Chapter 11. Solutions in this chapter:

  • The End User Experience
  • Removing the Agent Component
  • Making Temporary Exceptions
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

So far I've spent a lot of time talking about the various ways that you can regulate endpoint devices, so you are probably ready to move on and actually start locking things down. If you've been setting up protection policies, you have already begun the lock down process. Unlike some of the other products out there, you don't have to scan the computers on your network to see if anyone is using unauthorized devices. The agent component that resides on each computer in a protection group is designed to compare any attempted device use against the applicable ...

Get GFI Network Security and PCI Compliance Power Tools now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.