GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Instrukcja Obsługi Strona 15

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 156
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 14
GFI EndPointSecurity 1 Introduction | 15
Figure 1: Protection policy - Deployment and Monitoring
The table below describes the stages depicted above:
Stage Description
Stage 1 -
Configure
computers
The administrator specifies which protection policy is assigned to which computers, and the log-on cre-
dentials to be used by GFI EndPointSecurity to access the target computers and deploy the agents.
Stage 2 -
Customize
protection
policy
The administrator can customize a protection policy before or after deploying it. Customization options
include the creation of power users, addition of blacklisted/whitelisted devices and device access per-
missions.
Table 3: Deployment and Monitoring protection policy
Przeglądanie stron 14
1 2 ... 10 11 12 13 14 15 16 17 18 19 20 ... 155 156

Komentarze do niniejszej Instrukcji

Brak uwag