ZENworks Endpoint Security Management 4.1 Administration Guide
- ZENworks Endpoint Security Management 4.1 Administration Guide
- System Configuration and Maintenance
- Managing Directory Service Connections
- Creating a Directory Service Configuration
- Synchronizing the Management Database with the Directory Service
- Removing a Directory Service Configuration
- Changing the Policy Distribution Service URL
- Configuring Data Synchronization Schedules
- Forcing Data Synchronization
- Managing Directory Service Objects that Have Moved
- Renewing ZENworks Endpoint Security Management Credentials
- Managing Encryption Keys
- Exporting Encryption Keys
- Importing Encryption Keys
- Generating a New Key
- Applying a License Key
- Security Policies
- Creating a Security Policy
- Configuring a Policy’s Global Settings
- Accessing the Global Settings
- Policy Settings
- Wireless Control
- Communication Hardware
- Storage Device Control
- USB Connectivity
- Data Encryption
- ZSC Update
- VPN Enforcement
- Configuring a Policy’s Locations
- Location Concepts
- Adding a Location
- Configuring a Location
- Configuring a Policy’s Integrity and Remediation Rules
- Antivirus/Spyware Rules
- Advanced Scripting Rules
- Configuring a Policy’s Compliance Reporting
- Distributing a Policy
- Publishing a Policy
- Republishing an Updated Policy
- Exporting a Policy
- Importing and Exporting Policies
- Importing Policies
- Exporting a Policy
- Security Client
- About the Security Client
- What the Security Client Does
- Security Client Differences Based on Windows Version
- Security Client Self Defense
- Multiple-User Support
- Machine-Based Policies
- Installing the Security Client
- Updating the Security Client
- Using a Policy’s ZSC Update Setting
- Using the Installation Program’s Upgrade Switch
- Using an MSI Uninstall and Reinstall
- Uninstalling the Security Client
- Preparing a Machine for Client Uninstallation
- Performing an Attended Uninstall
- Performing an Unattended (Silent) Uninstall
- Using the Security Client Diagnostic Tools
- Windows 2000/XP Security Client Diagnostics Tools
- Windows Vista/7 Security Client Diagnostic Tools
- Auditing
- Generating Standard Reports
- Generating a Report
- Adherence Reports
- Alert Drill-Down Reports
- Application Control Reports
- Endpoint Activity Reports
- Encryption Solutions Reports
- Client Self Defense Reports
- Location Reports
- Outbound Content Compliance Reports
- Administrative Overrides Reports
- USB Devices Reports
- Wireless Enforcement Reports
- Generating Custom Reports
- Software Requirements
- Creating a ZENworks Endpoint Security Management Compliant Report
- Available Reporting Information
- Creating a Report
- Using Alerts Monitoring
- Configuring Endpoint Security Management for Alerts
- Configuring Alert Triggers
- Managing Alerts
- Utilities
- ZENworks File Decryption Utility
- Using the File Decryption Utility
- Using the Administrator Configured Decryption Utility
- Override-Password Key Generator
- Device Scanner
- Appendixes
- Predefined TCP/UDP Port Groups
- Predefined Access Control Lists
- Predefined Application Controls
- Advanced Scripting Rules
- Supported Script Languages
- Rule Scripting
- Trigger Events
- Script Namespaces
- Interfaces
- Sample Scripts
- Shared Component Usage
- Legal Notices