McAfee MTP08EMB3RUA Product Guide - Page 47

Management of computer groups, User-Approved Applications, Allow, Blocked Sites

Page 47 highlights

Using the SecurityCenter Management of computer groups 3 To... Add user-approved applications to one or more policies Do this... 1 In the Detections section, click a quantity under User-Approved Applications. 2 In the User-Approved Applications List, click Allow, select the policies to add the approved applications to, then click Save. The User-Approved Applications List shows detected programs that users have approved to run on the computer. To prevent users from approving applications, configure policy options for Protect mode. View attempted visits to blocked websites In the Detections section, click a quantity under Blocked Sites to open a page that lists details about each attempted visit. This feature is available only when web browsing policy options are enabled in versions of Total Protection Service that include the web filtering module. Management of computer groups A group consists of one or more computers that share a particular feature. You can base groups on geographic location, department, computer type, the tasks performed by the users, or anything meaningful to your organization. By default, every computer in your account is placed into a group called Default Group. You can create other groups to place them in instead. Why use groups? Groups help you manage large numbers of computers or computers that use different security settings (defined in policies). Groups are particularly helpful in larger organizations or companies that are widely distributed geographically. Placing similar computers into a single group enables you to view and manage security issues for the group separately from the other computers in your account. For example, you might place all laptops used by traveling sales representatives into a single group called Sales Team. Then you can configure special security settings for those computers to provide greater protection against threats in unsecured networks such as airports and hotels. You can also track the number of detections on those computers through more frequent reports and adjust the security settings as needed. McAfee Total Protection Service 5.1.5 Product Guide 47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

To...
Do this...
Add user-approved applications to one or more
policies
1
In the Detections section, click a quantity
under
User-Approved Applications
.
2
In the User-Approved Applications List, click
Allow
, select the policies to add the approved
applications to, then click
Save
.
The User-Approved Applications List shows
detected programs that users have approved
to run on the computer. To prevent users
from approving applications, configure policy
options for Protect mode.
View attempted visits to blocked websites
In the Detections section, click a quantity under
Blocked Sites
to open a page that lists details
about each attempted visit.
This feature is available only when web
browsing policy options are enabled in
versions of Total Protection Service that
include the web filtering module.
Management of computer groups
A group consists of one or more computers that share a particular feature.
You can base groups on geographic location, department, computer type, the tasks performed by the
users, or anything meaningful to your organization.
By default, every computer in your account is placed into a group called Default Group. You can create
other groups to place them in instead.
Why use groups?
Groups help you manage large numbers of computers or computers that use different security settings
(defined in policies). Groups are particularly helpful in larger organizations or companies that are
widely distributed geographically. Placing similar computers into a single group enables you to view
and manage security issues for the group separately from the other computers in your account.
For example, you might place all laptops used by traveling sales representatives into a single group
called Sales Team. Then you can configure special security settings for those computers to provide
greater protection against threats in unsecured networks such as airports and hotels. You can also
track the number of detections on those computers through more frequent reports and adjust the
security settings as needed.
Using the SecurityCenter
Management of computer groups
3
McAfee Total Protection Service 5.1.5 Product Guide
47