
2. Endpoint Protector Product Family 3
4. Controlled Device Types 4
8.2. Password protection 8
9. Reports and Analysis 9
11. Notifi cation Messages 11
12.1. License Key Registration 12
12.2. Update Mechanism 12

Endpoint Protector Basic™ will help you secure your PCs endpoints by controlling and monitoring device use. You will be able to restrict the
use of USB, FireWire and other ports and control portable device use your computer. You can fi nd a complete list of all controlled device types
in the chapter “4. Controlled Device Types”. Therefore you are effectively preventing unwanted data introduction or data theft from your PC.
With Endpoint Protector Basic you can:
• Allow or restrict the use of any USB storage or other portable storage device on your computer
• Identify any USB storage device used in connection with your computer
• See the details of all USB storage devices connected to the computer at a certain moment
• Let the PCs administrator receive an e-mail message when an unauthorized USB storage device is connected to a workstation
• Use fi le tracin
to monitor fi le accesses on any USB storage device
2. Endpoint Protector Product Family
The Endpoint Protector Product family offers device control and endpoint security for any environment for home PCs or MACs, medium sized
offi ces or even entire enterprise networks.
Endpoint Protector Basic is part of it and offers your home and offi ce PCs the best solution to control the use of portable devices on your
rotected PCs so you data cannot be copied unauthorized to unwanted devices.
roducts from the Endpoint Protector Product family included:
Endpoint Protector (a Software as a Service solution to secure PCs and MACs over a internet portal https://my.EndpointProtector.com)
• Endpoint Protector (a client - server device control solution
or small and medium sized companies)
• Endpoint Protector Appliance (a hardware appliance device control solution
or small and medium sized companies and enterprises)
More in
ormation can be found here http://www.EndpointProtector.com
3. System Requirements
• Supported Operating Systems are:
• Windows XP (Service Pack 2 is recommended)
• Windows 2
• Administrative rights are required in install the software on a PC and to be able to authorize or unauthorized devices
available memory on the hard drive
• Minimum of 2

4. Controlled Device Types
Endpoint Protector Basic supports a wide range of device types which represent key sources of security breaches. These devices can be
authorized which makes it possible for the users to view, create or modify their content and for administrators to view the data transferred to
and from the authorized devices.
• Removable Storage Devices
• Normal USB Flash Drives, U3 and Autorun Drives, Disk on Ke
, etc.
• USB 1.1, USB 2.0, USB 3.0
• Memory Cards - SD Cards, MMC Cards, and Compact Flash Cards, etc.
•
ard Readers - internal and external
• CD/DVD-P
ayer/Burner - internal and externa
ones / Handhelds / PDAs (includes Nokia N-Series, Blackberry, and Windows CE) compatible devices, Windows Mobile devices,
ayer / Media Player Devices
HDDs / portable hard disks
• Printers (applies to serial, USB and LTP connection methods)
ess USB
• LPT/Parallel ports (By controlling the Parallel ports o
a PC using Endpoint Protector Basic, the network administrator can deny or allow
sers access to storage devices connected to these ports.) * APPLIES ONLY TO STORAGE DEVICES
disk drives
5. Installation
To install Endpoint Protector Basic it is required that you are logged on the workstation with full administrative rights.
Endpoint Protector Basic will install itself in the start menu and create the Endpoint Protector Basic program group. Endpoint Protector Basic
will require in some cases that you restart your PC for a successful completion of the installation process.
ter a successful installation Endpoint Protector Basic will always run in the background to protect your PCs endpoints when you or other

IMPORTANT! Make sure you are logged in to the PC as administrator. Endpoint Protector Basic comes with a confi guration Interface, which will
be available for logged in Administrators ONLY. If a standard user (guest, restricted) logs into the system the confi guration Interface will not be
accessible and your PC ports are protected.
To start using Endpoint Protector Basic, go to Start > All Programs > Endpoint Protector Basic > Endpoint Protector Basic.
7. Rights
7.1. Devi
This module will allow you to specify what specifi c device can be accessible on your PC.
Each time a new device is connected to the PC while the End
oint Protector Basic Settings application is open, you will see it automatically in
the “Devices” list. In case you cannot see the device in the list, you can click the “Refresh” button from the bottom-right corner of the window
The status column indicates the current rights for the devices
•
Red means that the device is blocked on your PC
•
Green means that the device is allowed on your PC
•
Yellow means that the device has read only rights on your PC
•
Gray means that the device is currently not connected to the PC
With a mouse click on a device’s status dot, a menu will open. This menu will give you access to the following settings:

This module will allow you to specify what device class can be accessible on your PC.
By default the following device types will have Allow Access rights: WiFi, Local Printers, Webcams and CD-ROMs.
In order to change the rights for a device class, you need to click the select box next to the device class name. The options you have are: “Deny
Access”, “A
ow Access” and “Read Only Access”.

The General Settings module gives you the option to deactivate File Tracing, which is activated by default. You can deactivate this feature if you
o not need this additional security level.
Here you can also password protect the access to the Endpoint Protector Basic User Interface, or select your Language settings.
8.1. File Tracing
The fi le tracing feature allows the administrator to record the fi le properties of fi les that are written or read from or to portable storage devices
or later analysis.
You can then veri
y the fi les that have been accessed in the Logs Report, from the “Reports and Analysis” module.

The access to the Endpoint Protector Basic User Interface can be password protected.
ter introducing your password settings, you need to click “Set password” button in order to save it.
You also have the option to save a ‘Hint’ (reminder) for the Password. This might be helpful when forgetting the password.
e Password protection, you have to click the “Reset password” button.
ter setting up a password, you will be asked to enter it each time you start Endpoint Protector Basic.
In case you didn’t save a ‘Hint’, this functionality will be hidden in the Login dialog.
The device will be locked on your PC
Allow Access The device will be allowed on your PC
Read Only AccessThe device will have only read only rights on your PC

The most powerful and detailed representation of activity recordings can be achieved using this module. It allows the administrator to see
exactly what actions took place at what time. This information also contains the computer name, user and device used and also the action
taken and the fi les accessed.
You can sort the events by date & time, user, action, fi le type, product ID (PID), vendor ID (VID), etc. by clicking on the correspondent table

You have the option to receive a system alert in the form of an e-mail notifi cation, each time an unauthorized device is connected to the PC
that is protected with Endpoint Protector Basic.
To enable Alerts by e-mail notifi cation, you must confi gure the e-mail server host and provide a user name and password to that mail server.
You can do that by accessing “System Alerts” in the “Alerts Setup” module.
10.1. Alerts Settings
If you enable the e-mail notifi cation option you have to provide Endpoint Protector Basic with an SMTP e-mail account that will be used to send
the e-mail noti
cations to a specifi ed e-mail address.
Please specify a sender and a recipient e-mail address. Enter your SMTP server address along with your username and password in case that
your SMTP server requires this information in order to send an e-mail.
if your settings are correct by clicking the “Send test e-mail” button.
a fi rewall is installed on the PC that you are protecting with Endpoint Protector Basic, the fi rewall will request you for authorization that
Endpoint Protector Basic is accessing the internet. Please grant Endpoint Protector Basic this authorization so you will be able to send and
r

11
11. Notifi cation Messages
In order to see notifi cations, the EPP Basic Notifi er needs to be running.
In case
our Notifi er is running, you will see its icon in the System Tray.
When you right click the icon, you will have the option to launch the application, or to exit the Notifi er.
ou can restart the Notifi er from Start > All Programs > Endpoint Protector Basic.
Every time a new device or an unauthorized device is connected to the protect PC, a message will pop up in the right corner of the screen. The
message will notify the PC user about the unauthorized use of a portable device.
ou will be also notifi ed from time to time, by a similar message, about the trial period of Endpoint Protector Basic if you are testing the

12.1. License Key Registration
our version of Endpoint Protector Basic comes with a lifetime license; therefore you will be able to use the full functionality of the application
on your PC.
12.2. Update Mechanism
ou can check for the availability of a newer Endpoint Protector Basic version by clicking the “Check for Update” button in the “About” module,
“Update” menu.
If there is a newer version available you will be asked if you want to download it.
The application will be downloaded directly to your PC.
After download is complete, you will have the option to “Install it” by clicking the button.
13. Uninstall
To remove Endpoint Protector Basic from your PC, please go to Control Panel > Add or Remove Programs > Endpoint Protector Basic >
Remove. Before doin
this you have to close Endpoint Protector Basic Settings.
Uninstalling Endpoint Protector Basic will require entry of the Endpoint Protector Basic password even for users that have administrative rights
on t
RTANT! Uninstalling the application will give full access to all USB drives that were and will be plugged into your PC

Visit http://www.verbatim-europe.co.uk/en_1/support_usb-devices_1.html
ne of our team members will contact you in the shortest time possible.
Even if you do not have a problem but miss some feature or just want to leave us general comment we would love to hear from
you. Your input is much appreciated and we welcome any input to make computing with portable devices sa
e and convenient.
© 2004 – 2010 CoSoSys Ltd. All rights reserved. Windows is registered trademark of Microsoft Corporation. All other names
and trademarks are property o