ZENworks Endpoint Security Management 4.1 Administration Guide

  ZENworks Endpoint Security Management 4.1 Administration Guide
    System Configuration and Maintenance
      Managing Directory Service Connections
        Creating a Directory Service Configuration
        Synchronizing the Management Database with the Directory Service
        Removing a Directory Service Configuration
      Changing the Policy Distribution Service URL
      Configuring Data Synchronization Schedules
      Forcing Data Synchronization
      Managing Directory Service Objects that Have Moved
      Renewing ZENworks Endpoint Security Management Credentials
      Managing Encryption Keys
        Exporting Encryption Keys
        Importing Encryption Keys
        Generating a New Key
      Applying a License Key
    Security Policies
      Creating a Security Policy
      Configuring a Policy’s Global Settings
        Accessing the Global Settings
        Policy Settings
        Wireless Control
        Communication Hardware
        Storage Device Control
        USB Connectivity
        Data Encryption
        ZSC Update
        VPN Enforcement
      Configuring a Policy’s Locations
        Location Concepts
        Adding a Location
        Configuring a Location
      Configuring a Policy’s Integrity and Remediation Rules
        Antivirus/Spyware Rules
        Advanced Scripting Rules
      Configuring a Policy’s Compliance Reporting
      Distributing a Policy
        Publishing a Policy
        Republishing an Updated Policy
        Exporting a Policy
      Importing and Exporting Policies
        Importing Policies
        Exporting a Policy
    Security Client
      About the Security Client
        What the Security Client Does
        Security Client Differences Based on Windows Version
        Security Client Self Defense
        Multiple-User Support
        Machine-Based Policies
      Installing the Security Client
      Updating the Security Client
        Using a Policy’s ZSC Update Setting
        Using the Installation Program’s Upgrade Switch
        Using an MSI Uninstall and Reinstall
      Uninstalling the Security Client
        Preparing a Machine for Client Uninstallation
        Performing an Attended Uninstall
        Performing an Unattended (Silent) Uninstall
      Using the Security Client Diagnostic Tools
        Windows 2000/XP Security Client Diagnostics Tools
        Windows Vista/7 Security Client Diagnostic Tools
    Auditing
      Generating Standard Reports
        Generating a Report
        Adherence Reports
        Alert Drill-Down Reports
        Application Control Reports
        Endpoint Activity Reports
        Encryption Solutions Reports
        Client Self Defense Reports
        Location Reports
        Outbound Content Compliance Reports
        Administrative Overrides Reports
        USB Devices Reports
        Wireless Enforcement Reports
      Generating Custom Reports
        Software Requirements
        Creating a ZENworks Endpoint Security Management Compliant Report
        Available Reporting Information
        Creating a Report
      Using Alerts Monitoring
        Configuring Endpoint Security Management for Alerts
        Configuring Alert Triggers
        Managing Alerts
    Utilities
      ZENworks File Decryption Utility
        Using the File Decryption Utility
        Using the Administrator Configured Decryption Utility
      Override-Password Key Generator
      Device Scanner
    Appendixes
      Predefined TCP/UDP Port Groups
      Predefined Access Control Lists
      Predefined Application Controls
      Advanced Scripting Rules
        Supported Script Languages
        Rule Scripting
        Trigger Events
        Script Namespaces
        Interfaces
        Sample Scripts
      Shared Component Usage
    Legal Notices