The Security Client receives the security policies that you create and enforces the policies on the endpoint device. This includes the following:
Enforcing the policy’s global settings. These are settings intended to be applied regardless of the device’s location.
Determining the device’s location and enforcing the security settings defined for that location.
Securing wireless connectivity through the control of wireless network adapters and wireless access points.
Controlling the availability of communication hardware, such as Bluetooth and IrDA.
Controlling the use of USB devices.
Providing data encryption for both fixed drives and removable storage devices.
Validating the status and operation of anti-virus/spyware software.
Collecting security-centric statistics and event traps, and passing that information to the ZENworks Endpoint Security Management system for analysis through the Management Console.
All Security Client functionality is determined by the security policy. For information about creating security policies, see Section II, Security Policies.