GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Manuál Strana 16

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 156
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 15
GFI EndPointSecurity 1 Introduction | 16
Stage Description
Stage 3 -
Deploy pro-
tection pol-
icy
The administrator deploys the protection policy. Upon the first deployment of a protection policy, a GFI
EndPointSecurity agent is automatically installed on the remote network target computer. Upon the
next deployments of the same protection policy, the agent will be updated and not re-installed.
Stage 4 -
Monitor
device
access
When agents have been deployed, the administrator can monitor all device access attempts via the Man-
agement Console; receive alerts and generate reports through GFI EndPointSecurity GFI ReportPack.
1.6 How GFI EndPointSecurity works - Device Access
GFI EndPointSecurity device access operations can be divided in three logical stages:
Figure 2: Device access
The table below describes the stages depicted above:
Zobrazit stránku 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 155 156

Komentáře k této Příručce

Žádné komentáře