Home
ESM 3.2 Administrator`s Manual
Contents
1. affectes MG SQLSERVER 8 0 sa SI STOKE 00000 Frome in 14 Col 20 Comecsons 1 tap Figure 111 Trace Sample The follovving outlines the result codes and types vvith their meanines 0 Success 1 Unable to Communicate with Distribution Server Client Only rare 2 Failure at Distribution Service Server Error bad 3 Invalid Credential from client Maybe not yet replicated 4 Invalid Argument Data submitted from client was malformed 5 Failure at SOAP Client common communications issue check DNS Certs etc 6 User Not associated to Group 7 Client Communications Unsupported rare 10 Non SSL request failure rare 11 Non SOAP request failure rare Type Id 53 Policy 223 51 Component 40 Encryption Key 49 Policy Signature 58 Schema 54 License 48 SUS File 224 Event Logs The Servers all log very extensive information on exception for example General Information EKK K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K Additional Info ExceptionManager MachineName EMSM25 DEV ExceptionManager TimeStamp 3 15 2005 7 52 31 PM ExceptionManager FullName Microsoft ApplicationBlocks ExceptionManagement Version 1 0 1616 15402 Culture neutral PublicKeyToken null ExceptionManager AppDomainName managementserveragent exe ExceptionManager Threadldentity ExceptionManager Window sIdentity NT AUTHORITY S YSTEM 1 Exception Information
2. Done Figure 105 Management Service Client Communication 210 e MS https machinename authenticationhelper authenicationhelper soap wsdl server RON samerpace lay ideas micro com r mase briten esctory erences vu Dr Server UV DI O 4000 Pusi part asmerpaco ley chema narora com c m Srem Collect gt mer blyvuvolbrosv ll BOG s Figure 106 Management Service Server Communication 211 Getting Trace Information from the Management Server Agent Some of the services have tracing built into them by default Add the following section to the ManagementServerA gent exe config file after the system runtime remoting section and before the exceptionManagement section to enable tracing lt system diagnostics gt lt trace gt lt listeners gt lt add name EventLogTraceListener type System Diagnostics EventLogTraceListener initializeData Management Service Agent Debug gt lt listeners gt lt trace gt lt system diagnostics gt The resulting log will show the following Comeater Management atn ye jes Oa FAB A 4 27 2005 Dirformation 4 27 2005 6 44 02 AM Management Service Agent Debug Dirformaten 4 27 2005 6 44 02 AM Managemert Service Agent Debug Dirformaton 4 27 2005 6 44 02 AM Management Service Agent Debug Dirformaten 4 27 2008 6 44 02 AM Management Service Agent Debug Piroman 4 27 2006 6 44 02 AM Management Service Agent Debug Piroman 4 27
3. Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish Integrity and Remediation Rule EG Antivirus Spyware Rules Script Text S OfficeScan T Sy Tests a wa Installed Language Jsoit w EG Integrity Ch j E nirtscan G System Proces var WSHShell new ActivexObject wscript Shell ho E E 4 war RegLocate HKEY_LOCAL_MACHINE Sy5 tem currentcontrolset services g Client running wsHshell Regwrite RegLocate 8193 REG DWORD E E Advanced Scripting Rules E Firewall All Open on St JE Script Variables Save complete Figure 97 Script Text Window 194 Stamp Once Script The Stamp Once script enforces a single network environment save at a designated location When the user enters the desired network environment they should be instructed to switch to the location assigned below and then perform a network environment save see the ZSC User s Manual or Help After this environment has been saved the ZSC will not permit additional network environments to be saved at that location Note This script works best when used for an environment that will likely NOT change its network parameters i e an end user s home network or a satellite office If network identifiers change IP and or MAC addresses the ZSC may not be able to recognize the location and will remain in the default Unknown location To initiate the Stamp Once
4. Si Cisco VPN Default Behavior ta Streaming Access Control 5 Application Con E Network Environments Stateful 7070 P Wi Fi R Management Wi Fi R Security Port Range E Unknown 1755 Figure 89 TCP UDP Ports Settings New TCP UDP port lists can be defined with individual ports or as a range 1 100 per each line of the list To create a new TCP UDP port setting Step 1 Select TCP UDP Ports from the components tree and click the Add New button Step 2 Name the port list and provide a description Step 3 Select the port behavior from the drop down list The optional behaviors are e Open All network inbound and outbound traffic is allowed Because all network traffic is allowed your computer identity is visible for this port or port range 118 Closed All inbound and outbound network traffic is blocked Because all network identification requests are blocked your computer identity is concealed for this port or port range Stateful All unsolicited inbound network traffic is blocked All outbound network traffic is allowed over this port or port range Step 4 Enter the transport type All all port types listed below Ether IP TCP UDP Step 5 Enter Ports and Port Ranges as either Single ports A range of ports with the first port number followed by a dash and the last port number Example 1 100 would add all ports between 1 and 100 Please visit the Internet Assigned Numbers A
5. Poda ESM Security Policy 3 Ash runa Ri DI sy pt ent PTE Figure 62 ESM Security Policy creation process 82 Custom User Messages Custom User Messages allow the ESM Administrator to create messages which directly answer security policy questions as the user encounters policy enforced security restrictions or provide specific instructions to the user User messages controls see Figure 64 are available in various components of the policy Please Log In i Please log in to the VPN Launch VPN Figure 63 Custom User Message with a Hyperlink To create a custom user message perform the following steps Figure 64 for an example of the control Step 1 Enter a title for the message This displays on the top bar of the message box see example in Figure 63 above Step 2 Enter the message The message is limited to 1000 characters Step 3 If a hyperlink is required check the hyperlinks box and enter the necessary Use Message Title Message Use Hyperlink Display Text TD Link Parameters re Figure 64 Custom Message and Hyperlink Controls Note Changing the Message or Hyperlink in a shared component will change in all other instances of that component Use the Show Usage command to view all other policies associated with this component 83 Hyperlinks An administrator can incorporate hyperlinks in custom messages to assist in explaining security p
6. and then the n 5 E Fanen F Figure 41 Specify the Correct Records Step 14 Repeat steps 10 13 for each filter Edit the design of the report and save Step 15 After a custom report is generated the report can be dropped into the Program Files Novell Management Service Reports Reports directory on the Management Service Server Once there the new report will display in the reports list in the Reporting Service web interface click Refresh List to display the new reports 57 Override Password Key Generator Productivity interruptions that a user may experience due to restrictions to connectivity disabled software execution or access to removable storage devices are likely caused by the security policy the ZSC is enforcing Changing locations or firewall settings will most often lift these restrictions and restore the interrupted functionality However in some cases the restriction could be implemented in such a way that they are restricted in all locations and or all firewall settings or that the user is unable to make a location or firewall setting change When this occurs the restrictions in the current policy can be lifted via a password override to allow productivity until the policy can be modified This feature allows an administrator to set up password protected override for specified users and functionality which temporarily permits the necessary activities Password overrides disable the current security p
7. e Reporting displays the Reporting dashboard Help The Help menu gives you access to the Management Console Help tool and the About box e Help launches the Management Console Help tool which can guide you through policy creation as well as all Management Console tasks also available by pressing the F1 key on your keyboard 22 About launches the About window which displays the current version of the Management Console This is where the license key is entered if purchased after installation 23 Permissions Settings This control is found in the Tools menu and is only accessible by the primary administrator for the Management Service and or any whom have been granted permissions access by that administrator This control is not available when running the Stand Alone Management Console The permissions settings define which user or group of users are permitted access to the Management Console Publish Policies and or Change Permission Settings During the Management Server installation an administrator or Resource Account name is entered into the configuration form see the ESM Installation and Quick Start Guide Once a successful test has been performed and the user information saved five permissions are automatically granted to this user see below Once the Management Console is installed the resource user defined above will be the ONLY user with full permissions though ALL user groups within the domain wil
8. oShellLinkStartMenu WindowStyle I 188 oShellLinkStartMenu Hotkey CTRL SHIFT W oShellLinkStartMenu IconLocation C Program Files Novell ZENworks Security Client STEngine exe 0 oShellLinkStartMenu Description Launch Novell Wireless Adapter Control Dialog Box oShellLinkStartMenu WorkingDirectory C Program Files Novell ZENworks Security Client oShellLinkStartMenu Save End Function Function CreateDesktopAllUsersShortcut create the desktop folder shortcut set oShellLinkDesktop WshShell CreateShortcut strDesktop amp WEnable Wireless Adapter Control Ink oShellLinkDesktop TargetPath C Program Files Novell ZENworks Security Client wareg vbs oShellLinkDesktop WindowStyle 1 oShellLinkDesktop Hotkey CTRL SHIFT W oShellLinkDesktop IconLocation C Program Files Novell ZENworks Security Client STEngine exe 0 oShellLinkDesktop Description Launch Novell Wireless Adapter Control Dialog Box oShellLinkDesktop WorkingDirectory C Program Files Novell ZENworks Security Client oShellLinkDesktop Save End Function Function Create VbsFileToWriteRegEntry First build the VB Script file to write the registry key Dim pathToTempVbsFile pathToTempVbsFile C Program Files Novell ZENworks Security Client wareg vbs Dim ofileSysObj fileHandle set ofileSysObj CreateObject Scripting FileSystemObject set fileHandle ofileSysObj CreateTextFile pathToTempVbsFile true fileHan
9. EKK K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K K Exception Type System Data OleDb OleDbException ErrorCode 2147217871 Errors System Data OleDb OleDbErrorCollection Message Timeout expired Source Microsoft OLE DB Provider for SQL Server TargetSite Int32 NextResults IMultipleResults System Data OleDb OleDbConnection System Data OleDb OleDbCommand HelpLink NULL StackTrace Information sk 3 sk ske ske ske Ke K ske ske ske K K K e K K K K K K K K K K K K K K K K K K K K K K K K K K K K ok at System Data OleDb OleDbDataReader NextResults IMultipleResults imultipleResults OleDbConnection connection OleDbCommand command at System Data OleDb OleDbCommand ExecuteReaderInternal CommandBehavior behavior String method at System Data OleDb OleDbCommand ExecuteNonQuery 225 at Novell ApplicationBlocks Data OleDbHelper ExecuteNonQuery OleDbConnection connection CommandType commandType String commandText OleDbParameter commandParameters at Novell ApplicationBlocks Data OleDbHelper ExecuteNonQuery String connectionString CommandType command Type String commandText OleDbParameter commandParameters at Novell Security MobileManagement AuthenticationServer AuthenticationA gentServices Execute AuditProcedure String procedureName at Novell Security MobileManagement AuthenticationServer AuthenticationA gentServices Process AgentProcess processType Int32 amp processAction
10. SP4 Operating Systems Windows XP SP1 Windows XP SP2 Windows 2000 SP4 Processor 600MHz Pentium 3 or greater Minimum 128 MB RAM 256 MB or greater recom mended Disk Space 5 MB required 5 additional MB recommended for reporting data Required Software Windows 3 1 Installer All Windows updates should be current ASP NET The Policy Distribution Management and Client Location Assurance services require a LOCAL account of ASP NET to be enabled If this is disabled the services will NOT work correctly Reliable Time Stamp The Novell ESM solution gathers data from multiple sources and collates this data to create a wide variety of security and audit reports The utility and probative value of these reports is greatly diminished if disparate sources disagree as to times and so it is strongly recommended that anyone installing ESM provide for enterprise wide time synchronization such as that provided by Active Directory or through the use of Network Time Protocol The ESM Administrator s should follow all installation operation and maintenance recommendations provided in this document and the ESM Installation and Quick Start guide in order to ensure a strong security environment About the ESM Manuals The ZENworks Endpoint Security Management manuals provide three levels of guidance for the users of the product ESM Administrator s Manual This guide is written for the ESM Administrators who are r
11. for more information Disable Adapter Bridge This setting disables the networking bridge functionality included with Windows XP which allows the user to bridge multiple adapters and act as a hub on the network A Custom User Message and Hyperlink can be displayed when the user attempts a Wi Fi connection See Custom User Messages on page 83 for more information Disable Wi Fi When Wired All Wi Fi Adapters are disabled when the user has a wired LAN through the NIC connection 87 Disable AdHoc Networks This setting globally disables all AdHoc connectivity thereby enforcing Wi Fi connectivity over a network i e via an Access Point and restricts all peer to peer networking of this type Block Wi Fi Connections This setting will block Wi Fi connections without silencing the Wi Fi radio Use this setting when you want to disable Wi Fi connection but want to use Access Points for Location Detection see Locations on page 98 for more information 88 Global Communication Hardware Control This component sets the policy defaults for all communication hardware To access this control open the Global Policy Settings tab and click the Comm Hardware icon in the policy tree on the left AL ZENworks ESM Management Console Security Policy les Ela x File Tools Components View Help Ga Save Policy 2 5 Pr a P Security Policy x E 5 3 Global Settings Policy Settings I 3 Storage D
12. ret ret Action HDCState eApplyGlobalSetting eSerialPort ePolicyChange Action Trace HDCState eApplyGlobalSetting eSerialPort ret ret Action HDCState eApplyGlobalSetting eParrallelPort ePolicyChange Action Trace HDCState eApplyGlobalSetting eParrallelPort ret ret Action WiFiDisabledState eApplyGlobalSetting ePolicyChange Action Trace nWiFiDisabledState ret ret Action WiFiDisabledWhenWiredState eA pplyGlobalSetting ePolicyChange 165 Action Trace WiFiDisabledWhenWiredState ret ret Action AdHocDisabledState eApplyGlobalSetting ePolicyChange Action Trace AdHocDisabledState ret ret Action AdapterBridgeDisabledState eApplyGlobalSetting ePolicyChange Action Trace AdapterBridgeDisabledState ret ret Action MinimumWiFiSecurityState eGlobalSetting ePolicyChange Action Trace MinimumWiFiSecurityState ret ret Action WiredDisabledState eGlobalSetting ePolicyChange Action Trace WiredDisabledState ret ret Action DialupDisabledState eGlobalSetting ePolicyChange Action Trace DialupDisabledState ret Action Trace Reset Location Change state ret Action RemovableMediaState 1 eLocationChange Action Trace RemovableMediaState ret ret Action CDMediaState 1 eLocationChange Action Trace CDMediaState ret ret Action HDCState eApplyGlobalSetting elrDA eLocationChange Action Tra
13. var adp var env var apitem var adptype var adpname var apcount var 1 adplist Query GetAdapters adplength adplist Length Action Trace adplength adplength if adplength gt 0 for i 0 1 lt adplength i adp adplist Item 1 adptype adp Type if adptype eWIRELESS Action Trace Wireless index i adpname adp Name Action Trace adp adpname 184 env adp GetNetworkEnvironment apcount env WirelessAPCount Action Trace WirelessAPCount apcount if apcount gt 0 apitem env GetWirelessAPItem 0 Action Trace apitem SSID apitem SSID VBScript dim adplist dim adplength dim adp dim env dim apitem dim adptype dim adpname dim apcount dim i set adplist Query GetAdapters adplength adplist Length Action Trace adplength amp CInt adplength if CInt adplength gt 0 then For 1 0 To CInt adplength 1 set adp adplist Item 1 adptype adp Type 185 if adptype eWIRELESS then Action Trace Wireless index amp i adpname adp Name Action Trace adp amp adpname set env adp GetNetworkEnvironment apcount env WirelessAPCount Action Trace WirelessAPCount amp apcount if apcount gt 0 then set apitem env Get WirelessAPItem 0 Action Trace apitem SSID amp apitem SSID end if end if Next end if DHCPCount See ICLIENTADAPTER Interface GetNetworkEn
14. 0 Gateway DNS Servers DHCP Servers WINS Servers Access Points Dialup Connections lt gt IP Address MAC Address Must Match Save complete Figure 81 Network Environments The lists provided allow the administrator to define which network services are present in the environment Each network service may contain multiple addresses The administrator determines how many of the addresses are required to match in the environment to activate the location switch It is required that 2 or more location parameters be used in each network environment definition To define a network environment perform the following steps Step 1 Select Network Environments in the components tree and click the New Component button Step 2 Name the network environment and provide a description Step 3 Select which adapter type is permitted to access this Network Environment from the drop down list 106 Step 4 Enter the following information for each service The IP address es Limited to 15 characters and only containing the numbers 0 9 and periods example 123 45 6 789 MAC address es Optional Limited to 12 characters and only containing the numbers 0 9 and the letters A F upper and lower case separated by colons example 00 01 02 34 05 B6 Check whether identification of this service is required to define the network environment Step 5 The Access Points Dialup Connections an
15. 2005 6 44 02 AM Management Service Agent Debug Divtormaten 4 27 2005 6 44 02 AM Management Service Agent Debug Dirformatien 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformaten 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformaton 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformaton 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformaton 4 27 2005 6 44 01 AM Management Service Agent Debug information 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformation 4 27 2006 6 44 01 AM Management Service Agent Debug Information 4 27 2005 6 44 01 AM Management Service Agent Debug Diutormaten 4 27 2005 6 44 01 AM Management Service Agent Debug Divtormaten 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformaten 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformaten 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformaten 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformaton 4 27 2005 6 44 01 AM Management Service Agent Debug Dirformaten 4 27 2005 6 42 02 AM Management Service Agent Debug Gironan 4 27 2005 GROZAM Management Service Agent Debug 4 27 2005 43 Management Service Agent Debug of Performance Logs and Alerts Shared Folders E loges Drives a BY Removable orage 5 Gja Services and Appicatiore Telephory Microsoft SQL Servers Figure 107 Trace Log Alternatively you may option to log the data to a text file using the sa
16. 30 72000 1213004 22123 Goede LW JO PCE BOS KEE Os Ni Bar 0 43 30 LIS PONGO 47702019 Mowe ILI 5512 BROS KD O dk PH ZOO MTT Cees CRO OC CE 17 0049 1738 2 ws 2004 TOS OD 2013 POLO 32102909 KKT DDRS XM 0 CEKA Atot BOOKIE Ove 18 gt WSAC CET KOTO 11779 13 171 2009 7900 00 2710011 ADROO Y21 2003 0 12 3 eves KW 0 E CESS A PORE sh ED L NOLI MISS POCO WLR PO MILNE RI MODO XX08 8 Figure 121 Example Publish_Organization_Audit Table 233 ACL AP ARP CLAS DHCP DMZ DNS EAP ESM FQDN FTP HTTP ICMP IIS LDAP LEAP LLC MAC MMC MSI NAC NDIS NIC PEAP RAS RDBMS RSSI SNAP Acronym Glossary Access Control List Access Point Address Request Protocol Client Locations Assurance Service Dynamic Host Configuration Protocol De Militarized Zone Domain Name System Extensible Access Protocol ZENworks Endpoint Security Management Fully Qualified Domain Name File Transfer Protocol Fast User Switching Hyper Text Transport Protocol Internet Control Message Protocol Internet Information Service Lightweight Directory Access Protocol Light Extensible Access Control Logical Link Control Media Access Control Microsoft Management Console Microsoft Installer Network Access Control Network Driver Interface Specification Network Interface Card Protected Extensible Authentication Protocol Remote Access Service Relational Database Management System Remote Procedure Call Received Signal Strength
17. 36 Figure 37 Figure 38 Access Reporting Service Database seje E n E E E e EE E a 51 Select OLE DB Provider ori ei nean A A bart iio 52 Enter S rver Information it E bate SG E e i DER 52 Select Source Tabl Or VIEW sredin iiet ese e ni a EE TER EAE ieee A EA hed EA 53 Select the colimns to mel des i cee ests il RA re OPA le AEAEE EE TRA 53 Select Columns to Group aaaskrurstansst o eee eb asa gee ban 54 Select Styles ae A e Go 54 Visual Basic Report Buld r ss ii ii a A AA 55 setting Up ABI o is AAA A A be ee EAS ene be te ee 55 Figure 39 Create P rameter Field ii A irene t 56 Fr ure 40 Link the Parameter rm a e A OES 56 Figure 41 Specify the Correct Records e cnet tenes 57 Figure 42 Override Password Key Generator cette varens 58 Figure 43 USB Drive Scanner ta A Sha web eran ohe evehawaacha dte bere 60 Figure 44 Scan for Device Name and Serial Number 0 ccc eee eee eee 61 Figure 45 ZENworks Security Client About Screen a avvuvavavra vaere teens 70 Figure 46 ZENworks Security Client Diagnostics Screen 2 ect eee nee 70 Figure 47 Administrator Views o 71 Figure 48 View Policy Window veria 4 058 045 5505 sheet hee sab E esken s le 71 Figure 49 Rule Scripting Window o 72 Figure 50 Scripting Variable Window 0 ccc teen eee e beeen nee 73 Figure 51 Client Driver Status Window 0 2 ec eee era eben eens 73 2007 Novell Inc All Rights Reserved Figure 52 F
18. 50 Step 2 The simplest method for this example is to create a report using the wizard see Figure 29 Figure 29 Crystal Reports Wizard Step 3 Define the data source Access the Management Service reporting service database within data see Figure 30 Data Feds Group Total Top NJ Chat Select Style Choose data to report on You can choose multiple tables and add indexes Tables in report a MOLE DB ADO P Figure 30 Access Reporting Service Database 51 Step 4 Using the connection definition wizard see Figure 31 define an OLEDB ADO connection to the Reporting Service database Select the Microsoft OLE DB Provider for SQL Server and click Next CIO OLE DB Provider Select a provider from the ist or select a data ink file Provider Microsoft OLE DB Provider for Internet Publi a Microsoft OLE DB Provider for ODBC Driver Microsoft OLE DB Provider for OLAP Service Use Data Link Fie a eo men Figure 31 Select OLE DB Provider Step 5 Select the Reporting server Enter the user id password and database name for the Reporting Service see Figure 32 refer to the ESM Installation and Quick Start Guide for more information Click Next then Finish ov 8 Connection Information Provide necessary information to log on to the chosen data source Server STZROBERT y User ID i Password Database Report
19. 9485000 lt u gt S29E bbcOcec6 S29e 4cl BBCOCECS 529E lt NULL gt 0C548DA2 18A47 2005 03 30T 19 55 25026D29 CBB2 lt lt NULL gt 25026029 CBB2 2005 03 30T19 55 25026D29 CB52 lt NULL gt 50673978 SEFO 4 5d678978 Sdf0 4fe SD678978 SEF0 4 lt NULL gt 131 SD77SE30 CC1i2 2005 03 30708 42 6D1C457E F83A FJCCA 141 5E8E 53 B40639FA 777A 4 b40639fa 777a 42 B40639FA 777A lt NULL gt 114 81CE962A 1473 4 81ce962a 1473 43 81CE962A 1473 4 lt NULL gt 130 BFAEFB43 SAS4 2005 03 30T08 02 BFAEFB43 3A84 lt NULL gt 38 18F93A 9233 4 2005 03 30708 02 31A9A81A 0465 BFAEFB43 8A84 53 63945585 2508 4 2005 03 30719 55 63945585 25C8 4 lt NULL gt 52 31A9AB 1A 0465 2005 03 30T08 02 31A9A81A 0465 lt NULL gt 42EAAJGA BEDC 2005 03 30T 19 55 42EAA36A BEDC lt NULL gt F3CCA 141 SESE 2005 03 30708 42 F3CCA141 SESE lt NULL gt 6D 1C457E FS3A 2005 03 30T08 42 6D 10457 F88A lt NULL gt Figure 113 Example Repository Table ORGANIZATION Contains the user and group information The ORG_UID represents the credential assigned to the user 228 v on MS SOLSERVER F J Sl Enterprise Manager Data in Table organization in STOSDE pe Window tep O euw ri ay ALK E e aca Li bli 0 TT Gar 1 SALI gt aa m 2 F 19CBC96 6F41 4 110 engreerro mo 3 ESCFEOCD TACO 36 engreerro Is 4 105031034101 36 Users mo 5 993052 13634 36 Group Policy Crest mu 5 20448
20. ACME MAIN Initial Catalog STMSDB Integrated Security SSPI gt The file locations for the relevant connection strings are Program Files Novell ESM Management Console PolicyEditor exe config Program Files Novell ESM Standalone Management ConsolelUnmanagedEditor exe config Program Files Novell ESM Standalone Management ConsolelUnmanagedEditorInstaller exe config Program FilesiNovelNESM Distribution Service PolicyServer web config Program Files Novell ESM Distribution Service PolicyServer bin AgentService exe config Program Files Novell ESM Management Service AuthenticationLiblweb config Program Files Novell ESM Management Service AuthenticationLiB bin AgentService exe config Program Files Novell ESM Management Service AuthenticationServer web config Program Files Novell ESM Management Service AuthenticationServer bin ManagementServerAgent exe config Program Files Novell ESM Management ServiceAuthenticationServenbinManagementServerinstaller exe config Program Files Novell ESM Management Service Reporting web config 217 Microsoft SQL Profiler SQL Profiler is a graphical tool that allows system administrators to monitor events in an instance of Microsoft SQL Server You can capture and save data about each event to a file or SQL Server table to analyze later For example you can monitor a production environment to see which stored procedures a group of Transact SQL statements com
21. E Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish Global Settings Policy Settings YPN Enforcement Advanced 4 Wireless Control Comm Hardware Seed Storage Device Control Authentication Timeout FT Connect command I Minutes Hours Days Display Text adi 4 ee Command K Adapters Parameters Wired Enabled Except p C Disconnect command Wireless Enabled Except Dial up Enabled Except Display Text Command Parameters Wited Adapters Wireless Adapters Dial up Adapters Adapter Name Figure 76 Advanced VPN Settings Authentication Timeout Administrators can place the endpoint in a secured firewall setting the firewall setting of the Switch To Location see above to secure against any failure of VPN connectivity The Authentication Timeout is the amount of time the ZSC will wait to gain authentication to the VPN server It is recommended this parameter be set above minute to allow authentication over slower connections Connect Commands When using the Authentication timer Connect and Disconnect commands are used to control client based VPN activation Enter the location of the VPN client and the required switches in the Parameters fields The Disconnect command is optional and provided for VPN clients that require the user disconnects before they log off the network 96 Note VPN clients that gener
22. High Availability mechanisms for the Management Server should be put in place if an organizational risk assessment identifies a need for such steps There are multiple alternative mechanisms for building high availability solutions ranging from the general DNS round robining layer 3 switches etc to the vendor specific the Microsoft web site has multiple resources on high availability web services Those implementing and maintaining an ESM solution should determine which class of high availability solution is most appropriate for their context It should be kept in mind that the Management Server has been architected to function in non high availability situations and does not require High Availability to provide its services Running the Service The Management Service launches immediately following installation with no reboot of the server required The Management Console is used to manage the data on the Management Service See Infrastructure and Scheduling on page 28 for more details For other monitoring capabilities see e Server Communication Checks on page 207 e System Monitor on page 214 Distributing ESM Credentials Key Management Key The Management Service automatically distributes credentials to each ZSC when it is installed and checks in to the Management Service for the first time Once this credential is distributed the ZSC will be permitted to receive policies from the Policy Distribution Service an
23. Indication Scalable Node Address Protocol 234 SNR SQL SSID SSL SUS TCP IP TKIP UDP URI URL USB UTC VPN WEP WINS WLAN WPA ZSC Signal to Noise Ratio Structured English Query Language Service Set Identifier Secure Socket Layering Microsoft Software Update Services Transmission Control Protocol Internet Protocol Temporal Key Integrity Protocol User Datagram Protocol Uniform Resource Identifier Uniform Resource Locator Universal Serial Bus Coordinated Universal Time Virtual Private Network Wired Equivalent Privacy Windows Internet Naming Service Wired Local Area Network Wi Fi Protected Access ZENworks Security Client 235 Index Numerics 1394 FireWire sss asosii snegle ans 103 Access Control Lists ooccoccnoccnnccnoconocono 121 Activate when switching from 2 136 Activate when switching to occnoccnoccnnccn gt 136 Adding Directory Services ccccceecceece neon 30 Administrative Permissions ooccnoccnoccnoconecos 25 Administrator Views ccccessesseeeceeeeeeeseees 71 Advanced Scripting Rules 128 135 Advanced VPN Settings ernernernevnevnennevner 96 Alerts Monitoring sessies neneve neneve ene 33 All Adaptive E agent aaa 117 AM AJIONVOA ende si dosido aids dt eds nda Ste dnd 125 Al Closer etaten 117 AT Open NESSET 117 ANOWS8021X ves Tase deve vde padie oda des 123 Antivirus Spyware Rules 06 128 129 Application Controls
24. Lanquage JSeript y Run Script Variables Name Prompt Value Results Figure 49 Rule Scripting Window 72 Variables are created by clicking Add which will display a second window see Figure 50 where the variable information may be entered 8 ZENworks Security Client Scripting Variable IK Name Prompt Type Value Figure 50 Scripting Variable Window Editing a variable will launch the same window where you can edit as needed Delete will remove the variable Click Save on the main scripting window once a variable is set Driver Status Displays the current status of all drivers and affected components see Figure 51 T ZENworks Security Client Driver Status Driver Status Information Adapter Status Adapter Name celerate D PCNet Adapter Adapter Id D5460DE1 B65 4973 973C 378934848488 Enabled true Type Wired 0 Filter State Open 0x2001 Msg Control ARP ICMP ETHERNET Multicast 802 1 IP Multicast IP Subnet Broadcast SNAP LLC Item 000 Type Port SubType ETHER Protocol 1 Range 65535 State Open Item 008 Type ACL IP 10 10 1 254 MAC 0010DB688A92 Network Environment IP 10 10 100 42 Min Match 1 DHCP Enabled 1 WINS Enabled 1 Stamped 1 Modem 0 Figure 51 Client Driver Status Window 73 Settings Administrators can adjust the settings for the ZENworks Security Client without having to perform a reinstall of the software The
25. MACHINE Software Novell Action Trace Reg Key Exists ret VBScript dim ret ret Query Registry KeyExists eLOCAL_MACHINE Software Novell Action Trace Reg Key Exists amp ret Registry ValueD WORD JScript var ret ret Query Registry KeyExists eLOCAL_MACHINE Software Novell Logging Action Trace Reg Key Exists ret ret Query Registry ValueDWORD eLOCAL_MACHINE Software Novell Logging Enabled Action Trace Reg Value ret VBScript dim ret ret Query Registry KeyExists eLOCAL_MACHINE Software Novell Logging Action Trace Reg Key Exists amp ret ret Query Registry ValueDWORD eLOCAL_MACHINE Software Novell Logging Enabled Action Trace Reg Value amp CLng ret 161 Registry ValueExists JScript var ret ret Query Registry KeyExists eLOCAL_MACHINE Software Novell Logging Action Trace Reg Key Exists ret ret Query Registry ValueExists eLOCAL MACHINE Software Novell Logging Enabled eDW ORD Action Trace Reg Value Exists ret VBScript dim ret ret Query Registry KeyExists eLOCAL_MACHINE Software Novell Logging Action Trace Reg Key Exists amp ret ret Query Registry ValueExists eLOCAL MACHINE Software Novell Logging Enabled eDW ORD Action Trace Reg Value Exists amp ret Registry ValueString JScript var ret ret Query RegistryKeyExists eLOCAL MACHINE Software
26. Novell Logging Action Trace Reg Key Exists ret ret Query Registry ValueString eLOCAL_MACHINE Software Novell Logging test Action Trace Reg Value Is ret VBScript 162 dim ret ret Query Registry KeyExists eLOCAL_MACHINE Software Novell Logging Action Trace Reg Key Exists amp ret ret Query Registry ValueString eLOCAL_MACHINE Software Novell Logging test Action Trace Reg Value Is amp ret LocationName LocationUuid MaxConnectionSpeed OSServicePack PolicyName PolicyTime PolicyUuid LocationIsStamped TriggerEvent TriggerEventDatal JScript var ret ret Query LocationName Action Trace Location Name ret ret Query LocationUuid Action Trace Location Uuid ret ret Query MaxConnectionSpeed Action Trace MaxConnectionSpeed ret ret Query OSServicePack Action Trace OSServicePack ret ret Query PolicyName Action Trace PolicyName ret ret Query PolicyTime Action Trace PolicyTime ret ret Query PolicyUuid Action Trace PolicyUuid ret ret Query LocationIsStamped Action Trace LocationIsStamped ret ret Query TriggerEvent Action Trace TriggerEvent ret ret Query TriggerEventParameter Action Trace TriggerEventParameter ret VBScript dim ret ret Query LocationName Action Trace Location Name amp ret ret Query LocationUuid Acti
27. Password Control eee teen eben eens 86 Policy Components resesi ces uer se ee rss A sa eee ies WEE ees an 87 Global Communication Hardware Control cee cece eee eee 89 Global Storage Device Control cece nee ence eens 90 Verify Local Storage Device Options are set as Disabled 0 0 0 0 eee eee eee 91 LICONSA eo sheet A TE A ie 93 Basic VPN Enforcement emisor cba a L det Edt Rb pees a Rigs bale aes Saeed 94 Advanced VPN Settings care russisk A mere eee 96 Location Settings ii shan esa sob ee hag hse Se a sn 98 CLAS location ch cK d ta miss ene eda tee ca a br Ed ee es 101 Location Communication Hardware Control aa aa 103 Location Storage Device Control eee eee e renne 105 Network Environments s a vu ta inch se ls a Seats a Ag eee eta de os Sistas AUS v 106 WI EL Manas m nit ci a Ce 109 Managed Access Points Control q c s spess gd ad g E eds 110 Filtered Access Points Control naene s naana anerer 111 Prohibited Access Points Control naonnana n aneneen 111 Signal Strensth Control tii E A is 112 WI Pi Security no veset vagoni i ds il Ada 114 Fisur 88 Firewall Semestre pb 116 Figure 89 TCP UDP Ports Settings eee cent E teen nee 118 Figure 90 Access Control Lists Settings uens eee ES E 121 Figure 91 Application Control Settings suser hen osema KaG ia EaD rare ranerne 125 Figure 92 Antivirus Spyware Integrity rules 0 ccc eee eee nee 129 Figure 93 Integrity Testsi isa den
28. Process is Running ocooccoccncnnccncnnnonccncnnono 133 Prohibited Access Points ooccoccnoconoconocono 111 Publish Poly ess G ir ee ci dor 24 Publish To Settings 2 0 0 0 cece cee vene vene ne venes 26 Q Quarantine firewall ooococcnoccnncnnoconocono 131 R Reliable Time Stampa aaau aaa aaa aaa ene vec eneve vene venes 12 Removable Storage aaa au aa nana nen eneve vene vene ne venes 90 Reporting soiets pa NG PEN aa san 21 RESORNCES trial lada 21 Rule Scripting shusi akt ekt sitin roll crias 72 S Save Network Environment u aauu aaa aaa ca one cenon 100 Scheduling ccsccsccccccccessesssececeesesesenseaeees 29 Securing Server Access oococcnocnom 15 18 63 Senforce Security Client oooccnoccnocnnocnnncno 11 Senforce Security Client Diagnostics Tools 69 Senforce Security Client Management 65 Senforce Update ivi 93 Serial Parallel nn ke eli rt 103 Server Maintenance au aaaa uu uno sscenuss 14 17 62 Server Selection and Installation 14 17 62 Service Syncronization oooccnoccnocnnocnnicnnnnnnos 32 Show Location in Client Menu 101 MAA Aare 123 SE el tudio citas 119 stateful packet inspection oooccnoccnocnnocnnncnos 10 Storage Device Control ocoonccnocnnocn 90 105 SYN H dd an titel eee Ate 10 System Requirements na aaaa aaa a une ene ce neve vecse 12 T Task Bar cucuta 20 TOP UDP POMS ngi piano cita dis 118 The Switch to Location cooocno
29. Service Connection Options I No authentication IV Read only access IV Secure authentication I Bind to specified server Account Password Test OK Cancel Figure 10 Authenticating Directories Window All information with the exception of the directory type may be updated To add a new directory service perform the following steps Step 1 Click New located next to Friendly Name Step 2 Enter a friendly name for the Directory Service and select its Service Type from the pull down list Step 3 In the Host DN box enter the hostname of a domain controller and leave the Domain DC box blank this box will auto populate after a successful test of the user account in Step 7 Step 4 Check Available for User Authentication if this is the domain a Management Service is installed on to display the domain in the login pull down menu If this is a separate domain leave unchecked Step 5 Select a Service Connection Option 30 No authentication login and password not required for connection to directory service e Secure authentication login and password required for connection to directory service Read only access Management Service cannot make updates or changes to the directory service Bind to specified server creates a direct connection to the server hosting the directory service machine name netbios name must be specified in Step 1 This will increase the speed and efficiency of the c
30. Updated message The Policy has not been updated the ZSC is simply comparing the virtual adapter to any adapter restrictions in the current policy The standard VPN Enforcement settings described above make VPN connectivity an option The user will be granted connectivity to the current network whether they launch their VPN or not For stricter enforcement see Advanced VPN Settings below The Switch to Location The Switch to location is the location the ZSC will switch to when the VPN is activated It is recommended that this location contain some restrictions and only a single restrictive firewall setting as its default The All Closed firewall setting which closes all TCP UDP ports is recommend for strict VPN enforcement This setting will prevent any unauthorized networking while the VPN IP address will act as an ACL to the VPN server and permit network connectivity 95 Advanced VPN Settings Advanced VPN controls are used to set Authentication Timeouts to secure against VPN failure connect commands for client based VPNs and Adapter controls to control the adapters permitted VPN access To access this control open the Global Policy Settings tab click the symbol next to VPN Enforcement and click the Advanced icon in the policy tree on the left E ZENworks ESM Management Console Security Policy Woo File Tools Components View Help E Save Policy s mponent S de zi Polic Security Policy s
31. Upgrading the ZSC 4 eae a a ges Tes a ee on af Gate a a nn aed 66 RUNNING thE ZSC iera rakne a SS dog bey Seiden Ra Soh RE sui 67 ZENworks Security Client Diagnostics Tools 0 00 00 eee ee 69 Creating and Distributing ESM Security PolicieS lt lt lt lt lt lt 0 78 Creating Security Policies aaa 82 Custom User Messages rn knr rn 83 Hyperlim Si da s ikk ada ri deh toads La aa ad fu Le an 84 Global Policy Settings six ae chee Mr Part ot dk sagene ska e 85 Wireless Gonttol huir She aed D eae oR ata a esse ud Grut ka kat 87 Global Communication Hardware Control aaa 89 2007 Novell Inc All Rights Reserved Storage Device Control ta merdi ta eae es eee ih heed Ss Oa AEG TA ewe 90 ZSC Update a sva H Sa a Re a ee FR de Sa ee ee Glad hs SR a et 93 VPN Enforcement comio ee Roane Ge Gee ede a ee pa 94 LOCATIONS EE Re Pa ee eR Pade baw bee Pa eG ES ee Se de RE Pe yee 98 Location Settings la faba a a Ye ea ele ee es 100 Location Components ss sasos ere d ee Be ee Dee ee ee ee 102 Communication Hardware Settings o ooo 103 Storage Device Control akkar rank knr ee 105 Network EnvironmentS 0 00 a aah a ee 106 Wi Fi Management 109 WI FISecublty at ds ti ee da doe Se ee Ee skeis 114 Firewall Settings 2 ni reres wea bE YA ee E Pa be bee ae PRE Pada ee 116 EER LUDPSPORtS 2 sae bee IA a A 118 Access Control ListS ices si akk Ka GR SE PE cae ae e
32. alae Ge Pv ee a Re eek ard ES eske eae ea safe 11 System Requirements i knr nn ren 12 About the ESM Manuals o o ravn eee ee 13 Policy Distribution Service 2 aa 000 cee eee 14 Securing Server ACCESS o 15 Running the Service rn ee 16 Management Service aa va vann vr rann nn nn 17 Securing Server Access uvisst ea ee kniv eee ee eee 18 Running the Service 22 see eee ee 19 Management Console c ocococococcc enke en 20 TASK Bars x are seis i A ad tie a eee d Bie berede Ge dre p 20 Menu Bar ui du vd kam aarti at Stare Palate lai TA Stk Raat wee ea Te an 22 Permissions Settings ri duar cee ak Oa keg ee ee Ke AE Glede 24 Configuration Window a nrk nn 28 Alerts Monitoring 3 0 cece amp ek faut oe pee ae Gi ee eee OE A fasader 33 Reporting s 05 ace La ee a Baek ew eae hPa oS eg eek sek ke Sb weg al chal r 37 Generating Custom Reports aaa 47 Override Password Key Generator aoaaa ee ees 58 USB Drive S canner s ne T kurses ke os a Valve alee A ate lete gt 60 Client Location Assurance Service 1 na ann nn cee eee eee ee 62 Securing Server ACCESS nrk renn 63 Optional Server Configurations 00000 nrk 64 Transferring the Public Key to the Management Service nrk e ae 64 Updating the Encryption KeyS eee aaa 64 ZENworks Security Client Management 000 cece e eee 65 Client seli Defense 11 14 bs Gye dad ob a ke Gh ean Ba et re 66
33. any of the policy tasks will minimize the tasks menu This can be viewed again by clicking on the tab on the left side See Creating and Distributing ESM Security Policies on page 78 to learn about the policy tasks and how to create and manage security policies Resources The following resources are available to help you e Contact Support This link will launch a browser and take you to our Support Contact Page e Online Technical Support This link will launch browser and take you to our Main Support Page e Management Console Help Launches Help Configuration The Management Service Configuration window provides controls for both the ESM server infrastructure and controls for monitoring additional enterprise directory services See Configuration Window on page 28 for details This control is not available when running a Stand Alone Management Console see ESM Installation and Quick Start Guide for details Endpoint Auditing Endpoint Auditing gives you access to ESM Reporting and Alerting Alerts monitoring ensures that any attempts to compromise corporate security policies are reported in the Management Console This allows the ESM Administrator to know of potential problems and take any appropriate remedial actions The Alerts dashboard is completely 21 configurable granting total control over when and how frequently alerts are triggered See Alerts Monitoring on page 33 for details Reporting is cri
34. be treated as Equal or Less when using the Age check The checks will be run in the order entered 134 Advanced Scripting Rules ESM includes an advanced rule scripting tool which gives administrators the ability to create extremely flexible and complex rules and remediation actions To access this control open the Integrity and Remediation Rules and click the Advanced Scripting Rules icon in the policy tree on the left AL ZENworks ESM Management Console Security Policy le HER File Tools Components View Help GA Save Policy ity I Z Remove Component a Security Policy x amp Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish FE Integrity and Remediation Rule 5 Antivirus Spyware Rules v Advanced Scripting Rules 24 OfficeScan 5 Tests B Installed HE Integrity Ch Firewall All Open on Startup nitscan Descripti g System Proces See Client running JavaScript scripting example that opens all ports on ipti startup iscellaneous Events Startup Name Adapter Arrival Adapter Removal Media Connect Media Disconnect Policy Updated Times and Days to run Process Change Ivi E Monday CI Saturday Ivi TJ Tuesday I Sunday Wednesd ag El Wednesday Activate when switching from lse CI Thursday all eo A ANAN User Changed Firewall CI Location Change Event fw Friday and when switching to
35. entered into the Managed and Filtered Access Points lists The level selected will enforce connectivity with APs that meet the minimum encryption requirement or greater Example if WEP 64 is the encryption requirement If encryption is the preference then APs with the highest encryption strength will be given preference over all others If signal strength is the preference then the strongest signal will be given the preference when connecting 115 Firewall Settings Firewall Settings control the connectivity of all networking ports Access Control lists network packets ICMP ARP etc and which applications are permitted to get a socket out or function when the firewall setting is applied To access this control open the Locations tab and click the Firewall Settings icon in the policy tree on the left Each component of a firewall setting is configured separately with only the default behavior of the TCP UDP ports required to be set This setting affects all TCP UDP ports when this firewall setting is used Individual or grouped ports may be created with a different setting Ku ZENworks ESM Management Console Security Policy ls Que ile Tools Components View Help im Save Policy ss mponent S D K Remove Component Security Policy x Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish Defined Locations E E Home Firewall Settings 8 Office H Offline
36. ooccoccnnccnnconoconaconi 125 application layer firewalls oooconoccnocnm o 10 Approved Dialup Adapters List 104 Approved Wireless Adapters List 104 AT di S de h sene 123 aN eN DA DE E E E E 12 Authenticating Directories ooconoccnoconoccnos 30 Authentication Timeout nun aa uu aaa aaa ne e neo ene coneces 96 B B aconin E tin Weds eis 110 Bluetooth oocooccnocnnccnnccnnccnnconiconiconins 103 C CD DVD iii aida 90 Central Management nana aaa une u neo nn ee nn eee enes 11 Change Firewall Settings oooccnoccnoconms lt gt o 100 Change Location oocccoccnocnnccnnccnnccnaconaconons 100 Change Permission cooccnccnnccnnccnnccnaconiconaces 24 Client Location Assurance omoccncccniconoconocn 101 Client Location Assurance Service 11 62 Client Reporting ooccooccnocnnocnnccnnccnnconaconacos 29 Client Self Defense isssassvaressnesrnsvsnsvsnsesserr 66 Client self defense oooccoccnnccnnccnnconaconiconacos 85 E 119 Communication Hardware Settings 103 Configuration ana 21 Configuration Window occcoccnoccnnccnnconiconicos 28 Connect Commands ooccnccnnccnnccnnconiconaconaces 96 Continue on Fail ooccnccnnccnnccnconiconaconoc 131 Create Policies snoren 24 Creating a Diagnostics Package 000008 69 DDOS safes 10 Defined Locations s ernnenennnnennenenennennanenees 99 Delete Policies pa sicet s sdos v
37. test verifies that the Management Service can successfully communicate with the Management Service database and that the database has been populated If this test failed communication with the database host may have failed or the account settings used to connect may be incorrect Setup ID Configured This test verifies that the Setup Id generated by the Novell Distribution Service was appropriately written to the Management Service database If this test fails the installation process may have been unable to read or write the setting to the Management Service database Schema ID Configured This test verifies that the unique Novell Distribution Service assigned schema identifier was written to the Management Service database If this test fails the installation process may have been unable to read or write the setting to the Management Service database Schema Key ID Configured This test verifies that the unique Novell Distribution Service assigned schema encryption key identifier was written to the Management Service database If this test fails the installation process may have been unable to read or write the setting to the Management Service database Communication Configured This test verifies that the Management Service has been configured to communicate with the Distribution Service If this test fails the installation process may have been unable to specify the location within the Management Service Installer configuration Mana
38. the date range to generate this report 44 Administrative Overrides Report Reports instances where client self defence mechanisms have been administratively overridden granting privileged control over the ZENworks Security Client ZENworks Security Client Overrides This report shows successful override attempts by user and date Dates displayed in UTC Select the user and date range then click View to run the report Endpoint Updates Report Shows the status of the ZSC Update process see ZSC Update on page 93 Dates displayed in UTC History of ZSC Update Status Shows the history of the status of the ZSC Update process Select the date range and click View to run the report The report displays which users have checked in and received the update Wireless Enforcement Reports Provides reports regarding wi fi environments the endpoint is exposed to Wireless Connection Availability Displays the access points available for connection by policy and location Includes the channel SSID MAC address and whether or not the AP was encrypted Wireless Environment The Wireless Environment report provides a survey of all detected access points APs regardless of ownership Includes the frequency signal strength and whether or not the AP was encrypted Dates displayed in UTC Select the desired locations s and the date range to generate this report see Figure 24 45 Chart Lecations Where the Most Access Points Ha
39. the local storage device that the action has failed 90 e Read Only the device type is set as Read Only When users attempt to write to the device they receive an error message from the operating system or the application attempting to access the local storage device that the action has failed Note If you wish to disable or set as Read Only the CD Rom drives and or the floppy drives on a group of endpoints the Local Security Settings passed down through a directory service group policy object must have both Devices Restrict CD ROM access to locally logged on user only and Devices Restrict floppy access to locally logged on user only set as Disabled To verify this open either the group policy object or open Administrative Tools on a machine Look in Local Security Settings Security Options and verify both devices are disabled see Figure 73 Disabled is the default Local Security Settings 3 zlolxi File Action view Help e a XxFrB8 2 Security Settings 4 08 Account Policies 5 49 Local Policies G Audit Policy 19 User Rights Assignmen T Security Options Public Key Policies H E Software Restriction Policie 2 TP Security Policies on Loca F 5 E Security Setting al e Accounts Administrator account status e Accounts Guest account status 88 Accounts Limit local account use of blank passwords to console logon only 22 Accounts Rename administrator acco
40. to certain kinds of networking and or hardware in more hostile network environments and granting broader access within trusted environments To access Location controls open the Locations tab AL ZENworks ESM Management Console Security Policy kul lle f x File Tools Components View Help E Save Policy 34 e 5 s Remove Component zi Polic Security Policy g Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish 5 Defined Locations z New Defined Locations Locations g Unknown zi Name C Client Location Assurance Office Description CT Use Location Message Title Message Icon Office v Update Interval Display Text 5 Minutes C Hous C Days Link User Permissions Parameters I CI Allow Manual Location Change CI Save Network Environment CI Allow Manual Firewall Settings Change CI Show Location In Client Menu N s ve Figure 77 Location Settings The Unknown Location All policies have a default Unknown location This is the location the ZENworks Security Client will switch the user to when they leave a known network environment This Unknown location is unique for each policy and is not available as a shared component Network Environments cannot be set nor saved for this location To access the Unknown Location controls open the Locations tab and click the Unknown location in the policy tree on t
41. update the current service status click refresh To restart the services and process the currently queued activities cick synchronize Retresh nehronize OK Cancel elp Figure 11 Service Synchronization 1 To update the current service status click Refresh 2 To restart the services and process the currently queued activities click Synchronize 32 Alerts Monitoring Alerts monitoring allows the ESM Administrator to effortlessly gauge at a glance the security state of all ESM managed endpoints throughout the enterprise Alerts triggers are fully configurable and can report either a warning or as a full emergency alert This tool is accessed either through Endpoint Auditing on the task bar or through the View menu To access Alerts select the Alerts icon Alerts see Figure 12 e TEhworka ESM Management Console QuE Ela Tecla y Melo 2 Refresh Policy tist Fara 2 est x Endponi Audeng l r Chart Integy ricm XX Grig Mm Amor Ureemedsted reng y mit takses a r Coria text Satur g Aet GJ Potential port ican enote Tagger siat when brederie m u derre Dre day hta v reel erd vesen v l U v om Show gl L G Had stemt 3 Ovesen vent Ervi Ex ert 3 Iranet n mt verqt bosi sa Wenas Secuaty Pokey I asks Receurces Contgasten End fund Figure 12 Alerts Dashboard Alerts monitoring is available for the following areas e Client Integrity notifies of unremed
42. users with a user interface for managing the server application SQL Server Enterprise Manager is the Microsoft SQL Server 2000 MMC snap in To launch SQL Server Enterprise Manager select the Enterprise Manager icon in the Microsoft SQL Server program group On computers running Windows 2000 you can also launch SQL Server Enterprise Manager from Computer Management in Control Panel MMC snap ins launched from Computer Management do not have the ability to open child windows enabled by default You may have to enable this option to use all the SQL Server Enterprise Manager features When examining Novell installations the tables of interest per database are as follows Distribution Service CONFIGURATION Contains the settings used for the Distribution Service and Event Packager Agent Windows Service The settings in storage order are Distribution Server Role future Setup ID Minimum SSL Key Length DIME Timeout Schedule Interval for Event Packager minutes Minimum Client Packages to add to Reporting Package Maximum Client Packages to add to Reporting Package 10 Distribution Service Counter Category 11 Event Packager Service Counter Category OWN AAW 227 14408F8C 4EA7 41C3 A 13012678 16977C 50 500 Distribution Service 3 0 Event Packager 3 0 13 2 2 2 2 2 2 2 2 Figure 112 Example Configuration Table REPOSITORY Contains the binary data for reporting policies etc VISE 474938 KITA APET
43. will switch to that location BEFORE disabling the unauthorized adapter A password override should be used to provide a manual location switch if this occurs 104 Storage Device Control This control overrides the global setting at this location To access this control open the Locations tab and click the Storage Device Control icon in the policy tree on the left RR SES AL ZENworks ESM Management Console Security Policy les Quay File Tools Components View Help GA Save Policy 4 5 ide z1 Security Policy x g g Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish Defined Locations Storage Device Control Hy Firewall Settings CD DYD 5 Network Environments Wi Fil R Management Wi FilR Security Removable Storage EE a Unknown Allow All Access Il Apply Global Setting v Figure 80 Location Storage Device Control Preferred devices will be overridden when Disable or Read Only is selected at this level Use Apply Global Setting to allow only preferred devices Apply Global Setting Applies the default setting Enable The device type is allowed by default This setting will override a global setting which includes a serial numbered device but disables all others Disable The device type is disallowed When users attempt to access files on a defined storage device they receive an error message from the operating system or the
44. 07 Novell Inc All Rights Reserved L 1M wien Sect wees eee ad 123 Location Change Event coccnnccnoccnoconocono 136 Location Components oococccnccnnccnnconaconaconocs 102 Location ICON mein 100 EG CGHONS ea 98 M Machine Based Policies aaa aaa aa ana na maca eee vec cenni 67 Managed Access Points oococcnoccnnconoconiconoc 110 Management Console ooccnoccnccnnocnnoc 11 20 Management Console Access occnoccnoconoconocos 24 Management Service 64 11 17 230 Managing and Adding Directory Services 30 Microsoft SQL Enterprise Manager 227 Multiple User Support ococonononononononononenenos 67 N NDIS gt iii 10 NetBIOS occissigecstivaveccastintcecastigieoessveeetents 10 Network Address Macros List c0000 123 Network Environments ooccnoconoconoconicono 106 NO Execution streipen nage 125 No Network ACCESS c occnoccnoconoconoconaconocanon 126 O Open Sa SR 118 Optional Server Configurations 006 64 Override Password Key Generator 6 58 P Periodic Renewal of the Key Management Key KMK rescindir incidido ease 19 Permissions Settings aaaaaaaaena ven eneve eneve 24 Policy Audit Data eso siose rnis 29 Policy Data and Activity occoccnoccnoconconconicos 29 Policy Distribution Service oooccmoommo 11 14 Policy T sks vedi sode nijeti ed spent 21 Preference AP Selection ooccoccnoconoconocono 115 Preferred DEVICES sanse vdes doi 91
45. 0M5 SOL SERVER Poke y ser ves eert miro Muere i Mobic Location Deina Framed State Ad Oper Tooter iron Tra son Aararentratce Override rabia nane Rermovatle Storage CDQ VD Oroes POA Devioen 1304 Devers Serial Port Devices Paradai Port Devices Bhustouth Devices Caption Serial Munabet ov Pattern Access Type Figure 48 View Policy Window 71 The policy display divides the policy components into the following tabs e General displays the global and default settings for the policy e Firewall Settings displays the Port ACL and Application groups available in this policy e Firewalls displays the firewalls and their individual settings e Adapters displays the permitted network adapters e Locations displays each location and the settings for each e Environments displays the settings for defined network environments e Rules displays integrity and scripting rules in this policy e Misc displays assigned reporting hyperlinks and custom user messages for this policy Rule Scripting This tool allows the administrator to enter a specific seript into the ZSC that will run on this endpoint only The scripting window see Figure 49 can browse for an available script Note Scripts MUST be either script or vbscript or a script can be created using this tool 8 ZENworks Security Client Scripting Development Environment Script File Browse
46. 218 Wi Fi Hotspot Comm Hardware New Firewall Settings Storage Device Control Description EG Firewall Settings eL iO Name Co Network Environments Wi Fi R Management WiFilR Security Default Behavior H Unknown Stateful lv Show Firewall In Client Menu Save complete Figure 88 Firewall Settings To create a new firewall setting Step 1 Select Firewall Settings in the components tree and click the New Component button Step 2 Name the firewall setting and provide a description Step 3 Select the default behavior for all TCP UDP ports Additional ports and lists may be added to the firewall settings and given unique behaviors which will override the default setting Example The default behavior for all ports is set as All Stateful The ports lists for Streaming Media and Web Browsing are added to the firewall setting The Streaming 116 Media port behavior is set as Closed and the Web Browsing port behavior is set as Open Network traffic through TCP Ports 7070 554 1755 and 8000 would be blocked Network traffic through ports 80 and 443 would be open and visible on the network All other ports would operate in Stateful mode requiring the traffic through them be solicited first Step 4 Select whether to display this firewall in the ZSC menu if unchecked the user will not see this firewall setting Step 5 Click Save Repeat the above steps to create another firewall setting To associat
47. 8 9 10 11 12 13 14 15 16 17 18 BD2 21 2 23 24 25 26 27 28 29 Location Once a report is generated it can be viewed through the Management Console printed emailed and or exported as a pdf file using the report toolbar see Figure 18 37 G r d Figure 18 Report Toolbar When reviewing reports the arrow buttons will help you navigate through each page of the report Reports will typically have charts and graphs on the first page with the gathered data on the remaining pages ordered by date and type The printer button will print the full report using the default printer for this computer The Export button saves the report as a PDF file Excel spreadsheet Word document or RTF file for distribution The Group Tree button will toggle a list of parameters to the side of the report Select any of these parameters to drill down further into the report Click the Group Tree button to close the side bar The magnifying glass button provides a drop down menu to adjust the current view size The binoculars button opens a search window When you mouse over a certain parameter like a user name or device name for example the mouse will change to a magnifying glass You can double click on that particular item and display a new report for just that object Click the X button to close the current view and return to the original report To return to the report list click the Report List icon above the report win
48. 85 SEA 39 Admnst ntor le 4 64083062 315 4 3 But je 8 ECCTIF MATI 36 Admrvstrators mi 5 30206040 424 4 36 Scheme Admins ml 5 6427 A879 18 184 36 Enterprise Admins Ia 5 DEBA 1840 44784 36 Doman Admins laa 8 APSCE0FO A24S 3 Users Es S 12031 NESE 2 4 3 test user gi Figure 114 Example Organization Table ORG REP Contains the Item to User and Item to Group assignments KE HE AA 3 30 2005 12 55 3 2 3 30 2005 12 55 3 2 3 30 2005 12 55 3 2 3 30 2005 2 IXESH C441 i TICS C441 1 IXSESH 441 1 IKHESH 4418 1 IXCGE SEP CHIE 1 IIX S CHIE 1 IK ESF CA iE 1 IESE C44 l IXGESH CHI 1 TES CHI 1 ICEN 1 IK SH CLA 1 33058 CHE 1 os ie x A e jo je je pa 3 30 2005 12 55 3 3 30 2005 12 55 3 3 30 2005 12 55 3 3 30 2005 1 48 04 Figure 115 Example ORG_REP Table EVENT Contains log of user events used for reporting 229 SOL Server Enterprise Manager Data in Table event in STOSDB on MS SOLSERVER Si x 81X lis red Jen 201 18 LLI leve Saren eve rep xi eve rep version Jeve n rere ML HAL gt i ses Figure 116 Example Event Table EVENT CLIENTDATA Contains the data uploaded by the client can be manually retrieved using TEXTCOPY or NovellDBIO Note Contents of this table will fluctuate as data is packaged for the Management Service Management Service CONFIGURATION Contains the settings used for the Management Ser
49. Add New button Step 2 Name the rule and provide a description Step 3 Select the trigger for the rule e Startup run tests at system startup Location Change run the tests whenever the ZSC switches to a new location Timer integrity tests may be performed on a defined schedule by the minute hour or day Set the time for how often the tests will run Step 4 Click Save Step 5 Define the Integrity Tests see Integrity Tests on page 131 Step 6 Repeat the above steps to create a new antivirus spyware rule Associate Existing Antivirus Spyware Rules Step 1 Select Antivirus Spyware Rules and click Associate Component Step 2 Select the desired Rule s from the list Step 3 The tests checks and results may be re defined Note Changing the settings in a shared component will affect ALL OTHER instances of this same component Use the Show Usage command to view all other policies associated with this component Step 4 Click Save Step 5 Integrity tests and checks will be automatically included and can be edited as necessary 130 Integrity Tests Each integrity test can run two checks File Exists and Process Running Each test will have its own Success and Fail results t ZENworks ESM Management Console Security Policy eee mx File Tools Components View Help Ed Save Policy alle Mew Component SB Associate C La Remove Component E Security Policy x pa Global Policy Settings Locat
50. B and other external storage devices are disabled Repeat steps 1 and 2 for each device that will be permitted in this policy All devices will have the same setting applied Note Location based Storage Device Control settings will override the global settings For example you may define that at the Work location all external storage devices are permitted while allowing only the global default at all other locations limiting users to the devices on the preferred list Importing Device Lists The Novell USB Drive Scanner Application generates a list of devices and their serial numbers See USB Drive Scanner on page 60 To import this list click Import and browse to the list The list will populate the Description and Serial Number fields 92 ZSC Update Patches to repair any minor defects in the ZENworks Security Client are made available with regular ESM updates rather than providing a new installer which will need to be distributed through MSI to all endpoints ZSC Update allows the administrator to dedicate a zone on the network which will distribute update patches to end users when they associate to that network environment To access this control open the Global Policy Settings tab and click the ZSC Update icon in the policy tree on the left AL ZeNvworks ESM Management Console Security Policy UGE Ela los Cormporarte Yow b Ged sove poky a de k Secutly Pokey x PARRA Global Pokey Settings Loca
51. By utilizing the ZSC Update option RECOMMENDED see ZSC Update on page 93 66 Setting the Upgrade Switch Step 1 Open the new installation package for the ZSC and right click setup exe Step 2 Select Create Shortcut Step 3 Right click the shortcut and select Properties Step 4 At the end of the Target field after the quotes click the space bar once to enter a space then type V STUPGRADE 1 Example C Documents and Settings euser Desktop CL Release 3 2 455 setup exe V STUPGRADE 1 Step 5 Click OK Step 6 Double click the shortcut to lauch the upgrade installer Running the ZSC The ZSC will run automatically at system startup For user operation of the ZSC see the ZSC User s Manual The User s Manual can be distributed to all users to help them better understand the operation of their new notebook security software Multiple User Support For machines that have multiple users logging onto them each user account will have its own separate Novell environment the users can have separate policies and saved network environments Each account will need to login to the Management Service separately to receive its credential in order to download its published policy In a case where a user either can t or refuses to login they will get the initial policy that was included at ZSC installation This helps discourage a user from creating a different account to avoid policy restrictions Since only one poli
52. Internet Data Connector Prohibited i 3 Server Side Includes Prohibited lej webDav Prohibited Tasks Add a new Web service extension allow all Web service extensions For a specific application ED Prohibit all Web service extensions Open Help AUN extended er Mmm A tt Figure 101 Allowing ASP NET Step 4 This will activate the ASP NET functions and allow the Policy Distribution Service to function on a Windows 2003 Server 206 Server Communication Checks a ty Management Service Installer Configuration Description 2 Congratulatons you have successfully configured the ESS Rd Configuration Filo Valid Management Service You may now opbonally configure your ba Schema Exists default autherticabon service M Database Exists MA Setup Id Configured M Schema Id Configured M Schema Key Id Configured y Domain Information Available f Communication Configured Name Utah senforce com f Management Key Written Type Microsoft Windows 2000 KA Registered with Distribution Service pr on prins Test Password f Initialize the Distribution Service data M Create Management Signabare Keys O Authenticating Service Corbgured M Create Encryption Management Key Publish Management Dats Dane Figure 102 Communications Console The Communications Console is an initialization and reset utility The utility will first be run when installing the product It initializes the Distribution Service
53. Management Console is a visible user interface which can run directly on the server hosting the Management Service or on a workstation residing inside the corporate firewall with connection to the Management Service server The Management Console is used to both configure the Management Service and to create and manage user and group security policies Policies can be created copied edited disseminated or deleted using the editor e Client Location Assurance Service provides a cryptographic guarantee that ZENworks Security Clients are actually in a defined location as other existing network environment parameters indicate System Requirements Table 1 System Requirements Server System Requirements Endpoint System Requirements Operating Systems Microsoft Windows 2000 Server SP4 Microsoft Windows 2000 Advanced Server SP4 Windows 2003 Server Processor 3 0 GHz Pentium 4 HT or greater 756 MB RAM minimum 1 GB Recommended Disk Space 500 MB Without local Microsoft SQL database 5 GB With local MS SQL database SCSI recom mended Required Software Supported RDBMS SQL Server Standard SQL Server Enterprise Microsoft SQL Server 2000 SP4 or SQL 2005 Microsoft Internet Information Services config ured for SSL Supported Directory Services eDirectory Active Directory or NT Domains NT Domains is only supported when the Management Ser vice is installed on a Windows 2000 or 2000 advanced server
54. Novell ZENworks Endpoint Security Management Version 3 2 Administrator s Manual June 14 2007 2007 Novell Inc All Rights Reserved The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement PN AM300MWE Document Version 1 0 supporting Novell ESM 3 2 and subsequent version 3 releases Legal Notices Novell Inc makes no representations or warranties with respect to the contents or use of this documentation and specifically dis claims any express or implied warranties of merchantability or fitness for any particular purpose Further Novell Inc reserves the right to revise this publication and to make changes to its content at any time without obligation to notify any person or entity of such revisions or changes Further Novell Inc makes no representations or warranties with respect to any software and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose Further Novell Inc reserves the right to make changes to any and all parts of Novell software at any time without any obligation to notify any person or entity of such changes Any products or technical information provided under this Agreement may be subject to U S export controls and the trade laws of other countries You agree to comply with all export control regulations and to obtain any required licenses or
55. Policy le Que File Tools Components View Help E a 5 ds m SENE x E Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish 6 5 Global Settings si amp Global Policy Settings Wireless Control Comm Hardware Storage Device Control Name CI Use Policy Update Message rd ZSC Update Security Policy Title yoy VPN Enforcement Description Mess Enable client self defense i pla ext Password Override Display Te Password Link Confirm Parameters Uninstall password Setting Use Existing Password Confirm Novell Figure 67 Global Policy Settings The primary global settings are Policy Name and Description The policy name defined at new policy creation can be adjusted here A description of the policy may also be entered e Enable client self defense Client Self Defense can be enabled or disabled by policy Leaving this box checked will ensure that Client Self Defense is active Unchecking will deactivate Client Self Defense for all endpoints consuming this policy e Password Override This feature allows an administrator to set up a password override which can temporarily disable the policy for a specified period of time Check the Password Override box and enter the password in the provided field Enter the password again in the confirmation field Use this password in the Override Password Generator to generate the passw
56. Ps identified by SSID listed in the policy When one or more access points APs are defined in the Managed APs list the Signal Strength switching for the Wi Fi adapter may be set See page 100 for information on Signal Strength Settings 110 Filtered Access Points Access points entered into the Filtered Access Points list are the ONLY APs which will display in Zero Config this prevents an endpoint from connecting to unauthorized APs EE Figure 84 Filtered Access Points Control Enter the following information for each AP e SSID Identify the SSID number case sensitive MAC Address Identify the MAC Address recommended due to the commonality among SSIDs If not specified it is assumed there will be multiple AP s beaconing the same SSID Prohibited Access Points Access points entered into the Prohibited Access Points list will not display in Zero Config nor will the endpoint be permitted to connect to them Managed Access Points i SSID MAC Address Figure 85 Prohibited Access Points Control Enter the following information for each AP e SSID Identify the SSID number case sensitive MAC Address Identify the MAC Address recommended due to the commonality among SSIDs If not specified it is assumed there will be multiple AP s beaconing the same SSID 111 Wi Fi Signal Strength Settings When more than one WEP managed access points APs are defined in the list the signal strength switching f
57. Reports instances where a user has made an unauthorized attempt to modify or disable the ZENworks Security Client Dates displayed in UTC Enter the date parameters and click View to run the report Integrity Enforcement Report Provides reporting for antivirus anti spyware integrity results Client Integrity History Reports on the success failure of client integrity checks Dates displayed in UTC 42 Select the date range for the report integrity rule s and user name s Unremediated Integrity Failures by Rule Reports on integrity rules and tests that have failed and not yet been remediated Select the integrity rule s and click View to run the report Unremediated Integrity Failures by User Reports on users that have failed integrity tests and not yet remediated Select the user names s and click View to run the report Location Reports Provides data for common location usage 1 e what locations are most commonly used by end users Location Usage Data Information gathered from individual clients about what locations are used and when Dates displayed in UTC The locations displayed are ONLY the locations used by the user Unused locations will not be displayed Select the date range to generate the report see Figure 22 Chart Locations Where ESM Clients Spent the Most Time Chart ESM Accounts that Spent Time at the Most Locations 4 Note mrs Location Usage Data By Date and User Leer LA
58. SW ISS Aske Total Start Date and Time Eed Dats and Time Location Deration minute Duration minutes 122004 06 ve 1344 Le 224 1 3 79 129006 4 DA 5 L non Totals for User TASWISS Om 20 Dec 2086 246 240 00 1 Total Page No 5 Zoom Factor 100 Figure 22 Sample Location Usage Report 43 Outbound Content Compliance Reports Provides information regarding the use of removable drives and identifies which files have been uploaded to such drives Removable Storage Activity by Account Shows accounts that have copied data to removable storage No parameters are required to generate this report Removable Storage Activity by Device Shows removable storage devices to which files have been copied Select the date range user name s and location s to generate this report Detected Removable Storage Devices Shows removable storage devices that have been detected on the endpoint Select the date range user name s and location s to generate this report see Figure 23 Chart ESM Accounts that Have Used the Mest Different Removable Storage Devices Murder of cerrado viin ape deve es verd Detected Removable Storage Devices Device Name Device Serial 8 Syrded DOTA Location L S081 oren Name Fester Name Deir sad Time Figure 23 Sample Detected Removable Storage Devices report Chart 7 Days of Removable Storage Activity by Account Chart of accounts that have recently copied data to removable storage Enter
59. Script perform the following steps Step 1 Under Locations create or select the location which will use the Stamp Once functionality Step 2 IMPORTANT under User Permissions un check Save Network Environment Step 3 Associate the Stamp Once scripting rule to this policy Step 4 Set the triggering event to Location Change Activate when switching to Select the configured location from Step 1 and 2 above Step 5 Open the location_locked variable and select the same location as in step 4 above 195 Block Gray List Script This script will block ALL non approved software from executing This script is a Global Rule and is not applied per location When activated this Script will disable prevent from executing ALL applications with the exception of the ones included in the Gray List Application Controls list To initiate the Block Gray List Script perform the following steps Step 1 In EACH location in this policy create a NEW firewall setting and set it as the default Step 2 Remove the previous default firewall settings All Adaptive as well as any other Novell firewall settings that cannot be altered set as read only Step 3 Under the new firewall settings associate the existing Application Control setting Gray List Minimally Functional and leave the Default Execution Behavior set to All Allowed WARNING Every firewall setting contained in this policy MUST contain the Gray List Minimally Functional Application Con
60. Select the Enable file rollover check box which creates new files to store the trace data if the maximum file size is reached This option is selected by default when you are saving trace results to a file e Select the Server processes SQL Server trace data check box e To avoid missing events select this option 221 Tracing Novell Database Installations The Novell Database architecture uses stored procedures extensively throughout It is important to be able to identify these interactions processes for debugging the system SS SOL Profiler Untitled Y us SOLSERVER T og ie Gat Ven Replay Ios Wrdow Heb 2x AS IFA ne BE Rute O jesed EXECUTE medd dho ep_eqgiegent_get_perft_counters Jeted SELECT N Testiag Connection ent qet p rf counters Syjlagent SE CAMADA TDT EDT WAGES CITADA TA Connectors 1 Figure 110 Database Tracing The highlighted row represents a client check in to the Distribution Service The statement decomposed shows the following Return Variable declaration declare P1 int Return Variable assignment set P1 0 Call to Stored Procedure exec CHECKIN_SP User Credential CA6AAD8A 7DBF 48DF A682 6EE535573B77 Policy Id 2e58dafe 6ce1 44f5 9b40 557354e8 14f8 Location Id 64A2C1F3 E8FE 4E42 B77B 4C21A4C305BC Result Code P1 output If you are having difficulty getting the client to download a published policy performing a trace and capturing the Check In call w
61. Server 30 v Ftegrated Securty r ESOS Figure 32 Enter Server Information 52 Step 6 Select the source table or view that you will be using for your report by expanding the tree nodes as shown see Figure 33 Dwa n Gow Tot Too N Orar Select sve Creose data 19 report on You can choces magia tates and ok never Tables n moot Figure 33 Select Source Table or View Step 7 Under the Fields tab select the table or view columns that you wish to include within your report see Figure 34 Click Next to continue Oss Fields Gonzo Total Teon Owe Seea se Croce the rfomaton to daplay on the report Select the avaiable fakte that cortan the data you wart to re ot on Then add them to the Fakta to Display bet Figure 34 Select the columns to include 53 Step 8 If you are planning to group or summarize your data click the Group tab and select the columns you wish to group by as shown see Figure 35 Click Next or Select the Style tab Data Fete Goun Total Teo Ore Select s Petons Group the formation on the spot Record mil be soted by ther values on the Group By tel n Add summary nfomaton n the Totals sep to break Figure 35 Select Columns to Group Step 9 Title the report and select the style see Figure 36 The report builder displays see Figure 37 Outa Fe Gog Total Too Cut Select Ste Prtonal Add style te the report Select a f
62. Step 2 Select the network environment s from the list Step 3 The environment parameters may be re defined 107 Note Changing the settings in a shared component will affect ALL OTHER instances of this same component Use the Show Usage command to view all other policies associated with this component Step 4 Click Save 108 Wi Fi Management Wi Fi management allows the administrator to create Access Point AP lists The wireless access points entered into these lists will determine which APs the endpoint is permitted and not permitted to connect to within the location and which access points it s permitted to see in Microsoft s Zero Configuration Manager Zero Config 3rd party wireless configuration managers are not supported with this functionality If no access points are entered all will be available to the endpoint To access this control open the Locations tab and click the Wi Fi Management icon in the policy tree on the left Note In either of the Wi Fi Connectivity Controls Wi Fi Security and Wi Fi Management unchecking enable will disable ALL Wi Fi connectivity in this location i TER AL Z rhvorks ESM Management Console Security Policy e UVa Ela look Comporarte Yew Hae al yA si lt Fy Seouty Poky A Global Pokey Settings Locmor inagiy ard Rate Pubes Comphance Regering Public E Dered Locators Once Wi Fi R Management I Coma Hasdheare Storage Vence Control ED Formal S
63. Svchost exe Lsass exe Winlogon exe Wmiprvse exe Services exe Default ALL ALLOWED see Block STEngine exe STUser exe Explorer exe PolicyEditor exe Unman Gray List Script on page 196 agedEditor exe Smss exe dllhost exe crss exe taskmgr exe If the same application is added to two different application controls in the same firewall setting 1 e kazaa exe is blocked from executing in one application control and blocked from gaining network access in another defined application control under the same firewall setting the most stringent control for the given executable will be applied i e kazaa would be blocked from executing 127 Integrity and Remediation Rules ESM provides the ability to verify required software is running on the endpoint and provides instant remediation procedures if the verification fails Antivirus Spyware Rules Antivirus Spyware Integrity checks verify that designated Antivirus or Spyware software on the Endpoint is running and up to date and can mandate immediate remediation restricting a user to specific updates until the endpoint is in compliance It can also establish rules which will automatically place non compliant devices into a safe customizable quarantine zone preventing infection of other users on the network by this endpoint Once endpoints are determined compliant by a follow up test security settings automatically return to their original state See Antivirus Sp
64. TION_FACT_VW This view describes the user activity as it relates to ESM integration with an Enterprise information repository All user management activities are reflected within this table EVENT_POLICYCOMPONENT_FACT_VW This view describes the interaction of components and policies For example when a location is added to a policy an audit row would reflect that change The data is grouped by user day policy component and action EVENT_PUBLISHACTION_FACT_VW This view describes the policy and component assignment to an organization EVENT_SERVERACTION_FACT_VW This view describes the user activity with the Distribution Service Check In for example EVENT_USERACTION_FACT_VW This view describes the user policy activity with the Distribution Service Policy Key EFS Key Schema downloads So how do create a report The following steps describe the creation of a simple report The following example uses the Visual Studio NET 2003 Enterprise Architect IDE Step 1 From the IDE select Add New Item and add a new Crystal Report see Figure 28 re Add New Item Reports Es Categories Templates ee f Web Project ems a e a E instabes Class Crystal Report Bitmap File R 159 Cursor Ple Icon Fle Assembly Resource File Script Fie VBSorpt Fie dom Script Most A Crystal Report file that publishes data to a Windows or Web form Name msP_LUSERPATCHSTATUS rpt cora ru Figure 28 Add New Crystal Report
65. able to activate the screen and the rule Step 7 Enter the IP address es for the VPN Server in the provided field If multiple addresses are entered separate each with a semi colon example 10 64 123 5 66 744 82 36 Step 8 Select the Switch To Location from the drop down list The ZSC will switch to this selected location once the VPN authenticates see the Switch To Location for more details 94 Step 9 Check off the Trigger locations where the VPN enforcement rule will be applied For strict VPN enforcement it is recommended the default Unknown location be used for this policy Once the network has authenticated the VPN rule will activate and switch to the assigned Switch To Location Note The location switch will occur BEFORE the VPN connection once the network has authenticated see Advanced VPN settings Step 10 Enter a Custom User Message which will display when the VPN has authenticated to the network For non client VPNs this should be sufficient For VPNs with a client include a Hyperlink which points to the VPN Client Example C Program Files Cisco Systems VPN Client ipsecdialer exe This link will launch the application but the user will still need to log in A switch can be entered into the Parameters field or a batch file could be created and pointed to rather than the client executable Note VPN clients that generate virtual adapters e g Cisco Systems VPN Client 4 0 will display the Policy Has Been
66. abledState ret VBScript dim ret Action Trace Reset Policy Change ret Action RemovableMediaState 1 ePolicyChange Action Trace RemovableMediaState amp ret ret Action CDMediaState 1 ePolicyChange Action Trace CDMediaState amp ret ret Action HDCState eApplyGlobalSetting elrDA ePolicyChange Action Trace nHDCState eA pplyGlobalSetting elrDA amp ret ret Action HDCState eApplyGlobalSetting e1394 ePolicyChange Action Trace HDCState eApplyGlobalSetting e1394 amp ret ret Action HDCState eApplyGlobalSetting eBlueTooth ePolicyChange Action Trace HDCState eApplyGlobalSetting eBlueTooth amp ret ret Action HDCState eApplyGlobalSetting eSerialPort ePolicyChange Action Trace HDCState eApplyGlobalSetting eSerialPort amp ret ret Action HDCState eApplyGlobalSetting eParrallelPort ePolicyChange Action Trace HDCState eApplyGlobalSetting eParrallelPort amp ret ret Action WiFiDisabledState eApplyGlobalSetting ePolicyChange Action Trace InWiFiDisabledState amp ret ret Action WiFiDisabledWhenWiredState eA pplyGlobalSetting ePolicyChange Action Trace WiFiDisabledWhenWiredState amp ret 167 ret Action AdHocDisabledState eApplyGlobalSetting ePolicyChange Action Trace AdHocDisabledState amp ret ret Action AdapterBridgeDisabledState eApplyGlobalSetting ePolicyChange Action Trace AdapterBridgeDisabledSt
67. ace NameValueExists ret ret Storage GetName Value testval Action Trace GetName Value ret VBScript dim ret Storage SetNameValue testval 5 ret Storage NameValueExists testval Action Trace NameValueExists amp ret ret Storage GetName Value testval Action Trace GetName Value amp ret SetPersistString Persist ValueExists GetPersistString JScript var ret Storage SetPersistString teststr pstring ret Storage Persist ValueExists teststr Action Trace Persist ValueExists ret ret Storage GetPersistString teststr 172 Action Trace GetPersistString ret VBScript dim ret Storage SetPersistString teststr pstring ret Storage Persist ValueExists teststr Action Trace PersistValueExists amp ret ret Storage GetPersistString teststr Action Trace GetPersistString amp ret RuleState JScript Storage RuleState true var ret Storage RuleState Action Trace RuleState ret VBScript dim ret Storage RuleState true ret Storage RuleState Action Trace RuleState amp ret RetrySeconds JScript var ret Storage RetrySeconds 30 ret Storage RetrySeconds Action Trace RetrySeconds ret VBScript dim ret 173 Storage RetrySeconds 30 ret Storage RetrySeconds Action Trace RetrySeconds amp ret Interfaces These interfaces are returned by one of the
68. ain applications and having only authorized hardware available to them To begin a security policy click New Policy in the File menu of the Management Console Policy Tabs and Tree A security policy is written edited by navigating through the available tabs at the top of the screen and the components tree on the left The available tabs are e Global Policy Settings Settings which are applied as defaults throughout the policy e Locations These policy rules are applied within a specific location type whether specified as a single network or a type of network such as a coffee shop or airport Integrity and Remediation Rules Assures essential software such as antivirus and spyware is running and up to date on the device e Compliance Reporting Instructs whether reporting data including the type of data is gathered for this particular policy e Publish Publishes the completed policy to individual users directory service user groups and or individual machines The Policy Tree displays the available subset components for the tabbed categories For example Global Policy Settings include subsets of Wireless Control ZSC Update and VPN Enforcement ONLY the items contained on the primary subset page are required to define a category the remaining subsets are optional components 78 Policy Toolbar The policy toolbar see Figure 58 provides four controls The Save control is available throughout policy creation while t
69. al Policy Settings tab and click the Storage Device Control icon in the policy tree on the left AW ZENworks ESM Management Console Security Policy le Que File Tools Components View Help E Save Policy 4 E ida Security Policy Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish 5 Global Settings 3 Policy Settings Storage Device Control g E Wireless Control Comm Hardware CD DVD Allow All Access Removable Storage Disable All Acc Preferred Devices Allow All Access yoy VPN Enforcement Preferred Devices Description Serial Number Kingston DataTraveler 2 0 USB Device 28819640D23C Figure 72 Global Storage Device Control Storage Device Control is differentiated between Removable Storage USB thumb drives Flash memory cards and SCSI PCMCIA memory cards along with traditional zip floppy and external CDR drives and the CD DVD drives including CD ROM CD R RW DVD DVD R RW The hard drive and network drives when available will always be allowed To set the policy default for storage devices select the global setting for both types from the drop down lists e Enable The device type is allowed by default e Disable The device type is disallowed When users attempt to access files on a defined storage device they receive an error message from the operating system or the application attempting to access
70. al collections of recommendations such as CISSP or SANS guidelines Even when a given regulatory frameworks is not applicable it may still act as a valuable resource and planning guide Likewise Disaster Recovery and Business Continuity mechanisms to protect the Distribution Server should be put in place to protect the server if an organizational risk assessment identifies a need for such steps The mechanisms best used will depend on the specifics of the organization and its desired risk profile and cannot be described in advance The same standards and guidelines sources listed above can be helpful in this decision as well Network Access Control The Distribution Server can be further protected from unauthorized access by restricting network access to it This may take the form of some or all of the following e restricting incoming connection attempts to those ports and protocols from which a valid access attempt might be expected e restricting outgoing connection attempts to those IP addresses to which a valid access attempt might be expected and or e restricting outgoing connection attempts to those ports and protocols to which a valid access attempt might be expected Such measures can be imposed through the use of standard firewall technology High Availability High Availability mechanisms for the Distribution Server should be put in place if an organizational risk assessment identifies a need for such steps There are multipl
71. all CI Timer Run Every Minutes Hous Days Save complete Figure 95 Advanced Scripting The scripting tool uses either of the common scripting languages VBScript or JScript to create rules which contain both a trigger when to execute the rule and the actual script the logic of the rule The administrator is not restricted on the type of script to be run Advanced Scripting is implemented sequentially along with other integrity rules therefore a long running script will prevent other rules including timed rules from executing until that script is complete To create a new advanced scripting rule Step 1 Select Advanced Scripting Rules from the components tree and click Add New Step 2 Name the rule and provide a description Step 3 Enter the triggering event s Times and Days to Run up to five different times may be set for the script to run The run will occur weekly on the selected day s 135 e Timer Run Every set the time to run every minute hour or day e Miscellaneous Events the script will run when one or more of the selected event s occur on the endpoint e Location Change Event the script will run when a selected location change event occurs These events are NOT independent They are additive to the previous event e Check Location Change Event script will run at ALL location changes e Activate when switching from script will run only when the user leaves thi
72. ameworks is not applicable it may still act as a valuable resource and planning guide Disaster Recovery and Business Continuity Disaster Recovery and Business Continuity mechanisms to protect the Management Server should be put in place to protect the server if an organizational risk assessment identifies a need for such steps The mechanisms best used will depend on the specifics of the organization and its desired risk profile and cannot be described in advance There are multiple available standards and guidelines available including NIST recommendations HIPAA requirements ISO IEC 17799 and less formal collections of recommendations such as CISSP or SANS guidelines Network Access Control The Management Server can be further protected from unauthorized access by restricting network access to it This may take the form of some or all of the following e restricting incoming connection attempts to those IP addresses from which a valid access attempt might be expected e restricting incoming connection attempts to those ports and protocols from which a valid access attempt might be expected e restricting outgoing connection attempts to those IP addresses to which a valid access attempt might be expected and or e restricting outgoing connection attempts to those ports and protocols to which a valid access attempt might be expected Such measures can be imposed through the use of standard firewall technology High Availability
73. ap wsdl server This XML file does not appear to have any style information associated with it The document tree is shown below definitions names TDistributionService targetNamespace hinp schemas microsoft com ch nsassem Senforce Security MobdeManagement I lt types gt lt schema targetNamespace http schemas microsoft com clr nsassem Senforce Security Mobi elementFormDefault unquali ed attribute FormDefault unqual ed gt lt simpleType names Con guratonitems suds enumType xsdint gt lt restriction base xsdstring gt lt enumeration value Setupidenter gt lt enumeration values Man SSLKevStrength gt lt enumeration value EventAgentCategory gt lt enumeration values Dime Tamcout gt lt enumeration value SchedulelntervalSpan gt lt enumeration value EventLogsPerPackage gt lt enumeration value PobcyServerCategory gt lt restriction gt lt simpleType gt lt schema gt lt schema Figure 104 Distribution Service Server Communication MS https machinename authenticationserver userservice asmx client Ele Edt yew Go loomaks Took teb i 990 4 ao hepe Jdevelautrertcatorsen f amp VICI Es com t t TIT Messagng de Ains Nutrisonois M UserService The following operabons are supported For a formal definition please review the Service Description AvailobleServices Authenticate SidAuthenticate
74. application attempting to access the local storage device that the action has failed Read Only the device type is set as Read Only When users attempt to write to the device they receive an error message from the operating system or the application attempting to access the local storage device that the action has failed 105 Network Environments If the network parameters Gateway server s DNS server s DHCP server s WINS server s available access points and or specific adapter connections are known for a location the service details IP and or MAC which identify the network can be entered into the policy to provide immediate location switching without requiring the user having to save the environment as a location To access this control open the Locations tab and click the Network Environments folder in the policy tree on the left ZENworks ESM Management Console Security Policy gogog File Tools Components Help Security Policy X 5 y Le Remove Component Security Policy Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish EE Defined Locations SH Office Network Environments ig Comm Hardware 3 Storage Device Control FE Firewall Settings GJ y All Adaptive Defaul New Network Environments Type All Name Limit to Adapter Type i E All Open Description EE Network Envi A Wi Fi R Management W FI A Security g Unknown Minimum Match
75. ate amp ret ret Action MinimumWiFiSecurityState eGlobalSetting ePolicyChange Action Trace MinimumWiFiSecurityState amp ret ret Action WiredDisabledState eGlobalSetting ePolicyChange Action Trace WiredDisabledState amp ret ret Action DialupDisabledState eGlobalSetting ePolicyChange Action Trace DialupDisabledState amp ret Action Trace Reset Location Change state ret Action RemovableMediaState 1 eLocationChange Action Trace RemovableMediaState amp ret ret Action CDMediaState 1 eLocationChange Action Trace CDMediaState amp ret ret Action HDCState eApplyGlobalSetting elrDA eLocationChange Action Trace nHDCState eA pplyGlobalSetting elrDA amp ret ret Action HDCState eApplyGlobalSetting e1394 eLocationChange Action Trace HDCState eApplyGlobalSetting e1394 amp ret ret Action HDCState eApplyGlobalSetting eBlueTooth eLocationChange Action Trace HDCState eApplyGlobalSetting eBlueTooth amp ret ret Action HDCState eApplyGlobalSetting eSerialPort eLocationChange Action Trace HDCState eApplyGlobalSetting eSerialPort amp ret ret Action HDCState eApplyGlobalSetting eParrallelPort eLocationChange Action Trace HDCState eApplyGlobalSetting eParrallelPort amp ret ret Action WiFiDisabledState eApplyGlobalSetting eLocationChange Action Trace nWiFiDisabledState amp ret ret Action WiFiDi
76. ate virtual adapters e g Cisco Systems VPN Client 4 0 will display the Policy Has Been Updated message and may switch away from the current location temporarily The Policy has not been updated the ZSC is simply comparing the virtual adapter to any adapter restrictions in the current policy It is recommended that when running VPN clients of this type that the Disconnect command hyperlink NOT be used VPN Adapter Controls This is essentially a mini Adapter policy specific to the VPN Enforcement If an adapter is checked changing it to Enabled Except those adapters Wireless being specific to card type are permitted connectivity to the VPN Adapters entered into the exception list s below are denied connectivity to the VPN while all others of that type will be given connectivity If an adapter is left is un checked Disabled Except then ONLY the adapters entered into the exception list will be permitted to connect to the VPN all others will be denied connectivity This control can be used for adapters incompatible to the VPN for example or adapters not supported by the IT department This rule will override the adapter policy set for the switch to location 97 Locations Locations are rule groups assigned to network environments These environments can be set in the policy see Network Environments on page 106 or by the user when permitted Each location can be given unique security settings denying access
77. bleAdapterType false eDIALUPCONN Action EnableAdapterType false eWIRED else Action Trace NO Wireless connection found check if there is a modem connection if Dialup Action Trace Dialup Connection Only Action WiredDisabledState eDisableAccess 0 Action WiFiDisabledState eDisableAccess 0 alternative call Action EnableAdapterType false eWIRED 192 Action EnableAdapterType false eWIRELESS else Action Trace NO Dialup connection found if Wired amp amp Wireless amp amp Dialup Apply Global settings so you don t override policy settings Action Trace NO connections so enable all Action DialupDisabledState eApplyGlobalSetting 1 Action WiredDisabledState eApplyGlobalSetting 1 Action WiFiDisabledState eApplyGlobalSetting 1 193 Script Text The ESM Administrator is not limited to the type of script the ZENworks Security Client may execute It is recommended that ANY script be tested prior to distributing the policy Select the script type Jscript or VBscript and enter the script text in the provided field The script may be copied from another source and pasted into the field See Rule Scripting Parameters on page 138 for acceptable script syntax t ZENworks ESM Management Console Security Policy x I og Eile Tools Components View Help Policies Security Policy
78. cation to block One application must be entered per row WARNING Blocking execution of critical applications could have an adverse affect on system operation Blocked Microsoft Office applications will attempt to run their installation program Step 5 Click Save Repeat the above steps to create a new setting To associate an existing application control list to this firewall setting Step 1 Select Application Controls in the components tree and click the Associate Component button Step 2 Select an application set from the list Step 3 The applications and the level of restriction may be re defined Note Changing the settings in a shared component will affect ALL OTHER instances of this same component Use the Show Usage command to view all other policies associated with this component Step 4 Click Save The available application controls are identified below the default execution behavior is No Network Access Table 5 Application Controls Name Applications Web Browsers explore exe netscape exe netscp exe Instant Messaging aim exe icq exe msmsgs exe msnmsgr exe trillian exe ypager exe File Sharing blubster exe grokster exe imesh exe kazaa exe morpheus exe nap ster exe winmx exe 126 Table 5 Application Controls Name Applications Internet Media mplayer2 exe wmplayer exe naplayer exe realplay exe spinner exe QuickTimePlayer exe Gray List Minimally Functional
79. ccnoccnoconoconacos 95 Transferring the Public Key to the Management Ser VICE ins 64 U Uninstall oooonncnccccnnnnninnnino 14 17 62 65 Uninstall Password dua uaaa au aaa neo neve e enen comes 86 Unknown Location daauu aaa u ao un ee u neo neve venes 98 Update Interval eseve dron son dsvosise or s 100 Updating the Encryption Keys ooccnoconoconos 64 Upgrading the Software 05 14 17 62 Upgrading the SSC oo eet ee cece neneve 66 USB Drive Scanner escitas 60 Use Location Message cseeeeeeeeeeeeees 101 User Permissions sigende 100 Using the AdapterAware Feature 104 V View Policy aaa aaaa aaa nan ne anes se enver eres ee ve veze ee 71 VPN Adapter Controls auuaaaaa nane anes ee eee eve ceena 97 VPN Enforcement aaa aaaa au aa uu ae u neve neve venes 94 W Wi Fi Management coccnoccnoconoconocnnocnnccnnos 109 A art od ri 114 Wi Fi Signal Strength Settings oocomocmmm 112 2007 Novell Inc All Rights Reserved Wins WINS Server vorin a e aa AE R EEN 106 Wired ada 123 WinsAll 2007 Novell Inc All Rights Reserved
80. ce nHDCState eApplyGlobalSetting elrDA ret ret Action HDCState eApplyGlobalSetting e1394 eLocationChange Action Trace HDCState eApplyGlobalSetting e1394 ret ret Action HDCState eApplyGlobalSetting eBlueTooth eLocationChange Action Trace HDCState eApplyGlobalSetting eBlueTooth ret ret Action HDCState eApplyGlobalSetting eSerialPort eLocationChange Action Trace HDCState eApplyGlobalSetting eSerialPort ret ret Action HDCState eApplyGlobalSetting eParrallelPort eLocationChange Action Trace HDCState eApplyGlobalSetting eParrallelPort ret ret Action WiFiDisabledState eApplyGlobalSetting eLocationChange Action Trace nWiFiDisabledState ret ret Action WiFiDisabledWhenWiredState eA pplyGlobalSetting eLocationChange Action Trace WiFiDisabledWhenWiredState ret ret Action AdHocDisabledState eA pplyGlobalSetting eLocationChange 166 Action Trace AdHocDisabledState ret ret Action AdapterBridgeDisabledState eApplyGlobalSetting eLocationChange Action Trace AdapterBridgeDisabledState ret ret Action MinimumWiFiSecurityState eGlobalSetting eLocationChange Action Trace MinimumWiFiSecurityState ret ret Action WiredDisabledState eGlobalSetting eLocationChange Action Trace WiredDisabledState ret ret Action DialupDisabledState eGlobalSetting eLocationChange Action Trace DialupDis
81. ces from several areas to customize your monitoring needs The choices found on this dialog box are as follows 214 Computer This option allows you to select whether to add counters from the local computer or any remote computer on your network You add remote computers using their Universal Naming Convention UNC computer name e Performance object This is a drop down list that displays all of the objects that are available for monitoring e Counters This option allows you to select either all counters or individual counters from a list Hold down the Shift or Control key and click the mouse to select multiple items e Instance If an object has multiple instances for example your server has multiple network cards you can select each individual instance or all instances After selecting each counter click the Add button to add the counter to the System Monitor display For a description of each counter highlight the counter and click the Explain button When finished click the Close button The number of objects that are available for monitoring will vary by system Most server services and applications will install their own counters that can be used to monitor performance of those functions Each counter can be displayed as a colored line in one of the graph views Multiple counters from the same system or from remote systems can be viewed simultaneously The figure below shows you an example of what one of the graph vie
82. cess and failure of a login attempt and the success and failure of permissions in accessing statements and objects SQL Profiler provides a graphical user interface to a set of stored procedures that can be used to monitor an instance of SQL Server For example it is possible to create your own application that uses SQL Profiler stored procedures to monitor SQL Server You must have at least 10 megabytes MB of free space to run SQL Profiler If free space drops below 10 MB while you are using SQL Profiler all SQL Profiler functions will stop SQL Profiler Terminology To use SQL Profiler you need to understand the terminology that describes the way the tool functions For example you create a template that defines the data you want to collect You collect this data by running a trace on the events defined in the template While the trace is 218 running the event classes and data columns that describe the event data are displayed in SQL Profiler Template A template defines the criteria for each event you want to monitor with SQL Profiler For example you can create a template specifying which events data columns and filters to use Then you can save the template and launch a trace with the current template settings The trace data captured is based upon the options specified in the template A template is not executed and must be saved to a file with the tdf extension Trace A trace captures data based upon the selected ev
83. ch subsystem within the operating system is an object For example the CPU is an object the memory is an object and the storage subsystem is an object As the server performs various tasks each of these objects generates performance data Each object has several monitoring functions called counters Each counter offers insight into a different aspect or function of the object For example the memory object has counters that measure Committed Bytes in User and Available Bytes Page Faults sec System Monitor takes the readings from these counters and presents the information to you in a human readable format numbers or graphs In addition objects can be separated by instance Instance is the terminology used to refer to multiple occurrences of the same type of object such as in a multiprocessor server A separate instance exists for each processor By default System Monitor is started without any counters displayed To add counters to be monitored click the button on the System Monitor menu bar This opens the Add Counters dialog box shown below see Figure 108 Add Counters JER Use local computer courters Select counters from computer a v JM coucters H instances Select courters from ist Select netances from let 2 Tera a Ta C3 Time 0 DPC Time de Time interrupt Time Privileged Time Processor Time Y 8 Coen Figure 108 Add Counters Dialogue Box In the Add Counters dialog box you can make choi
84. classification to export re export or import deliverables You agree not to export or re export to entities on the current U S export exclusion lists or to any embargoed or terrorist countries as specified in the U S export laws You agree to not use deliverables for prohibited nuclear missile or chemical biological weaponry end uses See the Novell International Trade Services Web page http www novell com info exports for more information on exporting Novell software Novell assumes no responsibility for your fail ure to obtain any necessary export approvals Copyright 2007 Novell Inc All rights reserved No part of this publication may be reproduced photocopied stored on a retrieval system or transmitted without the express written consent of the publisher Novell Inc has intellectual property rights relating to technology embodied in the product that is described in this document In particular and without limitation these intel lectual property rights may include one or more of the U S patents listed on the Novell Legal Patents Web page http www nov ell com company legal patents and one or more additional patents or pending patent applications in the U S and in other countries Novell Inc 404 Wyman Street Suite 500 Waltham MA 02451 U S A www novell com Online Documentation To access the online documentation for this and other Novell products and to get updates see the Novell Documentation Web page ht
85. curity Client will report all removable storage devices detected by the security client e Files copied to a removable device the ZENworks Security Client will report files that are copied to a removable storage device e Files opened from a removable device the ZENworks Security Client will report files that are opened from a removable storage device Networking e Firewall activity the ZENworks Security Client will report all traffic blocked by the firewall configured for the applied location policy Enabling this report may result in large volumes of data being gathered WARNING The following data can overwhelm a database very quickly when gathered A test of ONE ZENworks Security Client reported 1 115 data uploads of blocked packets over a 20 hour period It is recommended that a monitoring and tuning period with a test client in the affected environment be run prior to wide scale deployment e Network adapter activity the ZENworks Security Client will report all traffic activity for a managed network device Wi Fi e Detected wireless access points the ZENworks Security Client will report all detected access points e Wireless access point connections the ZENworks Security Client will report all access point connections made by the endpoint 198 Publishing Security Policies Completed security policies are sent to the end users using the publishing mechanism Once a policy has been published it can be further updat
86. curity was written to the Distribution Service successfully If this test failed communication with the Distribution Service host may have failed or the installation may have failed to configure your server correctly Publish Management Data This test publishes the schema and encryption management key to all users managed by this Management Service If there is a problem or error the application exception will be logged The most common issues preventing a successful installation are 1 Certificate configuration Verify that the certificate is trusted and valid Ensure that the certificate is placed in a certificate store that the ASP NET account has access to 2 DNS or name resolution issues Verify communication with the Distribution Server by opening one of the following URLs e DS http machinename policyserver shieldclient asmx client E DistributionServer Web Service Mozilla Firefox lej DE Ele Edt Ven Go Bookmarks Tooke Help si PDD 9 63 KY 9 rtd rs server polcyserver jreiddent sor gf gt IG Eoma i TXT Messagng de Alina Nutribonals M DistributionServer e following operatons are supported For a formal definbon please review the Service Description Retrieveltemtx savefventitem retreveltem Savetventitom s Checkingx checkin si gt FER eSiuusyumissulo o FOB ov A Figure 103 Distribution Service Client Communication 209 DS https machinename policyserver policyserver so
87. cy can be enforced at a time Microsoft s Fast User Switching FUS is not supported The ZSC turns off FUS at installation For an unmanaged client the first policy that is pushed to one of the users will be applied to all users until the other users drop in their policies The users on a single computer must all be managed or unmanaged If managed all the users must use the same Management and Policy Distribution Service Machine Based Policies The option for using machine based rather than user based policies is set at ZSC installation see the ESM Installation and Quick Start Guide for details When selected the machine will be assigned the policy from the Management Service and that policy will be applied to ALL users who log on to that machine Users who have a policy assigned to them for use on another machine will not have that policy transfer over when they log on to a machine with a machine based policy Rather the computer based policy will be enforced 67 Note The machine must be a member of the Policy Distribution Service s domain for the first policy sent down Occasionally Microsoft will not generate the SID immediately which can prevent the ZSC on that machine from receiving its credential from the Management Service When this occurs reboot the machine following complete ZSC installation to receive the credentials When switching an ZSC from accepting user based policies to accepting machine based policies it w
88. d Resets the password required to uninstall the ZSC The administrator will be prompted with a window to enter the new uninstall password Logging Logging can be turned on for the ZSC permitting it to log specific system events The default logs gathered by the ZSC are XML Validation and Commenting Additional logs can be selected from the checklist When troubleshooting it is recommended that logging be set according to the directions of Technical Support and the circumstances that lead to the error be repeated 8 ZENworks Security Client Logging Enable I Make Permanent Events IV Access Point I Drop Packets IV Report IV Adapter Session IV Engine IV Rules IV Adapter Shield State IV File System State IV Shield State IV Checkin IV File System Driver IV TDI State IV Comment IV General IV Upgrade IV Device Management IV Location IV XML Validation Select All Clear All C Alarm C warning Informational Event Priority File Settings Prefix Log C Size Only C Date Session Roll Over Size 1 MB Files 10 E Cancel Figure 53 Logging Window Additionally the type of log created file settings and roll over settings can be adjusted based on your current needs To make the new logs record every time check the Make Permanent box otherwise the ZSC will revert to 1ts default logs at the next reboot Add Comment The option to add a comment to the logs is available on the diagnostics window Click th
89. d Adapters tabs have the following requirements Note When entering Access Points as network environment parameters the MAC address is required to make the setting a Match For Dialup Connections the RAS Entry name from the phone book or the dialed number may be entered Phone book entries MUST contain alpha characters and cannot contain only special characters etc or numeric characters 1 9 Entries that only contain special and numeric characters are assumed to be dialed numbers Adapters can be entered to restrict exactly which adapters specifically are permitted access to this network environment see Step 3 regarding setting adapter limitations Enter the SSID for each allowed adapter If no SSIDs are entered all adapters of the permitted type are granted access Step 6 Each Network Environment has a minimum number of addresses the ZSC uses to identify it The number set in Minimum Match must not exceed the total number of network addresses identified as being required in the tabbed lists Enter the minimum number of network services required to identify this network environment To associate an existing Network Environment to this location Note Associating a single network environment to two or more locations within in the same security policy will cause unpredictable results and is NOT recommended Step 1 Select Network Environments in the components tree and click the Associate Component button
90. d as http ACME PolicyServer ShieldClient asmx and the Policy Distribution Service has been installed on a new server ACME 43 the URL should be updated as http ACME43 PolicyServer ShieldClient asmx Once the URL has been updated click OK This will update all policies and send an automatic update of the Policy Distribution Service This will also update the Management Service When changing the server URL it is recommended that the old Policy Distribution Service not be terminated until the updated policies have a 100 adherence level see Reporting Service Scheduling The Scheduling components permit the ESM Administrator to designate when the Management Service will synchronize with other ESM components to ensure all data and queued jobs match any recent activity and to schedule the SQL maintenance jobs All time increments are in minutes The scheduling is broken down as follows e Distribution Service synchronization schedule with the Policy Distribution Service e Policy Data and Activity synchronization schedule with policy updates e Management Data policy synchronization with the Management Service Enterprise Structure synchronization schedule with the enterprise directory service Active Directory NT Domain and or LDAP Changes in the enterprise directory service are monitored so that corresponding changes in user policy assignments can be detected and sent to the Policy Distribution Service for Client authenticati
91. d provide reporting data to the Reporting Service Periodic Renewal of the Key Management Key KMK Cryptographic best practices dictate that the KMK be renewed at regular intervals to prevent certain cryptographic attacks from being practical This need only take place on a relatively long cycle typically on the order of once every year and should not be done too frequently because the change over does involve some effort and bandwidth costs To renew the KMK perform the following steps Step 1 Open the Communications Console on the Management Service Start Programs Novell Management Service ESM Communications Console Note Running the Communications Console will cause the Management Service to lose user and log data however policy data will not be deleted Step 2 Allow the Communications Console to run a complete check Step 3 Have all end users authenticate to the Management Service either via VPN or while inside the appropriate firewall by right clicking the ZSC task tray icon and selecting Check for Policy Update Step 4 The Management Console will automatically pass the new KMK credentials down In some cases the user will have to authenticate to the domain username and password Until the endpoints renew their KMK they will not be able to communicate with the Policy Distribution Service Management Console The Management Console is the central access and control for the Management Service Doub
92. d state Storage This namespace provides a mechanism for the script to store variables for the session or permanently These could be used to tell the script 1f the rule had failed the last time it was run It could be used to store when this rule last ran 138 The interfaces are as follows 1 IClientAdapter This interface describes an adapter in the client network environment 2 IClientEnvData This interface returns environment data about a Server or Wireless Access Point 3 IClientNetEnv Provides Network Environment Information 4 IClientWAP Provides information about a Wireless Access Point 5 IClientAdapterList A list of adapters in the client network environment 139 Trigger Events Triggers are events that cause the Endpoint Security Client to determine when and if a rule should be executed These events can either be internal to the client or some external event monitored by the client e AdapterArrival Desc Adapter arrival has occurred Parameters None e AdapterRemoval Desc Adapter had been removed Parameters None e DownloadFailed Desc This event is triggered in response to Action DownloadAsync if the file was not successfully downloaded Parameters None e DownloadSuccess Desc This event is triggered in response to Action DownloadAsync if the file was successfully downloaded Parameters None LocationChange Desc Run the rule when entering or leaving a particular location or all loca
93. de feedback on the effects individual policy components can have on enterprise endpoints Requests for these reports are set in the Security Policy see Compliance Reporting on page 197 for more information and can provide useful data to determine policy updates Select Reporting from either the Endpoint Auditing task bar or the View menu The list of available reports will display click on the plus sign icons next to each report type to expand the list see Figure 16 AG ZENworks ESM Management Console File Tools View Help 2 Refresh Policy List Refresh Report List Report List Tasks Endpoint Auditing ki Reporting Alerts q Reports LI Adherence 3 Down Reports Application Control Endpoint Activity E g Client Self Defense pa Integrity Enforcement Location j B Outbound Content Compliance p Administrative Overrides g Endpoint Updates Wireless Enforcement Figure 16 Reports Menu Reports are configured by identifying the date range and other parameters i e user location To set the dates click to expand to the calendar view then select the month and day be sure to click on the day to change the date parameter see Figure 17 Figure 17 Use calendar tool to set the date range Click View to generate the report o amp Date Range Saturday April 01 2006 2 Wednesday April 19 2006 ly 41 April 2006 2 3 4 5 8 7
94. dle WriteLine Dim WshShell fileHandle WriteLine Set WshShell CreateObject WScript Shell 189 fileHandle WriteLine WshShell Reg Write HKLM SOFTWARE Novell MSC STUWA true A REG_SZ we fileHandle Close Action Trace Wrote the VBScript file to pathToTempVbsFile End Function Function CreateStartMenuFolder Dim fso f startWenuSenforceFolder startMenuSenforceFolder strStartMenu amp Novell Set fso CreateObject Scripting FileS ystemObject If fso FolderExists startMenuSenforceFolder Then Action Trace startMenuSenforceFolder amp Already exists so NOT creating it Else Action Trace Creating folder amp startMenuSenforceFolder Set f fso CreateFolder startMenuSenforceFolder CreateFolderDemo f Path End If End Function Allow Only One Connection Type J Script Disable Wired and Wireless if Dialup is connection N Disable Modem and Wired if Wireless is connected N Disable Modem and Wireless if Wired is connected Reenable all hardware based off policy settings if there are NO active network connections INOTE The order for checking sets the precedence for allowed connections As coded below Wired is first then Wireless then Modem So if you have both a wired and modem connection when this script is launched then the modem will be disabled i e the wired is preferred var CurLoc Query LocationName 190 Action Trace CurLoc is CurLoc if CurL
95. dow see Figure 19 ME ZENworks ESM Management Cons File Tools View Help G Refresh Report List ki Report List EEE r Figure 19 Report list icon Reports are not available until data has been uploaded from the ZENworks Security Clients By default the ESM Reporting service syncs every 12 hours This means that reporting and alerts data will not be ready until 12 hours have passed from installation To adjust this time frame open the Configuration tool see Scheduling on page 29 and adjust the Client Reporting time to the number of minutes appropriate for your needs and your environment Reports that do not have data available will have the Configure or Preview button grayed out with the words No data underneath see Figure 20 Eais No data Figure 20 No data 38 Adherence Reports Adherence Reports provide compliance information regarding the distribution of security policies to managed users A score of 100 adherence indicates that all managed users have checked in and received the current policy Endpoint Check In Adherence This report gives a summary of the days since check in by enterprise endpoints and the age of their current policy these numbers are averaged to summarize the report This report requires no variables be entered The report will display the users by name which policies have been assigned to them the days since their last check in and the age of their policy End
96. dp dim env dim ret dim item set adplist Query GetAdapters adplength adplist Length Action Trace adplength amp CInt adplength if CInt adplength gt 0 then set adp adplist Item 0 set env adp GetNetworkEnvironment 181 ret env GatewayCount Action Trace GatewayCount amp ret if ret gt 0 then set item env GetGatewayltem 0 ret item IP Action Trace IP amp ret end if end if GetWINSItem JScript var adplist var adplength var adp var env var ret var item adplist Query GetAdapters adplength adplist Length Action Trace adplength adplength if adplength gt 0 adp adplist Item 0 env adp GetNetworkEnvironment ret env WINSCount Action Trace WINSCount ret if ret gt 0 182 item env GetWINSItem 0 ret item IP Action Trace IP ret VBScript dim adplist dim adplength dim adp dim env dim ret dim item set adplist Query GetAdapters adplength adplist Length Action Trace adplength amp CInt adplength if CInt adplength gt 0 then set adp adplist Item 0 set env adp GetNetworkEnvironment ret env WINSCount Action Trace WINSCount amp ret if ret gt 0 then set item env GetWINSItem 0 ret item IP Action Trace IP amp ret end if 183 end if GetWirelessAPItem WirelessA PCount JScript var adplist var adplength
97. dware and or storage devices can leave that hardware disabled following uninstallation requiring that each device be manually re enabled Client Self Defense The ZSC is protected from being intentionally or unintentionally uninstalled shutdown disabled or tampered with in any way that would expose sensitive data to unauthorized users Each measure protects the client against a specific vulnerability e Normal uninstall is not allowed without an installation password if implemented see ESM Installation and Quick Start Guide or an uninstall MSI is pushed down by the administrator e Windows Task Manager requests to terminate STEngine exe and STUser exe processes are disallowed e Service Pause Stop and client uninstall is controlled by password defined in the policy Critical files and registry entries are protected and monitored If a change is made to any of the keys or values that are not valid the registry its immediately changed back to valid values e NDIS filter driver binding protection If the NDIS driver is not bound to each adapter STEngine will rebind the NDIS filter driver Upgrading the ZSC The ZENworks Security Client may be upgraded in any of three ways e By physically running the new install executable default name is setup exe with the the STUPGRADE 1 switch activated on each client machine By running an MSI uninstall of the current ZSC and running a new installation MSI CANNOT perform upgrades
98. e select a custom user message to be displayed at test failure This can include remediation steps for the end user e Report enter the failure report which will be sent to the Reporting Service Step 5 Enter a Failure Message This message will display only when one or more of the checks fail Click on the check box then enter the Message information in the provided boxes see Creating Custom User Messages for more information Step 6 A hyperlink can be added to provide remediation options This can be a link to more information or a link to download a patch or update for the test failure see Creating Hyperlinks for more information Step 7 Click Save Step 8 Define the integrity checks see following page Step 9 Repeat the above steps to create a new antivirus spyware test 132 Integrity Checks The checks for each test determine if one or more of the antivirus spyware process is running and or if essential files exist At least one check must be defined for an integrity test to run File Tools Components View Help Ie Save Policy 4 t ZENworks ESM Management Console Security Policy bl OG Se Remove Component Security Policy Locations 5 Integrity and Remediation Rule E Antivirus Spyware Rules 42 OfficeScan 5 Tests SH Installed E amp Client running Advanced Scripting Rules Global Policy Settings Save complete Integrity and Remediation Rules Complia
99. e Add Comments button and the add comment window will display see Figure 54 Comments will be included with the next batch of logs 75 8 ZENworks Security Client Add Comment to Log File Figure 54 Comment Window Note If the Comments option in logging is unchecked the Add Comments button will not display Reporting This control allows the addition of reports for this endpoint Reports may be added and increased in duration however they cannot fall below what was already assigned by the policy 1 e specific reporting if activated in the policy cannot be turned off See Compliance Reporting on page 197 for descriptions of the report types 8 ZENworks Security Client Reporting Reports Settings IA Access Point UAR Off v Activity IT Make Permanent Off vi Applications Report Times Off Blocked Packets Duration 1440 Minutes Off Defense Hack Interval 60 Minutes Off Defense Override Diagnostics Off Devi ce T Hold Files Off Environment 7005 10080 M Integrity 77 Location Storage Device Storage Device Activity Storage Device Detected Storage Device Open Files Wireless AP Connections Reset To Policy Cancel Figure 55 Reporting Overrides 76 The duration settings for each report type are e Off data will not be gathered e On data will be gathered based on the set duration e On Disregard Duration the data will be gathered indefinitely The d
100. e Binary Data data column when captured for the Lock Acquired event class contains the value of the locked page ID or row but has no value for the Integer Data event class Default data columns are populated automatically for all event classes Common SQL Profiler Actions To Start a Trace Step 1 On the Start menu point to Programs Microsoft SQL Server and then click Enterprise Manager Step 2 On the Tools menu click SQL Profiler To add a filter to a Trace Step 1 On the File menu point to Open and then click Trace Template Step 2 Select the trace template to open Step 3 In the Trace Template Properties dialog box click the Filters tab Step 4 In the Trace event criteria list click a criterion Step 5 Enter a value in the field that appears beneath the criterion To Stop a Trace Step 1 Select a running trace 220 Step 2 On the File menu click Stop Trace or close a trace window To Save Trace results Step 1 On the File menu point to New and then click Trace Step 2 In the Connect to SQL Server dialog box select the server to which you want to connect and a connection method Step 3 In the Trace name box type a name for the trace and then select the Save to file check box Step 4 Set the maximum file size in the Set maximum file size MB check box You must set the maximum file size if you are saving trace results to a file Step 5 Optionally after saving the file do the following e
101. e Transact SQL SELECT INSERT UPDATE and DELETE statements The remote procedure call RPC batch status e The start or end of a stored procedure The start or end of statements within stored procedures e The start or end of an SQL batch e An error written to the SQL Server error log A lock acquired or released on a database object 219 e An opened cursor e Security permissions checks All of the data that is generated as a result of an event is displayed in the trace in a single row This row contains columns of data called event classes that describe the event in detail Event Class An event class is the column that describes the event that was produced by the server The event class determines the type of data collected and not all data columns are applicable to all event classes Examples of event classes include SQL BatchCompleted which indicates the completion of an SQL batch The name of the computer on which the client is running The ID of the object affected by the event such as a table name The SQL Server name of the user issuing the statement The text of the Transact SQL statement or stored procedure being executed The time the event started and ended Data Column The data columns describe the data collected for each of the event classes captured in the trace Because the event class determines the type of data collected not all data columns are applicable to all event classes For example th
102. e alternative mechanisms for building high availability solutions ranging from the general DNS round robining layer 3 switches etc to the vendor specific the Microsoft web site has multiple resources on high availability web services and clustering issues Those implementing and maintaining an ESM solution should determine which class of high availability solution is most appropriate for their context It should be kept in mind that the Distribution Server has been architected to function in non high availability situations and does not require High Availability to provide its services Running the Service The Policy Distribution Service launches immediately following installation with no reboot of the server required The Management Console can adjust upload times for the Distribution Service using the Configuration feature See Infrastructure and Scheduling on page 28 For other monitoring capabilities see e Server Communication Checks on page 207 e System Monitor on page 214 Management Service The Management Service is the central service for ESM It is used to create authentication credentials 2 E Corporate design and store security policies and their Di i BES rectory components and provide remediation through a Service robust reporting service It provides security policies and user information to the Policy Distribution Service as well as providing opaque credentials to ZENworks Security Clie
103. e an existing firewall setting Step 1 Select Firewall Settings in the components tree and click the Associate Component button Step 2 Select the desired firewall setting s from the list Step 3 The default behavior setting may be re defined Note Changing the settings in a shared component will affect ALL OTHER instances of this same component Use the Show Usage command to view all other policies associated with this component Step 4 Click Save Multiple firewall settings can be included within a single location One is defined as the default setting with the remaining settings available as options for the user to switch to Having multiple settings are useful when a user may normally need certain security restrictions within a network environment and occasionally needs those restrictions either lifted or increased for a short period of time for specific types of networking 1 e ICMP Broadcasts Three firewall settings are included at installation they are e All Adaptive This firewall setting sets all networking ports as stateful all unsolicited inbound network traffic is blocked All outbound network traffic is allowed ARP and 802 1x packets are permitted and all network applications are permitted a network connection all All Open This firewall setting sets all networking ports as open all network traffic is allowed all packet types are permitted All network applications are permitted a network connection e A
104. e current registry settings e Reports captures any reports in the temp directory see Reporting e System Event Logs captures the current System Event logs System Information captures all system information 69 To create a diagnostics package perform the following steps Step 1 Right click on the ZSC icon and select About The About screen will display see Figure 45 T About ZENworks Security Client LModhed Date Verion dun 12 2007 G42 AM 120244 Jun 12 2007 08 41 AM 320244 dun 05 2007 0620 PM 220449 dun 12 2007 0841AM 12024 STErg osten dl dun 12 2007 08 41 AM 320244 STEngShiekState d Jun 12 2007 OB4DAM 32024 STResLoader dl Jun 12 2007 0840AM 320244 STResouce d dun 12 2007 0840AM 32024 Jun 06 2007 RPM 330448 dun 05 2007 WPM 33068 dun 05 2007 0605 PM 330440 dun 12 2007 OG 41 AM 212024 Cort Pobey VPN teat User Based Versione 2007 06 06 10 4041 05 00 EEEECIS 4490 4D56 BOSI FO33J 1E79C4 roneereg siest Authentication id 5 1 5 21 1409002239 1204227242 692003390 1003 Last Check in 2007 05 12 08 2222 Distribution Server MS SOLSERVER Figure 45 ZENworks Security Client About Screen Step 2 Click Diagnostics The Diagnostics window will display see Figure 46 i 7 Nworks Sec urity Client Diagnostics Figure 46 ZENworks Security Client Diagnostics Screen Step 3 Select the items to be included in the package all are checked by default Step 4 Click Create Package to generat
105. e la ep ee eel a 121 Application Controls ssn Sava a ske Beek ae ke Ra Sat Sees 125 Integrity and Remediation Rules 2 0 00 000 ee 128 Antivirus Spyware Rules o a a A a e ee 129 Advanced Scripting Rules o o o ooo 135 Rule Scripting Parameters ooo 138 Sample Scripts visa bade a PK ee RE Lams 187 Compliance Reporting ooo 197 Publishing Security Policies 2 saa ER RR ee 199 Exporting POlEY sa vv ves vage ic Kull sed ee ae He es ae Find he 201 Importing Policies sci Dua an BE ee ee Poke be kork bP Pa Rb al ko 202 Exporting Policies to Unmanaged Users 0 nrk 203 Troubleshooting si on cr Oe ee a a a a EE m 204 OVERVIEW Sinai Ni eins oh Sine oe al te et Rl Gn ad ee a ae 204 Allowing ASP NET 1 1 Functions aa 205 Troubleshooting SQL Server Issues es 214 Acronym Glossary A a i tal EE 234 Sit a eee RE Ea SS 236 2007 Novell Inc All Rights Reserved Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figure 8 Figure 9 Figure 10 Figure 11 Figure 12 Figure 13 Figure 14 Figure 15 Figure 16 Figure 17 List of Figures Effectiveness of NDIS layer firewall ce eee eens 10 ESM Arehitect re ii A RA SRLS REA ELAN OE OE NAG SELER 11 The Management Console 0 oE EE E E cnet ene teen eee n eae 20 Menu Bats se gunitu skare e bebe arte Gress site 22 Management Console Permissions Settings Window avu
106. e name specified MUST EXACTLY match the launch link specified in the policy JScript Action LaunchLinkB yName MyLink VBScript Action LaunchLinkByName MyLink LogEvent JScript Action LogEvent MyEvent ALARM This is a log test message VBScript Action LogEvent MyEvent eALARM This is a vb log test message Details Pre requisite is that logging needs to be enabled Message Asynchronous Message displayed and script continues JScript Action Message Display sync message VBScript 151 Action Message Display sync message Synchronous Message displayed and waits for user respond before the script continues Note nTimeoutSeconds values of 1 or O will NEVER timeout nMessageType buttons shown 1 Ok Cancel 2 Abort Retry Ignore 3 Yes No Cancel Currently the return value which of these buttons pressed by the user is NOT returned so it is NOT helpful for conditional logic control JScript Action Message Message Title Bar nMessageType nTimeoutSeconds VBScript Action Message Message Title Bar nMessageType nTimeoutSeconds PauseService JScript Action PauseService lanmanworkstation VBScript Action PauseService lanmanworkstation Details Make sure you use the actual service name not the display name Prompt This API creates dialog boxes and user interfaces It will be covered in a future revision given the complexity and need for examples 152 Star
107. e the package Step 5 The generated package ESSDiagnostics YYYYMMDD HHMMSS zip enc will be available on the desktop This encrypted zip file can now be sent to Technical Support Remove Temporary Files This setting ONLY available when password override is active in the policy can be unchecked to keep each package component type in a temporary directory This setting should only be unchecked when a Novell Professional Services representative is present on site and wishes to 70 check individual logs Otherwise the files generated will unnecessarily take up disk space over time Administrator Views Note The Administrator views like the Remove Temporary Files check box will only display when password override is present in the policy The first button will require that either the password or temporary password be entered After the password is entered it will not need to be entered again so long as the diagnostics window remains open Administrator View Policy Rule Scripting Drivers Status Settings Figure 47 Administrator Views View Policy The view policy button displays the current policy on the device The display see Figure 48 shows basic policy information and can be used to troubleshoot suspected policy issues m Client Policy Current Client Policy VPN test Description Firewall Mode Create Time vene 2007 LITIO 40 41 00 mn Management 2 PAIS SOL SERVER PK yS reto
108. ed in the policy JScript Action S witchLocationB yName Base Action Stamp Action Trace Begin 20 second sleep Action Sleep 20000 Action S witchLocationB yName Base Action ClearStamp 146 VBScript Action SwitchLocationByName Base Action Stamp Action Trace Begin 20 second sleep Action Sleep 20000 Action SwitchLocationByName Base Action ClearStamp Details Base must be the name of a valid location which can be stamped This script will then switch to location Base then stamp it sleep for 20 seconds make sure we didn t spin out of the location by switching back to base and then clear the stamp This script performed all actions as expected CreateRegistryKey JScript var ret Action CreateRegistry Key eLOCAL_MACHINE Software Novell Tester if ret true Action Trace Create Key is Successful else Action Trace Create Key did not work VBScript dim ret ret Action CreateRegistry Key eLOCAL_MACHINE Software Novell Tester if ret true then Action Trace Create Key is Successful else Action Trace Create Key did not work end if DeleteRegistryKey JScript 147 var ret Action DeleteRegistry Key eLOCAL_MACHINE Software Novell Tester if ret true Action Trace Delete Key is Successful else Action Trace Delete Key did not work VBScript dim ret ret Action DeleteRegistry Key eLOCAL_MACHINE Software Novell Tester if ret tr
109. ed with the end user receiving updates at their scheduled check ins To publish a policy click the Publish tab The following information is displayed e The current directory tree The policy s created and modified dates e The Refresh and Publish buttons t ZENworks ESM Management Console Security Policy W a Ly a y File Tools Components View Help E Save Policy 6 nos component s l bcc te Component Se Remove Component pS Security Policy Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish Policy Publish Created 6 4 2007 4 06 08 PM Last Modified 6 11 2007 4 15 32 PM SH copdomaini 6 M corpdomain 84 Builtin BA Administrators Y Users f Domain M OU Group K User Machine D Published F To Publish Novell Save complete Figure 99 Publish a Security Policy Based on the current user s publishing permissions the directory tree may display with one or more of the selections in red Users will NOT be permitted to publish to any users groups displayed in red Users and their associated groups will not display until they have authenticated to the Management Service Changes in the corporate directory service may not immediately display in the Management Console Click Refresh to update the directory tree for the Management Service 199 To publish a policy perform the following steps Step 1 Select a user grou
110. eduling Distribution Service Url fep ma sgiserver Polcy Server Sreidlent Marogemert Data 204 Server Maintenance 1402 CE _ Figure 118 Configuration Form 231 ORGANIZATION Contains the user and group information The ORG_UID represents the credential assigned to the user DUFETIDIA I OMITE EIA I a git lt engreerng EMPEIDI4 A OCeerngrenrg lt tt gt RAND 21S IO IBISH ESOPROCO TALO Bult OMPFRIEDI4 1 IDA greet Ob DC ergreerg NAL Figure 119 Example Organization Table ORGANIZATION_AUDIT Contains user replication information status If oa_replicated is 0 then the account has not yet been moved to the Distribution Service by the Management Service Agent If the oa_warehouse is 0 then the account has not yet been moved to the Reporting Service by the Management Service Agent 3 SHK SH zit see me AAA ov Stee ment 08 Figure 120 Organization Audit Table 232 PUBLISH_ORGANIZATION_AUDIT Contains the user to policy poa_ref_id association to be published to the user or group on the Distribution Service If poa_replicated is 0 the policy has not yet been published to the user The Management Server Agent configuration Distribution Service will affect this synchronization frequency OPEROR PPV Eo aar oam t PwC ACI POOK Ome 1 x 9 07 1030941334 BDO Cee IMH 12004 no WIL s 2000 VI 35 42 BODA L Jorn 4114 Specs cess IB ANY 23 3 111 2004 AOOO 2734
111. ee Query Namespace GetAdapters Name See Query Namespace GetAdapters SubNetMask See Query Namespace GetAdapters Type See Query Namespace GetAdapters IClientEnvData Interface This interface returns environment data about a Server or Wireless Access Point IP See Query Namespace GetLocationMatchData MAC See Query Namespace GetLocationMatchData SSID See Query Namespace GetLocationMatchData Type See Query Namespace GetLocationMatchData IClientNetEnv Interface This interface provides Network Environment Information GetDHCPItem 176 JScript var adplist var adplength var adp var env var ret var item adplist Query GetAdapters adplength adplist Length Action Trace adplength adplength if adplength gt 0 adp adplist Item 0 env adp GetNetworkEnvironment ret env DHCPCount Action Trace DHCPCount ret if ret gt 0 item env GetDHCPItem 0 ret item IP Action Trace IP ret VBScript dim adplist dim adplength 177 dim adp dim env dim ret dim item set adplist Query GetAdapters adplength adplist Length Action Trace adplength amp CInt adplength if CInt adplength gt 0 then set adp adplist Item 0 set env adp GetNetworkEnvironment ret env DHCPCount Action Trace DHCPCount amp ret if ret gt 0 then set item env GetDHCPItem 0 ret item IP Action Trace IP am
112. emovable device E Vd Networking IV lu Firewall activity lv ki Network adapter activity Ea M WiFie IV ki Detected wireless access points IV lij Wireless access point connections 8 Figure 98 Compliance Reporting To run compliance reporting for this policy perform the follovving steps Step 1 Define the Send Time This is the timeframe that data will be uploaded from the ZSC to the Policy Distribution Service Step 2 Check each report category or type you wish to capture The following reporting features are available Endpoint e Location policy usage the ZENworks Security Client will report all location policies enforced and the duration of that enforcement 197 Detected network environments the ZENworks Security Client will report all detected network environment settings System Integrity e Anti virus spyware and custom rules the ZENworks Security Client will report the configured integrity messages based on test results Endpoint tampering protection activity the ZENworks Security Client will report any attempts to tamper with the security client e Policy overrides the ZENworks Security Client will report all attempts to initiate the administrative override on the security client Managed application enforcement activity the ZENworks Security Client will report all enforcement activities for managed applications Storage Devices e Detected removable devices the ZENworks Se
113. end services on a Windows 2003 web server ASP NET 1 1 functions need to be allowed Note ASP NET is allowed by default on Windows 2000 servers To enable ASP NET perform the following steps Step 1 Open the Internet Information Services Manager see Figure 100 183 Certification Authority E Cluster Administrator gt Component Services a Computer Management a Distributed File System ES Event viewer amp Internet Info ervices IIS Manager E MP Local Security Policy Microsoft SQL Server V Manage Your Server a Microsoft SQL Server Switch S Microsoft NET Framework 1 1 Configuration 9 snegit 6 GB Microsoft NET Framework 1 1 Wizards Y Network Load Balancing Manager Performance 2s Remote Desktops 3 Routing and Remote Access ES Services T Terminal Server Licensing Terminal Services Configuration r Terminal Services Manager E J l Figure 100 Open IIS Manager Step 2 Open Web Service Extensions Step 3 Highlight ASP NET v1 1 x and click Allow see Figure 101 205 Internet Information Services Web Service Extensions E S STQA RADIUS local compu E Application Pools 2 Web Service Extension status ES 7 p nr Hb SY All Unknown ISAPI Extensions Prohibited i e 3 SE den Allow SY All Unknown CGI Extensions Prohibited 2 T E Active Server Pages Prohibited EJ system we Prohibit is ARES Prohibited i 11 43 7 B _ 09 Web Servi JE i Properties 2
114. eng Enable WEIR Sipa Svengih Seting gt O Nemak Envecrenente S Degn searching lot a new Access Port rhen Corporstn Netraxb q Hy Deonet sad sbength dope below Low b E samed trare will be radoi E Acces Punt bes uren the E Wee BD WA ocu Y Usno same S510 Er T ch Sratch to a new Access Port senta 20 T better than the omeri signal m Moneond Aoecit Ports Fased Access Ports Proh ded Access Ports Sawn complete Figure 82 Wi Fi Management Entering APs into the Managed Access Points list will turn off Zero Config and force the endpoint to connect ONLY to the APs listed when they re available If the Managed APs are not available the ZSC will fall back to the Filtered Access Point List see below APs entered into Prohibited Access Points will never display in Zero Config Note The access point list is only supported on the Windows XP operating system Prior to deploying an access point list it is recommended all endpoints clear the preferred networks list out of Zero Config 109 Managed Access Points ESM provides a simple process to automatically distribute and apply Wired Equivalent Privacy WEP keys without user intervention bypassing and shutting down Microsoft s Zero Configuration manager and protects the integrity of the keys by not passing them in the clear over an email or a written memo In fact the end user will never need to know the key to automaticall
115. ent 40 dB Very Good 50 dB Good 60 dB Low 70 dB Very Low 80 dB 112 Note Although the above signal strength names match those used by Microsoft s Zero Configuration Service the threshholds may not match Zero Config determines its values based on the Signal to Noise Ratio SNR and not solely on the dB value reported from RSSI For example if a Wi Fi adapter were receiving a signal at 54 dB and had a noise level of 22 dB the SNR would report as 32dB 54 22 32 which on the Zero Configuration scale would translate as Excellent signal strength even though on the Novell scale the 54 dB signal if reported that way through the miniport driver possibly reported lower would indicate a Very Good signal strength It s important to note that the end user will NEVER see the Novell signal strength thresholds this information is merely provided to show the difference between what the user may see through Zero Config and what is actually occurring behind the scenes 113 Wi Fi Security If Wi Fi Communication Hardware Wi Fi adapter PCMCIA or other cards and or built in Wi Fi radios is globally permitted see Wireless Control on page 87 additional settings can be applied to the adapter at this location To access this control open the Locations tab and click the Wi Fi Security icon in the policy tree on the left Note In either of the Wi Fi Connectivity Controls Wi Fi Security and Wi Fi Management unchec
116. ents data columns and filters For example you can create a template to monitor exception errors To do this you would select to trace the Exception event class and the Error State and Severity data columns which need to be collected for the trace results to provide meaningful data After you save the template you can then run it as a trace and collect data on any Exception events that occur in the server This trace data can be saved and then replayed at a later date or used immediately for analysis Filter When you create a trace or template you can define criteria to filter the data collected by the event If traces are becoming too large you can filter them based on the information you want so that only a subset of the event data is collected If a filter 1s not set all events of the selected event classes are returned in the trace output For example you can limit the Microsoft Windows 2000 user names in the trace to specific users reducing the output data to only those users in which you are interested Event Category An event category defines the way events are grouped For example all lock events classes are grouped within the Locks event category However event categories only exist within SQL Profiler This term does not reflect the way engine events are grouped Event An event is an action generated within the Microsoft SQL Server engine For example e The login connections failures and disconnections e Th
117. equired to manage the ESM services create security policies for the enterprise generate and analyze reporting data and provide troubleshooting for end users Instructions for completing these tasks are provided in this manual ESM Installation and Quick Start Guide This guide provides complete installation instructions for the ESM components and assists the user in getting those components up and running ZENworks Security Client User s Manual This manual is written to instruct the end user on the operation of the ZENworks Security Client ZSC This guide may be sent to all employees in the enterprise to help them understand how to use the ZSC Policy Distribution Service The Policy Distribution Service is a web service application that when requested distributes security policies and other necessary data to ZENworks Security Clients ESM security policies are created and edited with the Management Service s Management Console then published to the Policy B Distribution Service where they are downloaded by Encrypted Policy the client at check in The Policy Distribution Service authenticates ZENworks Security Clients based on the user ID credentials obtained from the Management Service and supplies each client with the designated security policy Reporting data is collected by ZENworks Security Clients and passed up to the Policy Distribution Service This data is periodically collected by the Management Service and the
118. erary de jd de group ki dc nt id a de_desoipton XA Formula Fiekis 7 Pa amete Fonde aa ntd z Group Name helds E Running Total Fields Bsa Expresson Fields E Special Felts aa You meds E 2 R G feid Figure 27 Available Database Fields What reporting information is available The ESM reporting database is designed to closely model the star schema format What is a star schema A single fact table containing a compound primary key with one segment for each dimension and additional columns of additive numeric facts The Reporting Service includes the following two dimension tables ORGANIZATION_DIM The organization table defining the instances of users groups organizational units containers and services in a hierarchal relationship Each row represents one of these units UNIT_MEMBER_DIM Association of organization units to other organization units For example while a user may be stored within a specific container within Active Directory he she 48 may also be a member of an organization unit or security groups Each row represents a relationship of organization units The data source will need to be defined to the reporting tool typically for most third party applications the following steps may be followed Step 1 Define an OLEDB ADO connection to the server hosting the Management Service Step 2 Select the Microsoft OLE DB Provider for SQL Server Step 3 Enter the Management Service server as t
119. ernet Media a Wi Fi Environment H E TCP UDP Ports H E Access Control 5 Application Con Default Execution Behavior Intemet Me are 5 Network Environments od bd Wi Fi R Management All Allowed Wi FilR Security No Execution E Unknown No Internet Access wmplayer exe realplay exe QuickTimePlayer exe lt m La Figure 91 Application Control Settings To create a new application control setting Step 1 Select Application Controls in the components tree and click the Add New button Step 2 Name the application control list and provide a description Step 3 Select an execution behavior This behavior will be applied to all applications listed If multiple behaviors are required example some networking applications are denied network access while all file sharing applications are denied execution multiple application controls will need to be defined Select one of the following e All Allowed all applications listed will be permitted to execute and have network access No Execution all applications listed will not be permitted to execute 125 No Network Access all applications listed will be denied network access Applications such as web browsers launched from an application will also be denied network access Note Blocking network access for an application does not affect saving files to mapped network drives Users will be permitted to save to all network drives available to them Step 4 Enter each appli
120. ers Approved Wireless Adapters Save complete Figure 79 Location Communication Hardware Control Select to either enable disable or apply the global setting for each communication hardware device listed IrDA Infrared Data Association controls the infrared access port on the endpoint e Bluetooth controls the Bluetooth access port on the endpoint 1394 FireWire controls the FireWire access port on the endpoint e Serial Parallel controls serial and parallel port access on the endpoint e Dialup controls modem connectivity by location not given a global setting e Wired controls LAN card connectivity by location not given a global setting 103 Enable allows complete access to the communication port Disable denies all access to the communication port Note Wi Fi Adapters are either controlled globally or disabled locally using the Wi Fi Security Controls Adapters may be specified by brand using the Approved Wireless Adapter list see below Approved Dialup Adapters List The ZSC can block all but specified approved dialup adapters modems from connecting For example an administrator can implement a policy which only allows a specific brand or type of modem card This reduces the support costs associated with employees use of unsupported hardware Approved Wireless Adapters List The ZSC can block all but specified approved wireless adapter s from connecting For examp
121. ert Data Unsecured access points detected by the ZENworks Security Client Unsecure Access Point Connection Alert Data Unsecured access points connected to by the ZENworks Security Client 40 Application Control Report Reports all unauthorized attempts by blocked applications to access the network or run when not permitted by the policy Application Control Details This report displays the date location the action taken by the ZSC the application that attempted run and the number of times this was attempted Dates displayed in UTC Enter the date parameters select the application name s from the list select the user accounts and click View to run the report see Figure 21 Chart Relative Number of Blocked Apps per User Chart Apps that Have Been Blocked the Most Peres of tenes bion med Application Control Details Mest Mesnet Lenes Dio sation Agotrcatove Lct Comet 19 I Arplsstrelks ed CALC EXE NM 1 Total Paqe No 2 Zoom Factor 100 Figure 21 Sample Blocked Applications Report Endpoint Activity Reports Endpoint activity reports provide feedback for individual policy components and the effect they have on the operation of the endpoint Blocked Packets by IP Address Block Packet Report filtered by Destination IP Dates displayed in UTC Select the destination IP from the list and set the date parameters The report displays the dates locations affected ports and the name of the blocked pack
122. ery HDCState eParrallelPort Action Trace HDCState eParrallelPort ret ret Query IsWiFiDisabled Action Trace nIs WiFiDisabled ret ret Query Is WiFiDisabledWhenWired Action Trace IsWiFiDisabledWhenWired ret ret Query IsAdHocDisabled Action Trace IsAdHocDisabled ret ret Query IsAdapterBridgeDisabled Action Trace IsAdapterBridgeDisabled ret ret Query MinimumWiFiSecurityState Action Trace Minimum VViFiSecurityState ret ret Query IsWiredDisabled Action Trace IsWiredDisabled ret ret Query IsDialupDisabled Action Trace IsDialupDisabled ret VBScript dim ret Action Trace Status ret Query RemovableMediaState Action Trace RemovableMediaState amp ret ret Query CDMediaState Action Trace CDMediaState amp ret ret Query HDCState eIrDA Action Trace nHDCState eIrDA amp ret ret Query HDCState e1394 170 Action Trace HDCState e1394 amp ret ret Query HDCState eBlueTooth Action Trace HDCState eBlueTooth amp ret ret Query HDCState eSerialPort Action Trace HDCState eSerialPort amp ret ret Query HDCState eParrallelPort Action Trace HDCState eParrallelPort amp ret ret Query Is WiFiDisabled Action Trace nIs WiFiDisabled amp ret ret Query IsWiFiDisabledWhenWired Action Trace IsWiFiDisabledWhenWired am
123. ess was required and therefore to provide the required address The address resolution procedure is completed when the client receives a response from the server containing the required address Icmp Allow ICMP Internet Control Message Protocol packets ICMPs are used by routers intermediary devices or hosts to communicate updates or error information to other routers intermediary devices or hosts ICMP messages are sent in several situations for example when a datagram cannot reach its destination when the gateway does not have the buffering capacity to forward a datagram and when the gateway can direct the host to send traffic on a shorter route IpMulticast Allow IP Multicast packets Multicast is a bandwidth conserving technology that reduces traf fic by simultaneously delivering a single stream of information to thousands of corporate recipients and homes Applications that take advantage of multicast include videoconferenc ing corporate communications distance learning and distribution of software stock quotes and news Multicast packets may be distributed using either IP or Ethernet addresses EthernetMulticast Allow Ethernet Multicast packets IpSubnetBrdcast Allow Subnet Broadcast packets Subnet broadcasts are used to send packets to all hosts of a subnetted supernetted or otherwise nonclassful network All hosts of a nonclassful net work listen for and process packets addressed to the sub
124. ets 41 Blocked Packets by User Block Packet Report filtered by User Dates displayed in UTC The data provided is essentially the same as Blocked Packets by Destination IP just broken down by user Network Usage Statistics by User Report of packets sent received or blocked and network errors filtered by end users This report requires a range of dates to be entered Dates displayed in UTC Network Usage Statistics by Adapter Type Report of packets sent received or blocked and network errors filtered by adapter type This report requires a range of dates to be entered and the Location Dates displayed in UTC Endpoint Updates Report Shows the status of the ZSC Update process see ZSC Update on page 93 Dates displayed in UTC Chart Percentage of ZSC Update Failures Charts the percentage of ZSC Update that have failed and not been remediated No parameters are required to generate this report History of ZSC Update Status Shows the history of the status of the ZSC Update process Select the date range and click View to run the report The report displays which users have checked in and received the update Chart Types of Failed ZSC Updates Shows ZSC Updates that have failed and not been remediated Select the date range and click View to run the report The report shows which users have checked in but had a failed update installation Client Self Defense Report ZENworks Security Client Hack Attempts
125. evice Control 1394 Firewire Kia ZSC Update yoy VPN Enforcement Allow All Access IDAS Allow All Access Bluetooth Allow All Access Serial Parallel Allow All Access Novell Figure 71 Global Communication Hardware Control The following communication hardware types may have their default set as either enable or disable for each type IrDA Infrared Data Association controls the infrared access port on the endpoint e Bluetooth controls the Bluetooth access port on the endpoint 1394 FireWire controls the FireWire access port on the endpoint e Serial Parallel controls serial and parallel port access on the endpoint Enable allows complete access to the communication port Disable denies all access to the communication port The driver level communication hardware on the endpoint NIC modem and Wi Fi card or radio are controlled by location and do not have a global default See Communication Hardware Settings on page 103 for more details 89 Storage Device Control This control sets the default storage device settings for the policy where all external file storage devices are either allowed to read write files function in a read only state or be fully disabled When disabled these devices are rendered unable to retrieve any data from the endpoint while the hard drive and all network drives will remain accessible and operational To access this control open the Glob
126. f the field to browse to a location The policy will still need to be given a name Step 3 Click Export TWO files will be exported The first is the policy sen file The second is the SETUP SEN file which is required to decrypt the policy at import Exported policies MUST be imported into a Management Console before they can be published to managed users 201 Importing Policies A policy can be imported from any file location on the available network Step 1 In the Management Console Open the File menu and select Import Policy If you are currently editing or drafting a policy the editor will close the policy prompting you to save it before opening the import window Step 2 Enter the file location and file name in the provided field Step 3 If in doubt click the button to the right of the field to browse Once the policy is imported it can be further edited or immediately published 202 Exporting Policies to Unmanaged Users If Unmanaged ZENworks Security Clients have been deployed within the enterprise a Stand Alone Management Console MUST be installed to create their policies see the ESM Installation and Quick Start Guide for installation instructions To distribute unmanaged polices perform the following steps Step 1 Locate and copy the Management Console s setup sen file to a separate folder The setup sen file is generated at installation of the Management Console and placed in Program FileNNove
127. following actions can be taken using the Settings control by checking off the actions you wish to perform and clicking the Apply button Disable Self Defense persistent e Clear File Protection e Reset to Default Policy e Clear Uninstall Password e Reset Uninstall Password T ZENworks Security Client Settings I Disable Self Defense persistent I Clear File Protection I Reset to Default Policy Clear Uninstall Password I Reset Uninstall Password E Cancel Figure 52 ZENworks Security Client Settings Control Disable Self Defense When applied all protections used to keep the client installed and active on the machine will be disabled Disabling should only be used when performing patch fixes to the ZSC WARNING This must be un checked and applied again or Client Self Defense will remain off Clear File Protection This will clear the hashes from the protected files The current policies and licensing information will remain Once the hashes are cleared the file may be updated This can only be performed while Client Self Defense is turned off Reset to Default Policy Restores the original policy to permit check in when the current policy is blocking access Clear Uninstall Password This clears the password that is required for uninstalling the ZSC Once cleared the ZSC can be uninstalled without a password prompt Use when the uninstall password is failing or lost 74 Reset Uninstall Passwor
128. g s vende Ai a a ee Chee 131 Figure 94 Integrity Checksua une Sr renses NE EG 133 Figure 95 Advanced Scripting sister es oj iaa sg idee Adee bake Gender b de deb eben 135 Figure 96 Script Variables un Grev vjet de mur dd A Ad 137 Figure 97 Script Text Window secta bek Rta Se ee e enes 194 Figure 98 Compliance Reporting enere eits dai ea E O E E a a S a E E a 197 Figure 99 Publish Security Policy na dans gass a h bee ed 199 Figure 100 Op n LIS Manager se 205 Figure 101 Allowing ASP NET poneren sti eek a sat Gs ea G ep ede ske bas Es 206 Figure 102 Communications Console avvavavva varenr vever ennen 207 Figure 103 Distribution Service Client Communication aa 209 Figure 104 Distribution Service Server Communication 0 00 0 cece eects 210 Figure 105 Management Service Client Communication aaa 210 2007 Novell Inc All Rights Reserved Figure 106 Figure 107 Figure 108 Figure 109 Figure 110 Figure 111 Figure 112 Figure 113 Figure 114 Figure 115 Figure 116 Figure 117 Figure 118 Figure 119 Figure 120 Figure 121 Management Service Server Communication aa 211 Trace Log la sak ods tk twat ata hao At te kha pith Ades ht 212 Add Counters Dialogue Box 0 2 ce eee tence eee ene 214 System Monitor Functlonis i nai d es slabs geet Sek we hd ees bee e Sok ee bod 215 Database Tracing 1 4 ia imi en dd iia Shut dss d Goatees 222 Trace Sample cis
129. ganizations corpdoman SYSTEM Bd Adma comdoman Ei Doman Adnns fecepdomnanj E Domain Users fecepdomain Ei Entepene Admin jecepdomanj Y Group Polcy Creator Owners compdoman Ma Schema Adra copdoman Y User copdoman Clore Add Remove Figure 8 Publish To List Step 4 To remove a selected user group highlight the name in the list and click Remove The selected name will be moved back to the Organization Table The permission sets are immediately implemented so the administrator only needs to click Close and accept the changes to return to the editor When a new directory service is added see Managing and Adding Directory Services on page 34 the Resource Account entered is granted full permissions settings as described above 27 Configuration Window The Configuration window gives the ESM Administrator access to the Infrastructure and Scheduling Authenticating Directories and Server Synchronization controls Click the Configuration link on the main page or open the Tools menu and select Configuration The Configuration window will display see Figure 9 Note This function is NOT available if this is a Stand Alone Management Console Infrastructure and Scheduling The infrastructure and scheduling module allows the ESM Administrator to designate and change the Policy Distribution Service URL and control the synchronization intervals for the ESM components see Figure 9 E Configuratio
130. gement Key Written This test verifies that the unique encryption key used for information security was written to the Management Service database successfully If this test failed communication with the database host may have failed or the account settings used to connect may be incorrect Registered with Distribution Service This test verifies that the Management Service can communicate and establish a secure session identity for policy management If this test fails the Management Service may be unable to communicate with the Distribution Service the SSL certificate may not be trusted or the Setup Id may be incorrect Initialize the Distribution Service data This test verifies that the Management Service was able to save the policy schema to the Distribution Service using the assigned Management Service account If this test fails the installation may have not successfully configured encryption or the Distribution Service may be unavailable 208 e Create Management Signature Keys This test verifies that the unique signature keys used for information security were written to the Management Service database successfully If this test failed communication with the database host may have failed the account settings used to connect may be incorrect or the installation may have failed to configure your server correctly e Create Encryption Management Key This test verifies that the unique encryption management key used for information se
131. ging Ports TCP 6891 6900 TCP 1863 443 UDP 1863 443 UDP 5190 TCP 6901 UDP 6901 TCP 5000 5001 UDP 5055 TCP 20000 20059 UDP 4000 TCP 4099 TCP 5190 Internet Key Exchange Com Ports used by Internet Key Exchange Compatible VPN UDP 500 patible VPN Clients Microsoft Networking Common File Sharing Active Directory Ports TCP UDP 135 139 445 Open Ports Ports that are opened for this firewall TCP UDP 80 Streaming Media Common Microsoft Real Streaming Media Ports TCP 7070 554 1755 8000 Web Browsing Common Web Browser Ports including SSL All 80 443 120 Access Control Lists There may be some addresses which require unsolicited traffic be passed regardless of the current port behavior i e enterprise back up server exchange server etc In instances where unsolicited traffic needs to be passed to and from trusted servers an Access Control List ACL can be created to resolve this issue To access this control open the Locations tab click the symbol next to Firewall Settings click the symbol next to the desired Firewall and click the Access Control Lists icon in the policy tree on the left AL ZENworks ESM Management Console Security Policy Li ke a y File Tools Components View Help E save 0 C E io Eg Remove Component Security Policy Global Policy Settings Locations ntegrity and Remediation Rules Compliance Reporting Publish Defined Locations P Home c Access C
132. hat regular Disk Cleanup tasks be configured to run on this server to remove temporary files out of the Windows temp folder Under extreme load conditions windows can generate an inordinate amount of temporary files that needlessly take up disk space Upgrading the Software The CLAS software can be upgraded by running the new installation software Uninstall To uninstall CLAS use the Add Remove Programs function in the Windows Control Panel 62 Securing Server Access Physical Access Control Physical access to the CLAS Server should be controlled to prevent access by unauthorized parties Measures taken should be appropriate to the risks involved There are multiple available standards and guidelines available including NIST recommendations HIPAA requirements ISO IEC 17799 and less formal collections of recommendations such as CISSP or SANS guidelines Even when a given regulatory frameworks is not applicable it may still act as a valuable resource and planning guide Likewise Disaster Recovery and Business Continuity mechanisms to protect the CLAS Server should be put in place to protect the server if an organizational risk assessment identifies a need for such steps This is very simple to do as the vast majority of the CLAS server configuration is generated by the default install process and all that needs to be backed up and protected appropriately is the private key used for the cryptographic challenge response mechanism Wi
133. he Unknown security policy Security policies are completely configurable by the ESM Administrator see Chapter 7 For ZSC operating instructions see the ESM ZENworks Security Client User s Guide All ZSC security functionality is determined by the security policy Prior to Installing the ZENworks Security Client e tis recommended ALL anti virus software be shut down during the installation of the ZENworks Security Client e Verify all Microsoft security patches and updates are current For installation instructions please see the Installation and Quick Start Guide provided with this software Uninstall To uninstall the ZENworks Security Client go to start programs Novell ZENworks Security Client uninstall ZENworks Security Client You can optionally uninstall by 1 Running setup exe with V STUNINSTALL 1 2 Running the following command msiexec exe X C1773AE3 3A47 48EB 9338 7FF2CDC73E67 STUNINSTALL 1 65 Note To specify the uninstall password you can also pass this MSI Property STUIP password goes here It is recommended any wireless card be ejected prior to uninstallation the Wi Fi radio be switched off and all software with a network connection be closed 1 e VPN or FTP software Note It is recommended that prior to uninstalling the ZENworks Security Client that a simple policy be distributed to those clients Policies which globally disable Wi Fi functionality disable any communication har
134. he component controls are only available under the Locations and Integrity tabs AL ZENworks ESM Management Console Security Policy File Tools Components Help El Save Sle New Component 3 Associate Component de Remove Component A PP I Figure 58 Policy Toolbar Explanations of the tools are provided below e Save Saves the policy in its current state IMPORTANT As you complete each component subset it is HIGHLY recommended you click the Save icon on the Policy toolbar If incomplete or incorrect data is entered into a component the error notification screen will display see Error Notification on page 81 for more details New Component Creates a new component in a Location or Integrity subset Once the policy is saved a new component is available to associate in other policies Associate Component This control opens the Select Component screen for the current subset see Figure 59 The available components include any pre defined components included at installation and all components created in other policies gt ti AL Select Component McAfee VeuiS can Enterpene Editor 7 036000 integity Check Very that McAfee Vur me ut McAfee VirusScan Enterprise Edition 600 integty Check Verty that McAfee VeurScan volhv e a a Naton Ardan Corporate E dhon 7 60 0000 birgdy Check Vewdy thet Norton Artrena solle a naa Otter can Vergy that OfieeS can n rung conect Pest stol Verty that Postat sof
135. he left 98 Defined Locations Defined locations may be created for the policy or existing locations those created for other policies may be associated To create a new location Step 1 Select Defined Locations then click the New Component button Step 2 Name the location and provide a description Step 3 Define the location settings see below Step 4 Click Save Repeat the above steps to create a new location To associate an existing location Step 1 Select Defined Locations and click the Associate Component button Step 2 Select the desired location s from the list Step 3 The location settings may be re defined Note Changing the settings in a shared component will affect ALL OTHER instances of this same component Use the Show Usage command to view all other policies associated with this component Step 4 Click Save It is recommended that multiple defined locations beyond simple Work and Unknown locations be defined in the policy to provide the user with varying security permissions when they connect outside the enterprise firewall Keeping the location names simple i e Coffee Shops Airports Home etc and providing a visual cue through the location s Task Tray Icon which helps the user easily switch to the appropriate security settings required for each network environment 99 S E N FO RC E endpoint security management always everywhere Location Settings Setting the Location I con The locati
136. he server Step 4 Enter the SQL account name and password Step 5 Enter the Reporting Service database name default name is STRSDB as the database The following views are available for report generation EVENT_ACCESSPOINT_FACT_VW This view describes the access points observed by user day policy location and access point instance EVENT BLOCKEDPACKETS FACT VW This view describes the summarized instances of port activity that was blocked due to policy configuration by the endpoint The information is logged user day policy location and source destination ip port EVENT CLIENTACTIVITY FACT VW This view describes the summarized instances of port activity at the endpoint The information is logged user day policy location and device EVENT CLIENTAPPLICATIONS FACT VW This view describes the summarized instances of application use duration by user day policy location and application EVENT CLIENTDEFENSE HACK FACT VW This view describes the instances of hack attempts against the endpoint client Active users applications and services are included within the report The data is grouped by user day policy location and attack result EVENT CLIENTDEFENSE OVERRIDES FACT VW This view describes the instances of policy override and the affected devices The data is grouped by user day policy location and override type EVENT CLIENTDEFENSE UNINSTALL FACT VW This view describes the instances of attempts to remove the endpoint cl
137. hout changing the script itself a Til hworks ESM Management Console Security Policy m e LS Ela Took Cerporar s jew blo bed Sve roky a Le Remove Component E Secualy Pokey x l Global Pokey Settings Locator liegi ard Romain Rules Compiince Reporting Publish Integrity and Remediation Auie ED Arbvrur Spymoare Pues i Script Variable g One D Tests ce Instalad Nans Inegy Ch New Serot Vash s Descigten Og Advanced Sergting Rules gt T Formal Al Open on St Serp Varables A a saq Text lt Sawn complete Figure 96 Script Variables To create a new script variable Step 1 Select Script Variables from the components tree and click Add New Step 2 Name the variable and provide a description Step 3 Select type of variable e Custom User Messages defines a custom user message which can launch as an action e Firewall defines a firewall setting which can be applied as an action e Hyperlinks defines a hyperlink which can be launched as an action e Location defines a location which can be applied as an action Number defines a number value String defines a string value Step 4 Select enter the value of the variable Step 5 Click Save Repeat the above steps to create a new variable 137 Rule Scripting Parameters The ZENworks Endpoint Security Management ESM supports standard Jscript and VBScript coding methods readily available with the following excep
138. i LI Secuty Cert Temcering pu LJ Weelerz Seourty 1 raris As of 6 5 2007 200 02 Pre ADA AA Pert Scan Alert Data KULE MULA MLA fur Per KN OT SA echa Parn A 1 110 aid am MN amt 1 Pokey Lauka La En i Corgan so PA he ant Mt 1 w lt gt Figure 14 Alert Reporting This report displays the current trigger results displaying information by affected user or device The data provided here provides the necessary information to take remediation actions to correct 35 any potential corporate security issues Additional information can be found by opening Reporting Once remediation actions have been taken the alert will remain active until the next reporting update To clear an alert perform the following steps Step 1 Select an alert from the list and click the Configuration tab on the right see Figure 15 Information XX Configuration Trigger alert when Bytes copied is gt v f 000 000 within 7 w days Show al 8 IV Enable this alert Clear Save Figure 15 Alerts Configuration Tab Step 2 Click Clear This will clear the reporting data from Alerts this data is still available in the reporting database and will not reactivate until new data is received 36 Reporting The Reporting Service provides Adherence and Status reports for the Enterprise The available data is provided for directories and user groups within a directory Novell reports provi
139. iated integrity test results Communication Port Security notifies of potential port scan attempts e Data Protection notifies of files that are copied to removable storage devices within a one day period e Security Client Configuration notifies of incorrect security client versions and incorrect policies e Security Client Tampering notifies of user hack attempts uninstall attempts and usage of the override password e Wireless Security notifies of unsecure access points both detected and connected to by the end user 33 Configuring ESM for Alerts Alerts monitoring requires reporting data be collected and uploaded at regular intervals to give the most accurate picture of the current endpoint security environment Unmanaged ZENworks Security Clients do not provide reporting data and will therefore not be included in the Alerts monitoring Activating Reporting Reporting should be activated in each security policy See Compliance Reporting on page 197 for details on setting up reporting for a security policy Adjust report send times to an interval that will give you consistent updates on endpoint status Additionally an alert will not activate without a report Any activity you wish to be alerted to must have an appropriate report assigned to it in the security policy Optimizing Synchronization By default the ESM Reporting service syncs every 12 hours This means that reporting and alerts data will not be ready
140. ient The data is grouped by user day policy location and attack result EVENT CLIENTDEVICE FACT VW This view describes the types of devices in use by an endpoint The data is grouped by user day policy location and device type EVENT CLIENTENVIRONMENTS FACT VW This view describes the custom stamped network environments used for location detection The data is grouped by user day policy location device type and environment data EVENT CLIENTINTEGRITY FACT VW This view describes the results of integrity rules applied at the endpoint The data is grouped by user day policy location and rule EVENT CLIENTLOCATION FACT VW This view describes the time at location as well as adapter configuration and type used at the location The data is grouped by user day policy and location 49 EVENT_CLIENTRULE_FACT_VW This view describes the generic reporting mechanism for integrity and scripting rules The data is grouped by user day policy location and rule EVENT_COMPONENTACTION_FACT_VW This view describes the Management Console activity performed on specific components For example you could see when the policy update interval was changed for a specific location in a policy The data is grouped by user day policy component and defines the new and old value EVENT_MANGERIO_FACT_VW This view describes when a component has been created or edited The data is grouped by user day component and action EVENT_ORGANIZATIONAC
141. igure 53 Figure 54 Figure 55 Figure 56 Figure 57 Figure 58 Figure 59 Figure 60 Figure 61 Figure 62 Figure 63 Figure 64 Figure 65 Figure 66 Figure 67 Figure 68 Figure 69 Figure 70 Figure 71 Figure 72 Figure 73 Figure 74 Figure 75 Figure 76 Figure 77 Figure 78 Figure 79 Figure 80 Figure 81 Figure 82 Figure 83 Figure 84 Figure 85 Figure 86 Figure 87 ZENworks Security Client Settings Control 0 2 ec eee eae 74 L gging Window es eds ae u bala haa A oe Gare ag ee wee as 75 Comment Window viii As rnere 76 Reporting Overrides ereire pie dk dera rl ls e ela calida ls 76 Duration Settings and Make Permanent 0 0 eee eee ete eens TI Hold Reports for Diagnostics na pik o a h ee pa e e E ad oan TI Policy Too bat sne ders A r eee 79 Select Component Window dc ua das vid dra sie ee dekke Ke eee kis eee a See ae ad dE 79 Show Usage Window 0 si 80 Error Notification PAN s a i ass sok eee ren se eeu ee Sea 81 ESM Security Policy creation process raner ete rere 82 Custom User Message with a Hyperlink 0 0 cece eee 83 Custom Message and Hyperlink Controls 20 0 0 0 ee eee ee een eee 83 Custom User Message with a Hyperlink 0 cc eee eee 84 Custom Message and Hyperlink Controls 2 0 0 0 ee cece eee eee 84 Global Policy Settings sceri akse cele else kerk dekk bakk Sa ea pee us Hee lees 85 Updated Policy Custom Message with Hyperlink aa 86 Uninstall
142. ile substitutions EAccessState eApplyGlobalSetting 1 eDisableAccess 0 eAllowAccess 1 EAdapterType eWIRED eWIRELESS eDIALUPCONN EComparison eEQUAL eLESS eGREATER eEQUALORLESS eEQUALORGREATER ESTDisplayMsg eONLYONCE eEVERYTIME eSECONDS eNOMSG EHardwareDeviceController elrDA 0 el394 eBlueTooth eSerialPort eParrallelPort ELogLevel eALARM eWARN eINFO 142 EMATCHTYPE eUNDEFINED eLOCALIP eGATEWAY eDNS eDHCP eWINS eWAP eDIALUP eUNKNOWN eDOMAIN eRULE eUSERSELECTED EMinimumWiFiSecurityState eNoEncryptionRequired 0 eWEP64 eWEP128 eWPA ERegKey eCLASSES_ROOT eCURRENT_USER eLOCAL_MACHINE eUSERS eCURRENT_CONFIG ERegType eSTRING eDWORD eBINARY eMULTI SZ eEXPAND SZ EServiceState 143 eRUN eSTOP ePAUSE ePENDING eNOTREG EVariableScope ePolicyChange 0 reset on a policy update eLocationChange 1 reset on a location change TRIGGEREVENT eTIMER eSTARTUP eLOCATIONCHANGE eTIMEOFDAY eADAPTERARRIVAL eADAPTERREMOVAL eMEDIACONNECT eMEDIADISCONNECT ePOLICYUPDATED eUSERCHANGEDSHIELD ePROCESSCHANGE eWITHINTIME eRUNNOW eDOWNLOADFAILED eDOWNLOADSUCCESS Table 6 Shell Folder Names windows C Windows system windows System32 startup programs Startup startmenu profile Start Menu programs startmenu Programs commonprogramfiles programfiles Common 144 Table 6 Shell Folder Names progra
143. ill aide in identifying whether or not a user has a policy assigned In this example using the captured SQL state above open SQL Query Analyzer from the Tools Menu and connect to the Novell Distribution Service database instance Paste the text captured from the trace into the window and run the query F5 Ctrl E or press the Play button If the user has items assigned to him her through publishing you will receive rows In every case you will receive a result code as demonstrated below 222 In this example we see that the user has a schema policies SUS files and an EFS key published determined by the Typeld column The result code returned from the call 0 indicates success exec CHECKIN SP CAGAADBA 7DEF 4BDF A6B2 EE535573677 FeSBdulo 6co1 445 940 55735400148 TELAIC1FIESFE4E42 8778 4021A4C30564 select Ft ABDF A651 411595571877 0 2 09 CAGIADIA TDBF 49DF A601 411 535571577 DAFE 6CE1 44F5 9340 CAMAADEA 4BOF AEBI ELE 555 51167 20 0 CAMADA TDBF 48DF A682 4LLEI11 5B77 POTIO ES EPLS 4DE5 27C8 CASAADOA TOBT 497 K SI SEIT S TIT 03 30 0 TAKAADEA TIBT 400F AG0ZJ EKTLILETINTT IFDILIIF 203F 4936 1003 ITAGAADSA TOBF 6 EDF AGZJ GETS 35471877 03 3 0 0 CAMIADIA 7DBT AGDF AG0I ATTGIG 7077 DEETLETA 1659 A FG F BLD7 CAGAADSA TOB F 4 SDF A 683 CEZ 5354713877 03 38 20 6 CACAADSA TDBF 49DF A482 ALL 53447 j u 0 492A ASET CAGAADCA TOSI 4857 2083 4772 434472877 3006 08 CALAADIA DMT 41DF A402 411 1314
144. ill continue to enforce use the LAST policy downloaded by the current user until credentials are provided If multiple users exist on the machine it will use only the policy assigned to the currently logged in user If a new user logs in and the computer SID is unavailable it will use the default policy included at installation until the computer SID is available Once the computer SID is available for the endpoint all users will have the machine based policy applied Distributing Unmanaged Policies To distribute polices to unmanaged ZSCs perform the following steps Step 1 Locate and copy the Management Console s setup sen file to a separate folder The setup sen file is generated at installation of the Management Console and placed in Program Files Novell ESM Management Console Step 2 Create a policy in the Management Console see Chapter 7 Step 3 Use the Export command see page 116 to export the policy to the same folder containing the setup sen file All policies distributed MUST be named policy sen for an unmanaged ZSC to accept them Step 4 Distribute the policy sen and setup sen files These files MUST be copied to the Program Files Novell ZENworks Security Client directory for all unmanaged clients The Setup sen file only needs to be copied to the unmanaged ZSCs once with the first policy Afterwards only new policies need to be distributed 68 ZENworks Security Client Diagnostics Tools The ZENworks Secu
145. into the Management Console and sent down through a security policy Updating the Encryption Keys Encryption keys can be periodically updated recommended by uninstalling and reinstalling CLAS When CLAS is reinstalled new private and public keys are generated The public key should then be transferred to the management service and imported again into the affected security policies to update all ZENworks Security Clients at their next policy check in 64 ZENworks Security Client Management ESM utilizes an installed client application to enforce complete security on the endpoint itself This ZENworks Security Client ZSC protects client data by determining in real time the network location of the endpoint and based on that location e Implements policy based filtering of all incoming and outgoing traffic e Implements policy based control over hardware use such as that of WLAN access points removable media and network adapters e Validates anti virus software status e Collects security centric statistics and event traps and passing that information to centralized servers for collation and analysis and e Launches nominated applications in policy defined situations for example the policy is set that in a certain location a VPN program must be used to access the network that program is launched by the ZSC If the network environment is not recognized the ZSC sets the location to a default Unknown location and applies t
146. ions Integrity and Remediation Rules Compliance Reporting EG Integrity and Remediation Rule Antivirus Spyware Rules GE OfficeScan S Tests p sida jji Name System Proces Installed Use Failure Message Client running Description Title OfficeScan Software Advanced Scripting Rules C Use Hyperlink Success splay Text Report Display Te OfficeScan has been installed Link Failure Parameters CI Continue On Fail Firewall Non Compliant Integrity Report OfficeScan is not installed Novell Save complete Figure 93 Integrity Tests All defined antivirus spyware rules have standard tests and checks pre written Additional tests may be added to the integrity rule Multiple tests will run in the order entered here The first test MUST complete successfully before the next test will run To create an integrity test perform the following steps Step 1 Select Integrity Tests on the component tree and click Add New Step 2 Name the test and provide a description Step 3 Enter the success report text for the test Step 4 Define the following for a test failure e Continue on Fail check this if the user may continue to network connectivity if the test fails or if the test should repeat e Firewall Setting this setting will be applied if the test fails All Closed Non compliant Integrity or a custom Quarantine firewall setting will prevent the user from connecting to the network 131 e Messag
147. king enable will disable ALL Wi Fi connectivity in this location ZENworks ESM Management Console Security Policy le BJ R File Tools Components View Help E save se a E Security Policy x g g Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish EG Defined Locations H Home f Wi FI R Security SH Office y Comm Hardware Storage Device Control Enable Wi Fi R amp Firewall Settings i amp a Network a No Encryption Required rue Wi FilR Management WEP 64 Message Wi Fi R Securit SP Offline Set C WEP 128 8 Wi Fi Hotspot C WPA LI Use Hyperlink e Unknown Display Text I Preference AP selection by Link I Encryption Type Parameters I Figure 87 VVi Fi Security The Wi Fi adapter can be set to only communicate with access points with a specific level of encryption or greater in a given location For example if a WPA configuration of access points were deployed in a branch office the adapter can be restricted to only communicate with access points with a level of WEP 128 encryption or greater thus preventing it from accidentally associating with rogue non secure APs It is recommended a Custom User Message be written when the setting is placed above No Encryption Required 114 Preference AP Selection by A preference can be set to connect to APs by order of encryption level or by signal strength when two or more Access Points are
148. l be granted Management Console Access The resource user should remove access from all but the groups users who should have access The resource user may set additional permissions for the designated users The permissions granted have the following results When the Management Console is launched the permissions are retrieved from the Permission table These permissions tell the console whether the user has the rights to log in to the Console Create or Delete policies change Permissions settings and whether or not they can Publish policies and to whom they are permitted to publish to e Management Console Access the user may view policies and components and edit existing policies Users granted ONLY this privilege will not be permitted to add or delete polices the publish and permissions options will be unavailable e Publish Policy the user may publish policies ONLY to assigned users groups e Change Permission the user may access and change permissions settings for other users that have already been defined or grant permissions to new users e Create Policies the user may create new policies in the Management Console e Delete Policies the user may delete ANY policy in the Management Console Note For security purposes it is recommended that only the resource user or very FEW administrators be granted the Change Permission and Delete Policies permissions 24 Administrative Permissions To set the Administrative Permission
149. lNESM Management Console Step 2 Create a policy in the Management Console see Administrator s Manual Step 3 Use the Export command to export the policy to the same folder containing the setup sen file All policies distributed MUST be named policy sen for the ZSC to accept them Step 4 Distribute the policy sen and setup sen files These files MUST be copied to the Program Files Novell ZENworks Security Clien directory for all unmanaged clients The Setup sen file only needs to be copied to the unmanaged ZSCs once with the first policy Afterwards only new policies need to be distributed 203 Overview Troubleshooting Common issues with ESM can be traced to problems with server operability The following pages outline specific configuration and troubleshooting tasks that can help you resolve issues on the ESM back end e Allowing ASP NET 1 1 Functions on page 205 e Server Communication Checks on page 207 e Getting Trace Information from the Management Server Agent on page 212 e Troubleshooting SQL Server Issues on page 214 System Monitor on page 214 Securing SQL Database Passwords on page 217 Microsoft SQL Profiler on page 218 Common SQL Profiler Actions on page 220 Tracing Novell Database Installations on page 222 Event Logs on page 225 Microsoft SQL Enterprise Manager on page 227 204 Allowing ASP NET 1 1 Functions To run the ESM back
150. le an administrator can implement a policy which only allows a specific brand or type of wireless card This reduces the support costs associated with employees use of unsupported hardware and better enables support for and enforcement of IEEE standards based security initiatives as well as LEAP PEAP WPA TKIP and others Using the AdapterAware Feature The ZENworks Security Client receives notification whenever a network device is installed in the system and determines if the device is authorized or unauthorized If it is unauthorized the solution will disable the device driver which renders this new device unusable and will notify the user of the situation Note When a new unauthorized adapter both Dial up and Wireless first installs its drivers on the endpoint via PCMCIA or USB the adapter will show as enabled in Windows Device Manager until the system is re booted though all network connectivity will be blocked Enter the name of each adapter allowed Partial adapter names are permitted Adapter names are limited to 50 characters and are case sensitive The device name is needed by the Windows 2000 operating system to provide this functionality If no adapters are entered ALL adapters of the type will be allowed If only one adapter is entered then only that single adapter will be allowed at this location Note If the endpoint is in a location that defines ONLY an AP s SSID as the network identification the ZSC
151. le click the Management Console Icon on the desktop to launch the login window Log in to the Console by entering the administrator name and password The username entered MUST be an authorized user on the Management Service see Permissions Settings on page 24 Note lt is recommended that the console be closed or minimized when not in use Task Bar The Task bar on the left provides access to the Management Console tasks see Figure 3 Tasks A Policy Tasks EF Active Policies Create Policy E Import Policy Policies Policy Hame Policy Tasks Resources Configuration Endpoint Auditing Figure 3 The Management Console The functions available in the task bar are described on the following page Click each topic to view the available tools 20 Policy Tasks The Primary function of the Management Console is the creation and dissemination of Security Policies The Policy Tasks guide the administrator through creating and editing security policies which are used by the ZENworks Security Client to apply centrally managed security to each endpoint The Policy Tasks are e Active Policies This displays a list of current policies which can be reviewed and edited Click on the policy to open it e Create Policies This begins the policy creation process see below e Import Policies This imports policies created on other Management Services See Importing Policies on page 202 Clicking
152. less restrictive assuming the endpoint is now protected behind the network firewall The ZENworks Security Client uses a fixed enterprise configurable port to send a challenge to the Client Location Assurance Service The Client Location Assurance Service decrypts the packet and responds to the challenge proving that it has the private key matching the public key The tray icon displayed will include a check mark indicating the user is in the correct location see Figure 78 Figure 78 CLAS location checked The ZSC will NOT switch to the location unless it can detect the CLAS server If the CLAS server is not detected even if all other network parameters match up the ZSC will remain in the Unknown location to secure the endpoint To activate CLAS for a location Check to activate the assurance requirement then import the CLAS public key into the policy by clicking Import and browsing to the file The word Configured will display when the key is successfully imported Note This option is not available for the Unknown location Use Location Message This setting allows an optional Custom User Message to display when the ZSC switches to this location This message can provide instructions for the end user details about policy restrictions under this location or include a Hyperlink to more information 101 Location Components The firewall settings Wi Fi Connectivity Control and network environment settings are entered a
153. ll Closed This firewall setting closes all networking ports and restricts all packet types A new location will have the single firewall setting All Open set as the default To set a different firewall setting as the default right click the desired Firewall Setting and choose Set as Default 117 TCP UDP Ports Endpoint data is primarily secured by controlling TCP UDP port activity This feature allows you to create a list of TCP UDP ports which will be uniquely handled in this firewall setting The lists contain a collection of ports and port ranges together with their transport type which defines the function of the range To access this control open the Locations tab click the symbol next to Firewall Settings click the symbol next to the desired Firewall and click the TCP UDP Ports icon in the policy tree on the left E ZENworks ESM Management Console Security Policy WJ File Tools Components View Help EJ save sk 2 oceni Ela Remove Component Security Policy Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish FG Defined Locations 18 Home gt TCP UDP Ports H Office 8 Offline SQ WiFi Hotspot Nama F Comm Hardware Streaming Media Storage Device Control D Firewall Settings All Adaptive Defaul Common Microsoft Media Real Media Streaming Media Ports Description e Wi Fi Environment TCP UDP Ports Sa Internet Key
154. me procedure insert the following section into the configuration file 212 lt system diagnostics gt lt trace autoflush true gt lt listeners gt lt add name TextWriterTraceListener type System Diagnostics TextWriterTraceListener initializeData C MSA_TRACE LOG gt lt listeners gt lt trace gt lt system diagnostics gt The trace information will be written to the file specified Content example below OnStart InitTimer LoadConfiguration AddSchedule DirectoryServiceSyncFrequency I AddSchedule MS MaintenanceFrequency 1440 AddSchedule Policy AndPublishS yncFrequency 1 AddSchedule ReportingDataSyncFrequency I AddSchedule RSMaintenanceFrequency 1440 AddSchedule RSNotificationPollFrequency 1 AddSchedule UserDataSyncFrequency I AddSchedule DSReportingPollFrequency I ServiceStartScheduleOverrides ServiceStartScheduleOverrides gt UserDataS yncFrequency 2 ServiceStartScheduleOverrides gt ReportingDataS yncFrequency 2 OnStart gt Configuring Remoting 213 Troubleshooting SQL Server Issues System Monitor System Monitor is a MMC snap in that lets you view real time performance data contained in the counters from your server or other servers or workstations on your network In addition System Monitor allows you to review performance data that is stored in a log file created with Performance Logs and Alerts snap in Windows 2000 and Windows 2003 are modular object oriented operating systems Ea
155. methods of the namespaces described in section 3 or by one of the methods or properties of the following interfaces IClientA dapter Interface This interface returns information about an adapter GetNetworkEnvironment JScript var adplist var adplength var adp var env var ret adplist Query GetAdapters adplength adplist Length Action Trace adplength adplength if adplength gt 0 adp adplist Item 0 env adp GetNetworkEnvironment ret env DHCPCount Action Trace DHCPCount ret ret env DNSCount Action Trace DNSCount ret 174 ret env GatewayCount Action Trace GatewayCount ret ret env WINSCount Action Trace WINSCount ret VBScript dim adplist dim adplength dim adp dim env dim ret set adplist Query GetAdapters adplength adplist Length Action Trace adplength amp CInt adplength if CInt adplength gt 0 then set adp adplist Item 0 set env adp GetNetworkEnvironment ret env DHCPCount Action Trace DHCPCount amp ret ret env DNSCount Action Trace DNSCount amp ret ret env GatewayCount Action Trace GatewayCount amp ret ret env WINSCount Action Trace WINSCount amp ret end if 175 DeviceID See Query Namespace GetAdapters Enabled See Query Namespace GetAdapters IP See Query Namespace GetAdapters MAC See Query Namespace GetAdapters MaxSpeed S
156. mfiles C Program Files profile C Documents and Settings username localappdata profile Local Settings Application Data appdata profile Application Data commonappdata C Documents and Settings All Users Application Data commonprograms C Documents and Settings All Users Start Menu Programs cookie profile Cookies Action Namespace CheckForUpdate JScript Action CheckForUpdate VBScript Action CheckForUpdate ClearFixedShieldState SetShieldStateByName Trace Sleep Note When setting the ShieldState firewall by name the name specified MUST EXACTLY match the firewall specified in the policy Three firewall settings are always available regardless of the policy All Closed All Adaptive and All Open JScript Action SetShieldStateByName Closed true Action Trace Start 20 second sleep Action Sleep 20000 var ret Action ClearFixedShieldState if ret true Action Trace ret true 145 else Action Trace ret false VBScript Action SetShieldStateByName Closed true Action Trace Start 20 second sleep Action Sleep 20000 dim ret ret Action ClearFixedShieldState if ret true then Action Trace ret true else Action Trace ret false end if ClearStamp SwitchLocationByName Stamp Note When setting the Location by name the name specified MUST EXACTLY match the location specifi
157. n Infrastructure and Scheduling f Authenticating Directories Service Synchronization Distribution Service Url http CARTER2 PolicyS erver ShieldClient as Infrastructure and Scheduling The Management Server will synchronize information with Distribution Service and infrastructure servers at specified minute intervals Changes to directory services policies reporting data or any Management events will be replicated during runtime or processed during these intervals depending upon service availability Distribution Service 60 Enterprise Structure 720 Policy Data and Activity 60 Client Reporting 720 Management Data 240 You can configure alerts based on a snapshot of data reported by the endpoints To optimize performance and ensure that alerts are relevant to recent activity you can set the storage threshold Keep alert data for 73 days OK Cancel Figure 9 Infrastructure and Scheduling Window Distribution Service URL This will update the Policy Distribution Service location for both the Management Service and all ZENworks Security Clients without requiring them to be reinstalled if the Policy Distribution Service is moved to a new server The URL for the current server is listed in the text field only the server name should be changed to point to the new server DO NOT change any information after the server name 28 Example If the current URL is liste
158. n and network location This report requires a range of dates to be entered The administrator can drill down by double clicking on any entry to see a complete list of status reports for a particular user 39 Alert Drill Down Reports Additional alert information is available in these drill down reports These reports will only display data when an alert has been triggered Clearing an alert will also clear the alert report however the data will still be available in a standard report Client Tampering Alert Data Displays instances where a user has made an unauthorized attempt to modify or disable the ZENworks Security Client Files Copied Alert Data Shows accounts that have copied data to removable storage Incorrect Client Version Alert Data Shows the history of the status of the ZSC Update process Incorrect Client Policy Alert Data Shows users who do not have the correct policy Integrity Failures Alert Data Reports on the history of success failure client integrity checks Override Attempts Alert Data Instances where client self defense mechanisms have been administratively overridden granting privileged control over the ZENworks Security Client Port Scan Alert Data Shows the number of blocked packets on the number of different ports a large number of ports may indicate a port scan occurred Uninstall Attempt Alert Data Users that have attempted to uninstall the ZENworks Security Client Unsecure Access Point Al
159. n deleted from the Policy Distribution Service The Policy Distribution Service does not initiate any communications with the other ESM components and only responds to others It does not hold sensitive data in the clear nor does it hold the keys needed to decrypt the sensitive data It does not hold user credentials or any other user specific data Server Selection and Installation Please refer to the Installation and Quick Start guide for selection and installation instructions Server Maintenance It is recommended that regular Disk Cleanup tasks be configured to run on this server to remove temporary files out of the Windows temp folder Under extreme load conditions windows can generate an inordinate amount of temporary files that needlessly take up disk space Upgrading the Software The ESM Policy Distribution Service software can be upgraded by running the new installation software Uninstall To uninstall the Policy Distribution Service use the Add Remove Programs function in the Windows Control Panel or run the installation again from the ESM installation CD Securing Server Access Physical Access Control Physical access to the Distribution Service Server should be controlled to prevent access by unauthorized parties Measures taken should be appropriate to the risks involved There are multiple available standards and guidelines available including NIST recommendations HIPAA requirements ISO IEC 17799 and less form
160. nce Reporting Publish Integrity Checks Test Type Process Is Running File Exists File Name ntitscan exe Directory C Program Files Trend Micro Client Server Security Comparison Equal or Greater ll Compare by Date Age 12 31 2000 05 00 PM Novell Figure 94 Integrity Checks To create a new check select Integrity Checks from the policy tree on the left and click Add New Select one of the two check types and enter the information described below Process is Running This check is used to determine if the software is running at the time of the triggering event i e the AV client The only information required for this check is the executable name File Exists This check is used to determine if the software is current and up to date at the time of the triggering event Enter the following information in the provided fields File Name the file name e File Directory directory where the file should reside 133 Note This file CANNOT exist in the root c directory for this check to function e File Comparison this is a date comparison select from the pull down list either e None e Equal e Equal or Greater e Equal or Less Compare by Age or Date e Date ensures the file is no older than a specified date and time i e the date of the last update e Age ensures a file is no older than a specific time period measured in days Note The Equal File Comparison will
161. nd user during a help desk call or it can be copied and pasted into an email The end user will enter the key into their ZSC s Administration window see ZSC User s Guide This key will only be good for that user s policy and ONLY for the specified amount of time Once the key has been used it cannot be used again Note If the user logs off or reboots their machine during password override the password will expire and a new one will need to be issued If a new policy has been written prior to the time limit expiring the end user should be instructed to Check for a Policy Update rather than clicking the Load Policy button on the ZSC about box 59 USB Drive Scanner An authorized USB device list can be generated and imported into a policy using the optional USB Drive Scanner tool included with the installation package See page 90 for details on implementing an authorized USB Devices list into a Security Policy ij TE Description Serial Number Figure 43 USB Drive Scanner To generate an authorized devices list perform the following steps Step 1 Open the USB Drive Scanner application Note This is a separate installation from the Management Service and Management Console A shortcut to the tool will display on the desktop Step 2 Insert a USB Device into the USB port on the computer The device MUST have a serial number Step 3 Click the Scan icon EN the name of the device and its se
162. nder no obligation to provide any services by way of maintenance update or otherwise THE SOFT WARE AND ANY DOCUMENTATION ARE PROVIDED AS IS WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE IN NO EVENT WILL WEI DAI OR ANY OTHER CONTRIBUTOR BE LIABLE FOR DIRECT INCIDENTAL OR CONSEQUENTIAL DAMAGES EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES 4 Users will not use Wei Dai or any other contributor s name in any publicity or advertising without prior written con sent in each case 5 Export of this software from the United States may require a specific license from the United States Government It is the responsibility of any person or organization contemplating export to obtain such a license before exporting 6 Certain parts of this software may be protected by patents It is the users responsibility to obtain the appropriate licenses before using those parts If this compilation is used in object code form in an application software acknowledgement of the author is not required but would be appreciated The contribution of any useful modifications or extensions to Wei Dai is not required but would also be appreciated Contents CONTONES oc eee RAID need aS ee a A 4 List of FIGUR S iaa iaraa o de eae a See oe eee AGA MG 6 List Of Tables crust 9 ZENworks Endpoint Security Management 00020000 eee enue 10 ESM Overviews ni Sox kot is
163. ne Launch Restrictions in Security Descriptor Definition Language 5D Enabled Disabled Enabled Administrator Guest Disabled Disabled Disabled Not defined Not defined Enabled Administrators Disabled Disabled Disabled Warn but allow inst Not defined Not defined Not defined Enabled Enabled Enabled Disabled 30 days Disabled Disabled Not defined Mat defined Figure 73 Verify Local Storage Device Options are set as Disabled Preferred Devices Preferred Removable Storage Devices may be optionally entered into a list permitting only the authorized devices access when the global setting is used at a location see Storage Device Control on page 105 for more details Devices entered into this list MUST have a serial number To enter a preferred device perform the following steps 91 Step 1 Insert the device into the USB port on the machine that the Management Console is installed on Step 2 Once the device is ready click the Scan button If the device has a serial number its Description and Serial Number will display on the list Step 3 Select a setting from the drop down list the Global Removable Device setting will not be applied for this policy e Enable The devices on the preferred list are permitted full read write capability all other USB and other external storage devices are disabled e Read Only The devices on the preferred list are permitted read only capability all other US
164. net broadcast address Snap Allow Snap encoded packets LLC Allow LLC encoded packets Allow8021X Allow 802 1x packets To overcome deficiencies in Wired Equivalent Privacy WEP keys Microsoft and other companies are utilizing 802 1x as an alternative authentication method 802 1x is a port based network access control which uses Extensible Authentication Protocol EAP or certificates Currently most major wireless card vendors and many access point vendors support 802 1x This setting also allows Light Extensible Authentication Protocol LEAP and WiFi Protected Access WPA authentication packets Gateway Represents the current IP configuration Default Gateway address When this value is entered the ZENworks Security Client allows all network traffic from the current IP configuration Default Gateway as a trusted ACL GatewayAll Same as Gateway but for ALL defined gateways Wins Represents current client IP configuration Default WINS Server address When this value is entered the ZENworks Security Client allows all network traffic from the current IP configuration Default WINS server as a trusted ACL WinsAll Same as Wins but for ALL defined WINS servers 123 Table 4 Network Address Macros Macro Description Dns Represents current client IP configuration Default DNS server address When this value is entered the ZENworks Security Client allow
165. nts Management i Dis Consol Security policies credentials and reports are stored PTR in an SQL database s which may reside on the same server as the Management Service or on remote servers Server Selection and Installation Please refer to the Installation and Quick Start guide for selection and installation instructions Server Maintenance It is recommended that regular Disk Cleanup tasks be configured to run on this server to remove temporary files out of the Windows temp folder Under extreme load conditions windows can generate an inordinate amount of temporary files that needlessly take up disk space Upgrading the Software The ESM Management Service software can be upgraded by running the new installation software Uninstall To uninstall the Management Service use the Add Remove Programs function in the Windows Control Panel To uninstall the Management Console when run on a separate PC use the Add Remove Programs function in the Windows Control Panel Securing Server Access Physical Access Control Physical access to the Management Server should be controlled to prevent access by unauthorized parties Measures taken should be appropriate to the risks involved There are multiple available standards and guidelines available including NIST recommendations HIPAA requirements ISO IEC 17799 and less formal collections of recommendations such as CISSP or SANS guidelines Even when a given regulatory fr
166. nvnvavrnvneravvre een ra varene 25 Permission Settings Organization Table cece ranerne 25 Publish To Se tt gs ct s Sa chevelle dd t e 26 Publish To Viste ocio ria e eo 27 Infrastructure and Scheduling Window eee e een eae 28 Authenticating Directories Window 0 0 varaner ere eee errre 30 Service Synchronization week vi Oo bite elves ied herre busseberesbesssbae ht eis ha 32 Alerts Dashboard curp e 33 Alerts Configuration T b as vapor dk it deh Aa 34 Alert Report pare kn nt ada i nt e OR EN KER 35 Alerts Configuration Tab i sis kte s br aa 36 Reports Menciona ete 37 Use calendar tool to set the date ran ge teen eens 37 Figure 18 Report Toolbar ti AS A E A OF RAR ES 38 Freire 19 Report Stig 38 Eigute 20 No ditu arias e A iaa 38 Figure 21 Sample Blocked Applications Report o 41 Figure 22 Sample Location Usage Report cee eee raven 43 Figure 23 Sample Detected Removable Storage Devices report aa 44 Figure 24 Sample Wireless Environment History report aa 46 Figure 25 Browse the Reporting Data Source 0 ee ccc ranerne ran 47 Figure 26 Report Document Properties 2 0 00 eect tenet teen eee 48 Figure 27 Available Database Fields e ohie eee an E E verv raven e rare ranerne eee 48 Figure 28 Add New Crystal Report ae e E OEE E E E RA A EAEE ES 50 Figure 29 Crystal R ports Wizard punta a ai 51 Figure 30 Figure 31 Figure 32 Figure 33 Figure 34 Figure 35 Figure
167. oc Desired Location only run this script if the user is in the desired location This MUST MATCH the exact name of the location in the policy var Wired Query IsAdapterTypeConnected eWIRED Action Trace Connect Status of Wired is Wired var Wireless Query IsAdapterTypeConnected eWIRELESS Action Trace Connect Status of Wireless is Wireless var Dialup Query IsAdapterTypeConnected eDIALUPCONN Action Trace Connect Status of Dialup is Dialup var wiredDisabled Query IsWiredDisabled Action Trace Query on WiredDisabled is wiredDisabled var wifiDisabled Query IsWiFiDisabled Action Trace Query on WifiDisabled is wifiDisabled var dialupDisabled Query IsDialupDisabledQ Action Trace Query on DialupDisabled is dialupDisabled check if there is a wired connection if Wired Action Trace Wired Connection Only Action DialupDisabledState eDisableAccess 0 Action WiFiDisabledState eDisableAccess 0 alternative call Action EnableAdapterType false eDIALUPCONN 191 Action EnableAdapterType false e WIRELESS else Action Trace NO Wired connection found check if there is a wireless connection if Wireless Action Trace Wireless Connection Only Action WiredDisabledState eDisableAccess 0 Action DialupDisabledState eDisableAccess 0 alternative call Action Ena
168. olicies or provide links to software updates to maintain integrity compliance Hyperlinks are available in several policy components A VPN hyperlink can be created which can point to either the VPN client executable or to a batch file which can run and fully log the user in to the VPN see See VPN Enforcement on page 94 for more details Please Log In Please log in to the VPN Launch VPN Figure 65 Custom User Message with a Hyperlink To create a hyperlink perform the following steps see Figure 66 for an example of the control Step 1 Enter a name for the link This is the name that will display below the message required for Advanced VPN hyperlinks as well Step 2 Enter the hyperlink Step 3 Enter any switches or other parameters for the link use for VPN enforcement Use Message Title Message Use Hyperlink Display Text TD Link Parameters re Figure 66 Custom Message and Hyperlink Controls Note Changing the Message or Hyperlink in a shared component will change in all other instances of that component Use the Show Usage command to view all other policies associated with this component 84 Global Policy Settings The global policy settings are applied as basic defaults for the policy To access this control open the Global Policy Settings tab and click the Policy Settings icon in the policy tree on the left ZENworks ESM Management Console Security
169. olicy restoring the default All Open policy for a pre defined period of time once the time limit has expired the current or updated policy will be restored The password for a policy is set in the security policy s Global Rules settings Password override e Overrides application blocking e Allows user to change locations e Allows user to change firewall settings e Overrides hardware control thumb drivers CDROM etc The password entered into the policy should NEVER be issued to an end user It is recommended that the Override Password Key Generator be used to generate a short term use key see Figure 42 4 ZENworks Security Client TE Qu User Override Key Generator Administrator Password p s T Confirm Password ss User ID iqpublic Override minutes cs 1 100801 User Key PLYCZ5UJEFQ2WY15 Figure 42 Override Password Key Generator To generate an override key perform the following steps 58 Step 1 Open the Override Password Key Generator through Start All Programs Novell ESM Management Console Override Password Generator The Password Generator will display see Figure 42 Step 2 Enter the policy password in the Administrator Password field and confirm it in the next field Step 3 Enter the user name the end user logged in with Step 4 Set the amount of time the policy will be disabled Step 5 Click the Generate Key button to generate an override key This key can be either read to the e
170. om accessing the network which prevents the user from further infecting the network Once endpoints are determined compliant by a follow up test security settings automatically return to their original state To access this control open the Integrity and Remediation Rules and click the Antivirus Spyware Rules icon in the policy tree on the left AW ZENworks ESM Management Console Security Policy ui oog File Tools Components View Help E Save Policy 5 2 da Remove Component y Security Policy x a Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish EG Integrity and Remediation Rule Antivirus Spyware Rules g Antivirus Spyware Rules gt GificeScan Installed Name amp System Proces OfficeScan Client running E Advanced Scripting Rules Description Verify that OfficeScan is running correctly Trigger Selection CO Startup CI Location Change CI Timer Minutes Hours Days Novell Save complete Figure 92 Antivirus Spyware Integrity rules Custom tests for software not on the default list may be created A single test can be created to run checks for one or MORE software pieces within the same rule Each set of Process Running and File Exists checks will have their own Success Failure results 129 To create a new antivirus spyware rule Step 1 Select Antivirus Spyware Rules from the components tree and click the
171. on e Client Reporting frequency the Management Service will interrogate for and download reporting data from the Policy Distribution Service e Keep alert data for You can configure alerts based on a snapshot of data reported by the endpoints To optimize performance and ensure that alerts are relevant to recent activity you can se the storage threshold based on a number of days 29 Authenticating Directories Policies are distributed to end users by interrogating the Enterprise s existing directory service Active Directory NT Domain and or LDAP The Authenticating Directories service is responsible for handling end user credentials and authentication issues for the Policy Distribution Service NT Domain is only supported when the Management Service is installed on a Windows 2000 or 2000 advanced server SP4 Click Authenticating Directories to display the manager Managing and Adding Directory Services An initial directory service is normally detected and monitored during the Management Service communication check at installation Authenticating Directories can if required manage users from multiple directories and multiple directory platforms a Configuration Qe Infrastructure and Scheduling E Authenticating Directories Friendly Name zi New ET Service Synchronization Service Type Microsoft Active Directory vi Host Server Domain Name Domain Tree Available for User Authentication
172. on EnableA dapterType false eWIRED Action EnableA dapterType true eWIRED Action EnableA dapterType false eDIALUPCONN Action EnableA dapterType true eDIALUPCONN VBScript Action EnableA dapterType false eVVIRELESS Action EnableA dapterType true eVVIRELESS Action EnableA dapterType false eWIRED 149 Action EnableAdapterType true eWIRED Action EnableAdapterType false e DIALUPCONN Action EnableAdapterType true eDIALUPCONN Launch Note The first parameter of the Launch call is a unique integer identifier for each action JScript Action Launch 50 C calco exe VBScript Action Launch 51 C calco exe LaunchAsSystem JScript no Action LaunchAsSystem C calco exe sParameters sWorkingDir true VBScript no no Action LaunchAsSystem C calco exe sParameters sWorkingDir true LaunchAsUser WithCode This launches in the user context and returns the exit code of the application launched JScript Action LaunchAsUserWithCode appToLaunch sParameters sWorkingDir bShow bWait nExitCode VBScript Action LaunchAsUserWithCode appToLaunch sParameters sWorkingDir bShow bWait nExitCode 150 Details Preliminary setup required creating a policy which included a new Integrity rule with a custom message The custom message included a launch link which was added to the SCC menu bar LaunchLinkByName Note When setting the LaunchLink by name th
173. on Trace Location Uuid amp ret ret Query MaxConnectionSpeed Action Trace MaxConnectionSpeed amp CLng ret ret Query OSServicePack Action Trace OSServicePack amp ret ret Query PolicyName Action Trace PolicyName amp ret ret Query PolicyTime Action Trace PolicyTime amp ret ret Query PolicyUuid Action Trace PolicyUuid amp ret ret Query LocationIsStamped Action Trace LocationIsStamped amp ret ret Query TriggerEvent Action Trace TriggerEvent amp ret ret Query TriggerEventParameter Action Trace TriggerEventParameter amp ret 164 RemovableMediaState CDMediaState HDCState WiFiDisabledState WiFiDisabled When WiredState AdHocDisabledState AdapterBridgeDisabledState MinimumWiFiSecurityState DialupDisabledState JScript var ret Action Trace Reset Policy Change ret Action RemovableMediaState 1 ePolicyChange Action Trace RemovableMediaState ret ret Action CDMediaState 1 ePolicyChange Action Trace CDMediaState ret ret Action HDCState eApplyGlobalSetting elrDA ePolicyChange Action Trace nHDCState eA pplyGlobalSetting elrDA ret ret Action HDCState eApplyGlobalSetting e1394 ePolicyChange Action Trace HDCState eApplyGlobalSetting e1394 ret ret Action HDCState eApplyGlobalSetting eBlueTooth ePolicyChange Action Trace HDCState eApplyGlobalSetting eBlueTooth
174. on icon provides a visual cue to the user which identifies their current location The location icon displays on the taskbar in the notification area Use the pull down list to view and select from the available location icons Ys Airport fig Silverware P Alt Location Hotspot s Alt Office House Bed Lamp li Book ii Mobile il Brief Case dij Mug 3 Burger 3 Water Cooler I Coffee 7 Paper Clip N Desk amp Stapler Select an icon which will help the end user easily identify their location at a glance Update I nterval This setting determines the frequency the ZSC will check for a policy update when it enters this location The frequency time is set in minutes hours or days Unchecking this parameter means the ZSC will NOT check for an update at this location User Permissions User permissions within a location include e Change Location this permits the end user to change to and out of this location For non managed locations i e hot spots airports hotels etc this permission should be granted In controlled environments where the network parameters are known this permission can be disabled The user will NOT be able to switch to or out of any locations when this permission is disabled rather the ZSC will rely on the network environment parameters entered for this location e Change Firewall Settings this allows the user to change their firewall settings Save Network Environment this allows the use
175. onnection between the services Step 6 Enter the directory service login name under Account and the login password in the Password field The login name entered must be a user who has permission to view the ENTIRE directory tree It is recommended that this user be either the domain administrator or an OU administrator Note The password entered should be set to not expire nor should this account ever be disabled Step 7 Click Test to verify communication to this directory service If communication cannot be established the user is notified of the error Any inaccurate information will be corrected when possible by the interface during the test Step 8 Click Save to update or add a directory service Click OK or Cancel to exit the Configuration window and return to the login screen Step 9 Click OK or Cancel to exit the Configuration window and return to the Mangement Console 31 Service Synchronization This control lets you to force a synchronization of the Management Service and Policy Distribution Service This will update all alerting reporting and policy distribution a Configuration Ex Infrastructure and Scheduling The Distribution Service Agent last ran at 6 4 2007 3 56 14 PM There are no ET Authenticating Directories reporting packages queued to be loaded 1 Service Synchronization E The Management Service Agent last ran at 6 11 2007 1 59 00 PM There is no Management Service activity to be loaded To
176. ontrol Lists Comm Hardware i 4 Storage Device Control SC Firewall Settings Name a ig Home Firewall Def Cisco VPN TCP UDP Ports Sy Cisco VPN Sy Web Browsi Cisco ACL Access Control s Cisco VPN 5 Application Con i E Network Environments ACL Behavior Optional Trusted Ports Wi Fi Management Trusted m Cisco VPN Cisco VPN Common Networking Database Communication File Transfer Protocol FTP Instant Messaging Internet Key Exchange Compatible Microsoft Networking Open Parts Description Wi Fi Security H Office IP MAC Address H Unknown Figure 90 Access Control Lists Settings To create a new ACL setting Step 1 Select Access Control List from the components tree and click the Add New button Step 2 Name the ACL and provide a description Step 3 Enter the ACL address or Macro Step 4 Enter the ACL type IP This type limits the address to 15 characters and only containing the numbers 0 9 and periods example 123 45 6 189 IP addresses may also be entered as a range example 123 0 0 0 123 0 0 255 121 e MAC This type limits the address to 12 characters and only containing the numbers 0 9 and the letters A F upper and lower case separated by colons example 00 01 02 34 05 B6 Step 5 Select the ACL Behavior drop down box and determine whether the ACLs listed should be Trusted allow it always even if all TCP UDP ports are closed or Non Trusted block access Step 6 If Tru
177. opied is gt se 11 000 000 within 7 w days 34 Step 2 Adjust the trigger threshold by first selecting condition from the drop down list This Step 3 Step 4 Step 5 Step 6 Step 7 Managing states whether the trigger number is e Equal to e Greater than lt Greater than or equal to lt Less than gt Less than or equal to gt Adjust the trigger number This number is variant depending upon the type of alert Select the number of days that this number must be met Select the trigger type whether it s the warning icon fj or the emergency icon B Ensure Enable this alert is checked Click Save to save the alert Alerts Alerts notify you of issues that need to be remediated within the endpoint security environment Remediation is normally handled on a case by case and individual or group basis To help identify the issue Alert reports are displayed when the alert is selected see Figure 14 Mi E Fiore ES Managamann Camats A AA Elo foo Yow tet K Refresh Pokcy ust Fakes 8 Alerta x Vi 0 hg Endoont Auderg PS Chart Integpty ida Corgan D Amoro lt Commas ton peat Sectaty Potertial pot scan attempted ater wil be Jee MOI when ary DC POEA a g nen 5 Due Protector mordterd losvanl datacts tiockad tee I b ren treg IP adderet on pott Filer coped lo dence Ore day total pa peleas N HJ Securty Chert Corbue on f
178. or the Wi Fi adapter may be set The signal strength thresholds can be adjusted by location to determine when the ZSC will search for discard and switch to another access point defined in the list Signal Strength Settings Search Begin searching for a new Access Point when El gt the current signal strength drops below Low it ver on Switch to a new Access Point when itis 20 dB 7 gt better than the current signal Figure 86 Signal Strength Control The following information can be adjusted above or below the current defaults Search default Low 70 dB When this signal strength level is reached the ZSC will begin to search for a new AP to connect to e Switch default 20 dB In order for the ZSC to connect to a new AP that AP must broadcast at the designated signal strength level above the current connection The signal strength threshholds are determined by the amount of power in dB reported through the PC s miniport driver As each Wi Fi card and or radio may treat the dB signals differently for their Received Signal Strength Indication RSSI the numbers will vary from adapter to adapter The default numbers associated with the defined threshholds in the Management Console are generic for most Wi Fi adapters It is recommended you research your Wi Fi adapter s RSSI values to input an accurate level The Novell values are Table 2 Signal Strength thresholds Name Default Value Excell
179. ord key for this policy WARNING It is HIGHLY RECOMMENDED that end users are NOT given this password rather the Override Password Generator should be used to generate a temporary key for them 85 Policy Update Message A Custom User Message can be displayed whenever the policy is updated Click on the check box then enter the Message information in the provided boxes See Custom User Messages on page 83 for more information Use Hyperlink A hyperlink to additional information corporate policy etc may be included at the bottom of the custom message See Hyperlinks on page 84 for more information Es urity Policy Updated This policy has been updated to conform to our company security policy Please use the link below for more information Corporate Security Policy Figure 68 Updated Policy Custom Message with Hyperlink Uninstall Password It is recommended that every ZENworks Security Client be installed with an uninstall password to prevent the user from uninstalling the software This password is normally configured at installation however the password can now be updated enabled or disabled via policy Uninstall password Setting Use Existing v Password Use Existing Enabled Confirm Disabled Figure 69 Uninstall Password Controls The default setting is Use Existing which will not change the uninstall password e Enabled is used to either activate an uninstall
180. ormating myte for the pat Add a tte Ite Figure 36 Select Style 54 304 et J NNH Fra Gm Ga i sr US ee rangu Figure 37 Visual Basic Report Builder Step 10 To set up a filter right click on the Parameter Fields item in the field explorer and select New see Figure 38 D poms gt ep Potten J NNH Ena nm rv renen Toe e nE EF AAA Sect v Jon an Ati f Henter 2i evet pucca fac ame Dadan ecen 12 fogd pl ont sume papi peoos sg papi imm pet pel same Fugt ix same gt papi maine s pagt qe pogi peson Cna Footer Bt overt merece fot ngi Duk n A Sean 1 Qe fore over toa fot and prod rane A See z Gene Fo 2 event oa fet amet rara A ect El Come Footer E event ocre fect ma date A Gaon Figure 38 Setting Up a Filter 55 Step 11 The following filter allows you to select multiple users to filter by with the prompting text of User Name displayed within the UI Notice the parameter is named the same as the column see Figure 39 JEMPF ORG NAME User Name String IV Allow multiple values Set default values Discrete value s Range value s IV Allow editing of default values when Discrete and Range Values there is more than one value or cms Her Figure 39 Create Parameter Field Step 12 Right click on the report and select Report gt Edit Selection Formula gt Records see Fig
181. p or single users from the directory tree on the left Double click the user s to select them if a user group is selected all users will be included Users who have not received the policy will have the i icon next to their name If a user group has already received the policy they will have the E icon next to their name in the directory tree To unselect a user or group double click them again to remove the i icon Step 2 Click Publish to send the policy to the Policy Distribution Service Updating a Published Policy Once a policy has been published to the user s simple updates can be maintained by editing the components in a policy and re publishing For example if the ESM Administrator needed to change the VVEP key for an access point they vvould only need to edit the key save the policy and click Publish The affected end users will receive the updated policy and the new key at their next check in 200 Exporting a Policy Policies may be exported from the Management Console and distributed via email or through a network share This can be used to distribute enterprise level policies in environments where multiple Management Services and Policy Editors are deployed To export a security policy Step 1 Open the File menu and select Export Step 2 Enter a destination and give the policy a name with an extension of sen example C Desktop salespolicy sen If in doubt click the button to the right o
182. p ret end if end if GetDNSItem JScript var adplist var adplength var adp var env var ret var item 178 adplist Query GetAdapters adplength adplist Length Action Trace adplength adplength if adplength gt 0 adp adplist Item 0 env adp GetNetworkEnvironment ret env DNSCount Action Trace DNSCount ret if ret gt 0 item env GetDNSItem 0 ret item IP Action Trace IP ret VBScript dim adplist dim adplength dim adp dim env dim ret dim item set adplist Query GetAdapters adplength adplist Length 179 Action Trace adplength amp CInt adplength if CInt adplength gt 0 then set adp adplist Item 0 set env adp GetNetworkEnvironment ret env DNSCount Action Trace DNSCount amp ret if ret gt 0 then set item env GetDNSItem 0 ret item IP Action Trace IP amp ret end if end if GetGatewayltem JScript var adplist var adplength var adp var env var ret var item adplist Query GetAdapters adplength adplist Length Action Trace adplength adplength if adplength gt 0 180 adp adplist Item 0 env adp GetNetworkEnvironment ret env GatewayCount Action Trace GatewayCount ret if ret gt 0 item env GetGatewayltem 0 ret item IP Action Trace IP ret VBScript dim adplist dim adplength dim a
183. p ret ret Query IsAdHocDisabled Action Trace IsAdHocDisabled amp ret ret Query IsAdapterBridgeDisabled Action Trace IsAdapterBridgeDisabled amp ret ret Query MinimumWiFiSecurityState Action Trace MinimumWiFiSecurityState amp ret ret Query Is WiredDisabled Action Trace IsWiredDisabled amp ret ret Query IsDialupDisabled Action Trace IsDialupDisabled amp ret Storage Namespace There are two kinds of storage in the Endpoint Security Client storage space Persistent storage remains between sessions of the client while transient storage exists only for the duration of the client Transient values can be accessed in each rule script invocation Also persistent storage can only store and retrieve string values while transient storage store and retrieve those values that a VARIANT can hold Note Each script variable stored in the secure store is preceded by a rule id one for each script Variables that need to be shared between scripts MUST have a forward slash BEFORE the variable name in EACH persist function accessing them to make that variable global or accessible to each script 171 Example global variable between scripts boolWarnedOnPreviousLoop Storage PersistValueExists boolWarnedOnPreviousLoop SetName Value Name ValueExists GetNameValue JScript var ret Storage SetNameValue testval 5 ret Storage NameValueExists testval Action Tr
184. password or to change it Enter the new password and confirm it e Disabled is used to deactivate the uninstall password requirement 86 Wireless Control Wireless Control globally sets adapter connectivity parameters to secure both the endpoint and the network To access this control open the Global Policy Settings tab and click the Wireless Control icon in the policy tree on the left AL ZENworks ESM Management Console Security Policy ile MER File Tools Components View Help Save Policy 5 ds E 3 Security Policy Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish Global Settings 5 Policy Settings Wireless Control Wireless Control A 4 Comm Hardware Storage Device Control DO Disable Wi Fi Transmissions Disable Adapter Bridge i ZSC Update Title Title yoy VPN Enforcement Message Message i Use Hyperlink Display Text k re id Display Text Link SSS Link Parameters Aj Parameters Fi Disable Wi Fi When Wired Disable Ad Hoc Wireless Connections CI Block Wi Fi Connections Novell Figure 70 Policy Components Disable Wi Fi Transmissions This setting globally disables ALL Wi Fi adapters up to and including complete silencing of a built in Wi Fi radio A Custom User Message and Hyperlink can be displayed when the user attempts to activate a Wi Fi connection See Custom User Messages on page 83
185. piled into a single execution plan are hampering performance by executing too slowly Use SQL Profiler to monitor only the events in which you are interested If traces are becoming too large you can filter them based on the information you want so that only a subset of the event data is collected Monitoring too many events adds overhead to the server and the monitoring process and can cause the trace file or trace table to grow very large especially when the monitoring process takes place over a long period of time After you have traced events SQL Profiler allows captured event data to be replayed against an instance of SQL Server thereby effectively re executing the saved events as they occurred originally Use SQL Profiler to e Monitor the performance of an instance of SQL Server Debug Transact SQL statements and stored procedures e Identify slow executing queries e Test SQL statements and stored procedures in the development phase of a project by single stepping through statements to confirm that the code works as expected e Troubleshoot problems in SQL Server by capturing events on a production system and replaying them on a test system This is useful for testing or debugging purposes and allows users to continue using the production system without interference e Audit and review activity that occurred on an instance of SQL Server This allows a security administrator to review any of the auditing events including the suc
186. point Client Versions Shows the most recently reported version of the client on each endpoint Set the date parameters to generate this report Endpoints that Never Checked In Lists the user accounts that have registered with the Management Service but have never checked with the Distribution Service for a policy update Select one or more groups to generate the report Note These may be Management Console users that don t have a Security Client installed in their names Group Policy Non Compliance Shows groups where some users do not have the correct policy Selections can be made for one or more groups to generate the report Endpoint State History by Machine This report gives the most recent status in a given date range of ESM protected endpoints grouped by machine name It displays the logged on user name current policy ESM client version and network location This report requires a range of dates to be entered The administrator can drill down by double clicking on any entry to see a complete list of status reports for a particular machine Policy Assignment This report shows which users groups accounts have received the specified policy Select the desired policy from the list and click View to run the report Endpoint State History by User This report gives the most recent status in a given date range of ESM protected endpoints grouped by user name It displays the machine name current policy ESM client versio
187. pplied and enforced regardless of whether the user is connecting to the network directly dialing in remotely or even not connecting to corporate infrastructure at all This is critical to not only protect the data within the corporate perimeter but also to protect the critical data that resides on the endpoint device itself ESM automatically adjusts security settings and user permissions based on the current network environment characteristics A sophisticated engine is used to determine the user s location and automatically adjusts firewall settings and permissions for applications adapters hardware etc Security is enforced through the creation and distribution of ESM security policies Each location Work Home Alternate Airport etc listed in a security policy is assigned to a network environment or multiple network environments A location determines which hardware is available and the degree of firewall settings that are activated within the network environment The firewall settings determine which networking ports access control lists ACLs and applications are accessible required Various integrity checks and scripts can be run at location change to ensure that all required security software is up to date and running TRADITIONAL APPLICATION ENDPOINT PROTECTION WITH In securing mobile devices ESM is superior to os ZENworks SECURITY CUENT typical personal firewall technologies which operate APPLICATIONS APPLICATIONS E i onl
188. r to save the network environment to this location to permit automatic switching to the location when the user returns Recommended for any locations the user will need to switch to Multiple network environments may be saved for a single location For example if a Location defined as Airport is part of the current policy each airport visited by the user can be saved as a network environment for this location This way a mobile user can return to a saved airport environment and the ZENworks Security Client will automatically switch to the Airport location and apply the defined security settings A user may of course change to a location and not save the environment 100 S E N FO RC E endpoint security management always everywhere Show Location in Client Menu this setting allows the location to display in the client menu If this is unchecked the location will not display at any time Client Location Assurance Because the network environment information used to determine a location can be easily spoofed thereby potentially exposing the endpoint to intrusion the option of cryptographic verification of a location is available through the Client Location Assurance Service CLAS This service is only reliable in network environments that are completely and exclusively under the control of the Enterprise Adding Client Location Assurance to a location means that the firewall settings and permissions for this location can be set as
189. race IsWiredConnected ret ret Query IsAdapterTypeConnected eWIRELESS Action Trace IsWirelessConnected ret ret Query IsAdapterTypeConnected eDIALUPCONN Action Trace IsModemConnected ret VBScript dim ret ret Query IsAdapterTypeConnected e WIRED Action Trace IsWiredConnected amp ret ret Query IsAdapterTypeConnected e WIRELESS Action Trace Is WirelessConnected amp ret ret Query IsAdapterTypeConnected eDIALUPCONN Action Trace IsModemConnected amp ret IsAuthenticated JScript var ret Query IsAuthenticated Action Trace Is authenticated ret VBScript dim ret 159 ret Query IsAuthenticated Action Trace Is authenticated amp ret IsWindowsXP JScript var ret Query IsWindowsXP Action Trace Is XP ret VBScript dim ret ret Query IsWindowsXP Action Trace Is XP amp ret IsWindows2000 JScript var ret Query IsWindows20000 Action Trace Is Win2000 ret VBScript dim ret ret Query IsWindows2000 Action Trace Is Win2000 amp ret ProcessIsRunning JScript var ret Query ProcessIsRunning STEngine exe eEQUAL Action Trace Is Running ret VBScript dim ret ret Query ProcessIsRunning STEngine exe eEQUAL 160 Action Trace Is Win2000 amp ret RegistryKeyExists JScript var ret ret Query RegistryKeyExists eLOCAL
190. report creation process outlined at http msdn microsoft com vstudio team crystalreports gettingstarted default aspx The first phase implementation of the ESM reporting framework has the following requirements of every report to be integrated into the system e The report may be based on only one data source That data source must be a single table or view residing within the source database see Figure 25 E Database Expert y Date Browse the data source for the tables you want to add to your report Gite to adt the alas for table choose a selected table you wish to change then cick on or push the FI key Selected Tables amp ST ROBERT ka orgariiation dm coca fe Figure 25 Browse the Reporting Data Source e The report must have a title specified and saved with the report Optional title subject author and comments will be displayed if specified see Figure 26 47 Document Properties E Summary Statistics Application Crystal Reports ActiveX Designer Ao Novel br Brpeords bene Comments Evaluate adrerence for selected enes groups Jue Esteras Adherence by Group rect Policy Adherence Template Saye Preview Picture Figure 26 Report Document Properties The report may not contain any sub reports Filtering parameters must be named the same as the target columns within the database fields of the table or view Field Explorer EN O Potsbere Fels SD den
191. rer rinte ci bind se sate dot si 24 Dh p kurert nde 124 DHCP server aaa aaa nane nene nene enen peer eee 106 DhepAll s nen vd Stee Bk TENG 124 Dalip Ga enen e 103 Distributing Unmanaged Policies 0 68 Distribution Service ccccceeeesseeeeees 29 227 Distribution Service URL enenenenenenenenenene 28 Dista ela is la 124 DNS SERVER valdet arier 106 DOS A o A E ee 124 DALAN E 73 Enable client self defense oococonococmmmomom 85 Enterprise Structure da uaaa aaa u neo une vene eneve 29 EthernetMulticast aaa aa aa nana nana neneve eneve nene ecen 123 File Exists its bosi Ai 133 Filtered Access Points rornrnenenenenenenenenene 111 Firewall Settings eiii es ve laos 116 Gateway aia ice tia 123 Gateway Server au aaaaaa eneve neneve e neve 106 GatewayAll aa ua aa aa aa aaa ann cen es see ene nen ee ec este sete 123 Getting Trace Information from the Management Server Agent aaaaaaananan esse s e ene eee rren ee reve 212 A SN 123 Importing Device Lists ooooccnnccnoconoconconicos 92 Infrastructure and Scheduling 00 28 Integrity and Remediation Rules 128 Integrity Checks ooccoccnoccnoconoconocanicnnicnnos 133 Integrity Tests aiii ici decis 131 A A seins 123 IpSubnetBrdcast occcoccnnccniconoconaconicnnicnnos 123 DAG miske td ters nee ea i 103 Key id in ies 110 Key Management Key ccoccnnccnnccnnccnaconaconacos 19 Key Types asas 110 ARA E 19 20
192. rial number will display in the appropriate fields see Figure 44 60 USB Drive Scanner 0 16 Pi Kingston DataTraveler 2 0 USB Device 28819640D23C Figure 44 Scan for Device Name and Serial Number Step 4 Repeat steps 2 and 3 until all devices have been entered into the list Step 5 Click the Save icon E and save the list see page 92 for instructions on how to import the list into a policy To edit a saved file click the Browse icon MEN and open the file 61 Client Location Assurance Service The Client Location Assurance Service CLAS is an optional feature that provides a AC cryptographically hardened verification that a pre defined network environment identified by the ZENworks Security Client s location verification process is correct This service is only reliable in network environments that are completely and exclusively under the control of the ESM Administrator CLAS should always be installed behind the enterprise firewall yet be accessible to any endpoint Aen oo Ae The ZENworks Security Client uses a fixed port to send a challenge to CLAS CLAS decrypts the packet and responds to the challenge proving that it has the private key matching the public key forming the heart of the digital certificate Server Selection and Installation Please refer to the Installation and Quick Start guide for selection and installation instructions Server Maintenance It is recommended t
193. rity Client features several diagnostics tools which can create a customized diagnostics package which can then be delivered to Novell Technical Support to resolve any issues Optionally logging and reporting can be activated to provide full details regarding endpoint usage Administrators can also view the current policy add rule scripting and check the ZSC driver status Each function of the diagnostics tools are discussed in detail below Creating a Diagnostics Package If problems occur due to the ZSC s presence on the endpoint administrators can provide fully detailed diagnostics information packages to Novell Technical Support This information is vital in resolution of any issues The diagnostics package is defined by the following items e Bindings captures the current driver bindings for the endpoint e Client Status captures the current client status displayed on the About window as well as other internal status e Driver Status captures the current status of all drivers on the endpoint displayed in the Driver Status window e Group Policy Object captures the current GPO for the user endpoint as designated by your directory service i e Active Directory Log Files captures the designated logs see Logging e Policy captures the current policy running on the ZSC see View Policy e Network Environments captures the current and detected network environments e Registry Settings captures th
194. rs and enumerate the properties of the first index in the list GetCheckinTime JScript var ret ret Query GetCheckinTime Action Trace LastCheckIn ret VBScript dim ret ret Query GetCheckinTime Action Trace LastCheckIn amp ret GetLocationMatchData LocationMatchCount JScript var envdata var envdatalength 157 envdatalength Query LocationMatchCount Action Trace MatchCount envdatalength if envdatalength gt 0 envdata Query GetLocationMatchData 0 Action Trace IP envdata IP Action Trace MAC envdata MAC Action Trace SSID envdata SSID Action Trace Type envdata Type VBScript dim envdata dim envdatalength envdatalength Query LocationMatchCount Action Trace MatchCount amp envdatalength if envdatalength gt 0 then set envdata Query GetLocationMatchData 0 Action Trace IP amp envdata IP Action Trace MAC amp envdata MAC Action Trace SSID amp envdata SSID Action Trace Type amp envdata Type end if Details 158 This script requires an environment to be defined for a location in the policy in order to provide useful data This script will then get the Location Match Count and if it is greater than 0 then it will enumerate the attributes for the first Location Match Data IsAdapterTypeConnected JScript var ret ret Query IsAdapterTypeConnected eWIRED Action T
195. rsion C ocalco exe eEQUAL 5 1 2600 0 if ret true then Action Trace File is Equal else Action Trace File is Not Equal end if Note Not all files have file version information Script as above performed correctly GetAdapters JScript var adplist var adplength var adp adplist Query GetAdapters 155 adplength adplist Length Action Trace adplength adplength if adplength gt 0 adp adplist Item 0 Action Trace DeviceID adp DevicelD Action Trace Enabled adp Enabled Action Trace IP adp IP Action Trace MAC adp MAC Action Trace MaxSpeed adp MaxSpeed Action Trace Name adp Name Action Trace SubNetMask adp SubNetMask Action Trace Type adp Type VBScript dim adplist dim adplength dim adp set adplist Query GetAdapters adplength CInt adplist Length Action Trace adplength amp adplength if adplength gt 0 then set adp adplist Item 0 Action Trace DeviceID amp adp DeviceID Action Trace Enabled amp adp Enabled 156 Action Trace IP amp adp IP Action Trace MAC amp adp MAC Action Trace MaxSpeed amp CLng adp MaxSpeed Action Trace Name amp adp Name Action Trace SubNetMask amp adp SubNetMask Action Trace Type amp adp Type end if Details This script will get a list of adapters the length of the list number of adapte
196. s Event Type Error Event Source Novell Management Service Agent 3 0 Event Category None EventID 0 Date 3 15 2005 Time 7 52 41 PM User N A Computer EMSM25 DEV Description When troubleshooting an issue it is important to review the Application Event Log to learn of any Novell exceptions that may have occurred during processing Exceptions will and do occur under normal operation however they will be an indication as to where the problem may be in the system when diagnosing issues 226 Microsoft SQL Enterprise Manager SQL Server Enterprise Manager is the primary administrative tool for Microsoft SQL Server 2000 and provides a Microsoft Management Console MMC compliant user interface that allows users to Define groups of servers running SQL Server Register individual servers in a group e Configure all SQL Server options for each registered server e Create and administer all SQL Server databases objects logins users and permissions in each registered server e Define and execute all SQL Server administrative tasks on each registered server e Design and test SQL statements batches and scripts interactively by invoking SQL Query Analyzer e Invoke the various wizards defined for SQL Server MMC is a tool that presents a common interface for managing different server applications in a Microsoft Windows network Server applications provide a component called an MMC snap in that presents MMC
197. s 8 Unknown Managed Access Points Filtered Access Points Prohibited Access Points SSID MAC Address Key Key Type Beaconing RE Mm Ms Validation Double click row to navigate to error Validation Message s Key needs to be exactly 10 hexadecimal 26 hexadecimal or 8 to 64 alphanumeric characters in length 1 is an invalid MAC Address Save failed Figure 61 Error Notification Pane 81 Creating Security Policies To create a new policy click Create Policy The Create Policy window displays Enter a name for the policy and click OK This name can be changed at any time using the primary global settings See Global Policy Settings on page 85 Security policies are built by defining all the Global Settings default behaviors then creating associating existing components for that policy such as Locations Firewalls and Integrity Rules and finally establishing Compliance Reporting for the policy The components are created either within a dummy policy or are associated from other policies It is assumed that for your first few policies you will be creating all of the unique locations firewall settings and integrity rules for the enterprise These components will be stored in the Management Service s database for possible later use in other policies The diagram below shows the components for each level and a resulting policy taken from the selections see Figure 62
198. s perform the following steps Step 1 Open the Tools menu and select Permissions The groups associated with this domain are displayed see Figure 5 AL Pormiscions Y Admnatiative Permission Publish To Settings User Groups Manageme Publish Change Create Delete Or ganizations Access Policy Permission Pobcios Policies Alvear Condoman BY Adnsstrator condoman 84 Doman Adans cordoman E Domain Users compdomn Y Enterpese Aans corpdcm Y Group Policy Creates Owens BH Schama Adans copdaman Y Users copdoman OIGA Figure 5 Management Console Permissions Settings Window Note All groups are granted access to the Management Console by default though they will be unable to perform policy tasks Access to the console can be removed by un checking the permission Step 2 To load users groups to this list do the following a Click the Add button on the bottom of the screen the Organization Table will display see Figure 6 AL OrganizationSelect El User Groups Or garirationa E comdomarn Y meat a Director T a domanstun 1 peman 4 Doman Users Figure 6 Permission Settings Organization Table 25 b Select the appropriate users groups from the list To select multiple users select individually by holding down the CTRL key or select a series by selecting the top then holding down the SHIFT key then selecting the bottom selection c When all users groups ha
199. s specified location to any location e Activate when switching to script will run when the user enters this specified location from any location if Activate when switching from was given a location parameter example office the script will ONLY run when the location switches from office to the specified location Must be a manual change script will run only when the user manually switches from or to a location Step 4 Create any Script Variables See Script Variables on page 137 Step 5 Write the Script Text See Script Text on page 194 Step 6 Click Save Repeat the above steps to create a new advanced scripting rule To associate an existing advanced scripting rule Step 1 Select Advanced Scripting Rules in the components tree and click Associate New Step 2 Select the desired rule s from the list Step 3 The trigger event variables or script may be re defined Note Changing the settings in a shared component will affect ALL OTHER instances of this same component Use the Show Usage command to view all other policies associated with this component Step 4 Click Save 136 Script Variables This is an optional setting which permits the Administrator to define a variable var for the script and either be able to use ESM functionality 1 e launch defined custom user messages or hyperlink switch to a defined location or firewall setting or have the freedom to change the value of a variable wit
200. s Security Client Assurance Service Management Service Policy Distribution Service Group Info SSL Link a Encrypted Policy a 2 lt gt i i nm gt gt S E Reporting Information Active Directory SQL Enterprise Web Server LDAP or NT Domain Directory Service Database ps ay e Public Key distributed by policy Management Console ENTERPRISE PERIMETER Figure 2 ESM Architecture The ZEN works Security Client ZSC is responsible for enforcement of the distributed security policies on the endpoint system When the ZSC is installed on all enterprise PCs these endpoints may now travel outside the corporate perimeter and maintain their security while endpoints inside the perimeter will receive additional security checks within the perimeter firewall Each Central Management component is installed separately the following components are installed on servers which are secured inside the corporate perimeter e Policy Distribution Service is responsible for the distribution of security policies to the ZSC and retrieval of reporting data from the ZSCs The Policy Distribution Service can be deployed in the DMZ outside the enterprise firewall to ensure regular policy updates for mobile endpoints Management Service is responsible for user policy assignment and component authentication reporting data retrieval creation and dissemination of ESM reports and security policy creation and storage
201. s all network traffic from the current IP configuration Default DNS server as a trusted ACL DnsAll Same as Dns but for ALL defined DNS servers Dhcp Represents current client IP configuration Default DHCP server address When this value is entered the ZENworks Security Client allows all network traffic from the current IP configuration Default DHCP server as a trusted ACL DhcpAll Same as Dhcp but for ALL defined DHCP servers 124 Application Controls This feature allows the administrator to block applications either from gaining network access or from simply executing at all To access this control open the Locations tab click the symbol next to Firewall Settings click the symbol next to the desired Firewall and click the Applications Controls icon in the policy tree on the left AL ZENworks ESM Management Console Security Policy fa x File Tools Components View Help Gi save sk ent Edy Remove Component ag Security Policy x ad Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish FE Defined Locations E 18 Home Application Controls E Office Warning blocking execution of critical applications could have an adverse affect on system Offline Di WiFi Hotspot Name Comm Hardware Internet Media f 4 Storage Device Control Description FE Firewall Settings MAE E All Adaptive Defaul Application List for Int
202. s rule enforces the use of either an SSL or a client based VPN Virtual Private Network This tule is typically applied at wireless hotspots allowing the user to associate and connect to the public network at which time the rule will attempt to make the VPN connection then switch the user to a defined location and firewall setting All parameters are at the discretion of the administrator All parameters will override existing policy settings The VPN Enforcement component requires the user be connected to a network prior to launching To access this control open the Global Policy Settings tab and click the VPN Enforcement icon in the policy tree on the left EEES o PE File Tools Components View Help E Save Policy Sh New Component s Associate ent Kale zi olic Security Policy x 7 Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting S Global Settings 9 Policy Settings VPN Enforcement Wireless Control PN Comm Hardware 64 Storage Device Control Enable 5 r oo a VPN Server IP Address Ej tiple entries wi icol 8 s Advanced Separate multiple entries with semicolons ue Message Switch To Location Trigger Locations Display Text Link Parameters Figure 75 Basic VPN Enforcement To add VPN enforcement to a new or existing security policy perform the following steps Step 5 At LEAST two additional locations must be created FIRST Step 6 Check En
203. s separate components within a location Communication hardware and storage device control defined previously under Global Rules may be adjusted at each location See Communication Hardware Settings on page 103 See Storage Device Control on page 105 See Firewall Settings on page 116 See Network Environments on page 106 See Wi Fi Management on page 109 See Wi Fi Security on page 114 102 Communication Hardware Settings Communication hardware controls by location which hardware types are permitted a connection within this network environment As it was previously determined whether to globally enable or disable each setting the default selection Apply Global Setting will maintain the default setting for the device The default may be optionally enabled or disabled at this location overriding the global setting To access this control open the Locations tab and click the Comm Hardware icon in the policy tree on the left R E ZENworks ESM Management Console Security Policy ul uy File Tools Components Help Security Policy X VESC a de y E Security Policy HS Firewall Settings IDAR Dialup Network Environments Apply Global Setting Allow All Access Mfi Fi R Management WI Fi R Security H Unknown Apply Global Setting Allow All Access 1394 Firewire Apply Global Setting Bluetooth A Wired Serial Parallel Apply Global Setting ka EEE Approved Dial Up Adapt
204. sabledWhenWiredState eA pplyGlobalSetting eLocationChange Action Trace WiFiDisabledWhenWiredState amp ret ret Action AdHocDisabledState eApplyGlobalSetting eLocationChange Action Trace AdHocDisabledState amp ret 168 ret Action AdapterBridgeDisabledState eApplyGlobalSetting eLocationChange Action Trace AdapterBridgeDisabledState amp ret ret Action MinimumWiFiSecurityState eGlobalSetting eLocationChange Action Trace MinimumWiFiSecurityState amp ret ret Action WiredDisabledState eGlobalSetting eLocationChange Action Trace WiredDisabledState amp ret ret Action DialupDisabledState eGlobalSetting eLocationChange Action Trace DialupDisabledState amp ret RemovableMediaState CDMediaState HDCState IsWiFiDisabled IsWiFiDisabled WhenWired IsAdHocDisabled IsAdapterBridgeDisabled MinimumWiFiSecurityState IsWiredDisabled IsDialupDisabled JScript var ret Action Trace Status ret Query RemovableMediaState Action Trace RemovableMediaState ret ret Query CDMediaState Action Trace CDMediaState ret ret Query HDCState elIrDA Action Trace nHDCState eIrDA ret ret Query HDCState e1394 Action Trace HDCState e1394 ret 169 ret Query HDCState eBlueTooth Action Trace HDCState eBlueTooth ret ret Query HDCState eSerialPort Action Trace HDCState eSerialPort ret ret Qu
205. sta sek wach his act a de ee ae Sel Edhe at ees 223 Example Configuration Table eee cette ence nee 228 Example Repository Table s a duzin s ba es id e eR bale d 228 Example Organization Table eee nr teen eens 229 Example ORG REP Table ca s vine njesie a Leknes Aiko obs let G wag ae ete 229 Example Event Table uv nse atra ies kresen Se tego has WR ee A 230 Example Configuration Table ss seses kd ser n dekan a aa dee eee 231 Configuration Form ida sh n r do birdie sir eh ets 231 Example Organization Table eee e ene ae 232 Organization Audit Table es 232 Example Publish Organization Audit Table 0 0 ccc cece eee eens 233 2007 Novell Inc All Rights Reserved List of Tables Table 1 System Requirements ka gat k st e i dha dda da eet bade ala ad 12 Table 2 Signal Strength thresholds 2 2 0 oe ccc ESERE teen ene ene 112 Table 3 TCP UDP Ports ta A ai oia 120 Table 4 Network Address Macros 0 cece cece e nee nen nee e ene beeen ne AS 123 Table Application Controls tail lata dat eas les st 126 T ble 6 Shell Folder Names 0 RE Beis Me de IL DRG A ee HY 144 2007 Novell Inc All Rights Reserved ZENworks Endpoint Security Management Novell s ZENworks Endpoint Security Management ESM provides complete centralized security management for all endpoints in the enterprise Because ESM applies security at the most vulnerable point the endpoint all security settings are a
206. sted select the Optional Trusted Ports TCP UDP this ACL will use These ports will permit all ACL traffic while other TCP UDP ports will maintain their current settings Selecting None means any port may be used by this ACL Step 7 Click Save Repeat the above steps to create a new setting To associate an existing ACL Macro to this firewall setting Step 1 Select Access Control List from the component tree and click the Associate Component button Step 2 Select the ACL s Macro s from the list Step 3 The ACL behavior settings may be re defined Note Changing the settings in a shared component will affect ALL OTHER instances of this same component Use the Show Usage command to view all other policies associated with this component Step 4 Click Save 122 Network Address Macros List The following is a list of special Access Control macros These can be associated individually as part of an ACL in a firewall setting Table 4 Network Address Macros Macro Description Arp Allow ARP Address Resolution Protocol packets The term Address Resolution refers to the process of finding an address of a computer in a network The address is Resolved using a protocol in which a piece of information is sent by a client process executing on the local com puter to a server process executing on a remote computer The information received by the server allows the server to uniquely identify the network system for which the addr
207. stomer request Modems will ALSO be disabled since the 3G wireless card instantiate as modems Vk ok ok of of of of KKK ok ok ok ok ok Global Varialbles set WshShell CreateObject WScript Shell Dim strStartMenu 187 strStartMenu WshShell SpecialFolders AllUsersPrograms Dim strDesktop strDesktop WshShell SpecialFolders AllUsersDesktop Vio ok ok 2k 2k ok ook ak ak Main Loop Disable Wireless Adapters CreateStartMenuFolder CreateStartMenuProgramFilesShortcut CreateDesktopAllUsersShortcut Create VbsFileToWriteRegEntry Mie Functions to do each action Function Disable VVirelessA dapters Dim ret NOTE 1 means this action can be undone on a location change if the policy allows 0 means this action can be undone on a policy update if the policy allows ret Action WiFiDisabledState eDisableAccess 1 Action Trace Disallow Wi Fi amp ret Again per the customer request Modems will be disabled to deal with 3G wireless cards that act as modems in the network stack ret Action DialupDisabledState eDisableAccess 1 Action Trace Disallow Modem amp ret End Function Function CreateStartMenuProgramFilesShortcut create the Start Menu folder and then create the shortcut set oShellLinkStartMenu WshShell CreateShortcut strStartMenu amp Novell Enable Wireless Adapter Control Ink oShellLinkStartMenu TargetPath C Program Files Novell ZENworks Security Client wareg vbs
208. tService JScript Action StartService lanmanworkstation VBScript nun Action StartService lanmanworkstation Details Make sure you use the actual service name not the display name StopService JScript Action StopService lanmanworkstation VBScript Action StopService lanmanworkstation Details Make sure you use the actual service name not the display name WriteRegistryDWORD WriteRegistryString JScript var ret Action CreateRegistry Key eLOCAL_MACHINE Software Novell Tester if ret true Action Trace Create Key is Successful else Action Trace Create Key did not work Action WriteRegistryDWORD eLOCAL_MACHINE Software Novell Tester val1 24 Action WriteRegistry String eLOCAL MACHINE SoftwareWNovellVTester val2 Novell VBScript 153 dim ret ret Action CreateRe gistry Key eLOCAL_MACHINE Software Novell Tester if ret true then Action Trace Create Key is Successful else Action Trace Create Key did not work end if Action WriteRegistryD WORD eLOCAL_MACHINE Software Novell Tester val1 24 Action WriteRegistryString eLOCAL_MACHINE Software Novell Tester val2 Novell 154 Query Namespace FileExists Version JScript var ret ret Query FileExists Version C ocalco exe eEQUAL 5 1 2600 0 if ret 1 Action Trace File is Equal else Action Trace File is Not Equal VBScript dim ret ret Query FileExistsVe
209. tance of this component in other policies see Figure 60 Usage of Office Office is contained in the following Policies Security Policy Figure 60 Show Usage Window 80 Error Notification When the administrator attempts to save a policy with incomplete or incorrect data in a component the Validation pane will display at the bottom of the Management console highlighting each error The errors MUST be corrected before the policy can be saved Double click each validation row to navigate to the screen with the error Errors are highlighted as shown in the figure below see Figure 61 t ZENworks ESM Management Console Security Policy lul LI Ela EJ ile Tools Components View Help pj Save Policy Ja New Component 2 Associate Component e Remoxe Component Policies Security Policy Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish EG Defined Locations Ghar steric TS orn E a Home Begin searching for a new Access Point when Lelie vr are T not q a Hot Spots E the current signal strength drops below Low specify a MAC Address it is y Office E assumed there will be multiple Comm Hardware Access Points beaconing the 3 Storage Device Control same SSID amp Firewall Settings Switch to a new Access Point when itis 20 dB S Network Environments 2 better than the current signal so Work Environment Wi Fi Management Wi Fi Security 6 Work Wireles
210. th this key the CLAS server can be recreated from the readily available install files Network Access Control The CLAS Server should be further protected from unauthorized access by restricting network access to it At a minimum it is critical to the functionality of CLAS that network access to the CLAS server be restricted to hosts that reside on the location defining network To repeat there should be no connectivity whatsoever to the CLAS server from devices which are not already in the policy defined network location that CLAS is providing location assurance for and any deviation from this requirement negates all assurance value of CLAS Furthermore network access restrictions should include 3 all incoming connection attempts should be restricted to HTTP over port 80 and 4 no outgoing connection attempts should be allowed All these measures can be imposed through the use of standard firewall technology High Availability High Availability mechanisms for the CLAS Server are strongly recommended There are multiple alternative mechanisms for building high availability solutions ranging from the general DNS round robining layer 3 switches etc to the vendor specific the Microsoft web site has multiple resources on high availability web services Those implementing and maintaining an ESM solution should determine which class of high availability solution is most appropriate for their context 63 Optional Server Configura
211. tical in assessing and implementing strong security policies Reports may be accessed through the Management Console by clicking on Reports The endpoint security information gathered and reported back is also completely configurable and can be gathered by domain group or individual user See Reporting on page 37 for details Menu Bar The menu bar gives you access to all functions of the Management Console As with all Windows menus simply click the menu link to display the menu items The menu items are described below File Tools View Help Figure 4 Menu Bar e File The File menu is used for the creation and management of policies e New creates a new policy e Refresh Policy List updates the list to display all active policies e Delete deletes the selected policy e Import imports a policy into the Management Console Export exports a policy and the required SETUP SEN file to a specified location outside of the Management Service database e Exit Closes the Management Console software logging out the user e Tools The Tools menu is used to control the Management Service e Configuration opens the Configuration window e Permissions opens the Permissions window e View The View menu gives you an option to change to key policy tasks without using the task bar e Policy when a policy is open switches the view to that policy e Policy List displays the policy list e Alerts displays the Alerts dashboard
212. tions I 2 WScript Echo Not supported displaying return values back to a parent window are not support since the parent window is unavailable Use the Action Message ESM API instead Access to Shell Objects Use the following modified nomenclature call JScript Use var WshShell new ActiveXObject WScript Shell Instead of var WshShell WScript CreateObject WScript Shell VBScript Use Dim WshShell Set WshShell CreateObject WScript Shell Instead of Dim WshShell Set WshShell WScript CreateObject WScript Shell All scripts are executed in the system context unless the following comment is added to the top of the script Jscript ImpersonateLoggedOnUser VBScript ImpersonateLoggedOnUser Rule Scripting A rule consists of two parts The first part is the Trigger Events which determine when to execute the rule The second part is the scripting code which contains the logic of the rule The Endpoint Security Client provides three namespaces and five interfaces for the script which allows the script to control or access the client The namespaces are as follows 1 2 3 Query This namespace provides methods to get the current state of the client For example information about the adapters shield states and location Action This namespace provides methods that get the client to do something For example a call that puts the client into a quarantined shiel
213. tions Parameters OldLocation opt Uuid of a Location NewLocation opt Uuid of a Location ManualChange opt true false User manually changed location e MediaConnect Desc Adapter has connection Parameters None e MediaDisconnect Desc Adapter has lost its connection Parameters None e PolicyUpdated Desc Called when client is first started and whenever a new policy is applied Parameters None 140 ProcessChange Desc Trigger whenever a process is created or deleted Parameters None Startup Desc Run the rule when the engine is started Parameters None TimeOfDay Desc Run the rule at a particular time or times of day Or at least once a day This will store the last time this was triggered Parameters Time HH MM Example 04 00 15 10 Military time Lowest to highest Max 5 Comma separated Days Sun Mon Tue Wed Thu Fri Sat One or more Comma separated Type Local UTC Timer Desc Run the rule every n milliseconds Parameters Interval Number of milliseconds UserChangeShield Desc The user had manually changed the shield state Parameters None WithinTime Desc Run the rule every n minutes starting from the last time the rule was executed If the computer has been turned off it will execute the rule if the specified time has past since the last time the rule was executed Parameters WithinMinutes Number of seconds 141 Script Namespaces General Enumerations and F
214. tions Multiple CLAS iterations may be installed on servers throughout the enterprise to either cryptographically assure additional locations or to assure that if the primary CLAS server goes down the location can still be verified by the ZENworks Security Client In the case of the second scenario the private key is located based on URL rather than IP address Therefore a block of servers can be set up to share a single URL CLAS may either be installed on a single server then that server s image can be copied to each additional server or it may be installed on each server separately and the private and public keys can be copied over to the other servers ALL servers in a URL block MUST have the same private and public keys Transferring the Public Key to the Management Service After installation has completed the generated public key which will be transferred via security policy to the ZSC is located in the Program Files Novell Novell ESM CLAS directory on the server The public key is identified by the filename publickey This filename can be changed to any name desired The public key file will need to then be copied and transferred to the Management Service anywhere on the service which will allow the Management Console to access and distribute the key to all ZENworks Security Clients through a security policy The public key contains both the matching key information and the CLAS URL information This information is imported
215. tions integrity and Rendin Fides Conpkance Reporting Public Gebs Semno Pobcy Settings F ZSC Update Wireless Control Comin Hardware 4 Figure 74 ZSC Update To facilitate simple and secure distribution of these patches to all ZSC users perform the following steps Step 1 Check Enable to activate the screen and the rule Step 2 Select the location where the ZSC will look for the updates Due to the recommendations in the next step the location associated with the enterprise environment 1 e the Work location is the recommended candidate Step 3 Enter the URI where the patch has been stored Note This will need to point to the patch file which can be either the setup exe file for the ZENworks Security Client or an MSI file created from the exe For security purposes it is recommended that these files be stored on a secure server behind the corporate firewall Step 4 Enter the version information for this file in the provided fields Version information is found by installing the ZENworks Security Client and opening the About screen see the ESM ZENworks Security Client User s Guide for details The version number for STEngine exe is the version number you will want to use in the fields Each time the user enters the assigned location the ZSC will check the URI for an update that matches that version number If an update is available the ZSC will download and install it 93 VPN Enforcement Thi
216. tp www novell com documentation Novell Trademarks For Novell Trademarks see the Novell Trademark and Service Mark list http www novell com company legal trademarks tmlist html Third Party Materials All third party trademarks are the property of their respective owners Licenses FIPS Certified AES Crypto Compilation Copyright c 1995 2003 by Wei Dai All rights reserved This copyright applies only to this software distri bution package as a compilation and does not imply a copyright on any particular file in the package The following files are copyrighted by their respective original authors mars cpp Copyright 1998 Brian Gladman All other files in this compilation are placed in the public domain by Wei Dai and other contributors Permission to use copy modify and distribute this compilation for any purpose including commercial applications is hereby granted without fee subject to the following restrictions 1 Any copy or modification of this compilation in any form except in object code form as part of an application soft ware must include the above copyright notice and this license 2 Users of this software agree that any modification or extension they provide to Wei Dai will be considered public domain and not copyrighted unless it includes an explicit copyright notice 3 Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error free and Wei Dai is u
217. trol Step 4 Open the setting and add any additional required applications to the list Note Once this script executes ONLY the applications on this list will run on the endpoint Step 5 Associate the Block Gray List scripting rule to this policy 196 Compliance Reporting Because of the level and access of the ZSC s drivers virtually every transaction the endpoint performs can be reported The endpoint can have each optional system inventory run for troubleshooting and policy creation purposes To access this control open the Compliance Reporting tab Note Reporting is not available when running the Stand Alone Management Console KG ZENworks ESM Management Console Security Policy WJ wiley File Tools Components View Help El ley a IN ent S de g P Seay Policy E Global Policy Settings Locations Integrity and Remediation Rules Compliance Reporting Publish Send Reports every 1 C Minutes Hours Days This category of reporting includes location and environment reports detected and Vv Location policy usage used by the endpoint security client IV lij Detected network environments EV L System Integrity vid Anti Virus spyware and custom rules VW ki Endpoint tampering protection activity v ki Policy overrides Iv ki Managed application enforcement activity E M L Storage Devices IV kj Detected removable devices IV lg Files copied to a removable device IV lij Files opened from a r
218. twere t running Spyavetepes Verify that SpyGweeper sobwae s annin Symantec Antivirus Coporste E dhon 20 Integrity Check Very Orel Symantec Artrevua mdtw n m Trend Mer PC odin Secwuty 2008 Integety Check Very thet Trend Micro sativa sunning x et Figure 59 Select Component Window 79 IMPORTANT Changes made to associated components will affect all other instances of that component Example You can create a single Location component named Work which defines the corporate network environment and security settings to be applied whenever an endpoint enters that environment This component can now be applied to all security policies Updates to the environment or security settings can be changed in the component in one policy and will update the same component in all other policies that it s associated to Use the Show Usage command to view all other policies associated with this component see below Remove Component This control will remove a component from the policy The component will still be available for association in this and other policies Show Usage Changes made to shared policy components will affect all policies they are associated with Prior to updating or otherwise changing a policy component it is recommended that you run the Show Usage command to determine which policies will be affected by the change 1 Right click the component and select Show Usage 2 A pop up window will display showing each ins
219. ue then Action Trace Delete Key is Successful else Action Trace Delete Key did not work end if DeleteRegistry Value JScript Action DeleteRegistry Value eLOCAL MACHINE SoftvareNNovellNTester vall Action DeleteRegistry Value eLOCAL MACHINE SoftwareWNovellWTester val2 VBScript Action DeleteRegistry Value eLOCAL_MACHINE Software Novell Tester val1 Action DeleteRegistry Value eLOCAL_MACHINE Software Novell Tester val2 DisplayMessage DisplayMessageByName 148 Note The first parameter of the DisplayMessage call is a unique integer identifier for each action When calling the Message by name the name specified MUST EXACTLY match the DisplayMessage specified in the policy JScript Action DisplayMessage 40 Message40 Message Here question Action Sleep 10000 Action DisplayMessageByName Message40 VBScript Action DisplayMessage 40 Message40 Message Here question Action Sleep 10000 Action DisplayMessageByName Message40 Details This script will create a Message Box with all parameters and then wait 10 seconds during which the tester should click Ok to end box display and then it will be displayed by the ID and wait 10 seconds again the tester should click Ok to end box display and then it will display the Message Box by EnableA dapter Type JScript Action EnableA dapterType false eWIRELESS Action EnableA dapterTypet true eWIRELESS Acti
220. unt 3 Accounts Rename quest account 88 audit Audit the access of global system objects 88 Audit Audit the use of Backup and Restore privilege 88 audit Shut down system immediately if unable to log security audits 88 Devices Allow undock without having to log on RE Devices Allowed to Format and eject removable media 88 Devices Prevent users from installing printer drivers De iR a Devices R ged on user only flopp gged on user only 88 Devices Unsigned driver installation behavior 2 Domain controller Allow server operators to schedule tasks Rg Domain controller LDAP server signing requirements B pomain controller Refuse machine account password changes Rg Domain member 22 Domain member 2 Domain member 22 Domain member Digitally encrypt or sign secure channel data always Digitally encrypt secure channel data when possible Digitally sign secure channel data when possible Disable machine account password changes mo Domain member Maximum machine account password age 22 Domain member Require strong Windows 2000 or later session key 88 Interactive logon Do not display last user name Re Interactive logon Do mot require CTRL ALT DEL fi Interactive logon Message text for users attempting to log on Sil Interactive Innan Mescane title For users attemntina ta lan an RJDCOM Machine Access Restrictions in Security Descriptor Definition Language SD B JDCOM Machi
221. until 12 hours have passed from installation To adjust this time frame open the Configuration tool see Scheduling on page 29 and adjust the Client Reporting time to the number of minutes appropriate for your needs and your environment When data is needed immediately the Service Synchronization option in the Configuration tool can immediately lynch the Policy Distribution Service which collects the reporting data from the endpoints and the Reporting Service which will update all alerts based on the newly collected data See Service Synchronization on page 32 for details Configuring Alert Triggers Alert triggers can be adjusted to thresholds that fit your corporate security needs To adjust alerts from their defaults perform the following steps Step 1 Select an alert from the list and click the Configuration tab on the right see Figure 13 Alerts x k r Client Integrity iF Unremediated integrity test failures r Communication port Security F Potential port scan attempted l r Data Protection Files copied to device One day total Lo Security Client Configuration I Incorrect security client version Incorrect policy r Security Client Tampering Show a E 0 He ep IV Enable this alert GJ Override password used GJ Uninstall attempts ci ear Save ys Wireless Security i p a Figure 13 Alerts Configuration Tab ta Information AX Configuration Trigger alert when Bytes c
222. uration and send interval can be set using the Report Times controls on the right of the screen 7 Make Permanent Report Times Duration 1440 Minutes Interval 60 Minutes Diagnostics Pa na Figure 56 Duration Settings and Make Permanent Check the Make Permanent box to continue uploading the new reports for just this end user otherwise reporting will revert to the policy default at the next reboot Making Reports Available for a Diagnostics Package To capture reports in the diagnostics package check the Hold Files box in the Reporting window This will hold reports after uploading in the temp directory for the time space defined in the Reporting window These reports can then be bundled in the diagnostics package Diagnostics IV Hold Files Hold Time 10080 Minutes Total Size 10 MB Figure 57 Hold Reports for Diagnostics 77 Creating and Distributing ESM Security Policies Security Policies are used by the ZENworks Security Client to apply location security to mobile users Decisions on networking port availability network application availability file storage device access and wired or Wi Fi connectivity are determined by the administrator for each location Security policies can be custom created for the enterprise individual user groups or individual users machines Security policies can allow full employee productivity while securing the endpoint or can restrict the employee to only running cert
223. ure O pa pe Brot BA teg Pet Took r ty n me ER yo SU Peter J IRH ro 20 ory rapa Pati bager IK Reports lis STATUSI x rere E RR A A Mirwanew Feite Pe ot hender Geco a B F ORG v i van me tes Page kunder Besoni arrg Tous Pida Bea comme is gt Report Title E cece peca De ret Oster u Pret Time a F WS AS ur dentar Date Grew Meader El poet puta fect avd date Gacian at Trew am Date Date Gro Header 22 sv rt moedoe lat amet org pare Secion Cate me om Record rt ronda Oaa Header F met monne iat amet poaa ane A Satan 10 Qen v Total Page Court Crag Monte S overt sense fart evel hiar A Gar 1 haset Tite on Apot Curs D l v mun Record Select pepi pap mg came fenget per sy pagt inm gt papi pal same Cop Foder F ever rt Grass seeto Po gt fact mg uden Geconi j um F r Pam ard tare e er e am Pranon Page Note Gone Fone K vert otras fact t posa rane AS bar nes H Gan Foster RD avari messen tas ened org rona A Gocot T Gap Fonu El evet acti Sct amet sete A actor Us gt SHA IA SE D meet rier E ow Figure 40 Link the Parameter 56 p parameter Type CTRL S to save the filter E Record Selection Formula Editor ba F RI Step 13 So using the new parameter specify only the records where the field equals the values selected in the parameter Select the column and then a comparison
224. uthority pages www iana org for a complete Ports and transport types list Click Save Repeat the above steps to create a new setting To associate an existing TCP UDP port to this firewall setting Step 1 Select TCP UDP Ports from the component tree and click the Associate Component button Step 2 Select the desired port s from the list Step 3 The default behavior setting may be re defined Note Changing the settings in a shared component will affect ALL OTHER instances of this same component Use the Show Usage command to view all other policies associated with this component Step 4 Click Save 119 Several TCP UDP port groups have been bundled and are available at installation Table 3 TCP UDP Ports Name Description Transport Value All Ports All Ports All 1 65535 BlueRidge VPN Ports used by the BlueRidge VPN Client UDP 820 Cisco VPN Ports used by the Cisco VPN Client IP 50 51 UDP 500 4500 UDP 1000 1200 UDP 62514 62515 62517 UDP 62519 62521 UDP 62532 62524 Common Networking Commonly required Networking Ports for building fire TCP 53 walls UDP 53 UDP 67 68 TCP 546 547 UDP 546 547 TCP 647 847 UDP 647 847 Database Communication Microsoft Oracle Siebel Sybase SAP Database Ports TCP 4100 TCP 1521 TCP 1433 UDP 1444 TCP 2320 TCP 49998 TCP 3200 TCP 3600 File Transfer Protocol FTP File Transfer Protocol Port TCP UDP 21 Instant Messaging Microsoft AOL Yahoo Instant Messa
225. ve Been Detected Ninbe of Access Ports Wireless Environment History Location LI Access Point SSID MAC Address Min Ave Mar a a d AR mei Ea Last wee 13008 154 4 3 w Tes 164 Mia Ave Mar di d d ar ENI Last were 120008 1590 ws sn u Times 114 M a Avg Max gi ab d ar E Last worm 122008 11 97 a Nan v M a Avg Max de d d AP bel ik ODE VASSENGA Lad tere 120008 To x si sa Mas I Mia Arg Ma m dh d Ar SV SCONSIL FING Goce OF PR Les seem 12 12 34 TER Man 11 Min Avg Ma db dB d ar PETITE Last ween 120006 1554 on se 43 Time 172 Min Avg Mar m at d ar Controls 001480 MA Kari ere 110006 17 34 Cad AT T Time 187 Min Avg Ma Figure 24 Sample Wireless Environment History report 46 Generating Custom Reports Software Requirements ODBC compliant reporting tools i e Crystal Reports Brio Actuate may be used to create custom reports not included in the Novell reports list These reporting tools can view and query the reporting information from a common data warehouse star format The reports included with ESM were created using Crystal Reports for Visual Studio NET SP2 This version of Crystal Reports is bundled with Visual Studio NET and is available as an optional component To learn more visit http msdn microsoft com vstudio team crystalreports default aspx Creating a ESM Compliant Report Before you begin please review the
226. ve been selected click the OK button This will add the users groups to the grid on the Permissions form Step 3 Assign any or all permissions to the available users groups Step 4 To remove a selected user group highlight the name and click Remove The selected name will be moved back to Organization Table Publish To Settings Users Groups who have Publish Policy checked will need to be assigned users and or groups to publish to To set the Publish To Settings perform the following steps Step 1 Click the Publish Settings tab Step 2 Select the users groups granted the Publish permission from the drop down list see Figure 7 AL Pormikcions Admnet arve Penmessions Put sh To Setting Acrrraitratce Cove Add Remove Figure 7 Publish To Settings Step 3 Assign users groups to this user group by a Click the Add button on the bottom of the screen the Organization Table will display b Select the appropriate users groups from the list To select multiple users select individually by holding down the CTRL key or select a series by selecting the top then holding down the SHIFT key then selecting the bottom selection c When all users groups have been selected click the OK button This will add the users groups to the selected name s publish list see Figure 8 26 AL Pormisions Y Administrative Permissions Putish To Settings Adrretatce Adminestates condoms zi User Groups Or
227. vice and Management Agent Windows Service The settings in storage order are 12 Management Server Credential 13 Distribution Service URL 14 Distribution Service Schema Id 15 Distribution Service Schema Key Id 16 Distribution Service License Id 17 Authentication Service Counter Category 18 Authentication Service Minimum SSL Key Strength 19 Management Service KMK 20 Management Service Private Key 21 Distribution Service Remoting Timeout 22 Management Service Agent Counter Category 23 Distribution Service Setup Id 24 Management Service Public Key 25 Directory Service Synchronize Frequency 26 Policy and Publish Synchronize Frequency 27 Reporting Data Synchronize Frequency 28 User Data Synchronize Frequency 230 29 Distribution Server Reporting Poll Frequency 30 Report Server Notification Poll Frequency future 31 Management Service Maintenance Frequency 32 Report Service Maintenance Frequency 33 Distribution Service Virtual Directory SSI 34 Management Service Virtual Directory SSI 35 Distribution Service SUS File Id WIE SSD CAR AMARE CD ARIA EE 12940 156 4 CRE bt E GQ EN ER p vert see bud RCO Pd A DLAC ESC 3 SA CIA 240 parer GAP CO GADEA t Ll DITE KOT KTO LL IG AD CAR Atrae DALI 274 DITA SIMAO CI IOMA AA KY TJ Figure 117 Example Configuration Table These settings are managed from the Management Service Configuration form infrastructure and Sch
228. vironment DNSCount See ICLIENTADAPTER Interface GetNetworkEnvironment GatewayCount See ICLIENTADAPTER Interface GetNetworkEnvironment WINSCount See ICLIENTADAPTER Interface GetNetworkEnvironment WirelessAPCount See ICLIENTADAPTER Interface GetNetworkEnvironment IClientWAP Interface This interface provides information about a Wireless Access Point AvgRssi See IClientNetEnv Interface Get WirelessAPItem MAC 186 See IClientNetEnv Interface GetWirelessAPItem MaxRssi See IClientNetEnv Interface GetWirelessAPItem MinRssi See IClientNetEnv Interface GetWirelessAPItem Rssi See IClientNetEnv Interface Get WirelessAPItem SSID See IClientNetEnv Interface Get WirelessAPItem IClientA dapterList Interface This interface is a list of adapters in the network environment Item amp Length See Query Namespace GetAdapters Sample Scripts Create Registry Shortcut VB Script This script is to ONLY run at STARTUP of the ZENworks Security Client The script creates a desktop and program files shortcut that is linked to a VBScript file that the script also creates The VBScript is located in the ZENworks Security Client installation folder It sets a registry entry to TRUE A second script included in the policy reads this registry entry If the entry is TRUE it will launch the dialog box that allows the user to control wireless adapters This script also disables wireless adapters at startup Per cu
229. with files encrypted and signed by the Management Service Additionally it allows you to optionally configure a Windows NT or Windows 2000 Active Directory for authentication Rerunning the Communications Console Start Programs Novell Management Service ESM Communications Console will cause you to lose user and log data however Policy data will not be deleted The Communications Console exercises a majority of the communication requirements for a managed installation and is an excellent last resort tool for resetting and or diagnosing server communication issues If one of the test fails the check is not marked mouse over the item to receive instructions on items to check to remedy the situation Check the Pause Configuration Validation to pause the timer which will retry the tests every ten seconds The test items are as follows Configuration File Valid This test verifies that the Novell Management Service Installer has received the configuration information entered during installation If the installation information provided was invalid or the installation did not successfully communicate the settings to the installer the Configuration File Valid test will fail e Schema Exists This test verifies that the policy schema is available for publishing to the ESM 207 Distribution Service If this test fails the file is missing or an incorrect path may have been specified by the Management Service Install Database Exists This
230. ws may look like on your system see Figure 109 EE m x CE Ach pen Pi linden ipi aX A do t aud x9 BEG One e Y tetmesieg masia HER Figure 109 System Monitor Function Of all the items you can monitor on a typical server the objects that you need to monitor closely for performance issues are e Memory 215 For a managed installation of ESM the objects that you should monitor in addition are Processor Physical Disk Network ASP NET ASP NET Applications selecting Novell specific instances SQLServer Access Methods SQLServer Cache Manager SQLServer Databases selecting Novell specific instances SQLServer General Statistics SQLServer Memory Manager SQLServer Locks 216 Securing SQL Database Passwords The SQL database passwords if used are stored as clear text in many of the ESM config files and can present a security hole To encrypt the passwords the following is recommended Update the connection strings with an Integrated Security value This is an example of a connection string to an OleDb compliant data source containing a User name and password lt add key NovellMSConnectionString value Provider sqloledb Data Source ACME_MAIN Initial Catalog STMSDB User Id ST_STMSDB_USER Password abc123 gt Replace the User Id and Password values with the value Integrated Security SSPI Example lt add key NovellMSConnectionString value Provider sqloledb Data Source
231. y connect to the access point This helps prevent possible re distribution of the keys to unauthorized users Due to the inherent security vulnerabilities of Shared WEP Key Authentication Novell supports ONLY Open WEP Key Authentication With Shared Authentication the client AP key validation process sends both a clear text and encrypted version of a challenge phrase that is EASILY sniffed wirelessly This can give a hacker both the clear and encrypted versions of a phrase Once they have this information cracking the key becomes trivial Filtered Access Points Prohibited Access Points SSID MAC Address Key Type Beaconing 31 E Figure 83 Managed Access Points Control Enter the following information for each AP e SSID Identify the SSID number case sensitive MAC Address Identify the MAC Address recommended due to the commonality among SSIDs If not specified it is assumed there will be multiple AP s beaconing the same SSID Key Enter the WEP key for the Access Point either 10 or 26 hexadecimal characters Key Type Identify the encryption key index by selecting the appropriate level from the drop down list e Beaconing Check if the defined AP is currently broadcasting its SSID Leave un checked if this is a non beaconing AP Note The ZSC will attempt to first connect to each beaconing AP listed in the policy If no beaconing AP can be located the ZSC will then attempt to connect to any non beaconing A
232. y in the application layer or as a firewall hook TI JE ene oe driver ESM client security is integrated into the TOP xX TOP Network Driver Interface Specification NDIS I driver for each network interface card NIC LAN PROTOCOLS LAN PROTOCOLS er ig ta I providing security protection from the moment E 5 A traffic enters the PC Differences between ESM and A l N FE ATE application layer firevvalls and filter drivers are VI PV illustrated in Figure 1 e e Security decisions and system performance are gt optimized when security implementations operate at HAGKER HACKER the lowest appropriate layer of the protocol stack Figure 1 Effectiveness of NDIS layer firewall with ESM s ZENworks Security Client unsolicited traffic is dropped at the lowest levels of the NDIS driver stack by means of Adaptive Port Blocking stateful packet inspection technology This approach protects against protocol based attacks including unauthorized port scans SYN Flood NetBIOS and DDOS attacks ESM Overview ESM consists of five high level functional components Policy Distribution Service Management Service Management Console Client Location Assurance Service and the ZENworks Security Client The figure below shows these components in the architecture Location Assurance ZENworks I ac Endpoint Security Management DMZ DEMILITARIZED ZONE al CENTRAL MANAGEMENT A Office pa LOCATION SECURE i e Client Location i ed i ZENwork
233. yware Rules on page 129 Advanced Scripting Rules Along with simple menu driven integrity rule creation mechanisms ESM includes an advanced integrity rule scripting tool which gives administrators the ability to create extremely flexible and complex integrity rules and remediation actions The scripting tool uses the common scripting languages VBScript or JScript to create rules which contain both a trigger when to execute the rule and the actual script the logic of the rule The triggers or events that cause the execution of the rule include startup location change time interval time of day adapter arrival or removal media connect or disconnect policy update process change etc See Advanced Scripting Rules on page 135 128 Antivirus Spyware Rules Antivirus spyware Rules verify that designated antivirus or spyware software on the endpoint is running and up to date Tests are run to determine if the software is running and if the version is up to date Success in both checks will allow switching to any defined locations Failure of either test could result in any or all of the following actions defined by the Administrator e A report is sent to the Reporting Service A custom user message is displayed with an optional launch link which provides information on how to fix the rule violation The user is switched to a Quarantined State which limits the user s network access and or disallows certain programs fr
Download Pdf Manuals
Related Search
Related Contents
温度調節器 KT8 取扱説明書 CDA CI521 tumble dryer UltraPitch User Manual Stoelting U431 User's Manual 取扱説明書(スピーカー部) - 274.42 KB ご利用ガイド Ver.13.0 warning - Marzocchi No-Longer-Foreign: Teaching an ML compiler to speak C “natively” Kambrook CERAMIC KCE640 User's Manual Kingston Technology ValueRAM 2GB DDR2 DIMM Copyright © All rights reserved.
Failed to retrieve file