In this course you learn how to use ZENworks Endpoint Security Management (ZESM) to secure your company’s workstations by configuring and publishing Security Policies that control access to USB ports and removable media devices, and provide for data encryption and application control. Although no previous experience with ZESM is required, you should have a background in managing Windows desktops in a networked environment and be familiar with Active Directory.
The following topics are covered in this course:
- Product History and Architectural Changes
- ESM Related Concepts
- ESM Policies
- ESM Utilities
- ESM Best Practices