Table of Contents

7.2.5

AP Redundancy View

74

7.2.6

AP SINR View

76

7.2.7

Sensor Coverage View

77

7.2.8

Sensor Threat View

79

7.2.9

Sensor Redundancy View

80

7.2.10

Calibration View

82

7.3

PLANNING DEVICE PLACEMENT: STATUS AND CONTROL

83

7.3.1

Signal Certainty Level

83

7.3.2

Accuracy

84

7.3.3

Opacity

84

7.3.4

Show Grid

84

7.3.5

View Layout Model

84

7.3.6

Show RF Signal

84

7.3.7

Show Spillage View

84

7.3.8

Selecting Protocols

85

7.3.9

Calculate/Calibrate Button

86

7.3.10

Color Palette

86

7.4

STATUS BAR

87

7.4.1

Cursor Location (X, Y)

87

7.4.2

RSSI Display

87

7.4.3

Layout Dimensions

87

7.4.4

Current Mode

87

7.4.5

Interference

87

7.4.6

SINR

87

7.5

DEVICE LIBRARY

88

7.6

DEVICE PROPERTIES

89

7.6.1

Access Point Properties

89

7.6.2

Sensor Properties

91

7.7

VIEWING SIGNAL STRENGTH

92

7.8

STATISTICS

92

7.9

SAVING THE FILE

95

7.10 SAVING THE PROJECT FILE

95

CHAPTER 8 SETTINGS

97

8.1

SETTINGS: INVOKING FROM TOOLS MENU

97

8.2

SETTINGS: PREFERENCES

97

8.2.1

Preferences: Layout Designer

97

8.2.2

Preferences: AP Views

98

8.2.3

Preferences: Sensor Views

98

8.2.4

Preferences: Color Palettes

99

8.2.5

Preferences: Calibration

99

8.3

SETTINGS: AP DEFAULTS

100

8.4

SETTINGS: SENSOR DEFAULTS

102

CHAPTER 9 GENERATING OUTPUT FROM PLANNER

104

9.1

WLAN PLANNING REPORT

104

APPENDIX A: PLANNING SENSORS

107

PLACEMENT OF SENSORS

107

APPENDIX B: INTEGRATION OF 3COM ® AIRPROTECT PLANNER AND 3COM ® AIRPROTECT

 

ENTERPRISE

108

EXPORTING THE PROJECT FROM PLANNER

108

APPENDIX C: FILE LEVEL AND APPLICATION LEVEL PARAMETERS

110

APPENDIX D: GLOSSARY OF TERMS

111

vii

3Com ® AirProtect Planner User Guide

Page 8
Image 8
HP AirProtect Security Software manual Generating Output from Planner

AirProtect Security Software specifications

HP AirProtect Security Software is an advanced security solution designed to provide comprehensive protection for enterprise devices, particularly those operating within the fluctuating and unpredictable environments of modern business. With the growing trend of remote work and mobile computing, the need for robust cybersecurity solutions has never been more critical. HP AirProtect offers a multi-layered approach to safeguard sensitive information and ensure seamless connectivity, making it an essential tool for businesses of all sizes.

One of the standout features of HP AirProtect is its real-time threat detection and response capabilities. Leveraging artificial intelligence and machine learning technologies, it continuously monitors devices for any unusual behavior or potential malware threats. This proactive approach allows for immediate intervention before any potential breaches can escalate, ensuring that valuable company data remains secure.

Another key characteristic of HP AirProtect is its integration with HP's proprietary software and hardware solutions. This seamless compatibility enhances the overall security posture of the devices it protects. Organizations can benefit from features such as device health monitoring, which assesses the security status of endpoints, providing an additional layer of assurance that devices meet necessary compliance standards.

Additionally, HP AirProtect emphasizes user-centric design, offering intuitive dashboards and easy-to-navigate interfaces. This ease of use is vital for IT administrators, who can manage security protocols efficiently without extensive training. It also provides insightful analytics and reporting tools that help organizations understand potential vulnerabilities and areas for improvement.

The software also prioritizes network security, employing virtual private network (VPN) technology to encrypt data transmission and protect against interception during remote access. Moreover, HP AirProtect includes endpoint isolation features, which allow organizations to limit network access for devices that are suspected of being compromised, thereby containing potential threats.

In conclusion, HP AirProtect Security Software combines cutting-edge technologies with user-friendly features to provide a comprehensive cybersecurity solution suited for the modern workforce. By focusing on real-time threat detection, seamless integration, and network security, it empowers organizations to navigate the complexities of digital security, ensuring their critical data remains protected in an ever-evolving threat landscape.