George Persian Logout

iMC EAD Configuration Examples-5PW102

Table of Contents
Related Documents

EAD Configuration Examples

EAD determines the security status of terminals by examining a series of security items such as the anti-virus software, operating system patches, Windows registry entries, and network traffic, and isolates or kicks off "insecure" users to protect network security. In addition, EAD provides hierarchical management and report functions.

The EAD configuration examples are intended to help customers deploy various EAD features in typical network scenarios. These documents provide not only step-by-step configuration procedures but also configuration analysis and guidelines to help customers understand the configuration.

The following are available configuration examples:

·     iMC EAD Security Check Configuration Examples