Font Size: a A A

The Enterprise Internal Management And Patch Distribution System Design And Implementation

Posted on:2013-03-06Degree:MasterType:Thesis
Country:ChinaCandidate:X S NiuFull Text:PDF
GTID:2248330374486710Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the gradual expansion of the network, application and gradually increase, securityissues become increasingly important. Modern network security management system isimproving daily, so the network management of desktop security client needs a strong standout. Correct and comprehensive understanding of client desktop management productdevelopment trends and technical features of the development choices we face, but alsoenterprises and IT managers and senior decision-makers during the deployment of clientdesktop security issues must be considered. According to statistics, about80%of networkattacks and sabotage from within the network.Because of security products can not be managed on the network client, so an urgentneed for client-based enterprise security management products for enterprise networkmanagement. The specific content of this research: By access management: to complete theclient registration, client topology, the client brought out of network monitoring,802.1Xauthentication, IP and MAC binding functions of the design. Through IT Asset Management:complete hardware asset statistics, statistical software assets, equipment, alarm function tochange the design of information. Through the patch and document management: completepatch download, patch analysis, patch strategy formulation, patch distribution, patch clientvulnerability detection, security testing patches, patches, the design of distributed controlfunctions. Desktop management and operation and maintenance by: Complete Desktoptraffic management, process operation and management, client service management,software installation management, desktop message notification, desktop scripting control,remote assistance, peripherals and port control, clean up junk files, peer to peer clients sidecontrol, traffic anomaly monitoring, process exception monitoring. Outreach through theillegal acts of monitoring: to complete the client outreach of illegal Internet activitymonitoring, client monitoring of illegal access to other network behavior, illegal conductoutreach functions of the design of alarm.
Keywords/Search Tags:internal network management, patch distribution, informationsecurity
PDF Full Text Request
Related items