Guide how to use Genian NAC 2017-09-23T23:50:50+00:00

Genian NAC – Administrator’s Guide

  1. Administrator's Guide
  2. Installing Genian NAC
    1. Installing Policy Server
    2. Installing Network Sensor
    3. Installing Agent
      1. Installing Windows Agent
      2. Installing macOS Agent
  3. Deploying Genian NAC
    1. Deploying Policy Server
    2. Deploying Network Sensor
    3. Deploying Agent
      1. Distributing Agent using GPO
      2. Distributing Agent using Captive Web Portal
      3. Distributing Agent Manually
  4. Monitoring Network Assets
    1. Monitoring Network Nodes
      1. Browsing Nodes
      2. Filtering Nodes
      3. Tagging Nodes
      4. Deleting Nodes
      5. Browsing Nodes based on Sensor or Group
      6. Creating Node Groups
      7. Detecting Node Platform
    2. Monitoring IP Address
      1. Browsing Sensor IP Status
      2. Browsing IP Status Using Matrix View
    3. Monitoring Switch
      1. Browsing Switches
      2. Browsing Switch Ports
      3. Searching Switch Port
      4. Changing Switch Port Description
      5. Shutdown Switch Port
    4. Monitoring Wireless LAN
      1. Browsing SSIDs
      2. Searching SSIDs
      3. Creating Wireless Groups
      4. Viewing Connected Stations
      5. Finding SSID Physical Location
      6. WLAN Status and Filters
      7. Detecting Internal SSID
      8. Browsing Wireless Stations
      9. Searching Wireless Stations
  5. Controlling Network Access
    1. Configuring Network Sensor
      1. Activating Enforcement mode on the Network Sensor
    2. Configuring DHCP Options
      1. Configuring DHCP Services
    3. Controlling Network Access Based on IPAM
      1. Preparing Access Control using IPAM
      2. Changing IPAM Policy
      3. Configuring IP Change Preventions
      4. Configuring IP Conflict Prevention
      5. Allowing IP/MAC Based On Time
    4. Controlling Network Access Based On Node Group
      1. Creating Enforcement Policy for Node Group
      2. Managing Enforcement Status
      3. Configuring Agent Action For Enforcement Policy
    5. Configuring Switch Port Block For Enforcement Policy
      1. Configuring SNMP Community String
  6. Configuring On-boarding Process
    1. Configuring Captive Web Portal
      1. Enabling Captive Web Portal
      2. Customizing Messages
      3. Managing Custom Buttons
      4. Customizing CWP Design
      5. Managing Notice
    2. Configuring Guest Management
      1. Configuring Guest Account
      2. Managing Guest Requests
  7. Configuring User Authentication
    1. Enabling User Authentication
      1. Configuring User Authentication by Captive Web Portal
      2. Configuring User Authentication by Agent
      3. Configuring User Authentication by 802.1x
      4. Configuring User Authentication by RADIUS Account
      5. Configuring User Authentication by AD Domain Login
    2. Managing User Directories
      1. Managing Users
      2. Managing User Groups
      3. Configuring Password Policy
    3. Synchronizing User Directory
      1. Synchronizing User Directories with RDBMS
      2. Synchronizing User Directories with LDAP
      3. Synchronizing User Directories with CSV
    4. Integrating External Server
      1. Configuring Active Directory
      2. Configuring RADIUS Server
      3. Configuring IMAP/POP3/SMTP Server
      4. Testing User Authentication
    5. Configuring User Authentication Options
      1. Configuring Authentication Scope
      2. Configuring Authentication Lifetime
      3. Configuring Device Ownership
      4. Configuring Find Username & Password
    6. Enabling RADIUS Authentication
      1. Enabling MAC Authentication
      2. Configuring Active Directory Integration
  8. Controlling Endpoints
    1. Understanding Agent Action
    2. Controlling Windows
      1. Collecting Computer OS Information
      2. Collecting Hardware Information
      3. Collecting Monitor Information
      4. Collecting Network Information
      5. Collecting Printer Information
      6. Collecting Software Information
      7. Collecting Windows System Information using WMI
      8. Collecting Instant Messaging Application Information
      9. Collecting Peer-to-peer Application Information
      10. Configuring Windows Settings
      11. Configuring Wireless Connection Manager
      12. Configuring 802.1x Wired Authentication
      13. Controlling Antivirus Software
      14. Controlling Internet Options
      15. Controlling Network Interface
      16. Controlling WLAN Interface
      17. Controlling DNS
      18. Control External Device
      19. Controlling ARP Spoofing
      20. Controlling Windows Update
      21. Controlling Power Options
      22. Controlling Network Folder Sharing
      23. Controlling External Device
      24. Controlling Screen Lock
      25. Changing Computer Name
      26. Uninstalling Programs
      27. Killing Processes
      28. Managing Files
      29. Notifying Users
      30. Running Scripts
    3. Controlling MacOS
      1. Collecting Computer OS Information
      2. Collecting Hardware Information
      3. Collecting Network Information
      4. Collecting Software Information
      5. Collecting Antivirus Software Information
      6. Controlling macOS Update
  9. Detecting Threats
    1. Understanding Threat Detection
    2. Creating Threat Definition
    3. Blocking Risk Nodes
  10. Managing Logs and Events
    1. Managing Logs
      1. Searching Logs
      2. Time Graph and Chart
      3. Real Time Monitoring
      4. Creating Log Filter
      5. Tagging Assets Using Event
    2. Sending Notifications
      1. Sending Notification Using Event
      2. Sending Notification Using SNMP
      3. Sending Notification Using Syslog
      4. Sending Notification Using Webhook
    3. Receiving Events
      1. Configuring Receive Syslog
      2. Configuring Receiving SNMP Traps
  11. Managing Systems
    1. Managing Dashboards
      1. Adding Dashboards
      2. Managing Widgets
      3. Monitoring Sensors using Google Maps
    2. Managing Administrator
      1. Connect Command Line Console
      2. Managing Administrators
      3. Managing Administrator Roles
      4. Changing Command Line Interface Password
    3. Configuring Network
      1. Connecting Command Line Interface
      2. Changing Interface IP Address
      3. Configuring DHCP on Eth0
    4. Configuring Default Settings
      1. Configuring Network Appliance
      2. Configuring Sensor Settings
    5. Managing Backup And Restore
      1. Configuring Backup
      2. Restoring From Existing Backup
    6. Managing System Software
      1. Updating Policy Server and Network Sensor
      2. Updating Agent

Administrator's Guide

To get you started with Genian NAC, you need to check a few things out first.

  • Your Policy Server is ready? (Cloud-based or On-prem)
  • Your Network Sensor is ready?
  • Reference Page

Once you have Policy Server and Network Sensor up and running, you can get smart visibilty and contextual access control to your network
Reference Page

Suggest Edit