Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


1.3.2 Denying network connections to clients with inadequate security

n Overview

The example below shows how a client security control system configured as a quarantine system can be used to prevent a client with inadequate security from accessing the network.

Figure 1-12 Denying network connection to a client with inadequate security

[Figure]

n Work flow

  1. Security policy setup
    Based on the corporate security policy, the administrator sets the judgment policy (judgment items) and the action policy (actions triggered according to the judgment result).
  2. Collection of IT asset information
    The client's IT asset information is collected and centrally managed in the asset management database.
  3. Security level judgment
    To determine the client's security level, the IT asset information collected at step 2 is compared against the judgment policy set at step 1.
    A security level judgment can be triggered in any of three ways: Automatic judgment when inventory information is updated, periodic judgment via Scheduled Tasks in Windows, or judgment by an administrator.
  4. Denial of network access
    Based on the action policy set at step 1, the client is denied access to the corporate network.

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated