
2. Endpoint Protector Product Family 3
4. Controlled Device Types 4
8.2. Password protection 8
9. Reports and Analysis 9
11. Notifi cation Messages 11
12.1. License Key Registration 12
12.2. Update Mechanism 12

Endpoint Protector Basic™ will help you secure your PCs endpoints by controlling and monitoring device use. You will be able to restrict the
use of USB, FireWire and other ports and control portable device use your computer. You can fi nd a complete list of all controlled device types
in the chapter “4. Controlled Device Types”. Therefore you are effectively preventing unwanted data introduction or data theft from your PC.
With Endpoint Protector Basic you can:
• Allow or restrict the use of any USB storage or other portable storage device on your computer
• Identify any USB storage device used in connection with your computer
• See the details of all USB storage devices connected to the computer at a certain moment
• Let the PCs administrator receive an e-mail message when an unauthorized USB storage device is connected to a workstation
• Use fi le tracin
to monitor fi le accesses on any USB storage device
2. Endpoint Protector Product Family
The Endpoint Protector Product family offers device control and endpoint security for any environment for home PCs or MACs, medium sized
offi ces or even entire enterprise networks.
Endpoint Protector Basic is part of it and offers your home and offi ce PCs the best solution to control the use of portable devices on your
rotected PCs so you data cannot be copied unauthorized to unwanted devices.
roducts from the Endpoint Protector Product family included:
Endpoint Protector (a Software as a Service solution to secure PCs and MACs over a internet portal https://my.EndpointProtector.com)
• Endpoint Protector (a client - server device control solution
or small and medium sized companies)
• Endpoint Protector Appliance (a hardware appliance device control solution
or small and medium sized companies and enterprises)
More in
ormation can be found here http://www.EndpointProtector.com
3. System Requirements
• Supported Operating Systems are:
• Windows XP (Service Pack 2 is recommended)
• Windows 2
• Administrative rights are required in install the software on a PC and to be able to authorize or unauthorized devices
available memory on the hard drive
• Minimum of 2

4. Controlled Device Types
Endpoint Protector Basic supports a wide range of device types which represent key sources of security breaches. These devices can be
authorized which makes it possible for the users to view, create or modify their content and for administrators to view the data transferred to
and from the authorized devices.
• Removable Storage Devices
• Normal USB Flash Drives, U3 and Autorun Drives, Disk on Ke
, etc.
• USB 1.1, USB 2.0, USB 3.0
• Memory Cards - SD Cards, MMC Cards, and Compact Flash Cards, etc.
•
ard Readers - internal and external
• CD/DVD-P
ayer/Burner - internal and externa
ones / Handhelds / PDAs (includes Nokia N-Series, Blackberry, and Windows CE) compatible devices, Windows Mobile devices,
ayer / Media Player Devices
HDDs / portable hard disks
• Printers (applies to serial, USB and LTP connection methods)
ess USB
• LPT/Parallel ports (By controlling the Parallel ports o
a PC using Endpoint Protector Basic, the network administrator can deny or allow
sers access to storage devices connected to these ports.) * APPLIES ONLY TO STORAGE DEVICES
disk drives
5. Installation
To install Endpoint Protector Basic it is required that you are logged on the workstation with full administrative rights.
Endpoint Protector Basic will install itself in the start menu and create the Endpoint Protector Basic program group. Endpoint Protector Basic
will require in some cases that you restart your PC for a successful completion of the installation process.
ter a successful installation Endpoint Protector Basic will always run in the background to protect your PCs endpoints when you or other