A SERVICE OF

logo

ZENworks® ESM 3.5 Administrator’s Manual 243
Index
Numerics
1394 (FireWire™) ................................... 110
A
Access Control Lists ................................ 128
Activate when switching from ................... 143
Activate when switching to ....................... 143
Adding Directory Services .......................... 30
Administrative Permissions ......................... 25
Administrator Configured Decryption Utility .. 62
Administrator Views .................................. 76
Advanced Scripting Rules ................ 135, 142
Advanced VPN Settings ........................... 103
Alerts Monitoring ...................................... 33
All Adaptive ........................................... 124
All Allowed ........................................... 133
All Closed .............................................. 124
All Open ................................................ 124
Allow8021X .......................................... 130
Antivirus/Spyware Rules ................. 135, 136
Application Controls ................................ 132
application-layer firewalls ........................... 10
Approved Dialup Adapters List .................. 111
Approved Wireless Adapters List ............... 111
Arp ....................................................... 130
ASP.NET ................................................ 12
Authenticating Directories .......................... 30
Authentication Timeout ............................ 103
B
Beaconing .............................................. 117
Bluetooth® ............................................ 110
C
CD/DVD ................................................. 95
Central Management .................................. 11
Change Firewall Settings .......................... 107
Change Location ..................................... 107
Change Permission .................................... 24
Client Location Assurance ........................ 108
Client Location Assurance Service ......... 11, 67
Client Reporting ........................................ 29
Client Self Defense .................................... 71
client self defense ...................................... 90
Closed ................................................... 126
common key ............................................. 60
Communication Hardware Settings ............. 110
Configuration ........................................... 21
Configuration Window ............................... 28
Connect Commands ................................. 103
Continue on Fail ..................................... 138
Create Policies .......................................... 24
Creating a Diagnostics Package .................... 74
D
Data Encryption ........................................ 98
DDOS ..................................................... 10
Defined Locations ................................... 106
Delete Policies .......................................... 24
Dhcp ..................................................... 131
DHCP server .......................................... 113
DhcpAll ................................................ 131
Dialup ................................................... 110
Distributing Unmanaged Policies ................. 73
Distribution Service .......................... 29, 234
Distribution Service URL ........................... 28
Dns ...................................................... 131
DNS server ............................................ 113
DnsAll .................................................. 131
Driver Status ............................................ 78
E
Enable client self defense ............................ 90
encryption key .......................................... 60
Enterprise Structure ................................... 29
EthernetMulticast .................................... 130
Export Encryption Keys ............................. 61
F
File Decryption Utility ............................... 62
File Exists .............................................. 140
Filtered Access Points .............................. 118
Firewall Settings ..................................... 123
G
Gateway ................................................ 130
Gateway server ....................................... 113
GatewayAll ............................................ 130
Generate a New Key .................................. 61
Getting Trace Information from the Management
Server Agent
.......................................... 219
I
Icmp ..................................................... 130
Import Encryption Keys ............................. 61
Importing Device Lists ............................... 97
Infrastructure and Scheduling ...................... 28
Integrity and Remediation Rules ................ 135
Integrity Checks ...................................... 140
Integrity Tests ........................................ 138
IpMulticast ............................................ 130
IpSubnetBrdcast ...................................... 130