.
1.2
系统说明
...........................................................................................................................................................9
1.3
系统功能介绍
.................................................................................................................................................10
2 系统功能设计.........................................................................................................................................................11
2.1
统一设备管理
..................................................................................................................................................11
2.2
统一安全管理
.................................................................................................................................................12
2.3
统一用户管理
.................................................................................................................................................12
2.4
统一事件管理
.................................................................................................................................................13
2.5
统一日志管理
.................................................................................................................................................13
2.6
统一备份管理
.................................................................................................................................................13
3 系统技术设计.........................................................................................................................................................14
3.1
高可靠性
.........................................................................................................................................................14
3.2
高可扩充性
.....................................................................................................................................................14
3.3
高安全性
.........................................................................................................................................................15
4 AVOCENT 厂家介绍.............................................................................................................................................15
4.1
公司背景
.........................................................................................................................................................15
4.2
技术优势
.........................................................................................................................................................16
4.3
发展历程
.........................................................................................................................................................17
4.4
国外典型案例
.................................................................................................................................................18
4.5
国成功案例应用介绍
.....................................................................................................................................18
4.6
中国区近期获奖证书
.....................................................................................................................................20
第三章 PC 机桌面管理系统(LANDESK)...........................................................................................................21
1 系统组织架构.........................................................................................................................................................21
1.1
拓扑结构图
.....................................................................................................................................................21
1.2
系统说明
.........................................................................................................................................................22
1.3
系统功能介绍
.................................................................................................................................................23
2 系统功能设计.........................................................................................................................................................27
2.1
资产管理
.........................................................................................................................................................27
2.2
软件分发
.........................................................................................................................................................32
2.3
远程帮助与问题解决
.....................................................................................................................................38
2.4
软件许可监控
.................................................................................................................................................39
2.5
操作系统部署与配置迁移
.............................................................................................................................39
2.6
安全性扫描
.....................................................................................................................................................40
2.7
补丁管理
.........................................................................................................................................................41
2.8
修复已损坏的程序
.........................................................................................................................................52
2.9
配置警报
.........................................................................................................................................................52
2.10
网络连接控制器
...........................................................................................................................................53
2.11
信任访问
........................................................................................................................................................55
2.12
间谍软件查杀
...............................................................................................................................................67
2.13
防病毒更新
...................................................................................................................................................68
2.14
安全威胁分析器
...........................................................................................................................................69
2.15
自定义漏洞
...................................................................................................................................................71
2.16
应用阻隔器
...................................................................................................................................................72
2.17 HIPS...............................................................................................................................................................73
2.18
应用虚拟化
...................................................................................................................................................75
2 / 97