ZyXEL Vantage Report 3.0 User Guide - Page 443
Security Policy Enforcement
View all ZyXEL Vantage Report 3.0 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 443 highlights
CHAPTER 10 Security Policy Enforcement This chapter discusses how you can check reports to look at what users and traffic were allowed or blocked by the application patrol and content filtering policies. 10.1 EPS These screens display which computers passed or failed endpoint security (EPS) checking. Endpoint Security (EPS), also known as endpoint control, is used to make sure users' computers comply with defined corporate policies before they can access the network or an SSL Secure Remote Access tunnel. After a successful user authentication, a user's computer must meet the endpoint security object's Operating System (OS) option and security requirements to gain access. You can configure the endpoint security object to require a user's computer to match just one of the endpoint security object's checking criteria or all of them. Configure endpoint security objects to use with the authentication policy and SSL Secure Remote Access features. See the User's Guide of your ZyWALL device for more information. 10.1.1 What Endpoint Security Can Check The settings endpoint security can check vary depending on the OS of the user's computer. Depending on the OS, EPS can check user computers for the following: • Operating System (Windows, Linux, Mac OSX, or others) • Windows version and service pack version • Windows Auto Update setting and installed security patches • Personal firewall installation and activation • Anti-virus installation and activation • Windows registry settings • Processes that the endpoint must execute • Processes that the endpoint cannot execute Vantage Report User's Guide 443