
GFI EndPointSecurity 6 Customizing Protection Policies | 70
4. From the left pane, click Switch to devices view or Switch to users view in the Common tasks
section, to switch grouping of permissions by devices/ports or users.
Note
In users view, you will also see any power users specified within the policy.
6.8 Configuring priorities for permissions
GFI EndPointSecurity enables you to prioritize any permissions assigned to Active Directory (AD) users
and/or user groups. You can do this on a policy-by-policy basis and on a user-by-user basis.
For example, for a specific user specified within a specific protection policy, you may decide to give
priority 1 to USB port permissions, and priority 2 to CD/DVD drive permissions. This means that if the
user connects an external CD/DVD drive via the USB port to the target computer, permissions for the
USB port will take precedence over permissions for the CD/DVD drive.
Screenshot 40: Protection Policies sub-tab - Security area
To prioritize permissions assigned to users in a protection policy:
1. Click Configuration tab > Protection Policies.
2. From Protection Policies > Security, select the protection policy to configure.
3. Click Security sub-node.
4. From the left pane, click Switch to users view in the Common tasks section, to switch grouping
of permissions by users.
5. Right-click the Security section and select Expand all.
6. Highlight the required device or port.
7. From the left pane, click Increase priority or Decrease priority in the Actions section.
To deploy protection policy updates on target computers specified in the policy:
1. Click Configuration tab > Computers.
2. From Common tasks, click Deploy to all computers….
6.9 Configuring device blacklist
GFI EndPointSecurity enables you to specify which device(s) can be made inaccessible to everyone.
The blacklist is granular, so you can even blacklist a specific device with a specific serial number. You
can do this on a policy-by-policy basis.
Komentarze do niniejszej Instrukcji