360安全卫士企业版的隐私保护说明(360 security guards Enterprise Edition privacy protection instructions)
360安全卫士企业版的隐私保护说明(360 security guards
Enterprise Edition privacy protection instructions)
360 security guards Enterprise Edition privacy protection instructions
360 Enterprise Edition is divided into enterprise control center (hereinafter referred to as the "control center"), enterprise user terminal (hereinafter referred to as "enterprise version terminal") two parts. The control center is installed on the enterprise server side, and the enterprise version terminal is deployed in each machine that the control center needs to manage. Enterprise version of the terminal, including enterprise version of the terminal guards (360 security guards privacy protection) and Enterprise Edition terminal antivirus (360 antivirus privacy protection notes) two major parts. This privacy protection instructions only for the control center, terminal guards and antivirus privacy protection, please refer to the relevant links.
360, enterprise edition brings service value for you
360 enterprise edition control center provides a convenient condition for enterprises to manage terminal security uniformly. Through the control center to develop a unified enterprise network anti-virus, repair vulnerabilities, cleaning plug-ins and other security policies, centralized monitoring of enterprise network terminal security situation, and hardware, software, traffic and other unified management. The control center issued a directive to provide a variety of computer protection, enterprise edition terminal optimization,
cleaning function, and according to the enterprise demand from time to time to launch a new version of the terminal function, in order to facilitate the enterprise edition terminal to better guard against network security risk and management computer.
360 enterprise version involving behavioral description
1) monitoring center
The monitoring center can understand the security situation of all terminals within the network, the terminal module through the guards will be the terminal security related data, such as: examination scores, vulnerabilities, viruses, Trojans, plug-ins, etc. to collect risk control center deployment within the enterprise to facilitate unified management, but does not extract any user involved the privacy of the data.
2) terminal upgrade
Terminal upgrade will display the guardian of the terminal, antivirus version number, as well as the virus library, Trojan library date, if it is less than the latest version or date, you can directly upgrade the command to the terminal in the control center. The module needs to collect the guardian of the terminal, antivirus version number, virus library, Trojan library date and so on to deploy the control center inside the enterprise, but will not obtain any data that involves the user's privacy.
3) vulnerability
Vulnerability module will show vulnerability terminals within the network, and can control the center to fix the vulnerability to the terminal command, can greatly improve the terminal network vulnerability repair rate, in order to improve the overall security situation in the network terminal. The module collects the vulnerability of the terminal into the control center to facilitate unified administration, but does not retrieve any user privacy data from the terminal.
4) viruses
The module is responsible for antivirus software installation management, you can send a unified anti-virus instructions to the terminal, view the terminal virus situation. The module will collect antivirus software installation from the terminal, terminal poisoning, antivirus to control center, so as to facilitate unified management, but it will not involve any user privacy data.
5) Trojan horse
Through this module, you can view the Trojans in the terminal of the network. The module needs to collect Trojan horse's presence and processing from the terminal to the control center deployed inside the enterprise, but will not collect any personal privacy data.
6) plug-in
Through this module, you can check the plug-in process in the
network terminal. The module needs to collect the presence and processing of the plug-in from the terminal to the control center deployed inside the enterprise, but will not collect any personal privacy data.
7) systematic hazard
Through this module, you can look at the system's dangerous items processing in the network terminal. The module needs to collect the existence and processing of the system's dangerous items from the terminal to the control center deployed inside the enterprise, but will not collect any personal privacy data.
8) boot speed
Through this module, we can view the system startup time, start the service items and so on, and optimize the terminal through this module. The module collects the system startup time of the terminal and the system startup item until it is deployed in the control center inside the enterprise, but does not acquire any personal privacy data.
9) security configuration
The module can view and modify the security configuration items of the terminal. The module collects the security configuration items of the terminal and opens it to the control center deployed inside the enterprise, but does not capture any personal privacy data.
10) software monitoring
The module allows you to see the software installation of the terminal. The module collects the software installation of the terminal to the control center deployed inside the enterprise, but does not acquire any personal privacy information.
11) software distribution
The module can push the distribution software for the terminal. The module does not collect any information from the terminal.
12) hardware testing
The module can view the hardware asset information of the terminal. The module collects hardware information from the terminal to the control center deployed inside the enterprise, but does not capture any personal privacy information.
13) asset change
The module can view the hardware changes of the terminal and deal with them accordingly. The module collects changes in the hardware assets of the terminal to the control center deployed inside the enterprise, but does not gain any personal privacy information.
14) log reports
The module can look at the security situation throughout the network, every day a log, can be displayed by chart or so on, you can print or export Excel forms. The module does not need
to retrieve any information from the terminal.
15) setting up the center
The module allows you to set up the entire enterprise version of the relevant parameters. The module sends the relevant policy directives to the terminal, but does not retrieve any information from the terminal.
16) other tools
The module contains some of the commonly used tools related to the enterprise version, including terminal deployment, related tools, trust files and URLs, whitelist tools, and some tools that the control center itself may use. None of these tools get any information from the terminal.
17) user feedback
You can submit some of the problems encountered in the use of the module, or suggestions for the product. You fill in the feedback in contact, will only be used for our customer service with your communication and feedback, in addition to the consent of the user's explicit consent and specific legal provisions, the 360 companies will not provide users to upload information to any third party. Your information will not be used for sale, lending or exchange.