Lenovo ThinkPad T40p IBM System Information Center Administrator's Guide - Page 20

Securing, network, Secure, Sockets, Layer, security

Page 20 highlights

account password is required. If you mark this option, type information in the Minimum Windows password length and Maximum Windows password age fields. v Required antivirus application*: Mark this check box if you want the System Information Center program to check and verify that the required antivirus application is installed on all client computers each time the asset is revised. Type the name of the application in the Application field and the version number in the Version field of the required antivirus application (must appear in Windows Control Panel Add/Remove Programs list). Note: In the event that more than one antivirus program is used in your enterprise, you can modify the ISIC.PROPERTIES file to check computer assets for more than one antivirus program. For more information about modifying the ISIC.PROPERTIES file, see "Working with the ISIC.PROPERTIES file" on page 37. v Required firewall application*: Mark this check box if you want the System Information Center program to check and verify that the required firewall application is installed on all client computers each time the asset is revised. Type the name of the application in the Application field and the version number in the Version field of the required firewall application (must appear in Windows Control Panel Add/Remove Programs list). Note: In the event that more than one firewall application is used in your enterprise, you can modify the ISIC.PROPERTIES file to check computer assets for more than one firewall application. For more information about modifying the ISIC.PROPERTIES file, see "Working with the ISIC.PROPERTIES file" on page 37. 14. Click Next. The Ready to Install window opens. 15. Click Next. The Setup Status window opens and the progress indicator displays the progress of the setup. After completing, the ″Restart required to complete installation″ window opens. 16. Mark an option button to restart your computer now or restart later. Click Finish. 17. If you have chosen to restart your computer, close any open programs and remove any disks from their drives; your computer will shut down and restart. This concludes the installation of the System Information Center program on a server. Note: After you install the System Information Center program, the first user account you will create will be the Administrator account. Once you have created that account, you can manually add a User account or change the authority of a User account. A User can create their own account by registering assets. For more information, see "Creating accounts" on page 22. Securing your network with Secure Sockets Layer (SSL) security In most cases, you do not need SSL. However, if your clients communicate with the server using the Internet and are not protected by a firewall, the communication will require encryption. You will need to: 1. Modify the ISIC.PROPERTIES file by replacing all occurrences of HTTP:// with HTTPS://. (For more information, see Appendix A, "Modifying the ISIC.PROPERTIES file," on page 51.) 12

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108

account
password
is
required.
If
you
mark
this
option,
type
information
in
the
Minimum
Windows
password
length
and
Maximum
Windows
password
age
fields.
v
Required
antivirus
application*
:
Mark
this
check
box
if
you
want
the
System
Information
Center
program
to
check
and
verify
that
the
required
antivirus
application
is
installed
on
all
client
computers
each
time
the
asset
is
revised.
Type
the
name
of
the
application
in
the
Application
field
and
the
version
number
in
the
Version
field
of
the
required
antivirus
application
(must
appear
in
Windows
Control
Panel
Add/Remove
Programs
list).
Note:
In
the
event
that
more
than
one
antivirus
program
is
used
in
your
enterprise,
you
can
modify
the
ISIC.PROPERTIES
file
to
check
computer
assets
for
more
than
one
antivirus
program.
For
more
information
about
modifying
the
ISIC.PROPERTIES
file,
see
“Working
with
the
ISIC.PROPERTIES
file”
on
page
37.
v
Required
firewall
application*
:
Mark
this
check
box
if
you
want
the
System
Information
Center
program
to
check
and
verify
that
the
required
firewall
application
is
installed
on
all
client
computers
each
time
the
asset
is
revised.
Type
the
name
of
the
application
in
the
Application
field
and
the
version
number
in
the
Version
field
of
the
required
firewall
application
(must
appear
in
Windows
Control
Panel
Add/Remove
Programs
list).
Note:
In
the
event
that
more
than
one
firewall
application
is
used
in
your
enterprise,
you
can
modify
the
ISIC.PROPERTIES
file
to
check
computer
assets
for
more
than
one
firewall
application.
For
more
information
about
modifying
the
ISIC.PROPERTIES
file,
see
“Working
with
the
ISIC.PROPERTIES
file”
on
page
37.
14.
Click
Next
.
The
Ready
to
Install
window
opens.
15.
Click
Next
.
The
Setup
Status
window
opens
and
the
progress
indicator
displays
the
progress
of
the
setup.
After
completing,
the
Restart
required
to
complete
installation
window
opens.
16.
Mark
an
option
button
to
restart
your
computer
now
or
restart
later.
Click
Finish
.
17.
If
you
have
chosen
to
restart
your
computer,
close
any
open
programs
and
remove
any
disks
from
their
drives;
your
computer
will
shut
down
and
restart.
This
concludes
the
installation
of
the
System
Information
Center
program
on
a
server.
Note:
After
you
install
the
System
Information
Center
program,
the
first
user
account
you
will
create
will
be
the
Administrator
account.
Once
you
have
created
that
account,
you
can
manually
add
a
User
account
or
change
the
authority
of
a
User
account.
A
User
can
create
their
own
account
by
registering
assets.
For
more
information,
see
“Creating
accounts”
on
page
22.
Securing
your
network
with
Secure
Sockets
Layer
(SSL)
security
In
most
cases,
you
do
not
need
SSL.
However,
if
your
clients
communicate
with
the
server
using
the
Internet
and
are
not
protected
by
a
firewall,
the
communication
will
require
encryption.
You
will
need
to:
1.
Modify
the
ISIC.PROPERTIES
file
by
replacing
all
occurrences
of
HTTP://
with
HTTPS://
.
(For
more
information,
see
Appendix
A,
“Modifying
the
ISIC.PROPERTIES
file,”
on
page
51.)
12