Article continued:
Detailed explanation of the functions of the terminal security management system (1)Detailed explanation of the functions of the terminal security management system (2).
Control the use of various computer peripherals to prevent corporate secrets from being illegally viewed, copied and taken out through peripherals.
1. Manage the use of mobile storage devices such as USB flash drives, mobile hard disks, smart phones, optical drives, recorders, etc., to prevent internal information from being taken out of the company at will.
2. Manage the use of network equipment such as communication interfaces, Bluetooth, infrared, wireless network cards, and virtual network cards to avoid the risks caused by illegal external connections.
3. Manage the application of audio equipment such as sound cards and cameras to avoid distraction during working hours.
4. It is forbidden for unauthorized users to use burning software or optical drives to burn optical discs.
5. Support the use of equipment, open during breaks, and realize humanized management.
Effectively audit every printing operation, flexibly control printing permissions, and prevent information leakage and printing waste from paper channels.
1. Manage the user's access to all kinds of printers, including various physical printers, virtual printers, shared printers, local printers, network printers, etc., and can restrict the use of high-cost printers (such as color printers, etc.) for printing at will, saving printing costs.
2. Support printing program management, restrict applications that can be printed, such as preventing direct printing leakage of programs such as ERP, OA, etc., for example, a machine Word file is allowed to be printed, while CAD is forbidden to print.
3. It can back up the printing content in real time, and record the printing log and printing list in detail, including the computer name, printer name, printing time, file name, file content, number of pages, number of copies and other information, and can export the printing record in batches, which is convenient for the administrator to prevent security risks, trace and audit the printing content.
4. Support custom watermark, which can display the company logo, company copyright statement, printing time, printing user information on the printed paper document, and support text watermark, watermark, watermark, dot matrix watermark, etc.
It automatically collects software and hardware IT assets and changes to help administrators realize real-time, visualized, automated, and centralized IT asset management.
1. Automatically scan, monitor and record the IT assets of the client computer's software and hardware and their changes.
2. Support customized asset query and statistics to understand the use and change of computer software and hardware assets.
3. Provide complete, clear and intuitive software and hardware asset reports or computer configuration lists at any time to understand the deployment of IT assets.
4. For any illegal asset change or theft, it can be reported to the police in time and keep records to effectively prevent the loss of assets.
It can query the basic information of the client computer, provide remote technical support for the client computer, and quickly respond to system failures.
1. Real-time view and remote maintenance of the basic information and running status of the client computer, including applications, processes, performance, disks, system services, shared folders and other information.
2. It can lock, close, restart, log out and send notification information to any client computer in the console, and take measures to stop it in time when unsafe behaviors are found.
3. You can configure the sharing policy to the terminal computer, and you can view the sharing list, including the sharing name, sharing path, and the number of shared users.
4. Support browsing all hard disk information of the target terminal computer, which is convenient for the administrator to understand the file and folder information of the terminal computer more clearly and intuitively.