G Data Client Security Business Handleiding

G Data Antivirussoftware Client Security Business

Bekijk gratis de handleiding van G Data Client Security Business (153 pagina’s), behorend tot de categorie Antivirussoftware. Deze gids werd als nuttig beoordeeld door 8 mensen en kreeg gemiddeld 5.0 sterren uit 4.5 reviews. Heb je een vraag over G Data Client Security Business of wil je andere gebruikers van dit product iets vragen? Stel een vraag

Pagina 1/153
G DATA
BUSINESS
SOLUTIONS
REFERENCE GUIDE
G DATA APPLICATION DEVELOPMENT
ReferenceGuide_Business_13.2
_
2015
-
06
-
08
13:47
SIMPLY
SECURE
G Data Business Solutions Reference Guide
2 Copyright © 2015 G Data Software AG
Contents
Introduction ....................................................................................................................................................... 5
Section A: Planning and deployment ................................................................................................................ 6
1. Network and client management .............................................................................................................. 6
1.1. Network layout ............................................................................................................................................................. 6
1.2. Security components ................................................................................................................................................. 10
2. Choosing a solution ..................................................................................................................................12
2.1. G Data business solutions ......................................................................................................................................... 12
2.2. System requirements ................................................................................................................................................. 13
2.3. Licensing ...................................................................................................................................................................... 14
3. Installation scenarios ...............................................................................................................................15
3.1. Local deployment ....................................................................................................................................................... 15
3.2. Managed Endpoint Security ..................................................................................................................................... 21
4. Deployment ..............................................................................................................................................22
4.1. Preparation .................................................................................................................................................................. 22
4.2. Clean installation ........................................................................................................................................................ 23
4.3. Upgrade installation .................................................................................................................................................. 25
4.4. Network configuration .............................................................................................................................................. 26
4.5. Initial configuration and default settings .............................................................................................................. 27
4.6. Server updates and registration .............................................................................................................................. 29
4.7. Server database backup and restore ...................................................................................................................... 30
4.8. Client deployment ...................................................................................................................................................... 31
4.9. Finalizing deployment............................................................................................................................................... 37
4.10. Subnet server(s) .......................................................................................................................................................... 38
5. Remote administration ............................................................................................................................40
5.1. Desktop application ................................................................................................................................................... 40
5.2. Browser ......................................................................................................................................................................... 41
5.3. Mobile ........................................................................................................................................................................... 43
5.4. MasterAdmin ............................................................................................................................................................... 43
Section B: Using G Data business solutions ....................................................................................................45
6. Dashboard and monitoring .....................................................................................................................45


Product specificaties

Merk: G Data
Categorie: Antivirussoftware
Model: Client Security Business
Softwaretype: Elektronische Software Download (ESD)
Aantal licenties: - licentie(s)
Licentie termijn (jaren): 3 jaar
Verplichte aankoop van licentieniveau: 25 - 49 licentie(s)

Heb je hulp nodig?

Als je hulp nodig hebt met G Data Client Security Business stel dan hieronder een vraag en andere gebruikers zullen je antwoorden