background image

3

1. Introduction

Endpoint Protector Basic™ will help you secure your PCs endpoints by controlling and monitoring device use. You will be able to restrict the 
use of USB, FireWire and other ports and control portable device use your computer. You can fi nd a complete list of all controlled device types 
in the chapter “4. Controlled Device Types”. Therefore you are effectively preventing unwanted data introduction or data theft from your PC. 

With Endpoint Protector Basic you can:  

• 

Allow or restrict the use of any USB storage or other portable storage device on your computer  

• 

Identify any USB storage device used in connection with your computer 

• 

See the  details of all USB storage devices connected to the computer at a certain moment 

• 

Let the PCs administrator receive an e-mail message when an unauthorized USB storage device is connected to a workstation  

• Use 

fi le tracing to monitor fi le accesses on any USB storage device  

2. Endpoint Protector Product Family 

The Endpoint Protector Product family offers device control and endpoint security for any environment for home PCs or MACs, medium sized 
offi ces or even entire enterprise networks. 

Endpoint Protector Basic is part of it and offers your home and offi ce PCs the best solution to control the use of portable devices on your 
protected PCs so you data cannot be copied unauthorized to unwanted devices.  

Other products from the Endpoint Protector Product family included:

• My Endpoint Protector (a Software as a Service solution to secure PCs and MACs over a internet portal https://my.EndpointProtector.com) 

• 

Endpoint Protector (a client - server device control solution for small and medium sized companies) 

• 

Endpoint Protector Appliance (a hardware appliance device control solution for small and medium sized companies and enterprises) 

More information can be found here http://www.EndpointProtector.com

3. System Requirements 

• Supported Operating Systems are:

• Windows 

(32bit / 64bit) 

• Windows 

Vista 

(32bit / 64bit)

• 

Windows XP (Service Pack 2 is recommended) 

• Windows 

2003

• Administrative 

rights are required in install the software on a PC and to be able to authorize or unauthorized devices 

• 32MB 

of available memory on the hard drive 

• 

Minimum of 256MB RAM is recommended 

Содержание Endpoint Protector Basic

Страница 1: ...Endpoint Protector Basic User Guide English...

Страница 2: ...6 Getting Started 5 g 7 Rights 5 g 7 1 Devices 5 7 2 Device Class 6 8 Settings 7 g 8 1 File Tracing 7 g 8 2 Password protection 8 p 9 Reports and Analysis 9 p y 10 E mail Alerts 10 10 1 Alerts Settin...

Страница 3: ...device control and endpoint security for any environment for home PCs or MACs medium sized of ces or even entire enterprise networks Endpoint Protector Basic is part of it and offers your home and of...

Страница 4: ...portable hard disks FireWire Devices PCMCIA Devices Biometric Devices Bluetooth Printers applies to serial USB and LTP connection methods ExpressCard SSD Wireless USB LPT Parallel ports By controllin...

Страница 5: ...i c device can be accessible on your PC Each time a new device is connected to the PC while the Endpoint Protector Basic Settings application is open you will see it automatically in the Devices list...

Страница 6: ...our PC By default the following device types will have Allow Access rights WiFi Local Printers Webcams and CD ROMs In order to change the rights for a device class you need to click the select box nex...

Страница 7: ...ou can also password protect the access to the Endpoint Protector Basic User Interface or select your Language settings 8 1 File Tracing The le tracing feature allows the administrator to record the l...

Страница 8: ...lpful when forgetting the password To remove the Password protection you have to click the Reset password button After setting up a password you will be asked to enter it each time you start Endpoint...

Страница 9: ...the administrator to see exactly what actions took place at what time This information also contains the computer name user and device used and also the action taken and the les accessed You can sort...

Страница 10: ...Basic with an SMTP e mail account that will be used to send the e mail noti cations to a speci ed e mail address Please specify a sender and a recipient e mail address Enter your SMTP server address...

Страница 11: ...e Noti er You can restart the Noti er from Start All Programs Endpoint Protector Basic Every time a new device or an unauthorized device is connected to the protect PC a message will pop up in the rig...

Страница 12: ...ad it The application will be downloaded directly to your PC After download is complete you will have the option to Install it by clicking the button 13 Uninstall To remove Endpoint Protector Basic fr...

Страница 13: ...lem but miss some feature or just want to leave us general comment we would love to hear from you Your input is much appreciated and we welcome any input to make computing with portable devices safe a...

Отзывы: