
GFI EndPointSecurity 5 Managing Protection Policies | 51
Tab Description
Content
Awareness
GFI EndPointSecurity enables you to specify the file content restrictions for a particular protection policy.
The content awareness feature looks into files transiting the endpoints via removable devices and it
\identifies content based on pre-configured and custom regular expressions and dictionary files. By
default the module looks for secure confidential details such as social security numbers and primary
account numbers as well as information related to companies and enterprises such as names of diseases,
drugs, dangerous chemicals and also trivial language or ethnic / racist terms.
You can configure content checking as a global policy in a similar fashion to the file checking module.
File
Options
GFI EndPointSecurityenables you to specify the options required to block or allow files based on size. GFI
EndPointSecurity also enables you to ignore large files when checking file type and content and archived
files.
Encryption GFI EndPointSecurity enables you to configure settings that specifically cater for encrypted devices. It also
enables you to encrypt devices that are not yet secured.
Note
For more information refer to For more information, refer to Customizing Protection
Policies (page 57).
18. Configure logging and alerting options for this policy and click Next.
Note
For more information, refer to Configuring event logging and Configuring alerts.
19. Review the summary page for information about your policy and click Finish.
5.2 Assigning a Protection Policy
The next step is to link the relevant set of device access and connectivity port permissions to each
target computer. You can do this by assigning protection policies to target computers.
Note
Target computers can only be assigned one protection policy at a time.
To assign a protection policy on to a target computer:
1. From the GFI EndPointSecurity management console, select Configuration.
2. Click Computers.
3. Highlight the required target computer(s).
Note
If assigning the same policy to more than one target computer, select all the required
target computers and then specify the protection policy for the selected set of target
computers.
Komentarze do niniejszej Instrukcji