Skip to content

Commit 8680c80

Browse files
authored
Merge pull request #373 from krzysztofstaszalek/dev_krzys
EPP: Massive update for 5942-5943 missing documentation changes
2 parents aa8096b + c787a3f commit 8680c80

26 files changed

+375
-101
lines changed

docs/endpointprotector/admin/agent.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@ Global Settings page, is known as the Tamper Mode setting. It is designed to pre
2626
termination or modification of the Endpoint Protector Agent.
2727
:::
2828

29+
:::note
30+
When enabling Debug logging, deploying a fresh installation, or during upgrade processes where critical drivers/services (such as DPI, browser plugins, or Outlook add-ins) must be reloaded, it is recommended to restart the operating system. This mandatory first step in troubleshooting ensures that all dependencies are properly initialized."
31+
:::
2932

3033
## Agent Installation
3134

docs/endpointprotector/admin/cap_module/deeppacket.md

Lines changed: 53 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,45 @@ To ensure consistent DPI behavior after enabling or disabling the feature or upg
3030
the Endpoint Protector, a restart of your computer is required.
3131
:::
3232

33+
## Stealthy DPI vs. regular DPI
34+
35+
What are the different network visibility strategies available on Windows?
36+
37+
- Stealthy DPI: Taps into a newly established network flow, where the content is extracted, decrypted, analyzed, encrypted, and then reintroduced. This method creates a direct network flow between the original application and the internet, without intermediaries.
38+
- Regular DPI (Redirect-Based): Redirects network traffic to a transparent proxy server on localhost before it reaches the internet. This approach results in observable traffic directed to the localhost proxy on the local computer.
39+
40+
How do Stealthy DPI and Redirect-Based DPI compare in terms of EPP Client functionality?
41+
42+
- Stealthy DPI and Redirect-Based DPI are functionally similar and require no changes to Endpoint Protector policies. Users can select the mode that best suits their infrastructure preferences. Both methods use the same resources and generate identical events.
43+
- However, they differ in handling bypasses for failed connections:
44+
- Regular DPI (Redirect-Based): Offers more flexibility by allowing a feature to bypass connections that cannot be intercepted, with the proxy rebuilding the network connection to the destination after a failure.
45+
- Stealthy DPI: Achieves a similar bypass result using the improved "DPI Bypass" feature available in Endpoint Protector version 5.9.3.0.
46+
47+
When should you choose Stealthy DPI over Regular DPI (Redirect-Based)?
48+
49+
- Third-Party DLP or Firewall Software: If third-party software has trouble handling or blocking network traffic originating from a local proxy, switching to Stealthy DPI is recommended.
50+
- Security-Enhanced Applications: If certain applications experience connectivity issues with Regular DPI (Redirect-Based), opting for Stealthy DPI can resolve these issues.
51+
52+
## Deep Packet Inspection Diagrams
53+
54+
The diagrams below illustrate the high-level logic for Deep Packet Inspection (DPI) across different operating systems. Additionally, they illustrate the distinctions between Stealthy and Regular DPI modes of operation for macOS.
55+
56+
### For Windows
57+
- regular DPI
58+
![Deep Packet Inspection on Windows - regular DPI](dpiwinregular.webp)
59+
60+
- Stealthy DPI:
61+
![Deep Packet Inspection on Windows - Stealth DPI](dpiwinstealth.webp)
62+
63+
### For MacOS
64+
- intercept VPN off:
65+
![Deep Packet Inspection on Windows - intercept VPN off](dpimacosvpnoff.webp)
66+
67+
- intercept VPN on:
68+
![Deep Packet Inspection on Windows - intercept VPN on](dpimacosvpnon.webp)
69+
70+
### For Linux
71+
![Deep Packet Inspection on Linux](dpilinux.webp)
3372

3473
## Deep Packet Inspection Certificate
3574

@@ -58,9 +97,14 @@ generated.
5897
Issuing the Deep Packet Inspection Certificate on Windows is handled automatically and
5998
transparently by the Endpoint Protector Client. No additional steps are required.
6099
:::
100+
![Configuring the Deep Packet Inspection - Auto-refresh Certificate feature](autorefreshcert.webp)
61101

102+
EPP DPI module generates a certificate only at the first time a user visits a website and caches that certificate for subsequent visits to the same website. The certificate cache deletion interval can be configured in EPP Server versions 5.8.0.0 and above (please refer to this UM section [System Settings - DPI certificate](/docs/endpointprotector/admin/systemconfiguration/systemsettings) . Alternatively, the certificate cache is cleared either upon computer reboot or when the DPI feature is disabled.
103+
104+
Endpoint Protector employs the same criteria as the Chromium open-source web browser for verifying website certificates, referencing the corporate CA certificates found in the system certificate stores. You can assess this validation by using diagnostic websites like https://badssl.com/.
105+
106+
If needed, this feature can be configured through the DPI Bypass option described here [Global Settings - DPI configuration](/docs/endpointprotector/admin/dc_module/globalsettings#dpi-configuration).
62107

63-
![Configuring the Deep Packet Inspection - Auto-refresh Certificate feature](autorefreshcert.webp)
64108

65109
## Deep Packet Inspection Certificate on macOS
66110

@@ -184,6 +228,10 @@ Protection Policy.
184228

185229
![Deep Packet Inspection Ports and Settings](dpiports.webp)
186230

231+
:::note
232+
The "Local" flag setting will only function with "Stealthy DPI" on Windows and "Intercept VPN Traffic" on macOS. It is not operational on Linux.
233+
:::
234+
187235
In this section you can also manage the following settings:
188236

189237
- Text Inspection - enable this setting to monitor confidential content typed in Teams, Skype, Slack,
@@ -215,8 +263,7 @@ In this section you can also manage the following settings:
215263
:::
216264

217265

218-
- Block unsupported protocols in New Outlook – Enable this setting to block the send email
219-
functionality in the New Outlook without interacting with the Outlook legacy functionality.
266+
- Block unsupported protocols in New Outlook – Enable this setting to block unsupported protocols and the send email function in New Outlook without affecting legacy Outlook. Recommended for those not using the EPP add-in to limit the app as an egress channel. Keep off if EPP add-in is used.
220267

221268
- Monitor webmail – Enable this setting to scan the subject and body for Gmail, Outlook and Yahoo on
222269
the browser. Attachments will be monitored regardless of this setting.
@@ -255,6 +302,9 @@ In this section you can also manage the following settings:
255302

256303

257304
![Allowed domains for Google Business accounts](alloweddomainsgoogle.webp)
305+
:::warning
306+
"To include consumer Google Accounts, such as those ending in @gmail.com and @googlemail.com, enter "consumer_accounts" in the list instead of "gmail.com". This change is necessary, and the current issue is being closed as "won't fix". We may consider opening a documentation task to link the relevant Google document to our user manual. For more information, refer to: [Google Support](https://support.google.com/a/answer/1668854?hl=en).
307+
:::
258308

259309
### Monitor Webmail JSON Format Parser Usage
260310

@@ -301,21 +351,6 @@ apply any changes in the JSON parser, unless Monitor Webmail is not working
301351
:::
302352

303353

304-
### Note on Peer Certificate Validation Usage
305-
306-
If Deep Packet Inspection is ON and Peer Certificate Validation is enabled then you cannot access
307-
unsecured websites and a certificate warning message is displayed.
308-
309-
If Deep Packet Inspection is ON and Peer Certificate Validation is disabled then you can access
310-
unsecured websites and no certificate warning messages are displayed.
311-
312-
For Example; your organization uses an SSL inspection proxy or gateway. The certificates injected by
313-
the proxy or gateway cannot be validated on the endpoint because they are either invalid or the
314-
issuer CA certificate is not installed in the "Trusted Root Certification Authorities" in the computer
315-
certificate store. To allow Deep Packet Inspection to work in this case you must skip peer
316-
certificates validation. Endpoint Protector Client assumes that in this case the peer certificate
317-
validation is performed by the proxy or gateway so that security is not compromised.
318-
319354
## Deep Packet Inspection Applications
320355

321356
From this section, you can enable or disable the Deep Packet Inspection functionality for each
7.86 KB
Loading
9.74 KB
Loading
10.6 KB
Loading
3.44 KB
Loading
10.3 KB
Loading
9.66 KB
Loading
17.1 KB
Loading
19.5 KB
Loading

0 commit comments

Comments
 (0)