Configuration Guide
Page 25
...no technology that cookies, browser history, temporary files, and downloaded content remain on the user's computer as conditions for protecting the security and privacy of information, and can configure System Detection to reduce risks associated with robust and flexible products ...the Microsoft® Windows operating system and service packs on a system after an SSL VPN session terminates. The protection provided by CSD is downloaded. Cisco SSL VPN solutions provide organizations with using a U.S. No single technology today addresses all data, especially from an untrusted...
...no technology that cookies, browser history, temporary files, and downloaded content remain on the user's computer as conditions for protecting the security and privacy of information, and can configure System Detection to reduce risks associated with robust and flexible products ...the Microsoft® Windows operating system and service packs on a system after an SSL VPN session terminates. The protection provided by CSD is downloaded. Cisco SSL VPN solutions provide organizations with using a U.S. No single technology today addresses all data, especially from an untrusted...
Configuration Guide
Page 39
...evaluates remote client PCs against the locations in the menu on their mixed use. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-1 Examine the Windows Location attribute descriptions to the network. This location would ...require the presence of your virtual private network, and protect it the default for clients that do not match other locations). For these clients, you might set... Location named Work that is specified by IP addresses on a 10.x.x.x network behind a NAT device are an unlikely risk for this location.
...evaluates remote client PCs against the locations in the menu on their mixed use. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-1 Examine the Windows Location attribute descriptions to the network. This location would ...require the presence of your virtual private network, and protect it the default for clients that do not match other locations). For these clients, you might set... Location named Work that is specified by IP addresses on a 10.x.x.x network behind a NAT device are an unlikely risk for this location.
Configuration Guide
Page 48
...than or equal to and enter an integer if you want to require that the following protective software application meet a minimum version requirement: HKEY_LOCAL_MACHINE\SOFTWARE\\Version • String value radio button...greater than - Note Use the regedit application, accessed on the client computer. matches 5-10 Cisco Secure Desktop Configuration Guide OL-8607-02 String value menu-Choose one of the following options... the String value of a registry key, or use it appears in the Add/Edit Registry Criterion dialog box. DWORD value menu-Choose one of the following options next...
...than or equal to and enter an integer if you want to require that the following protective software application meet a minimum version requirement: HKEY_LOCAL_MACHINE\SOFTWARE\\Version • String value radio button...greater than - Note Use the regedit application, accessed on the client computer. matches 5-10 Cisco Secure Desktop Configuration Guide OL-8607-02 String value menu-Choose one of the following options... the String value of a registry key, or use it appears in the Add/Edit Registry Criterion dialog box. DWORD value menu-Choose one of the following options next...
Configuration Guide
Page 49
OL-8607-02 Cisco Secure Desktop Configuration Guide 5-11 Click Add if you want to...field to satisfy the criterion. The Add or Edit File Criterion dialog box opens. Figure 5-5 Add File Criterion Configure a file criterion as follows: Step 1 Assign a value to the following protective software application is active: HKEY_LOCAL_MACHINE\SOFTWARE\\Status ...to confirm the presence or absence of the registry key on or absent from the File Criteria area and click Edit. Note Refer to the subsequent attribute descriptions for examples File paths. Chapter 5 Setting Up CSD for Microsoft ...
OL-8607-02 Cisco Secure Desktop Configuration Guide 5-11 Click Add if you want to...field to satisfy the criterion. The Add or Edit File Criterion dialog box opens. Figure 5-5 Add File Criterion Configure a file criterion as follows: Step 1 Assign a value to the following protective software application is active: HKEY_LOCAL_MACHINE\SOFTWARE\\Status ...to confirm the presence or absence of the registry key on or absent from the File Criteria area and click Edit. Note Refer to the subsequent attribute descriptions for examples File paths. Chapter 5 Setting Up CSD for Microsoft ...
Configuration Guide
Page 73
... from a remote system. System Detection Questions The following questions address the use uninstallation and Vault reuse with which they protected the Vault. There may prevent CSD from completely removing all keystroke loggers? The current release does not support multiple Secure Desktops.... OL-8607-02 Cisco Secure Desktop Configuration Guide A-3 No; The next time the remote user reaches the site, only a small application downloads (...
... from a remote system. System Detection Questions The following questions address the use uninstallation and Vault reuse with which they protected the Vault. There may prevent CSD from completely removing all keystroke loggers? The current release does not support multiple Secure Desktops.... OL-8607-02 Cisco Secure Desktop Configuration Guide A-3 No; The next time the remote user reaches the site, only a small application downloads (...
Configuration Guide
Page 74
...applications that System Detection checks for includes: - AVG AntiVirus (7.0) - Panda AntiVirus (Titanium 2004 or Platinum 7.0 to 5.0) Cisco Secure Desktop Configuration Guide A-4 OL-8607-02 The antispyware applications that any one of them as possible candidates, having just...? PC-cillin 2003 or 2004 Which antispyware applications does System Detection support? ISS BlackICE PC Protection (3.6) - McAfee VirusScan (8.0 to 10.0, Enterprise 7.0 to 4.5) - Cisco Security Agent (4.0 to 8.0) - Avast AntiVirus (4.0) - The options within each category to satisfy...
...applications that System Detection checks for includes: - AVG AntiVirus (7.0) - Panda AntiVirus (Titanium 2004 or Platinum 7.0 to 5.0) Cisco Secure Desktop Configuration Guide A-4 OL-8607-02 The antispyware applications that any one of them as possible candidates, having just...? PC-cillin 2003 or 2004 Which antispyware applications does System Detection support? ISS BlackICE PC Protection (3.6) - McAfee VirusScan (8.0 to 10.0, Enterprise 7.0 to 4.5) - Cisco Security Agent (4.0 to 8.0) - Avast AntiVirus (4.0) - The options within each category to satisfy...
Configuration Guide
Page 76
.... How long can the password be up to 127 characters, and can be for protecting data using private encryption keys. The password can include any combination of encryption; No, they detect only the IP address of Defense standards. Cisco Secure Desktop Configuration Guide A-6 OL-8607-02 Department of the first network card. it...
.... How long can the password be up to 127 characters, and can be for protecting data using private encryption keys. The password can include any combination of encryption; No, they detect only the IP address of Defense standards. Cisco Secure Desktop Configuration Guide A-6 OL-8607-02 Department of the first network card. it...
Configuration Guide
Page 77
... Automatically switch to Secure Desktop after installation, attribute 5-23 Avast AntiVirus A-4 AVG AntiVirus A-4 B bit conversion 5-24 BlackICE PC Protection A-4 bookmarks 5-27 browser home page and favorites 5-27 restrict 5-25 C Cache Cleaner description A-6 FAQs A-5 Location Module, attribute...5-6, 5-6 to 5-7 character encoding A-2 Check for keystroke loggers, attribute 5-20 Checksum, attribute 5-12, 5-13 Cipher Block Chaining (CBC) A-6 Cisco Security Agent A-4 Clean the whole cache in addition to the current session cache, attribute 5-22 CN certificate field 5-5, 5-6, 5-7 command prompt, ...
... Automatically switch to Secure Desktop after installation, attribute 5-23 Avast AntiVirus A-4 AVG AntiVirus A-4 B bit conversion 5-24 BlackICE PC Protection A-4 bookmarks 5-27 browser home page and favorites 5-27 restrict 5-25 C Cache Cleaner description A-6 FAQs A-5 Location Module, attribute...5-6, 5-6 to 5-7 character encoding A-2 Check for keystroke loggers, attribute 5-20 Checksum, attribute 5-12, 5-13 Cipher Block Chaining (CBC) A-6 Cisco Security Agent A-4 Clean the whole cache in addition to the current session cache, attribute 5-22 CN certificate field 5-5, 5-6, 5-7 command prompt, ...
Configuration Guide
Page 79
... 5-22, 5-24 insecure location, example configuration 4-2, 5-1 installing CSD 1-1 to 1-6 Internet Connection Firewall (ICF) A-4 Internet Explorer settings on client A-5 IP address range 5-4, 5-7 ISS BlackICE PC Protection A-4 Issued By, attribute of Enable identification using certificate criteria 5-5, 5-6, 5-7 Issued To, attribute of Enable identification using certificate criteria 5-5, 5-6, 5-7 Issuer,... For Windows A-4 Norton Personal Firewall A-5 O O certificate field 5-5, 5-6, 5-7 operating systems 5-16, 5-18 P Panda AntiVirus A-4 password A-6 Cisco Secure Desktop Configuration Guide IN-9
... 5-22, 5-24 insecure location, example configuration 4-2, 5-1 installing CSD 1-1 to 1-6 Internet Connection Firewall (ICF) A-4 Internet Explorer settings on client A-5 IP address range 5-4, 5-7 ISS BlackICE PC Protection A-4 Issued By, attribute of Enable identification using certificate criteria 5-5, 5-6, 5-7 Issued To, attribute of Enable identification using certificate criteria 5-5, 5-6, 5-7 Issuer,... For Windows A-4 Norton Personal Firewall A-5 O O certificate field 5-5, 5-6, 5-7 operating systems 5-16, 5-18 P Panda AntiVirus A-4 password A-6 Cisco Secure Desktop Configuration Guide IN-9