Contents
iv
Cisco Secure Desktop Configuration Guide
OL-8607-02
Work 4-3
Home 4-3
Insecure 4-4
Step Three: Configure Windows Location Modules 4-4
Work 4-4
Home 4-4
Insecure 4-5
Step Four: Configure Windows Location Features 4-6
Work 4-6
Home 4-6
Insecure 4-7
Step Five: Configure Windows CE Features 4-8
Step Six: Configure Macintosh and Linux Features 4-8
CHAPTER
5 Setting Up CSD for Microsoft Windows Clients 5-1
Creating Windows Locations 5-1
Defining Location Criteria 5-3
Location Module 5-4
Certificate Criteria 5-5
Using a Certificate File to Specify Certificate Criteria 5-5
Using a Signed File to Specify Certificate Criteria 5-6
Using the Certificates in Your Store to Specify Certificate Criteria 5-7
IP Criteria 5-7
Registry and File Criteria 5-8
Registry Criteria 5-9
File Criteria 5-11
Configuring the Secure Desktop for Clients that Match Location Criteria 5-13
Configuring a VPN Feature Policy for a Location 5-13
Configuring a Group-based Policy for a Location 5-13
Configuring Web Browsing, File Access, Port Forwarding, and Full Tunneling VPN Policies for a
Location
5-16
Configuring Keystroke Logger for a Location 5-19
Configuring Cache Cleaner for a Location 5-22
Configuring Secure Desktop General for a Location 5-23
Configuring Secure Desktop Settings for a Location 5-25
Configuring Secure Desktop Browser for a Location 5-27