Endpoint Admission Defense Help >> Operation Guide >> Security Policy Management

Security Policy Management

The key to EAD security authentication is to configure and deploy security policies for different types of users. A security policy includes these parts: basic information, isolation mode, URL control, anti-virus software control, anti-spyware software control, firewall software control, anti-phishing software control, hard disk encryption software control, PC software control group, Windows patch control, patching software control, registry control, share control, asset registration status check, Windows System Settings, regular check, and MDM Collaboration Policy. Security policies control user security authentication. You can deploy security policies by binding them with services. After an access user is granted access to a service that contains a security policy, the user terminal is under the protection of the EAD security defense system defined by the security policy. A security policy includes the following information:

Functions

Parameters

Related Topics