GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Handbuch

Stöbern Sie online oder laden Sie Handbuch nach Softwarelizenzen / Upgrades GFI EndPointSecurity, Add, 100-249u, 1Y, ENG herunter. GFI EndPointSecurity, Add, 100-249u, 2Y, ENG Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 156
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Administrator Guide

GFIProduct ManualAdministrator Guide

Seite 2

List of TablesTable 1: Terms and conventions used in this manual 11Table 2: GFI EndPointSecurityfeatures 13Table 3: Deployment and Monitoring protecti

Seite 3 - Contents

GFI EndPointSecurity 7 Discovering Devices | 1007 Discovering DevicesGFI EndPointSecurity enables you to transparently and rapidly query organizationa

Seite 4

GFI EndPointSecurity 7 Discovering Devices | 1011. Click Scanning tab.2. From Common tasks, click Options.3. From the Options dialog, select Logon Cre

Seite 5

GFI EndPointSecurity 7 Discovering Devices | 102Screenshot 75: Running a device scan - Scan device categories tab5. Click Scan Device Categories tab a

Seite 6 - List of Figures

GFI EndPointSecurity 7 Discovering Devices | 103Screenshot 76: Running a device scan - Scan ports tab6. Click Scan Ports tab and select the connection

Seite 7

GFI EndPointSecurity 7 Discovering Devices | 1047.2.1 ComputersScreenshot 77: Computers areaThis section displays device scan summary results for ever

Seite 8

GFI EndPointSecurity 7 Discovering Devices | 105lists the devices currently connected to the target computers for the blacklist and whitelist. Forinfo

Seite 9

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 1068 Monitoring Device Usage ActivityThis chapter provides you with information about monito

Seite 10 - List of Tables

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 107Protection StatusDevice Usage by Device TypeDevice Usage by Connectivity Port8.1.1 Protec

Seite 11 - 1 Introduction

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 1088.1.3 Device Usage by Connectivity PortScreenshot 83: Device Usage by Connectivity Port a

Seite 12

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 109Screenshot 84: Activity Log sub-tabTo access the Activity Log sub-tab, from GFI EndPointS

Seite 13 - 1.4 Key Features

GFI EndPointSecurity 1 Introduction | 111 IntroductionThe proliferation of consumer devices such as iPods, USB devices and smartphones has increased t

Seite 14

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 110Screenshot 85: Activity Log sub-tab - Advanced filteringTo access advanced filtering opti

Seite 15

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 111Screenshot 86: Logs Browser sub-tabTo access the Logs Browser sub-tab, from GFI EndPointS

Seite 16 - Figure 2: Device access

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 112Screenshot 87: Query Builder options4. In the Query Builder dialog, specify a name and a

Seite 17

GFI EndPointSecurity 9 Status Monitoring | 1139 Status MonitoringThis chapter provides with information related to monitoring the status of GFI EndPoi

Seite 18

GFI EndPointSecurity 9 Status Monitoring | 114Screenshot 88: Risk Assessment sub-tabTo access the Risk Assessment sub-tab, from GFI EndPointSecurity m

Seite 19

GFI EndPointSecurity 9 Status Monitoring | 115Feature DescriptionThis section lists the cumulative values of the number of:Scanned endpointsSuccessful

Seite 20

GFI EndPointSecurity 9 Status Monitoring | 116Screenshot 89: Statistics sub-tabTo access the Statistics sub-tab, from GFI EndPointSecurity management

Seite 21 - 2.1 System requirements

GFI EndPointSecurity 9 Status Monitoring | 117This section graphically represents daily device usage on computers, differentiating between devicesthat

Seite 22 - Firewall ports

GFI EndPointSecurity 9 Status Monitoring | 118Screenshot 93: Status sub-tabFeature DescriptionThis section lists:The operational status of GFI EndPoin

Seite 23

GFI EndPointSecurity 9 Status Monitoring | 119Feature DescriptionThis section graphically represents all agents deployed on network computers, differe

Seite 24

GFI EndPointSecurity 1 Introduction | 12Better storage capacityImproved performanceEasier and faster to installPhysically small enough to carry in a p

Seite 25

GFI EndPointSecurity 9 Status Monitoring | 1209.4.1 About Deployment status viewScreenshot 94: Deployment sub-tabUse the Deployment sub-tab to view:Cu

Seite 26

GFI EndPointSecurity 9 Status Monitoring | 1219.4.2 Current DeploymentsScreenshot 95: Current Deployments areaThis section displays a list of deployme

Seite 27

GFI EndPointSecurity 9 Status Monitoring | 1229.4.5 Deployment HistoryScreenshot 98: Deployment History areaThis section displays an audit trail for a

Seite 28

GFI EndPointSecurity 10 Reporting | 12310 ReportingThe GFI EndPointSecurity GFI ReportPack is a fully-fledged reporting add-on to GFI EndPointSecurity

Seite 29 - 2.6 Testing your installation

GFI EndPointSecurity 10 Reporting | 124Screenshot 99: Digest Report options - General tab3. From the General tab of the Digest Report dialog, select/u

Seite 30 - Accessing a CD/DVD disc

GFI EndPointSecurity 10 Reporting | 125Screenshot 100: Digest Report options - Details tab5. Click Details tab to select/unselect report content items

Seite 31

GFI EndPointSecurity 11 Managing the Database Backend | 12611 Managing the Database BackendThis chapter provides you information related to managing a

Seite 32

GFI EndPointSecurity 11 Managing the Database Backend | 127Screenshot 101: Maintenance options4. From the Maintenance dialog, configure how often even

Seite 33 - Re-accessing a CD/DVD disc

GFI EndPointSecurity 11 Managing the Database Backend | 12811.2 Using an existing SQL Server instanceTo connect to an existing SQLServer instance:1.

Seite 34 - 3 Achieving Results

GFI EndPointSecurity 12 Alerting Options | 12912 Alerting OptionsThis chapter provides you with information about configuring the GFI EndPointSecurity

Seite 35

GFI EndPointSecurity 1 Introduction | 13GFI EndPointSecurity Management Console Management ConsoleGFI EndPointSecurity Agent.1.3.1 GFI EndPointSecurit

Seite 36

GFI EndPointSecurity 12 Alerting Options | 1303. From Email tab , click Add..., to specify your mail server settings. Click OK to close the Mail-serve

Seite 37

GFI EndPointSecurity 12 Alerting Options | 131Screenshot 105: Alerting Options - SMS tab6. Click SMS tab and from the Select SMS drop-down menu, selec

Seite 38 - 4 Adding Target Computers

GFI EndPointSecurity 12 Alerting Options | 1321. Click Configuration tab > Options sub-tab.2. From Configure, click Alerting Options > Users sub

Seite 39

GFI EndPointSecurity 12 Alerting Options | 133Screenshot 107: EndPointSecurityAdministrator Properties options - Working Hours tab5. Click Working Hou

Seite 40 - Daily, Weekly or Monthly

GFI EndPointSecurity 12 Alerting Options | 134Screenshot 108: EndPointSecurityAdministrator Properties options - Alerts tab6. Click Alerts tab and sel

Seite 41

GFI EndPointSecurity 12 Alerting Options | 1357. Click Member Of tab and click Add to add the user to notification group(s).8. Click Apply and OK.12.3

Seite 42

GFI EndPointSecurity 12 Alerting Options | 136Deleting groups of alert recipients12.4.1 Creating groups of alert recipientsTo create a new group of al

Seite 43

GFI EndPointSecurity 12 Alerting Options | 1371. Click Configuration tab > Options sub-tab.2. Click Alerting Options > Groups sub-node.3. From t

Seite 44

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 13813 Configuring GFI EndPointSecurityGFI EndPointSecurity enables you to configure the com

Seite 45

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 1393. From the Communication tab, key in the required TCP/IP port number to be used for com

Seite 46

GFI EndPointSecurity 1 Introduction | 14GFI EndPointSecurity featuresPower users The administrator can specify users or groups who would always have f

Seite 47

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 140Screenshot 113: Advanced Options - Agent Security tab5. Click Agent Security tab and sel

Seite 48 - 9. Click Next

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 141Screenshot 114: Custom Messages dialog options3. Select/unselect the message types you w

Seite 49

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 142Screenshot 115: General tab - Updates3. From the right pane, configure the options descr

Seite 50

GFI EndPointSecurity 14 Miscellaneous | 14314 MiscellaneousThe miscellaneous chapter gathers all the other information that falls outside the initial

Seite 51

GFI EndPointSecurity 14 Miscellaneous | 144Screenshot 117: Computers sub-tab - delete computer(s)3. From the right pane, right-click target computer t

Seite 52

GFI EndPointSecurity 14 Miscellaneous | 145Screenshot 118: Deployment sub-tab6. From the Deployment History area, confirm the successful completion of

Seite 53

GFI EndPointSecurity 14 Miscellaneous | 146Screenshot 119: Uninstallation information messageNoteIf any agents are still installed, an information dia

Seite 54

GFI EndPointSecurity 15 Troubleshooting and Support | 14715 Troubleshooting and SupportThis chapter explains how to resolve any issues encountered dur

Seite 55

GFI EndPointSecurity 15 Troubleshooting and Support | 148Issue Possible Cause Possible SolutionInstallationfailed.Installation of the GFI End-PointSec

Seite 56

GFI EndPointSecurity 15 Troubleshooting and Support | 149Web ForumUser to user technical support is available via the GFI web forum. Access the web fo

Seite 57

GFI EndPointSecurity 1 Introduction | 15Figure 1: Protection policy - Deployment and MonitoringThe table below describes the stages depicted above:Sta

Seite 58

GFI EndPointSecurity 16 Glossary | 15016 GlossaryAAccess permissionsA set of permissions (access, read and write) that are assigned to users and group

Seite 59 - 6.3 Configuring power users

GFI EndPointSecurity 16 Glossary | 151DDatabase backendA database used by GFI EndPointSecurity to keep an audit trail of all events generated by GFIEn

Seite 60

GFI EndPointSecurity 16 Glossary | 152GFI EndPointSecurity applicationA server-side security application that aids in maintaining data integrity by pr

Seite 61

GFI EndPointSecurity 16 Glossary | 153Protection policyA set of device access and connectivity port permissions that can be configured to suit yourcom

Seite 62

17 IndexAaccess permissions 30, 33, 35, 49, 60, 63, 65, 68Active Directory 12, 14, 34, 36, 50, 54, 59-60, 63, 65,68, 70, 81, 96, 123, 131, 135alert re

Seite 63

Troubleshooter wizard 148Troubleshooting 147Uuser messages 35, 138, 140Vversions 11WWeb Forum 149wizardCreate Protection Policy wizardQuick Start wiza

Seite 64

USA, CANADA AND CENTRAL AND SOUTH AMERICA15300 Weston Parkway, Suite 104 Cary, NC 27513, USATelephone: +1 (888) 243-4329Fax: +1 (919) 379-3402ussales@

Seite 65

GFI EndPointSecurity 1 Introduction | 16Stage DescriptionStage 3 -Deploy pro-tection pol-icyThe administrator deploys the protection policy. Upon the

Seite 66 - 3. Click Security sub-node

GFI EndPointSecurity 1 Introduction | 17Stage DescriptionStage 1 - Deviceattached to com-puterThe user attaches a device to a target computer protecte

Seite 67

GFI EndPointSecurity 1 Introduction | 181.8 Supported device categoriesIn GFI EndPointSecurity devices are organized into the following categories:Flo

Seite 68

GFI EndPointSecurity 1 Introduction | 19Zip drivesTape drivesMO (magneto optical) drives (internal and external).1.9 Supported connectivity portsGFI E

Seite 69

The information and content in this document is provided for informational purposes only and isprovided "as is" with no warranty of any kind

Seite 70

GFI EndPointSecurity 1 Introduction | 20Screenshot 1: Navigating GFI EndPointSecurity user interfaceGFI EndPointSecurity Management Console consists o

Seite 71

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 212 Installing GFI EndPointSecurityThis chapter provides you with information about preparing

Seite 72

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 22Agent - Hardware requirementsProcessor: 1GHz processor clock speed or betterRAM: 256 MB (mi

Seite 73

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 23Security settingsOptions:Logging optionsDatabase options.Upgrading from GFI LanGuard Portab

Seite 74

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 24Screenshot 2: GFI EndPointSecurity installation: domain administrator account setup5. Key i

Seite 75

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 25NoteThe license key can be keyed in after installation or expiration of the evaluation peri

Seite 76

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 26Tab DescriptionScanArea Select the target area on which GFI EndPointSecurity scans the com

Seite 77

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 2712. From Users Groups, select/unselect Configure Users Groups to create domain/workgroup us

Seite 78

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 28Screenshot 4: Navigating GFI EndPointSecurity user interfaceGFI EndPointSecurity Management

Seite 79

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 292.6 Testing your installationOnce GFI EndPointSecurity is installed and the Quick Start wiz

Seite 80

Contents1 Introduction 111.0.1 Terms and conventions used in this guide 111.1 Portable media device threats 111.2 About GFI EndPointSecurity 121.3 Com

Seite 81

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 30NoteIf the deployment of the agent on to the local computer is not up-to-date, thenmanually

Seite 82

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 31Screenshot 5: Selecting control entities8. In the Add permissions… dialog select the Device

Seite 83

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 32Screenshot 7: Adding users or groups10. Click Add… and specify the user with no administrat

Seite 84

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 33To deploy the protection policy updates on to the local computer:1. From the right pane, cl

Seite 85

GFI EndPointSecurity 3 Achieving Results | 343 Achieving ResultsThis chapter provides you with step by step instructions about how to block unauthoriz

Seite 86 - 6.14 Configuring file options

GFI EndPointSecurity 3 Achieving Results | 353. Configure protection policy settingsConfigure the protection policy to block removable storage devices

Seite 87 - Option Description

GFI EndPointSecurity 3 Achieving Results | 361. Automatically discover devices on the networkGFI EndPointSecurity enables you to automatically add new

Seite 88

GFI EndPointSecurity 3 Achieving Results | 373.3 Monitoring network activity from a central locationAgents generate activity logs that are stored in a

Seite 89

GFI EndPointSecurity 4 Adding Target Computers | 384 Adding Target ComputersGFI EndPointSecurity enables you to specify the computers you intend to de

Seite 90

GFI EndPointSecurity 4 Adding Target Computers | 39Option DescriptionClick From Domain…. Specify the required computer(s) from within the domain/workg

Seite 91

6 Customizing Protection Policies 576.1 Configuring controlled device categories 576.2 Configuring controlled connectivity ports 586.3 Configuring pow

Seite 92

GFI EndPointSecurity 4 Adding Target Computers | 40Screenshot 10: Auto Discovery options - Auto Discovery tab3. Click Start discovery now to run auto

Seite 93

GFI EndPointSecurity 4 Adding Target Computers | 41Screenshot 11: Auto Discovery options - Discovery Area tab6. Click Discovery Area tab and select th

Seite 94

GFI EndPointSecurity 4 Adding Target Computers | 42Screenshot 12: Auto Discovery options - Actions tab7. Click Actions tab and from the Use as default

Seite 95

GFI EndPointSecurity 4 Adding Target Computers | 431. Click Configuration tab > Computers.2. Right-click on a computer from the list and click Set

Seite 96 - 6.17 Configuring alerts

GFI EndPointSecurity 4 Adding Target Computers | 44NoteBy default, GFI EndPointSecurity is configured to use the logon credentials of thecurrently log

Seite 97 - SMS messages

GFI EndPointSecurity 5 Managing Protection Policies | 455 Managing Protection PoliciesThis chapter describes how to deploy newly created protection po

Seite 98

GFI EndPointSecurity 5 Managing Protection Policies | 463. Key in a unique name for the new protection policy.4. Select whether you want to create a b

Seite 99

GFI EndPointSecurity 5 Managing Protection Policies | 47Screenshot 16: Controlled Device Categories options6. From the Controlled Device Categories di

Seite 100 - 7 Discovering Devices

GFI EndPointSecurity 5 Managing Protection Policies | 48Screenshot 17: Controlled connectivity ports options8. From the Controlled connectivity ports

Seite 101

GFI EndPointSecurity 5 Managing Protection Policies | 49Screenshot 18: Creating a new policy - Global Permissions settings10. From the Global Permissi

Seite 102

9.2.1 Protection Status 1169.2.2 Device Usage by Device Type 1179.2.3 Device Usage by Connectivity Port 1179.3 Status view 1179.4 Deployment status vi

Seite 103

GFI EndPointSecurity 5 Managing Protection Policies | 50NoteIn addition, GFI EndPointSecurity can also allow or block Active Directory (AD) usersand/o

Seite 104 - Screenshot 77: Computers area

GFI EndPointSecurity 5 Managing Protection Policies | 51Tab DescriptionContentAwarenessGFI EndPointSecurity enables you to specify the file content re

Seite 105

GFI EndPointSecurity 5 Managing Protection Policies | 524. From the left pane, click the Assign Protection Policyhyperlink in the Actions section.Scre

Seite 106 - 8.1 Statistics

GFI EndPointSecurity 5 Managing Protection Policies | 53Screenshot 20: Deploying a policy immediately - Deployment sub-tab5.2.2 Scheduled policy deplo

Seite 107

GFI EndPointSecurity 5 Managing Protection Policies | 54Screenshot 21: Schedule deployment options4. From Schedule deployment dialog select the deploy

Seite 108 - 8.2 Activity

GFI EndPointSecurity 5 Managing Protection Policies | 55Deployment history areaAgents' status area5.3.1 Deployment HistoryUse the information dis

Seite 109

GFI EndPointSecurity 5 Managing Protection Policies | 56NoteIf a target computer is offline, the deployment of the relevant policy is rescheduled fora

Seite 110

GFI EndPointSecurity 6 Customizing Protection Policies | 576 Customizing Protection PoliciesThis chapter provides you with information related to modi

Seite 111

GFI EndPointSecurity 6 Customizing Protection Policies | 581. Click Configuration tab > Protection Policies.2. From Protection Policies > Securi

Seite 112

GFI EndPointSecurity 6 Customizing Protection Policies | 59NoteUnspecified ports will be fully accessible from the target computers covered by theprot

Seite 113 - 9 Status Monitoring

List of FiguresScreenshot 1: Navigating GFI EndPointSecurity user interface 20Screenshot 2: GFI EndPointSecurity installation: domain administrator ac

Seite 114 - This section shows:

GFI EndPointSecurity 6 Customizing Protection Policies | 60covered by a protection policy. You can define sets of power users on a policy-by-policy ba

Seite 115 - 9.2 Statistics view

GFI EndPointSecurity 6 Customizing Protection Policies | 61When a device category is not set to be controlled by the particular security policy, the r

Seite 116

GFI EndPointSecurity 6 Customizing Protection Policies | 62Screenshot 28: Add permissions options - Device categories5. Enable or disable the required

Seite 117 - 9.3 Status view

GFI EndPointSecurity 6 Customizing Protection Policies | 636. Click Add… to specify the user(s)/group(s) that will have access to the device categorie

Seite 118 - Screenshot 93: Status sub-tab

GFI EndPointSecurity 6 Customizing Protection Policies | 64Screenshot 31: Add permissions options - Control entities5. In the Add permissions dialog s

Seite 119

GFI EndPointSecurity 6 Customizing Protection Policies | 657. Click Add… to specify the user(s)/group(s) that will have access to the connectivity por

Seite 120

GFI EndPointSecurity 6 Customizing Protection Policies | 661. Click Configuration tab > Protection Policies.2. From Protection Policies > Securi

Seite 121

GFI EndPointSecurity 6 Customizing Protection Policies | 67Screenshot 35: Add permissions options - Specific devices6. Enable or disable the required

Seite 122

GFI EndPointSecurity 6 Customizing Protection Policies | 687. Click Add… to specify the user(s)/group(s) that will have access to the specific devices

Seite 123 - 10 Reporting

GFI EndPointSecurity 6 Customizing Protection Policies | 69Screenshot 38: Protection Policies sub-tab - devices viewScreenshot 39: Protection Policies

Seite 124

Screenshot 39: Protection Policies sub-tab - users view 69Screenshot 40: Protection Policies sub-tab - Security area 70Screenshot 41: Black list optio

Seite 125 - 7. Click Apply and OK

GFI EndPointSecurity 6 Customizing Protection Policies | 704. From the left pane, click Switch to devices view or Switch to users view in the Common t

Seite 126 - Topics in this chapter

GFI EndPointSecurity 6 Customizing Protection Policies | 71For an updated list of devices currently connected to the target computers, run a device sc

Seite 127

GFI EndPointSecurity 6 Customizing Protection Policies | 72Screenshot 42: Select Devices options5. In the Select Devices dialog enable or disable the

Seite 128

GFI EndPointSecurity 6 Customizing Protection Policies | 73Screenshot 43: Select Devices options - Select device serials6. Select the required serials

Seite 129 - 12 Alerting Options

GFI EndPointSecurity 6 Customizing Protection Policies | 74Screenshot 44: Select Devices options - Edit Device serialsTo deploy protection policy upda

Seite 130

GFI EndPointSecurity 6 Customizing Protection Policies | 75Screenshot 45: White list options4. In the Whitelist dialog, click Add… to select devices t

Seite 131

GFI EndPointSecurity 6 Customizing Protection Policies | 765. In the Select Devices dialog enable or disable the devices to add to the whitelist from

Seite 132

GFI EndPointSecurity 6 Customizing Protection Policies | 77Screenshot 48: Select Devices options - Edit Device serialsTo deploy protection policy upda

Seite 133

GFI EndPointSecurity 6 Customizing Protection Policies | 78Screenshot 49: Devices Temporary Access icon1. From the Control Panel click Devices Tempora

Seite 134

GFI EndPointSecurity 6 Customizing Protection Policies | 796.11.2 Granting temporary access to a protected computerTo grant temporary access:1. From G

Seite 135

Screenshot 79: Devices list area - Add device to devices database 105Screenshot 80: Statistics sub-tab 106Screenshot 81: Protection Status area 107Scr

Seite 136

GFI EndPointSecurity 6 Customizing Protection Policies | 80Screenshot 52: Grant temporary access options - Device categories and connection ports5. En

Seite 137

GFI EndPointSecurity 6 Customizing Protection Policies | 817. Take note of the Unlock code generated. Communicate the code to the user requesting tem-

Seite 138

GFI EndPointSecurity 6 Customizing Protection Policies | 82Screenshot 54: File-type Filter options4. In the File-type Filter dialog select the restric

Seite 139 - 1116 is specified

GFI EndPointSecurity 6 Customizing Protection Policies | 83Screenshot 55: File-type Filter and user options5. Click Add… and select or key in the file

Seite 140

GFI EndPointSecurity 6 Customizing Protection Policies | 841. From GFI EndPointSecurity management console, click Configuration tab > Protection Po

Seite 141

GFI EndPointSecurity 6 Customizing Protection Policies | 85Screenshot 57: Add a new template5. Click Add… and select or key in the template from the T

Seite 142 - Table 18: Update options

GFI EndPointSecurity 6 Customizing Protection Policies | 86Screenshot 59: Managing templates6.14 Configuring file optionsGFI EndPointSecurity enables

Seite 143

GFI EndPointSecurity 6 Customizing Protection Policies | 87Screenshot 60: File options4. In the File options dialog select from the following options:

Seite 144

GFI EndPointSecurity 6 Customizing Protection Policies | 88..Screenshot 61: File-type Filter and user options5. From the Archive Options tab, enable /

Seite 145

GFI EndPointSecurity 6 Customizing Protection Policies | 89Screenshot 62: Encryption options - General tab4. Select Enable detection of encrypted devi

Seite 146

Screenshot 119: Uninstallation information message 146Screenshot 120: Specifying contact and purchase details 148Screenshot 121: Specifying issue deta

Seite 147 - Common Issues

GFI EndPointSecurity 6 Customizing Protection Policies | 905. Click Add… to specify the users and groups with access to encrypted devices.Screenshot 6

Seite 148 - GFI SkyNet

GFI EndPointSecurity 6 Customizing Protection Policies | 911. From GFI EndPointSecurity management console, click Configuration tab > Protection Po

Seite 149 - Documentation

GFI EndPointSecurity 6 Customizing Protection Policies | 92Screenshot 66: Encryption options -Security tab5. From the Security tab, configure the feat

Seite 150 - 16 Glossary

GFI EndPointSecurity 6 Customizing Protection Policies | 93Screenshot 67: Encryption options - Users tab6. Select Users tab and configure the followin

Seite 151

GFI EndPointSecurity 6 Customizing Protection Policies | 94Screenshot 68: Encryption options - Traveler tabNoteTraveler is an application that can be

Seite 152

GFI EndPointSecurity 6 Customizing Protection Policies | 951. Click Configuration tab > Protection Policies.2. From Protection Policies > Securi

Seite 153

GFI EndPointSecurity 6 Customizing Protection Policies | 96Screenshot 70: Logging Options - Filter tab6. Select Filter tab, and select any of the foll

Seite 154 - 17 Index

GFI EndPointSecurity 6 Customizing Protection Policies | 97Screenshot 71: Alerting Options - General tab4. In the Alerting Options dialog, click Gener

Seite 155 - Quick Start wizard

GFI EndPointSecurity 6 Customizing Protection Policies | 98Screenshot 72: Alerting Options - Configuring users and groups5. For each alert type enable

Seite 156

GFI EndPointSecurity 6 Customizing Protection Policies | 99Screenshot 73: Alerting Options - Filter tab6. Select Filter tab, select any of the followi

Kommentare zu diesen Handbüchern

Keine Kommentare