Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


12.1 About quarantine systems

A quarantine system provides overall process management, including detecting clients that pose a security risk, network connection control, implementation of security measures, and reconnection to the network.

Quarantine system operation consists of four processes: authentication/inspection, isolation, treatment, and recovery. In JP1/CSC, these processes are referred to collectively as the quarantine process.

The following figure shows an overview of the quarantine process.

Figure 12-1 Overview of the quarantine process

[Figure]

In the authentication/inspection process, users and client PCs are authenticated, and their security levels are judged based on the security policy.

In the isolation process, access controls are placed on any client judged to be a security risk and the client is disconnected from the corporate network.

In the treatment process, security measures are implemented on the client via an isolated network or in an offline environment.

In the recovery process, the client for which security measures were implemented is authenticated and inspected again, and reconnected to the network if found to be Safe.

The functionality of a quarantine system can be realized under JP1/CSC by linking with a network control product or device.

Organization of this section
12.1.1 Network control products that can link to JP1/CSC
12.1.2 Quarantine system overview by linked product

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated