SmartAccess example Príloha k dokumentu TCX s.r.o.

Slides:



Advertisements
Similar presentations
Basic Computer Skills Windows & the Internet.
Advertisements

Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
CSS Central: Central Management Utility Screen View Samples Next.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
What You Will Learn Components of a computer’s system software The importance of an operating system Functions of an operating system Types of user interfaces.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Keeping You Connected Through Citrix Access your applications Access your network shares and documents Access your …and do it remotely!
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Posting Job Orders Online Creating HTML files from Job Orders and uploading to FTP sites.
Module 2: Planning to Install SQL Server. Overview Hardware Installation Considerations SQL Server 2000 Editions Software Installation Considerations.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Windows & The Internet. Objectives: Identify and use computer hardware Open and close a desired program Switch back and forth between open windows Create.
The basics of the Online Portal
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
Create a Website on the CWU network Find “How to Post a Web Page with a PC”
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
NV V5.7 Product Presentation. Brand New Professional GUI  Multiple User Interface for different look and feel  Audio indicator on camera (play audio.
LANDesk Management Gateway
Ken Dorsey KA8OAD. What is EchoLink? The simple answer is EchoLink software uses VoIP technology to link ham radio stations together around the world.
Intro to Google Apps B3: Working in Google Drive.
Windows XP End of Life Microsoft support for Windows XP SP3 and Office 2003 ends April 8, 2014.
Software GCSE ICT.
Selecting the Right Network Access Protection Architecture
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section 15.2 Identify guidelines.
E-timesheets Presenter: Anne Stevenson. Agenda  Setup in Jonas –User and Payroll configuration  Setup in Website-Administration –Reports & Forms –Home.
Internet Information Services 7.0 Infrastructure Planning and Design Series.
Pan African Community Endowment 2015 Grant Opportunity Tips for using the online Submittable Portal.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
1 What’s the difference between DocuShare 3.1 and 4.0?
Computer Emergency Notification System (CENS)
Proxy Server PROXY SERVER. What is a Web Proxy? Proxy Server A proxy is a host which relays web access requests from clients Used when clients do not.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Element 6 Print word processingdocuments. LEARNING OUTCOMES 1. Preview document using print preview mode. 2. Correctly select basic print options. 3.
Module 5: Implementing Group Policy
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Company Confidential Info Exchange Workflow Examples for External Users: Info Exchange Folders Company Confidential.
Tour Overview Introduction Collage Basics Collage Basics (Templates and Tools) Computer Configuration Bookmark Collage Getting Started Tour Collage Terminology.
Integrating and Troubleshooting Citrix Access Gateway.
HTML, Third Edition--Illustrated Brief 1 HTML, Third Edition Illustrated Brief Unit A Creating an HTML Document.
1.Launch from PeopleSoft (7 or 8) Panels Plug-and-play Perfect fit for PeopleSoft 8.X No modification needed 2.Launch from CS Link Anywhere, anytime Good.
Server Administration. [vpo_server_admin] 2 Server Administration Section Overview Controlling Management Server processes Controlling Managed Node processes.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
NetTech Solutions Protecting the Computer Lesson 10.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
ANYFILEBACKUP A powerful file backup and synchronization solution for significant number of files located in various folders, FTPs, clouds, and servers.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Proctor Caching Overview. 2 Proctor Caching Diagram.
Transportation Agenda 19. Transportation Your Role: Designer Designers organize SharePoint content and determine how to display that content Typical tasks.
Computers: Tools for an Information Age
Using the Personal Image Photo Library
Software Application Overview
CONFIGURING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE
Section 15.1 Section 15.2 Identify Webmastering tasks
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Configuring Internet-related services
HTML and Geocities.
EXPLORING THE INTERNET
Designing IIS Security (IIS – Internet Information Service)
Grauer and Barber Series Microsoft Word Chapter Three
Presentation transcript:

SmartAccess example Príloha k dokumentu TCX s.r.o.

The user accesses their employee login page from the corporate web site The SmartAccess agent pre-scans the workstation to detect the machine configuration and compliance with access policies JohnDoe A post login scan is also initiated. This determines the functions available to the user, based on access policies. Note that the user, in this case, is granted full access, which includes a full range of applications including ERP and Payroll… The user is also granted full access to network shares and document shares The user is offered a range of access modes to launch the document. They also have the option to download and save.

However, if the user logs in from an unidentified machine… The pre-scan may indicate that the machine hardware and configuration meet the minimum requirements. JohnDoe However, the post login scan would apply the access policies and may restrict access based on the fact that the machine is not identified. Appropriate action can be taken, such as restricting the functionality available, offering help, or remedial attention. Note that the application list presented may be restricted based on the policies applied. The user is offered restricted access, which does not allow for downloading or opening of the file. However, a new LiveEdit option is included as well as a Preview option The user does not get an option to save locally Note that the user is not allowed to save the file locally. They can save the file on a network share as determined by their Access Policies

4 Action Control: Live Edit Encourage users to handle documents securely Allows local edits of documents using Microsoft Office Avoid persisting a copy of the document to disk by cleaning up after edit is complete Allows users to edit server- based files Replaces the “Save” and “Save As” command to allow edited files to be uploaded back to server environment