Cisco 5520 Configuration Guide - Page 80

Macintosh and Windows Cache Cleaner

Page 80 highlights

Index PC-cillin A-4 personal firewall A-6 Port Forwarding definition 3-3 Macintosh and Linux 7-2 Port forwarding Windows installation failure 5-3 success 5-16 printing 5-26 privileges A-2 R registry criteria 5-4, 5-8 disable modification 5-26 removable drive access 5-25 Restrict application usage to the web browser only, attribute 5-25 restricted mode 5-25 reusing CSD settings 3-5 S safe modules 5-20 Secure Delete Macintosh and Windows Cache Cleaner 7-2 Windows Cache Cleaner 5-23 Windows Secure Desktop 5-24 See also encryption Secure Desktop Browser 3-4, 5-27 Cache Cleaner, when settings apply A-1 configuring 5-1 description A-6 encryption type A-6 FAQs A-3, A-5 force uninstall 5-24 IN-10 Cisco Secure Desktop Configuration Guide General 3-4, 5-23 to 5-24 inactivity timeout 5-24 local desktop switch 5-23 Location Module, attribute option 5-15, 5-18 Manager establishing a session 3-2 menu, figure 3-3 multiple A-3 open web page when closing 5-24 prompt to uninstall 5-24 Settings window 3-4, 5-25 to 5-26 Use Module, attribute 5-4 security settings A-5 service packs A-5 Shift_JIS A-2 Show success message at the end of successful installation, attribute 5-22 SSL VPN Client 3-4, 5-3, 5-17, 5-24 String value, attribute of a registry key as a location criterion 5-10 Subject, field of a certificate 5-5, 5-6, 5-7 Suggest application uninstall upon Secure Desktop closing, attribute 5-24 Sygate Personal Firewall A-5, A-6 Sygate Security Agent A-6 System Detection configuring 5-13 to 5-19 definition 3-1 FAQs A-3 T timeout A-2 Linux A-2 Macintosh A-2 Timeout after, attribute 5-22, 5-24, 7-2 transparent e-mail 5-26 Triple DES A-6 tutorial 4-1 to 4-3 OL-8607-02

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

Index
IN-10
Cisco Secure Desktop Configuration Guide
OL-8607-02
PC-cillin
A-4
personal firewall
A-6
Port Forwarding
definition
3-3
Macintosh and Linux
7-2
Port forwarding
Windows installation
failure
5-3
success
5-16
printing
5-26
privileges
A-2
R
registry
criteria
5-4, 5-8
disable modification
5-26
removable drive access
5-25
Restrict application usage to the web browser only,
attribute
5-25
restricted mode
5-25
reusing CSD settings
3-5
S
safe modules
5-20
Secure Delete
Macintosh and Windows Cache Cleaner
7-2
Windows Cache Cleaner
5-23
Windows Secure Desktop
5-24
See also
encryption
Secure Desktop
Browser
3-4, 5-27
Cache Cleaner, when settings apply
A-1
configuring
5-1
description
A-6
encryption type
A-6
FAQs
A-3, A-5
force uninstall
5-24
General
3-4, 5-23 to 5-24
inactivity timeout
5-24
local desktop switch
5-23
Location Module, attribute option
5-15, 5-18
Manager
establishing a session
3-2
menu, figure
3-3
multiple
A-3
open web page when closing
5-24
prompt to uninstall
5-24
Settings window
3-4, 5-25 to 5-26
Use Module, attribute
5-4
security settings
A-5
service packs
A-5
Shift_JIS
A-2
Show success message at the end of successful installation,
attribute
5-22
SSL VPN Client
3-4, 5-3, 5-17, 5-24
String value, attribute of a registry key as a location
criterion
5-10
Subject, field of a certificate
5-5, 5-6, 5-7
Suggest application uninstall upon Secure Desktop
closing, attribute
5-24
Sygate Personal Firewall
A-5, A-6
Sygate Security Agent
A-6
System Detection
configuring
5-13 to 5-19
definition
3-1
FAQs
A-3
T
timeout
A-2
Linux
A-2
Macintosh
A-2
Timeout after, attribute
5-22, 5-24, 7-2
transparent e-mail
5-26
Triple DES
A-6
tutorial
4-1 to 4-3