My Favorites

Close

Please to see your favorites.

Advanced Search

What's New

Key:

  • Best Bet
  • Support TID
  • Articles/Tips
  • Documentation
  • Patches/Security
  • Forums

Protecting Devices
11 May 2015 ...for Endpoint Security Management. To purchase a product license, see the Novell ZENworks Endpoint Security Management product site . Click OK . Enabling the Endpoint Security Agent The ZENworks Adaptive Agent is responsible for device registration, content

Configure Security Settings
11 May 2015 ...Configure Security Settings. Configure Security Settings The ZENworks Endpoint Security Management Agent (referred to as the Endpoint Security Agent) is the ZENworks Adaptive Agent module that enforces security policies on a device. This page lets you

Workflow
11 May 2015 ...see Tasks . Agent Deployment ZENworks Endpoint Security Management uses two agents: the ZENworks Adaptive Agent and the ZENworks Endpoint Security Agent. The Adaptive Agent performs all core ZENworks functions such as registering devices, distributing

Configure Script
11 May 2015 ...JScript and VBScript coding methods, with the following exceptions. WScript.Echo is not supported because return values can’t be sent back to a parent window that is unavailable. Use the Action.Message ZENworks Endpoint Security Management API instead.

Configure Storage Device Control Settings
11 May 2015 ...Modify the device data fields if necessary. Click OK to save the changes. For information about using the Device Scanner to collect data about USB devices, see the ZENworks Endpoint Security Utilities Reference. Edit a device Click the device name. Modify

Configure USB Connectivity Settings
11 May 2015 ...needed to accurately match the device. The more fields you use, the more restrictive the definition becomes. Click OK to import the devices. For information about using the Device Scanner to collect data about USB devices, see the ZENworks Endpoint Security

Add/Edit Device to Control
11 May 2015 ...are used only to identify the device in ZENworks Control Center. The fields are not used as match criteria by the ZENworks Endpoint Security Agent. The Access field (required) determines whether access to the device is enabled or disabled. Select one of

Add/Edit Device to Exclude from Encryption
11 May 2015 ...Fields The Name field (required) and the Comment field (optional) are used only to identify the device in ZENworks Control Center. The fields are not used as match criteria by the ZENworks Endpoint Security Agent. Recommended Fields The fields on the Recommended

Select the Trigger Locations
11 May 2015 ...more complete the name, the more limited the matches. Network Traffic: Add the network addresses you want to use to determine if the device can access the Internet. The Internet is active if the ZENworks Endpoint Security Agent receives a ping reply from

Trigger Location
11 May 2015 ...the matches. Network Traffic: Add the network addresses you want to use to determine if the device can access the Internet. The Internet is active if the ZENworks Endpoint Security Agent receives a ping reply from any of the addresses or detects continuous

© Micro Focus

Check this box to also search documents last modified more than 7 years ago