Chapter 11. Solutions in this chapter:

  • The End User Experience
  • Removing the Agent Component
  • Making Temporary Exceptions
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

So far I've spent a lot of time talking about the various ways that you can regulate endpoint devices, so you are probably ready to move on and actually start locking things down. If you've been setting up protection policies, you have already begun the lock down process. Unlike some of the other products out there, you don't have to scan the computers on your network to see if anyone is using unauthorized devices. The agent component that resides on each computer in a protection group is designed to compare any attempted device use against the applicable ...

Get GFI Network Security and PCI Compliance Power Tools now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.