سلام وخسته نباشید به همه ای اساتید
من یه اموزش برای کانفیگ GFI EndPointSecurity میخوام
Printable View
سلام وخسته نباشید به همه ای اساتید
من یه اموزش برای کانفیگ GFI EndPointSecurity میخوام
یعنی تا حالا کسی با این نرم افزار کار نکرده
من تو شرکتمون راه انداختم خیلی مفیده ولی باید حتما قبل از اینکه وارد دامین کنی رو دو سیستم جدا تست کنی.
[QUOTE=shf;352123]سلام وخسته نباشید به همه ای اساتید
من یه اموزش برای کانفیگ GFI EndPointSecurity میخوام[/QUOTE]
آموزش چندانی لازم نیست. وقتی این نرمافزار رو نصب کنی در اکتیودایرکتوری یکسری گروه ایجاد میکنه که برای مجوز دادن به هر کاربر در واقع باید اونو عضو گروه مربوطه بکنی. تمام تنظیماتش هم مبتنی بر نام کاربریه نه سیستم.
تنها نکتهای که باید یادت باشه اینه که اگر بخوای سیستم رو از دامینت خارج کنی، قبل از اینکار اول در GFI endpoint اون سیستم رو حذف کن و گرنه بعدا uninstall کردن agent این برنامه خیلی سخت میشه و کلی اثرات نامطلوب برات میزاره.
[url]http://forum.persiannetworks.com/f109/t51767.html[/url]
نکته دوستمون هم جالبه من هم دیدم باهاش به مشکل میخورن
یعین سیستم ارتباطش رو که با سرور از دست میده Uninstall کردن و برگرداندن تغییرات و ... خیلی آزار دهنده میشه
[COLOR=#222222][SIZE=4][B][url]http://www.gfi.com/esec/esec2012manual.pdf[/url]
[/B][/SIZE]
این manual ش هست و از خود سایشته
موفق باشید[/COLOR]
[B]کنترل سخت افزار ها با End Point Security[/B]
[COLOR=#0079C1][FONT=Arial][B]Protect your network from portable devices such as USB drives, iPods and PDAs[/B][/FONT][/COLOR]
[IMG]http://www.gfi.com/content/cmsimages/win7badge-12689.png[/IMG]
According to the Ponemon Institute, 59% of people who lost their job admitted to taking confidential company information with them either on DVD or using USB drives. The proliferation of consumer devices such as iPods, USB devices, Smart Phones and more, has dramatically increased the risk of intentional and unintentional data leaks and other malicious activity.
While most companies have antivirus software, firewalls, email and web content security to protect against external
[IMG]http://www.gfi.com/content/cmsimages/compatible-13764.png[/IMG]
threats, few realize how easy it is for an employee to simply walk in and copy large amounts of sensitive data onto an iPod or USB stick. There is also an increased risk of malicious and other illegal software introduction to your network through these devices. Of course your administrator could lock down all ports - an ill-advised, difficult and unsustainable solution.
[B]Prevent data theft and virus infection from within the endpoint security software[/B]
[URL="http://www.opswat.com/certified/products"][IMG]http://www.gfi.com/content/cmsimages/dac-bronze-13469.png[/IMG][/URL]
Many businesses are unaware of, or choose to ignore, the threat presented by portable devices in their network environment until some event, ranging from unfortunate to catastrophic, happens. In hard economic times, cybercrime and data leakage increase, finding an easy target in endpoints. The key to managing portable devices in your business environment is to give your administrators direct control over what devices are in use on your network. With GFI EndPointSecurity™ you not only gain control over what is in use but you also know what has been used and by who, and most importantly you gain in-depth knowledge of what data has been copied.
[B][B]Control portable device access to your network with GFI EndPointSecurity[/B][/B]
GFI EndPointSecurity enables administrators to actively manage user access and log the activity of:
[LIST][*]Media players, including iPods, Creative Zen and others[*]USB drives, CompactFlash, memory cards, CDs, floppies & other portable storage devices[*]PDAs, iPhone, BlackBerry handhelds, mobile phones, smart phones and similar communication devices[*]Network cards, laptops and other network connections.[/LIST]
[B][B]Why choose GFI EndPointSecurity?[/B][/B]
[LIST][*]Prevents data leaks and theft by comprehensively controlling access to portable storage devices with minimal administrative effort[*]Prevents introduction of malicious and other unauthorized software to the network[*]Gives administrators greater control - you can block devices by class, file extensions, physical port or device ID from a single location[*]Allows administrators to grant temporary device or port access for a stipulated timeframe[*]Centrally monitors the network, detects connected devices and performs various tasks[*]Automatically protects newly detected computers by deploying an agent and a default blocking policy[*]Can automatically download and install SQL Express if a database server is not available[*]Supports 32 & 64-bit platforms, including Windows 7, Windows Vista and Windows Server 2008 R2.[*]منبع :[URL="http://www.inpco.ir/index.php/networksecurity/gfi-languard/21-endpointsec.html"]کنترل سخت افزار ها با End Point Security[/URL][*][B][URL="http://www.inpco.ir/index.php"]هوشمند شبکه پارتاک[/URL][/B][/LIST]