GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Manual Pagina 16

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 156
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 15
GFI EndPointSecurity 1 Introduction | 16
Stage Description
Stage 3 -
Deploy pro-
tection pol-
icy
The administrator deploys the protection policy. Upon the first deployment of a protection policy, a GFI
EndPointSecurity agent is automatically installed on the remote network target computer. Upon the
next deployments of the same protection policy, the agent will be updated and not re-installed.
Stage 4 -
Monitor
device
access
When agents have been deployed, the administrator can monitor all device access attempts via the Man-
agement Console; receive alerts and generate reports through GFI EndPointSecurity GFI ReportPack.
1.6 How GFI EndPointSecurity works - Device Access
GFI EndPointSecurity device access operations can be divided in three logical stages:
Figure 2: Device access
The table below describes the stages depicted above:
Vista de pagina 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 155 156

Comentarios a estos manuales

Sin comentarios