iMC EAD Configuration Examples-5PW102

HomeSupportNetwork Operations & ManagementIntelligent Management Center 7Configure & DeployConfiguration ExamplesiMC EAD Configuration Examples-5PW102
Table of Contents
Related Documents

EAD Configuration Examples

EAD determines the security status of terminals by examining a series of security items such as the anti-virus software, operating system patches, Windows registry entries, and network traffic, and isolates or kicks off "insecure" users to protect network security. In addition, EAD provides hierarchical management and report functions.

The EAD configuration examples are intended to help customers deploy various EAD features in typical network scenarios. These documents provide not only step-by-step configuration procedures but also configuration analysis and guidelines to help customers understand the configuration.

The following are available configuration examples:

·     iMC EAD Security Check Configuration Examples

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网