为了正常的体验网站,请在浏览器设置里面开启Javascript功能!

360安全卫士企业版的隐私保护说明(360 security guards Enterprise Edition privacy protection instructions)

2018-04-03 6页 doc 25KB 13阅读

用户头像

is_792768

暂无简介

举报
360安全卫士企业版的隐私保护说明(360 security guards Enterprise Edition privacy protection instructions)360安全卫士企业版的隐私保护说明(360 security guards Enterprise Edition privacy protection instructions) 360安全卫士企业版的隐私保护说明(360 security guards Enterprise Edition privacy protection instructions) 360 security guards Enterprise Edition privacy protection instructions 360 Enterpr...
360安全卫士企业版的隐私保护说明(360 security guards Enterprise Edition privacy protection instructions)
360安全卫士企业版的隐私保护说明(360 security guards Enterprise Edition privacy protection instructions) 360安全卫士企业版的隐私保护说明(360 security guards Enterprise Edition privacy protection instructions) 360 security guards Enterprise Edition privacy protection instructions 360 Enterprise Edition is divided into enterprise control center (hereinafter referred to as the "control center"), enterprise user terminal (hereinafter referred to as "enterprise version terminal") two parts. The control center is installed on the enterprise server side, and the enterprise version terminal is deployed in each machine that the control center needs to manage. Enterprise version of the terminal, including enterprise version of the terminal guards (360 security guards privacy protection) and Enterprise Edition terminal antivirus (360 antivirus privacy protection notes) two major parts. This privacy protection instructions only for the control center, terminal guards and antivirus privacy protection, please refer to the relevant links. 360, enterprise edition brings service value for you 360 enterprise edition control center provides a convenient condition for enterprises to manage terminal security uniformly. Through the control center to develop a unified enterprise network anti-virus, repair vulnerabilities, cleaning plug-ins and other security policies, centralized monitoring of enterprise network terminal security situation, and hardware, software, traffic and other unified management. The control center issued a directive to provide a variety of computer protection, enterprise edition terminal optimization, cleaning function, and according to the enterprise demand from time to time to launch a new version of the terminal function, in order to facilitate the enterprise edition terminal to better guard against network security risk and management computer. 360 enterprise version involving behavioral description 1) monitoring center The monitoring center can understand the security situation of all terminals within the network, the terminal module through the guards will be the terminal security related data, such as: examination scores, vulnerabilities, viruses, Trojans, plug-ins, etc. to collect risk control center deployment within the enterprise to facilitate unified management, but does not extract any user involved the privacy of the data. 2) terminal upgrade Terminal upgrade will display the guardian of the terminal, antivirus version number, as well as the virus library, Trojan library date, if it is less than the latest version or date, you can directly upgrade the command to the terminal in the control center. The module needs to collect the guardian of the terminal, antivirus version number, virus library, Trojan library date and so on to deploy the control center inside the enterprise, but will not obtain any data that involves the user's privacy. 3) vulnerability Vulnerability module will show vulnerability terminals within the network, and can control the center to fix the vulnerability to the terminal command, can greatly improve the terminal network vulnerability repair rate, in order to improve the overall security situation in the network terminal. The module collects the vulnerability of the terminal into the control center to facilitate unified administration, but does not retrieve any user privacy data from the terminal. 4) viruses The module is responsible for antivirus software installation management, you can send a unified anti-virus instructions to the terminal, view the terminal virus situation. The module will collect antivirus software installation from the terminal, terminal poisoning, antivirus to control center, so as to facilitate unified management, but it will not involve any user privacy data. 5) Trojan horse Through this module, you can view the Trojans in the terminal of the network. The module needs to collect Trojan horse's presence and processing from the terminal to the control center deployed inside the enterprise, but will not collect any personal privacy data. 6) plug-in Through this module, you can check the plug-in process in the network terminal. The module needs to collect the presence and processing of the plug-in from the terminal to the control center deployed inside the enterprise, but will not collect any personal privacy data. 7) systematic hazard Through this module, you can look at the system's dangerous items processing in the network terminal. The module needs to collect the existence and processing of the system's dangerous items from the terminal to the control center deployed inside the enterprise, but will not collect any personal privacy data. 8) boot speed Through this module, we can view the system startup time, start the service items and so on, and optimize the terminal through this module. The module collects the system startup time of the terminal and the system startup item until it is deployed in the control center inside the enterprise, but does not acquire any personal privacy data. 9) security configuration The module can view and modify the security configuration items of the terminal. The module collects the security configuration items of the terminal and opens it to the control center deployed inside the enterprise, but does not capture any personal privacy data. 10) software monitoring The module allows you to see the software installation of the terminal. The module collects the software installation of the terminal to the control center deployed inside the enterprise, but does not acquire any personal privacy information. 11) software distribution The module can push the distribution software for the terminal. The module does not collect any information from the terminal. 12) hardware testing The module can view the hardware asset information of the terminal. The module collects hardware information from the terminal to the control center deployed inside the enterprise, but does not capture any personal privacy information. 13) asset change The module can view the hardware changes of the terminal and deal with them accordingly. The module collects changes in the hardware assets of the terminal to the control center deployed inside the enterprise, but does not gain any personal privacy information. 14) log reports The module can look at the security situation throughout the network, every day a log, can be displayed by chart or so on, you can print or export Excel forms. The module does not need to retrieve any information from the terminal. 15) setting up the center The module allows you to set up the entire enterprise version of the relevant parameters. The module sends the relevant policy directives to the terminal, but does not retrieve any information from the terminal. 16) other tools The module contains some of the commonly used tools related to the enterprise version, including terminal deployment, related tools, trust files and URLs, whitelist tools, and some tools that the control center itself may use. None of these tools get any information from the terminal. 17) user feedback You can submit some of the problems encountered in the use of the module, or suggestions for the product. You fill in the feedback in contact, will only be used for our customer service with your communication and feedback, in addition to the consent of the user's explicit consent and specific legal provisions, the 360 companies will not provide users to upload information to any third party. Your information will not be used for sale, lending or exchange.
/
本文档为【360安全卫士企业版的隐私保护说明(360 security guards Enterprise Edition privacy protection instructions)】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑, 图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。 本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。 网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。

历史搜索

    清空历史搜索