GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Manual Pagina 13

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 156
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 12
GFI EndPointSecurity 1 Introduction | 13
GFI EndPointSecurity Management Console Management Console
GFI EndPointSecurity Agent.
1.3.1 GFI EndPointSecurity Management Console
Through the Management Console, you can:
Create and manage protection policies and specify which device categories and connectivity ports
are to be controlled
Remotely deploy protection policies and agents on to your target computers Grant temporary
access to target computers to use specific devices
View the device protection status of every computer that is being monitored
Carry out scans on target computers to identify devices currently or previously connected
Check logs and analyze what devices have been connected to every network computer
Keeps track of which computers have an agent deployed and which agents need to be updated.
1.3.2 GFI EndPointSecurity Agent
The GFI EndPointSecurityagent is a client-side service responsible for the implementation of the
protection policies on target computer(s). This service is automatically installed on the remote
network target computer after the first deployment of the relevant protection policy through the GFI
EndPointSecurity management console. Upon the next deployments of the same protection policy, the
agent will be updated and not re-installed.
1.4 Key Features
GFI EndPointSecurity offers the following main features:
GFI EndPointSecurity features
Group-based
protection
control
In GFI EndPointSecurity you can configure and place computers into groups that are governed by one pro-
tection policy. This allows you to configure a single protection policy and apply it to all the computers
that are members of that group.
Granular
access
control
GFI EndPointSecurity enables you to allow or deny access to a specific device as well as to assign (where
applicable) full or read only’ privileges over every supported device (e.g. CD/DVD drives, PDAs) on a
user by user basis.
Scheduled
deployment
GFI EndPointSecurity allows you to schedule the deployment of protection policies and any related con-
figuration changes without the need to keep to the GFI EndPointSecurity management console open.
The deployment feature also handles failed deployments through automatic rescheduling.
Access
control
Apart blocking a range of device categories, GFI EndPointSecurity also allows blocking:
By file type - for example, allow the user to read *.doc files but block access to all *.exe files
By physical port - all devices connected to particular physical ports, for example, all devices con-
nected to USB ports
By device ID - block access to a single device based on the unique Hardware ID of the device.
NOTE
In Microsoft Windows 7, a feature called BitLocker To Go can be used to protect and encrypt data on
removable devices. GFI EndPointSecurity performs checks on real file types encrypted with
Windows 7 BitLocker To Go.
Device
whitelist
and blacklist
The administrator can define a list of specific devices that are permanently allowed and others that are
permanently banned.
Table 2: GFI EndPointSecurityfeatures
Vista de pagina 12
1 2 ... 8 9 10 11 12 13 14 15 16 17 18 ... 155 156

Comentarios a estos manuales

Sin comentarios