Cisco Secure Desktop Configuration Guide for Cisco ASA 5500 Series Administrators, Release 3.1.1
Index
Downloads: This chapterpdf (PDF - 295.0KB) The complete bookPDF (PDF - 1.19MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - R - S - T - U - V - W - X - Z

Index

Numerics

3DES     A-5

A

ActiveX     A-5

Administrator privileges     A-2

Allow e-mail applications to work transparently, attribute     5-25

Anonymizer AntiSpyware     A-4

Anti-Spyware, attribute     5-16, 5-18

Anti-Virus, attribute     5-16, 5-18

application access See Port Forwarding

Automatically switch to Secure Desktop after installation, attribute     5-22

Avast AntiVirus     A-4

AVG AntiVirus     A-4

B

bit conversion     5-23

BlackICE PC Protection     A-4

bookmarks     5-26

browser

home page and favorites     5-26

restrict     5-24

C

Cache Cleaner

description     A-6

FAQs     A-5

Location Module, attribute     5-15, 5-18

Macintosh and Linux     7-1

Secure Desktop, when settings apply     A-1

Use Module, attribute     5-4

Windows     3-5, 5-21 to  5-22

certificate     5-4 to  5-6, 5-6 to  5-7

character encoding     A-2

Check for keystroke loggers, attribute     5-20

Checksum, attribute     5-12, 5-13

Cipher Block Chaining (CBC)     A-5

Cisco Security Agent     A-4

Clean the whole cache in addition to the current session cache, attribute     5-22

CN certificate field     5-5, 5-6, 5-7

command prompt, disable     5-25

configuration example See tutorial

configuration settings, transfer to another security appliance     3-5

Customize bookmarks, pane     5-26

Customize bookmarks, window     5-26

D

data.xml     3-5

Data Encryption Standard (DES)     A-5

delete See Secure Delete

deleting files     5-25

DES-CBC     A-5

desktop switching     5-22

digital certificates     5-5

Disable access to network drives and network folders, attribute     5-24

Disable access to removable drives and removable folders, attribute     5-24

Disable Cancel button when cleaning, attribute     5-21

Disable command prompt access     5-25

Disable printing, attribute     5-25

Disable registry modification, attribute     5-25

DoD delete See Secure Delete

Does not exist, criterion for a registry key or file     5-10

Do not encrypt files on network drives, attribute     5-24

Do not encrypt files on removable drives, attribute     5-24

drive access     5-24

Dword     5-9, 5-10

E

E certificate field     5-5, 5-6, 5-7

e-mail     5-25

Enable cancellation of cleaning, attribute     7-2

Enable identification using File or Registry criteria, attribute     5-8 to  5-13

Enable identification using IP criteria, attribute     5-7

Enable Secure Desktop inactivity timeout, attribute     5-23

Enable switching between Secure Desktop and local desktop, attribute     5-22

Enable Vault Reuse, attribute     5-23

Enable web browsing if Mac or Linux installation fails, attribute     7-2

encryption     5-23, 5-24, A-5

Entry Path, criterion for a file     5-11

Entry Path, criterion for a registry key     5-9

eTrust Antivirus     A-4

example CSD configuration     4-1 to  4-3

Exists, criterion for a file     5-12

Exists, criterion for a registry key or file     5-9

F

FAQs     A-1 to  A-6

fast user switching     A-1

favorites     5-26

File Access

Macintosh and Linux     7-2

Microsoft Windows CE     6-1

File access

VPN Feature Policy, Windows installation failure     5-3

VPN Feature Policy, Windows installation success     5-16

file criteria     5-4, 5-8

firewall     A-6

Firewall, attribute     5-16, 5-18

folders in favorites or bookmarks     5-26

Force admin control on list of safe modules, attribute     5-20

Force application uninstall upon Secure Desktop closing, attribute     5-23

frequently asked questions     A-1 to  A-6

F-Secure Antivirus     A-4

Full Tunneling     3-4

Full tunneling

VPN Feature Policy, Windows installation failure     5-3

VPN Feature Policy, Windows installation success     5-17

G

GUI menu, figure     3-4

H

Hidden URL, attribute     5-21

hives     5-9

HKEY_CLASSES_ROOT     5-9

HKEY_CURRENT_USER     5-9

HKEY_LOCAL_MACHINE     5-9, 5-10, 5-11

HKEY_USERS     5-9

home location, example configuration     4-2, 5-1

Home Page, attribute     5-26

host integrity See System Detection

I

ICF     A-4

inactivity timer     5-21, 5-23

insecure location, example configuration     4-2, 5-1

installing CSD     1-1 to  1-6

Internet Connection Firewall (ICF)     A-4

Internet Explorer settings on client     A-5

IP address range     5-4, 5-7

ISS BlackICE PC Protection     A-4

Issued By, attribute of Enable identification using certificate criteria     5-5, 5-6, 5-7

Issued To, attribute of Enable identification using certificate criteria     5-5, 5-6, 5-7

Issuer, field of a certificate     5-5, 5-6, 5-7

J

Japanese character encodings     A-2

Java     A-5

Java Virtual Machine     A-1

K

Keystroke Logger     3-5, 5-19 to  5-21

L

Launch cleanup upon closing of all browser instances, attribute     5-21

Launch cleanup upon exiting of browser, attribute     7-2

Launch cleanup upon global timeout attribute     7-2

Launch cleanup upon timeout based on inactivity, attribute     5-21

Launch hidden URL after installation, attribute     5-21

Launch hidden URL upon Secure Desktop closing, attribute     5-23

Let user reset timeout, attribute     7-2

Linux     7-1

List of Safe Modules, pane     5-20

local desktop, switch     5-22

location

adding, viewing, and deleting     5-2

criteria     5-3 to  5-13

definition     3-4, 5-1

example configuration     4-2 to  4-8

Location Module, attribute     5-4

Locations in priority order, window     5-2

Location to add, attribute     5-2

M

Mac & Linux Cache Cleaner, menu option     7-1

main.exe     A-6

McAfee Personal Firewall     A-4

McAfee VirusScan     A-4

menu, figure     3-4

Microsoft Anti-Spyware     A-4

Microsoft Virtual Machine     A-5

Microsoft Windows operating systems and service packs     A-4 to  A-5

N

navigation     3-2

network card     A-6

network drive access     5-24

Norton AntiVirus For Windows     A-4

Norton Personal Firewall     A-4

O

O certificate field     5-5, 5-6, 5-7

operating systems     5-16, 5-18

P

Panda AntiVirus     A-4

password     A-6

PC-cillin     A-4

personal firewall     A-6

Port Forwarding

definition     3-3

Macintosh and Linux     7-2

Port forwarding

Windows installation

failure     5-3

success     5-16

printing     5-25

privileges     A-2

R

registry

criteria     5-4, 5-8

disable modification     5-25

removable drive access     5-24

Restrict application usage to the web browser only, attribute     5-24

restricted mode     5-24

reusing CSD settings     3-5

S

safe modules     5-20

Secure Delete

Macintosh and Windows Cache Cleaner     7-2

Windows Cache Cleaner     5-22

Windows Secure Desktop     5-23

See also encryption

Secure Desktop

Browser     3-5, 5-26

Cache Cleaner, when settings apply     A-1

configuring     5-1

description     A-6

encryption type     A-5

FAQs     A-3, A-5

force uninstall     5-23

General     3-5, 5-22 to  5-23

inactivity timeout     5-23

local desktop switch     5-22

Location Module, attribute option     5-15, 5-18

Manager

establishing a session     3-2

menu, figure     3-4

multiple     A-3

open web page when closing     5-23

prompt to uninstall     5-23

Settings window     3-5, 5-24 to  5-25

Use Module, attribute     5-4

security settings     A-5

service packs     A-4 to  A-5

Shift_JIS     A-2

Show success message at the end of successful installation, attribute     5-21

SSL VPN Client     3-4, 5-3, 5-17, 5-23

String value, attribute of a registry key as a location criterion     5-10

Subject, field of a certificate     5-5, 5-6, 5-7

Suggest application uninstall upon Secure Desktop closing, attribute     5-23

Sygate Personal Firewall     A-4, A-6

Sygate Security Agent     A-6

System Detection

configuring     5-13 to  5-19

definition     3-1

FAQs     A-3

T

timeout     A-2

Linux     A-2

Macintosh     A-2

Timeout after, attribute     5-21, 5-23, 7-2

transparent e-mail     5-25

Triple DES     A-5

tutorial     4-1 to  4-3

U

URLs on home page and favorites     5-26

V

Vault     5-23, A-3, A-6

Version, attribute     5-12

VPN Feature Policy

Macintosh and Linux     7-1 to  7-2

Microsoft Windows CE     6-1

Windows     3-4, 5-13 to  5-19

W

Web Browsing

Macintosh and Linux     7-2

Microsoft Windows CE     6-1

Web browsing

Windows installation

failure     5-2

success     5-16

Windows CE, menu option     6-1

Windows Location Settings

examples     4-2

menu option     3-3, 5-1

Windows operating systems and service packs     A-4 to  A-5

work, example configuration     4-2, 5-1

X

xml     3-5

Z

ZoneAlarm Personal Firewall     A-4