|iMC EAD Configuration Examples-5PW102-book(chm).rar||369.77 KB|
|iMC EAD Configuration Examples-5PW102-book.rar||624.26 KB|
- Table of Contents
- Related Documents
EAD Configuration Examples
EAD determines the security status of terminals by examining a series of security items such as the anti-virus software, operating system patches, Windows registry entries, and network traffic, and isolates or kicks off "insecure" users to protect network security. In addition, EAD provides hierarchical management and report functions.
The EAD configuration examples are intended to help customers deploy various EAD features in typical network scenarios. These documents provide not only step-by-step configuration procedures but also configuration analysis and guidelines to help customers understand the configuration.
The following are available configuration examples:
· iMC EAD Security Check Configuration Examples