H3C Technologies H3C Intelligent Management Center User Manual
H3c intelligent management center, Ead security policy administrator guide
Table of contents
Document Outline
- 1 Overview
- 2 Quick start guide
- 3 Configuring the security check for PCs
- Security policy contents
- Managing security policies
- Security policy list contents
- Security policy details
- Basic Information area
- Isolation Mode area
- URL Control area
- Anti-Virus Software Control area
- Anti-Spyware Software Control area
- Firewall Software Control area
- Anti-Phishing Software Control area
- Hard Disk Encryption Software Control area
- PC Software Control area
- Patch Software Control area
- Windows Patch Control area
- Registry Control area
- Share Control area
- Asset Registration Status Check area
- Windows System Restore area
- Periodic Check area
- Viewing the security policy list
- Viewing security policy details
- Adding a security policy
- Modifying a security policy
- Deleting a security policy
- Managing security levels
- Making a security level action take effect
- Security level list contents
- Security level details
- Basic Information area
- Traffic Monitoring area
- Check Anti-Virus Software area
- Check Anti-Spyware Software area
- Check Firewall Software area
- Check Anti-Phishing Software area
- Check Hard Disk Encryption Software area
- Check PC Software Control Group area
- Check Patch Management Software area
- Check Windows Patches area
- Check Registry area
- Check Share area
- Check Asset Registration Status area
- Check Windows System Restore
- Check Operating System Password area
- Viewing the security level list
- Viewing security level details
- Adding a security level
- Modifying a security level
- Deleting a security level
- Managing client ACLs
- Managing URL control policies
- Managing domain URL groups
- Managing IP URL groups
- Managing anti-virus software policies
- Managing anti-spyware software policies
- Managing firewall software policies
- Managing anti-phishing software policies
- Managing hard disk encryption software policies
- Hard disk encryption software policy list contents
- Hard disk encryption software policy details
- Viewing the hard disk encryption software policy list
- Viewing hard disk encryption software policy details
- Adding a hard disk encryption software policy
- Modifying a hard disk encryption software policy
- Deleting a hard disk encryption software policy
- Managing PC software control groups
- PC software control group list contents
- Viewing the PC software control group list
- Querying PC software control groups
- Deleting a PC software control group
- Managing software-type PC software control groups
- Managing process-type PC software control groups
- Managing service-type PC software control groups
- Managing file-type PC software control groups
- Managing common software
- Managing patch software
- Managing Windows patches
- Managing Windows versions
- Managing registry control policies
- Managing share control
- Managing traffic control
- Managing password control
- Performing security check by using security policies
- 4 Configuring Internet access control
- 5 Configuring the security check for smart devices
- 6 Managing hierarchical EAD networks
- Configuring the policy management mode
- Managing nodes in a hierarchical EAD network
- Deploying services, security policies, and service parameters
- Managing the deployment and receipt history
- Managing the EAD node topology
- 7 Managing desktop assets
- Managing asset groups
- Managing assets
- Registering assets
- Asset list contents
- Asset details
- System Information area
- Operating System Information area
- Hardware Information area
- Shortest Startup Time Ranking area
- Screen Saver Information area
- Network Connection List area
- Partition List area
- Logical Disk List area
- Software List area
- Patch List area
- Process List area
- Service List area
- Share List area
- Port List area
- Viewing the asset list
- Viewing asset details
- Querying assets
- Adding an asset
- Batch importing assets
- Modifying an asset
- Deleting an asset
- Regrouping an asset
- Verifying an asset
- Exporting asset information
- Collecting asset statistics
- Collecting statistics by asset type
- Collecting statistics by CPU
- Collecting statistics by hard disk
- Collecting statistics by operating system
- Collecting statistics by software installed
- Managing export tasks
- 8 Configuring desktop control schemes and policies
- Configuring desktop control schemes
- Configuring peripheral policies
- Configuring energy-saving policies
- Configuring monitoring alarm policies
- 9 Auditing desktop assets
- Asset hardware change record audit
- Asset software change record audit
- USB file transfer log audit
- Printer use log audit
- Unauthorized peripheral use record audit
- Unauthorized peripheral use list contents
- Unauthorized peripheral use log export history list contents
- Viewing the unauthorized peripheral use record list
- Viewing the export history of unauthorized peripheral use records
- Querying the unauthorized peripheral use records
- Exporting the unauthorized peripheral use records
- Terminal file audit
- 10 Configuring software deployment
- Preparing to use the software deployment function
- Configuring software deployment server settings
- Software server settings list contents
- Software deployment server settings details
- Viewing the software deployment server settings list
- Viewing software deployment server settings details
- Adding software deployment server settings
- Modifying software deployment server settings
- Deleting software deployment server settings
- Configuring software deploy tasks
- 11 EAD audit
- 12 EAD service reports
- Real-time reports
- All-node online users 24-hour trend graph
- Asset information report
- Asset Report by Software
- Asset type report
- Asset usage report
- CPU report
- Hard Disk capacity report
- Illegal peripheral use report
- Insecurity category statistic report
- Multi-node certain security policy statistics report
- Multi-node online users comparison chart
- Multi-node security check items report
- Multi-node single-security check item failures comparison chart
- Multi-node user counts comparison chart
- Multi-node user data statistics report
- Online user security status report
- OS language report
- OS version report
- Safe log gather statistic report
- Single-node online users 24-hour trend graph
- Single-node security check failure report
- Software installation report
- Software Report by Asset
- Scheduled reports
- Asset Report by Software
- Asset type report
- Asset usage report
- CPU report
- Hard disk capacity report
- Illegal peripheral use report
- Insecurity category statistic report
- Online user security status report
- OS language report
- OS version report
- Safe log gather statistic report
- Software installation report
- Software Report by Asset
- Real-time reports
- 13 Configuring service parameters