12 ZENworks Endpoint Security Client 3.5 User Guidenovdocx (en) 13 May 2009 At what level the user is permitted to use removable storage devices (such as thumb drives andmemory cards) and to use CD/DVD-RW drives Any network environments that can help to define the locationFirewall Settings: Firewall settings control the connectivity of all networking ports (1-65535),network packets (ICMP, ARP, etc.), network addresses (IP or MAC), and which networkapplications (file sharing, instant messenger software, etc.) are permitted to get a networkconnection when the setting is applied. Three firewall settings are included as defaults for ESM, andcan be implemented at a location. The ESM Administrator can also create specific firewall settings,which cannot be listed here. All Adaptive: This firewall setting sets all networking ports as stateful (all unsolicited inboundnetwork traffic is blocked; all outbound network traffic is allowed). ARP and 802.1x packetsare permitted, and all network applications are permitted a network connection. All Open: This firewall setting sets all networking ports as open (all network traffic isallowed). All packet types are permitted. All network applications are permitted a networkconnection. All Closed: This firewall setting closes all networking ports, and restricts all packet types.Adapters: Refers to three communication adapters normally found on an endpoint: Wired Adapters (LAN connections) Wi-Fi Adapters (PCMCIA Wi-Fi cards, and built-in Wi-Fi radios) Dial-up Adapters (both internal and external modems)Also refers to other communication hardware that might be included on a computer, such asinfrared, Bluetooth*, FireWire*, and serial and parallel ports.Storage Devices: Refers to external storage devices that can pose a security threat when data iscopied to, or introduced from, these devices on an endpoint. USB thumb drives, flash memory cards,and SCSI PCMCIA memory cards, along with traditional Zip*, floppy, and external CDR drives andthe installed CD/DVD drives (including CD-ROM, CD-R/RW, DVD, DVD R/RW), can all beblocked, permitted, or rendered to Read-Only at a single location.Network Environments: A network environment is the collection of network services and serviceaddresses required to identify a network location (see Section 3.2.1, “Saving a NetworkEnvironment,” on page 16).2.2 Logging In to the Endpoint Security Client 3.5If you are a member of the corporate domain, the Endpoint Security Client 3.5 uses your Windows*username and password to log you in to the Policy Distribution Service (no pop-up windowdisplays). If you are not a member of the domain that the Policy Distribution Service is hosted on,the Endpoint Security Client 3.5 prompts you for your username and password for that domain (seeFigure 2-2).