Configuration Guide
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ... Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network...
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ... Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network...
Configuration Guide
Page 13
... that includes brief product overviews, key features, sample part numbers, and abbreviated technical specifications for your business operations. To visit the Cisco Online Subscription Center, go /guide • Cisco Marketplace provides a variety of the network is impaired while most business operations remain functional. Visit Cisco Marketplace, the company store, at this URL: http://www...
... that includes brief product overviews, key features, sample part numbers, and abbreviated technical specifications for your business operations. To visit the Cisco Online Subscription Center, go /guide • Cisco Marketplace provides a variety of the network is impaired while most business operations remain functional. Visit Cisco Marketplace, the company store, at this URL: http://www...
Configuration Guide
Page 28
... later on Red Hat Linux v9. • Secure Desktop General-Provides an encrypted space for such client connection sites as needed. Cisco Secure Desktop Configuration Guide 3-4 OL-8607-02 You can list the keystroke logging applications that make up its own settings and options ...Secure Desktop and Cache Cleaner launch only if the scan is transparent, requiring only a browser for keystroke logging applications on a location-specific basis. The Secure Desktop does not encrypt or clean system memory information, including that seeks to disable printing from within which may also...
... later on Red Hat Linux v9. • Secure Desktop General-Provides an encrypted space for such client connection sites as needed. Cisco Secure Desktop Configuration Guide 3-4 OL-8607-02 You can list the keystroke logging applications that make up its own settings and options ...Secure Desktop and Cache Cleaner launch only if the scan is transparent, requiring only a browser for keystroke logging applications on a location-specific basis. The Secure Desktop does not encrypt or clean system memory information, including that seeks to disable printing from within which may also...
Configuration Guide
Page 39
... CSD Windows Location named Work that do not match other locations). OL-8607-02 Cisco Secure Desktop Configuration Guide 5-1 In contrast, users' home PCs might set up a.... For these clients, you might set up a location named Home that is specified by IP addresses on a 10.x.x.x network behind a NAT device are an unlikely risk for exposing confidential...8226; Configuring the Secure Desktop for Clients that meets the security requirements of antivirus software and specific, supported operating systems to grant full access to prevent access by unauthorized users. This location...
... CSD Windows Location named Work that do not match other locations). OL-8607-02 Cisco Secure Desktop Configuration Guide 5-1 In contrast, users' home PCs might set up a.... For these clients, you might set up a location named Home that is specified by IP addresses on a 10.x.x.x network behind a NAT device are an unlikely risk for exposing confidential...8226; Configuring the Secure Desktop for Clients that meets the security requirements of antivirus software and specific, supported operating systems to grant full access to prevent access by unauthorized users. This location...
Configuration Guide
Page 47
... to the subsequent attribute descriptions for examples of Entry Path strings. Note Refer to the mandatory attributes in this location. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-9 Figure 5-4 Add Registry Criterion Note You can add a DWORD (double word, an unsigned 32-bit integer) value.... Step 2 Click one because it contains the machine-specific registry files. • Entry Path field-Enter the name of the named registry key on client computers to be modified from the client system. The Add or Edit Registry Criterion dialog box opens. The options are configuring....
... to the subsequent attribute descriptions for examples of Entry Path strings. Note Refer to the mandatory attributes in this location. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-9 Figure 5-4 Add Registry Criterion Note You can add a DWORD (double word, an unsigned 32-bit integer) value.... Step 2 Click one because it contains the machine-specific registry files. • Entry Path field-Enter the name of the named registry key on client computers to be modified from the client system. The Add or Edit Registry Criterion dialog box opens. The options are configuring....
Configuration Guide
Page 49
... application is active: HKEY_LOCAL_MACHINE\SOFTWARE\\Status Case sensitive-Check to require the String value of a specific file as a criterion for assigning the location you are configuring for the remote client, or ...entry in the String value field to the subsequent attribute descriptions for pane. The Add or Edit File Criterion dialog box opens. Figure 5-5 shows the Add File Criterion dialog box. Click...Registry Criteria window inside the Registry and File Criteria dialog box. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-11 File Criteria In the File Criteria area of the ...
... application is active: HKEY_LOCAL_MACHINE\SOFTWARE\\Status Case sensitive-Check to require the String value of a specific file as a criterion for assigning the location you are configuring for the remote client, or ...entry in the String value field to the subsequent attribute descriptions for pane. The Add or Edit File Criterion dialog box opens. Figure 5-5 shows the Add File Criterion dialog box. Click...Registry Criteria window inside the Registry and File Criteria dialog box. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-11 File Criteria In the File Criteria area of the ...
Configuration Guide
Page 50
...version of the file as follows: a. The Compute CRC32 Checksum dialog box opens (Figure 5-6). equal to calculate the checksum. 5-12 Cisco Secure Desktop Configuration Guide OL-8607-02 less than - greater than - different from the following security application is a particular version. Figure...beginning with the "Exists" radio button. (Optional) Version check box-Check if you are configuring. Use this criterion to require that a specific application is installed: C:\Program Files\\ You can specify a version, checksum, both, or neither in the Path field, or click Compute ...
...version of the file as follows: a. The Compute CRC32 Checksum dialog box opens (Figure 5-6). equal to calculate the checksum. 5-12 Cisco Secure Desktop Configuration Guide OL-8607-02 less than - greater than - different from the following security application is a particular version. Figure...beginning with the "Exists" radio button. (Optional) Version check box-Check if you are configuring. Use this criterion to require that a specific application is installed: C:\Program Files\\ You can specify a version, checksum, both, or neither in the Path field, or click Compute ...
Configuration Guide
Page 51
...The Group-Based Policy tab opens (Figure 5-7). OL-8607-02 Cisco Secure Desktop Configuration Guide 5-13 The Compute CRC32 Checksum dialog box closes and the hexadecimal value appears in the Add or Edit File Information dialog box. Click OK in the Checksum equals to...to the file you are configuring in the following sections to define the Secure Desktop experience for clients that match the criteria defined for a specific location: • Configuring a VPN Feature Policy for a Location • Configuring Keystroke Logger for a Location • Configuring Cache Cleaner ...
...The Group-Based Policy tab opens (Figure 5-7). OL-8607-02 Cisco Secure Desktop Configuration Guide 5-13 The Compute CRC32 Checksum dialog box closes and the hexadecimal value appears in the Add or Edit File Information dialog box. Click OK in the Checksum equals to...to the file you are configuring in the following sections to define the Secure Desktop experience for clients that match the criteria defined for a specific location: • Configuring a VPN Feature Policy for a Location • Configuring Keystroke Logger for a Location • Configuring Cache Cleaner ...
Configuration Guide
Page 60
... 5-11 shows the default settings. Its default value is successful. • Launch cleanup upon activation, including files generated before the client's CSD session began. 5-22 Cisco Secure Desktop Configuration Guide OL-8607-02 For example, you could place a cookie file on the user's computer, and later check for the presence of..., 30, or 60) to set the timeout period if you know that you checked the "Launch cleanup upon timeout based on inactivity-Check to set a specific timeout period after which the Cache Cleaner is the inactivity timer.
... 5-11 shows the default settings. Its default value is successful. • Launch cleanup upon activation, including files generated before the client's CSD session began. 5-22 Cisco Secure Desktop Configuration Guide OL-8607-02 For example, you could place a cookie file on the user's computer, and later check for the presence of..., 30, or 60) to set the timeout period if you know that you checked the "Launch cleanup upon timeout based on inactivity-Check to set a specific timeout period after which the Cache Cleaner is the inactivity timer.