Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide
n Overview
The example below shows how a client security control system configured as a quarantine system can be used to prevent a client with inadequate security from accessing the network.
Figure 1-12 Denying network connection to a client with inadequate security
n Work flow
- Security policy setup
Based on the corporate security policy, the administrator sets the judgment policy (judgment items) and the action policy (actions triggered according to the judgment result).
- Consider the security policy.
4.7 Considerations for security policies
- Set the security policy.
6. Managing Security Policies
- Collection of IT asset information
The client's IT asset information is collected and centrally managed in the asset management database.
- Security level judgment
To determine the client's security level, the IT asset information collected at step 2 is compared against the judgment policy set at step 1.
A security level judgment can be triggered in any of three ways: Automatic judgment when inventory information is updated, periodic judgment via Scheduled Tasks in Windows, or judgment by an administrator.
- Judge the security level.
2.4 Judging security levels
- Denial of network access
Based on the action policy set at step 1, the client is denied access to the corporate network.
All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated