Chapter 44 Endpoint Security

Table 208 Configuration > Object > Endpoint Security > Add (continued)

LABEL

DESCRIPTION

Checking Item

If you selected Windows as the operating system, you can select whether

- Personal

or not the user’s computer is required to have personal firewall software

Firewall

installed. Move the permitted personal firewalls from the Available list

 

to the Allowed Personal Firewall List. Use the [Shift] and/or [Ctrl]

 

key to select multiple entries. The user’s computer must have one of the

 

listed personal firewalls to pass this checking item. For some personal

 

firewalls the ZyWALL can also detect whether or not the firewall is

 

activated; in those cases it must also be activated.

 

 

Checking Item

If you selected Windows as the operating system, you can select whether

- Anti-Virus

or not the user’s computer is required to have anti-virus software

Software

installed. Move the permitted anti-virus software packages from the

 

Available list to the Allowed Anti-Virus Software List. Use the [Shift]

 

and/or [Ctrl] key to select multiple entries. The user’s computer must

 

have one of the listed anti-virus software packages to pass this checking

 

item. For some anti-virus software the ZyWALL can also detect whether

 

or not the anti-virus software is activated; in those cases it must also be

 

activated.

 

 

Checking Item

If you selected Windows as the operating system, you can use the table

- Windows

to list Windows registry values to check on the user’s computer.

Registry

Use the Operation field to set whether the value for the registry item in

 

 

the user’s computer has to be equal to (==), greater than (>), less than

 

(<), greater than or equal to (>=), less than or equal to (<=), or not

 

equal to (!=) the value listed in the entry.

 

Click Add to create a new entry. Select one or more entries and click

 

Remove to delete it or them.

 

The user’s computer must pass all of the listed Windows registry value

 

checks to pass this checking item.

 

 

Checking Item

If you selected Windows or Linux as the operating system, you can use

- Application

these tables to list applications that a user’s computer must be running

 

and other applications that it cannot be running.

 

Use the Process that endpoint must execute table to list processes

 

that the user’s computer must have running. The user’s computer must

 

have all of the listed applications running to pass this checking item.

 

Use the Process that endpoint cannot execute table to list processes

 

that the user’s computer are not permitted to have running. The user’s

 

computer must not have any of the listed applications running to pass

 

this checking item.

 

Include the filename extension for Linux operating systems.

 

Click Add to create a new entry. Select one or more entries and click

 

Remove to delete it or them.

 

 

672

 

ZyWALL USG 50 User’s Guide