If you are looking for software to use, go to Huajun Software Park! software release

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, and business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card) and a photo of yourself holding your ID card) and send it to your email address http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Location: front pagePC softwaresecurity softwareSystem monitoring Defender Illegal Outreach Control Management System
Defender Illegal Outreach Control Management System

Defender Illegal Outreach Control Management System 2012.5.0

QR code
  • Software licensing: Trial software
  • Software size: 25.18MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2014-06-16
  • Application platform: Winxp/vista/win7/win8/2000/2003
  • Software language: Simplified Chinese
  • Version: 2012.5.0

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Download address

Basic introduction
Defender’s Illegal Outreach Control Management System Section 1 Logo
Security management, illegal access external control, and process control of mobile storage devices such as USB flash drives. The latest support for win8, 64-bit and other operating systems.

1.USB security management system:

Manage the computer USB port and set its status to: disabled, open, read-only;

Manage the disc burner and set the status to: disabled, open, read-only;

Manage infrared, Bluetooth, serial port, parallel port and other ports: open, disable;

For authorized use of mobile devices, when the USB port is set to be disabled, several disks can be authorized and still used normally;

Mobile devices are managed by departments so that mobile devices and computers can be bound one-to-one, one-to-many, or many-to-one;

Keep a log.

You can authorize bit-encrypted disks and portable disks on removable storage devices:

The encrypted disk is authorized for internal use and cannot be opened on computers outside the unit;

By entering the password on the external encrypted disk, you can export the files in the encrypted area;

And record the external disk log: when and what files were exported.

2. Illegal access to the external control system:

External laptops and other equipment are not allowed to access the unit's intranet and intranet terminal computers without permission;

Legal terminal computers on the intranet are not allowed to access other networks except the company's intranet without permission.

3. Process control

The computer is not allowed to run certain programs, and the process can be set as a blacklist;

The computer is only allowed to run certain processes, and you can set a whitelist for the process (use the whitelist with caution to avoid affecting the normal use of the computer).

FAQ

Defender Illegal Outreach Control Management System

Defender Illegal Outreach Control Management System 2012.5.0

closure