Specifying Customized Requirements Using Custom Rules (NSM Procedure)
If the predefined client-side policies and rules that come with the Infranet Controller do not meet your needs, you can create custom rules within a Host Checker policy to define requirements that your users’ computers must meet.
![]() | Note: You can only check for registry keys, third-party DLLs, NeTBIOS names, MAC addresses, and machine certificates on Windows computers. |
To create a client-side Host Checker policy:
- In the NSM navigation tree, select Device Manager > Devices.
- Click the Device Tree tab, and then double-click the Infranet Controller device for which you want to create a client-side Host Checker policy.
- Click the Configuration tab. In the configuration tree, select Authentication > Endpoint Security > Host Checker.
- Create a new policy or click an existing policy in the Policies area of the page.
- Click the tab that corresponds to the operating system for which you want to specify Host Checker options—Windows, Mac, Linux or Solaris. In the same policy, you can specify different Host Checker requirements for each operating system.
- Under Rule Settings, click Add. The Add Custom Rule page appears.
- Add or modify settings as shown in Table 51.
- Click one:
- OK—Saves the changes.
- Cancel—Cancels the modifications.
Table 51: Custom Rules Configuration Details
Rule | Usage | Your Action |
---|---|---|
Remote IMV Rule | Configures integrity measurement software that a client must run to verify a particular aspect of the client’s integrity, such as the client’s operating system, patch level, or virus protection. |
|
NHC Rule | (Windows only)—Specifies the location of a custom DLL. Host Checker calls the DLL to perform customized client-side checks. If the DLL returns a success value to Host Checker, then the Infranet Controller considers the rule met. |
|
Ports Rule | Controls the network connections that a client can generate during a session. This rule type ensures that certain ports are open or closed on the client machine before the user can access the Infranet Controller. |
|
Process Rule | Controls the software that a client may run during a session. This rule type ensures that certain processes are running or not running on the client machine before the user can access resources protected by the Infranet Controller. |
|
File Rule | Ensures that certain files are present or not present on the client machine before the user can access the Infranet Controller. You may also use file checks to evaluate the age and content (through MD5 checksums) of required files and allow or deny access accordingly. |
|
Registry Setting Rule | (Windows only)—Controls the corporate PC images, system configurations, and software settings that a client must have to access the Infranet Controller. This rule type ensures that certain registry keys are set on the client machine before the user can access the Infranet Controller. You may also use registry checks to evaluate the age of required files and allow or deny access accordingly. |
|
NetBIOS Rule | (Windows only, does not include Windows Mobile)—Checks the NetBIOS name of the client machine before the user can access the Infranet Controller. |
|
MAC Address Rule | (Windows only)—Checks the MAC addresses of the client machine before the user can access the Infranet Controller. |
|
Machine Certificate Rule | (Windows only)— Checks that the client machine is permitted access by validating the machine certificate stored on the client machine. |
|