
GFI EndPointSecurity 6 Customizing Protection Policies | 57
6 Customizing Protection Policies
This chapter provides you with information related to modifying the settings of your pre-configured
protection policies. This enables you to tweak settings by time, as you discover new security obstacles
and possible vulnerabilities.
Topics in this chapter
6.1 Configuring controlled device categories 57
6.2 Configuring controlled connectivity ports 58
6.3 Configuring power users 59
6.4 Configuring access permissions for device categories 60
6.5 Configuring access permissions for connectivity ports 63
6.6 Configuring access permissions for specific devices 65
6.7 Viewing access permissions 68
6.8 Configuring priorities for permissions 70
6.9 Configuring device blacklist 70
6.10 Configuring device whitelist 74
6.11 Configuring temporary access privileges 77
6.12 Configuring file-type filters 81
6.13 Configuring content awareness 83
6.14 Configuring file options 86
6.15 Configuring security encryption 88
6.16 Configuring event logging 94
6.17 Configuring alerts 96
6.18 Setting a policy as the default policy 99
6.1 Configuring controlled device categories
GFI EndPointSecurity enables you to select which supported device categories should be controlled or
not by a protection policy. You can do this on a policy-by-policy basis.
Note
Unspecified devices will be fully accessible from the target computers covered by the
protection policy. As a result, GFI EndPointSecurity cannot monitor and block devices
falling in a category that is not controlled by the protection policy.
To configure devices controlled by a protection policy:
Kommentare zu diesen Handbüchern