SP2 preinstalled. HP provides Windows XPe SP2 as a Web deliverable - HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 5
you set the various options on your Agent to protect your system from attack. The Sygate Online Services (SOS) scanner scans your computer and attempts to determine your IP address, operating system, Web browser, and other information about your system. You can then choose one of the following more - HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 6
are mainly reserved for TCP services, such as instant messaging services, to see if these ports System (ntoskrnl.exe) NDIS User Mode I/O Driver (ndisuio.sys) TCP/IP Protocol Driver (tcpip.sys) IPv6 Driver (tcpip6.sys) NWLINK2 IPX Protocol Driver (nwlnkipx.sys) Internet Explorer (iexplore.exe) Windows - HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 7
exe) Generic Host Process for Win32 Services (svchost.exe) Microsoft Management Console (mmc.exe) Windows NT Logon Application (winlogon.exe) LSA the HP Sygate Policy Editor and what does it do? A: An administrator-only tool that runs on a Microsoft Windows PC, not on a thin client. HP Sygate Policy - HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 8
on a single thin client: 1. Log on as Administrator. 2. Right-click on the Sygate systray icon. 3. Select Advanced Rules. To modify security settings on multiple units, download the HP Sygate Policy Editor from the HP Service and Support Web site and follow the included instructions. Q: Is there - HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 9
out of the thin client. Ports, IP addresses, and applications are tracked here. • System log: Tracks system events such as the Sygate loading errors or various system errors. • Packet log: Provides a much more detailed version of the traffic log. This log is disabled by default and is best enabled - HP t5710 | HP Sygate Security Agent and Symantec Embedded Security:Frequently As - Page 10
Write Filter white paper at: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00101105/c00101105.pdf For more information For additional information about HP Compaq t5000 thin clients, refer to the following: http://h18004.www1.hp.com/products/thinclients/index_t5000.html © 2006 Hewlett
1
HP Sygate Security Agent and Symantec Embedded Security:
Frequently Asked Questions
Question and answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Firewall questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Intrusion detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
For more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10