VMware ACE Specifikace Strana 6

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 14
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 5
Copyright © 2007 VMware, Inc. All rights reserved. 6
Pocket ACE Guide
Creating the ACE Master Policy
BeforeyoubegindefiningthepolicyforyourACEMaster,considerthetargetuserswhowillusethePocket
ACEinstances.Somefactorsincludehowsecureorrestrictivetheenvironmentshouldbe,howremoteusers
willgetassistanceifthereisanissue,andwhetheranyrestrictionsshouldbeplacedon
accessingperipherals.
ThefollowingexampleshowsapolicythatcanbeusedbyanACEadministratorwhoisdeploying
Pocket ACEenableddevicestousersasasecureremoteaccesssolution.Inthiscase,theuserswillbeaccessing
theenterprisenetworkusinganunmanagedPersonalComputerfromtheirhomeor
otherremotelocation.
UsethefollowingrequirementstodefinetheACEpolicy:
ProvideanACEinstanceforsecureremoteaccesstoenterpriseresources.
Distributeasecureremoteaccesssolutionwithpreinstalledapplicationsensuringsoftwarecompliance.
RestrictaccesstocommunicationbetweentheenterprisenetworkandtheACEvirtualdesktop.
RestrictaccesstowhocaninitializethePocketACEinstance.
PreventthePocketACEinstancefrombeingcopiedormovedwhendeployed.
EnsurethePocketACEregularlychecksforpolicyupdates.
Creating the Pocket ACE Policy
Tostartthepolicyeditor,rightclicktheACEmasteryoucreatedandselectPolicies.
Access Control
To configure access control
1 SelectAccessControl.
2UnderActivationselectPassword.
3UnderAuthenticationselectUserspecificpassword.
Byconfiguringtheactivationpolicytouseeitherapasswordoractivationkey,youcanprotectthePocketACE
instancewhileitisintransittotheuser.Theactivationpasswordorkeyisknownonlyto
thePocketACE
administratorandenduser.SettinganauthenticationpolicyensuresthataPocketACEinstancewillprompt
theuserforanewauthenticationpasswordafterthePocketACEhasbeeninitialized.Thispasswordisalways
usedtopoweronthePocketACEinstance,andisknownonlyby
theenduser.Iftheuserforgetsthe
authenticationpassword,itcanberesetbyanadministratorfromtheACEmanagementserver.
Expiration
SetanexpirationtimeperiodifyouwantthePocketACEinstancetoexpireafteracertainperiodoftime.
Copy Protection
UnderCopyProtection,selectDonotallowmovingorcopyingtheinstancefiles.
ConfiguringthecopyprotectionpolicyforthePocketACEinstancesallowsyoutominimizetheriskoflostor
stolenmediadevices.ThispreventsaPocketACEinstancethathasbeenmovedorcopiedfromrunning.
Resource Signing
UnderResourceSigning,selectVerifytheintegrityofallfilesintheACEresourcedirectory.
ConfiguringresourcesigningensurestheconfigurationandACEresourcesfilesthataccompanythePocket
ACEinstancehavenotbeenmodifiedorchanged.Ifsomeoneattemptstomodifyortamperwiththe
configurationfiles,thePocketACE
becomesunusable.BydefaultallPocketACEfilesareencrypted.
Zobrazit stránku 5
1 2 3 4 5 6 7 8 9 10 11 12 13 14

Komentáře k této Příručce

Žádné komentáře