
GFI EndPointSecurity 1 Introduction | 17
Stage Description
Stage 1 - Device
attached to com-
puter
The user attaches a device to a target computer protected by GFI EndPointSecurity.
Stage 2 - Pro-
tection policy
enforcement
The GFI EndPointSecurity agent installed on the target computer detects the attached device and
goes through the protection policy rules applicable to the computer/user. This operation deter-
mines whether the device is allowed or blocked from being accessed.
Stage 3 - Device
usage
allowed/blocked
The user either receives an error message indicating that device usage has been blocked, or else is
allowed to access the device.
Table 4: Deployment and Monitoring protection policy
1.7 How GFI EndPointSecurityworks - Temporary Access
GFI EndPointSecurity temporary access operations can be divided in three logical stages:
Figure 3: Requesting/granting temporary access
The table below describes the stages depicted above:
Stage Description
Stage 1 - User
requests tem-
porary device
access
The user executes the GFI EndPointSecurity Temporary Access tool from the computer on which the
device is to be accessed. The tool is used to generate a request code, which the user communicates
with the administrator. The user also needs to inform the administrator on the device types or con-
nection ports that need to be accessed, and for how long will devices/ports access be required.
Stage 2 -
Administrator
grants tem-
porary access
The administrator uses the Temporary Access feature within the GFI EndPointSecurity management
console to enter the request code, specify devices/ports and time restrictions. An unlock code is gen-
erated which the administrator then communicates with the user.
Stage 3 - User
activates tem-
porary device
access
Once the user receives the unlock code sent by the administrator, this code is entered in the GFI End-
PointSecurity Temporary Access tool to activate the temporary access and to be able to use the
required devices/ports.
Table 5: Deployment and Monitoring protection policy
Kommentare zu diesen Handbüchern