O'Reilly logo

GFI Network Security and PCI Compliance Power Tools by Brien Posey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Solutions in this chapter:

  • Regulating Specific Devices
  • Blacklisting and Whitelisting Devices
  • File Type Restrictions
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

In the previous chapter, I showed you how to set up some basic device permissions, but there is a whole lot more that you can do when it comes to security. In this chapter, I want to show you some of the more advanced security features that you can include in a protection policy.

Regulating Specific Devices

So far I have talked about how you regulate entire classes of devices, but sometimes this blanket approach to security isn't practical. For example, think about the needs of a magazine publisher. Like any other company, they probably want to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required