H3C Technologies H3C Intelligent Management Center User Manual

Page 10

Advertising
background image

iv

Adding a Windows version ································································································································· 93

 

Deleting a Windows version ································································································································ 94

 

Managing registry control policies ······························································································································ 94

 

Registry control list contents·································································································································· 94

 

Registry control list details ···································································································································· 95

 

Viewing the registry control list ···························································································································· 96

 

Viewing a registry control ···································································································································· 96

 

Querying the registry control ······························································································································· 96

 

Adding a registry control ······································································································································ 96

 

Modifying a registry control ································································································································· 97

 

Deleting a registry control ···································································································································· 97

 

Managing share control ················································································································································ 98

 

Share control list contents ····································································································································· 98

 

Share control details ············································································································································· 98

 

Viewing the share control list ······························································································································· 99

 

Viewing share control details ······························································································································· 99

 

Adding a share control ········································································································································· 99

 

Modifying a share control ·································································································································· 100

 

Deleting a share control ····································································································································· 100

 

Managing traffic control·············································································································································· 100

 

Traffic control list contents ·································································································································· 100

 

Traffic control details ··········································································································································· 101

 

Viewing the traffic control list ····························································································································· 101

 

Viewing traffic control details ···························································································································· 102

 

Adding a traffic control ······································································································································ 102

 

Modifying a traffic control ·································································································································· 102

 

Deleting a traffic control ····································································································································· 103

 

Managing password control ······································································································································· 103

 

Modifying a password control ··························································································································· 103

 

Performing security check by using security policies ································································································ 104

 

Configuring real-time monitoring ······················································································································· 104

 

Configuring the default security policy for roaming users ·············································································· 105

 

Assigning security policies ································································································································· 105

 

4 Configuring Internet access control ···················································································································· 107

 

Overview ······································································································································································· 107

 

Internet access control methods ························································································································· 107

 

Client ACLs ··························································································································································· 108

 

Audit of unauthenticated Internet access ·········································································································· 108

 

Audit of authenticated Internet access ·············································································································· 108

 

Internet access audit logs ··································································································································· 108

 

Internet access logging parameters ··················································································································· 108

 

Managing Internet access policies ····························································································································· 109

 

Viewing the Internet access policy list ··············································································································· 109

 

Viewing Internet access policy details ·············································································································· 109

 

Adding an Internet access policy ······················································································································ 110

 

Modifying an Internet access policy ·················································································································· 111

 

Deleting an Internet access policy ····················································································································· 112

 

Managing Internet access audit policies ··················································································································· 112

 

Viewing the Internet access audit policy list ····································································································· 112

 

Viewing Internet access audit policy details ····································································································· 113

 

Adding an Internet access audit policy ············································································································· 113

 

Modifying an Internet access audit policy ········································································································ 114

 

Deleting an Internet access audit policy ··········································································································· 114

 

Managing Internet access audit logs ························································································································· 115

 

Advertising