
ZENworks® ESM 3.5 Administrator’s Manual 244
IrDA® .................................................. 110
K
Key ...................................................... 117
Key Management ...................................... 60
Key Management Key ................................ 19
Key Type ............................................... 117
KMK ...................................................... 19
L
LLC ...................................................... 130
Location Change Event ............................ 143
Location Components .............................. 109
Location Icon ......................................... 107
Locations ............................................... 105
M
Machine-Based Policies .............................. 72
Managed Access Points ............................ 117
Management Console .......................... 11, 20
Management Console Access ...................... 24
Management Service .................. 11, 17, 237
Managing and Adding Directory Services ...... 30
Microsoft SQL Enterprise Manager ............ 234
Multiple User Support ................................ 72
N
NDIS ...................................................... 10
NetBIOS ................................................. 10
Network Address Macros List .................... 130
Network Environments ............................. 113
No Execution ......................................... 133
No Network Access ................................. 133
O
Open ..................................................... 126
Optional Server Configurations .................... 69
Override-Password Key Generator ................ 63
P
Periodic Renewal of the Key Management Key
(KMK)
.................................................... 19
Permissions Settings .................................. 24
Policy Audit Data ...................................... 29
Policy Data and Activity ............................. 29
Policy Distribution Service ................... 11, 14
Policy Tasks ............................................. 21
Preference AP Selection ........................... 122
Preferred Devices ...................................... 97
Process is Running .................................. 140
Prohibited Access Points ........................... 118
Publish Policy ........................................... 24
Publish To Settings .................................... 26
Q
Quarantine firewall .................................. 138
R
Reliable Time Stamp .................................. 12
Removable Storage .................................... 95
Reporting ................................................. 21
Resources ................................................ 21
Rule Scripting .......................................... 77
S
Safe Harbor .............................................. 99
Save Network Environment ....................... 107
Scheduling ............................................... 29
Securing Server Access ................ 15, 18, 68
Serial/Parallel ......................................... 110
Server Maintenance ..................... 14, 17, 67
Server Selection and Installation .... 14, 17, 67
Service Syncronization ............................... 32
Sharing Encrypted Files .............................. 59
Show Location in Client Menu ................... 108
Snap ..................................................... 130
Stateful ................................................. 126
stateful packet inspection ............................ 10
Storage Device Control ..................... 95, 112
Storage Encryption Solution ........................ 59
SYN Flood ............................................... 10
System Requirements ................................. 12
T
Task Bar .................................................. 20
TCP/UDP Ports ...................................... 125
The Switch-to Location ............................ 102
Transferring the Public Key to the Management Ser-
vice
........................................................ 69
U
Understanding Senforce Encryption Solution .. 59
Uninstall ............................. 14, 17, 67, 70
Uninstall Password .................................... 91
Unknown Location .................................. 105
Update Interval ....................................... 107
Updating the Encryption Keys ..................... 69
Upgrading the Software ................ 14, 17, 67
Upgrading the ZSC .................................... 71
USB Drive Scanner ................................... 65
Use Location Message ............................. 108
User Permissions ..................................... 107
Using the AdapterAware™ Feature ............ 111