GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Instrukcja Obsługi Strona 36

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 156
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 35
GFI EndPointSecurity 3 Achieving Results | 36
1. Automatically discover devices on the network
GFI EndPointSecurity enables you to automatically add new computers that are connected to the
network. This allows you to scan a specified domain or workgroup and add the computers that are
found in it. Refer to the following sections for information about:
Running a device scan
Analyzing device scan results
Adding discovered devices to the database.
2. Deploy agents on new discovered devices
GFI EndPointSecurity can be configured to automatically install agents on new computers that are
added to the database. An agent must be installed on each computer that requires protection.
Refer to the following sections for information about:
Adding computers automatically
Configuring advanced options
Configuring log on credentials.
3. (Optional) Configure the protection policy that is assigned to newly discovered
devices
If a protection policy is not configured for deployment, create a policy that can be assigned to
new agents that are being installed on discovered computers. The default policy must be assigned
to a new agent but can be changed from the Configuration tab > Computers sub-tab. Security
settings and device behavior are dictated by the policy. Refer to the following section for
information about:
Customizing Protection Policies
Setting a policy as the default policy.
4. Assign protection policies automatically
Configure GFI EndPointSecurity to automatically deploy protection policies on new agents. Refer
to the following sections for information about:
Scheduling policy deployment
Deploying policies through Active Directory
Verifying protection policy deployment.
5. Monitor device activity
GFI EndPointSecurity enables you to maintain an audit trail of activity logs generated by agents
deployed on network computers (event logging must be enabled). The Status and Activity tabs
enable you to view statuses and statistical information about endpoints, agents and GFI
EndPointSecurity. Refer to the following sections for information about:
Configuring event logging
View device usage activity
View device usage statistics.
Przeglądanie stron 35
1 2 ... 31 32 33 34 35 36 37 38 39 40 41 ... 155 156

Komentarze do niniejszej Instrukcji

Brak uwag