Users Guide

320 | Posture Dell Networking W-ClearPass Policy Manager 6.6 | User Guide
Parameter Action/Description
Allow Network Connections
Type
1. Select one of the following options:
n Allow Only One Network Connection
n Allow One Network Connection with VPN
n Allow Multiple Network Connections
Network Connection Types 2. To add or remove Others, Wired, and Wireless network connection types,
click >> or <<.
Remediation Action for
Network Connection Types Not
Allowed
3. Specify one of the following
n No Action: Take no action. Do not eject or disable the attached devices.
n Disable Network Connections
n Disconnect Network Connections
4. Click Save.
Table 162: Network Connection Type Configuration Parameters
This returns you to the Network Connections configuration page. The following table describes the
remaining fields on this page.:
Parameter Action/Description
Auto Remediation 1. Enable to allow auto-remediation for network connections.
User Notification 2. Enable to allow user notifications in the event of network connection policy
violations.
Remediation Action for
Bridge Network
Connection
3. If Allow Bridge Network Connection is disabled, then specify whether to take no
action when a bridge network connection exists or to disable all bridge network
connections.
Remediation Action for
Internet Connection
Sharing
4. If Allow Internet Connection Sharing is disabled, then specify whether to take
no action when Internet connection sharing exists or to disable Internet connection
sharing.
Remediation Action for
Adhoc/Hosted Wireless
Networks
5. If Allow Adhoc/Hosted Wireless Networks is disabled, then specify whether to
take no action when an adhoc wireless networks exist or to disable all
adhoc/hosted wireless networks.
Table 163: Network Connections Configuration Parameters
Disk Encryption
Disk encryption is a technology which protects information by converting it into unreadable code that cannot
be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to
encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to
data storage.
The following figure displays the Disk Encryption health class configuration page: