QUESTIONS AND ANSWERS LATEST UPDATE
(ALREADY GRADED A+)
User Audit Logs
Logs user sessions and actions in management UI.
Endpoint Detection and Response
Monitors and responds to endpoint threats.
Antivirus Protection
Defends against malware and virus threats.
Device Control
Manages and restricts device access.
Firewall Protection
Blocks unauthorized access to network resources.
Web Access Control
Regulates user access to web resources.
Program Blocking
Prevents unauthorized software execution.
Authorized Software
List of approved applications for use.
Settings Inheritance
Subgroups inherit settings from parent groups.
Manual Settings Assignment
Directly assign settings overriding inherited ones.
Keep All Settings
Retain manual settings while applying new ones.
Make All Inherit
Overwrite manual settings with new inherited settings.
, User Actions Tab
Logs user actions like edits and deletions.
System Events Tab
Logs non-user initiated system events.
Per-Computer Settings
Profiles for software installation and updates.
Update Frequency
Specifies how often client software updates.
Shadow Copies
Creates snapshots of computer files.
Activity Log Export
Export logs to CSV for external use.
Network Settings
Configurations for network connectivity and security.
Alerts
Notifications for security events and issues.
Workstation Settings
Specific configurations for endpoint workstations.
Server Settings
Configurations tailored for server environments.
Restart Options
Settings for restarting after updates.
Do Not Restart Automatically
User prompted to restart until action taken.
Automatically Restart Workstations Only
Workstations restart automatically; servers do not.
Automatically Restart Servers Only
Servers restart automatically; workstations do not.
Automatically Restart Workstations and Servers