Chapter 9. Solutions in this chapter:

  • Creating Protection Policies
  • Deploying Agents
  • Setting Device Permissions
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

In the previous chapter, we worked through the installation and initial configuration process for GFI EndPointSecurity. Now it's time to actually begin using the software. Throughout this chapter, and the remainder of the section on GFI EndPointSecurity, you will find that this is one of the more passive security tools. Using it involves setting up some policies, and then letting it do its thing.

Creating Protection Policies

Begin the process by launching GFI EndPointSecurity. You can access it by selecting the All Programs | GFI EndPointSecurity 4.0 | GFI EndPointSecurity ...

Get GFI Network Security and PCI Compliance Power Tools now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.