Specifications

Trend Micro™ OfficeScan™ 10 Administrator’s Guide
viii
Client Self-protection ...............................................................................9-27
Reserved Disk Space ................................................................................9-28
Network Virus Log Consolidation ........................................................9-29
Virus/Malware Log Bandwidth Setting ................................................9-29
Automatic Proxy Configuration .............................................................9-29
Client Grouping ........................................................................................9-30
Client Connection with Servers ..................................................................9-30
Required Actions ......................................................................................9-35
Client-Server Connection Verification ..................................................9-37
Connection Verification Logs ................................................................9-38
Client Proxy Settings .....................................................................................9-39
Internal Proxy ...........................................................................................9-39
External Proxy ..........................................................................................9-40
Client Mover ..................................................................................................9-41
Touch Tool .....................................................................................................9-42
Client Information ........................................................................................9-43
Importing and Exporting Client Settings ..................................................9-44
Managing Inactive Clients ............................................................................9-45
Section 3: Providing Additional Protection
Chapter 10: Policy Server for Cisco NAC
About Policy Server for Cisco NAC ..........................................................10-2
Components and Terms ...............................................................................10-2
Cisco NAC Architecture ..............................................................................10-6
The Client Validation Sequence ..................................................................10-7
The Policy Server ..........................................................................................10-9
Policy Server Policies and Rules ...........................................................10-10
Rule Composition ...................................................................................10-10
Default Rules ...........................................................................................10-12
Policy Composition ................................................................................10-15