GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Instrukcja Obsługi Strona 58

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 156
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 57
GFI EndPointSecurity 6 Customizing Protection Policies | 58
1. Click Configuration tab > Protection Policies.
2. From Protection Policies > Security, select the protection policy to configure.
3. Click Security.
4. From Common tasks, click Edit controlled device categories….
Screenshot 24: Controlled Device Categories options
5. From the Controlled Device Categories dialog, select/unselect the required device categories
that will be controlled by the protection policy, and click OK.
Important
If you enable Human Interface Devices and deny access such devices, users will not be
able to use USB keyboards and mice connected to target computers protected by this
policy.
To deploy protection policy updates on target computers specified in the policy:
1. Click Configuration tab > Computers.
2. From Common tasks, click Deploy to all computers….
6.2 Configuring controlled connectivity ports
GFI EndPointSecurity enables you to select which supported connectivity ports should be controlled or
not by a protection policy. You can do this on a policy-by-policy basis.
Przeglądanie stron 57
1 2 ... 53 54 55 56 57 58 59 60 61 62 63 ... 155 156

Komentarze do niniejszej Instrukcji

Brak uwag