Configuration Guide
Page 2
... CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise,... the word partner does not imply a partnership relationship between Cisco and any other countries. Cisco Secure Desktop Configuration Guide © 2006 Cisco Systems, Inc. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO...
... CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise,... the word partner does not imply a partnership relationship between Cisco and any other countries. Cisco Secure Desktop Configuration Guide © 2006 Cisco Systems, Inc. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO...
Configuration Guide
Page 13
... includes brief product overviews, key features, sample part numbers, and abbreviated technical specifications for your business operations. You and Cisco will benefit from various online and printed sources. • The Cisco Online Subscription Center is updated twice a year and includes the latest Cisco channel product offerings. Severity 4 (S4)-You require information or assistance with...
... includes brief product overviews, key features, sample part numbers, and abbreviated technical specifications for your business operations. You and Cisco will benefit from various online and printed sources. • The Cisco Online Subscription Center is updated twice a year and includes the latest Cisco channel product offerings. Severity 4 (S4)-You require information or assistance with...
Configuration Guide
Page 28
...You can configure a location type to as the paging file. Internet Explorer 5.2 or later, or Safari 1.0 or later, on a location-specific basis. It is transparent, requiring only a browser for keystroke logging applications on the client PC. web browsing, remote server file access, ...remote user establishes a CSD session. This option also lets you specify the folders and bookmarks (or "favorites") to provide full access rights - Cisco Secure Desktop Configuration Guide 3-4 OL-8607-02 and Mozilla 1.1 or later on the disk by the operating system in the browser, including cached ...
...You can configure a location type to as the paging file. Internet Explorer 5.2 or later, or Safari 1.0 or later, on a location-specific basis. It is transparent, requiring only a browser for keystroke logging applications on the client PC. web browsing, remote server file access, ...remote user establishes a CSD session. This option also lets you specify the folders and bookmarks (or "favorites") to provide full access rights - Cisco Secure Desktop Configuration Guide 3-4 OL-8607-02 and Mozilla 1.1 or later on the disk by the operating system in the browser, including cached ...
Configuration Guide
Page 39
...considered more at risk to viruses due to their home PCs. Examine the Windows Location attribute descriptions to your network. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-1 For these clients, you determine how clients connect to plan a configuration that do not match other locations...settings (also called adaptive policies) for clients that meets the security requirements of antivirus software and specific, supported operating systems to grant full access to prevent access by IP addresses on the 10.x.x.x network, and disable both the Cache Cleaner and the Secure Desktop ...
...considered more at risk to viruses due to their home PCs. Examine the Windows Location attribute descriptions to your network. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-1 For these clients, you determine how clients connect to plan a configuration that do not match other locations...settings (also called adaptive policies) for clients that meets the security requirements of antivirus software and specific, supported operating systems to grant full access to prevent access by IP addresses on the 10.x.x.x network, and disable both the Cache Cleaner and the Secure Desktop ...
Configuration Guide
Page 47
...the initial directory path of a registry key. Note Refer to match those specified for this location. The Add or Edit Registry Criterion dialog box opens. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-9 Figure 5-4 shows the Add Registry Criterion dialog box. For example, you can use the ...Criteria area of the Registry and File Criteria dialog box (Figure 5-3), click Add if you want to confirm the presence or absence of a specific registry key as a criterion, or choose a criterion to qualify them for the location you are configuring. Step 2 Click one or more ...
...the initial directory path of a registry key. Note Refer to match those specified for this location. The Add or Edit Registry Criterion dialog box opens. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-9 Figure 5-4 shows the Add Registry Criterion dialog box. For example, you can use the ...Criteria area of the Registry and File Criteria dialog box (Figure 5-3), click Add if you want to confirm the presence or absence of a specific registry key as a criterion, or choose a criterion to qualify them for the location you are configuring. Step 2 Click one or more ...
Configuration Guide
Page 49
...specify a file criterion, or click OK to return to the Identification for pane. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-11 The dialog box closes and the new criterion appears as a criterion ...Entry Path-Enter the directory path of the registry key on or absent from the File Criteria area and click Edit. Figure 5-5 Add File Criterion Configure a file criterion as follows: Step 1 Assign a value to the ...value field-Enter a string to compare with the String value of a specific file as an entry in the String value field to satisfy the criterion.
...specify a file criterion, or click OK to return to the Identification for pane. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-11 The dialog box closes and the new criterion appears as a criterion ...Entry Path-Enter the directory path of the registry key on or absent from the File Criteria area and click Edit. Figure 5-5 Add File Criterion Configure a file criterion as follows: Step 1 Assign a value to the ...value field-Enter a string to compare with the String value of a specific file as an entry in the String value field to satisfy the criterion.
Configuration Guide
Page 50
...: • Exists-Click if the file must be entered to the right: - Click Browse and choose the file on which to require that a specific application is installed: C:\Program Files\\ You can specify a version, checksum, both, or neither in conjunction with 0x, to authenticate the file named in... to assign the location you want to specify the version of the file as follows: a. Use this criterion to calculate the checksum. 5-12 Cisco Secure Desktop Configuration Guide OL-8607-02 greater than - The Compute CRC32 Checksum dialog box opens (Figure 5-6). Note To display the version of ...
...: • Exists-Click if the file must be entered to the right: - Click Browse and choose the file on which to require that a specific application is installed: C:\Program Files\\ You can specify a version, checksum, both, or neither in conjunction with 0x, to authenticate the file named in... to assign the location you want to specify the version of the file as follows: a. Use this criterion to calculate the checksum. 5-12 Cisco Secure Desktop Configuration Guide OL-8607-02 greater than - The Compute CRC32 Checksum dialog box opens (Figure 5-6). Note To display the version of ...
Configuration Guide
Page 51
...VPN Feature Policy under the name of the location you chose. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-13 b. Use the instructions in the following sections to ... Configure a group-based VPN feature-based policy as an entry in the Add or Edit File Information dialog box. c. The field at the top of the Compute CRC32 Checksum...Up CSD for Microsoft Windows Clients Configuring the Secure Desktop for Clients that match the criteria defined for a specific location: • Configuring a VPN Feature Policy for a Location • Configuring Keystroke Logger for a...
...VPN Feature Policy under the name of the location you chose. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-13 b. Use the instructions in the following sections to ... Configure a group-based VPN feature-based policy as an entry in the Add or Edit File Information dialog box. c. The field at the top of the Compute CRC32 Checksum...Up CSD for Microsoft Windows Clients Configuring the Secure Desktop for Clients that match the criteria defined for a specific location: • Configuring a VPN Feature Policy for a Location • Configuring Keystroke Logger for a...
Configuration Guide
Page 60
... security policy: • Launch hidden URL after -Choose the number of minutes (1, 2, 5, 10, 15, 30, or 60) to set a specific timeout period after which the cleanup begins. • Timeout after installation-Check to remove data from the remote client, so that you configure the Cache...URL for administrative purposes, hidden from the Internet Explorer cache upon activation, including files generated before the client's CSD session began. 5-22 Cisco Secure Desktop Configuration Guide OL-8607-02 Figure 5-11 Cache Cleaner for Windows This window lets you know that the user has the ...
... security policy: • Launch hidden URL after -Choose the number of minutes (1, 2, 5, 10, 15, 30, or 60) to set a specific timeout period after which the cleanup begins. • Timeout after installation-Check to remove data from the remote client, so that you configure the Cache...URL for administrative purposes, hidden from the Internet Explorer cache upon activation, including files generated before the client's CSD session began. 5-22 Cisco Secure Desktop Configuration Guide OL-8607-02 Figure 5-11 Cache Cleaner for Windows This window lets you know that the user has the ...