Configuring Resources for a User Group

3To add a file share, under File Share Resources, drag the resource to Shares under File Shares.

4Select the applications users are allowed to use in kiosk mode.

5Click Kiosk Persistence (Save Application Settings) to retain Firefox preferences between sessions. The preferences are saved on the remote server (hosting the session).

6Click OK.

7To add a kiosk resource to a group, click the resource and drag it to the group or groups to which the policy applies.

End point resources and policies

This section describes how to configure end point resources and then create an end point policy.

Configuring end point resources

End point resources provide another layer of security, helping to ensure that users are connecting to the Firebox SSL VPN Gateway on a computer that meets certain criteria. For example, you can require that a computer has particular registry entries, files, and/or active processes. and, optionally, is running one of several specified firewalls.

Each end point rule specifies that a computer must have one, some, or all of the following:

A registry entry that matches the path, entry type, and value that you specify.

A file that matches the path, filename, and date that you specify. You can also specify a checksum for the file.

A running process that you specify. You can also specify a checksum for the file.

End point policies are applied to each group by specifying a Boolean expression that uses end point resource names. For more information, see “Configuring an end point policy for a group” on page 105.

To create an end point resource

1Click the Access Policy Manager tab.

2In the right pane, right-click End Point Resources and then click New End Point Resource.

3Type a name and then click OK.

4In End point scan type, select the rule type.

5Click Add.

6To create a registry rule, do the following:

-Click Registry Rule.

-In Registry Path, type the path and select a key type.

-In Registry Entry, type the key name.

-In Registry Value, type the value to which that key must be set.

-Click OK.

7To create a File Rule, do the following:

-Click File Rule.

-In File Name, type the path and file name or click Browse to navigate to the file. The MD5 field is completed automatically when a file name is entered.

-In Date, type the date in mm/dd/yyyy format.

-Click OK.

104

Firebox SSL VPN Gateway

Page 114
Image 114
WatchGuard Technologies SSL VPN End point resources and policies, Configuring end point resources, Click Registry Rule

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.