
GFI EndPointSecurity 6 Customizing Protection Policies | 59
Note
Unspecified ports will be fully accessible from the target computers covered by the
protection policy. As a result, GFI EndPointSecurity cannot monitor and block devices
connected to a port that is not controlled by the protection policy.
To configure which ports will be controlled by a specific protection policy:
1. Click Configuration tab > Protection Policies.
2. From Protection Policies > Security, select the protection policy to configure.
3. Click Security.
4. From Common tasks, click Edit controlled ports….
Screenshot 25: Controlled connectivity ports options
5. From the Controlled connectivity ports dialog, select/unselect the required connectivity ports
that will be controlled by the protection policy, and click OK.
To deploy protection policy updates on target computers specified in the policy:
1. Click Configuration tab > Computers.
2. From Common tasks, click Deploy to all computers….
6.3 Configuring power users
GFI EndPointSecurity enable you to specify Active Directory (AD) users and/or user groups, as power
users. Power users are automatically given full access to devices connected to any target computer
Comentarios a estos manuales