GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Manual

Consulte online ou descarregue Manual para Licenças/atualizações de software GFI EndPointSecurity, Add, 100-249u, 1Y, ENG. GFI EndPointSecurity, Add, 100-249u, 2Y, ENG Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 156
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes

Resumo do Conteúdo

Página 1 - Administrator Guide

GFIProduct ManualAdministrator Guide

Página 2

List of TablesTable 1: Terms and conventions used in this manual 11Table 2: GFI EndPointSecurityfeatures 13Table 3: Deployment and Monitoring protecti

Página 3 - Contents

GFI EndPointSecurity 7 Discovering Devices | 1007 Discovering DevicesGFI EndPointSecurity enables you to transparently and rapidly query organizationa

Página 4

GFI EndPointSecurity 7 Discovering Devices | 1011. Click Scanning tab.2. From Common tasks, click Options.3. From the Options dialog, select Logon Cre

Página 5

GFI EndPointSecurity 7 Discovering Devices | 102Screenshot 75: Running a device scan - Scan device categories tab5. Click Scan Device Categories tab a

Página 6 - List of Figures

GFI EndPointSecurity 7 Discovering Devices | 103Screenshot 76: Running a device scan - Scan ports tab6. Click Scan Ports tab and select the connection

Página 7

GFI EndPointSecurity 7 Discovering Devices | 1047.2.1 ComputersScreenshot 77: Computers areaThis section displays device scan summary results for ever

Página 8

GFI EndPointSecurity 7 Discovering Devices | 105lists the devices currently connected to the target computers for the blacklist and whitelist. Forinfo

Página 9

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 1068 Monitoring Device Usage ActivityThis chapter provides you with information about monito

Página 10 - List of Tables

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 107Protection StatusDevice Usage by Device TypeDevice Usage by Connectivity Port8.1.1 Protec

Página 11 - 1 Introduction

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 1088.1.3 Device Usage by Connectivity PortScreenshot 83: Device Usage by Connectivity Port a

Página 12

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 109Screenshot 84: Activity Log sub-tabTo access the Activity Log sub-tab, from GFI EndPointS

Página 13 - 1.4 Key Features

GFI EndPointSecurity 1 Introduction | 111 IntroductionThe proliferation of consumer devices such as iPods, USB devices and smartphones has increased t

Página 14

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 110Screenshot 85: Activity Log sub-tab - Advanced filteringTo access advanced filtering opti

Página 15

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 111Screenshot 86: Logs Browser sub-tabTo access the Logs Browser sub-tab, from GFI EndPointS

Página 16 - Figure 2: Device access

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 112Screenshot 87: Query Builder options4. In the Query Builder dialog, specify a name and a

Página 17

GFI EndPointSecurity 9 Status Monitoring | 1139 Status MonitoringThis chapter provides with information related to monitoring the status of GFI EndPoi

Página 18

GFI EndPointSecurity 9 Status Monitoring | 114Screenshot 88: Risk Assessment sub-tabTo access the Risk Assessment sub-tab, from GFI EndPointSecurity m

Página 19

GFI EndPointSecurity 9 Status Monitoring | 115Feature DescriptionThis section lists the cumulative values of the number of:Scanned endpointsSuccessful

Página 20

GFI EndPointSecurity 9 Status Monitoring | 116Screenshot 89: Statistics sub-tabTo access the Statistics sub-tab, from GFI EndPointSecurity management

Página 21 - 2.1 System requirements

GFI EndPointSecurity 9 Status Monitoring | 117This section graphically represents daily device usage on computers, differentiating between devicesthat

Página 22 - Firewall ports

GFI EndPointSecurity 9 Status Monitoring | 118Screenshot 93: Status sub-tabFeature DescriptionThis section lists:The operational status of GFI EndPoin

Página 23

GFI EndPointSecurity 9 Status Monitoring | 119Feature DescriptionThis section graphically represents all agents deployed on network computers, differe

Página 24

GFI EndPointSecurity 1 Introduction | 12Better storage capacityImproved performanceEasier and faster to installPhysically small enough to carry in a p

Página 25

GFI EndPointSecurity 9 Status Monitoring | 1209.4.1 About Deployment status viewScreenshot 94: Deployment sub-tabUse the Deployment sub-tab to view:Cu

Página 26

GFI EndPointSecurity 9 Status Monitoring | 1219.4.2 Current DeploymentsScreenshot 95: Current Deployments areaThis section displays a list of deployme

Página 27

GFI EndPointSecurity 9 Status Monitoring | 1229.4.5 Deployment HistoryScreenshot 98: Deployment History areaThis section displays an audit trail for a

Página 28

GFI EndPointSecurity 10 Reporting | 12310 ReportingThe GFI EndPointSecurity GFI ReportPack is a fully-fledged reporting add-on to GFI EndPointSecurity

Página 29 - 2.6 Testing your installation

GFI EndPointSecurity 10 Reporting | 124Screenshot 99: Digest Report options - General tab3. From the General tab of the Digest Report dialog, select/u

Página 30 - Accessing a CD/DVD disc

GFI EndPointSecurity 10 Reporting | 125Screenshot 100: Digest Report options - Details tab5. Click Details tab to select/unselect report content items

Página 31

GFI EndPointSecurity 11 Managing the Database Backend | 12611 Managing the Database BackendThis chapter provides you information related to managing a

Página 32

GFI EndPointSecurity 11 Managing the Database Backend | 127Screenshot 101: Maintenance options4. From the Maintenance dialog, configure how often even

Página 33 - Re-accessing a CD/DVD disc

GFI EndPointSecurity 11 Managing the Database Backend | 12811.2 Using an existing SQL Server instanceTo connect to an existing SQLServer instance:1.

Página 34 - 3 Achieving Results

GFI EndPointSecurity 12 Alerting Options | 12912 Alerting OptionsThis chapter provides you with information about configuring the GFI EndPointSecurity

Página 35

GFI EndPointSecurity 1 Introduction | 13GFI EndPointSecurity Management Console Management ConsoleGFI EndPointSecurity Agent.1.3.1 GFI EndPointSecurit

Página 36

GFI EndPointSecurity 12 Alerting Options | 1303. From Email tab , click Add..., to specify your mail server settings. Click OK to close the Mail-serve

Página 37

GFI EndPointSecurity 12 Alerting Options | 131Screenshot 105: Alerting Options - SMS tab6. Click SMS tab and from the Select SMS drop-down menu, selec

Página 38 - 4 Adding Target Computers

GFI EndPointSecurity 12 Alerting Options | 1321. Click Configuration tab > Options sub-tab.2. From Configure, click Alerting Options > Users sub

Página 39

GFI EndPointSecurity 12 Alerting Options | 133Screenshot 107: EndPointSecurityAdministrator Properties options - Working Hours tab5. Click Working Hou

Página 40 - Daily, Weekly or Monthly

GFI EndPointSecurity 12 Alerting Options | 134Screenshot 108: EndPointSecurityAdministrator Properties options - Alerts tab6. Click Alerts tab and sel

Página 41

GFI EndPointSecurity 12 Alerting Options | 1357. Click Member Of tab and click Add to add the user to notification group(s).8. Click Apply and OK.12.3

Página 42

GFI EndPointSecurity 12 Alerting Options | 136Deleting groups of alert recipients12.4.1 Creating groups of alert recipientsTo create a new group of al

Página 43

GFI EndPointSecurity 12 Alerting Options | 1371. Click Configuration tab > Options sub-tab.2. Click Alerting Options > Groups sub-node.3. From t

Página 44

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 13813 Configuring GFI EndPointSecurityGFI EndPointSecurity enables you to configure the com

Página 45

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 1393. From the Communication tab, key in the required TCP/IP port number to be used for com

Página 46

GFI EndPointSecurity 1 Introduction | 14GFI EndPointSecurity featuresPower users The administrator can specify users or groups who would always have f

Página 47

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 140Screenshot 113: Advanced Options - Agent Security tab5. Click Agent Security tab and sel

Página 48 - 9. Click Next

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 141Screenshot 114: Custom Messages dialog options3. Select/unselect the message types you w

Página 49

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 142Screenshot 115: General tab - Updates3. From the right pane, configure the options descr

Página 50

GFI EndPointSecurity 14 Miscellaneous | 14314 MiscellaneousThe miscellaneous chapter gathers all the other information that falls outside the initial

Página 51

GFI EndPointSecurity 14 Miscellaneous | 144Screenshot 117: Computers sub-tab - delete computer(s)3. From the right pane, right-click target computer t

Página 52

GFI EndPointSecurity 14 Miscellaneous | 145Screenshot 118: Deployment sub-tab6. From the Deployment History area, confirm the successful completion of

Página 53

GFI EndPointSecurity 14 Miscellaneous | 146Screenshot 119: Uninstallation information messageNoteIf any agents are still installed, an information dia

Página 54

GFI EndPointSecurity 15 Troubleshooting and Support | 14715 Troubleshooting and SupportThis chapter explains how to resolve any issues encountered dur

Página 55

GFI EndPointSecurity 15 Troubleshooting and Support | 148Issue Possible Cause Possible SolutionInstallationfailed.Installation of the GFI End-PointSec

Página 56

GFI EndPointSecurity 15 Troubleshooting and Support | 149Web ForumUser to user technical support is available via the GFI web forum. Access the web fo

Página 57

GFI EndPointSecurity 1 Introduction | 15Figure 1: Protection policy - Deployment and MonitoringThe table below describes the stages depicted above:Sta

Página 58

GFI EndPointSecurity 16 Glossary | 15016 GlossaryAAccess permissionsA set of permissions (access, read and write) that are assigned to users and group

Página 59 - 6.3 Configuring power users

GFI EndPointSecurity 16 Glossary | 151DDatabase backendA database used by GFI EndPointSecurity to keep an audit trail of all events generated by GFIEn

Página 60

GFI EndPointSecurity 16 Glossary | 152GFI EndPointSecurity applicationA server-side security application that aids in maintaining data integrity by pr

Página 61

GFI EndPointSecurity 16 Glossary | 153Protection policyA set of device access and connectivity port permissions that can be configured to suit yourcom

Página 62

17 IndexAaccess permissions 30, 33, 35, 49, 60, 63, 65, 68Active Directory 12, 14, 34, 36, 50, 54, 59-60, 63, 65,68, 70, 81, 96, 123, 131, 135alert re

Página 63

Troubleshooter wizard 148Troubleshooting 147Uuser messages 35, 138, 140Vversions 11WWeb Forum 149wizardCreate Protection Policy wizardQuick Start wiza

Página 64

USA, CANADA AND CENTRAL AND SOUTH AMERICA15300 Weston Parkway, Suite 104 Cary, NC 27513, USATelephone: +1 (888) 243-4329Fax: +1 (919) 379-3402ussales@

Página 65

GFI EndPointSecurity 1 Introduction | 16Stage DescriptionStage 3 -Deploy pro-tection pol-icyThe administrator deploys the protection policy. Upon the

Página 66 - 3. Click Security sub-node

GFI EndPointSecurity 1 Introduction | 17Stage DescriptionStage 1 - Deviceattached to com-puterThe user attaches a device to a target computer protecte

Página 67

GFI EndPointSecurity 1 Introduction | 181.8 Supported device categoriesIn GFI EndPointSecurity devices are organized into the following categories:Flo

Página 68

GFI EndPointSecurity 1 Introduction | 19Zip drivesTape drivesMO (magneto optical) drives (internal and external).1.9 Supported connectivity portsGFI E

Página 69

The information and content in this document is provided for informational purposes only and isprovided "as is" with no warranty of any kind

Página 70

GFI EndPointSecurity 1 Introduction | 20Screenshot 1: Navigating GFI EndPointSecurity user interfaceGFI EndPointSecurity Management Console consists o

Página 71

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 212 Installing GFI EndPointSecurityThis chapter provides you with information about preparing

Página 72

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 22Agent - Hardware requirementsProcessor: 1GHz processor clock speed or betterRAM: 256 MB (mi

Página 73

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 23Security settingsOptions:Logging optionsDatabase options.Upgrading from GFI LanGuard Portab

Página 74

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 24Screenshot 2: GFI EndPointSecurity installation: domain administrator account setup5. Key i

Página 75

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 25NoteThe license key can be keyed in after installation or expiration of the evaluation peri

Página 76

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 26Tab DescriptionScanArea Select the target area on which GFI EndPointSecurity scans the com

Página 77

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 2712. From Users Groups, select/unselect Configure Users Groups to create domain/workgroup us

Página 78

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 28Screenshot 4: Navigating GFI EndPointSecurity user interfaceGFI EndPointSecurity Management

Página 79

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 292.6 Testing your installationOnce GFI EndPointSecurity is installed and the Quick Start wiz

Página 80

Contents1 Introduction 111.0.1 Terms and conventions used in this guide 111.1 Portable media device threats 111.2 About GFI EndPointSecurity 121.3 Com

Página 81

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 30NoteIf the deployment of the agent on to the local computer is not up-to-date, thenmanually

Página 82

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 31Screenshot 5: Selecting control entities8. In the Add permissions… dialog select the Device

Página 83

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 32Screenshot 7: Adding users or groups10. Click Add… and specify the user with no administrat

Página 84

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 33To deploy the protection policy updates on to the local computer:1. From the right pane, cl

Página 85

GFI EndPointSecurity 3 Achieving Results | 343 Achieving ResultsThis chapter provides you with step by step instructions about how to block unauthoriz

Página 86 - 6.14 Configuring file options

GFI EndPointSecurity 3 Achieving Results | 353. Configure protection policy settingsConfigure the protection policy to block removable storage devices

Página 87 - Option Description

GFI EndPointSecurity 3 Achieving Results | 361. Automatically discover devices on the networkGFI EndPointSecurity enables you to automatically add new

Página 88

GFI EndPointSecurity 3 Achieving Results | 373.3 Monitoring network activity from a central locationAgents generate activity logs that are stored in a

Página 89

GFI EndPointSecurity 4 Adding Target Computers | 384 Adding Target ComputersGFI EndPointSecurity enables you to specify the computers you intend to de

Página 90

GFI EndPointSecurity 4 Adding Target Computers | 39Option DescriptionClick From Domain…. Specify the required computer(s) from within the domain/workg

Página 91

6 Customizing Protection Policies 576.1 Configuring controlled device categories 576.2 Configuring controlled connectivity ports 586.3 Configuring pow

Página 92

GFI EndPointSecurity 4 Adding Target Computers | 40Screenshot 10: Auto Discovery options - Auto Discovery tab3. Click Start discovery now to run auto

Página 93

GFI EndPointSecurity 4 Adding Target Computers | 41Screenshot 11: Auto Discovery options - Discovery Area tab6. Click Discovery Area tab and select th

Página 94

GFI EndPointSecurity 4 Adding Target Computers | 42Screenshot 12: Auto Discovery options - Actions tab7. Click Actions tab and from the Use as default

Página 95

GFI EndPointSecurity 4 Adding Target Computers | 431. Click Configuration tab > Computers.2. Right-click on a computer from the list and click Set

Página 96 - 6.17 Configuring alerts

GFI EndPointSecurity 4 Adding Target Computers | 44NoteBy default, GFI EndPointSecurity is configured to use the logon credentials of thecurrently log

Página 97 - SMS messages

GFI EndPointSecurity 5 Managing Protection Policies | 455 Managing Protection PoliciesThis chapter describes how to deploy newly created protection po

Página 98

GFI EndPointSecurity 5 Managing Protection Policies | 463. Key in a unique name for the new protection policy.4. Select whether you want to create a b

Página 99

GFI EndPointSecurity 5 Managing Protection Policies | 47Screenshot 16: Controlled Device Categories options6. From the Controlled Device Categories di

Página 100 - 7 Discovering Devices

GFI EndPointSecurity 5 Managing Protection Policies | 48Screenshot 17: Controlled connectivity ports options8. From the Controlled connectivity ports

Página 101

GFI EndPointSecurity 5 Managing Protection Policies | 49Screenshot 18: Creating a new policy - Global Permissions settings10. From the Global Permissi

Página 102

9.2.1 Protection Status 1169.2.2 Device Usage by Device Type 1179.2.3 Device Usage by Connectivity Port 1179.3 Status view 1179.4 Deployment status vi

Página 103

GFI EndPointSecurity 5 Managing Protection Policies | 50NoteIn addition, GFI EndPointSecurity can also allow or block Active Directory (AD) usersand/o

Página 104 - Screenshot 77: Computers area

GFI EndPointSecurity 5 Managing Protection Policies | 51Tab DescriptionContentAwarenessGFI EndPointSecurity enables you to specify the file content re

Página 105

GFI EndPointSecurity 5 Managing Protection Policies | 524. From the left pane, click the Assign Protection Policyhyperlink in the Actions section.Scre

Página 106 - 8.1 Statistics

GFI EndPointSecurity 5 Managing Protection Policies | 53Screenshot 20: Deploying a policy immediately - Deployment sub-tab5.2.2 Scheduled policy deplo

Página 107

GFI EndPointSecurity 5 Managing Protection Policies | 54Screenshot 21: Schedule deployment options4. From Schedule deployment dialog select the deploy

Página 108 - 8.2 Activity

GFI EndPointSecurity 5 Managing Protection Policies | 55Deployment history areaAgents' status area5.3.1 Deployment HistoryUse the information dis

Página 109

GFI EndPointSecurity 5 Managing Protection Policies | 56NoteIf a target computer is offline, the deployment of the relevant policy is rescheduled fora

Página 110

GFI EndPointSecurity 6 Customizing Protection Policies | 576 Customizing Protection PoliciesThis chapter provides you with information related to modi

Página 111

GFI EndPointSecurity 6 Customizing Protection Policies | 581. Click Configuration tab > Protection Policies.2. From Protection Policies > Securi

Página 112

GFI EndPointSecurity 6 Customizing Protection Policies | 59NoteUnspecified ports will be fully accessible from the target computers covered by theprot

Página 113 - 9 Status Monitoring

List of FiguresScreenshot 1: Navigating GFI EndPointSecurity user interface 20Screenshot 2: GFI EndPointSecurity installation: domain administrator ac

Página 114 - This section shows:

GFI EndPointSecurity 6 Customizing Protection Policies | 60covered by a protection policy. You can define sets of power users on a policy-by-policy ba

Página 115 - 9.2 Statistics view

GFI EndPointSecurity 6 Customizing Protection Policies | 61When a device category is not set to be controlled by the particular security policy, the r

Página 116

GFI EndPointSecurity 6 Customizing Protection Policies | 62Screenshot 28: Add permissions options - Device categories5. Enable or disable the required

Página 117 - 9.3 Status view

GFI EndPointSecurity 6 Customizing Protection Policies | 636. Click Add… to specify the user(s)/group(s) that will have access to the device categorie

Página 118 - Screenshot 93: Status sub-tab

GFI EndPointSecurity 6 Customizing Protection Policies | 64Screenshot 31: Add permissions options - Control entities5. In the Add permissions dialog s

Página 119

GFI EndPointSecurity 6 Customizing Protection Policies | 657. Click Add… to specify the user(s)/group(s) that will have access to the connectivity por

Página 120

GFI EndPointSecurity 6 Customizing Protection Policies | 661. Click Configuration tab > Protection Policies.2. From Protection Policies > Securi

Página 121

GFI EndPointSecurity 6 Customizing Protection Policies | 67Screenshot 35: Add permissions options - Specific devices6. Enable or disable the required

Página 122

GFI EndPointSecurity 6 Customizing Protection Policies | 687. Click Add… to specify the user(s)/group(s) that will have access to the specific devices

Página 123 - 10 Reporting

GFI EndPointSecurity 6 Customizing Protection Policies | 69Screenshot 38: Protection Policies sub-tab - devices viewScreenshot 39: Protection Policies

Página 124

Screenshot 39: Protection Policies sub-tab - users view 69Screenshot 40: Protection Policies sub-tab - Security area 70Screenshot 41: Black list optio

Página 125 - 7. Click Apply and OK

GFI EndPointSecurity 6 Customizing Protection Policies | 704. From the left pane, click Switch to devices view or Switch to users view in the Common t

Página 126 - Topics in this chapter

GFI EndPointSecurity 6 Customizing Protection Policies | 71For an updated list of devices currently connected to the target computers, run a device sc

Página 127

GFI EndPointSecurity 6 Customizing Protection Policies | 72Screenshot 42: Select Devices options5. In the Select Devices dialog enable or disable the

Página 128

GFI EndPointSecurity 6 Customizing Protection Policies | 73Screenshot 43: Select Devices options - Select device serials6. Select the required serials

Página 129 - 12 Alerting Options

GFI EndPointSecurity 6 Customizing Protection Policies | 74Screenshot 44: Select Devices options - Edit Device serialsTo deploy protection policy upda

Página 130

GFI EndPointSecurity 6 Customizing Protection Policies | 75Screenshot 45: White list options4. In the Whitelist dialog, click Add… to select devices t

Página 131

GFI EndPointSecurity 6 Customizing Protection Policies | 765. In the Select Devices dialog enable or disable the devices to add to the whitelist from

Página 132

GFI EndPointSecurity 6 Customizing Protection Policies | 77Screenshot 48: Select Devices options - Edit Device serialsTo deploy protection policy upda

Página 133

GFI EndPointSecurity 6 Customizing Protection Policies | 78Screenshot 49: Devices Temporary Access icon1. From the Control Panel click Devices Tempora

Página 134

GFI EndPointSecurity 6 Customizing Protection Policies | 796.11.2 Granting temporary access to a protected computerTo grant temporary access:1. From G

Página 135

Screenshot 79: Devices list area - Add device to devices database 105Screenshot 80: Statistics sub-tab 106Screenshot 81: Protection Status area 107Scr

Página 136

GFI EndPointSecurity 6 Customizing Protection Policies | 80Screenshot 52: Grant temporary access options - Device categories and connection ports5. En

Página 137

GFI EndPointSecurity 6 Customizing Protection Policies | 817. Take note of the Unlock code generated. Communicate the code to the user requesting tem-

Página 138

GFI EndPointSecurity 6 Customizing Protection Policies | 82Screenshot 54: File-type Filter options4. In the File-type Filter dialog select the restric

Página 139 - 1116 is specified

GFI EndPointSecurity 6 Customizing Protection Policies | 83Screenshot 55: File-type Filter and user options5. Click Add… and select or key in the file

Página 140

GFI EndPointSecurity 6 Customizing Protection Policies | 841. From GFI EndPointSecurity management console, click Configuration tab > Protection Po

Página 141

GFI EndPointSecurity 6 Customizing Protection Policies | 85Screenshot 57: Add a new template5. Click Add… and select or key in the template from the T

Página 142 - Table 18: Update options

GFI EndPointSecurity 6 Customizing Protection Policies | 86Screenshot 59: Managing templates6.14 Configuring file optionsGFI EndPointSecurity enables

Página 143

GFI EndPointSecurity 6 Customizing Protection Policies | 87Screenshot 60: File options4. In the File options dialog select from the following options:

Página 144

GFI EndPointSecurity 6 Customizing Protection Policies | 88..Screenshot 61: File-type Filter and user options5. From the Archive Options tab, enable /

Página 145

GFI EndPointSecurity 6 Customizing Protection Policies | 89Screenshot 62: Encryption options - General tab4. Select Enable detection of encrypted devi

Página 146

Screenshot 119: Uninstallation information message 146Screenshot 120: Specifying contact and purchase details 148Screenshot 121: Specifying issue deta

Página 147 - Common Issues

GFI EndPointSecurity 6 Customizing Protection Policies | 905. Click Add… to specify the users and groups with access to encrypted devices.Screenshot 6

Página 148 - GFI SkyNet

GFI EndPointSecurity 6 Customizing Protection Policies | 911. From GFI EndPointSecurity management console, click Configuration tab > Protection Po

Página 149 - Documentation

GFI EndPointSecurity 6 Customizing Protection Policies | 92Screenshot 66: Encryption options -Security tab5. From the Security tab, configure the feat

Página 150 - 16 Glossary

GFI EndPointSecurity 6 Customizing Protection Policies | 93Screenshot 67: Encryption options - Users tab6. Select Users tab and configure the followin

Página 151

GFI EndPointSecurity 6 Customizing Protection Policies | 94Screenshot 68: Encryption options - Traveler tabNoteTraveler is an application that can be

Página 152

GFI EndPointSecurity 6 Customizing Protection Policies | 951. Click Configuration tab > Protection Policies.2. From Protection Policies > Securi

Página 153

GFI EndPointSecurity 6 Customizing Protection Policies | 96Screenshot 70: Logging Options - Filter tab6. Select Filter tab, and select any of the foll

Página 154 - 17 Index

GFI EndPointSecurity 6 Customizing Protection Policies | 97Screenshot 71: Alerting Options - General tab4. In the Alerting Options dialog, click Gener

Página 155 - Quick Start wizard

GFI EndPointSecurity 6 Customizing Protection Policies | 98Screenshot 72: Alerting Options - Configuring users and groups5. For each alert type enable

Página 156

GFI EndPointSecurity 6 Customizing Protection Policies | 99Screenshot 73: Alerting Options - Filter tab6. Select Filter tab, select any of the followi

Comentários a estes Manuais

Sem comentários