Junos SA SSL VPN 7.4 Client Side Changes
Junos SA SSL VPN 7.4 Client Side Changes
Junos SA SSL VPN 7.4 Client Side Changes
Release
7.4
Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes the Envoy SNMP Engine, developed by Epilogue Technology, an Integrated Systems Company. Copyright 1986-1997, Epilogue Technology Corporation. All rights reserved. This program and its documentation were developed at private expense, and no part of them is in the public domain. This product includes memory allocation software developed by Mark Moraes, copyright 1988, 1989, 1993, University of Toronto. This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation and software included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by the Regents of the University of California. Copyright 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994. The Regents of the University of California. All rights reserved. GateD software copyright 1995, the Regents of the University. All rights reserved. Gate Daemon was originated and developed through release 3.0 by Cornell University and its collaborators. Gated is based on Kirtons EGP, UC Berkeleys routing daemon (routed), and DCNs HELLO routing protocol. Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD software copyright 1988, Regents of the University of California. All rights reserved. Portions of the GateD software copyright 1991, D. L. S. Associates. This product includes software developed by Maker Communications, Inc., copyright 1996, 1997, Maker Communications, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Junos Pulse Secure Access Service Client Side Changes Guide Revision History January 2011Integrate Version 7.1 new features March 2012Integrate Version 7.2 new features The information in this document is current as of the date on the title page.
http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions
of that EULA.
ii
Part 1
Chapter 1 Chapter 2
Client-Side Changes
Environment Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Installers and Setup Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Part 2
Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11
Applications
Host Checker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Enhanced Endpoint Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Secure Virtual Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Junos Pulse Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Windows Secure Application Manager (WSAM) . . . . . . . . . . . . . . . . . . . . . . 29 Java Secure Application Manager (JSAM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Network Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Terminal Services Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Citrix Services Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Part 3
Appendix A
Appendices
Required Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Part 4
Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
iii
iv
Table of Contents
About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Requesting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Self-Help Online Tools and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . xii Opening a Case with JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Part 1
Chapter 1
Client-Side Changes
Environment Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Environment Variable Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Chapter 2
Part 2
Chapter 3
Applications
Host Checker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Host Checker Windows Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Installer Package Files and File Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Additional Installer Package Files and File Locations . . . . . . . . . . . . . . . . . . . . 13 Log File Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Host Checker Macintosh Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Application and Additional Files Installed by Host Checker . . . . . . . . . . . . . . . 15 Files Remaining After Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Log files Installed by Host Checker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Host Checker Linux Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Application and Additional Files Installed by Host Checker . . . . . . . . . . . . . . . 17 Files Remaining After Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Log Files Installed by Host Checker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Cache Cleaner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Files Remaining After Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Registry Modifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Log File Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Chapter 4
Chapter 5
Chapter 6
Chapter 7
vi
Table of Contents
Chapter 8
Chapter 9
Network Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Network Connect and GINA Windows Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Installer Package Files and File Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Additional Files Installed by Package and File Locations . . . . . . . . . . . . . . . . . 41 Files Remaining After Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Registry Modifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Log File Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Network Connect Linux Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Application and Additional Files Installed by Network Connect . . . . . . . . . . . 44 Files Remaining After Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Log Files Installed by Network Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Network Connect Macintosh Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Application and Additional Files Installed by Network Connect . . . . . . . . . . . 44 Files Remaining After Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Log Files Installed by Network Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Chapter 10
Chapter 11
vii
Part 3
Appendix A
Appendices
Required Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Required Rights to Run and Install Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Part 4
Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
viii
List of Tables
About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Table 1: Notice Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Part 3
Appendix A
Appendices
Required Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Table 2: Windows Secure Application Manager (WSAM) . . . . . . . . . . . . . . . . . . . 57 Table 3: Java Secure Application Manager (JSAM) . . . . . . . . . . . . . . . . . . . . . . . . . 57 Table 4: Network Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Table 5: Terminal Services Component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Table 6: Citrix Terminal Services Component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Table 7: Host Checker (includes Secure Virtual Workspace) . . . . . . . . . . . . . . . . . 60 Table 8: Enhanced Endpoint Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Table 9: Cache Cleaner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Table 10: Junos Pulse Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
ix
Document Conventions
Table 1 on page xi defines notice icons used in this guide.
Description
Indicates important features or instructions.
Caution
Warning
Laser warning
JTAC policiesFor a complete understanding of our JTAC procedures and policies, review the JTAC User Guide located at http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf . Product warrantiesFor product warranty information, visit http://www.juniper.net/support/warranty/ .
xi
JTAC hours of operationThe JTAC centers have resources available 24 hours a day, 7 days a week, 365 days a year.
Find CSC offerings: http://www.juniper.net/customers/support/ Search for known bugs: http://www2.juniper.net/kb/ Find product documentation: http://www.juniper.net/techpubs/ Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/ Download the latest versions of software and review release notes:
http://www.juniper.net/customers/csc/software/
To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Use the Case Management tool in the CSC at http://www.juniper.net/cm/. Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
For international or direct-dial options in countries without toll-free numbers, see http://www.juniper.net/support/requesting-support.html.
xii
PART 1
Client-Side Changes
CHAPTER 1
Environment Variables
%USERPROFILE% =%SystemDrive%\Documents and Settings\%USERNAME% %ALLUSERSPROFILE%=%SystemDrive%\Documents and Settings\All User %APPDATA% =%USERPROFILE%\Application Data %TEMP% =%USERPROFILE%\Local Settings\Temp
%TEMP% =%USERPROFILE%\AppData\Local\Temp
%TEMP% =%USERPROFILE%\AppData\Local\Temp\low
CHAPTER 2
JuniperSetupSP1Control.ocx AccessServiceComponent.exe (The device auto-starts this service when installing, and, then stops and removes it when uninstalling.)
If you plan to use the Juniper Networks Installer MSI package, you will need administrator rights to install onto your client systems. If you plan to use the EXE version, administrator rights is not needed as long as a previous version of the access service component (deployed through, for example, JIS, Pulse, and so forth) is already present.
C:\Program files\Juniper Networks\Installer Service\AccessServiceComponent.exe (Windows NT/2000/XP) C:\WINNT\Downloaded Program Files\JuniperSetupSP1Control.ocx (Windows NT and 2000) C:\Windows\Downloaded Program Files\JuniperSetupSP1Control.ocx (Windows XP)
JuniperSetupClient.inf JuniperSetupClient.ocx JuniperSetupClientCtrlUninstaller.exe string_de.properties string_en.properties string_es.properties string_fr.properties string_ja.properties string_ko.properties string_zh.properties string_zh_cn.properties
The Juniper Installer Service also installs the following files in C:\Program Files\Juniper Networks\Installer Service:
C:\Documents and Settings\All Users\Application Data\Juniper Networks\Logging\debuglog.log (Windows NT/2000/XP) C:\Users\Public\Juniper Networks\Logging\debuglog.log (Windows Vista/Windows 7/Windows 8) C:\Users\admin\AppData\Roaming\Juniper Networks\Logging\debuglog.log (Windows Vista/Windows 7/Windows 8)
Registry Modifications
The installer package creates a registry key under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\JuniperAccessService and HKEY_LOCAL_MACHINE\SOFTWARE\Juniper Networks.
JuniperSetupClient.cab
install.log JuniperExt.exe
JuniperSetup.inf JuniperSetup.ocx JuniperSetupClient.inf JuniperSetupClient.ocx JuniperSetupClientCtrlUninstaller.exe string_de.properties string_en.properties string_es.properties string_fr.properties string_ja.properties string_ko.properties string_zh.properties string_zh_cn.properties
In addition, the following folder is created. C:\Documents and Settings\username\Application Data\Juniper Networks If the administrator configures a list of Secure Access Services that the client can trust, this list of Secure Access Services is stored in the following files:
In addition, users can themselves make the decision to trust a Secure Access Service. When the user makes a decision to trust a Secure Access Service, the Secure Access Service is added to the user whitelist. User whitelist files are located in:
Registry Modifications
For Windows Vista, Windows 7 and Windows 8, the following registry keys are created:
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{107AD0CA-8339-40C5B554-AE361FB31090}\InProcServer32 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F27237D7-93C8-44C2AC6E-D6057B9A918F} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\dsATLSetupCtrl. JuniperSetupClientCont.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\dsATLSetupCtrl. JuniperSetupClientContro HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{107AD0CA-8339-40C5B554-AE361FB31090} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1FEB5880-8108-4CA69FF0-BA5191352FCC}\1.0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1FEB5880-8108-4CA69FF0-BA5191352FCC}\1.0\0\win32 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{F27237D7-93C8-44C2-AC6E-D6057B9A918F}\Contains\Files HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{F27237D7-93C8-44C2-AC6ED6057B9A918F}\ Contains\FilesFlags\JuniperExt.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{F27237D7-93C8-44C2-AC6ED6057B9A918F}\ Contains\FilesFlags\JuniperSetupClient.ocx HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3EEDF1D3-9D79-4b3e-B8EB-84DB35D7F282} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3FB35533-A034-42dc-B051-95F1819F6A9A} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ ModuleUsage\C:/Windows/Downloaded Program Files/JuniperExt.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ ModuleUsage\C:/Windows/Downloaded Program Files/JuniperSetupClient.ocx HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ SharedDLLs HKEY_USERS\S-1-5-21-68661237-3255334891-34855837291000\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S1-5-21-68661237-3255334891-3485583729-1000\SOFTWARE\Juniper Networks
C:\Documents and Settings\All Users\Application Data\Juniper Networks\Logging\debuglog.log C:\Documents and Settings\username\Application Data\Juniper Networks\Setup\JuniperSetupControlXP.log (ActiveX logs)
For low-integrity processes, such as Internet Explorer 7, the ActiveX installer installs the following log files in C:\Users\username\AppData\Local\Temp\Low:
JuniperSetupClientCtrl.log JuniperSetupDll.log
10
PART 2
Applications
Host Checker on page 13 Enhanced Endpoint Security on page 19 Secure Virtual Workspace on page 23 Junos Pulse Collaboration on page 25 Windows Secure Application Manager (WSAM) on page 29 Java Secure Application Manager (JSAM) on page 37 Network Connect on page 41 Terminal Services Client on page 47 Citrix Services Client on page 51
11
12
CHAPTER 3
Host Checker
Host Checker Windows Client on page 13 Host Checker Macintosh Clients on page 15 Host Checker Linux Clients on page 16 Cache Cleaner on page 17
CertAuthIMC.dll dsHostChecker.exe dsHostCheckerProxy.exe dsHostCheckerResource_de.dll dsHostCheckerResource_en.dll dsHostCheckerResource_es.dll dsHostCheckerResource_fr.dll dsHostCheckerResource_ja.dll dsHostCheckerResource_ko.dll dsHostCheckerResource_zh.dll dsHostCheckerResource_zh_cn.dll
13
dsInstallerClient.dll dsnsisdll.dll dsWinClient.dll dsWinClientResource_DE.dll dsWinClientResource_EN.dll dsWinClientResource_ES.dll dsWinClientResource_FR.dll dsWinClientResource_JA.dll dsWinClientResource_KO.dll dsWinClientResource_ZH.dll dsWinClientResource_ZH_CN.dll EPCheck.dll hcimc.dll install.log hcUtils.dll OpswatIMC.dll JSystemIMC.dll Microsoft.VC80.CRT/Microsoft.VC80.CRT.manifest Microsoft.VC80.CRT/msvcp80.dll Microsoft.VC80.CRT/msvcr80.dll msvcp60.dll Pluginclent.dll restore_win2k.txt restore_win98.txt ShavlikIMC.dll tnc_config uninstall.exe versionInfo.ini
In addition, if you implement policies that download or check for third-party software, Host Checker may install additional DLLs in subdirectories of: C:\Documents and Settings\username\Application Data\Juniper Networks\Host Checker.
14
When you enable logging, Host Checker adds log files to the following locations:
C:\Documents and Settings\All Users\Application Data\Juniper Networks\Logging\debuglog.log (Windows XP) C:\users\username\AppData\Roaming\Juniper Networks\Logging\debuglog.log (Windows Vista, Windows 7 and Windows 8) C:\Users\Public\Juniper Networks\Logging\debuglog.log (Windows Vista, Windows 7 and Windows 8)
HCIMC.dylib HCIMC.dylib HostChecker HostCheckerServicePS.dylib MessageCatalogTncc_DE.txt MessageCatalogTncc_EN.txt MessageCatalogTncc_ES.txt MessageCatalogTncc_FR.txt MessageCatalogTncc_JA.txt MessageCatalogTncc_KO.txt MessageCatalogTncc_ZH-CN.txt MessageCatalogTncc_ZH.txt OPSWAT/
15
Contents/PkgInfo Contents/Resources/
InfoPlist.strings MainMenu.nib
Contents/_CodeSignature/
CodeResources
Contents/versionInfo.ini
16
$HOME/.juniper_networks/dsHCLauncher_linux1.log $HOME/.juniper_networks/dsHostChecker_linux1.log
$HOME/.juniper_networks/dsHCLauncher_linux1.log $HOME/.juniper_networks/dsHostChecker_linux1.log
Cache Cleaner
Cache Cleaner is installed as part of Host Checker. Host Checker downloads the binary files dSCacheCleaner.dll and dsCCProc.exe.
Registry Modifications
Cache Cleaner sets the following string registry values in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Juniper_ Networks_Cache_Cleaner version number.
String
DisplayName DisplayVersion Publisher QuietUninstallString
Set to
Juniper Networks Cache Cleaner version the current software version Juniper Networks %APPDATA%\Juniper Networks\Cache Cleaner version \uninstall.exe /S %APPDATA%\Juniper Networks\Cache Cleaner version\dsCacheCleaner.exe %APPDATA%\Juniper Networks\Cache Cleaner version\dsCacheCleaner.exe -action stop -nodelete 1
StartupApp
StopApp
17
String
UninstallString
Set to
%APPDATA%\Juniper Networks\Cache Cleaner version\uninstall.exe http://www.juniper.net
URLInfoAbout
18
CHAPTER 4
EES is a JUNS plug-in and requires JUNS Access Service to be installed on the client system. A JUNS plug-in is a component, such as EES or Host Checker, that runs under the Juniper Unified Network Service (a Windows NT service). If JUNS is not already installed, EES automatically installs it. If a JUNS service already installed on the end-user system, EES is installed with limited user privilege.
dsEES.dll EndpointDefensePS.dll EPD.dep install.log (installed when both EES and WebRoot SDK is installed) uninstall.exe versionInfo.ini WRSS.log ( installed when both EES and WebRoot SDK is installed)
19
EES installs the WebRoot SDK in %CommonProgramFiles%\Juniper Networks\Endpoint Defense\WRSSMini and includes the following files and folders. Note that different versions of WebRoot SDK may change the files in this list.
CoreScan.dll dbghelp.dll Lockbox.dll pcre3.dll SSU.exe WRSSMini.dll ZipTV06.dll ztvcabinet.dll ztvunrar3.dll drv/WRSSMini.inf drv/amd64/SSFSFD.sys drv/amd64/SSIDRV.sys drv/amd64/SsiEfr.exe drv/i386/SSFSFD.sys drv/i386/SSHRMD.sys drv/i386/SSIDRV.sys drv/i386/SsiEfr.exe Masters/inst.const Masters/inst.mst Masters/Masters.bak Masters/masters.const Masters/masters.mst
20
StartType=Auto [EndpointDefense] StartType=Auto If the JUNS plug-in is enabled on the end-user system, you should not expect any other .exe applications running on the end-user system. If Host Checker is running as a user mode process (dsAccessService.exe is running), EES is loaded into that process.
Registry Modifications
EES sets the following registry values under HKEY_LOCAL_MACHINE\SOFTWARE\Juniper Networks\Host Checker:
String
WebrootInstallPath
Set To
The installation directory, for example, "C:\\Program Files\\Common Files\\Juniper Networks\\Endpoint Defense\\". The actual path is dependent on the CommonProgramFiles variable. 6.5.1.102
WebrootInstallVersion
21
22
CHAPTER 5
wallpaper.bmp dsjvd.dll dsjvdsvc.dll dsmonitor.dll dsVdeskPackage.dll dsjvd64.dll (64-bit SVW only) dsmonitor64.dll (64-bit SVW only)
Host Checker deletes neoSVWData.zip and neoSVWDlls.zip after unzipping the files.
Registry Modifications
SVW creates the key HKEY_CURRENT_USER\SOFTWARE\Juniper Networks\VDesk.
23
24
CHAPTER 6
Junos Pulse Collaboration Windows Client on page 25 Junos Pulse Collaboration Macintosh Clients on page 26 Junos Pulse Collaboration Linux Client on page 27 Junos Pulse Collaboration Plug-In on page 27
With an Active-X based install, Junos Pulse Collaboration installs additional files in: (Windows NT/2000/XP) C:\Documents and Settings\username\Application Data\Juniper Networks\Junos Pulse Collaboration version_number (Windows Vista, Windows 7 and Windows 8) C:\Users\username\AppData\Roaming\Juniper Networks\Junos Pulse Collaboration version_number
The Junos Pulse Collaboration installer also contains the Access Services installer when run on a Windows Vista, Windows 7 or Windows 8 system. See the Junos Pulse Collaboration directory for a complete list of files.
25
Registry Modifications
Junos Pulse Collaboration sets the following registry values:
String
Language
Set in
HKEY_CURRENT_USER\Software\Juniper Networks\Junos Pulse Collaboration version HKLM\Software\Juniper Networks\Logging\Level
level
NOTE: The maximum file size for each of the Junos Pulse Collaboration log files is 10 MB.
When you enable logging, Junos Pulse Collaboration adds log files to the following locations for Windows XP:
C:\Documents and Settings\All Users\Application Data\Juniper Networks\Logging\debuglog.log C:\Documents and Settings\username\Application Data\Juniper Networks\Logging\debuglog.log
When you enable logging, Junos Pulse Collaboration adds log files to the following locations for Windows Vista, Windows 7 and Windows 8:
26
~/Library/Logs/Juniper Networks/dsCboxLauncher_macx.log, where x is 0 or 1. ~/Library/Logs/Juniper Networks/dsCboxUI_macx.log, where x is 0 or 1. ~/Library/Logs/Juniper Networks/dsCboxUISummary_macx.log, where x is 0 or 1. ~/Library/Logs/Juniper Networks/MacPresenter.log.
~/.juniper_networks/meetingAppSun.jar ~/.juniper_networks/libSMJNIXWinLinux.so
File Location
The Junos Pulse Collaboration plug-in is installed on the Windows client in \Documents and Settings\user\Application Data\Juniper Networks\Junos Pulse Collaboration Plugin
27
Registry Modifications
String
Language HKEY_CURRENT_USER\Software\Juniper Networks\Junos Pulse Collaboration for Outlook Plugin
28
CHAPTER 7
Windows 2000 and Windows XP (32- and 64-bit): C:\Documents and Settings\username\Local Settings\Temp\samsetupnt.exe Windows Vista, Windows 7 and Windows 8 (32- & 64-bit): \Users\username\AppData\Local\Temp Windows Mobile 6.0 Pocket PC/6.0 Classic/6.0 Professional: \My Documents\WSAMInstARM.cab Windows Mobile 5.0 SmartPhone/6.0 Standard: \My Document\WSAMInstARMSP.cab
NOTE: You may choose to use a WSAM standalone installer or scriptable installer instead of the standard Web installers already mentioned. If you do, the installers are located where you save them, which may not be the same directories listed here. The filenames for these downloadable installers are:
WSAMInstNt.exeWSAM standalone installer for Windows 2000/XP/Vista/Windows7 (including 32- & 64-bit) systems WSAMInstARM.cabWSAM standalone installer for Windows Mobile 5.0 PocketPC/6.0 Classic/6.0 Professional WSAMInstARMSP.cabWSAM standalone installer for Windows Mobile 5.0 Smartphone/6.0 Standard
29
dsSamProxy.exe dsSamResource_DE.dll dsSamResource_EN.dll dsSamResource_ES.dll dsSamResource_FR.dll dsSamResource_JA.dll dsSamResource_KO.dll dsSamResource_ZH.dll dsSamResource_ZH_CN.dll dsSamUI.exe dsWinClient.dll dsWinClientResource_DE.dll dsWinClientResource_EN.dll dsWinClientResource_ES.dll dsWinClientResource_FR.dll dsWinClientResource_JA.dll dsWinClientResource_KO.dll dsWinClientResource_ZH.dll dsWinClientResource_ZH_CN.dll gaptbar.dll install.log Microsoft.VC80.CRT/Microsoft.VC80.CRT.manifest Microsoft.VC80.CRT/msvcp80.dll Microsoft.VC80.CRT/msvcr80.dll pending.reboot samclean.exe samdiagEx.dll (Windows 2000/XP/Vista/Windows 7/Windows 8 only) samlauncher.exe
30
On Windows 2000, XP, Vista, Windows 7 and Windows 8 systems, WSAM also installs a TDI driver (neofltr_release number_build number.sys) in $SystemRoot\system32\drivers. For Windows mobile, WSAM installs the following additional files on the client in \Program Files\Juniper Networks\WSAM:
File
dsSamProxy.exe gapsp.dll SamResource_DE.dll SamResource_EN.dll SamResource_ES.dll SamResource_FR.dll SamResource_JA.dll SamResource_KO.dll SamResource_ZH.dll SamResource_ZH_CN.dll SamUI.exe
Location
\Program Files\Juniper Networks\WSAM \Windows \Program Files\Juniper Networks\WSAM \Program Files\Juniper Networks\WSAM \Program Files\Juniper Networks\WSAM \Program Files\Juniper Networks\WSAM \Program Files\Juniper Networks\WSAM \Program Files\Juniper Networks\WSAM \Program Files\Juniper Networks\WSAM \Program Files\Juniper Networks\WSAM \Program Files\Juniper Networks\WSAM
31
Registry Modifications
WSAM sets the following registry values for the installation, uninstallation, current version, TDI driver for Windows 2000, XP, Vista, Windows 7 and Windows 8 only, and miscellaneous:
Installation Values
For Windows XP, Windows Vista, Windows 7 and Windows 8, WSAM sets the following installation values in HKEY_LOCAL_MACHINE\SOFTWARE\Juniper Networks\Secure Application Manager:
String
InstallPath Language
Set to
C:\Program Files\Juniper Networks\Secure Application Manager EN (or appropriate language value)
In HKEY_LOCAL_MACHINE\SOFTWARE\Juniper Networks\WSAM:
String
AutoStart ProductVersion ProductName
Set to
0 or 1 <version number><build number> WSAM
HKEY_LOCAL_MACHINE\SOFTWARE\Juniper Networks\WSAM\Config
String
Url1
Set to
???
HKEY_LOCAL_MACHINE\SOFTWARE\Juniper Networks\WSAM\Log:
String
LoggingApps LogLevel ProductLocation
Set to
iexplore.exe; tmail.exe 3 \Program Files\Juniper Networks\WSAM
32
HKEY_LOCAL_MACHINE\SOFTWARE\Juniper Networks\WSAM
String
EnableLogSvr
Set to
0 or 1 (depending upon server side log setting)
HKEY_CURRENT_USER\SOFTWARE\Juniper Networks\WSAM
String
UpgradeFlag
Set to
2 or 3 (depending upon auto profile generation requirement)
Uninstallation Values
WSAM sets the following uninstall values in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Ne oteris_Secure_Application_Manager\Commands for Windows 2000, XP, Windows Vista, Windows 7 and Windows 8.
String
DelRV
Set to
"C:\Program Files\Juniper Networks\Secure Application Manager\samnb.dll",SFS_DeleteRebootValue "C:\Program Files\Juniper Networks\Secure Application Manager\samnb.dll",SFS_FlushCache
FlushC
HKEY_CURRENT_USER\SOFTWARE\Juniper Networks\Secure Application Manager\SessionEstablishTasks HKEY_CURRENT_USER\SOFTWARE\Juniper Networks\Secure Application Manager\SessionCleanupTasks HKEY_CURRENT_USER\SOFTWARE\Juniper networks\Secure Application Manager\EnableLogSvr (Set to 0 or 1, depending on server side log setting)
Set to
Juniper Networks Secure Application Manager <version number><build number>
33
String
Publisher QuietUninstallString
Set to
Juniper Networks C:\Program Files\Juniper Networks\Secure Application Manager\UninstallSAM.exe C:\Program Files\Juniper Networks\Secure Application Manager\dsSamProxy.exe C:\Program Files\Juniper Networks\Secure Application Manager\UninstallSAM.exe http://www.juniper.net/products/ssl
StartupApp
UninstallString
URLInfoAbout
Set
1A00 to: 1
1A00 to: 1
Set to
Juniper Networks TDI Filter Driver (NEOFLTR_releaseNumber_buildNumber) C:\WINDOWS\System32\Drivers\NEOFLTR_releaseNumber_buildNumber.SYS
Name
0
Value
Root\LEGACY_NEOFLTR_releaseNumber_buildNumber\0 000 0x00000001 0x00000001
DWord Dword
Count NextInstance
34
Set to
Applicable TDI Irp stack size, if required
Miscellaneous
WSAM sets the following miscellaneous registry values:
String: IntranetAuthOptions is set in HKEY_LOCAL_MACHINE\SOFTWARE\Neoteris\Secure Application Manager\Backup and HKEY_CURRENT_USER\SOFTWARE\Neoteris\Secure Application Manager\Backup.
C:\Documents and Settings\All Users \Application Data\Juniper Networks\Secure Application Manager C:\Documents and Settings\All Users \Application Data\Juniper Networks\Logging
WSAM also adds an installation log file to the C:\Program Files\Juniper Networks\Secure Application Manager directory. For Windows Mobile 5 users, WSAM adds log files to the \Program Files\Juniper Networks\WSAM\Log directory.
35
36
CHAPTER 8
Java Secure Application Manager (JSAM) on page 37 JSAM Windows Client on page 37 JSAM Macintosh Clients on page 38 JSAM Linux Client on page 39
If UAC is disabled, JSAM installs C:\Users\username\AppData\Roaming\Juniper Networks\jsamtool.exe. If UAC is enabled, JSAM installs C:\Users\username \AppData\Local\Temp\Low\Juniper Networks\Java Secure Application Manager\jsamtool.exe.
37
Registry Modifications
JSAM sets the following registry values:
If you configure a standard NetBIOS application through JSAM, or you configure a custom application on port 137, 138, or 139, JSAM makes the following registry key modification on Windows XP machines (Administrator privileges required): SMBDeviceEnabled=dword:00000000 is set in the registry location: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters If you enable Outlook 5.5, 2000, or 2002 (Administrator privileges required), JSAM adds HKEY_LOCAL_MACHINE\Software\Microsoft\Exchange\Exchange Provider\Rpc_Binding_Order to the registry. (The second entry for this registry key is changed to ncacn_http.) The original value of this setting is: ncalrpc,ncacn_ip_tcp,ncacn_spx,ncacn_np,netbios,ncacn_vns_spp After JSAM is initially used, the value of this setting is: ncalrpc,ncacn_http,ncacn_ip_tcp,ncacn_spx,ncacn_np,netbios,ncacn_vns_spp
If you disable the Skip Web Proxy Registry Check option under Users > User Roles > Role> SAM > Options > Java SAM Options (User read access required), JSAM reads: HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Int ernet Settings\ProxyEnable
~/Library/Application Support/Juniper Networks/NeoterisMac.jar ~/Library/Java/Extensions/libJNPRAuthKit.jnilib ~/Library/Application Support/Juniper Networks/jsam.icns ~/Library/Application Support/Juniper Networks/logo.gif
38
39
40
CHAPTER 9
Network Connect
Network Connect and GINA Windows Client on page 41 Network Connect Linux Client on page 44 Network Connect Macintosh Clients on page 44
C:\Documents and Settings\username\Local Settings\Temp\neoNCsetup.exe.cab (Windows 2000/XP) C:\Users\username\AppData\Local\Temp\neoNCSetup.exe (Windows Vista, Windows 7 and Windows 8) For FIPS compliant systems, the following additional packages are downloaded:
C:\Documents and Settings\username\Application Data\Juniper Networks\Setup Client\ neoFIPSSetup_6.5.x.xxxxx.exe (Windows 2000/XP) C:\Users\username\AppData\Roaming\Juniper Networks\Setup Client\ neoFIPSSetup_6.5.x.xxxxx.exe (Windows Vista, Windows 7 and Windows 8)
41
dsNcGina.dll dsNCGINACompatible.txt dsNCResource_EN.dll dsNCResource_DE.dll dsNCResource_ES.dll dsNCResource_FR.dll dsNCResource_JA.dll dsNCResource_KO.dll dsNCResource_ZH.dll dsNCResource_ZH_CN.dll dsWinClientResource_EN.dll dsWinClientResource_DE.dll dsWinClientResource_ES.dll dsWinClientResource_FR.dll dsWinClientResource_JA.dll dsWinClientResource_KO.dll dsWinClientResource_ZH.dll dsWinClientResource_ZH_CN.dll JuniperSetupClientOCX.exe uninstall.exe nclauncher.exe setproxy.html
C:\Program Files\Juniper Networks\Common Files\dsNcService.exe C:\Program Files\Juniper Networks\Common Files\odFips2.dll (FIPS only) C:\Program Files\Juniper Networks\Common Files\odFips2.dll.icv (FIPS only) C:\Program Files\Juniper Networks\Common Files\salib_OSSL.dll (FIPS only) C:\<WINDIR>\system32\drivers\dsNcAdpt.sys C:\<WINDIR>\system32\dsGinaLoader.dll (Windows 2000 and Windows XP)
For Windows Vista, Windows 7 and Windows 8, Network Connect also installs the following files:
%windows%\system32\dsNCCredProv.dll %windows%\system32\dsNcSmartCardProv.dll
42
dsGinaLoader.dll If only one Network Connect installation is present on the client, this file is removed after you reboot. If there are multiple versions of Network Connect installed on the client, this file remains on the client.
Registry Modifications
Additionally, if GINA is enabled in the Admin Web console, Network Connect sets following string registry value in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon (Windows 2000 and Windows XP only):
String
GinaDLL
Set to
dsGinaLoader.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Juniper Networks\Network Connect version_number HKEY_CURRENT_USER\Software\Juniper Networks\Network Connect version_number (Windows Vista, Windows 7 and Windows 8 only) HKEY_LOCAL_MACHINE "SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\PLAP Providers\{9f4a51de-92b1-483a-b717-dd7d3bb7d3db}" (Windows Vista, Windows 7 and Windows 8 only) HKEY_CLASSES_ROOT "CLSID\{9f4a51de-92b1-483a-b717-dd7d3bb7d3db}" (Windows Vista, Windows 7 and Windows 8 only) HKEY_LOCAL_MACHINE "SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\PLAP Providers\{60442b50-aac2-4db7-b9b0-813d2107287d}" (Windows Vista, Windows 7 and Windows 8 only) HKEY_CLASSES_ROOT "CLSID\{60442b50-aac2-4db7-b9b0-813d2107287d}"
43
For Windows Vista, Windows 7 and Windows 8: C:\Users\username\AppData\roaming\Juniper Networks\logging\debuglog.log and C:\Users\public\Juniper Networks\logging\debuglog.log
44
/usr/local/juniper/nc/version/nctun[_tiger].kext ~/Library/Internet Plug-Ins/net.juniper.DSSafariExtensions.plugin ~/Library/Application Support/Juniper Networks/ NetworkConnectMac_de.jar NetworkConnectMac_en.jar NetworkConnectMac_es.jar NetworkConnectMac_fr.jar NetworkConnectMac_ja.jar NetworkConnectMac_ko.jar NetworkConnectMac_zh.jar NetworkConnectMac_zh-cn.jar ~/Library/Application Support/Juniper Networks/ NetworkConnectMac_ppc.jar (PowerPC-based Macintoshes) NetworkConnectMac_i386.jar (Intel-based Macintoshes) ~/Library/Java/Extensions/libJNPRAuthKit.jnilib /usr/local/juniper/nc/install/NCJarVerify.jar /usr/local/juniper/nc/install/installer.common /usr/local/juniper/nc/install/ncinstallhelper /usr/local/juniper/nc/install/fwk_reference_tool /usr/local/juniper/nc/install/uninstall_nc.sh /usr/local/juniper/nc/install/version
All files in ~/Library/Logs/Juniper Networks/Network Connect /usr/local/juniper/nc/install/NCJarVerify.jar /usr/local/juniper/nc/install/installer.common /usr/local/juniper/nc/install/ncinstallhelper /usr/local/juniper/nc/install/fwk_reference_tool /usr/local/juniper/nc/install/uninstall_nc.sh
45
46
CHAPTER 10
dsTermServ.exe dsTermServDt.dll dsTermServProxy.dll dsTermServResource_DE.dll dsTermServResource_en.dll dsTermServResource_ES.dll dsTermServResource_FR.dll dsTermServResource_JA.dll dsTermServResource_KO.dll dsTermServResource_ZH.dll dsTermServResource_ZH_CN.dll
47
dsWinClient.dll dsWinClientResource_DE.dll dsWinClientResource_EN.dll dsWinClientResource_ES.dll dsWinClientResource_FR.dll dsWinClientResource_JA.dll dsWinClientResource_KO.dll dsWinClientResource_ZH.dll dsWinClientResource_ZH_CN.dll uninstall.exe versionInfo.ini
The Juniper Terminal Services Client installs the following files in %APPDATA%\Juniper Networks\Juniper Terminal Services Client\Microsoft.VC80.CRT:
Registry Modifications
The Juniper Terminal Services Client adds the following registry values under the registry key, HKEY_CURRENT_USER\Software\Juniper Networks\Juniper Terminal Services Client.
Type
REG_SZ
Name
InstallPath
Value
%APPDATA%\Juniper Networks\Juniper Terminal Services Client user_locale. The default is en.
REG_SZ
Language
Juniper Terminal Services Client sets the following string registry values in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\ Juniper_Term_Services.
Type
String
Name
DisplayName
Value
Juniper Terminal Services Client
48
Type
String String String
Name
DisplayVersion Publisher QuietUninstallString
Value
Set to the current software version Juniper Networks %APPDATA%\Juniper Networks\Juniper Terminal Services Client\uninstall.exe" /S %APPDATA%\Juniper Networks\Juniper Terminal Services Client\dsTermServ.exe" %APPDATA%\Juniper Networks\Juniper Terminal Services Client\dsTermServ.exe" stop %APPDATA%\Juniper Networks\Juniper Terminal Services Client\uninstall.exe" http://www.juniper.net
String
StartupApp
String
StopApp
String
UninstallString
String
URLInfoAbout
49
50
CHAPTER 11
dsCitrixConnector.dll dsCitrixProxy.exe dsCitrixProxyResource_DE.dll dsCitrixProxyResource_en.dll dsCitrixProxyResource_ES.dll dsCitrixProxyResource_FR.dll dsCitrixProxyResource_JA.dll dsCitrixProxyResource_KO.dll dsCitrixProxyResource_ZH.dll dsCitrixProxyResource_ZH_CN.dll dsWinClient.dll dsWinClientResource_DE.dll
51
Juniper Citrix Services Client also installs the following files in %APPDATA%\Juniper Networks\ Juniper Citrix Services Client \Microsoft.VC80.CRT:
Registry Modifications
The Juniper Citrix Services client adds the following registry value under HKEY_CURRENT_USER\Software\Juniper Networks\Juniper Citrix Services Client
Type
REG_SZ
Name
Language
Value
user locale. The default is en.
The Juniper Citrix Services Client also sets the following registry values in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\ Juniper_Citrix_Services:
Type
String String String String
Name
DisplayName DisplayVersion Publisher QuietUninstallString
Value
Juniper Citrix Services Client Set to the current software version Juniper Networks %APPDATA%\Juniper Networks\Juniper Citrix Services Client\uninstall.exe" /S
52
Type
String
Name
StartupApp
Value
%APPDATA%\Juniper Networks\Juniper Citrix Services Client\dsCitrixProxy.exe" %APPDATA%\Juniper Networks\Juniper Citrix Services Client\dsCitrixProxy.exe" stop %APPDATA%\Juniper Networks\Juniper Citrix Services Client\uninstall.exe" http://www.juniper.net
String
StopApp
String
UninstallString
String
URLInfoAbout
53
54
PART 3
Appendices
55
56
APPENDIX A
Required Permissions
Client/Action
Install
Java Windows
Admin
Java Mac/Linux
Not Applicable
More Information
Windows Secure Application Manager (WSAM) on page 29 Windows Secure Application Manager (WSAM) on page 29
Run
Standard User
Standard User
Standard User
Not Applicable
NOTE:
Restricted users can perform the initial installation of WSAM with the installer service only if they start the installation by clicking the WSAM link in the user's portal page. The ActiveX installer requires users to reboot their systems after an installation or upgrade (Windows Mobile only). Users must have ActiveX components or Java enabled through their browsers to use the WSAM installers.
Client/Action
JSAM
More Information
57
Client/Action
Run
Java Windows
Restricted, Power User, or Admin
Java Mac/Linux
User
More Information
Java Secure Application Manager (JSAM) on page 37
JSAM with Host File Modification Run Not Applicable Not Applicable Admin Admin/Root NOTE: Client system asks for the administrator password when JSAM launches. NOTE:
Automatic host mapping: you must have the rights to run regedit.exe in read-only" mode, and the rights to modify the hosts file. Outlook and NetBIOS applications: you must have the rights to run regedit.exe in "read/write" mode.
Automatic host mapping: you must have the rights to install jsamtool.exe on the system and run it. Outlook and NetBIOS applications: you must have the rights to install jsamtool.exe on the system and run it.
JSAM Mac OS X:
Automatic host mapping: you must provide the administrator password when JSAM prompts for it at launch. Any applications that listen on ports below 1024: you must provide the administrator password when JSAM prompts for it at launch.
JSAM Linux:
Automatic host mapping: you must be the root user. Any applications that listen on ports below 1024: you must be the root user.
Client/Action
Install`
Java Windows
Admin
Java Mac/Linux
Admin*
More Information
Network Connect Macintosh Clients on page 44 Network Connect Linux Client on page 44 Network Connect and GINA Windows Client on page 41
58
Client/Action
Run
Java Windows
Standard User
Java Mac/Linux
Standard User
More Information
Network Connect Macintosh Clients on page 44 Network Connect Linux Client on page 44 Network Connect and GINA Windows Client on page 41
NOTE:
Restricted users can perform the initial installation of Network Connect with the installer service only if they start the installation by clicking the Network Connect link in the user's portal page. (Mac only) When Network Connect is first installed (before ncinstallhelper exists on the system), you must provide the administrator password when prompted during the installation. On subsequent launches no special privileges are required. When the installer service is running, uninstalling Network Connect as a restricted user should be done from the user browsers preference page.
* Linux also requires Admin rights to upgrade or downgrade Network Connect. Macintosh does not have this restriction.
Client/Action
Install
Java Windows
Restricted, Power User, or Admin
Java Mac/Linux
Not Applicable
More Information
Juniper Terminal Services Client on page 47 Juniper Terminal Services Client on page 47
Run
Not Applicable
Client/Action
Install
Java Windows
Restricted, Power User, or Admin Restricted, Power User, or Admin
Java Mac/Linux
Not Applicable
Citrix Client
Power User or Admin
More Information
Juniper Citrix Services Client on page 51 Juniper Citrix Services Client on page 51
Run
Not Applicable
59
Client/Action
Install
Java Windows
Restricted, Power User, or Admin
Java Mac/Linux
Not Applicable
More Information
Host Checker Linux Clients on page 16 Host Checker Macintosh Clients on page 15 Host Checker Windows Client on page 13 Host Checker Linux Clients on page 16 Host Checker Macintosh Clients on page 15 Host Checker Windows Client on page 13
Run
Not Applicable
NOTE: If you implement SVW through Host Checker, note that restricted users, power users, and admins all have adequate rights to install and run SVW.
Client/Action
Install
Java Windows
Restricted, Power User, or Admin Restricted, Power User, or Admin
Java Mac/Linux
Not Applicable Not Applicable
More Information
Cache Cleaner on page 17 Cache Cleaner on page 17
Run
Client/Action
ActiveX Windows
Java Windows
Java Mac/Linux
More Information
Junos Pulse Collaboration: Win32 Install Restricted, Power User, or Admin Not Applicable Restricted, Power User, or Admin Not Applicable Junos Pulse Collaboration Windows Client on page 25
60
Client/Action
Run
ActiveX Windows
Restricted, Power User, or Admin
Java Windows
Restricted, Power User, or Admin
Java Mac/Linux
Not Applicable
More Information
Junos Pulse Collaboration Windows Client on page 25
Junos Pulse Collaboration: Java Install (see Note below) Restricted, Power User, or Admin Not Applicable Restricted, Power User, or Admin User Junos Pulse Collaboration Windows Client on page 25 Junos Pulse Collaboration Linux Client on page 27 Junos Pulse Collaboration Macintosh Clients on page 26 Junos Pulse Collaboration Windows Client on page 25 Junos Pulse Collaboration Linux Client on page 27 Junos Pulse Collaboration Macintosh Clients on page 26
Run
Not Applicable
User
Junos Pulse Collaboration: Outlook Plug-in Install Power User, or Admin Restricted, Power User, or Admin Not Applicable Power User, or Admin Restricted, Power User, or Admin Not Applicable Not Applicable Junos Pulse Collaboration Plug-In on page 27 Junos Pulse Collaboration Plug-In on page 27
Run
Not Applicable
NOTE: On Windows Vista, Windows 7 and Windows 8, if Junos Pulse Collaboration is installed with restricted user privilege, remote control of high privilege processes (such as regedit and so forth) is not available. Junos Pulse Collaboration requires the end-user to have admin privileges in order to install the client software on Windows Vista and later operating systems. If JIS is installed on the end-users system, JIS installs the Junos Pulse Collaboration client and user admin privilege is not required. If JIS is not installed and the user does not have admin privilege, the client software is installed with limited features.
61
62
PART 4
Index
Index on page 65
63
64
Index
C
customer support.....................................................................xi contacting JTAC................................................................xi
S
support, technical See technical support
T
technical support contacting JTAC................................................................xi
65
66