
GFI EndPointSecurity 1 Introduction | 16
Stage Description
Stage 3 -
Deploy pro-
tection pol-
icy
The administrator deploys the protection policy. Upon the first deployment of a protection policy, a GFI
EndPointSecurity agent is automatically installed on the remote network target computer. Upon the
next deployments of the same protection policy, the agent will be updated and not re-installed.
Stage 4 -
Monitor
device
access
When agents have been deployed, the administrator can monitor all device access attempts via the Man-
agement Console; receive alerts and generate reports through GFI EndPointSecurity GFI ReportPack.
1.6 How GFI EndPointSecurity works - Device Access
GFI EndPointSecurity device access operations can be divided in three logical stages:
Figure 2: Device access
The table below describes the stages depicted above:
Comentarios a estos manuales