Reporting unknown device attached to the LAN ?
Hi how to perform reporting capability so that the security administrator is alerted by email when there is unknown device is plugged in to the network in that day ?
HI, Notification – Show
Show verbose Host Integrity Logging – If you check the box for show verbose Host Integrity Logging it displays the detailed information about the Host Integrity requirement in the Security Log. Once you highlight that the requirement on the Lower right hand pane of the security logs shows the detailed information which includes the conditions that the requirement checks for, such as a particular registry key. You can still view the information in the Compliance log on the Monitors page in the management server. If you uncheck this option the results of the Host Integrity check still appear in the lower left-hand pane. By default this option is Enabled/ Checked.
Display a notification message when a Host Integrity check fails- You can choose to display a notification message for the users to know that the client computer did not pass the Host Integrity check.
Display a notification message when a Host Integrity check passes after previously failing- If the Host Integrity check fails and users are send to remediate, the users will not know that the Host Integrity check ran again and it passed this time. So you can display a notification message that informs the users if the check passes after a failure.
User must log on before applications and Host Integrity notifications appear- This option is Checked/Enabled by default. Host Integrity remediation runs even if the user is not logged on. The client can remediate the client computer with operating system updates or necessary security software at any time. You can work around this issue when you write a custom requirement that uses the Run a program function. You can use this function to launch a program that uses the logged-in user context.
What all can you do with Symantec Network Access Control?
Creating and testing a Host Integrity Policy
Creating and testing a Host Integrity policy
Working with Custom HOST INTEGRITY (HI) Policy using the “CUSTOM REQUIREMENT LOGIC”