User Guide

Administrator Release Notes
7
N
ETWORK
A
CCESS
C
ONTROL
E
NFORCEMENT
The OmniAccess 3500 NLG can force the laptop to communicate exclusively with the
enterprise network, preventing simultaneous access connections and direct access to
the public Internet.
A
SSISTED
F
ILE
T
RANSFER
As an underlying framework to many OmniAccess 3500 NLG applications, the Assisted
File Transfer (AFT) feature enables the automatic synchronization of two remote
folders, one located on the laptop and the other located on a file server in the
enterprise network. The file transfer continues even when the laptop is powered
down.
SMS
I
NTEGRATION
The OmniAccess 3500 NLG Release 1.2 transparently integrates with the Microsoft
Systems Management Server (MS-SMS) application to extend its reach, enabling the
execution of patch downloads at times when the laptop is not powered on.
P
ATCH
L
INK
U
PDATE
I
NTEGRATION
The OmniAccess 3500 NLG Release 1.2 enhances the patch download capabilities of
the PatchLink Update application (a Lumension Security product) by helping it reduce
the total time needed to distribute the software updates to the mobile devices. Copies
of a new software package are cached in the OmniAccess 3500 NLG cards of the target
laptop collection as soon as the package becomes available.
A
SSET
M
ANAGEMENT
The OmniAccess 3500 NLG includes a proprietary asset management application that
enables monitoring of laptop assets and status at any time the OmniAccess 3500 NLG
card is reachable and independently of the power state of the laptop.
R
EMOTE
L
OCK
The administrator can make a laptop unusable by issuing a remote lock command
through the management system. The IT administrator can also issue a remote unlock
command.
V
OLUME
E
NCRYPTION
The OmniAccess 3500 NLG interoperates with the TrueCrypt open software for
creation and management of an encrypted volume in the laptop hard disk. The laptop
automatically mounts the encrypted volume after the end user successfully logs in.
The administrator has exclusive control over the password stored in the card and can
remotely erase it if the laptop is reported lost or stolen.
F
ILE
T
RACKER
The file tracker application allows the administrator to obtain a list of the files stored
in the encrypted volume at any time. This capability can be used to enforce the
storage policies of the enterprise for sensitive data and to identify the contents that
are at risk in a lost/stolen laptop.