O'Reilly logo

GFI Network Security and PCI Compliance Power Tools by Brien Posey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Solutions in this chapter:

  • Creating Protection Policies
  • Deploying Agents
  • Setting Device Permissions
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

In the previous chapter, we worked through the installation and initial configuration process for GFI EndPointSecurity. Now it's time to actually begin using the software. Throughout this chapter, and the remainder of the section on GFI EndPointSecurity, you will find that this is one of the more passive security tools. Using it involves setting up some policies, and then letting it do its thing.

Creating Protection Policies

Begin the process by launching GFI EndPointSecurity. You can access it by selecting the All Programs | GFI EndPointSecurity 4.0 | GFI EndPointSecurity ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required