Skip to content

Commit 6d7f6a3

Browse files
Micro changes for DPI/Agent page + images update
1 parent 8b0b3d7 commit 6d7f6a3

File tree

4 files changed

+18
-14
lines changed

4 files changed

+18
-14
lines changed

docs/endpointprotector/admin/agent.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ the macOS Endpoint Protector Agent.
179179

180180
**Step 3 –** Decompress the downloaded file.
181181

182-
![Installation on macOS with Deep Packet Inspection and VPN Traffic Intercept Active](clientinstallationios.webp)
182+
![Installation on macOS with Deep Packet Inspection and VPN Traffic Intercept Active](./systemconfiguration/ClientSoftwarePage.png)
183183

184184
**Step 4 –** Open the **.pkg** file and follow the installation steps and give the requested
185185
permissions.
@@ -194,7 +194,11 @@ checkbox, and then **save** the changes.
194194
**Device Control** > **Users/Computer/Group/Global Settings** > **Manage Settings** > **Endpoint
195195
Protector Client** > **Deep Packet Inspection**.
196196

197-
![Activating Deep Packet Inspection](dpion.webp)
197+
![Activating Deep Packet Inspection](./systemconfiguration/dpion.webp)
198+
199+
:::note
200+
For more information about Deep Packet Inspection and configurable options, please visit the dedicated [documentation section for DPI](/docs/endpointprotector/admin/cap_module/deeppacket.md).
201+
:::
198202

199203
**Step 7 –** Go to the **System Configuration** section, then **System Settings** > **Deep Packet
200204
Inspection Certificate**, and download the **CA Certificate**.
@@ -227,7 +231,7 @@ Inspection Certificate**, and download the **CA Certificate**.
227231
- Block Internet Access – this option will end the Internet connection until the end-user approves
228232
the Endpoint Protector Proxy Configuration once the computer is rebooted.
229233

230-
![Activate Intercept VPN Traffic](interceptvpntraffic.webp)
234+
![Activate Intercept VPN Traffic](./systemconfiguration/interceptvpntraffic.webp)
231235

232236
**Step 15 –** **Save** the changes.
233237

@@ -255,8 +259,6 @@ macOS, you may still see EPPNotifier in the Notification settings. To remove i
255259
right-click and select "Reset notifications."
256260
:::
257261

258-
For more information about Deep Packet Inspection and configurable options, please visit the dedicated [documentation section for DPI](/docs/endpointprotector/admin/cap_module/deeppacket.md).
259-
260262
### Debian Based Distributions
261263

262264
While the installation process is similar, each distribution and version have their own
@@ -301,7 +303,7 @@ The following are several examples of supported distributions:
301303

302304
![RedHat based distributions](redhatbaseddistributionstwo.webp)
303305

304-
### Setting the Server IP
306+
#### Setting the Server IP
305307

306308
For all RedHat-based distributions, you need to follow an additional step after executing the above
307309
commands in order to set the Endpoint Protector Server IP.
@@ -312,7 +314,7 @@ Based on each distribution, follow the corresponding method:
312314

313315
![Setting the Endpoint Protector Server IP](setserveriptwo.webp)
314316

315-
### The Windows Subsystem for Linux
317+
## The Windows Subsystem for Linux
316318

317319
The Windows Subsystem for Linux (WSL) allows you to run native Linux distributions directly within
318320
your Windows environment. However, due to its nature, the Endpoint Protector Client cannot be

docs/endpointprotector/admin/cap_module/deeppacket.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -93,10 +93,7 @@ generated.
9393

9494
**Step 4 –** Reboot the endpoint to enforce a new Certificate.
9595

96-
:::note
97-
Issuing the Deep Packet Inspection Certificate on Windows is handled automatically and
98-
transparently by the Endpoint Protector Client. No additional steps are required.
99-
:::
96+
10097
![Configuring the Deep Packet Inspection - Auto-refresh Certificate feature](autorefreshcert.webp)
10198

10299
EPP DPI module generates a certificate only at the first time a user visits a website and caches that certificate for subsequent visits to the same website. The certificate cache deletion interval can be configured in EPP Server versions 5.8.0.0 and above (please refer to this UM section [System Settings - DPI certificate](/docs/endpointprotector/admin/systemconfiguration/systemsettings) . Alternatively, the certificate cache is cleared either upon computer reboot or when the DPI feature is disabled.
@@ -105,8 +102,14 @@ Endpoint Protector employs the same criteria as the Chromium open-source web bro
105102

106103
If needed, this feature can be configured through the DPI Bypass option described here [Global Settings - DPI configuration](/docs/endpointprotector/admin/dc_module/globalsettings#dpi-configuration).
107104

105+
### DPI on Windows
108106

109-
## Deep Packet Inspection Certificate on macOS
107+
:::note
108+
Issuing the Deep Packet Inspection Certificate on Windows is handled automatically and
109+
transparently by the Endpoint Protector Client. No additional steps are required.
110+
:::
111+
112+
### DPI Certificate on macOS
110113

111114
Due to the latest changes in the macOS 11.0 that affect Deep Packet Inspection, a new Root
112115
Certificate is needed in order for the Deep Packet Inspection feature to work on the mentioned macOS
@@ -153,8 +156,7 @@ Linux users to manually add the new certificate into the keychain. On Windows, t
153156
be updated automatically.
154157
:::
155158

156-
157-
## Deep Packet Inspection Certificate on Linux
159+
### DPI Certificate on Linux
158160

159161
Due to system-level requirements in Linux, adding the Deep Packet Inspection certificate involves
160162
specific steps to ensure compatibility. The certificate enables Endpoint Protector to perform secure
20.4 KB
Loading
15.3 KB
Loading

0 commit comments

Comments
 (0)