Getting Started with Device Control

In this section:

Learn the initial tasks you need to perform to start enforcing usage policies for removable devices, removable media, and data in your environment to limit data leakage and its impact.

You will continue to perform these tasks, plus many others. Ivanti Endpoint Security contains many features and functions, and by learning the environment, you can secure your network quickly and efficiently.

Important: Before you roll out Device Control to endpoints in an environment, it is recommended that you work with your end users and other stakeholders, together with any IT security personnel, to start formulating a business policy regarding the usage of peripheral devices. Having a clear idea of what is to be achieved from the start will help shape the future steps you take with this product.