Chapter 9. Solutions in this chapter:
- Creating Protection Policies
- Deploying Agents
- Setting Device Permissions
- Solutions Fast Track
- Frequently Asked Questions
In the previous chapter, we worked through the installation and initial configuration process for GFI EndPointSecurity. Now it's time to actually begin using the software. Throughout this chapter, and the remainder of the section on GFI EndPointSecurity, you will find that this is one of the more passive security tools. Using it involves setting up some policies, and then letting it do its thing.
Creating Protection Policies
Begin the process by launching GFI EndPointSecurity. You can access it by selecting the All Programs | GFI EndPointSecurity 4.0 | GFI EndPointSecurity ...