Index
IN-8
Cisco Secure Desktop Configuration Guide
OL-8607-02
Disable command prompt access 5-26
Disable printing, attribute 5-26
Disable registry modification, attribute 5-26
DoD delete See Secure Delete
Does not exist, criterion for a registry key or file
5-10
Do not encrypt files on network drives, attribute 5-25
Do not encrypt files on removable drives, attribute 5-25
drive access 5-25
Dword 5-9, 5-10
E
E certificate field 5-5, 5-6, 5-7
e-mail 5-26
Enable cancellation of cleaning, attribute 7-2
Enable identification using File or Registry criteria,
attribute
5-8 to 5-13
Enable identification using IP criteria, attribute 5-7
Enable Secure Desktop inactivity timeout, attribute 5-24
Enable switching between Secure Desktop and local
desktop, attribute
5-23
Enable Vault Reuse, attribute 5-24
Enable web browsing if Mac or Linux installation fails,
attribute
7-2
encryption 5-24, 5-25, A-5, A-6
Entry Path, criterion for a file 5-11
Entry Path, criterion for a registry key 5-9
eTrust Antivirus A-4
example CSD configuration 4-1 to 4-3
Exists, criterion for a file 5-12
Exists, criterion for a registry key or file 5-9
F
FAQs A-1 to A-6
fast user switching A-1
favorites 5-27
File Access
Macintosh and Linux
7-2
Microsoft Windows CE 6-1
File access
VPN Feature Policy, Windows installation failure
5-3
VPN Feature Policy, Windows installation success 5-16
file criteria 5-4, 5-8
firewall A-6
Firewall, attribute 5-16, 5-18
folders in favorites or bookmarks 5-27
Force admin control on list of safe modules, attribute 5-20
Force application uninstall upon Secure Desktop closing,
attribute
5-24
frequently asked questions A-1 to A-6
F-Secure Antivirus A-4
Full Tunneling 3-4
Full tunneling
VPN Feature Policy, Windows installation failure
5-3
VPN Feature Policy, Windows installation success 5-17
G
GUI menu, figure 3-3
H
Hidden URL, attribute 5-22
hives 5-9
HKEY_CLASSES_ROOT 5-9
HKEY_CURRENT_USER 5-9
HKEY_LOCAL_MACHINE 5-9, 5-10, 5-11
HKEY_USERS 5-9
home location, example configuration 4-2, 5-1
Home Page, attribute 5-27
host integrity See System Detection