Kaspersky Lab KL7604XWTDS Datenblatt Seite 77

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 106
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 76
IM C O N T R O L
77
The report can be generated in a similar way to the ‘Allowed Traffic’ report (see Allowed Traffic’ on page 75).
BY PARTICIPANTS
The IM Control By Participants sub-service enables an administrator to receive a detailed audit trail of all IM Control
activity that contains data between two participants. The requested activity is exported to a CSV file and contains the
following data:
Date/Time: date and time of the blocked scan / event.
Message: the message.
Sending User: the user who sent the message.
Receiving User: the user who received the message.
The report can be generated in a similar way to the ‘Allowed Traffic’ report (see ‘Allowed Traffic’ on page 75).
IM MANAGEMENT
The process of configuring IM Control policy requires the use of several IM Control objects. Each of these objects is
listed in the left hand column under the IM Control Policy Manager sub-service. These objects are:
Groups: a group is a collection of users who share similar access privileges. A group can be defined using
directory information, such as directory group or username, or by network parameters such as IP address or
subnet. For further details, see Group Management’ on page 89.
Dictionaries: these are where words to be blocked or alerts to be generated are specified. These are
implemented in the Access Restrictions.
Access Restrictions: each Access restriction consists of the following objects:
Seitenansicht 76
1 2 ... 72 73 74 75 76 77 78 79 80 81 82 ... 105 106

Kommentare zu diesen Handbüchern

Keine Kommentare