3 3 audit host range.
The host is being handled.the information system, single network hosts. Common operation system including Windows 98, Windows2000, Windows XP, Unix, Linux, etc. Coach Bags The host of the audit system is controlled with different operating systems support the host machine, etc, networking USES the same software realization to solve networking machine, single, notebook of audit. Vibram Five Fingers According to the relevant provisions of the state, confidential information system is divided into different security domain. By dividing the secure domain, also can achieve this by setting security isolating devices (such as firewalls). Vibram FiveFingers Host audit system should consider different security domain of the host, which can control and management of different network firewall is controlled and installation of the controlled control and information collection to the control center, in order to uniform. audit. Also can give a simple network topology and provide convenience for management personnel.Five Fingers
3 4 main behavior. monitoring.
General computer use computer software and hardware, especially on information safety, unclear knowledge of computer security status. Host audit system of the software should have controlled host safety state, FiveFingers mainly used for checking self-checking function terminal security strategy implementation, including patch installation, weak passwords, software installation, antivirus software installation, check report form, used for the security personnel to have a clear understanding of, then pertinently measures.reebok By using personnel can be self-checking function to open or closed. Inspection report to the control center.
Host audit system on the use of the host of controlled restriction, monitor and record, including document revision, copying, Coach Handbags printing, monitoring and records, dial-up behavior. monitoring and records, various external interface prohibited or opening (serial, parallel, USB, etc.), classification management for USB devices, such as the USB storage equipment (U disk drive), USB, input devices (USB keyboard, mouse), USB2KEY and custom equipment. reebok shoes
来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/24134257/viewspace-665900/,如需转载,请注明出处,否则将追究法律责任。
转载于:http://blog.itpub.net/24134257/viewspace-665900/