Host Checker Not Installed Properly
Posted : admin On 18.12.2019You are here: Installing Host Checker Automatically or Manually Installing Host Checker Automatically or ManuallyTo automatically install Host Checker on client computers:. In the admin console, choose Authentication Endpoint Security Host Checker. Under Options, select Auto-upgrade Host Checker if you want the system to automatically download the Host Checker application to a client computer when the version of Host Checker on the system is newer than the version installed on the client.
To configure customized requirements using custom rules:. In the navigation tree, select Device Manager Devices.
Click the Device Tree tab, and then double-clickthe Secure Access device for which you want to configure customizedrequirements using custom rules. Click the Configuration tab and select Authentication Endpoint Security Host Checker. Thecorresponding workspace appears. Create a new policy or click an existing policy in thePolicies section of the page.
Click the tab that corresponds to the operating systemfor which you want to specify Host Checker options— Windows, Mac, Linux, Solaris, or Windows Mobile. In the same policy, you can specify differentHost Checker requirements for each operating system. Configure the configure customized requirements usingcustom rules using the settings described in. Click one:. OK—Saves the changes. Cancel—Cancels the modifications. Table 1: Configuring Host Checker Customized Requirements Using CustomRules Details OptionFunctionYour ActionSettings tabRemote IMV RulesIMV—Use this rule type to configure integrity measurementsoftware that a client must run to verify a particular aspect of theclient’s integrity, such as the client’s operating system,patch level, or virus protection.
Enter the rule name. Select the IMV. Click OK.NHC Rules(Windows only)—Use this rule type to specify thelocation of a custom DLL. Host Checker calls the DLL to perform customizedclient-side checks. If the DLL returns a success value to Host Checker,then the Secure Access device considers the rule met. Enter the rule name, vendor name, and the path to NHCDLL on client machines.
Host Checker Not Working
Select the Monitor this rule for change in result check box to continuously monitor the policy compliance of endpoints. Click OK.Ports RulesUse this rule type to control the network connectionsthat a client can generate during a session.
This rule type ensuresthat certain ports are open or closed on the client machine beforethe user can access the Secure Access device. Enter the rule name. Select the Required option to specify thatthese ports are open or closed. Enter a comma delimited port list (without spaces) ofports or port ranges, such as: 1234,9,1235.
Host Checker Not Installed Properly Open
Click Ok.Process RulesUse this rule type to control the software that a clientmay run during a session.