Index
IN-10
Cisco Secure Desktop Configuration Guide
OL-8607-02
PC-cillin A-4
personal firewall A-6
Port Forwarding
definition
3-3
Macintosh and Linux 7-2
Port forwarding
Windows installation
failure
5-3
success 5-16
printing 5-26
privileges A-2
R
registry
criteria
5-4, 5-8
disable modification 5-26
removable drive access 5-25
Restrict application usage to the web browser only,
attribute
5-25
restricted mode 5-25
reusing CSD settings 3-5
S
safe modules 5-20
Secure Delete
Macintosh and Windows Cache Cleaner
7-2
Windows Cache Cleaner 5-23
Windows Secure Desktop 5-24
See also encryption
Secure Desktop
Browser
3-4, 5-27
Cache Cleaner, when settings apply A-1
configuring 5-1
description A-6
encryption type A-6
FAQs A-3, A-5
force uninstall 5-24
General 3-4, 5-23 to 5-24
inactivity timeout 5-24
local desktop switch 5-23
Location Module, attribute option 5-15, 5-18
Manager
establishing a session
3-2
menu, figure 3-3
multiple A-3
open web page when closing 5-24
prompt to uninstall 5-24
Settings window 3-4, 5-25 to 5-26
Use Module, attribute 5-4
security settings A-5
service packs A-5
Shift_JIS A-2
Show success message at the end of successful installation,
attribute
5-22
SSL VPN Client 3-4, 5-3, 5-17, 5-24
String value, attribute of a registry key as a location
criterion
5-10
Subject, field of a certificate 5-5, 5-6, 5-7
Suggest application uninstall upon Secure Desktop
closing, attribute
5-24
Sygate Personal Firewall A-5, A-6
Sygate Security Agent A-6
System Detection
configuring
5-13 to 5-19
definition 3-1
FAQs A-3
T
timeout A-2
Linux A-2
Macintosh A-2
Timeout after, attribute 5-22, 5-24, 7-2
transparent e-mail 5-26
Triple DES A-6
tutorial 4-1 to 4-3