beautypg.com

Security check flow chart, Security check for smart devices, Configuration procedure – H3C Technologies H3C Intelligent Management Center User Manual

Page 31

background image

15

Security check flow chart

PC security check procedures depend on the security mode and isolation mode configured in the User

Security Policy module.

Figure 6

shows the process by which the EAD server performs a security check for

PCs.

Figure 6 PC security check procedures

Security check for smart devices

EAD can cooperate with a third-party MDM server and client to perform a security check on Android or

iOS smart devices.

Configuration procedure

To configure security checking for smart devices:

1.

Obtain the MDM vendor information and permissions to use the MDM API. EAD supports Citrix

and MobileIron.

2.

Configure the MDM vendor in the User Security Policy service parameter settings.