
Contents
1 Introduction 11
1.0.1 Terms and conventions used in this guide 11
1.1 Portable media device threats 11
1.2 About GFI EndPointSecurity 12
1.3 Components of GFI EndPointSecurity 12
1.3.1 GFI EndPointSecurity Management Console 13
1.3.2 GFI EndPointSecurity Agent 13
1.4 Key Features 13
1.5 How GFI EndPointSecurity works - Deployment and Monitoring 14
1.6 How GFI EndPointSecurity works - Device Access 16
1.7 How GFI EndPointSecurityworks - Temporary Access 17
1.8 Supported device categories 18
1.9 Supported connectivity ports 19
1.10 Navigating the Management Console 19
2 Installing GFI EndPointSecurity 21
2.1 System requirements 21
2.2 Upgrading GFI EndPointSecurity 22
2.3 Installing a new instance of GFI EndPointSecurity 23
2.4 Post-install configurations 25
2.5 Navigating the Management Console 27
2.6 Testing your installation 29
2.6.1 Test preconditions 29
2.6.2 Test case 30
2.6.3 Reverting to default settings 33
3 Achieving Results 34
3.1 Preventing data leaks and malware infections 34
3.2 Automating network protection 35
3.3 Monitoring network activity from a central location 37
4 Adding Target Computers 38
4.1 Adding computers manually 38
4.2 Adding computers automatically 39
4.3 Configuring log on credentials 42
5 Managing Protection Policies 45
5.1 Creating a new protection policy 45
5.2 Assigning a Protection Policy 51
5.2.1 Deploy immediately 52
5.2.2 Scheduled policy deployment 53
5.2.3 Deploying policies through Active Directory 54
5.3 Verifying protection policy deployment 54
5.3.1 Deployment History 55
5.3.2 Agents' status 55
Komentáře k této Příručce