Configuring real-time monitoring, Enabling real-time monitoring – H3C Technologies H3C Intelligent Management Center User Manual

Page 120

Advertising
background image

104

{

Kick out—The user is informed of security problems after going online. The authentication fails

and the user is logged off. Security check results are recorded in security logs.

6.

Click OK.

Performing security check by using security policies

Configuring real-time monitoring

With the real-time monitoring function, the iNode client interacts with the EAD server to perform a

periodic security check for online users. To ensure network security, the iNode client immediately

processes any violation or abnormality detected on the user endpoint.
The following check items support real-time monitoring. Operators must select the check items in the

security policy in order to have them monitored in real time. The check items include:

Anti-virus software

Anti-spyware software

Firewall software

Anti-phishing software

Hard disk encryption software

PC software control groups

Registries

Share directories

The following check items do not support real-time monitoring:

Windows patches

Asset registration status

Windows system restore

Traffic monitoring

Operating system password

With the exception of Windows patches, these items are checked at a system-defined interval that cannot

be modified. To ensure the efficiency of EAD security checking, operators can define the interval at which

Windows patches are checked in the service parameter configuration.

Enabling real-time monitoring

1.

Click the User tab.

2.

From the navigation tree, select User Security Policy > Security Policy.
The security policy list displays all security policies.

3.

Click the Modify icon

for the security policy to enable real-time monitoring.

The Modify Security Policy page appears.

4.

Configure the following parameters in the Basic Information area:

{

Monitor in Real Time—Select this option to enable real-time monitoring of user endpoints in the
security policy.

{

Process After—Specify the amount of time, in minutes, that the iNode client waits before it
isolates or kicks out an access user for whom a violation is detected in real-time monitoring. The

Advertising