Administrator’s Guide 2018-04-09T16:13:20+00:00

Administrator’s Guide

Genian NAC

  1. Administrator's Guide
  2. Installing Genian NAC
    1. Installing Policy Server
      1. Accessing GUI
      2. Allow SSH Access
      3. Installing Genian NAC License
      4. Configuring Policy Server for High Availability
    2. Installing Network Sensor
    3. Installing Agent
      1. Installing Windows Agent
      2. Installing macOS Agent
  3. Deploying Genian NAC
    1. On-Premise
    2. Cloud-Managed
    3. Deploying Agent
      1. Distributing Agent Using GPO
      2. Distributing Agent Using Captive Web Portal
      3. Distributing Agent Manually
  4. Monitoring Network Assets
    1. Monitoring Network Nodes
      1. Browsing Nodes
      2. Filtering Nodes
      3. Tagging Nodes
      4. Deleting Nodes
      5. Browsing Nodes based on Sensor or Group
      6. Creating Node Groups
      7. Detecting Node Platform
    2. Monitoring IP Address
      1. Browsing Sensor IP Status
      2. Browsing IP Status Using Matrix View
    3. Monitoring Switch
      1. Browsing Switches
      2. Browsing Switch Ports
      3. Searching Switch Port
      4. Changing Switch Port Description
      5. Shutdown Switch Port
    4. Monitoring Wireless LAN
      1. Browsing SSIDs
      2. Searching SSIDs
      3. Creating Wireless Groups
      4. Viewing Connected Stations
      5. Finding SSID Physical Location
      6. WLAN Status and Filters
      7. Detecting Internal SSID
      8. Browsing Wireless Stations
      9. Searching Wireless Stations
  5. Controlling Network Access
    1. Configuring Network Sensor
      1. Activating Enforcement mode on the Network Sensor
    2. Controlling Network Access Based on IPAM
      1. Preparing Access Control using IPAM
      2. Changing IPAM Policy
      3. Configuring IP Change Preventions
      4. Configuring IP Conflict Prevention
      5. Allowing IP/MAC Based On Time
      6. Configuring DHCP Services
    3. Controlling Network Access Based On Node Group
      1. Creating Enforcement Policy for Node Group
      2. Managing Enforcement Status
      3. Configuring Agent Action For Enforcement Policy
    4. Configuring Switch Port Block For Enforcement Policy
      1. Configuring SNMP Community String
  6. Configuring On-boarding Process
    1. Configuring Captive Web Portal
      1. Enabling Captive Web Portal
      2. Customizing Messages
      3. Managing Custom Buttons
      4. Customizing CWP Design
      5. Managing Notice
    2. Configuring Guest Management
      1. Configuring Guest Account
      2. Managing Guest Requests
  7. User Authentication
    1. Enabling User Authentication
      1. Configuring User Authentication by Captive Web Portal
      2. Configuring User Authentication by Agent
      3. Configuring User Authentication by 802.1x
      4. Configuring User Authentication by RADIUS Account
      5. Configuring User Authentication by AD Domain Login
    2. Managing User Directories
      1. Managing Users
      2. Managing User Groups
      3. Configuring Password Policy
    3. Synchronizing User Directory
      1. Synchronizing User Directories with RDBMS
      2. Synchronizing User Directories with LDAP
      3. Synchronizing User Directories with CSV
    4. Integrating External Server
      1. Configuring Active Directory
      2. Configuring RADIUS Server
      3. Configuring IMAP/POP3/SMTP Server
      4. Testing LDAP, RADIUS, IMAP/POP3/SMTP Integration
    5. Configuring User Authentication Options
      1. Configuring Authentication Scope
      2. Configuring Authentication Lifetime
      3. Configuring Device Ownership
      4. Configuring Find Username & Password
    6. Enabling RADIUS Authentication
      1. Enabling MAC Authentication
  8. Controlling Endpoints
    1. Understanding Agent Action
    2. Controlling Windows
      1. Collecting Computer OS Information
      2. Collecting Hardware Information
      3. Collecting Monitor Information
      4. Collecting Network Information
      5. Collecting Printer Information
      6. Collecting Software Information
      7. Collecting Windows System Information using WMI
      8. Collecting Instant Messaging Application Information
      9. Collecting Peer-to-peer Application Information
      10. Configuring Windows Settings
      11. Configuring Wireless Connection Manager
      12. Configuring 802.1x Wired Authentication
      13. Controlling Antivirus Software
      14. Controlling Internet Options
      15. Controlling Network Interface
      16. Controlling WLAN Interface
      17. Controlling DNS
      18. Controlling External Device
        1. Creating External Device Policy
      19. Controlling ARP Spoofing
      20. Controlling Windows Update
        1. Configuring GenianSyncer Software
      21. Controlling Power Options
      22. Controlling Network Folder Sharing
      23. Controlling Screen Lock
      24. Changing Computer Name
      25. Uninstalling Programs
      26. Killing Processes
      27. Managing Files
      28. Notifying Users
      29. Running Scripts
    3. Controlling MacOS
      1. Collecting Computer OS Information
      2. Collecting Hardware Information
      3. Collecting Network Information
      4. Collecting Software Information
      5. Collecting Antivirus Software Information
      6. Controlling macOS Update
  9. Detecting Threats
    1. Understanding Threat Detection
    2. Creating Threat Definition
    3. Blocking Threats
  10. Managing Logs and Events
    1. Managing Logs
      1. Searching Logs
      2. Time Graph and Chart
      3. Real Time Monitoring
      4. Creating Log Filter
      5. Tagging Assets Using Event
    2. Sending Notifications
      1. Sending Notification Using Event
      2. Sending Notification Using SNMP
      3. Sending Notification Using Syslog
      4. Sending Notification Using Webhook
    3. Receiving Events
      1. Configuring Receive Syslog
      2. Configuring Receiving SNMP Traps
    4. Report
      1. Managing Reports
  11. Managing Systems
    1. Managing Dashboards
      1. Adding Dashboards
      2. Managing Widgets
      3. Monitoring Sensors using Google Maps
    2. Managing Administrators
      1. Administrator Accounts
      2. Administrator Roles
      3. 2-Step Authentication
      4. Changing Command Line Interface Password
    3. Command Line Interface
      1. Connecting Command Line Interface
      2. CLI Commands
    4. Configuring Network
      1. Changing Interface IP Address
      2. Configuring DHCP on Interface
    5. Configuring Default Settings
      1. Configuring Network Appliance
      2. Configuring Sensor Settings
    6. Managing Backup And Restore
      1. Configuring Backup
      2. Restoring From Existing Backup
    7. Managing System Software
      1. Updating Policy Server and Network Sensor
      2. Updating Agent
      3. Managing Policy Server With SNMP

Administrator's Guide

To get you started with Genian NAC, you need to check a few things out first

Once you have the Policy Server and Network Sensor up and running, you can get smart visibility and contextual access control to your network.

Suggest Edit