First, the installation of new software can be prohibited.
After the background deployment, the software library of the school computer can be controlled in a unified way. Only students in the software library can install, download and use it. If it is not in the software library, students have no right to use it.
Secondly, the use of usb interface can be prohibited.
You can set the usb flash drive to be read-only, write-only, forbidden to use and encrypted, and finally achieve the effect that the USB interface only accesses the mouse and keyboard.
In addition to the two questions you asked, you can also achieve such functions, such as:
1.? Network behavior control
All computer behaviors of students can be audited and controlled. For example, auditing and controlling Internet access, posting, network disk uploading and BT downloading; For example, the scene restoration of chat content, sending and receiving files and pictures can alarm sensitive content;
2.? Terminal safety control
It can manage software and hardware changes, configuration changes, system accounts, event log collection, screen recording, etc. of all computers in the computer terminal. Hold the system patch library, check the patch installation log, check the installed patches, and automatically install the patches.
3.? File encryption
Support transparent encryption and decryption of all kinds of daily office, text editing, picture design and drawing design to prevent students from sending important school data to the outside world.
4.? Centralized and unified control
It can realize the statistics of software and hardware assets and give an alarm for asset changes; Software is uniformly distributed and uninstalled, and the use time of software is controlled.