Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Usb security management

2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/03 Report--

Defenders are concerned about the security of intranet information to prevent internal information from leaking through usb ports, mobile storage media, random access to the external network, illegal access to the internal network, and so on. At the same time, it can allow authorized mobile media to circulate and use, and encrypt the U disk by using a password to read and use an important U disk both inside and outside the unit, and at the same time carry out log audit function on it. In a word, it is impossible to get out of the internal and external ones, but you can set no restrictions on the use of the external network of the U disk. Very careful security precautions are in the defender's software.

1.Windows underlying control, transparent user operation, improve ease of use.

two。 Manage USB, CD-ROM, floppy drive, Bluetooth, infrared, serial port, parallel port, tape drive and other ports and storage devices.

3.USB ports are open, disabled, and read-only.

4. Optical drive to achieve disabled, open, but also to achieve the read-only setting of the burner.

5. U disk, mobile hard disk, SD card, TF card and other devices can be authorized by domain, single machine binding, sub-department authorization and so on.

6. The mobile storage device can be encrypted and the information will not be disclosed when the storage device is lost. Encryption devices can be used for portable use through password protection.

7. Authorization and encryption functions can be used alone or at the same time, convenient and flexible.

8. Comprehensive log audit function (including external disk log, off-network log, etc.).

9. The network version is directly pushed and installed, and the server is cascaded.

10. Periodic reminder of log backups.

11. Permission management of license disk: cumulative use days, use times, expiration after a few days, authorization read-only, etc.

twelve。 The function of the server to capture the screen and retain the license of the client.

13. Terminal access control to prevent illegal connection of external computers.

14. China takes the lead in supporting VISTA/2008/Win7/Win8 and 64-bit Windows operating systems.

15. A small number of domestic products have been certified and licensed by the Ministry of Public Security (there are only two similar products at present).

16. The client exception or cracking displays the relevant status in the security information of the server and gives an alarm.

17. Manage removable storage media without affecting the normal use of devices such as USB software dogs and USB printers (which can be set separately).

18. The client follows the windows operating specification and does not change the user's habits.

19. The use of Windows system underlying technology, put an end to the use of various technologies, the use of high-strength anti-cracking proprietary technology, at the same time, there is no conflict with a variety of antivirus software and security software.

20. The anti-cracking technology is more perfect.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report