For unenrolled devices, you can use app protection policies to enforce a block or selective wipe based on detected threats. You can configure Conditional Access policies based on Lookout's risk assessment enabled through Intune compliance policies for enrolled devices, which you can use to allow or block noncompliant devices to access corporate resources based on detected threats. Risk is assessed based on telemetry collected from devices by the Lookout service including: Multi-session support for Remote Desktop, Terminal Services, Citrix.You can control mobile device access to corporate resources based on risk assessment conducted by Lookout, a Mobile Threat Defense solution integrated with Microsoft Intune.More monitoring consoles can be connected to the same employee PC, so you can monitor your employee from different offices.If more users use the same PC then different profiles and access passwords can be set. Access to monitoring console is password protected.Connection to an employee PC is encrypted and password protected.Settings for the agent are encrypted and password protected.When lower bandwidth is required, the refresh interval can be enlarged.Control over running processes and applications.Start program on network connected PCs and see the output.Power on/off, restart, hibernate, suspend PCs.The name of the connected user is displayed.A remote screen can be zoomed to an actual size.More remote screens can be displayed in a table.You can take a control of a network PC by controlling its mouse and keyboard.Displaying a live picture of an employee PC. Monitor the activity of all the PCs in your company remotely and execute several administrative actions with just one click. Network LookOut Administrator lets you see all your employee PC screens without leaving your desk. Network LookOut Administrator Pro 5.1.1 | Size: 41.14 MB
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |