DeviceLock® DLP 8.3 User Manual © 1996-2020 DeviceLock, Inc. All Rights Reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means for any purpose other than the purchaser’s personal use without the prior written permission of DeviceLock, Inc. Trademarks DeviceLock and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. DeviceLock DLP - User Manual Software version: 8.3 Updated: March 2020 Contents About This Manual . .8 Conventions . 8 DeviceLock Overview . .9 General Information . 9 Managed Access Control . 13 DeviceLock Service for Mac . 17 DeviceLock Content Security Server . 18 How Search Server Works . 18 ContentLock and NetworkLock . 20 ContentLock and NetworkLock Licensing . 24 Basic Security Rules . 25 Installing DeviceLock . .26 System Requirements . 26 Deploying DeviceLock Service for Windows . 30 Interactive Installation . 30 Unattended Installation . 35 Installation via Microsoft Systems Management Server . 36 Installation via DeviceLock Management Console . 36 Installation via DeviceLock Enterprise Manager . 37 Installation via Group Policy . 38 Installation via DeviceLock Enterprise Server . 44 Deploying DeviceLock Service for Mac . 45 Interactive Installation . 45 Command Line Utility . 47 Unattended Installation . 48 Installing Management Consoles . 49 Installing DeviceLock Enterprise Server . 52 Installation Steps . 52 Installing and Accessing DeviceLock WebConsole . 65 Prepare for Installation . 65 Install the DeviceLock WebConsole . 66 Access the DeviceLock WebConsole . 67 Installing DeviceLock Content Security Server . 68 Prepare to Install . 68 Start Installation . 70 Perform Configuration and Complete Installation . 71 DeviceLock Consoles and Tools . .83 DeviceLock Management Console . 83 Interface . 84 Connecting to Computers . 86 DeviceLock Service Settings Editor . 90 Creating or Modifying a Policy . 91 DeviceLock Group Policy Manager . 93 How Group Policy is applied . 94 Getting started with DeviceLock Group Policy Manager . 95 Using DeviceLock Group Policy Manager . 98 Using Resultant Set of Policy (RSoP) . 100 Using Group Policy to Manage DeviceLock Service for Mac . 101 3 DeviceLock Enterprise Manager . 102 Interface . 103 Scan Network Dialog Box . 104 Plug-ins . 112 Open / Save / Export . 117 Comparing Data . 118 Filtering Data . 122 DeviceLock Certificates . 124 Generating DeviceLock Certificates . 124 Installing/Removing DeviceLock Certificate . 126 DeviceLock Signing Tool . 129 Device Code . 130 Service Settings . 131 DeviceLock Service . .136 Managing DeviceLock Service for Windows . 136 Service Options . 138 Devices Node . 191 Permissions (Regular Profile) . 192 Auditing, Shadowing & Alerts (Regular Profile) . 202 USB Devices White List (Regular Profile) . 215 Media White List (Regular Profile) . 221 Security Settings (Regular Profile) . 225 Audit Log Viewer (Service) . 229 Shadow Log Viewer (Service) . 235 Managing DeviceLock Service for Mac . 244 Enabling NTLM authentication for local users on Mac OS X . 245 Content-Aware Rules (Regular Profile) . .248 Rules for Devices . 248 Content-Aware Rules Node . 249 Access Control . 252 Content-Aware Shadowing . 257 Content-Aware Detection . 259 Rules for Protocols . 261 Content-Aware Rules Node . ..
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages724 Page
-
File Size-