GFI EndPointSecurity, Add, 100-249u, 1Y, ENG Manuel Page 1

Naviguer en ligne ou télécharger Manuel pour Licences/améliorations de logiciels GFI EndPointSecurity, Add, 100-249u, 1Y, ENG. GFI EndPointSecurity, Add, 100-249u, 2Y, ENG Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 156
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Administrator Guide

GFIProduct ManualAdministrator Guide

Page 2

List of TablesTable 1: Terms and conventions used in this manual 11Table 2: GFI EndPointSecurityfeatures 13Table 3: Deployment and Monitoring protecti

Page 3 - Contents

GFI EndPointSecurity 7 Discovering Devices | 1007 Discovering DevicesGFI EndPointSecurity enables you to transparently and rapidly query organizationa

Page 4

GFI EndPointSecurity 7 Discovering Devices | 1011. Click Scanning tab.2. From Common tasks, click Options.3. From the Options dialog, select Logon Cre

Page 5

GFI EndPointSecurity 7 Discovering Devices | 102Screenshot 75: Running a device scan - Scan device categories tab5. Click Scan Device Categories tab a

Page 6 - List of Figures

GFI EndPointSecurity 7 Discovering Devices | 103Screenshot 76: Running a device scan - Scan ports tab6. Click Scan Ports tab and select the connection

Page 7

GFI EndPointSecurity 7 Discovering Devices | 1047.2.1 ComputersScreenshot 77: Computers areaThis section displays device scan summary results for ever

Page 8

GFI EndPointSecurity 7 Discovering Devices | 105lists the devices currently connected to the target computers for the blacklist and whitelist. Forinfo

Page 9

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 1068 Monitoring Device Usage ActivityThis chapter provides you with information about monito

Page 10 - List of Tables

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 107Protection StatusDevice Usage by Device TypeDevice Usage by Connectivity Port8.1.1 Protec

Page 11 - 1 Introduction

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 1088.1.3 Device Usage by Connectivity PortScreenshot 83: Device Usage by Connectivity Port a

Page 12

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 109Screenshot 84: Activity Log sub-tabTo access the Activity Log sub-tab, from GFI EndPointS

Page 13 - 1.4 Key Features

GFI EndPointSecurity 1 Introduction | 111 IntroductionThe proliferation of consumer devices such as iPods, USB devices and smartphones has increased t

Page 14

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 110Screenshot 85: Activity Log sub-tab - Advanced filteringTo access advanced filtering opti

Page 15

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 111Screenshot 86: Logs Browser sub-tabTo access the Logs Browser sub-tab, from GFI EndPointS

Page 16 - Figure 2: Device access

GFI EndPointSecurity 8 Monitoring Device Usage Activity | 112Screenshot 87: Query Builder options4. In the Query Builder dialog, specify a name and a

Page 17

GFI EndPointSecurity 9 Status Monitoring | 1139 Status MonitoringThis chapter provides with information related to monitoring the status of GFI EndPoi

Page 18

GFI EndPointSecurity 9 Status Monitoring | 114Screenshot 88: Risk Assessment sub-tabTo access the Risk Assessment sub-tab, from GFI EndPointSecurity m

Page 19

GFI EndPointSecurity 9 Status Monitoring | 115Feature DescriptionThis section lists the cumulative values of the number of:Scanned endpointsSuccessful

Page 20

GFI EndPointSecurity 9 Status Monitoring | 116Screenshot 89: Statistics sub-tabTo access the Statistics sub-tab, from GFI EndPointSecurity management

Page 21 - 2.1 System requirements

GFI EndPointSecurity 9 Status Monitoring | 117This section graphically represents daily device usage on computers, differentiating between devicesthat

Page 22 - Firewall ports

GFI EndPointSecurity 9 Status Monitoring | 118Screenshot 93: Status sub-tabFeature DescriptionThis section lists:The operational status of GFI EndPoin

Page 23

GFI EndPointSecurity 9 Status Monitoring | 119Feature DescriptionThis section graphically represents all agents deployed on network computers, differe

Page 24

GFI EndPointSecurity 1 Introduction | 12Better storage capacityImproved performanceEasier and faster to installPhysically small enough to carry in a p

Page 25

GFI EndPointSecurity 9 Status Monitoring | 1209.4.1 About Deployment status viewScreenshot 94: Deployment sub-tabUse the Deployment sub-tab to view:Cu

Page 26

GFI EndPointSecurity 9 Status Monitoring | 1219.4.2 Current DeploymentsScreenshot 95: Current Deployments areaThis section displays a list of deployme

Page 27

GFI EndPointSecurity 9 Status Monitoring | 1229.4.5 Deployment HistoryScreenshot 98: Deployment History areaThis section displays an audit trail for a

Page 28

GFI EndPointSecurity 10 Reporting | 12310 ReportingThe GFI EndPointSecurity GFI ReportPack is a fully-fledged reporting add-on to GFI EndPointSecurity

Page 29 - 2.6 Testing your installation

GFI EndPointSecurity 10 Reporting | 124Screenshot 99: Digest Report options - General tab3. From the General tab of the Digest Report dialog, select/u

Page 30 - Accessing a CD/DVD disc

GFI EndPointSecurity 10 Reporting | 125Screenshot 100: Digest Report options - Details tab5. Click Details tab to select/unselect report content items

Page 31

GFI EndPointSecurity 11 Managing the Database Backend | 12611 Managing the Database BackendThis chapter provides you information related to managing a

Page 32

GFI EndPointSecurity 11 Managing the Database Backend | 127Screenshot 101: Maintenance options4. From the Maintenance dialog, configure how often even

Page 33 - Re-accessing a CD/DVD disc

GFI EndPointSecurity 11 Managing the Database Backend | 12811.2 Using an existing SQL Server instanceTo connect to an existing SQLServer instance:1.

Page 34 - 3 Achieving Results

GFI EndPointSecurity 12 Alerting Options | 12912 Alerting OptionsThis chapter provides you with information about configuring the GFI EndPointSecurity

Page 35

GFI EndPointSecurity 1 Introduction | 13GFI EndPointSecurity Management Console Management ConsoleGFI EndPointSecurity Agent.1.3.1 GFI EndPointSecurit

Page 36

GFI EndPointSecurity 12 Alerting Options | 1303. From Email tab , click Add..., to specify your mail server settings. Click OK to close the Mail-serve

Page 37

GFI EndPointSecurity 12 Alerting Options | 131Screenshot 105: Alerting Options - SMS tab6. Click SMS tab and from the Select SMS drop-down menu, selec

Page 38 - 4 Adding Target Computers

GFI EndPointSecurity 12 Alerting Options | 1321. Click Configuration tab > Options sub-tab.2. From Configure, click Alerting Options > Users sub

Page 39

GFI EndPointSecurity 12 Alerting Options | 133Screenshot 107: EndPointSecurityAdministrator Properties options - Working Hours tab5. Click Working Hou

Page 40 - Daily, Weekly or Monthly

GFI EndPointSecurity 12 Alerting Options | 134Screenshot 108: EndPointSecurityAdministrator Properties options - Alerts tab6. Click Alerts tab and sel

Page 41

GFI EndPointSecurity 12 Alerting Options | 1357. Click Member Of tab and click Add to add the user to notification group(s).8. Click Apply and OK.12.3

Page 42

GFI EndPointSecurity 12 Alerting Options | 136Deleting groups of alert recipients12.4.1 Creating groups of alert recipientsTo create a new group of al

Page 43

GFI EndPointSecurity 12 Alerting Options | 1371. Click Configuration tab > Options sub-tab.2. Click Alerting Options > Groups sub-node.3. From t

Page 44

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 13813 Configuring GFI EndPointSecurityGFI EndPointSecurity enables you to configure the com

Page 45

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 1393. From the Communication tab, key in the required TCP/IP port number to be used for com

Page 46

GFI EndPointSecurity 1 Introduction | 14GFI EndPointSecurity featuresPower users The administrator can specify users or groups who would always have f

Page 47

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 140Screenshot 113: Advanced Options - Agent Security tab5. Click Agent Security tab and sel

Page 48 - 9. Click Next

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 141Screenshot 114: Custom Messages dialog options3. Select/unselect the message types you w

Page 49

GFI EndPointSecurity 13 Configuring GFI EndPointSecurity | 142Screenshot 115: General tab - Updates3. From the right pane, configure the options descr

Page 50

GFI EndPointSecurity 14 Miscellaneous | 14314 MiscellaneousThe miscellaneous chapter gathers all the other information that falls outside the initial

Page 51

GFI EndPointSecurity 14 Miscellaneous | 144Screenshot 117: Computers sub-tab - delete computer(s)3. From the right pane, right-click target computer t

Page 52

GFI EndPointSecurity 14 Miscellaneous | 145Screenshot 118: Deployment sub-tab6. From the Deployment History area, confirm the successful completion of

Page 53

GFI EndPointSecurity 14 Miscellaneous | 146Screenshot 119: Uninstallation information messageNoteIf any agents are still installed, an information dia

Page 54

GFI EndPointSecurity 15 Troubleshooting and Support | 14715 Troubleshooting and SupportThis chapter explains how to resolve any issues encountered dur

Page 55

GFI EndPointSecurity 15 Troubleshooting and Support | 148Issue Possible Cause Possible SolutionInstallationfailed.Installation of the GFI End-PointSec

Page 56

GFI EndPointSecurity 15 Troubleshooting and Support | 149Web ForumUser to user technical support is available via the GFI web forum. Access the web fo

Page 57

GFI EndPointSecurity 1 Introduction | 15Figure 1: Protection policy - Deployment and MonitoringThe table below describes the stages depicted above:Sta

Page 58

GFI EndPointSecurity 16 Glossary | 15016 GlossaryAAccess permissionsA set of permissions (access, read and write) that are assigned to users and group

Page 59 - 6.3 Configuring power users

GFI EndPointSecurity 16 Glossary | 151DDatabase backendA database used by GFI EndPointSecurity to keep an audit trail of all events generated by GFIEn

Page 60

GFI EndPointSecurity 16 Glossary | 152GFI EndPointSecurity applicationA server-side security application that aids in maintaining data integrity by pr

Page 61

GFI EndPointSecurity 16 Glossary | 153Protection policyA set of device access and connectivity port permissions that can be configured to suit yourcom

Page 62

17 IndexAaccess permissions 30, 33, 35, 49, 60, 63, 65, 68Active Directory 12, 14, 34, 36, 50, 54, 59-60, 63, 65,68, 70, 81, 96, 123, 131, 135alert re

Page 63

Troubleshooter wizard 148Troubleshooting 147Uuser messages 35, 138, 140Vversions 11WWeb Forum 149wizardCreate Protection Policy wizardQuick Start wiza

Page 64

USA, CANADA AND CENTRAL AND SOUTH AMERICA15300 Weston Parkway, Suite 104 Cary, NC 27513, USATelephone: +1 (888) 243-4329Fax: +1 (919) 379-3402ussales@

Page 65

GFI EndPointSecurity 1 Introduction | 16Stage DescriptionStage 3 -Deploy pro-tection pol-icyThe administrator deploys the protection policy. Upon the

Page 66 - 3. Click Security sub-node

GFI EndPointSecurity 1 Introduction | 17Stage DescriptionStage 1 - Deviceattached to com-puterThe user attaches a device to a target computer protecte

Page 67

GFI EndPointSecurity 1 Introduction | 181.8 Supported device categoriesIn GFI EndPointSecurity devices are organized into the following categories:Flo

Page 68

GFI EndPointSecurity 1 Introduction | 19Zip drivesTape drivesMO (magneto optical) drives (internal and external).1.9 Supported connectivity portsGFI E

Page 69

The information and content in this document is provided for informational purposes only and isprovided "as is" with no warranty of any kind

Page 70

GFI EndPointSecurity 1 Introduction | 20Screenshot 1: Navigating GFI EndPointSecurity user interfaceGFI EndPointSecurity Management Console consists o

Page 71

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 212 Installing GFI EndPointSecurityThis chapter provides you with information about preparing

Page 72

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 22Agent - Hardware requirementsProcessor: 1GHz processor clock speed or betterRAM: 256 MB (mi

Page 73

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 23Security settingsOptions:Logging optionsDatabase options.Upgrading from GFI LanGuard Portab

Page 74

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 24Screenshot 2: GFI EndPointSecurity installation: domain administrator account setup5. Key i

Page 75

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 25NoteThe license key can be keyed in after installation or expiration of the evaluation peri

Page 76

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 26Tab DescriptionScanArea Select the target area on which GFI EndPointSecurity scans the com

Page 77

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 2712. From Users Groups, select/unselect Configure Users Groups to create domain/workgroup us

Page 78

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 28Screenshot 4: Navigating GFI EndPointSecurity user interfaceGFI EndPointSecurity Management

Page 79

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 292.6 Testing your installationOnce GFI EndPointSecurity is installed and the Quick Start wiz

Page 80

Contents1 Introduction 111.0.1 Terms and conventions used in this guide 111.1 Portable media device threats 111.2 About GFI EndPointSecurity 121.3 Com

Page 81

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 30NoteIf the deployment of the agent on to the local computer is not up-to-date, thenmanually

Page 82

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 31Screenshot 5: Selecting control entities8. In the Add permissions… dialog select the Device

Page 83

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 32Screenshot 7: Adding users or groups10. Click Add… and specify the user with no administrat

Page 84

GFI EndPointSecurity 2 Installing GFI EndPointSecurity | 33To deploy the protection policy updates on to the local computer:1. From the right pane, cl

Page 85

GFI EndPointSecurity 3 Achieving Results | 343 Achieving ResultsThis chapter provides you with step by step instructions about how to block unauthoriz

Page 86 - 6.14 Configuring file options

GFI EndPointSecurity 3 Achieving Results | 353. Configure protection policy settingsConfigure the protection policy to block removable storage devices

Page 87 - Option Description

GFI EndPointSecurity 3 Achieving Results | 361. Automatically discover devices on the networkGFI EndPointSecurity enables you to automatically add new

Page 88

GFI EndPointSecurity 3 Achieving Results | 373.3 Monitoring network activity from a central locationAgents generate activity logs that are stored in a

Page 89

GFI EndPointSecurity 4 Adding Target Computers | 384 Adding Target ComputersGFI EndPointSecurity enables you to specify the computers you intend to de

Page 90

GFI EndPointSecurity 4 Adding Target Computers | 39Option DescriptionClick From Domain…. Specify the required computer(s) from within the domain/workg

Page 91

6 Customizing Protection Policies 576.1 Configuring controlled device categories 576.2 Configuring controlled connectivity ports 586.3 Configuring pow

Page 92

GFI EndPointSecurity 4 Adding Target Computers | 40Screenshot 10: Auto Discovery options - Auto Discovery tab3. Click Start discovery now to run auto

Page 93

GFI EndPointSecurity 4 Adding Target Computers | 41Screenshot 11: Auto Discovery options - Discovery Area tab6. Click Discovery Area tab and select th

Page 94

GFI EndPointSecurity 4 Adding Target Computers | 42Screenshot 12: Auto Discovery options - Actions tab7. Click Actions tab and from the Use as default

Page 95

GFI EndPointSecurity 4 Adding Target Computers | 431. Click Configuration tab > Computers.2. Right-click on a computer from the list and click Set

Page 96 - 6.17 Configuring alerts

GFI EndPointSecurity 4 Adding Target Computers | 44NoteBy default, GFI EndPointSecurity is configured to use the logon credentials of thecurrently log

Page 97 - SMS messages

GFI EndPointSecurity 5 Managing Protection Policies | 455 Managing Protection PoliciesThis chapter describes how to deploy newly created protection po

Page 98

GFI EndPointSecurity 5 Managing Protection Policies | 463. Key in a unique name for the new protection policy.4. Select whether you want to create a b

Page 99

GFI EndPointSecurity 5 Managing Protection Policies | 47Screenshot 16: Controlled Device Categories options6. From the Controlled Device Categories di

Page 100 - 7 Discovering Devices

GFI EndPointSecurity 5 Managing Protection Policies | 48Screenshot 17: Controlled connectivity ports options8. From the Controlled connectivity ports

Page 101

GFI EndPointSecurity 5 Managing Protection Policies | 49Screenshot 18: Creating a new policy - Global Permissions settings10. From the Global Permissi

Page 102

9.2.1 Protection Status 1169.2.2 Device Usage by Device Type 1179.2.3 Device Usage by Connectivity Port 1179.3 Status view 1179.4 Deployment status vi

Page 103

GFI EndPointSecurity 5 Managing Protection Policies | 50NoteIn addition, GFI EndPointSecurity can also allow or block Active Directory (AD) usersand/o

Page 104 - Screenshot 77: Computers area

GFI EndPointSecurity 5 Managing Protection Policies | 51Tab DescriptionContentAwarenessGFI EndPointSecurity enables you to specify the file content re

Page 105

GFI EndPointSecurity 5 Managing Protection Policies | 524. From the left pane, click the Assign Protection Policyhyperlink in the Actions section.Scre

Page 106 - 8.1 Statistics

GFI EndPointSecurity 5 Managing Protection Policies | 53Screenshot 20: Deploying a policy immediately - Deployment sub-tab5.2.2 Scheduled policy deplo

Page 107

GFI EndPointSecurity 5 Managing Protection Policies | 54Screenshot 21: Schedule deployment options4. From Schedule deployment dialog select the deploy

Page 108 - 8.2 Activity

GFI EndPointSecurity 5 Managing Protection Policies | 55Deployment history areaAgents' status area5.3.1 Deployment HistoryUse the information dis

Page 109

GFI EndPointSecurity 5 Managing Protection Policies | 56NoteIf a target computer is offline, the deployment of the relevant policy is rescheduled fora

Page 110

GFI EndPointSecurity 6 Customizing Protection Policies | 576 Customizing Protection PoliciesThis chapter provides you with information related to modi

Page 111

GFI EndPointSecurity 6 Customizing Protection Policies | 581. Click Configuration tab > Protection Policies.2. From Protection Policies > Securi

Page 112

GFI EndPointSecurity 6 Customizing Protection Policies | 59NoteUnspecified ports will be fully accessible from the target computers covered by theprot

Page 113 - 9 Status Monitoring

List of FiguresScreenshot 1: Navigating GFI EndPointSecurity user interface 20Screenshot 2: GFI EndPointSecurity installation: domain administrator ac

Page 114 - This section shows:

GFI EndPointSecurity 6 Customizing Protection Policies | 60covered by a protection policy. You can define sets of power users on a policy-by-policy ba

Page 115 - 9.2 Statistics view

GFI EndPointSecurity 6 Customizing Protection Policies | 61When a device category is not set to be controlled by the particular security policy, the r

Page 116

GFI EndPointSecurity 6 Customizing Protection Policies | 62Screenshot 28: Add permissions options - Device categories5. Enable or disable the required

Page 117 - 9.3 Status view

GFI EndPointSecurity 6 Customizing Protection Policies | 636. Click Add… to specify the user(s)/group(s) that will have access to the device categorie

Page 118 - Screenshot 93: Status sub-tab

GFI EndPointSecurity 6 Customizing Protection Policies | 64Screenshot 31: Add permissions options - Control entities5. In the Add permissions dialog s

Page 119

GFI EndPointSecurity 6 Customizing Protection Policies | 657. Click Add… to specify the user(s)/group(s) that will have access to the connectivity por

Page 120

GFI EndPointSecurity 6 Customizing Protection Policies | 661. Click Configuration tab > Protection Policies.2. From Protection Policies > Securi

Page 121

GFI EndPointSecurity 6 Customizing Protection Policies | 67Screenshot 35: Add permissions options - Specific devices6. Enable or disable the required

Page 122

GFI EndPointSecurity 6 Customizing Protection Policies | 687. Click Add… to specify the user(s)/group(s) that will have access to the specific devices

Page 123 - 10 Reporting

GFI EndPointSecurity 6 Customizing Protection Policies | 69Screenshot 38: Protection Policies sub-tab - devices viewScreenshot 39: Protection Policies

Page 124

Screenshot 39: Protection Policies sub-tab - users view 69Screenshot 40: Protection Policies sub-tab - Security area 70Screenshot 41: Black list optio

Page 125 - 7. Click Apply and OK

GFI EndPointSecurity 6 Customizing Protection Policies | 704. From the left pane, click Switch to devices view or Switch to users view in the Common t

Page 126 - Topics in this chapter

GFI EndPointSecurity 6 Customizing Protection Policies | 71For an updated list of devices currently connected to the target computers, run a device sc

Page 127

GFI EndPointSecurity 6 Customizing Protection Policies | 72Screenshot 42: Select Devices options5. In the Select Devices dialog enable or disable the

Page 128

GFI EndPointSecurity 6 Customizing Protection Policies | 73Screenshot 43: Select Devices options - Select device serials6. Select the required serials

Page 129 - 12 Alerting Options

GFI EndPointSecurity 6 Customizing Protection Policies | 74Screenshot 44: Select Devices options - Edit Device serialsTo deploy protection policy upda

Page 130

GFI EndPointSecurity 6 Customizing Protection Policies | 75Screenshot 45: White list options4. In the Whitelist dialog, click Add… to select devices t

Page 131

GFI EndPointSecurity 6 Customizing Protection Policies | 765. In the Select Devices dialog enable or disable the devices to add to the whitelist from

Page 132

GFI EndPointSecurity 6 Customizing Protection Policies | 77Screenshot 48: Select Devices options - Edit Device serialsTo deploy protection policy upda

Page 133

GFI EndPointSecurity 6 Customizing Protection Policies | 78Screenshot 49: Devices Temporary Access icon1. From the Control Panel click Devices Tempora

Page 134

GFI EndPointSecurity 6 Customizing Protection Policies | 796.11.2 Granting temporary access to a protected computerTo grant temporary access:1. From G

Page 135

Screenshot 79: Devices list area - Add device to devices database 105Screenshot 80: Statistics sub-tab 106Screenshot 81: Protection Status area 107Scr

Page 136

GFI EndPointSecurity 6 Customizing Protection Policies | 80Screenshot 52: Grant temporary access options - Device categories and connection ports5. En

Page 137

GFI EndPointSecurity 6 Customizing Protection Policies | 817. Take note of the Unlock code generated. Communicate the code to the user requesting tem-

Page 138

GFI EndPointSecurity 6 Customizing Protection Policies | 82Screenshot 54: File-type Filter options4. In the File-type Filter dialog select the restric

Page 139 - 1116 is specified

GFI EndPointSecurity 6 Customizing Protection Policies | 83Screenshot 55: File-type Filter and user options5. Click Add… and select or key in the file

Page 140

GFI EndPointSecurity 6 Customizing Protection Policies | 841. From GFI EndPointSecurity management console, click Configuration tab > Protection Po

Page 141

GFI EndPointSecurity 6 Customizing Protection Policies | 85Screenshot 57: Add a new template5. Click Add… and select or key in the template from the T

Page 142 - Table 18: Update options

GFI EndPointSecurity 6 Customizing Protection Policies | 86Screenshot 59: Managing templates6.14 Configuring file optionsGFI EndPointSecurity enables

Page 143

GFI EndPointSecurity 6 Customizing Protection Policies | 87Screenshot 60: File options4. In the File options dialog select from the following options:

Page 144

GFI EndPointSecurity 6 Customizing Protection Policies | 88..Screenshot 61: File-type Filter and user options5. From the Archive Options tab, enable /

Page 145

GFI EndPointSecurity 6 Customizing Protection Policies | 89Screenshot 62: Encryption options - General tab4. Select Enable detection of encrypted devi

Page 146

Screenshot 119: Uninstallation information message 146Screenshot 120: Specifying contact and purchase details 148Screenshot 121: Specifying issue deta

Page 147 - Common Issues

GFI EndPointSecurity 6 Customizing Protection Policies | 905. Click Add… to specify the users and groups with access to encrypted devices.Screenshot 6

Page 148 - GFI SkyNet

GFI EndPointSecurity 6 Customizing Protection Policies | 911. From GFI EndPointSecurity management console, click Configuration tab > Protection Po

Page 149 - Documentation

GFI EndPointSecurity 6 Customizing Protection Policies | 92Screenshot 66: Encryption options -Security tab5. From the Security tab, configure the feat

Page 150 - 16 Glossary

GFI EndPointSecurity 6 Customizing Protection Policies | 93Screenshot 67: Encryption options - Users tab6. Select Users tab and configure the followin

Page 151

GFI EndPointSecurity 6 Customizing Protection Policies | 94Screenshot 68: Encryption options - Traveler tabNoteTraveler is an application that can be

Page 152

GFI EndPointSecurity 6 Customizing Protection Policies | 951. Click Configuration tab > Protection Policies.2. From Protection Policies > Securi

Page 153

GFI EndPointSecurity 6 Customizing Protection Policies | 96Screenshot 70: Logging Options - Filter tab6. Select Filter tab, and select any of the foll

Page 154 - 17 Index

GFI EndPointSecurity 6 Customizing Protection Policies | 97Screenshot 71: Alerting Options - General tab4. In the Alerting Options dialog, click Gener

Page 155 - Quick Start wizard

GFI EndPointSecurity 6 Customizing Protection Policies | 98Screenshot 72: Alerting Options - Configuring users and groups5. For each alert type enable

Page 156

GFI EndPointSecurity 6 Customizing Protection Policies | 99Screenshot 73: Alerting Options - Filter tab6. Select Filter tab, select any of the followi

Commentaires sur ces manuels

Pas de commentaire