Novell ZENworks Endpoint Security Management 3.5 User Manual

Browse online or download User Manual for General utility software Novell ZENworks Endpoint Security Management 3.5. Novell ZENworks Endpoint Security Management 3.5 User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 245
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Endpoint Security Management

NovellZENworks®Endpoint Security Management3.5July 26, 2007 ADMINISTRATOR’S MANUAL

Page 2

ZENworks® ESM 3.5 Administrator’s Manual 10ZENworks Endpoint Security ManagementNovell's ZENworks Endpoint Security Management (ESM) provides com

Page 3 - Licenses

ZENworks® ESM 3.5 Administrator’s Manual 100ZSC UpdatePatches to repair any minor defects in the ZENworks Security Client are made available with regu

Page 4 - Contents

ZENworks® ESM 3.5 Administrator’s Manual 101VPN EnforcementThis rule enforces the use of either an SSL or a client-based VPN (Virtual Private Network)

Page 5

ZENworks® ESM 3.5 Administrator’s Manual 102Step 7: Enter the IP address(es) for the VPN Server in the provided field. If multiple addresses are enter

Page 6 - List of Figures

ZENworks® ESM 3.5 Administrator’s Manual 103Advanced VPN SettingsAdvanced VPN controls are used to set Authentication Timeouts to secure against VPN f

Page 7

ZENworks® ESM 3.5 Administrator’s Manual 104Note: VPN clients that generate virtual adapters (e.g., Cisco Systems VPN Client 4.0) will display the: &q

Page 8

ZENworks® ESM 3.5 Administrator’s Manual 105LocationsLocations are rule-groups assigned to network environments. These environments can be set in the

Page 9 - List of Tables

ZENworks® ESM 3.5 Administrator’s Manual 106Defined LocationsDefined locations may be created for the policy, or existing locations (those created for

Page 10

ZENworks® ESM 3.5 Administrator’s Manual 107Location SettingsSetting the Location IconThe location icon provides a visual cue to the user which identi

Page 11 - ESM Overview

ZENworks® ESM 3.5 Administrator’s Manual 108• Show Location in Client Menu - this setting allows the location to display in the cli-ent menu. If this

Page 12 - System Requirements

ZENworks® ESM 3.5 Administrator’s Manual 109Location ComponentsThe firewall settings, Wi-Fi Connectivity Control, and network environment settings are

Page 13 - USB/Wireless Security

ZENworks® ESM 3.5 Administrator’s Manual 11ESM OverviewESM consists of five high-level functional components: Policy Distribution Service, Management

Page 14 - Policy Distribution Service

ZENworks® ESM 3.5 Administrator’s Manual 110Communication Hardware SettingsCommunication hardware controls by location which hardware types are permit

Page 15 - Securing Server Access

ZENworks® ESM 3.5 Administrator’s Manual 111Enable allows complete access to the communication port.Disable denies all access to the communication por

Page 16 - Running the Service

ZENworks® ESM 3.5 Administrator’s Manual 112Storage Device ControlThis control overrides the global setting at this location. To access this control,

Page 17 - Management Service

ZENworks® ESM 3.5 Administrator’s Manual 113Network EnvironmentsIf the network parameters (Gateway server(s), DNS server(s), DHCP server(s), WINS serv

Page 18

ZENworks® ESM 3.5 Administrator’s Manual 114Step 4: Enter the following information for each service: • The IP address(es) - Limited to 15 characters,

Page 19

ZENworks® ESM 3.5 Administrator’s Manual 115Note: Changing the settings in a shared component will affect ALL OTHER instances of this same component.

Page 20 - Management Console

ZENworks® ESM 3.5 Administrator’s Manual 116Wi-Fi ManagementWi-Fi management allows the administrator to create Access Point (AP) lists. The wireless

Page 21

ZENworks® ESM 3.5 Administrator’s Manual 117Managed Access PointsESM provides a simple process to automatically distribute and apply Wired Equivalent

Page 22 - Menu Bar

ZENworks® ESM 3.5 Administrator’s Manual 118Filtered Access PointsAccess points entered into the Filtered Access Points list are the ONLY APs which wi

Page 23

ZENworks® ESM 3.5 Administrator’s Manual 119Wi-Fi Signal Strength SettingsWhen more than one WEP-managed access points (APs) are defined in the list,

Page 24 - Permissions Settings

ZENworks® ESM 3.5 Administrator’s Manual 12System RequirementsASP.NETThe Policy Distribution, Management, and Client Location Assurance services requi

Page 25 - Administrative Permissions

ZENworks® ESM 3.5 Administrator’s Manual 120Note: Although the above signal strength names match those used by Microsoft's Zero Configuration Ser

Page 26

ZENworks® ESM 3.5 Administrator’s Manual 121Wi-Fi SecurityIf Wi-Fi Communication Hardware (Wi-Fi adapter PCMCIA or other cards, and/or built-in Wi-Fi

Page 27 - Figure 8 : Publish To List

ZENworks® ESM 3.5 Administrator’s Manual 122Preference AP Selection by...A preference can be set to connect to APs by order of encryption level or by

Page 28 - Configuration Window

ZENworks® ESM 3.5 Administrator’s Manual 123Firewall SettingsFirewall Settings control the connectivity of all networking ports, Access Control lists,

Page 29 - Example:

ZENworks® ESM 3.5 Administrator’s Manual 124Additional ports and lists may be added to the firewall settings, and given unique behaviors which will ov

Page 30

ZENworks® ESM 3.5 Administrator’s Manual 125TCP/UDP PortsEndpoint data is primarily secured by controlling TCP/UDP port activity. This feature allows

Page 31

ZENworks® ESM 3.5 Administrator’s Manual 126• Open - All network inbound and outbound traffic is allowed. Because all net-work traffic is allowed your

Page 32 - Service Synchronization

ZENworks® ESM 3.5 Administrator’s Manual 127Several TCP/UDP port groups have been bundled and are available at installation:Table 3: TCP/UDP PortsName

Page 33 - Alerts Monitoring

ZENworks® ESM 3.5 Administrator’s Manual 128Access Control ListsThere may be some addresses which require unsolicited traffic be passed regardless of

Page 34

ZENworks® ESM 3.5 Administrator’s Manual 129• IP - This type limits the address to 15 characters, and only containing the num-bers 0-9 and periods (ex

Page 35 - Figure 14 : Alert Reporting

ZENworks® ESM 3.5 Administrator’s Manual 13About the ESM ManualsThe ZENworks Endpoint Security Management manuals provide three levels of guidance for

Page 36 - Reporting

ZENworks® ESM 3.5 Administrator’s Manual 130Network Address Macros ListThe following is a list of special Access Control macros. These can be associat

Page 37

ZENworks® ESM 3.5 Administrator’s Manual 131[Dns] Represents current client IP configuration Default DNS server address. When this value is entered, t

Page 38 - Figure 20 : No data

ZENworks® ESM 3.5 Administrator’s Manual 132Application ControlsThis feature allows the administrator to block applications either from gaining networ

Page 39

ZENworks® ESM 3.5 Administrator’s Manual 133• All Allowed - all applications listed will be permitted to execute and have net-work access • No Executi

Page 40

ZENworks® ESM 3.5 Administrator’s Manual 134If the same application is added to two different application controls in the same firewall setting (i.e.,

Page 41

ZENworks® ESM 3.5 Administrator’s Manual 135Integrity and Remediation RulesESM provides the ability to verify required software is running on the endp

Page 42

ZENworks® ESM 3.5 Administrator’s Manual 136Antivirus/Spyware RulesAntivirus/spyware Rules verify that designated antivirus or spyware software on the

Page 43

ZENworks® ESM 3.5 Administrator’s Manual 137Custom tests for software not on the default list may be created. A single test can be created to run chec

Page 44

ZENworks® ESM 3.5 Administrator’s Manual 138Integrity TestsEach integrity test can run two checks, File Exists and Process Running. Each test will hav

Page 45

ZENworks® ESM 3.5 Administrator’s Manual 139• Message - select a custom user message to be displayed at test failure. This can include remediation ste

Page 46

ZENworks® ESM 3.5 Administrator’s Manual 14Policy Distribution ServiceThe Policy Distribution Service is a web service application that, when requeste

Page 47

ZENworks® ESM 3.5 Administrator’s Manual 140Integrity ChecksThe checks for each test determine if one or more of the antivirus/spyware process is runn

Page 48 - Generating Custom Reports

ZENworks® ESM 3.5 Administrator’s Manual 141• None • Equal • Equal or Greater • Equal or Less • Compare by - Age or Date• Date ensures the file is no

Page 49

ZENworks® ESM 3.5 Administrator’s Manual 142Advanced Scripting RulesESM includes an advanced rule scripting tool which gives administrators the abilit

Page 50

ZENworks® ESM 3.5 Administrator’s Manual 143• Timer Run Every- set the time to run every minute, hour, or day • Miscellaneous Events - the script will

Page 51

ZENworks® ESM 3.5 Administrator’s Manual 144Script VariablesThis is an optional setting, which permits the Administrator to define a variable (var) fo

Page 52

ZENworks® ESM 3.5 Administrator’s Manual 145Script TextThe ESM Administrator is not limited to the type of script the ZENworks Security Client may exe

Page 53

ZENworks® ESM 3.5 Administrator’s Manual 146Rule Scripting ParametersThe ZENworks Endpoint Security Management (ESM) supports standard Jscript and VBS

Page 54

ZENworks® ESM 3.5 Administrator’s Manual 147The interfaces are as follows:1. IClientAdapter. This interface describes an adapter in the client networ

Page 55 - Figure 36 : Select Style

ZENworks® ESM 3.5 Administrator’s Manual 148Trigger EventsTriggers are events that cause the Endpoint Security Client to determine when and if a rule

Page 56 - New (see Figure 38)

ZENworks® ESM 3.5 Administrator’s Manual 149• ProcessChangeDesc: Trigger whenever a process is created or deleted.Parameters: None.• St

Page 57

ZENworks® ESM 3.5 Administrator’s Manual 15Securing Server AccessPhysical Access ControlPhysical access to the Distribution Service Server should be c

Page 58

ZENworks® ESM 3.5 Administrator’s Manual 150Script NamespacesGeneral Enumerations and File substitutionsEAccessStateeApplyGlobalSetting = -1eDisableAc

Page 59

ZENworks® ESM 3.5 Administrator’s Manual 151EMATCHTYPE eUNDEFINED eLOCALIP eGATEWAY eDNS

Page 60 - Key Management

ZENworks® ESM 3.5 Administrator’s Manual 152 eRUN eSTOP ePAUSE ePENDING eNO

Page 61

ZENworks® ESM 3.5 Administrator’s Manual 153Action NamespaceCheckForUpdateJScriptAction.CheckForUpdate();VBScriptAction.CheckForUpdate()ClearFixedShie

Page 62

ZENworks® ESM 3.5 Administrator’s Manual 154else Action.Trace("ret = false");VBScriptAction.SetShieldStateByName "Closed",trueAct

Page 63

ZENworks® ESM 3.5 Administrator’s Manual 155VBScriptAction.SwitchLocationByName("Base")Action.Stamp()Action.Trace("Begin 20 second slee

Page 64

ZENworks® ESM 3.5 Administrator’s Manual 156var ret = Action.DeleteRegistryKey(eLOCAL_MACHINE,"Software\\Novell\\Tester");if(ret == true) A

Page 65 - USB Drive Scanner

ZENworks® ESM 3.5 Administrator’s Manual 157NoteThe first parameter of the DisplayMessage call is a unique integer identifier for each action. When ca

Page 66

ZENworks® ESM 3.5 Administrator’s Manual 158Action.EnableAdapterType true, eWIREDAction.EnableAdapterType false, eDIALUPCONNAction.EnableAdapterType t

Page 67

ZENworks® ESM 3.5 Administrator’s Manual 159Details:Preliminary setup required creating a policy which included a new Integrity rule with a custom mes

Page 68

ZENworks® ESM 3.5 Administrator’s Manual 16Running the ServiceThe Policy Distribution Service launches immediately following installation, with no reb

Page 69 - Updating the Encryption Keys

ZENworks® ESM 3.5 Administrator’s Manual 160Action.Message "Display sync message"Synchronous Message (displayed and waits for user respond b

Page 70

ZENworks® ESM 3.5 Administrator’s Manual 161StartServiceJScriptAction.StartService("lanmanworkstation","");VBScriptAction.StartSer

Page 71 - Upgrading the ZSC

ZENworks® ESM 3.5 Administrator’s Manual 162dim retret = Action.CreateRegistryKey(eLOCAL_MACHINE,"Software\\Novell","Tester")if(re

Page 72 - Running the ZSC

ZENworks® ESM 3.5 Administrator’s Manual 163Query NamespaceFileExistsVersionJScriptvar ret;ret = Query.FileExistsVersion("C:","ocalco.e

Page 73

ZENworks® ESM 3.5 Administrator’s Manual 164adplength = adplist.Length;Action.Trace("adplength = " + adplength);if(adplength > 0){ adp =

Page 74

ZENworks® ESM 3.5 Administrator’s Manual 165 Action.Trace("IP = " & adp.IP) Action.Trace("MAC = " & adp.MAC) Action.Tra

Page 75 - Remove Temporary Files

ZENworks® ESM 3.5 Administrator’s Manual 166envdatalength = Query.LocationMatchCount;Action.Trace("MatchCount = " + envdatalength);if(envdat

Page 76

ZENworks® ESM 3.5 Administrator’s Manual 167This script requires an environment to be defined for a location in the policy in order to provide useful

Page 77

ZENworks® ESM 3.5 Administrator’s Manual 168ret = Query.IsAuthenticated()Action.Trace("Is authenticated = " & ret)IsWindowsXPJScriptvar

Page 78

ZENworks® ESM 3.5 Administrator’s Manual 169Action.Trace("Is Win2000 = " & ret)RegistryKeyExistsJScriptvar ret;ret = Query.RegistryKeyEx

Page 79

ZENworks® ESM 3.5 Administrator’s Manual 17Management ServiceThe Management Service is the central service for ESM. It is used to create authenticatio

Page 80 - Figure 54 : Logging Window

ZENworks® ESM 3.5 Administrator’s Manual 170RegistryValueExistsJScript var ret; ret = Query.RegistryKeyExists(eLOCAL_MACHINE,"Softw

Page 81

ZENworks® ESM 3.5 Administrator’s Manual 171dim retret = Query.RegistryKeyExists(eLOCAL_MACHINE,"Software\\Novell\\Logging")Action.Trace(&qu

Page 82

ZENworks® ESM 3.5 Administrator’s Manual 172ret = Query.PolicyUuid;Action.Trace("PolicyUuid = " + ret);ret = Query.LocationIsStamped;Action.

Page 83

ZENworks® ESM 3.5 Administrator’s Manual 173RemovableMediaStateCDMediaStateHDCStateWiFiDisabledStateWiFiDisabledWhenWiredStateAdHocDisabledStateAdapte

Page 84 - IMPORTANT:

ZENworks® ESM 3.5 Administrator’s Manual 174Action.Trace("WiFiDisabledWhenWiredState = " + ret);ret = Action.AdHocDisabledState(eApplyGlobal

Page 85 - Figure 61 : Show Usage Window

ZENworks® ESM 3.5 Administrator’s Manual 175Action.Trace("AdHocDisabledState = " + ret);ret = Action.AdapterBridgeDisabledState(eApplyGlobal

Page 86

ZENworks® ESM 3.5 Administrator’s Manual 176ret = Action.AdHocDisabledState(eApplyGlobalSetting, ePolicyChange)Action.Trace("AdHocDisabledState =

Page 87 - Creating Security Policies

ZENworks® ESM 3.5 Administrator’s Manual 177ret = Action.AdapterBridgeDisabledState(eApplyGlobalSetting, eLocationChange)Action.Trace("AdapterBri

Page 88 - Custom User Messages

ZENworks® ESM 3.5 Administrator’s Manual 178ret = Query.HDCState(eBlueTooth);Action.Trace("HDCState(eBlueTooth) = " + ret);ret = Query.HDCSt

Page 89 - Hyperlinks

ZENworks® ESM 3.5 Administrator’s Manual 179Action.Trace("HDCState(e1394) = " & ret)ret = Query.HDCState(eBlueTooth)Action.Trace("H

Page 90 - Global Policy Settings

ZENworks® ESM 3.5 Administrator’s Manual 18Securing Server AccessPhysical Access ControlPhysical access to the Management Server should be controlled

Page 91

ZENworks® ESM 3.5 Administrator’s Manual 180Example - "global" variable between scripts: "boolWarnedOnPreviousLoop"Storage.Persist

Page 92 - Wireless Control

ZENworks® ESM 3.5 Administrator’s Manual 181Action.Trace("GetPersistString = " + ret);VBScriptdim retStorage.SetPersistString "teststr&

Page 93

ZENworks® ESM 3.5 Administrator’s Manual 182Storage.RetrySeconds = 30ret = Storage.RetrySecondsAction.Trace("RetrySeconds = " & ret)Inte

Page 94

ZENworks® ESM 3.5 Administrator’s Manual 183 ret = env.GatewayCount; Action.Trace("GatewayCount = " + ret); ret = env.WINSCount; Action.

Page 95

ZENworks® ESM 3.5 Administrator’s Manual 184DeviceIDSee Query Namespace - GetAdaptersEnabledSee Query Namespace - GetAdaptersIPSee Query Namespace - G

Page 96

ZENworks® ESM 3.5 Administrator’s Manual 185JScriptvar adplist;var adplength;var adp;var env;var ret;var item;adplist = Query.GetAdapters();adplength

Page 97

ZENworks® ESM 3.5 Administrator’s Manual 186dim adpdim envdim retdim itemset adplist = Query.GetAdapters()adplength = adplist.LengthAction.Trace("

Page 98 - Data Encryption

ZENworks® ESM 3.5 Administrator’s Manual 187adplist = Query.GetAdapters();adplength = adplist.Length;Action.Trace("adplength = " + adplength

Page 99

ZENworks® ESM 3.5 Administrator’s Manual 188Action.Trace("adplength = " & CInt(adplength))if(CInt(adplength) > 0) then set adp = adp

Page 100 - ZSC Update

ZENworks® ESM 3.5 Administrator’s Manual 189{ adp = adplist.Item(0); env = adp.GetNetworkEnvironment(); ret = env.GatewayCount; Action.Trace("

Page 101 - VPN Enforcement

ZENworks® ESM 3.5 Administrator’s Manual 19Running the ServiceThe Management Service launches immediately following installation, with no reboot of th

Page 102

ZENworks® ESM 3.5 Administrator’s Manual 190 ret = env.GatewayCount Action.Trace("GatewayCount = " & ret) if(ret > 0) then set

Page 103

ZENworks® ESM 3.5 Administrator’s Manual 191 { item = env.GetWINSItem(0); ret = item.IP; Action.Trace("IP = " + ret); }}VBScript

Page 104

ZENworks® ESM 3.5 Administrator’s Manual 192end ifGetWirelessAPItemWirelessAPCountJScriptvar adplist;var adplength;var adp;var env;var apitem;var adpt

Page 105 - Locations

ZENworks® ESM 3.5 Administrator’s Manual 193 env = adp.GetNetworkEnvironment(); apcount = env.WirelessAPCount; Action.Trace("Wirel

Page 106

ZENworks® ESM 3.5 Administrator’s Manual 194 if(adptype = eWIRELESS) then Action.Trace("Wireless index = " & i) adpname = a

Page 107 - Location Settings

ZENworks® ESM 3.5 Administrator’s Manual 195See IClientNetEnv Interface - GetWirelessAPItemMaxRssiSee IClientNetEnv Interface - GetWirelessAPItemMinRs

Page 108

ZENworks® ESM 3.5 Administrator’s Manual 196strStartMenu = WshShell.SpecialFolders("AllUsersPrograms")Dim strDesktopstrDesktop = WshShell.Sp

Page 109 - Location Components

ZENworks® ESM 3.5 Administrator’s Manual 197oShellLinkStartMenu.Hotkey = "CTRL+SHIFT+W"oShellLinkStartMenu.IconLocation = "C:\Program F

Page 110

ZENworks® ESM 3.5 Administrator’s Manual 198fileHandle.WriteLine "WshShell.RegWrite ""HKLM\SOFTWARE\Novell\MSC\STUWA"", "

Page 111

ZENworks® ESM 3.5 Administrator’s Manual 199Action.Trace("CurLoc is: " + CurLoc);if (CurLoc == "Desired Location"){//only run thi

Page 112 - Storage Device Control

The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.PN: AM30

Page 113 - Network Environments

ZENworks® ESM 3.5 Administrator’s Manual 20Management ConsoleThe Management Console is the central access and control for the Management Service. Doub

Page 114

ZENworks® ESM 3.5 Administrator’s Manual 200//Action.EnableAdapterType (false, eWIRELESS );}else{Action.Trace("NO Wired connection found.");

Page 115 - Step 4: Click Save

ZENworks® ESM 3.5 Administrator’s Manual 201//Action.EnableAdapterType (false, eWIRELESS );}else{Action.Trace("NO Dialup connection found.")

Page 116 - Wi-Fi Management

ZENworks® ESM 3.5 Administrator’s Manual 202Stamp Once ScriptThe Stamp Once script enforces a single network environment save at a designated location

Page 117

ZENworks® ESM 3.5 Administrator’s Manual 203Block Gray List ScriptThis script will block ALL non-approved software from executing. This script is a Gl

Page 118

ZENworks® ESM 3.5 Administrator’s Manual 204Compliance ReportingBecause of the level and access of the ZSC's drivers, virtually every transaction

Page 119

ZENworks® ESM 3.5 Administrator’s Manual 205• Detected network environments - the ZENworks Security Client will report all detected network environmen

Page 120

ZENworks® ESM 3.5 Administrator’s Manual 206Publishing Security PoliciesCompleted security policies are sent to the end-users using the publishing mec

Page 121 - Wi-Fi Security

ZENworks® ESM 3.5 Administrator’s Manual 207To publish a policy, perform the following steps:Step 1: Select a user group (or single users) from the di

Page 122

ZENworks® ESM 3.5 Administrator’s Manual 208Exporting a PolicyPolicies may be exported from the Management Console and distributed via email or throug

Page 123 - Firewall Settings

ZENworks® ESM 3.5 Administrator’s Manual 209Importing PoliciesA policy can be imported from any file location on the available network. Step 1: In the

Page 124

ZENworks® ESM 3.5 Administrator’s Manual 21Policy TasksThe Primary function of the Management Console is the creation and dissemination of Security Po

Page 125 - TCP/UDP Ports

ZENworks® ESM 3.5 Administrator’s Manual 210Exporting Policies to Unmanaged UsersIf Unmanaged ZENworks Security Clients have been deployed within the

Page 126 - Associate Component

ZENworks® ESM 3.5 Administrator’s Manual 211TroubleshootingOverviewCommon issues with ESM can be traced to problems with server operability. The follo

Page 127 - Table 3: TCP/UDP Ports

ZENworks® ESM 3.5 Administrator’s Manual 212Allowing ASP.NET 1.1 FunctionsTo run the ESM back-end services on a Windows 2003 web server, ASP.NET 1.1 f

Page 128 - Access Control Lists

ZENworks® ESM 3.5 Administrator’s Manual 213Figure 103 : Allowing ASP.NETStep 4: This will activate the ASP.NET functions, and allow the Policy Distri

Page 129

ZENworks® ESM 3.5 Administrator’s Manual 214Server Communication ChecksFigure 104 : Communications ConsoleThe Communications Console is an initializat

Page 130 - Network Address Macros List

ZENworks® ESM 3.5 Administrator’s Manual 215bution Service. If this test fails, the file is missing or an incorrect path may have been specified by th

Page 131 - Macro Description

ZENworks® ESM 3.5 Administrator’s Manual 216• Create Management Signature KeysThis test verifies that the unique signature keys used for information s

Page 132 - Application Controls

ZENworks® ESM 3.5 Administrator’s Manual 217• (DS) https://machinename/policyserver/policyserver.soap?wsdl (server)Figure 106 : Distribution Service -

Page 133

ZENworks® ESM 3.5 Administrator’s Manual 218• (MS) https://machinename/authenticationhelper/authenicationhelper.soap?wsdl (server)Figure 108 : Managem

Page 134 - Name Applications

ZENworks® ESM 3.5 Administrator’s Manual 219Getting Trace Information from the Management Server AgentSome of the services have tracing built into the

Page 135

ZENworks® ESM 3.5 Administrator’s Manual 22configurable, granting total control over when and how frequently alerts are triggered. See “Alerts Monitor

Page 136 - Antivirus/Spyware Rules

ZENworks® ESM 3.5 Administrator’s Manual 220<system.diagnostics> <trace autoflush="true"> <listeners> <

Page 137 - Add New button

ZENworks® ESM 3.5 Administrator’s Manual 221Troubleshooting SQL Server IssuesSystem Monitor System Monitor is a MMC snap-in that lets you view real-ti

Page 138 - Figure 95 : Integrity Tests

ZENworks® ESM 3.5 Administrator’s Manual 222• Computer - This option allows you to select whether to add counters from the local computer or any remot

Page 139

ZENworks® ESM 3.5 Administrator’s Manual 223• Processor• Physical Disk•NetworkFor a managed installation of ESM, the objects that you should monitor i

Page 140 - Figure 96 : Integrity Checks

ZENworks® ESM 3.5 Administrator’s Manual 224Securing SQL Database PasswordsThe SQL database passwords (if used) are stored as clear text in many of th

Page 141

ZENworks® ESM 3.5 Administrator’s Manual 225Microsoft SQL Profiler SQL Profiler is a graphical tool that allows system administrators to monitor event

Page 142 - Advanced Scripting Rules

ZENworks® ESM 3.5 Administrator’s Manual 226running, the event classes and data columns that describe the event data are displayed in SQL Profiler.Tem

Page 143 - Associate New

ZENworks® ESM 3.5 Administrator’s Manual 227• An opened cursor.• Security permissions checks. All of the data that is generated as a result of an even

Page 144 - Figure 98 : Script Variables

ZENworks® ESM 3.5 Administrator’s Manual 228Step 2: On the File menu, click Stop Trace, or close a trace window. To Save Trace results:Step 1: On the

Page 145

ZENworks® ESM 3.5 Administrator’s Manual 229Tracing Novell Database InstallationsThe Novell Database architecture uses stored procedures extensively t

Page 146 - Rule Scripting Parameters

ZENworks® ESM 3.5 Administrator’s Manual 23• About - launches the About window, which displays the installation type (ESM or UWS (see “USB/Wireless Se

Page 147

ZENworks® ESM 3.5 Administrator’s Manual 230In this example we see that the user has a schema, policies, SUS files and an EFS key published (determine

Page 148 - Trigger Events

ZENworks® ESM 3.5 Administrator’s Manual 23151 = Component40 = Encryption Key49 = Policy Signature58 = Schema54 = License48 = SUS File

Page 149

ZENworks® ESM 3.5 Administrator’s Manual 232Event LogsThe Servers all log very extensive information on exception, for example:General Information ***

Page 150

ZENworks® ESM 3.5 Administrator’s Manual 233 at Novell.ApplicationBlocks.Data.OleDbHelper.ExecuteNonQuery(OleDbConnection connection, CommandType co

Page 151

ZENworks® ESM 3.5 Administrator’s Manual 234Microsoft SQL Enterprise ManagerSQL Server Enterprise Manager is the primary administrative tool for Micro

Page 152

ZENworks® ESM 3.5 Administrator’s Manual 235Figure 114 : Example Configuration TableREPOSITORY: Contains the binary data for reporting, policies, etc.

Page 153

ZENworks® ESM 3.5 Administrator’s Manual 236Figure 116 : Example Organization TableORG_REP: Contains the Item to User and Item to Group assignments.Fi

Page 154

ZENworks® ESM 3.5 Administrator’s Manual 237Figure 118 : Example Event TableEVENT_CLIENTDATA: Contains the data uploaded by the client (can be manuall

Page 155 - Details:

ZENworks® ESM 3.5 Administrator’s Manual 23829. Distribution Server Reporting Poll Frequency30. Report Server Notification Poll Frequency (future)31.

Page 156

ZENworks® ESM 3.5 Administrator’s Manual 239ORGANIZATION: Contains the user and group information. The ORG_UID represents the credential assigned to t

Page 157

ZENworks® ESM 3.5 Administrator’s Manual 24Permissions SettingsThis control is found in the Tools menu, and is only accessible by the primary administ

Page 158

ZENworks® ESM 3.5 Administrator’s Manual 240PUBLISH_ORGANIZATION_AUDIT: Contains the user to policy (poa_ref_id) association to be published to the us

Page 159

ZENworks® ESM 3.5 Administrator’s Manual 241Acronym GlossaryACL Access Control ListAP Access PointARP Address Request ProtocolCLAS Client Locations A

Page 160

ZENworks® ESM 3.5 Administrator’s Manual 242SNAP Scalable Node Address ProtocolSNR Signal to Noise RatioSQL Structured English Query LanguageSSID Ser

Page 161

ZENworks® ESM 3.5 Administrator’s Manual 243IndexNumerics1394 (FireWire™) ... 110AAccess Control Lists ...

Page 162

ZENworks® ESM 3.5 Administrator’s Manual 244IrDA® ... 110KKey ...

Page 163

ZENworks® ESM 3.5 Administrator’s Manual 245VView Policy ... 76VPN Adapter Controls ...

Page 164

ZENworks® ESM 3.5 Administrator’s Manual 25Administrative PermissionsTo set the Administrative Permissions, perform the following steps:Step 1: Open t

Page 165

ZENworks® ESM 3.5 Administrator’s Manual 26b. Select the appropriate users/groups from the list. To select multiple users, select individually by hold

Page 166

ZENworks® ESM 3.5 Administrator’s Manual 27 Figure 8 : Publish To ListStep 4: To remove a selected user/group, highlight the name in the list, and cli

Page 167

ZENworks® ESM 3.5 Administrator’s Manual 28Configuration WindowThe Configuration window gives the ESM Administrator access to the Infrastructure and S

Page 168

ZENworks® ESM 3.5 Administrator’s Manual 29Example:If the current URL is listed as http:\\ACME\PolicyServer\ShieldClient.asmx and the Policy Distribut

Page 169

LicensesFIPS Certified AES CryptoCompilation Copyright (c) 1995-2003 by Wei Dai. All rights reserved. This copyright applies only to this software di

Page 170

ZENworks® ESM 3.5 Administrator’s Manual 30Authenticating DirectoriesPolicies are distributed to end-users by interrogating the Enterprise's exis

Page 171

ZENworks® ESM 3.5 Administrator’s Manual 31• No authentication - login and password not required for connection to direc-tory service• Secure authenti

Page 172

ZENworks® ESM 3.5 Administrator’s Manual 32Service SynchronizationThis control lets you to force a synchronization of the Management Service and Polic

Page 173

ZENworks® ESM 3.5 Administrator’s Manual 33Alerts MonitoringAlerts monitoring allows the ESM Administrator to effortlessly gauge at a glance the secur

Page 174

ZENworks® ESM 3.5 Administrator’s Manual 34Configuring ESM for AlertsAlerts monitoring requires reporting data be collected and uploaded at regular in

Page 175

ZENworks® ESM 3.5 Administrator’s Manual 35Step 2: Adjust the trigger threshold by first, selecting condition from the drop down list. This states whe

Page 176

ZENworks® ESM 3.5 Administrator’s Manual 36any potential corporate security issues. Additional information can be found by opening Reporting. Once rem

Page 177

ZENworks® ESM 3.5 Administrator’s Manual 37ReportingThe Reporting Service provides Adherence and Status reports for the Enterprise. The available data

Page 178

ZENworks® ESM 3.5 Administrator’s Manual 38Figure 18 : Report ToolbarWhen reviewing reports, the arrow buttons will help you navigate through each pag

Page 179

ZENworks® ESM 3.5 Administrator’s Manual 39Adherence ReportsAdherence Reports provide compliance information regarding the distribution of security po

Page 180

ZENworks® ESM 3.5 Administrator’s Manual 4ContentsContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 181

ZENworks® ESM 3.5 Administrator’s Manual 40Alert Drill-Down ReportsAdditional alert information is available in these drill-down reports. These report

Page 182

ZENworks® ESM 3.5 Administrator’s Manual 41Application Control Report Reports all unauthorized attempts by blocked applications to access the network

Page 183

ZENworks® ESM 3.5 Administrator’s Manual 42Encryption Solution ReportsWhen endpoint encryption is activated, reports on the transference of files to a

Page 184

ZENworks® ESM 3.5 Administrator’s Manual 43Chart Percentage of ZSC Update FailuresCharts the percentage of ZSC Update that have failed (and not been r

Page 185

ZENworks® ESM 3.5 Administrator’s Manual 44Information gathered from individual clients about what locations are used, and when. Dates displayed in UT

Page 186

ZENworks® ESM 3.5 Administrator’s Manual 45Outbound Content Compliance ReportsProvides information regarding the use of removable drives and identifie

Page 187

ZENworks® ESM 3.5 Administrator’s Manual 46Administrative Overrides ReportReports instances where client self-defence mechanisms have been administrat

Page 188

ZENworks® ESM 3.5 Administrator’s Manual 47Figure 24 : Sample Wireless Environment History report

Page 189

ZENworks® ESM 3.5 Administrator’s Manual 48Generating Custom ReportsSoftware RequirementsODBC-compliant reporting tools (i.e., Crystal Reports, Brio,

Page 190

ZENworks® ESM 3.5 Administrator’s Manual 49 Figure 26 : Report Document Properties• The report may not contain any sub-reports.• Filtering parameters

Page 191

ZENworks® ESM 3.5 Administrator’s Manual 5Hyperlinks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 192

ZENworks® ESM 3.5 Administrator’s Manual 50may also be a member of an organization unit or security groups. Each row represents a relationship of orga

Page 193

ZENworks® ESM 3.5 Administrator’s Manual 51EVENT_CLIENTRULE_FACT_VW: This view describes the generic reporting mechanism for integrity and scripting r

Page 194

ZENworks® ESM 3.5 Administrator’s Manual 52Step 2: The simplest method for this example is to create a report using the wizard (see Figure 29) Figure

Page 195 - Sample Scripts

ZENworks® ESM 3.5 Administrator’s Manual 53Step 4: Using the connection definition wizard (see Figure 31), define an OLEDB ADO connection to the Repor

Page 196

ZENworks® ESM 3.5 Administrator’s Manual 54Step 6: Select the source table or view that you will be using for your report by expanding the tree nodes

Page 197

ZENworks® ESM 3.5 Administrator’s Manual 55Step 8: If you are planning to group or summarize your data, click the Group tab and select the columns you

Page 198

ZENworks® ESM 3.5 Administrator’s Manual 56 Figure 37 : Visual Basic Report BuilderStep 10: To set up a filter, right click on the Parameter Fields it

Page 199

ZENworks® ESM 3.5 Administrator’s Manual 57Step 11: The following filter allows you to select multiple users to filter by with the prompting text of &

Page 200

ZENworks® ESM 3.5 Administrator’s Manual 58Step 13: So, using the new parameter, specify only the records where the field equals the values selected i

Page 201

ZENworks® ESM 3.5 Administrator’s Manual 59ZENworks Storage Encryption SolutionZENworks Storage Encryption Solution (SES) provides complete, centraliz

Page 202

ZENworks® ESM 3.5 Administrator’s Manual 6List of FiguresFigure 1: Effectiveness of NDIS-layer firewall . . . . . . . . . . . . . . . . . . . . . . .

Page 203 - Control

ZENworks® ESM 3.5 Administrator’s Manual 60Key ManagementKey management permits you to backup, import, and update an encryption key. It is recommended

Page 204 - Compliance Reporting

ZENworks® ESM 3.5 Administrator’s Manual 61Export Encryption KeysFor backup purposes, and to send the key to another Management Service instance, the

Page 205

ZENworks® ESM 3.5 Administrator’s Manual 62ZENworks File Decryption UtilityThe ZENworks File Decryption Utility is used to extract protected data from

Page 206 - Publishing Security Policies

ZENworks® ESM 3.5 Administrator’s Manual 63Override-Password Key GeneratorProductivity interruptions that a user may experience due to restrictions to

Page 207

ZENworks® ESM 3.5 Administrator’s Manual 64Step 1: Open the Override-Password Key Generator through Start\All Programs\Novell\ESM Management Console\O

Page 208 - Exporting a Policy

ZENworks® ESM 3.5 Administrator’s Manual 65USB Drive ScannerAn authorized USB device list can be generated and imported into a policy using the option

Page 209 - Importing Policies

ZENworks® ESM 3.5 Administrator’s Manual 66 Figure 45 : Scan for Device Name and Serial NumberStep 4: Repeat steps 2 and 3 until all devices have been

Page 210 - Program

ZENworks® ESM 3.5 Administrator’s Manual 67Client Location Assurance ServiceThe Client Location Assurance Service (CLAS) is an optional feature that p

Page 211 - Troubleshooting

ZENworks® ESM 3.5 Administrator’s Manual 68Securing Server AccessPhysical Access ControlPhysical access to the CLAS Server should be controlled to pre

Page 212 - Figure 102 : Open IIS Manager

ZENworks® ESM 3.5 Administrator’s Manual 69Optional Server ConfigurationsMultiple CLAS iterations may be installed on servers throughout the enterpris

Page 213 - Figure 103 : Allowing ASP.NET

ZENworks® ESM 3.5 Administrator’s Manual 7Figure 52: Client Driver Status Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 214

ZENworks® ESM 3.5 Administrator’s Manual 70ZENworks Security Client ManagementESM utilizes an installed client application to enforce complete securit

Page 215

ZENworks® ESM 3.5 Administrator’s Manual 71Note:To specify the uninstall password you can also pass this MSI Property: STUIP=\”password goes here\”It

Page 216

ZENworks® ESM 3.5 Administrator’s Manual 72Setting the Upgrade SwitchStep 1: Open the new installation package for the ZSC and right-click setup.exe.S

Page 217

ZENworks® ESM 3.5 Administrator’s Manual 73Note:The machine must be a member of the Policy Distribution Service's domain for the first policy sen

Page 218 - (server)

ZENworks® ESM 3.5 Administrator’s Manual 74ZENworks Security Client Diagnostics ToolsThe ZENworks Security Client features several diagnostics tools w

Page 219 - Figure 109 : Trace Log

ZENworks® ESM 3.5 Administrator’s Manual 75To create a diagnostics package, perform the following steps:Step 1: Right-click on the ZSC icon and select

Page 220

ZENworks® ESM 3.5 Administrator’s Manual 76check individual logs. Otherwise, the files generated will unnecessarily take up disk space over time.Admin

Page 221

ZENworks® ESM 3.5 Administrator’s Manual 77The policy display divides the policy components into the following tabs:• General - displays the global an

Page 222

ZENworks® ESM 3.5 Administrator’s Manual 78Variables are created by clicking Add, which will display a second window (see Figure 51) where the variabl

Page 223

ZENworks® ESM 3.5 Administrator’s Manual 79SettingsAdministrators can adjust the settings for the ZENworks Security Client without having to perform a

Page 224

ZENworks® ESM 3.5 Administrator’s Manual 8Figure 106: Distribution Service - Server Communication. . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 225

ZENworks® ESM 3.5 Administrator’s Manual 80Reset Uninstall PasswordResets the password required to uninstall the ZSC. The administrator will be prompt

Page 226

ZENworks® ESM 3.5 Administrator’s Manual 81Figure 55 : Comment WindowNote:If the Comments option in logging is unchecked, the Add Comments button will

Page 227

ZENworks® ESM 3.5 Administrator’s Manual 82The duration settings for each report type are:• Off - data will not be gathered • On - data will be gather

Page 228

ZENworks® ESM 3.5 Administrator’s Manual 83Creating and Distributing ESM Security PoliciesSecurity Policies are used by the ZENworks Security Client t

Page 229 - Figure 112 : Database Tracing

ZENworks® ESM 3.5 Administrator’s Manual 84Policy ToolbarThe policy toolbar (see Figure 59) provides four controls. The Save control is available thro

Page 230 - Figure 113 : Trace Sample

ZENworks® ESM 3.5 Administrator’s Manual 85IMPORTANT: Changes made to associated components will affect all other instances of that component. Example

Page 231

ZENworks® ESM 3.5 Administrator’s Manual 86Error NotificationWhen the administrator attempts to save a policy with incomplete or incorrect data in a c

Page 232

ZENworks® ESM 3.5 Administrator’s Manual 87Creating Security PoliciesTo create a new policy, click Create Policy. The Create Policy window displays. E

Page 233

ZENworks® ESM 3.5 Administrator’s Manual 88Custom User MessagesCustom User Messages allow the ESM Administrator to create messages which directly answ

Page 234

ZENworks® ESM 3.5 Administrator’s Manual 89HyperlinksAn administrator can incorporate hyperlinks in custom messages to assist in explaining security p

Page 235

ZENworks® ESM 3.5 Administrator’s Manual 9List of TablesTable 1: System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 236

ZENworks® ESM 3.5 Administrator’s Manual 90Global Policy SettingsThe global policy settings are applied as basic defaults for the policy. To access th

Page 237

ZENworks® ESM 3.5 Administrator’s Manual 91• Policy Update Message - A Custom User Message can be displayed whenever the policy is updated. Click on t

Page 238

ZENworks® ESM 3.5 Administrator’s Manual 92Wireless ControlWireless Control globally sets adapter connectivity parameters to secure both the endpoint

Page 239

ZENworks® ESM 3.5 Administrator’s Manual 93• Disable AdHoc NetworksThis setting globally disables all AdHoc connectivity, thereby enforcing Wi-Fi con-

Page 240

ZENworks® ESM 3.5 Administrator’s Manual 94Global Communication Hardware ControlThis component sets the policy defaults for all communication hardware

Page 241 - Acronym Glossary

ZENworks® ESM 3.5 Administrator’s Manual 95Storage Device ControlThis control sets the default storage device settings for the policy, where all exter

Page 242

ZENworks® ESM 3.5 Administrator’s Manual 96• Disable - The device type is disallowed. When users attempt to access files on a defined storage device,

Page 243

ZENworks® ESM 3.5 Administrator’s Manual 97Preferred DevicesPreferred Removable Storage Devices may be optionally entered into a list, permitting only

Page 244

ZENworks® ESM 3.5 Administrator’s Manual 98Data EncryptionData Encryption determines whether file encryption will be enforced on the endpoint, and wha

Page 245

ZENworks® ESM 3.5 Administrator’s Manual 99Determine what levels of encryption will be permitted by this policy: • Enable “Safe Harbor” encrypted fold

Comments to this Manuals

No comments