ZyXEL UAG715 User Guide - Page 424

Table 170, Label, Description

Page 424 highlights

Chapter 38 Endpoint Security The following table gives an overview of the objects you can configure. Table 170 Configuration > Object > Endpoint Security > Add LABEL DESCRIPTION Show Advanced Settings / Hide Advanced Settings Click this button to display a greater or lesser number of configuration fields. General Settings Object Name Specify a descriptive name for identification purposes. You can enter up to 31 characters ("0-9", "a-z", "A-Z", "-", "_" with no spaces allowed). Description Enter a description of this object. It is not used elsewhere. You can use alphanumeric and characters, and it can be up to 60 characters long. Endpoint Operating System Select the type of operating system the user's computer must be using. The checking items in the rest of the screen vary depending on the selected operating system. If you select Mac OSX, there are no other checking items. Others allows access for computers not using Windows, Linux, or Mac OSX operating systems. For example you create Windows, Linux, and Mac OSX endpoint security objects to apply to your LAN users. An "others" object allows access for LAN computers using Solaris, HP, Android, or other operating systems. Window Version If you selected Windows as the operating system, select the version of Windows here. Endpoint must update to Windows Service Pack If you selected Windows as the operating system, you can enter the minimum Windows service pack number the user's computer must have installed. The user's computer must have this service pack or higher. For example, "2" means service pack 2. Leave the field blank to have the UAG ignore the Windows service pack number. Passing Criterion Select whether the user's computer has to match just one of the endpoint security object's checking criteria or all of them. Checking Item - If you selected Windows as the operating system, you can select whether or not the user's Windows Update computer must have the Windows Auto Update feature activated. Checking Item Security Patch Use the table to list Windows security patches that the user's computer must have installed. The user's computer must have all of the listed Windows security patches installed to pass this checking item. Click Add to create a new entry. Select one or more entries and click Remove to delete it or them. Checking Item Personal Firewall If you selected Windows as the operating system, you can select whether or not the user's computer is required to have personal firewall software installed. Move the permitted personal firewalls from the Available list to the Allowed Personal Firewall List. Use the [Shift] and/or [Ctrl] key to select multiple entries. The user's computer must have one of the listed personal firewalls to pass this checking item. For some personal firewalls the UAG can also detect whether or not the firewall is activated; in those cases it must also be activated. Checking Item Anti-Virus Software If you selected Windows as the operating system, you can select whether or not the user's computer is required to have anti-virus software installed. Move the permitted anti-virus software packages from the Available list to the Allowed Anti-Virus Software List. Use the [Shift] and/or [Ctrl] key to select multiple entries. The user's computer must have one of the listed anti-virus software packages to pass this checking item. For some anti-virus software the UAG can also detect whether or not the anti-virus software is activated; in those cases it must also be activated. 424 UAG715 User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542

Chapter 38 Endpoint Security
UAG715 User’s Guide
424
The following table gives an overview of the objects you can configure.
Table 170
Configuration > Object > Endpoint Security > Add
LABEL
DESCRIPTION
Show Advanced
Settings / Hide
Advanced
Settings
Click this button to display a greater or lesser number of configuration fields.
General Settings
Object Name
Specify a descriptive name for identification purposes. You can enter up to 31 characters
(“0-9”, “a-z”, “A-Z”, “-”, “_” with no spaces allowed).
Description
Enter a description of this object. It is not used elsewhere. You can use alphanumeric and
()+/:=?!*#@$_%-
characters, and it can be up to 60 characters long.
Endpoint
Operating
System
Select the type of operating system the user’s computer must be using. The checking items
in the rest of the screen vary depending on the selected operating system. If you select
Mac OSX
, there are no other checking items.
Others
allows access for computers not using Windows, Linux, or Mac OSX operating
systems. For example you create Windows, Linux, and Mac OSX endpoint security objects
to apply to your LAN users. An “others” object allows access for LAN computers using
Solaris, HP, Android, or other operating systems.
Window
Version
If you selected Windows as the operating system, select the version of Windows here.
Endpoint
must
update to
Windows
Service
Pack
If you selected Windows as the operating system, you can enter the minimum Windows
service pack number the user’s computer must have installed. The user’s computer must
have this service pack or higher. For example, “2” means service pack 2. Leave the field
blank to have the UAG ignore the Windows service pack number.
Passing
Criterion
Select whether the user’s computer has to match just one of the endpoint security object’s
checking criteria or all of them.
Checking Item -
Windows Update
If you selected Windows as the operating system, you can select whether or not the user’s
computer must have the Windows Auto Update feature activated.
Checking Item -
Security Patch
Use the table to list Windows security patches that the user’s computer must have
installed. The user’s computer must have all of the listed Windows security patches
installed to pass this checking item. Click
Add
to create a new entry. Select one or more
entries and click
Remove
to delete it or them.
Checking Item -
Personal Firewall
If you selected Windows as the operating system, you can select whether or not the user’s
computer is required to have personal firewall software installed. Move the permitted
personal firewalls from the
Available
list to the
Allowed Personal Firewall List
. Use the
[Shift] and/or [Ctrl] key to select multiple entries. The user’s computer must have one of
the listed personal firewalls to pass this checking item. For some personal firewalls the UAG
can also detect whether or not the firewall is activated; in those cases it must also be
activated.
Checking Item -
Anti-Virus
Software
If you selected Windows as the operating system, you can select whether or not the user’s
computer is required to have anti-virus software installed. Move the permitted anti-virus
software packages from the
Available
list to the
Allowed Anti-Virus Software List
. Use
the [Shift] and/or [Ctrl] key to select multiple entries. The user’s computer must have one
of the listed anti-virus software packages to pass this checking item. For some anti-virus
software the UAG can also detect whether or not the anti-virus software is activated; in
those cases it must also be activated.