GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Instrukcja Obsługi Strona 16

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 156
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 15
GFI EndPointSecurity 1 Introduction | 16
Stage Description
Stage 3 -
Deploy pro-
tection pol-
icy
The administrator deploys the protection policy. Upon the first deployment of a protection policy, a GFI
EndPointSecurity agent is automatically installed on the remote network target computer. Upon the
next deployments of the same protection policy, the agent will be updated and not re-installed.
Stage 4 -
Monitor
device
access
When agents have been deployed, the administrator can monitor all device access attempts via the Man-
agement Console; receive alerts and generate reports through GFI EndPointSecurity GFI ReportPack.
1.6 How GFI EndPointSecurity works - Device Access
GFI EndPointSecurity device access operations can be divided in three logical stages:
Figure 2: Device access
The table below describes the stages depicted above:
Przeglądanie stron 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 155 156

Komentarze do niniejszej Instrukcji

Brak uwag