Verbatim Endpoint Protector Basic User Manual

Page 1
Endpoint Protector
Basic
User Guide
English
Page 2
C
ontent
s
1. Introduction
3
2. Endpoint Protector Product Family 3
py
3. System Requirements 3
yq
4. Controlled Device Types 4
yp
5. Installation
4
6. Getting Started 5
g
7. Rights 5
g
7.1. D
evices
5
7.2. Device Class 6
8. Settings 7
g
8.1. File Tracing 7
g
8.2. Password protection 8
p
9. Reports and Analysis 9
py
10. E-mail Alerts 1
0
10.1. Alerts Settings 10
g
11. Notifi cation Messages 11
g
12. About 12
12.1. License Key Registration 12
yg
12.2. Update Mechanism 12
p
13. Uninstall 12
14. Support 13
pp
Page 3
1. Introduction
Endpoint Protector Basic™ will help you secure your PCs endpoints by controlling and monitoring device use. You will be able to restrict the use of USB, FireWire and other ports and control portable device use your computer. You can fi nd a complete list of all controlled device types in the chapter “4. Controlled Device Types”. Therefore you are effectively preventing unwanted data introduction or data theft from your PC.
With Endpoint Protector Basic you can:
• Allow or restrict the use of any USB storage or other portable storage device on your computer
• Identify any USB storage device used in connection with your computer
• See the details of all USB storage devices connected to the computer at a certain moment
• Let the PCs administrator receive an e-mail message when an unauthorized USB storage device is connected to a workstation
• Use fi le tracin
g
to monitor fi le accesses on any USB storage device
2. Endpoint Protector Product Family
The Endpoint Protector Product family offers device control and endpoint security for any environment for home PCs or MACs, medium sized offi ces or even entire enterprise networks.
Endpoint Protector Basic is part of it and offers your home and offi ce PCs the best solution to control the use of portable devices on your
p
rotected PCs so you data cannot be copied unauthorized to unwanted devices.
Other
p
roducts from the Endpoint Protector Product family included:
• M
y
Endpoint Protector (a Software as a Service solution to secure PCs and MACs over a internet portal https://my.EndpointProtector.com)
• Endpoint Protector (a client - server device control solution
f
or small and medium sized companies)
• Endpoint Protector Appliance (a hardware appliance device control solution
f
or small and medium sized companies and enterprises)
More in
f
ormation can be found here http://www.EndpointProtector.com
3. System Requirements
• Supported Operating Systems are:
• Windows 7
(
32bit / 64bit)
• Windows Vista
(
32bit / 64bit
)
• Windows XP (Service Pack 2 is recommended)
• Windows 2
003
• Administrative rights are required in install the software on a PC and to be able to authorize or unauthorized devices
• 32MB o
f
available memory on the hard drive
• Minimum of 2
56
MB RAM is recommended
Page 4
4. Controlled Device Types
Endpoint Protector Basic supports a wide range of device types which represent key sources of security breaches. These devices can be authorized which makes it possible for the users to view, create or modify their content and for administrators to view the data transferred to and from the authorized devices.
• Removable Storage Devices
• Normal USB Flash Drives, U3 and Autorun Drives, Disk on Ke
y
, etc.
• USB 1.1, USB 2.0, USB 3.0
• Memory Cards - SD Cards, MMC Cards, and Compact Flash Cards, etc.
C
ard Readers - internal and external
• CD/DVD-P
l
ayer/Burner - internal and externa
l
• Digital Cameras
• Smartp
h
ones / Handhelds / PDAs (includes Nokia N-Series, Blackberry, and Windows CE) compatible devices, Windows Mobile devices,
etc.
• iPods
/
iPhones / iPads
• MP3 P
l
ayer / Media Player Devices
• Externa
l
HDDs / portable hard disks
FireWire Devices
• PCMCIA Devices
• Biometric Devices
• B
l
uetoot
h
• Printers (applies to serial, USB and LTP connection methods)
• ExpressCar
d
(SSD)
• Wire
l
ess USB
• LPT/Parallel ports (By controlling the Parallel ports o
f
a PC using Endpoint Protector Basic, the network administrator can deny or allow
u
sers access to storage devices connected to these ports.) * APPLIES ONLY TO STORAGE DEVICES
• Flo
ppy
disk drives
5. Installation
To install Endpoint Protector Basic it is required that you are logged on the workstation with full administrative rights.
R
u
n the EPPBasic.exe fi le.
Endpoint Protector Basic will install itself in the start menu and create the Endpoint Protector Basic program group. Endpoint Protector Basic will require in some cases that you restart your PC for a successful completion of the installation process.
A
f
ter a successful installation Endpoint Protector Basic will always run in the background to protect your PCs endpoints when you or other
users are
logged
into the PC.
Page 5
6. Getting Starte
d
IMPORTANT! Make sure you are logged in to the PC as administrator. Endpoint Protector Basic comes with a confi guration Interface, which will
be available for logged in Administrators ONLY. If a standard user (guest, restricted) logs into the system the confi guration Interface will not be accessible and your PC ports are protected.
To start using Endpoint Protector Basic, go to Start > All Programs > Endpoint Protector Basic > Endpoint Protector Basic.
7. Rights
7.1. Devi
ces
This module will allow you to specify what specifi c device can be accessible on your PC.
Each time a new device is connected to the PC while the End
p
oint Protector Basic Settings application is open, you will see it automatically in
the “Devices” list. In case you cannot see the device in the list, you can click the “Refresh” button from the bottom-right corner of the window
.
The status column indicates the current rights for the devices
.
Red means that the device is blocked on your PC
Green means that the device is allowed on your PC
Yellow means that the device has read only rights on your PC
Gray means that the device is currently not connected to the PC
With a mouse click on a device’s status dot, a menu will open. This menu will give you access to the following settings:
Page 6
7.2. Device Class
This module will allow you to specify what device class can be accessible on your PC.
By default the following device types will have Allow Access rights: WiFi, Local Printers, Webcams and CD-ROMs.
In order to change the rights for a device class, you need to click the select box next to the device class name. The options you have are: “Deny Access”, “A
ll
ow Access” and “Read Only Access”.
Page 7
8. Settings
The General Settings module gives you the option to deactivate File Tracing, which is activated by default. You can deactivate this feature if you
d
o not need this additional security level.
Here you can also password protect the access to the Endpoint Protector Basic User Interface, or select your Language settings.
8.1. File Tracing
The fi le tracing feature allows the administrator to record the fi le properties of fi les that are written or read from or to portable storage devices
f
or later analysis.
You can then veri
f
y the fi les that have been accessed in the Logs Report, from the “Reports and Analysis” module.
Page 8
8.2. Password protection
The access to the Endpoint Protector Basic User Interface can be password protected.
A
f
ter introducing your password settings, you need to click “Set password” button in order to save it.
You also have the option to save a ‘Hint’ (reminder) for the Password. This might be helpful when forgetting the password.
To remove t
h
e Password protection, you have to click the “Reset password” button.
A
f
ter setting up a password, you will be asked to enter it each time you start Endpoint Protector Basic.
In case you didn’t save a ‘Hint’, this functionality will be hidden in the Login dialog.
O
ption
Expl
anation
eny Acces
s
The device will be locked on your PC
Allow Access The device will be allowed on your PC
Read Only AccessThe device will have only read only rights on your PC
Page 9
9. Reports and Analysis
The most powerful and detailed representation of activity recordings can be achieved using this module. It allows the administrator to see exactly what actions took place at what time. This information also contains the computer name, user and device used and also the action taken and the fi les accessed.
You can sort the events by date & time, user, action, fi le type, product ID (PID), vendor ID (VID), etc. by clicking on the correspondent table
eader, e.g. “Timestamp”.
Page 10
10
10. E-mail Alerts
You have the option to receive a system alert in the form of an e-mail notifi cation, each time an unauthorized device is connected to the PC that is protected with Endpoint Protector Basic.
To enable Alerts by e-mail notifi cation, you must confi gure the e-mail server host and provide a user name and password to that mail server. You can do that by accessing “System Alerts” in the “Alerts Setup” module.
10.1. Alerts Settings
If you enable the e-mail notifi cation option you have to provide Endpoint Protector Basic with an SMTP e-mail account that will be used to send the e-mail noti
cations to a specifi ed e-mail address.
Please specify a sender and a recipient e-mail address. Enter your SMTP server address along with your username and password in case that your SMTP server requires this information in order to send an e-mail.
You can also verif
y
if your settings are correct by clicking the “Send test e-mail” button.
I
f
a fi rewall is installed on the PC that you are protecting with Endpoint Protector Basic, the fi rewall will request you for authorization that Endpoint Protector Basic is accessing the internet. Please grant Endpoint Protector Basic this authorization so you will be able to send and r
eceive e-ma
il notifi cation.
Page 11
11
11. Notifi cation Messages
In order to see notifi cations, the EPP Basic Notifi er needs to be running.
In case
y
our Notifi er is running, you will see its icon in the System Tray.
When you right click the icon, you will have the option to launch the application, or to exit the Notifi er.
Y
ou can restart the Notifi er from Start > All Programs > Endpoint Protector Basic.
Every time a new device or an unauthorized device is connected to the protect PC, a message will pop up in the right corner of the screen. The message will notify the PC user about the unauthorized use of a portable device.
Y
ou will be also notifi ed from time to time, by a similar message, about the trial period of Endpoint Protector Basic if you are testing the
tware as a trial.
Page 12
12
12. About
12.1. License Key Registration
Y
our version of Endpoint Protector Basic comes with a lifetime license; therefore you will be able to use the full functionality of the application
on your PC.
12.2. Update Mechanism
Y
ou can check for the availability of a newer Endpoint Protector Basic version by clicking the “Check for Update” button in the “About” module,
“Update” menu.
If there is a newer version available you will be asked if you want to download it.
The application will be downloaded directly to your PC.
After download is complete, you will have the option to “Install it” by clicking the button.
13. Uninstall
To remove Endpoint Protector Basic from your PC, please go to Control Panel > Add or Remove Programs > Endpoint Protector Basic > Remove. Before doin
g
this you have to close Endpoint Protector Basic Settings.
Uninstalling Endpoint Protector Basic will require entry of the Endpoint Protector Basic password even for users that have administrative rights on t
h
e protected PC.
IMP
O
RTANT! Uninstalling the application will give full access to all USB drives that were and will be plugged into your PC
.
Page 13
13
14. Support
Visit http://www.verbatim-europe.co.uk/en_1/support_usb-devices_1.html
ne of our team members will contact you in the shortest time possible.
Even if you do not have a problem but miss some feature or just want to leave us general comment we would love to hear from you. Your input is much appreciated and we welcome any input to make computing with portable devices sa
f
e and convenient.
© 2004 – 2010 CoSoSys Ltd. All rights reserved. Windows is registered trademark of Microsoft Corporation. All other names and trademarks are property o
f
their respective owners.
Loading...