H3C Technologies H3C Intelligent Management Center User Manual

Page 7

Advertising
background image

i

Contents

1 Overview ··································································································································································· 1

 

EAD functions ···································································································································································· 2

 

User Security Policy functions ·································································································································· 2

 

Desktop Asset Management functions ···················································································································· 2

 

EAD solution ······································································································································································ 3

 

EAD in the BYOD solution ················································································································································ 3

 

2 Quick start guide ······················································································································································ 4

 

Accessing EAD ·································································································································································· 4

 

Classic mode ···························································································································································· 4

 

Desktop mode ························································································································································ 10

 

Security check for PCs ··················································································································································· 12

 

Configuration procedure ······································································································································ 12

 

Security check items ·············································································································································· 13

 

Security level and security mode ························································································································· 13

 

Isolation mode ······················································································································································· 14

 

Security check flow chart ······································································································································ 15

 

Security check for smart devices ·································································································································· 15

 

Configuration procedure ······································································································································ 15

 

Security check items ·············································································································································· 16

 

Security level, security mode, and device action ······························································································· 17

 

Isolation mode ······················································································································································· 17

 

SCC collaboration ························································································································································· 18

 

Desktop asset management ·········································································································································· 18

 

Desktop asset management procedure ··············································································································· 18

 

Desktop asset grouping type ································································································································ 18

 

Desktop asset numbering mode ··························································································································· 18

 

Desktop asset registration and approval ············································································································ 19

 

Desktop control scheme ········································································································································ 19

 

Decentralized management of IMC functions ············································································································· 19

 

Operator role and group ······································································································································ 20

 

Service group ························································································································································· 20

 

Decentralized management by operator and service groups ·········································································· 20

 

Common operations ······················································································································································ 22

 

Navigating a list ···················································································································································· 22

 

Sorting a list ··························································································································································· 23

 

3 Configuring the security check for PCs ················································································································· 24

 

Security policy contents ················································································································································· 24

 

Security level ·························································································································································· 24

 

Isolation mode ······················································································································································· 24

 

Security check items ·············································································································································· 25

 

Managing security policies ··········································································································································· 27

 

Security policy list contents ··································································································································· 27

 

Security policy details ··········································································································································· 28

 

Viewing the security policy list ····························································································································· 35

 

Viewing security policy details ····························································································································· 35

 

Adding a security policy ······································································································································· 35

 

Modifying a security policy ·································································································································· 36

 

Deleting a security policy ····································································································································· 37

 

Advertising