GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Manual Pagina 104

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 156
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 103
GFI EndPointSecurity 7 Discovering Devices | 104
7.2.1 Computers
Screenshot 77: Computers area
This section displays device scan summary results for every scanned target computer, including:
The computer name / IP address
The user currently logged on
Protection status, i.e., whether the computer is included in a GFI EndPointSecurity protection pol-
icy
Total number of devices currently and historically connected
Number of devices currently connected.
If a scanned target computer is not included in any GFI EndPointSecurity protection policy, you can
choose to deploy a protection policy to the computer. To do this:
1. Right-click on the relevant computer name / IP address under Computer column, and select
Deploy agent(s)…
2. Select the protection policy to deploy. Click Next to continue and Finish to start deployment.
7.2.2 Devices list
Screenshot 78: Devices list area
This section displays a detailed list of discovered devices for every scanned computer, including:
Device name, description and category
Connectivity port
Connection status, i.e., whether the device is currently connected or not.
7.3 Adding discovered devices to the database
You can select one or more of the discovered devices from the Devices list and add them to the
devices database. These devices are then retrieved from this database whenGFI EndPointSecurity
Vista de pagina 103
1 2 ... 99 100 101 102 103 104 105 106 107 108 109 ... 155 156

Comentarios a estos manuales

Sin comentarios