Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide
This subsection explains the tasks involved in running a quarantine system linked to an authentication server.
The following table lists the tasks.
Table 14-3 List of quarantine system tasks
Tasks Description Type Reference Monitoring clients Client security levels are judged and action histories are reviewed at the administrator's discretion. M 8. Monitoring Clients Implementing actions Based on instructions from the administrator, clients with high security risk levels are denied access to the network, and clients that are declared safe have their network access restored,. M 9. Dealing with Security Risks Evaluating client security The status of security measures is checked for each client, and the adequacy of the security measures for a specific user or group is evaluated based on a points rating. O 10. Auditing Security Managing connection control list Actions related to network connection control are registered in the connection control list.
As a result, the network connections of clients that are judged a security risk are controlled according to the information in the connection control list.
Administrators must manage the connection control list, and will need to be familiar with its structure.M 14.2.4 Managing the connection control list Implementing security measures on clients Security measures are implemented on clients that have been denied access to the network after being judged a security risk.
Security measures are implemented on clients in the quarantined network or unauthenticated network through communication with the treatment server.M 14.2.5 Implementing security measures on a client Changing the system configuration When you add a new client to the network, information about the client is registered in the connection control list. O 14.2.6 Adding a new client to the network When you remove a client from the network while the quarantine system is running, information about the client is deleted from the linked product and the connection control list. O 14.2.7 Removing clients after operation has started Managing connection history information for clients You can manage the connection history of clients subjected to network connection control.
This includes information relating to times at which clients were connected to the network, and the network to which they were connected.O 14.2.8 Managing network connection histories for clients
- Legend:
- M: Indicates a mandatory task.
- O: Indicates an optional task.
All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated