Enterasys-networks 9034385 Instrukcja Użytkownika Strona 32

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 98
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 31
Model 3: End-System Authorization with Assessment
2-10 NAC Deployment Models
Features and Value
InadditiontothefeaturesandvaluesfoundinModel1andModel2,thefollowingarekeypieces
offunctionalityandvaluepropositionssupportedbyModel3,EndSystemAuthorizationwith
Assessment:
Extensive Security Posture Compliance Verification
Thefollowingdescribesafewexamplesofteststhatcanbeexecutedforconnectingend
systemsandtherelevanceofthesetestsfromacomplianceandsecuritystandpoint:
•Antivirussoftwareconfiguration
TheNACsolutioncandetermineifanendsystemhasantivirussoftwareinstalled,ifitis
properlyconfigured(realtimeprotection
isenabled),ifitisuptodatewiththemostrecent
virusdefinitionfile,andifitisenabled.Antivirussoftwarehastheabilitytodetectinfections
astheyhappen,andtopreventfurtherpropagationofthevirustootherendsystems.Itis
importanttoverifythatend
systemsareprotectedwithantivirussoftwarewhentheyconnect
tothenetwork,incasetheendsystemissubsequentlyinfectedwithawormorvirusafter
connectivityisestablished.
•Operatingsystempatchlevel
TheNACsolutioncandetermineiftheendsystemisuptodatewiththelatestoperating
systempatches.
Thisensuresthatanyvulnerabilitiespresentinservicesrunning on
unpatchedlaptopsareappropriatelyremediated,sothatattacksthattargetthose
vulnerabilitiesarenotsuccessful,iftheyreachthedeviceonthenetwork.
•Malwareinfection
TheNACsolutioncandetermineiftheendsystemisinfectedwithmalware(worms,viruses,
spyware,
andadware)byidentifyingbackdoorportsonwhichtheendsystemislistening,
runningprocessesandservices,and/orregistrykeysettings.Byidentifyinginfectedend
systemspriortonetworkconnection,theNACsolutionprotectsotherendsystemsonthe
networkfrompossibleinfectionandpreventstheunnecessaryconsumptionofnetwork
bandwidth.
•Hostfirewallconfiguration
TheNACsolutioncandetermineiftheendsystemhasahostfirewallenabled.Byhavinga
firewallenabled,theendsystemcanprotectitselfagainstattackstargetingvulnerableservices
andapplicationsonthedevice.
PeertoPeer(P2P)filesharingsoftwareconfiguration
TheNACsolutioncandetermineif
theendsystemisinstalledwithorisrunningaP2Pfile
sharingapplication.SinceP2Pfilesharingapplicationsfacilitatetheillegalfiletransferof
copyrighteddataonthenetworkandcanbeusedforrecreationalpurposes,itisimportant
thattheNACsolutionvalidatesthatthistypeofapplicationis
notinuseonendsystemsprior
tonetworkconnection.Thisavoidslegalissuesinvolvedwiththetransferofcopyrighteddata
orlossofproductivityduetoinappropriateonlineactivity.
Przeglądanie stron 31
1 2 ... 27 28 29 30 31 32 33 34 35 36 37 ... 97 98

Komentarze do niniejszej Instrukcji

Brak uwag