Configuring Advanced Endpoint Defense Policy (NSM Procedure)

Host Checker includes integrated antispyware functionality that can detect and remediate Windows endpoints with spyware and keyloggers. Advanced endpoint defense (AED) ensures that malware, spyware, viruses or worms are not present on endpoints that attempt to connect to the Infranet Controller, and you can restrict or quarantine these endpoints depending on your Host Checker policy configuration.

AED antispyware functionality is available on Windows platforms (including Vista) with Odyssey Access Client or with the agentless Host Checker component.

To enable and use AED antispyware:

  1. In the NSM navigation tree, select Device Manager > Devices.
  2. Click the Device Tree tab, and then double-click the Infranet Controller for which you want to configure an AED policy.
  3. Click the Configuration tab. In the configuration tree, select Authentication > Endpoint Security > Host Checker.
  4. Under Policies, click the Add button.
  5. Enter a policy name and select Advanced Endpoint Defense Policy.
  6. From the Policy Info tab, select Enable Signature definitions check.
  7. In the Check that Signature definitions are update in (days) box, enter the frequency in days of the signature definitions database update.
  8. Click one:
    • OK—Saves the changes.
    • Cancel—Cancels the modifications.

When you create or configure realm or role Host Checker restrictions, you can select the AED policy to apply to that role or realm.

Related Documentation