GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Handbuch Seite 16

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 156
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 15
GFI EndPointSecurity 1 Introduction | 16
Stage Description
Stage 3 -
Deploy pro-
tection pol-
icy
The administrator deploys the protection policy. Upon the first deployment of a protection policy, a GFI
EndPointSecurity agent is automatically installed on the remote network target computer. Upon the
next deployments of the same protection policy, the agent will be updated and not re-installed.
Stage 4 -
Monitor
device
access
When agents have been deployed, the administrator can monitor all device access attempts via the Man-
agement Console; receive alerts and generate reports through GFI EndPointSecurity GFI ReportPack.
1.6 How GFI EndPointSecurity works - Device Access
GFI EndPointSecurity device access operations can be divided in three logical stages:
Figure 2: Device access
The table below describes the stages depicted above:
Seitenansicht 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 155 156

Kommentare zu diesen Handbüchern

Keine Kommentare