You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/endpointprotector/admin/agent.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,9 @@ Global Settings page, is known as the Tamper Mode setting. It is designed to pre
26
26
termination or modification of the Endpoint Protector Agent.
27
27
:::
28
28
29
+
:::note
30
+
When enabling Debug logging, deploying a fresh installation, or during upgrade processes where critical drivers/services (such as DPI, browser plugins, or Outlook add-ins) must be reloaded, it is recommended to restart the operating system. This mandatory first step in troubleshooting ensures that all dependencies are properly initialized."
Copy file name to clipboardExpand all lines: docs/endpointprotector/admin/cap_module/deeppacket.md
+53-18Lines changed: 53 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,6 +30,45 @@ To ensure consistent DPI behavior after enabling or disabling the feature or upg
30
30
the Endpoint Protector, a restart of your computer is required.
31
31
:::
32
32
33
+
## Stealthy DPI vs. regular DPI
34
+
35
+
What are the different network visibility strategies available on Windows?
36
+
37
+
- Stealthy DPI: Taps into a newly established network flow, where the content is extracted, decrypted, analyzed, encrypted, and then reintroduced. This method creates a direct network flow between the original application and the internet, without intermediaries.
38
+
- Regular DPI (Redirect-Based): Redirects network traffic to a transparent proxy server on localhost before it reaches the internet. This approach results in observable traffic directed to the localhost proxy on the local computer.
39
+
40
+
How do Stealthy DPI and Redirect-Based DPI compare in terms of EPP Client functionality?
41
+
42
+
- Stealthy DPI and Redirect-Based DPI are functionally similar and require no changes to Endpoint Protector policies. Users can select the mode that best suits their infrastructure preferences. Both methods use the same resources and generate identical events.
43
+
- However, they differ in handling bypasses for failed connections:
44
+
- Regular DPI (Redirect-Based): Offers more flexibility by allowing a feature to bypass connections that cannot be intercepted, with the proxy rebuilding the network connection to the destination after a failure.
45
+
- Stealthy DPI: Achieves a similar bypass result using the improved "DPI Bypass" feature available in Endpoint Protector version 5.9.3.0.
46
+
47
+
When should you choose Stealthy DPI over Regular DPI (Redirect-Based)?
48
+
49
+
- Third-Party DLP or Firewall Software: If third-party software has trouble handling or blocking network traffic originating from a local proxy, switching to Stealthy DPI is recommended.
50
+
- Security-Enhanced Applications: If certain applications experience connectivity issues with Regular DPI (Redirect-Based), opting for Stealthy DPI can resolve these issues.
51
+
52
+
## Deep Packet Inspection Diagrams
53
+
54
+
The diagrams below illustrate the high-level logic for Deep Packet Inspection (DPI) across different operating systems. Additionally, they illustrate the distinctions between Stealthy and Regular DPI modes of operation for macOS.
55
+
56
+
### For Windows
57
+
- regular DPI
58
+

59
+
60
+
- Stealthy DPI:
61
+

62
+
63
+
### For MacOS
64
+
- intercept VPN off:
65
+

66
+
67
+
- intercept VPN on:
68
+

69
+
70
+
### For Linux
71
+

33
72
34
73
## Deep Packet Inspection Certificate
35
74
@@ -58,9 +97,14 @@ generated.
58
97
Issuing the Deep Packet Inspection Certificate on Windows is handled automatically and
59
98
transparently by the Endpoint Protector Client. No additional steps are required.
60
99
:::
100
+

61
101
102
+
EPP DPI module generates a certificate only at the first time a user visits a website and caches that certificate for subsequent visits to the same website. The certificate cache deletion interval can be configured in EPP Server versions 5.8.0.0 and above (please refer to this UM section [System Settings - DPI certificate](/docs/endpointprotector/admin/systemconfiguration/systemsettings) . Alternatively, the certificate cache is cleared either upon computer reboot or when the DPI feature is disabled.
103
+
104
+
Endpoint Protector employs the same criteria as the Chromium open-source web browser for verifying website certificates, referencing the corporate CA certificates found in the system certificate stores. You can assess this validation by using diagnostic websites like https://badssl.com/.
105
+
106
+
If needed, this feature can be configured through the DPI Bypass option described here [Global Settings - DPI configuration](/docs/endpointprotector/admin/dc_module/globalsettings#dpi-configuration).
62
107
63
-

64
108
65
109
## Deep Packet Inspection Certificate on macOS
66
110
@@ -184,6 +228,10 @@ Protection Policy.
184
228
185
229

186
230
231
+
:::note
232
+
The "Local" flag setting will only function with "Stealthy DPI" on Windows and "Intercept VPN Traffic" on macOS. It is not operational on Linux.
233
+
:::
234
+
187
235
In this section you can also manage the following settings:
188
236
189
237
- Text Inspection - enable this setting to monitor confidential content typed in Teams, Skype, Slack,
@@ -215,8 +263,7 @@ In this section you can also manage the following settings:
215
263
:::
216
264
217
265
218
-
- Block unsupported protocols in New Outlook – Enable this setting to block the send email
219
-
functionality in the New Outlook without interacting with the Outlook legacy functionality.
266
+
- Block unsupported protocols in New Outlook – Enable this setting to block unsupported protocols and the send email function in New Outlook without affecting legacy Outlook. Recommended for those not using the EPP add-in to limit the app as an egress channel. Keep off if EPP add-in is used.
220
267
221
268
- Monitor webmail – Enable this setting to scan the subject and body for Gmail, Outlook and Yahoo on
222
269
the browser. Attachments will be monitored regardless of this setting.
@@ -255,6 +302,9 @@ In this section you can also manage the following settings:
255
302
256
303
257
304

305
+
:::warning
306
+
"To include consumer Google Accounts, such as those ending in @gmail.com and @googlemail.com, enter "consumer_accounts" in the list instead of "gmail.com". This change is necessary, and the current issue is being closed as "won't fix". We may consider opening a documentation task to link the relevant Google document to our user manual. For more information, refer to: [Google Support](https://support.google.com/a/answer/1668854?hl=en).
307
+
:::
258
308
259
309
### Monitor Webmail JSON Format Parser Usage
260
310
@@ -301,21 +351,6 @@ apply any changes in the JSON parser, unless Monitor Webmail is not working
301
351
:::
302
352
303
353
304
-
### Note on Peer Certificate Validation Usage
305
-
306
-
If Deep Packet Inspection is ON and Peer Certificate Validation is enabled then you cannot access
307
-
unsecured websites and a certificate warning message is displayed.
308
-
309
-
If Deep Packet Inspection is ON and Peer Certificate Validation is disabled then you can access
310
-
unsecured websites and no certificate warning messages are displayed.
311
-
312
-
For Example; your organization uses an SSL inspection proxy or gateway. The certificates injected by
313
-
the proxy or gateway cannot be validated on the endpoint because they are either invalid or the
314
-
issuer CA certificate is not installed in the "Trusted Root Certification Authorities" in the computer
315
-
certificate store. To allow Deep Packet Inspection to work in this case you must skip peer
316
-
certificates validation. Endpoint Protector Client assumes that in this case the peer certificate
317
-
validation is performed by the proxy or gateway so that security is not compromised.
318
-
319
354
## Deep Packet Inspection Applications
320
355
321
356
From this section, you can enable or disable the Deep Packet Inspection functionality for each
0 commit comments