Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How many new products are installed in the deployment of velvet security enterprises & quot; Jane & quot;?

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

With the increasing dependence of enterprise business on the network, enterprises are paying more and more attention to network security, but in recent years, a variety of network attacks can be said to be repeatedly banned, and there is a growing trend. Trojans, security vulnerabilities, blackmail software and other familiar terms have become a "nightmare" for enterprises.

In the face of the deteriorating network security situation, many enterprises are looking for effective network security defense tools and methods, but there is no way to start in the face of the complex network security market. A large number of virus detection and killing software are mostly criticized by users, similar to the "rogue" bundled sales, advertising pop-up windows make users annoyed. The editor has been thinking, is there a piece of software that can really do pure, focused virus detection? By chance, I was attracted by a small advertisement on my own IT168 article page:

Velvet Security I know, not long ago, it announced its official entry into the to B security market, releasing the first enterprise security product of velvet-- velvet terminal security management system 1.0.I think the enterprise software that I really want to focus on security is coming!

Apply for a trial

According to the official website, the latest enterprise-level security product released by Sinopec will be open to all enterprises for a free trial period of three months. Such a big "cheap" editor will not let go. Naturally, the application interface for trial was clicked on as soon as possible (please click to enter the trial application):

Enter the trial application interface, fill in the enterprise information and contact information as required, verify it and click submit.

After the submission is completed, Trench Security will send an email to the contact's mailbox, open the email and click the "confirm" button as required to jump to the next interface.

At this point, you will find that the trial application has been submitted, and at this point, users only need to keep their contact information open and wait.

Server-side deployment

After the trial application information is approved, tindery or through the form of mobile phone text messages and e-mail feedback, give the serial number and password of the trial product, click the login address to complete the jump.

After jumping to the login interface, enter the serial number and password displayed in the email to log in.

After the login is successful, the authorization information interface appears. Click "download installation package" as required to complete the download of the server-side installation package, and click "download license File" according to the prompts (to be used later).

After downloading the installation package to install, check "Open configuration Wizard tool" and click OK to complete the installation, jump to the configuration interface.

After the interface jumps, run the configuration tool to configure the address, port, etc., and modify the password of the Super Admin.

Click Save after the modification is completed, and the service will be restarted automatically.

After the service is restarted, the browser will automatically implement the web background management interface, and there is a client download button in the management interface, which can download client software for enterprise employees. Enter the user name and password and click to log in to enter the configuration interface. The default user name is admin, and the password is the modified Super Admin password.

When you enter the background interface, you will find that the authorization status shows that it is not authorized, and the license file you just downloaded comes in handy.

The license file downloaded in advance will be updated to complete the authorization, and the number of authorized terminals and the remaining days will be displayed after authorization.

At this point, the velvet terminal security management system 1.0 server-side initialization deployment is basically completed, want to pay attention to more server-side configuration content, will continue to update later.

Client deployment

Deploy the client after the server side is deployed.

First of all, go back to the previous login interface and click the download client to complete the download.

Run the client installation package after the download is complete. (if there is any change in the IP or domain name and port of the management control center, replace the IP or domain name and port address in the second half of the installation package with the IP or domain name or port of the management control center.)

After the installation is complete, the client automatically connects with the control center on the server side.

The automatic installation and deployment of users in the domain can be completed by downloading the domain deployment tool in the administrative tools interface and deploying the boot or login script on the domain server.

From this point of view, whether it is the server side or the client side, its deployment and installation is very convenient, which can bring users a good deployment experience, so what is the performance of velvet terminal security management system 1.0 in terms of function?

Function introduction

In terms of software functions, velvet terminal security management system 1.0 is readily available. According to the official introduction, its functions mainly include the following aspects:

● virus killing: virus killing is the basic function of security software. Users can scan actively to detect the existence of viruses, Trojans and other threats in the computer. When users use the virus detection and killing function, the velvet terminal security management system will efficiently scan system files through the self-developed anti-virus engine, find viruses and Trojans in time, and efficiently deal with and eliminate related threats.

● terminal management: through the terminal management function, administrators can freely manage terminal computers in groups, and scan all or individual terminals for virus scanning, message sending, shutdown, restart and other controls. After receiving the killing instructions issued by the control center, the terminal will automatically scan the task in the background, and the terminal will use a pop-up window to prompt when it receives the message sent by the control center.

● protection policy management: the administrator can view the protection policy status of all terminals, and set the corresponding protection policy for the designated terminal, so that the terminal can automatically deal with threat events. The essence of deploying the protection strategy is to regulate and control the various projects of the Terminal Protection Center module. including: file real-time monitoring, malicious behavior monitoring, U disk protection, download protection, mail monitoring, system reinforcement, software installation and interception, browser protection, hacker intrusion prevention, external attack detection, malicious website interception and so on.

● file management: the administrator can not only view the software installation of all terminals, but also require the terminal to uninstall a certain software. In addition, the administrator can use the file distribution function to send a file to the designated terminal, or push to install some software.

● vulnerability repair: administrators can check the vulnerabilities of all terminals, including high-risk vulnerabilities, functional vulnerabilities and ignored vulnerabilities, and carry out unified vulnerability scanning and repair tasks for terminals to ensure terminal security.

● event log: administrators can view all events in a certain period of time, including file monitoring, e-mail monitoring, malicious behavior monitoring, etc., by sorting details and terminals, and using four tags: virus defense, system defense, network defense, and historical tasks. The administrator is free to set the terminal grouping and time period you want to view, and search for the desired keywords, which is very convenient to analyze the security status of the terminal computer.

● administrative tools: administrators can see the log data size on the administrative tools page and clean up the logs in a timely manner. The software can also be deployed uniformly to force the domain users to push and install the velvet terminal security software.

● account management: through the "Super Admin" account, you can add and manage the "Administrator" account and authorize other "administrators" to operate the module to assist in the management of the control center and the terminal.

It can be said that, as an enterprise-level virus detection software, velvet terminal security management system 1.0 can well meet the security needs of users.

Simple and quick installation and deployment, complete security functions, this is the best security choice for enterprises. At present, velvet security enterprise-level products offer 90-day free trial activities for all institutional users. Interested partners can apply for a trial. The trial application address is as follows: https://www.huorong.cn/ess_it168.html

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report