o(╥﹏╥)oSad

WeChat cannot downloadDefender Illegal Outreach Control Management System, but just click on the upper right corner and select open in browser or Safari!
Defender Illegal Outreach Control Management System

Defender Illegal Outreach Control Management System

  • Size: 25.18M
  • Language: Simplified Chinese
  • category: System monitoring
  • System: Winxp/vista/win7/win8/2000/2003

Security management, illegal access external control, and process control of mobile storage devices such as USB flash drives. The latest support for win8, 64-bit and other operating systems.

1.USB security management system:

Manage the computer USB port and set its status to: disabled, open, read-only;

Manage the disc burner and set the status to: disabled, open, read-only;

Manage infrared, Bluetooth, serial port, parallel port and other ports: open, disable;

For authorized use of mobile devices, when the USB port is set to be disabled, several disks can be authorized and still used normally;

Mobile devices are managed by departments so that mobile devices and computers can be bound one-to-one, one-to-many, or many-to-one;

Keep a log.

You can authorize bit-encrypted disks and portable disks on removable storage devices:

The encrypted disk is authorized for internal use and cannot be opened on computers outside the unit;

The files in the encrypted area can be exported from the external encrypted disk by entering the password on the external computer of the unit;

And record the external disk log: when and what files were exported.

2. Illegal access to the external control system:

External laptops and other equipment are not allowed to access the unit's intranet and intranet terminal computers without permission;

Legal terminal computers on the intranet are not allowed to access other networks except the company's intranet without permission.

3. Process control

The computer is not allowed to run certain programs, and the process can be set as a blacklist;

The computer is only allowed to run certain processes, and you can set a whitelist for the process (use the whitelist with caution to avoid affecting the normal use of the computer).

Version: 2012.5.0 | Update time: 2014-06-16

Similar recommendations

Latest updates

Defender Illegal Outreach Control Management System Review

  • 1st floor Huajun netizen 2015-05-28 01:13:19
    The interface design of the Defender Illegal Outreach Control Management System is easy to use and has rich functions. I highly recommend it!
  • 2nd floor Huajun netizen 2020-07-19 08:34:11
    The Defender illegal outreach control and management system software is very easy to use, the download speed is very fast, and it is very convenient!
  • 3rd floor Huajun netizen 2017-02-22 18:32:08
    Defender's illegal outreach control and management system is pretty good. It downloads very quickly. I give you a good review!

Recommended products

Everyonealso likeThese:

+

This application has not passed real-name authentication and you can download it through the mobile assistant.

CancelOK