-landesk解决方案简介.ppt
文本预览下载声明
* * * * * * Role-based Administration Let’s start by reviewing what we have heard from our customers. They told us: They have several LANDesk administrators in their organization and they need to limit to certain components. They also want to have them only see the clients that they are authorized to manage. Another key request, we must leverage the NT authentication model when adding or managing users. We need to support customers with a directory service installed as well as those customers that do not. And finally, existing customers with a distributed environment would very much like to reduce the number of core servers if possible. So, our solution will now allow the LANDesk Management Suite user login to the console using Windows NT authentication. The super LANDesk Administrator can then edit other user accounts to assign specific components and limit their view of the network to only their assigned responsibility. Role-base administration is available in both the Windows and Web console. Let’s look at how to create a user… * 现代大多数企业的IT管理只是简单的停留在标签的简单管理,无法及时地了解IT资产的详细信息,并无法达到企业资产的有效利用。有些企业的不希望用户自己修改网络设置,比如IP地址,如果用户擅自修改了客户机的IP地址,管理端会自动收到报警。将企业的IT资产的逻辑信息与物理信息结合起来,比如资产的所属部门和保管人与实际的物理信息联系起来,而普通的管理方法只能通过手工方式进行录入,显而易见,这种方法费时费力,并容易出错。 * * * * 裸机的操作系统部署 * * 软驱,光驱,强大的脚本编辑功能。 * * * * * 游戏,QQ,在企业网内存在,不仅仅带来企业网络安全的风险,同时员工在工作时间玩游戏,上QQ,不仅影响企业形象,而且显而易见的会影响企业的生产率,造成企业的损失。LANDesk软件许可证中的软件禁用功能可以帮助企业进行这方面的管理。评估软件升级的费用,避免不必要的软件费用 * * 现代大多数企业的IT管理只是简单的停留在标签的简单管理,无法及时地了解IT资产的详细信息,并无法达到企业资产的有效利用。有些企业的不希望用户自己修改网络设置,比如IP地址,如果用户擅自修改了客户机的IP地址,管理端会自动收到报警。将企业的IT资产的逻辑信息与物理信息结合起来,比如资产的所属部门和保管人与实际的物理信息联系起来,而普通的管理方法只能通过手工方式进行录入,显而易见,这种方法费时费力,并容易出错。 * * * * 有些威胁来自软件BUG,有些来自黑客恶意攻击应用或OS漏洞,每天新的用于修补漏洞的软硬件补丁都在发布 根据统计,2002年发布了4100种漏洞,即使IT人员每个漏洞检查只花20分钟,也要花掉179天,而这仅仅是漏洞检查,还没有做任何下载、验证和安装 要打正确补丁,我需要知道每台机器的硬件、软件和OS配置,哪个版本的驱动、应用和补丁已经安装,已知的漏洞是否支持目前的平台,哪些补丁已经安装、哪些要安装、哪些是无关的 * This slide will need to be removed if spyware does not make it in the product. * * * * Effective Scan and Block Scans fo
显示全部