
List of Tables
Table 1: Terms and conventions used in this manual 11
Table 2: GFI EndPointSecurityfeatures 13
Table 3: Deployment and Monitoring protection policy 15
Table 4: Deployment and Monitoring protection policy 17
Table 5: Deployment and Monitoring protection policy 17
Table 6: System requirements - Hardware 21
Table 7: Auto Discovery settings 26
Table 8: Auto Discovery settings 26
Table 9: Database backend options 27
Table 10: Add Computer(s) dialog options 38
Table 11: Logon credentials options 43
Table 12: Auto Discovery settings 50
Table 13: File options - User options 87
Table 14: Volume encryption - Security options 92
Table 15: Volume encryption - User options 93
Table 16: Volume encryption - Traveler options 94
Table 17: Database maintenance options 127
Table 18: Update options 142
Table 19: Troubleshooting - Common issues 147
Komentáře k této Příručce