background image

4

4. Controlled Device Types

Endpoint Protector Basic supports a wide range of device types which represent key sources of security breaches. These devices can be 
authorized which makes it possible for the users to view, create or modify their content and for administrators to view the data transferred to 
and from the authorized devices.  

• 

Removable Storage Devices 

• 

Normal USB Flash Drives, U3 and Autorun Drives, Disk on Key, etc. 

• 

USB 1.1, USB 2.0, USB 3.0

• 

Memory Cards - SD Cards, MMC Cards, and Compact Flash Cards, etc. 

• 

Card Readers - internal and external

• CD/DVD-Player/Burner - internal and external

• Digital Cameras

• Smartphones / Handhelds / PDAs (includes Nokia N-Series, Blackberry, and Windows CE) compatible devices, Windows Mobile devices, 

etc. 

• iPods 

/ iPhones / iPads 

• MP3 

Player / Media Player Devices 

• External HDDs / portable hard disks 

• 

FireWire Devices

• PCMCIA Devices

• Biometric 

Devices 

• Bluetooth

• Printers 

(applies to serial, USB and LTP connection methods) 

• ExpressCard (SSD) 

• Wireless USB

•  LPT/Parallel ports (By controlling the Parallel ports of a PC using Endpoint Protector Basic, the network administrator can deny or allow 

users access to storage devices connected to these ports.) * APPLIES ONLY TO STORAGE DEVICES

• Floppy disk drives 

5. Installation

To install Endpoint Protector Basic it is required that you are logged on the workstation with full administrative rights. 

Run the EPPBasic.exe fi le.

Endpoint Protector Basic will install itself in the start menu and create the Endpoint Protector Basic program group. Endpoint Protector Basic 
will require in some cases that you restart your PC for a successful completion of the installation process. 

After a successful installation Endpoint Protector Basic will always run in the background to protect your PCs endpoints when you or other 
users are logged into the PC. 

Summary of Contents for Endpoint Protector Basic

Page 1: ...Endpoint Protector Basic User Guide English...

Page 2: ...6 Getting Started 5 g 7 Rights 5 g 7 1 Devices 5 7 2 Device Class 6 8 Settings 7 g 8 1 File Tracing 7 g 8 2 Password protection 8 p 9 Reports and Analysis 9 p y 10 E mail Alerts 10 10 1 Alerts Settin...

Page 3: ...device control and endpoint security for any environment for home PCs or MACs medium sized of ces or even entire enterprise networks Endpoint Protector Basic is part of it and offers your home and of...

Page 4: ...portable hard disks FireWire Devices PCMCIA Devices Biometric Devices Bluetooth Printers applies to serial USB and LTP connection methods ExpressCard SSD Wireless USB LPT Parallel ports By controllin...

Page 5: ...i c device can be accessible on your PC Each time a new device is connected to the PC while the Endpoint Protector Basic Settings application is open you will see it automatically in the Devices list...

Page 6: ...our PC By default the following device types will have Allow Access rights WiFi Local Printers Webcams and CD ROMs In order to change the rights for a device class you need to click the select box nex...

Page 7: ...ou can also password protect the access to the Endpoint Protector Basic User Interface or select your Language settings 8 1 File Tracing The le tracing feature allows the administrator to record the l...

Page 8: ...lpful when forgetting the password To remove the Password protection you have to click the Reset password button After setting up a password you will be asked to enter it each time you start Endpoint...

Page 9: ...the administrator to see exactly what actions took place at what time This information also contains the computer name user and device used and also the action taken and the les accessed You can sort...

Page 10: ...Basic with an SMTP e mail account that will be used to send the e mail noti cations to a speci ed e mail address Please specify a sender and a recipient e mail address Enter your SMTP server address...

Page 11: ...e Noti er You can restart the Noti er from Start All Programs Endpoint Protector Basic Every time a new device or an unauthorized device is connected to the protect PC a message will pop up in the rig...

Page 12: ...ad it The application will be downloaded directly to your PC After download is complete you will have the option to Install it by clicking the button 13 Uninstall To remove Endpoint Protector Basic fr...

Page 13: ...lem but miss some feature or just want to leave us general comment we would love to hear from you Your input is much appreciated and we welcome any input to make computing with portable devices safe a...

Reviews: