GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Manual Pagina 17

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 156
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 16
GFI EndPointSecurity 1 Introduction | 17
Stage Description
Stage 1 - Device
attached to com-
puter
The user attaches a device to a target computer protected by GFI EndPointSecurity.
Stage 2 - Pro-
tection policy
enforcement
The GFI EndPointSecurity agent installed on the target computer detects the attached device and
goes through the protection policy rules applicable to the computer/user. This operation deter-
mines whether the device is allowed or blocked from being accessed.
Stage 3 - Device
usage
allowed/blocked
The user either receives an error message indicating that device usage has been blocked, or else is
allowed to access the device.
Table 4: Deployment and Monitoring protection policy
1.7 How GFI EndPointSecurityworks - Temporary Access
GFI EndPointSecurity temporary access operations can be divided in three logical stages:
Figure 3: Requesting/granting temporary access
The table below describes the stages depicted above:
Stage Description
Stage 1 - User
requests tem-
porary device
access
The user executes the GFI EndPointSecurity Temporary Access tool from the computer on which the
device is to be accessed. The tool is used to generate a request code, which the user communicates
with the administrator. The user also needs to inform the administrator on the device types or con-
nection ports that need to be accessed, and for how long will devices/ports access be required.
Stage 2 -
Administrator
grants tem-
porary access
The administrator uses the Temporary Access feature within the GFI EndPointSecurity management
console to enter the request code, specify devices/ports and time restrictions. An unlock code is gen-
erated which the administrator then communicates with the user.
Stage 3 - User
activates tem-
porary device
access
Once the user receives the unlock code sent by the administrator, this code is entered in the GFI End-
PointSecurity Temporary Access tool to activate the temporary access and to be able to use the
required devices/ports.
Table 5: Deployment and Monitoring protection policy
Vista de pagina 16
1 2 ... 12 13 14 15 16 17 18 19 20 21 22 ... 155 156

Comentarios a estos manuales

Sin comentarios