4/2/2023 0 Comments Checkpoint end point security![]() ![]() See Uploading Client Packages to the Repositoryįor clients on Windows, you can use one of these deployment strategies:Īutomatic (recommended) - Use Deployment rules to automatically download and install pre-configured packages on endpoint computers. It communicates with endpoint clients to update their components, policies, and protection data. ![]() Includes the Endpoint Security policy management and databases. This chapter contains information and procedures for deploying Endpoint Security clients to endpoint computers.īefore deploying the clients, you must add packages to the Repository on the Endpoint Security Management Server A Security Management Server that manages your Endpoint Security environment.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |