Describes the OmniAccess SafeGuard Controller. The guide provides detailed
installation instructions and technical specifications for the OmniAccess
SafeGuard Controller.
■
OmniVista SafeGuard Manager Administration Guide
Describes how to manage the OmniAccess SafeGuard Controller using the
OmniVista SafeGuard Manager software.
■
OmniAccess SafeGuard OS Administration Guide
Provides concepts and configuration instructions for the major features of
OmniAccess SafeGuard OS and its supported products, which includes End Point
Validation (EPV) the integral component for using ICS.
6
ICS Dissolvable Agent for SafeGuard Administration Guide
This guide uses the following formats to highlight special messages in the text:
NOTE: This format highlights information that is important or that has
special interest.
Preface
ICS Dissolvable Agent for SafeGuard Administration Guide
7
Preface
8
ICS Dissolvable Agent for SafeGuard Administration Guide
chapter
Introduction
1
In this chapter:
■Integrity Clientless Security Features
■Reports
■ICSInfo Utility
■Unsupported Features
Chapter 1: Introduction
Check Point Integrity™ Clientless Security (ICS) protects your network by scanning end
point computers. Use it to do the following:
■Check end point computers for known spyware, worms, and other potential
threats
■Check that end point computers are compliant with your anti-virus, firewall, and
other software policies
■Protect data on end point computers from keyloggers
Integrity Clientless Security Features
ICS consists of several features, each providing a unique type of security protection. You
can choose which features to implement. This section provides an overview of these
features.
Integrity Clientless Security Scanner
Use the Integrity Clientless Security Scanner policies to make sure that end point
computers connecting to your network meet your security requirements. The Integrity
Clientless Security Scanner checks end point computers for applications according to the
enforcement rules you create. Enforcement rules either prohibit or require certain
applications. If the end point computer does not meet the requirements of the
enforcement rule, it is considered to be ‘non-compliant’. You can choose to restrict or
warn non-compliant users or simply log the event. For more detailed information about
enforcement rules, see Understanding Enforcement Rules on page 24.
Reports
Use reports to monitor how ICS is protecting your network and to plan new policies. For
more information about reports, see Reports on page 36.
ICSInfo Utility
ICS includes the ICSInfo Utility. The ICSInfo utility collects program and other
information from end point computers that you can use when creating your policies or
troubleshooting user issues. See Troubleshooting End Point User Issues on page 40.
10
ICS Dissolvable Agent for SafeGuard Administration Guide
Supported Features
The ICS Dissolvable Agent has the following features:
■Enforces software compliance
■Detects browser plugins for adware
■Tool for dialer hacking
■Detects keystroke Logging
■Detects undesirable software
■Remote administration tool
■Screen logging
■Cookie tracking
■Detects Trojans
■Detects worms
Chapter 1: Introduction
■Enforces anti-virus compliance for these vendors:
— Computer Associates VET
— Computer Associates eTrust InnoculateIT
— Kaspersky Antivirus
— McAfee VirusScan
— Trend Micro PC-cillin/OfficeScan
— Sophos AV
— Symantec Norton Antivirus
Unsupported Features
The following ICS features display in the product, but are not supported in the ICS
Dissolvable Agent for OmniAccess SafeGuard OS solution:
■While the spyware module does detect key-logging, the Advanced Anti-
KeyLogger feature of ICS is not supported.
■Integrity Secure Workspace
ICS Dissolvable Agent for SafeGuard Administration Guide
11
Chapter 1: Introduction
12
ICS Dissolvable Agent for SafeGuard Administration Guide
chapter
Prerequisites
2
In this chapter:
■End Point Prerequisites
Chapter 2: Prerequisites
End Point Prerequisites
Use this chapter to plan your ICS implementation by ensuring that you meet the
requirements listed.
For end point computers to be successfully serviced by Integrity Clientless Security, they
must meet the end point requirements outlined in this section. When a user tries to access
your network without the proper browser or settings, an error message is displayed
detailing the browser requirements. You can choose to allow access for end point
computers that do not meet your requirements, however, those computers will not be
serviced by ICS.
Supported Operating Systems
For information about allowing access for end point computers that are running
unsupported operating systems see Configuring ICS to Fail Open on page 21.
For Integrity Security Scanner:
■Windows 98/ME
■Windows NT4 SP6
■Windows 2000
■Windows XP
Supported Browsers
■Internet Explorer 5.01 or later configured to allow cookies, run ActiveX
components or Sun Java applets enabled or Microsoft Java VM enabled
■Mozilla Firefox 1.0 or later configured to allow cookies and Sun Java applets
support enabled
■Netscape Navigator 8.0 or later configured to allow cookies and Sun Java applets
support enabled
Java Requirements
ICS supports two Java implementations. End point computers must have one of the
following to be serviced by ICS:
14
■Sun JRE version 1.4.2 or higher.
■Microsoft JVM version 5.5.3810.0 or higher.
ICS Dissolvable Agent for SafeGuard Administration Guide
Loading...
+ 30 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.