Cisco Secure Desktop Configuration Guide for Cisco ASA 5500 Series Administrators, Release 3.2.1
Index
Downloads: This chapterpdf (PDF - 410.0KB) The complete bookPDF (PDF - 2.22MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - H - I - J - K - L - M - N - O - P - R - S - T - U - W - X -

Index

Numerics

3DES B-3

A

ActiveX B-3

Advanced Endpoint Assessment 1-3

Allow e-mail applications to work transparently, attribute 3-22

B

Basic Host Scan 1-2, 3-26

bookmarks 3-23

browser

home page and favorites 3-23

restrict 3-20

C

Cache Cleaner

description B-3

instructions3-15to 3-17

Secure Session, when settings apply B-4

Use Module, attribute 3-12

Windows 3-15

character encoding B-4

Check for keystroke loggers, attribute 3-14, A-13

Checksum, attribute 3-7

Cipher Block Chaining (CBC) B-3

Clean the whole cache in addition to the current session cache, attribute 3-17

command prompt, disable 3-22

configuration settings, transfer to another security appliance 1-9

Customize bookmarks, pane 3-23

Customize bookmarks, window 3-23

D

data.xml 1-9

Data Encryption Standard (DES) B-3

Default prelogin policy 1-8

delete See Secure Delete

deleting files 3-22

DES-CBC B-3

desktop switching 3-18

Disable access to network drives and network folders, attribute 3-21

Disable access to removable drives and removable folders, attribute 3-22

Disable command prompt access 3-22

Disable printing, attribute 3-22

Disable registry modification, attribute 3-22

DoD delete See Secure Delete

Does not exist, criterion for a registry key or file 3-5

Do not encrypt files on network drives, attribute 3-21

Do not encrypt files on removable drives, attribute 3-22

drive access 3-21, 3-22

Dword 3-4, 3-5

E

e-mail 3-22

Enable Secure Desktop inactivity timeout, attribute 3-19

Enable switching between Secure Desktop and local desktop, attribute 3-18

Enable Vault Reuse, attribute 3-18

encryption 3-19, 3-21, 3-22, B-3

Endpoint Assessment 1-3

Exists, criterion for a file 3-7

Exists, criterion for a registry key or file 3-5

F

FAQsB-1to B-4

fast user switching B-4

favorites 3-23

file criteria 3-2

firewall B-4

folders in favorites or bookmarks 3-23

Force admin control on list of safe modules, attribute 3-14, A-13

Force application uninstall upon Secure Desktop closing, attribute 3-19

frequently asked questionsB-1to B-4

H

Hidden URL, attribute 3-16

hives 3-4, 3-27

HKEY_CLASSES_ROOT 3-4, 3-27

HKEY_CURRENT_USER 3-4, 3-27

HKEY_LOCAL_MACHINE 3-4, 3-5, 3-6, 3-27

HKEY_USERS 3-4, 3-27

Home Page, attribute 3-23

home prelogin policy, example configuration 1-4, A-1

Host Scan 1-8

I

inactivity timer 3-19

installing Cisco Secure Desktop2-1to 2-3

Internet Explorer settings on remote access device B-3

IP address 3-11

J

Japanese character encodings B-4

Java B-3

Java Virtual Machine B-4

K

Keystroke Logger1-8, 3-13to3-15, A-11to A-13

L

Launch cleanup upon closing of all browser instances, attribute 3-17

Launch cleanup upon timeout based on inactivity, attribute 3-16

Launch hidden URL after installation, attribute 3-16

List of Safe Modules, pane 3-14

local desktop, switch 3-18

M

main.exe B-4

Microsoft Virtual Machine B-3

N

navigation 1-7

network card B-4

network drive access 3-21

O

Open following web page after Secure Desktop closes, attribute 3-19

P

password, Secure Session B-3

personal firewall B-4

prelogin policy

criteria 3-13

example configuration A-1

Prelogin Policy, menu option 1-7

printing 3-22

public prelogin policy, example configuration 1-4, A-2

R

registry

criteria 3-2

disable modification 3-22

removable drive access 3-22

Restrict application usage to the web browser only, attribute 3-20

restricted mode 3-20

reusing CSD settings 1-9

S

safe modules 3-14, A-13

secure, example configuration 1-4, 3-11, A-1

Secure Delete

Cache Cleaner 3-17

Secure Session 3-19

Secure Desktop

Browser 1-8, 3-23

configuring 3-1

encryption type B-3

force uninstall 3-19

General1-8, 3-17to 3-19

inactivity timeout 3-19

local desktop switch 3-18

Manager

establishing a session 1-6

multiple B-3

open web page when closing 3-19

prompt to uninstall 3-19

Settings window1-8, 3-20to 3-22

Use Module, attribute 3-12

Secure Session

Cache Cleaner, when settings apply B-4

description B-3

Suggest application uninstall, attribute 3-19

Vault Reuse, attribute 3-18

security settings B-3

Shift_JIS B-4

Show success message at the end of successful installation, attribute 3-16

String value, attribute of a registry key as an endpoint criterion 3-5

Suggest application uninstall upon Secure Desktop closing, attribute 3-19

T

Timeout after, attribute 3-17, 3-19

transparent e-mail 3-22

Triple DES B-3

U

URLs on home page and favorites 3-23

W

whitelist See Restrict application usage to the web browser only

X

xml 1-9