Configuration Guide
Page 4
... Features 4-8 Setting Up CSD for Microsoft Windows Clients 5-1 Creating Windows Locations 5-1 Defining Location Criteria 5-3 Location Module 5-4 Certificate Criteria 5-5 Using a Certificate File to Specify Certificate Criteria 5-5 Using a Signed File to Specify... Certificate Criteria 5-6 Using the Certificates in Your Store to Specify Certificate Criteria 5-7 IP Criteria 5-7 Registry and File Criteria 5-8 Registry Criteria 5-9 File Criteria 5-11 Configuring the Secure Desktop for... Desktop Browser for a Location 5-27 Cisco Secure Desktop Configuration Guide iv OL-8607-02
... Features 4-8 Setting Up CSD for Microsoft Windows Clients 5-1 Creating Windows Locations 5-1 Defining Location Criteria 5-3 Location Module 5-4 Certificate Criteria 5-5 Using a Certificate File to Specify Certificate Criteria 5-5 Using a Signed File to Specify... Certificate Criteria 5-6 Using the Certificates in Your Store to Specify Certificate Criteria 5-7 IP Criteria 5-7 Registry and File Criteria 5-8 Registry Criteria 5-9 File Criteria 5-11 Configuring the Secure Desktop for... Desktop Browser for a Location 5-27 Cisco Secure Desktop Configuration Guide iv OL-8607-02
Configuration Guide
Page 33
...Manager. Add a registry criteria such as, "HKEY_LOCAL_MACHINE\SOFTWARE\Company exists." OL-8607-02 Cisco Secure Desktop Configuration Guide 4-3 uncheck both Secure Desktop and Cache Cleaner next to "Use Module." Work Identify clients in the "Work" location by the administrator to users who connect from...Issued to and Issued By fields of the pane lets you enable or disable the Secure Desktop or Cache Cleaner modules for the location: certificate, IP address range, and file/registry. Clicking Apply Changes in that location. An Identification pane lets you enable the ...
...Manager. Add a registry criteria such as, "HKEY_LOCAL_MACHINE\SOFTWARE\Company exists." OL-8607-02 Cisco Secure Desktop Configuration Guide 4-3 uncheck both Secure Desktop and Cache Cleaner next to "Use Module." Work Identify clients in the "Work" location by the administrator to users who connect from...Issued to and Issued By fields of the pane lets you enable or disable the Secure Desktop or Cache Cleaner modules for the location: certificate, IP address range, and file/registry. Clicking Apply Changes in that location. An Identification pane lets you enable the ...
Configuration Guide
Page 42
...; This default location pushes the Secure Desktop to be present on the remote client as Windows 98, which users connect. Cisco Secure Desktop Configuration Guide 5-4 OL-8607-02 CSD considers the three location criteria in a logical "AND" relationship. For example...using File or Registry criteria," only one of these conditions to configure: • Location Module • Certificate Criteria • IP Criteria • Registry and File Criteria Location Module The Location Module attribute in the Identification for pane (Figure 5-2) permits one of the following matching criteria:...
...; This default location pushes the Secure Desktop to be present on the remote client as Windows 98, which users connect. Cisco Secure Desktop Configuration Guide 5-4 OL-8607-02 CSD considers the three location criteria in a logical "AND" relationship. For example...using File or Registry criteria," only one of these conditions to configure: • Location Module • Certificate Criteria • IP Criteria • Registry and File Criteria Location Module The Location Module attribute in the Identification for pane (Figure 5-2) permits one of the following matching criteria:...
Configuration Guide
Page 78
... cleaning, attribute 7-2 Enable identification using File or Registry criteria, attribute 5-8 to 5-13 Enable identification using IP criteria, attribute 5-7 Enable Secure Desktop inactivity timeout, attribute 5-24 Enable switching between Secure Desktop and local ... 5-16, 5-18 folders in favorites or bookmarks 5-27 Force admin control on list of safe modules, attribute 5-20 Force application uninstall upon Secure Desktop closing, attribute 5-24 frequently asked questions A-1 to...Page, attribute 5-27 host integrity See System Detection IN-8 Cisco Secure Desktop Configuration Guide OL-8607-02
... cleaning, attribute 7-2 Enable identification using File or Registry criteria, attribute 5-8 to 5-13 Enable identification using IP criteria, attribute 5-7 Enable Secure Desktop inactivity timeout, attribute 5-24 Enable switching between Secure Desktop and local ... 5-16, 5-18 folders in favorites or bookmarks 5-27 Force admin control on list of safe modules, attribute 5-20 Force application uninstall upon Secure Desktop closing, attribute 5-24 frequently asked questions A-1 to...Page, attribute 5-27 host integrity See System Detection IN-8 Cisco Secure Desktop Configuration Guide OL-8607-02
Configuration Guide
Page 79
... example configuration 4-2, 5-1 installing CSD 1-1 to 1-6 Internet Connection Firewall (ICF) A-4 Internet Explorer settings on client A-5 IP address range 5-4, 5-7 ISS BlackICE PC Protection A-4 Issued By, attribute of Enable identification using certificate criteria 5-5, 5-6, 5-7...closing, attribute 5-24 Let user reset timeout, attribute 7-2 Linux 7-1 List of Safe Modules, pane 5-20 OL-8607-02 local desktop, switch 5-23 location adding, viewing, and deleting 5-2 criteria 5-3... 5-5, 5-6, 5-7 operating systems 5-16, 5-18 P Panda AntiVirus A-4 password A-6 Cisco Secure Desktop Configuration Guide IN-9
... example configuration 4-2, 5-1 installing CSD 1-1 to 1-6 Internet Connection Firewall (ICF) A-4 Internet Explorer settings on client A-5 IP address range 5-4, 5-7 ISS BlackICE PC Protection A-4 Issued By, attribute of Enable identification using certificate criteria 5-5, 5-6, 5-7...closing, attribute 5-24 Let user reset timeout, attribute 7-2 Linux 7-1 List of Safe Modules, pane 5-20 OL-8607-02 local desktop, switch 5-23 location adding, viewing, and deleting 5-2 criteria 5-3... 5-5, 5-6, 5-7 operating systems 5-16, 5-18 P Panda AntiVirus A-4 password A-6 Cisco Secure Desktop Configuration Guide IN-9