Users Guide

200 | Posture Dell Networking W-ClearPass Policy Manager 6.3 |User Guide
l An environment that does not support 802.1X based authentication, such some legacy Microsoft Windows
operating systems, or legacy network devices.
l An environment configured with an operating system that provides native support for 802.1X natively, but does
not have a built-in health agent. The MAC OS X is an example of this type of environment.
If you select the Posture Agent: OnGuard Agent (Persistent or Dissolvable) on the Policy tab, you can configure the
following Posture Plugins:
Supported Operating System Versions
Posture
Plugin
Name
Description
Win
dow
s
200
3
Win
dow
s 8
Wind
ows
7
Windo
ws
Vista
Windows
XP Service
Pack 3
Window
s Server
2008
Window
s Server
2008R2
ClearPass
Windows
Universal
System
Health
Validator
The configurable parameter
categories for this validator are
Services, Processes, Registry
Keys, AntiVirus, AntiSpyware,
Firewall, Peer To Peer, Patch
Management, Windows
HotFixes, USB Devices, Virtual
Machines, Network
Connections, Disk Encryption,
and Installed Applications.
yes yes yes yes yes yes yes
Windows
System
Health
Validator
The configurable parameter
categories for this validator
allow you to configure which
client computers can connect to
your network, and which clients
are restricted from your
network. Access is determined
by a check of the service pack
level. You determine the
service pack level.
yes yes yes yes yes yes yes
Windows
Security
Health
Validator
The configurable parameter
categories for this validator
allow you to configure
parameters that permit or deny
client computers access to your
network, subject to checks of
the client's system for Firewall,
Virus Protection, Spyware
Protection, Automatic Updates,
and Security Updates*.
no yes yes yes yes no no
* If you configure the Posture Plugin for Windows XP, spyware protection is disabled.
Table 96:
OnGuard Agent Validator Supported Windows Operating Systems
ClearPass Mac OS X
The configurable parameter categories for this validator are Services, Processes, AntiVirus, AntiSpyware, Firewall,
Patch Management, Peer To Peer, USB Devices, Virtual Machines, Network Connections, Disk Encryption, and
Installed Applications.