Configuring a Host Check Profile

System> Network > VPN> SSL VPN > Host Check/Binding

You can configure a host check profile in the Host Check/Binding page

In the Host Checking secion of the Host Check/Binding page,you can perform the following actions:

Options in the Host Checking secion of the Host Check/Binding dialog:

Option Description

Host Checking Rule

Basic

Name

Specifies the name of the host check profile.

OS version

Specifies whether to check the OS version on the client host. Click one of the following options:

  • No check: Do not check the OS version.

  • Must match: The OS version running on the client host must be the same as the version specified here. Select the OS version and service pack version from the drop-down lists respectively.

  • At least: The OS version running on the client host should not be lower than the version specified here. Select the OS version and service pack version from the drop-down lists respectively.

Patch X

Specifies the patch that must be installed on the client host. Type the patch name into the box. Up to 5 patches can be specified.

Lowest IE version

Specifies the lowest IE version in the Internet zone on the client host. The IE version running on the client host should not be lower than the version specified here.

Lowest IE security level

Specifies the lowest IE security level on the client host. The IE security level on the host should not be lower than the level specified here.

Advanced

Security center

Checks whether the security center is enabled on the client host.

Auto update

Checks whether the Windows auto update function is enabled.

Anti-Virus software

Installed:The client host must have the AV software installed.

Monitor:The client host must enable the real-time monitor of the AV software.

Virus signature DB update:The client host must enable the signature database online update function.

Anti-Spyware software

Installed:The client host must have the anti-spyware installed.

Monitor:The client host must enable the real-time monitor of the anti-spyware.

Signature DB update:The client host must enable the signature database online update function.

Firewall

Installed:The client host must have the personal firewall installed.

Monitor:The client host must enable the real-time monitor function of the personal firewall.

Registry key value

Key X: Checks whether the key value exists. Up to 5 key values can be configured. The check types are:

  • No check: Do not check the key value.
  • Exist: The client host must have the key value. Type the value into the box.
  • No exist: The client cannot have the key value. Type the value into the box.

File path name

File X: Checks whether the file exists. Up to 5 files can be configured. The check types are:

  • No check: Do not check the file.
  • Exist: The client host must have the file. Type the file name into the box.
  • No check: The client cannot have the file. Type the file name into the box.

Running process name

Process X: Checks whether the process is running. Up to 5 processes can be configured. The check types are:

  • No check: Do not check the process.
  • Exist: The client host must have the process running. Type the process name into the box.
  • No exist: The client cannot have the process running. Type the process name into the box.

Installed service name

Service X: Checks whether the service is installed. Up to 5 services can be configured. The check types are:

  • No check: Do not check the service.
  • Exist: The client host must have the service installed. Type the service name into the box.
  • No exist: The client host cannot have the service installed. Type the service name into the box.

Running service name

Service X: Checks whether the service is running. Up to 5 services can be configured. The check types are:

  • No check: Do not check the service.
  • Exist: The client host must have the service running. Type the service name into the box.
  • No exist: The client host cannot have the service running. Type the service name into the box.

Note:To make the configured host check profile take effect, you must bind the profiles to the host check rules. And then the host check function will work in the system. For more information about binding the host check profile, see Configuring SCVPN.