2.1 ESM Terminology

The following terms are frequently used in this documentation:

Locations: Locations are simple definitions that help users identify the network environment they are in, provide immediate security settings (defined by the administrator), and permit the user to save the network environment and change the applied firewall settings.

Each location is given unique security settings, denying access to certain network functionality and hardware in more hostile network environments, and permitting broader access within trusted environments. Locations define the following information:

Firewall Settings: Firewall settings control the connectivity of all networking ports (1-65535), network packets (ICMP, ARP, etc.), network addresses (IP or MAC), and which network applications (file sharing, instant messenger software, etc.) are permitted to get a network connection when the setting is applied. Three firewall settings are included as defaults for ESM, and can be implemented at a location. The ESM Administrator can also create specific firewall settings, which cannot be listed here.

Adapters: Refers to three communication adapters normally found on an endpoint:

Also refers to other communication hardware that might be included on a computer, such as infrared, Bluetooth*, FireWire*, and serial and parallel ports.

Storage Devices: Refers to external storage devices that can pose a security threat when data is copied to, or introduced from, these devices on an endpoint. USB thumb drives, flash memory cards, and SCSI PCMCIA memory cards, along with traditional Zip*, floppy, and external CDR drives and the installed CD/DVD drives (including CD-ROM, CD-R/RW, DVD, DVD R/RW), can all be blocked, permitted, or rendered to Read-Only at a single location.

Network Environments: A network environment is the collection of network services and service addresses required to identify a network location (see Section 3.2.1, Saving a Network Environment).