Verbatim Endpoint Protector Basic User Manual

Endpoint Protector
Basic
User Guide
English
C
ontent
s
1. Introduction
3
2. Endpoint Protector Product Family 3
py
3. System Requirements 3
yq
4. Controlled Device Types 4
yp
5. Installation
4
6. Getting Started 5
g
7. Rights 5
g
7.1. D
evices
5
7.2. Device Class 6
8. Settings 7
g
8.1. File Tracing 7
g
8.2. Password protection 8
p
9. Reports and Analysis 9
py
10. E-mail Alerts 1
0
10.1. Alerts Settings 10
g
11. Notifi cation Messages 11
g
12. About 12
12.1. License Key Registration 12
yg
12.2. Update Mechanism 12
p
13. Uninstall 12
14. Support 13
pp
1. Introduction
Endpoint Protector Basic™ will help you secure your PCs endpoints by controlling and monitoring device use. You will be able to restrict the use of USB, FireWire and other ports and control portable device use your computer. You can fi nd a complete list of all controlled device types in the chapter “4. Controlled Device Types”. Therefore you are effectively preventing unwanted data introduction or data theft from your PC.
With Endpoint Protector Basic you can:
• Allow or restrict the use of any USB storage or other portable storage device on your computer
• Identify any USB storage device used in connection with your computer
• See the details of all USB storage devices connected to the computer at a certain moment
• Let the PCs administrator receive an e-mail message when an unauthorized USB storage device is connected to a workstation
• Use fi le tracin
g
to monitor fi le accesses on any USB storage device
2. Endpoint Protector Product Family
The Endpoint Protector Product family offers device control and endpoint security for any environment for home PCs or MACs, medium sized offi ces or even entire enterprise networks.
Endpoint Protector Basic is part of it and offers your home and offi ce PCs the best solution to control the use of portable devices on your
p
rotected PCs so you data cannot be copied unauthorized to unwanted devices.
Other
p
roducts from the Endpoint Protector Product family included:
• M
y
Endpoint Protector (a Software as a Service solution to secure PCs and MACs over a internet portal https://my.EndpointProtector.com)
• Endpoint Protector (a client - server device control solution
f
or small and medium sized companies)
• Endpoint Protector Appliance (a hardware appliance device control solution
f
or small and medium sized companies and enterprises)
More in
f
ormation can be found here http://www.EndpointProtector.com
3. System Requirements
• Supported Operating Systems are:
• Windows 7
(
32bit / 64bit)
• Windows Vista
(
32bit / 64bit
)
• Windows XP (Service Pack 2 is recommended)
• Windows 2
003
• Administrative rights are required in install the software on a PC and to be able to authorize or unauthorized devices
• 32MB o
f
available memory on the hard drive
• Minimum of 2
56
MB RAM is recommended
4. Controlled Device Types
Endpoint Protector Basic supports a wide range of device types which represent key sources of security breaches. These devices can be authorized which makes it possible for the users to view, create or modify their content and for administrators to view the data transferred to and from the authorized devices.
• Removable Storage Devices
• Normal USB Flash Drives, U3 and Autorun Drives, Disk on Ke
y
, etc.
• USB 1.1, USB 2.0, USB 3.0
• Memory Cards - SD Cards, MMC Cards, and Compact Flash Cards, etc.
C
ard Readers - internal and external
• CD/DVD-P
l
ayer/Burner - internal and externa
l
• Digital Cameras
• Smartp
h
ones / Handhelds / PDAs (includes Nokia N-Series, Blackberry, and Windows CE) compatible devices, Windows Mobile devices,
etc.
• iPods
/
iPhones / iPads
• MP3 P
l
ayer / Media Player Devices
• Externa
l
HDDs / portable hard disks
FireWire Devices
• PCMCIA Devices
• Biometric Devices
• B
l
uetoot
h
• Printers (applies to serial, USB and LTP connection methods)
• ExpressCar
d
(SSD)
• Wire
l
ess USB
• LPT/Parallel ports (By controlling the Parallel ports o
f
a PC using Endpoint Protector Basic, the network administrator can deny or allow
u
sers access to storage devices connected to these ports.) * APPLIES ONLY TO STORAGE DEVICES
• Flo
ppy
disk drives
5. Installation
To install Endpoint Protector Basic it is required that you are logged on the workstation with full administrative rights.
R
u
n the EPPBasic.exe fi le.
Endpoint Protector Basic will install itself in the start menu and create the Endpoint Protector Basic program group. Endpoint Protector Basic will require in some cases that you restart your PC for a successful completion of the installation process.
A
f
ter a successful installation Endpoint Protector Basic will always run in the background to protect your PCs endpoints when you or other
users are
logged
into the PC.
Loading...
+ 9 hidden pages