In the previous chapter, I showed you how GFI EndPointSecurity is able to lock down end point devices on network workstations. However, network security is not a “set it and forget it” proposition. You need a way of verifying that the policies that you have put into place are working. It would also be nice to know when someone is trying to violate the policies that you have established. That's where this chapter comes into play. In this chapter, I will show you how to keep tabs on GFI EndPointSecurity.