The Endpoint Security Client protects client data by determining in real-time the network location of the endpoint. Based on that location, the Endpoint Security Client does the following:
Implements policy-based filtering of all incoming and outgoing traffic.
Implements policy-based control over hardware use (such as WLAN adaptor connections to access points, removable media, and network adapters).
Validates anti-virus software status.
Collects security-centric statistics and event traps, and passes that information to centralized servers for collation and analysis.
Launches nominated applications in policy-defined situations (for example, if a policy is set so that in a certain location, a VPN program must be used to access the network, that program is launched).
If the network environment is not recognized, the Endpoint Security Client sets the location to a default Unknown location, and applies the Unknown security policy. Security policies are completely configurable by the Endpoint Security Management administrator. For Endpoint Security Client operating instructions, see the ZENworks Endpoint Security Client 3.5 User Guide or the ZENworks Endpoint Security Client 4.0 User Guide.
All Endpoint Security Client security functionality is determined by the security policy.