beautypg.com
iv
Adding a Windows version ································································································································· 93
Deleting a Windows version ································································································································ 94
Managing registry control policies ······························································································································ 94
Registry control list contents·································································································································· 94
Registry control list details ···································································································································· 95
Viewing the registry control list ···························································································································· 96
Viewing a registry control ···································································································································· 96
Querying the registry control ······························································································································· 96
Adding a registry control ······································································································································ 96
Modifying a registry control ································································································································· 97
Deleting a registry control ···································································································································· 97
Managing share control ················································································································································ 98
Share control list contents ····································································································································· 98
Share control details ············································································································································· 98
Viewing the share control list ······························································································································· 99
Viewing share control details ······························································································································· 99
Adding a share control ········································································································································· 99
Modifying a share control ·································································································································· 100
Deleting a share control ····································································································································· 100
Managing traffic control·············································································································································· 100
Traffic control list contents ·································································································································· 100
Traffic control details ··········································································································································· 101
Viewing the traffic control list ····························································································································· 101
Viewing traffic control details ···························································································································· 102
Adding a traffic control ······································································································································ 102
Modifying a traffic control ·································································································································· 102
Deleting a traffic control ····································································································································· 103
Managing password control ······································································································································· 103
Modifying a password control ··························································································································· 103
Performing security check by using security policies ································································································ 104
Configuring real-time monitoring ······················································································································· 104
Configuring the default security policy for roaming users ·············································································· 105
Assigning security policies ································································································································· 105
4 Configuring Internet access control ···················································································································· 107
Overview ······································································································································································· 107
Internet access control methods ························································································································· 107
Client ACLs ··························································································································································· 108
Audit of unauthenticated Internet access ·········································································································· 108
Audit of authenticated Internet access ·············································································································· 108
Internet access audit logs ··································································································································· 108
Internet access logging parameters ··················································································································· 108
Managing Internet access policies ····························································································································· 109
Viewing the Internet access policy list ··············································································································· 109
Viewing Internet access policy details ·············································································································· 109
Adding an Internet access policy ······················································································································ 110
Modifying an Internet access policy ·················································································································· 111
Deleting an Internet access policy ····················································································································· 112
Managing Internet access audit policies ··················································································································· 112
Viewing the Internet access audit policy list ····································································································· 112
Viewing Internet access audit policy details ····································································································· 113
Adding an Internet access audit policy ············································································································· 113
Modifying an Internet access audit policy ········································································································ 114
Deleting an Internet access audit policy ··········································································································· 114
Managing Internet access audit logs ························································································································· 115