Home    SecuLution Dokumentation back next
Welcome
SecuLution technique and terminology
Quick start
Test setup in 30 minutes
Best practice in everyday use
Full setup and deployment in 5 hours
Installation of components
Install Appliance
AdminWizard installation
Agent installation
Syslog server installation
Initial configuration tasks
Configure basic settings
Agent configuration
Configure automated tasks
Manage whitelist
Initial whitelist generation
Import trustworthy software
Learn mode
Check deployment and learning progress
Audit
Add entries to whitelist
Drag'n'drop
Individual lernmode
Import from directory
PermanentLernUser
Log alarms
Cleanup whitelist
Manually delete unused entries
Delete entries using a pattern
Clean up classifications
Managed Whitelist
Managed Whitelist
Actions
Actions
Referring rules to objects
Offline mode
Offline mode
Devices
USB device management
USB device encryption
RCM
Agent deployment (RemoteClientManagement)
ArpWatch
ArpWatch
Logs
Logs
FAQ
setup.ini

Referring rules to objects

Each action applies to an object. The object can be a range of IP addresses or an object (of type group, computer (host) or user) from a directory service like Microsoft's Active Directory or LDAP.

Rules, applicable for every computer (where the Agent is installed):

In the example above, the IP address range "0.0.0.0/0" applies to all IP addresses and is an alias for "all" IPs, so this rule applies to everybody on any computer (where the Agent is installed).

Rules, applicable for only some objects:

In the example above, the program or device represented by the hash is only allowed for the user "administrator". Any other user will not be able to use it.

Rules, applicable for more than one object:

Clicking in the empty line will create a new rule so that different actions can be configured, or a list of objects, each having the same action, can be created.
In the example above, the program or device represented by the hash is allowed for the users "administrator" and "datev". Any other user will not be able to use it.

Rules, applicable for a group:

In the example above, the program or device represented by the hash is allowed for any user or computer which is member of the group "administrators". Any other user or computer will not be able to use it.

Rules, applicable for more than one object at a time:

In the example above, the hash represents a configuration option. Two different options have been configured, one for the computer (host) named "t-7" and one for every other computer ("0.0.0.0/0"). If more than one action is valid for the hash, the more specific rule takes precedence.
In this example, the Agent will not check devices on computer "t-7" and will check devices on any other computer.