1 / 4

SmartAccess example

SmartAccess example. Príloha k dokumentu TCX s.r.o. JohnDoe. The user is also granted full access to network shares and document shares. ••••••••. ••••••••. The user is offered a range of access modes to launch the document. They also have the option to download and save.

uttara
Download Presentation

SmartAccess example

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SmartAccess example Príloha k dokumentu TCX s.r.o.

  2. JohnDoe The user is also granted full access to network shares and document shares •••••••• •••••••• The user is offered a range of access modes to launch the document. They also have the option to download and save. The SmartAccess agent pre-scans the workstation to detect the machine configuration and compliance with access policies The user accesses their employee login page from the corporate web site Note that the user, in this case, is granted full access, which includes a full range of applications including ERP and Payroll… A post login scan is also initiated. This determines the functions available to the user, based on access policies.

  3. The user does not get an option to save locally JohnDoe •••••••• •••••••• Note that the user is not allowed to save the file locally. They can save the file on a network share as determined by their Access Policies The user is offered restricted access, which does not allow for downloading or opening of the file. However, a new LiveEdit option is included as well as a Preview option Note that the application list presented may be restricted based on the policies applied. However, if the user logs in from an unidentified machine… The pre-scan may indicate that the machine hardware and configuration meet the minimum requirements. However, the post login scan would apply the access policies and may restrict access based on the fact that the machine is not identified. Appropriate action can be taken, such as restricting the functionality available, offering help, or remedial attention.

  4. Action Control:Live Edit • Encourage users to handle documents securely • Allows local edits of documents using Microsoft Office • Avoid persisting a copy of the document to disk by cleaning up after edit is complete • Allows users to edit server-based files • Replaces the “Save” and “Save As” command to allow edited files to be uploaded back to server environment

More Related