How GFI EndPointSecurity works - Device Access
GFI EndPointSecurity device access operations can be divided in three logical stages:
The table below describes the stages depicted above:
Stage | Description |
---|---|
Stage 1 - Device attached to computer | The user attaches a device to a target computer protected by GFI EndPointSecurity. |
Stage 2 - Protection policyA set of device access and connectivity port permissions that can be configured to suit your company’s device access security policies. enforcement | The GFI EndPointSecurity agent installed on the target computer detects the attached device and goes through the protection policy rules applicable to the computer/user. This operation determines whether the device is allowed or blocked from being accessed. |
Stage 3 - Device usage allowed/blocked | The user either receives an error message indicating that device usage has been blocked, or else is allowed to access the device. |