Reference Guide
Security Management Server Virtual - AdminHelp v9.8
21
On every poll, the endpoint authenticates, checks for policy updates, and uploads inventory. A successful
authentication is required for the process to begin.
Poll Triggers
To poll, a user must be logged in. On the next user login, another poll will occur. The poll information
needed is only available per user, and when that user is logged in.
Other times a poll occurs are as follows:
• Immediately upon login, after keys are unlocked.
• When a network status update is signaled by the operating system (cable plugged in, wireless
network connected, VPN goes live).
• When the polling period elapses, as specified by policy.
Failed Poll Attempts
Policy Proxy poll attempts are based on a timer. When a poll attempt fails, the timer is reset. The length of
time set for the next attempt is based on when the attempt failed. If the device misses a poll when the
device is powered off, the timer will be triggered when the device is next powered on.
If the poll attempt failed while making the attempt, the time is set to one tenth the policy value for the
polling interval. For example - If the polling interval is 100 minutes, then the next interval after a failed
attempt will be 10 minutes. If it fails again, the next interval will still be 10 minutes. The interval will
remain 10 minutes until a successful poll, after which it will return to 100 minute intervals.
General Information
• Policy Proxy is generally installed on only a few machines.
• Creates inventory information for the Security Management Server Virtual.
• Passes on to the Security Management Server Virtual device inventory it receives when the
Encryption client successfully retrieves policies.
• Securely distributes security policies and encryption keys to devices via the network when
contacted.
• May be in your DMZ.
• Always belongs to a group. By default, all Policy Proxies belong to the same group.