Download Endpoint Protector

Transcript
29 | Endpoint Protector | User Manual
4. Endpoint Rights
The modules in this area will allow the administrator to define which device can
be used on computers, groups and which client users have access to them.
The rule of inheritance is as follows (from most important to least important):
Computer Rights -> Group Rights -> Global Rights. The rights are overwritten in
this order.
Example: If global rights indicate that no computer on the system has access to
a specific device, and for one computer that device has been authorized, then
that computer will have access to that device.