Overview
This article lists the product-specific terms and acronyms that customers and agents need to know. The terms defined here do not need to be redefined when used in other articles.
Term |
Definition |
Access permissions |
A set of permissions (access, read and write) that are assigned to users and groups per device category, connectivity port, or a specific device. |
Device blacklist |
A list of specific devices whose usage is blocked when accessed from all the target computers covered by the protection policy. |
Digest report |
A summary report giving an account of the activity statistics as detected by EndPointSecurity |
EndPointSecurity Agent |
Client-side service responsible for the implementation/enforcement of the protection policies on the target computer(s). |
EndPointSecurity application |
A server-side security application that aids in maintaining data integrity by preventing unauthorized access and transfer of content to and from devices and connection ports. |
EndPointSecurity management console |
The user interface of the GFI EndPointSecurity server-side application. |
ESEC (sometimes EPS) |
EndPointsecurity |
Event Logging |
A feature to record events related to attempts made to access devices and connection ports on target computers and service operations. |
GPO |
|
Power user |
A power user is automatically given full access to devices connected to any target computer covered by the protection policy. |
Protection policy |
A set of device access and connectivity port permissions that can be configured to suit the customer's device access security policies. |
RPC |
|
SMB |
|
TCP |
Transmission Control Protocol |