G Data Endpoint Protection Business Manual

G Data Antivirus Software Endpoint Protection Business

Læs gratis den danske manual til G Data Endpoint Protection Business (153 sider) i kategorien Antivirus Software. Denne vejledning er vurderet som hjælpsom af 11 personer og har en gennemsnitlig bedømmelse på 4.4 stjerner ud af 6 anmeldelser. Har du et spørgsmål om G Data Endpoint Protection Business, eller vil du spørge andre brugere om produktet?

Side 1/153
G DATA
BUSINESS
SOLUTIONS
REFERENCE GUIDE
G DATA APPLICATION DEVELOPMENT
ReferenceGuide_Business_13.2
_
2015
-
06
-
08
13:47
SIMPLY
SECURE
G Data Business Solutions Reference Guide
2 Copyright © 2015 G Data Software AG
Contents
Introduction ....................................................................................................................................................... 5
Section A: Planning and deployment ................................................................................................................ 6
1. Network and client management .............................................................................................................. 6
1.1. Network layout ............................................................................................................................................................. 6
1.2. Security components ................................................................................................................................................. 10
2. Choosing a solution ..................................................................................................................................12
2.1. G Data business solutions ......................................................................................................................................... 12
2.2. System requirements ................................................................................................................................................. 13
2.3. Licensing ...................................................................................................................................................................... 14
3. Installation scenarios ...............................................................................................................................15
3.1. Local deployment ....................................................................................................................................................... 15
3.2. Managed Endpoint Security ..................................................................................................................................... 21
4. Deployment ..............................................................................................................................................22
4.1. Preparation .................................................................................................................................................................. 22
4.2. Clean installation ........................................................................................................................................................ 23
4.3. Upgrade installation .................................................................................................................................................. 25
4.4. Network configuration .............................................................................................................................................. 26
4.5. Initial configuration and default settings .............................................................................................................. 27
4.6. Server updates and registration .............................................................................................................................. 29
4.7. Server database backup and restore ...................................................................................................................... 30
4.8. Client deployment ...................................................................................................................................................... 31
4.9. Finalizing deployment............................................................................................................................................... 37
4.10. Subnet server(s) .......................................................................................................................................................... 38
5. Remote administration ............................................................................................................................40
5.1. Desktop application ................................................................................................................................................... 40
5.2. Browser ......................................................................................................................................................................... 41
5.3. Mobile ........................................................................................................................................................................... 43
5.4. MasterAdmin ............................................................................................................................................................... 43
Section B: Using G Data business solutions ....................................................................................................45
6. Dashboard and monitoring .....................................................................................................................45


Produkt Specifikationer

Mærke: G Data
Kategori: Antivirus Software
Model: Endpoint Protection Business
Licensens løbetid i år: 3 År
Softwaretype: Elektronisk software download (ESD)
Antal licenser: - licens(er)
Licensniveaukøb påkrævet: 10 - 24 licens(er)

Har du brug for hjælp?

Hvis du har brug for hjælp til G Data Endpoint Protection Business stil et spørgsmål nedenfor, og andre brugere vil svare dig