beautypg.com
i
Contents
1 Overview ··································································································································································· 1
EAD functions ···································································································································································· 2
User Security Policy functions ·································································································································· 2
Desktop Asset Management functions ···················································································································· 2
EAD solution ······································································································································································ 3
EAD in the BYOD solution ················································································································································ 3
2 Quick start guide ······················································································································································ 4
Accessing EAD ·································································································································································· 4
Classic mode ···························································································································································· 4
Desktop mode ························································································································································ 10
Security check for PCs ··················································································································································· 12
Configuration procedure ······································································································································ 12
Security check items ·············································································································································· 13
Security level and security mode ························································································································· 13
Isolation mode ······················································································································································· 14
Security check flow chart ······································································································································ 15
Security check for smart devices ·································································································································· 15
Configuration procedure ······································································································································ 15
Security check items ·············································································································································· 16
Security level, security mode, and device action ······························································································· 17
Isolation mode ······················································································································································· 17
SCC collaboration ························································································································································· 18
Desktop asset management ·········································································································································· 18
Desktop asset management procedure ··············································································································· 18
Desktop asset grouping type ································································································································ 18
Desktop asset numbering mode ··························································································································· 18
Desktop asset registration and approval ············································································································ 19
Desktop control scheme ········································································································································ 19
Decentralized management of IMC functions ············································································································· 19
Operator role and group ······································································································································ 20
Service group ························································································································································· 20
Decentralized management by operator and service groups ·········································································· 20
Common operations ······················································································································································ 22
Navigating a list ···················································································································································· 22
Sorting a list ··························································································································································· 23
3 Configuring the security check for PCs ················································································································· 24
Security policy contents ················································································································································· 24
Security level ·························································································································································· 24
Isolation mode ······················································································································································· 24
Security check items ·············································································································································· 25
Managing security policies ··········································································································································· 27
Security policy list contents ··································································································································· 27
Security policy details ··········································································································································· 28
Viewing the security policy list ····························································································································· 35
Viewing security policy details ····························································································································· 35
Adding a security policy ······································································································································· 35
Modifying a security policy ·································································································································· 36
Deleting a security policy ····································································································································· 37