User Guide

ICS Dissolvable Agent for SafeGuard Administration Guide
26
Chapter 4: Administering Security Scanner Policies
Firewall Application — Use firewall application rules to require a certain firewall
application. See Firewall Application Rules on page 26.
Anti-Virus Application — Use anti-virus application rules to require a supported
anti-virus application. If you want to require an anti-virus application that is not
supported, use the custom application rule. See Anti-virus Application Rules on
page 27.
Anti-Spyware Scan — Use anti-spyware scan rules to prohibit certain spyware
types. See Anti-Spyware Scan Rules on page 29.
Custom Application — Use custom application rules to prohibit or require any
application. See Custom Application Rules on page 30.
Custom Group — Use Custom Group rules to bundle custom application
enforcement rules into one rule. When you put enforcement rules in a group, the
end point computer must meet at least one of the conditions in order to be in
compliance. See Custom Group Rules on page 31.
Firewall Application Rules
Firewall application rules determine which firewall applications end point computers
must have when they are logged onto your network. You can use this feature to require
that end point users obtain the latest version of an Integrity client when they connect to
your gateway.
Creating a Firewall Application Rule
The steps below give an overview of creating a firewall application rule. For detailed
information about individual user interface elements, and how to complete the page, see
the online help.
To Create a Firewall Application Rule:
1 Log into the ICS Administrator Console and click Enforcement Rules.
2 On the Enforcement Rules page click New Rule and choose Firewall Application.
3 Select the firewalls you want to require.
This sets the conditions for the rule. If end point computers violate these
conditions they are considered to be out of compliance.
4 Select the action you want ICS to take if the end point user is not in compliance
with this rule.
5 Use the remediation area to specify any information or resources you want to
provide to end point users to help them to become compliant with this rule.