Download Endpoint Protector
Transcript
29 | Endpoint Protector | User Manual 4. Endpoint Rights The modules in this area will allow the administrator to define which device can be used on computers, groups and which client users have access to them. The rule of inheritance is as follows (from most important to least important): Computer Rights -> Group Rights -> Global Rights. The rights are overwritten in this order. Example: If global rights indicate that no computer on the system has access to a specific device, and for one computer that device has been authorized, then that computer will have access to that device.