beautypg.com
v
Viewing the online audit log list ························································································································ 115
Querying online audit logs ································································································································· 115
Viewing online audit log details ························································································································ 117
Viewing the offline audit log list ························································································································ 117
Querying offline audit logs ································································································································ 118
Configuring Internet access logging parameters ······································································································ 118
Applying Internet access policies ······························································································································· 119
Configuring the default Internet access policy for an access service ···························································· 119
Assigning an Internet access policy to an access scenario ············································································ 119
5 Configuring the security check for smart devices ······························································································ 120
Security policy contents ··············································································································································· 120
Security level ························································································································································ 120
Isolation mode ····················································································································································· 121
Security check item ·············································································································································· 121
Managing MDM vendors ············································································································································ 122
Configuring MDM vendor settings ···················································································································· 122
Manually validating MDM vendor settings ······································································································ 122
Managing security policies ········································································································································· 122
Security policy list contents ································································································································· 122
Security policy details ········································································································································· 123
Viewing the security policy list ··························································································································· 124
Viewing security policy details ··························································································································· 124
Adding a security policy ····································································································································· 124
Modifying a security policy ································································································································ 125
Deleting a security policy ··································································································································· 125
Managing security levels ············································································································································· 125
Security level contents ········································································································································· 125
Security level list contents ··································································································································· 126
Security level details ············································································································································ 126
Viewing the security level list ····························································································································· 127
Viewing security level details ····························································································································· 127
Adding a security level ······································································································································· 128
Modifying a security level ·································································································································· 128
Deleting a security level ······································································································································ 129
Managing MDM collaboration policies ···················································································································· 129
MDM collaboration policy list contents ············································································································· 129
MDM collaboration policy details ····················································································································· 130
Viewing the MDM collaboration policy list ······································································································ 130
Viewing MDM collaboration policy details ······································································································ 131
Adding an MDM collaboration policy ·············································································································· 131
Modifying an MDM collaboration policy ········································································································· 132
Deleting an MDM collaboration policy ············································································································ 132
6 Managing hierarchical EAD networks ··············································································································· 133
Configuring the policy management mode ··············································································································· 133
Managing nodes in a hierarchical EAD network ····································································································· 134
Child node list contents ······································································································································· 134
Child node information ······································································································································· 134
Parent node information ····································································································································· 136
Viewing the child node list ································································································································· 136
Modifying the name of the current node ·········································································································· 136
Viewing child node details ································································································································· 137
Adding a child node ··········································································································································· 137
Modifying a child node ······································································································································ 138