Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Expand
titleRule Criteria (User) 

This topic explains how to create a new User Set. This option allows specific, authorized users or user groups to access a GuardPoint. 

  1. Next to User, click Select



  2. In the window that appears, to create a User Set, click Add
    • (Optional) You can also modify an existing User Set. To modify, mark the button that corresponds to the desired User Set, click Select User Set, and then manually type the user information or use the remote browse feature to populate a user list on a specified virtual machine.



  3. In Name, enter a descriptive name. 
    • (Optional) In Description, enter a brief description. 



  4. Click Browse Users
  5. In Host Name, select host to browse.
  6. In Domain, select the same host for your local virtual machine accounts. 
    • If possible, you can also choose the Domain or LDAP group. 



  7. (Optional) You can configure how to browse for Users, either by single MembersGroups, or Group Members
  8. Click Ok to populate the desired user list. 



  9. In the window that appears, enter the Admin credentials for the virtual machine that you want to remote browse, and then click Ok



  10. Mark the users you want to add to your User Set. 
  11. Click Ok



  12. Mark the desired User Set.
  13. Click Select User Set. The newly created User Set will populate the User field. 
  14. Next to Effect, click Select, mark the desired permissions, and then click Ok
  15. Mark the rule, and then click Up to move the new rule above the catch-all rule. 
  16. Click Apply to save your changes, and then click Ok to return to the list of policies. 
Expand
title3. Rule Criteria (Process) 

This topic explains how to create a Process Set. This option allows a path or paths and their executables to access a GuardPoint. 

  1. In the menu bar, click Policies, mark the link for the policy you want to add, and then click Add
  2. Next to Process, click Select



  3. In the Select Process Set window, click Add



  4. In Name, enter a descriptive name. 
  5. Click Add



  6. Click Select to choose a host. 
  7. Click Ok
  8. Mark the desired host. 
  9. Click Select



  10. Note that the Host field is now populated. Click Browse to find the directory path. 



  11. In the window that appears, select (highlight) the parent directory where the executable lives, and then click Ok.



  12. Note that the Directory field is now populated. In File, enter the executable name. 
  13. Click Ok



  14. Click Ok



  15. Mark your newly created Process Set. 
  16. Click Select Process Set



  17. In Effect, click Select, and then mark the desired permissions.
  18. Click Ok



  19. Mark the rule, and then click Up to move the new rule above the catch-all rule. 
  20. Click Apply to save and apply your Process Set and policy rule. 

Expand
title4. Rule Criteria (Time) 

This topic explains how to create a Time Set. This option allows or denies access to a guarded folder based on a configured day and time.

  1. Next to When, click Select



  2. Click Add to create a Time Set.
  3. In Name, enter a descriptive name for the Time Set. 
  4. Click Add to create time parameters. 



  5. Configure your desired time parameters. 
  6. Click Ok to populate the time parameters into the Time Set. 



  7. Mark the desired Time Set. 
  8. Click Select Time Set



  9. In Effect, click Select, and then mark the desired permissions.
  10. Click Ok to add this Time Set to the policy. 
  11. Mark the desired rule, and then click Up to move the rule above the catch-all rule. 
  12. Click Apply to save. 

Expand
title5. Rule Criteria (Action) 

This topic explains how to create an Action Set. This option allows you to limit the type of actions a user or process (with permitted access) can execute in a GuardPoint.   

  1. Next to Action, click Select



  2. Mark the actions you want to allow your users or processes to be able to execute in the GuardPoint. 
  3. Click Select Action



  4. Note that the Actions field is now populated. In Effect, click Select, and then mark the desired permissions.
  5. Click Ok



  6. Mark the desired rule, and then click Up to move the rule above the catch-all rule. 
  7. Click Apply to save. 

Expand
title6. Rule Criteria (Effect) 

The Effect field must be completed; this is the only mandatory field to complete in order to create a policy rule.

The Effect field will either permit or deny access, and additionally, determine if the rule should be audited or if the encryption key will be applied.

The following table shows the available options:

Type of EffectAction
PermitPermits access to the data.
Deny

Denies access to the data.

Apply KeyEncrypts the data written into the GuardPoint with the key specified in the Key Selection Rules tab.
Audit

Creates an entry in the Message Log that describes:

  • What data was accessed
  • When the data was access
  • The applied security rule

...