
6 Customizing Protection Policies 57
6.1 Configuring controlled device categories 57
6.2 Configuring controlled connectivity ports 58
6.3 Configuring power users 59
6.4 Configuring access permissions for device categories 60
6.5 Configuring access permissions for connectivity ports 63
6.6 Configuring access permissions for specific devices 65
6.7 Viewing access permissions 68
6.8 Configuring priorities for permissions 70
6.9 Configuring device blacklist 70
6.10 Configuring device whitelist 74
6.11 Configuring temporary access privileges 77
6.11.1 Requesting temporary access for a protected computer 77
6.11.2 Granting temporary access to a protected computer 79
6.12 Configuring file-type filters 81
6.13 Configuring content awareness 83
6.13.1 Managing content awareness options 83
6.13.2 Managing template options 85
6.14 Configuring file options 86
6.15 Configuring security encryption 88
6.15.1 Configuring Microsoft BitLocker To Go devices 88
6.15.2 Configuring Volume Encryption 90
6.16 Configuring event logging 94
6.17 Configuring alerts 96
6.18 Setting a policy as the default policy 99
7 Discovering Devices 100
7.1 Running a device scan 100
7.2 Analyzing device scan results 103
7.2.1 Computers 104
7.2.2 Devices list 104
7.3 Adding discovered devices to the database 104
8 Monitoring Device Usage Activity 106
8.1 Statistics 106
8.1.1 Protection Status 107
8.1.2 Device Usage by Device Type 107
8.1.3 Device Usage by Connectivity Port 108
8.2 Activity 108
8.2.1 Activity Log 108
8.2.2 Advanced Filtering 109
8.2.3 Logs Browser 110
8.2.4 Creating event queries 111
9 Status Monitoring 113
9.1 Risk Assessment view 113
9.2 Statistics view 115
Comentarios a estos manuales