Index
IN-9
Cisco Secure Desktop Configuration Guide
OL-8607-02
I
ICF A-4
inactivity timer 5-22, 5-24
insecure location, example configuration 4-2, 5-1
installing CSD 1-1 to 1-6
Internet Connection Firewall (ICF) A-4
Internet Explorer settings on client A-5
IP address range 5-4, 5-7
ISS BlackICE PC Protection A-4
Issued By, attribute of Enable identification using
certificate criteria
5-5, 5-6, 5-7
Issued To, attribute of Enable identification using
certificate criteria
5-5, 5-6, 5-7
Issuer, field of a certificate 5-5, 5-6, 5-7
J
Japanese character encodings A-2
Java A-5
Java Virtual Machine A-1
K
Keystroke Logger 3-4, 5-19 to 5-21
L
Launch cleanup upon closing of all browser instances,
attribute
5-22
Launch cleanup upon exiting of browser, attribute 7-2
Launch cleanup upon global timeout attribute 7-2
Launch cleanup upon timeout based on inactivity,
attribute
5-22
Launch hidden URL after installation, attribute 5-22
Launch hidden URL upon Secure Desktop closing,
attribute
5-24
Let user reset timeout, attribute 7-2
Linux 7-1
List of Safe Modules, pane 5-20
local desktop, switch 5-23
location
adding, viewing, and deleting
5-2
criteria 5-3 to 5-13
definition 3-3, 5-1
example configuration 4-2 to 4-8
Location Module, attribute 5-4
Locations in priority order, window 5-2
Location to add, attribute 5-2
M
Mac & Linux Cache Cleaner, menu option 7-1
main.exe A-6
McAfee Personal Firewall A-4
McAfee VirusScan A-4
menu, figure 3-3
Microsoft Anti-Spyware A-4
Microsoft Virtual Machine A-5
Microsoft Windows operating systems and service
packs
A-5
N
navigation 3-2
network card A-6
network drive access 5-25
Norton AntiVirus For Windows A-4
Norton Personal Firewall A-5
O
O certificate field 5-5, 5-6, 5-7
operating systems 5-16, 5-18
P
Panda AntiVirus A-4
password A-6