2.4.3 Items that can be set for a security policy
For a security policy, you can set the following items whose use is monitored: phone numbers, Web sites, and applications.
Items that can be set for a security policy
No. |
Configuration item |
Description |
---|---|---|
1 |
Phone Number |
Set phone numbers to be monitored. If a phone number that is not registered in this list is used, an event is issued to notify the administrator. |
2 |
Web Site |
Set Web sites to be monitored. If a Web site that is not specified in Whitelist or a Web site specified in Blacklist is browsed, an event is issued to notify the administrator. |
3 |
Application |
Set applications to be monitored. If an application that is not specified in Whitelist or an application specified in Blacklist is installed, an event is issued to notify the administrator. For applications specified in Whitelist, you can also specify whether installation is required. If an application that must be installed is not installed, an event is issued to notify the administrator. |
Related Topics