GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Manuál Strana 34

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 156
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 33
GFI EndPointSecurity 3 Achieving Results | 34
3 Achieving Results
This chapter provides you with step by step instructions about how to block unauthorized devices
from the network and secure endpoints using GFI EndPointSecurity. This chapter helps you achieve
positive legal compliance results, while ensuring that your network is protected using the most up-to-
date vulnerability detection methods and techniques.
Topics in this chapter
3.1 Preventing data leaks and malware infections 34
3.2 Automating network protection 35
3.3 Monitoring network activity from a central location 37
3.1 Preventing data leaks and malware infections
Most data theft happens internally by employees manually transferring data onto removable storage
devices. Using unauthorized removable storage devices can expose the network to a higher risk of
malware infections. GFI EndPointSecurity enables you to comprehensively control access to portable
storage devices with minimal administrative effort. Temporary access can be granted to end-users for
a device on a particular computer for a particular timeframe.
1. Deploy agents on computers that require protection
GFI EndPointSecurity Agents are used to secure computers on the network. Agents can be deployed
manually, when installing agents on specific computers or automatically when installing agents on
every new endpoint discovered on the network. Refer to the following sections for information
about:
Adding computers manually
Adding computers automatically
Configuring log on credentials.
2. Create a protection policy to block removable storage
Agents secure computers based on settings of an assigned security policy. You can create as many
security policies as required, and each policy can contain different settings for different
authorization levels. Refer to the following sections for information about:
Creating protection policies
Assigning protection policies
Deploying policies immediately
Scheduling policy deployment
Deploying policies through Active Directory
Verifying protection policy deployment.
Zobrazit stránku 33
1 2 ... 29 30 31 32 33 34 35 36 37 38 39 ... 155 156

Komentáře k této Příručce

Žádné komentáře