1.USB security management system:
Manage the computer USB port and set its status to: disabled, open, read-only;
Manage the disc burner and set the status to: disabled, open, read-only;
Manage infrared, Bluetooth, serial port, parallel port and other ports: open, disable;
For authorized use of mobile devices, when the USB port is set to be disabled, several disks can be authorized and still used normally;
Mobile devices are managed by departments so that mobile devices and computers can be bound one-to-one, one-to-many, or many-to-one;
Keep a log.
You can authorize bit-encrypted disks and portable disks on removable storage devices:
The encrypted disk is authorized for internal use and cannot be opened on computers outside the unit;
By entering the password on the external encrypted disk, you can export the files in the encrypted area;
And record the external disk log: when and what files were exported.
2. Illegal access to the external control system:
External laptops and other equipment are not allowed to access the unit's intranet and intranet terminal computers without permission;
Legal terminal computers on the intranet are not allowed to access other networks except the company's intranet without permission.
3. Process control
The computer is not allowed to run certain programs, and the process can be set as a blacklist;
The computer is only allowed to run certain processes, and you can set a whitelist for the process (use the whitelist with caution to avoid affecting the normal use of the computer).
it works
it works
it works