O'Reilly logo

GFI Network Security and PCI Compliance Power Tools by Brien Posey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Solutions in this chapter:

  • The End User Experience
  • Removing the Agent Component
  • Making Temporary Exceptions
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

So far I've spent a lot of time talking about the various ways that you can regulate endpoint devices, so you are probably ready to move on and actually start locking things down. If you've been setting up protection policies, you have already begun the lock down process. Unlike some of the other products out there, you don't have to scan the computers on your network to see if anyone is using unauthorized devices. The agent component that resides on each computer in a protection group is designed to compare any attempted device use against the applicable ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required