Novell ZENworks Endpoint Security Management 4.1 Administration Guide

Category
Software
Type
Administration Guide
Novell®
www.novell.com
novdocx (en) 16 April 2010
AUTHORIZED DOCUMENTATION
ZENworks Endpoint Security Management 4.1 Administration Guide
ZENworks
®
Endpoint Security Management
4.1
February 4, 2010
Administration Guide
novdocx (en) 16 April 2010
Legal Notices
Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time,
without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc.,
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to
notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required
licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on
the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws.
You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the
Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on
exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export
approvals.
Copyright © 2007-2010 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied,
stored on a retrieval system, or transmitted without the express written consent of the publisher.
Novell, Inc., has intellectual property rights relating to technology embodied in the product that is described in this
document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S.
patents listed on the Novell Legal Patents Web page (http://www.novell.com/company/legal/patents/) and one or
more additional patents or pending patent applications in the U.S. and in other countries.
Novell, Inc.
404 Wyman Street, Suite 500
Waltham, MA 02451
U.S.A.
www.novell.com
Online Documentation: To access the latest online documentation for this and other Novell products, see
the Novell Documentation Web page (http://www.novell.com/documentation).
novdocx (en) 16 April 2010
Novell Trademarks
For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/
trademarks/tmlist.html).
Third-Party Materials
All third-party trademarks are the property of their respective owners.
4 ZENworks Endpoint Security Management 4.1 Administration Guide
novdocx (en) 16 April 2010
Contents 5
Contents
novdocx (en) 16 April 2010
About This Guide 11
Part I System Configuration and Maintenance 13
1 Managing Directory Service Connections 15
1.1 Creating a Directory Service Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.1.1 Defining eDirectory as the Directory Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.1.2 Defining Active Directory as the Directory Service . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.2 Synchronizing the Management Database with the Directory Service. . . . . . . . . . . . . . . . . . . 21
1.3 Removing a Directory Service Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2 Changing the Policy Distribution Service URL 23
3 Configuring Data Synchronization Schedules 25
4 Forcing Data Synchronization 27
5 Managing Directory Service Objects that Have Moved 29
6 Renewing ZENworks Endpoint Security Management Credentials 31
7 Managing Encryption Keys 33
7.1 Exporting Encryption Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
7.2 Importing Encryption Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
7.3 Generating a New Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
8 Applying a License Key 35
Part II Security Policies 37
9 Creating a Security Policy 39
10 Configuring a Policy’s Global Settings 41
10.1 Accessing the Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
10.2 Policy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
10.3 Wireless Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
10.4 Communication Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
10.5 Storage Device Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
10.6 USB Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
10.6.1 How the Access Setting Is Determined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
10.6.2 Configuring the USB Connectivity Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
10.7 Data Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
6 ZENworks Endpoint Security Management 4.1 Administration Guide
novdocx (en) 16 April 2010
10.7.1 Configuring the Data Encryption Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
10.7.2 Data Encryption Performance Impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
10.8 ZSC Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
10.9 VPN Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
11 Configuring a Policy’s Locations 61
11.1 Location Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
11.2 Adding a Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
11.3 Configuring a Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
11.3.1 Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
11.3.2 Communication Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
11.3.3 Storage Device Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
11.3.4 Firewall Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
11.3.5 Network Environments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
11.3.6 USB Connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
11.3.7 Wi-Fi Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
11.3.8 Wi-Fi Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
12 Configuring a Policy’s Integrity and Remediation Rules 87
12.1 Antivirus/Spyware Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
12.1.1 Integrity Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
12.1.2 Integrity Checks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
12.2 Advanced Scripting Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
12.2.1 Script Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
12.2.2 Script Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
13 Configuring a Policy’s Compliance Reporting 97
14 Distributing a Policy 99
14.1 Publishing a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
14.2 Republishing an Updated Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
14.3 Exporting a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
15 Importing and Exporting Policies 103
15.1 Importing Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
15.2 Exporting a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Part III Security Client 105
16 About the Security Client 107
16.1 What the Security Client Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
16.2 Security Client Differences Based on Windows Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
16.3 Security Client Self Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
16.4 Multiple-User Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
16.5 Machine-Based Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Contents 7
novdocx (en) 16 April 2010
17 Installing the Security Client 113
18 Updating the Security Client 115
18.1 Using a Policy’s ZSC Update Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
18.2 Using the Installation Program’s Upgrade Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
18.3 Using an MSI Uninstall and Reinstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
19 Uninstalling the Security Client 117
19.1 Preparing a Machine for Client Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
19.2 Performing an Attended Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
19.3 Performing an Unattended (Silent) Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
20 Using the Security Client Diagnostic Tools 121
20.1 Windows 2000/XP Security Client Diagnostics Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
20.1.1 Creating a Diagnostics Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
20.1.2 Administrator Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
20.1.3 Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
20.1.4 Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
20.2 Windows Vista/7 Security Client Diagnostic Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
20.2.1 Creating a Diagnostics Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
20.2.2 Administrator Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
20.2.3 Module List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
20.2.4 Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Part IV Auditing 137
21 Generating Standard Reports 139
21.1 Generating a Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
21.2 Adherence Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
21.2.1 Endpoint Check-In Adherence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
21.2.2 Endpoints that Never Checked-In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
21.2.3 Group Policy Non-Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
21.2.4 Policy Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
21.2.5 Endpoint Check-In Adherence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
21.3 Alert Drill-Down Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
21.3.1 Client Tampering Alert Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
21.3.2 Files Copied Alert Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
21.3.3 Override Attempts Alert Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
21.3.4 Port Scan Alert Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
21.3.5 Uninstall Attempt Alert Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
21.3.6 Unsecure Access Point Alert Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
21.4 Application Control Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
21.4.1 Application Control Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
21.5 Endpoint Activity Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
21.5.1 Blocked Packets by IP Address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
21.5.2 Blocked Packets by User. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
21.5.3 Network Usage Statistics by User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
21.5.4 Network Usage Statistics by Adapter Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
21.6 Encryption Solutions Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
21.6.1 File Encryption Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
21.6.2 Encryption Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
8 ZENworks Endpoint Security Management 4.1 Administration Guide
novdocx (en) 16 April 2010
21.7 Client Self Defense Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
21.7.1 Endpoint Security Client Hack Attempts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
21.8 Location Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
21.8.1 Location Usage Data by Date and User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
21.9 Outbound Content Compliance Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
21.9.1 Removable Storage Activity by Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
21.9.2 Removable Storage Activity by Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
21.9.3 Detected Removable Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
21.9.4 Chart 7 Days of Removable Storage Activity by Account . . . . . . . . . . . . . . . . . . . . 145
21.10 Administrative Overrides Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
21.10.1 Security Client Overrides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
21.11 USB Devices Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
21.12 Wireless Enforcement Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
21.12.1 Wireless Connection Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
21.12.2 Wireless Environment History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
22 Generating Custom Reports 147
22.1 Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
22.2 Creating a ZENworks Endpoint Security Management Compliant Report . . . . . . . . . . . . . . . 148
22.3 Available Reporting Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
22.4 Creating a Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
23 Using Alerts Monitoring 157
23.1 Configuring Endpoint Security Management for Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
23.1.1 Activating Reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
23.1.2 Optimizing Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
23.2 Configuring Alert Triggers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
23.3 Managing Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Part V Utilities 161
24 ZENworks File Decryption Utility 163
24.1 Using the File Decryption Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
24.2 Using the Administrator Configured Decryption Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Contents 9
novdocx (en) 16 April 2010
25 Override-Password Key Generator 165
26 Device Scanner 167
Part VI Appendixes 169
A Predefined TCP/UDP Port Groups 171
B Predefined Access Control Lists 173
C Predefined Application Controls 175
D Advanced Scripting Rules 177
D.1 Supported Script Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
D.2 Rule Scripting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
D.3 Trigger Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
D.4 Script Namespaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
D.4.1 General Enumerations and File Substitutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
D.4.2 Action Namespace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
D.4.3 Query Namespace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
D.4.4 Storage Namespace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
D.5 Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
D.5.1 IClientAdapter Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
D.5.2 IClientEnvData Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
D.5.3 IClientNetEnv Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
D.5.4 IClientWAP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
D.5.5 IClientAdapterList Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
D.6 Sample Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
D.6.1 Create Registry Shortcut (VBScript) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
D.6.2 Allow Only One Connection Type (JScript) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
D.6.3 Stamp Once Script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
E Shared Component Usage 215
10 ZENworks Endpoint Security Management 4.1 Administration Guide
novdocx (en) 16 April 2010
About This Guide 11
novdocx (en) 16 April 2010
About This Guide
This Novell
®
ZENworks
®
Endpoint Security Management Administration Guide provides
information to help you manage the Endpoint Security Management services, create and publish
security policies, and generate and analyze reporting data.
The information in this guide is organized as follows:
Part I, “System Configuration and Maintenance,” on page 13
Part II, “Security Policies,” on page 37
Part III, “Security Client,” on page 105
Part IV, “Auditing,” on page 137
Part V, “Utilities,” on page 161
Part VI, “Appendixes,” on page 169
Audience
This guide is written for the ZENworks Endpoint Security Management administrators.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation, or go to the Novell Documentation Feedback site (http://www.novell.com/
documentation/feedback.html) and enter your comments there.
Additional Documentation
ZENworks Endpoint Security Management is supported by other documentation (in both PDF and
HTML formats) that you can use to learn about and implement the product. For additional
documentation, see the ZENworks Endpoint Security Management 4.1 documentation Web site
(http://www.novell.com/documentation/zesm41).
Documentation Conventions
In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and
items in a cross-reference path.
A trademark symbol (
®
,
TM
, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party
trademark.
12 ZENworks Endpoint Security Management 4.1 Administration Guide
novdocx (en) 16 April 2010
System Configuration and Maintenance
I
13
novdocx (en) 16 April 2010
I
System Configuration and
Maintenance
The following sections contain information to help you configure and maintain your ZENworks
®
Endpoint Security Management system.
Chapter 1, “Managing Directory Service Connections,” on page 15
Chapter 2, “Changing the Policy Distribution Service URL,” on page 23
Chapter 3, “Configuring Data Synchronization Schedules,” on page 25
Chapter 4, “Forcing Data Synchronization,” on page 27
Chapter 5, “Managing Directory Service Objects that Have Moved,” on page 29
Chapter 6, “Renewing ZENworks Endpoint Security Management Credentials,” on page 31
Chapter 7, “Managing Encryption Keys,” on page 33
Chapter 8, “Applying a License Key,” on page 35
14 ZENworks Endpoint Security Management 4.1 Administration Guide
novdocx (en) 16 April 2010
Managing Directory Service Connections
1
15
novdocx (en) 16 April 2010
1
Managing Directory Service
Connections
ZENworks
®
Endpoint Security Management integrates with Microsoft* Active Directory* and
Novell
®
eDirectory
TM
to enable security policies to be published to the users and computers in the
directory. When the Security client authenticates through a user or computer account, any policies
associated with the account are applied to the computer.
The following sections provide information to help you manage directory service configurations:
Section 1.1, “Creating a Directory Service Configuration,” on page 15
Section 1.2, “Synchronizing the Management Database with the Directory Service,” on
page 21
Section 1.3, “Removing a Directory Service Configuration,” on page 21
1.1 Creating a Directory Service Configuration
When you create a directory service configuration for a directory, you define the connection
information for the Management Service to access the directory and identify the users or computers
to whom policies can be published.
If necessary, you can create multiple directory service configurations to support publishing of
policies to users or computers in different directories.
The following sections provide instructions for creating configurations for the two directory
services:
Section 1.1.1, “Defining eDirectory as the Directory Service,” on page 15
Section 1.1.2, “Defining Active Directory as the Directory Service,” on page 18
1.1.1 Defining eDirectory as the Directory Service
1 In the Management Console, make sure the New Directory Service Configuration Wizard is
displayed.
If the wizard is not displayed, launch the Management Console by double-clicking the ESM
Management Console icon on the desktop or by selecting the Start menu > All Programs >
Novell > ESM Management Console > Management Console.
16 ZENworks Endpoint Security Management 4.1 Administration Guide
novdocx (en) 16 April 2010
2 Complete the wizard. The following table provides information for each of the pages.
Wizard Page Explanation
Configure Server Select Novell eDirectory.
In the Name field, specify a name that identifies this configuration in
the Management Console. When users log in through the Security
Client, the must select the directory service configuration that
represents the directory service in which their user account exists. If
you will have multiple directory service configurations, we
recommend that the names you provide for the configurations are
the same as or similar to the eDirectory tree names so that users
recognize which configuration to select.
Connect to Server Host Name: Specify the DNS name or IP address of an eDirectory
server.
Port: Specify the eDirectory server port. The default is 389 (non-
secure) or 636 (secure).
Enable Encryption for this session using TLS/SSL: Select this
option if you want to use either TLS or SSL to encrypt the current
session. Encrypting the session ensures that the eDirectory data
imported by the Management Console is secure during
transmission.
Provide Credentials The Management Console requires a user account for
authentication to eDirectory.
User Name: Specify the login name of a user who has permission to
view the entire directory.
Password: Specify the password for the user account.
Context: Specify the user’s context.
Managing Directory Service Connections 17
novdocx (en) 16 April 2010
3 If you have not already done so, click Finish to complete the directory service configuration.
The directory is added to the Directory Service Configurations list.
If you selected containers to synchronize, the Management Console begins the
synchronization. You can double-click in the Windows* notification area to display the
Directory Services Synchronization dialog box.
Select Directory Partition(s) To receive security policies, the Security client must authenticate to
eDirectory through a user or workstation account. You must identify
the location of the users or workstations that you want to be able to
authenticate. The first step is to select the partitions that contain the
users or workstations.
Select Client Context(s) The second step in identifying the location of the users or
workstations that you want to be able to authenticate is to select the
containers in which the users or workstations reside.
Select Context(s) for
Synchronization
To publish a security policy to a user or workstation, the user or
workstation must be available in the Management Console. There
are two ways a user or workstation becomes available in the
console:
You use this page to synchronize the Management Console
with eDirectory. To do so, select the eDirectory containers with
users or workstations you want to populate into the
Management Console. You can synchronize only the
containers you selected as Client contexts (the previous page).
Wait for the user or workstation to authenticate through the
Security Client. When the user or workstation checks in, it is
automatically added to the Management Console.
Synchronizing containers prepopulates the Management Console so
that you can immediately publish security policies to individual users
or workstations. If you don’t synchronize containers, you must
publish security policies at the container level (which means all users
or workstations in the container receive the policies) or wait for
individual users or workstations to authenticate and be added to the
Management Console.
Wizard Page Explanation
18 ZENworks Endpoint Security Management 4.1 Administration Guide
novdocx (en) 16 April 2010
The synchronization occurs in the background. If you exit the Management Console, the
synchronization stops. When you open the Management Console again, the synchronization
resumes where it left off.
1.1.2 Defining Active Directory as the Directory Service
1 In the Management Console, make sure the New Directory Service Configuration Wizard is
displayed.
If the wizard is not displayed, launch the Management Console by double-clicking the ESM
Management Console icon on the desktop or by selecting the Start menu > All Programs >
Novell > ESM Management Console > Management Console.
2 Complete the wizard. The following table provides information for each of the pages.
Managing Directory Service Connections 19
novdocx (en) 16 April 2010
Wizard Page Explanation
Configure Server Select Microsoft Active Directory.
In the Name field, specify a name that identifies this configuration in
the Management Console. When users log in through the Security
Client, the must select the directory service configuration that
represents the directory service in which their user account exists. If
you will have multiple directory service configurations, we
recommend that the names you provide for the configurations are
the same as or similar to the Active Directory domain names so that
users recognize which configuration to select.
Connect to Server Host Name: Specify the DNS name or IP address of an Active
Directory server. By default, the field is populated with the address of
an Active Directory server in the Management Console’s domain. To
select a different Active Directory server, click Browse.
Port: 3268 (the default) is the Active Directory Global Catalog server
port. If the specified Active Directory server is not a Global Catalog
server, specify a different port (for example, 389).
Enable Encryption: Select this option if you want to use either
Kerberos* or NTLM to encrypt the current session. Encrypting the
session ensures that the Active Directory data imported by the
Management Console is secure during transmission.
Provide Credentials The Management Console requires a user account for
authentication to Active Directory.
User Name: Specify the login name of a user who has permission to
view the entire directory. We recommend that you use the domain
administrator.
Password: Specify the password for the user account.
Domain: Select the user’s domain.
Authentication Method: Select the authentication method required
by the Active Directory server (Basic, Kerberos, NTLM, Negotiate).
Locate Account Entry This page is displayed only If the administrator account you specified
is not in a standard Active Directory user container. Expand the
directory tree to locate and select the administrator’s container.
Select Authenticating
Domain(s)
To receive security policies, the Security client must authenticate to
Active Directory through a user or computer account. You must
identify the location of the users or computers that you want to be
able to authenticate. The first step is to select the domains that
contain the users or computers.
Select Client Container(s) The second step in identifying the location of the users or computers
that you want to be able to authenticate is to select the containers in
which the users or computers reside.
20 ZENworks Endpoint Security Management 4.1 Administration Guide
novdocx (en) 16 April 2010
3 If you have not already done so, click Finish to complete the directory service configuration.
The directory is added to the Directory Service Configurations list.
If you selected containers to synchronize, the Management Console begins the
synchronization. You can double-click in the Windows notification area to display the
Directory Services Synchronization dialog box.
The synchronization occurs in the background. If you exit the Management Console, the
synchronization stops. When you open the Management Console again, the synchronization
resumes where it left off.
Select Container(s) for
Synchronization
To publish a security policy to a user or computer, the user or
computer must be available in the Management Console. There are
two ways a user or computer becomes available in the console:
You use this page to synchronize the Management Console
with Active Directory. To do so, select the Active Directory
containers with users or computers you want to populate into
the Management Console. You can synchronize only the
containers you selected as Client containers (the previous
page).
Wait for the user or computer to authenticate through the
Security Client. When the user or computer checks in, it is
automatically added to the Management Console.
Synchronizing containers prepopulates the Management Console so
that you can immediately publish security policies to individual users
or computers. If you don’t synchronize containers, you must publish
security policies at the container level (which means all users or
computers in the container receive the policies) or wait for individual
users or computers to authenticate and be added to the
Management Console.
Wizard Page Explanation
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216

Novell ZENworks Endpoint Security Management 4.1 Administration Guide

Category
Software
Type
Administration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI