You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/endpointprotector/admin/agent.md
+109Lines changed: 109 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,6 +30,114 @@ termination or modification of the Endpoint Protector Agent.
30
30
When enabling Debug logging, deploying a fresh installation, or during upgrade processes where critical drivers/services (such as DPI, browser plugins, or Outlook add-ins) must be reloaded, it is recommended to restart the operating system. This mandatory first step in troubleshooting ensures that all dependencies are properly initialized."
31
31
:::
32
32
33
+
## Agent install parameters
34
+
35
+
To improve the Endpoint Protector installation process, use the Endpoint Protector tool that allows
36
+
you to run installation-related actions, identify your current Linux distribution, and view Endpoint
37
+
Protector Release Notes.
38
+
39
+
Use the following commands:
40
+
41
+
- i - install
42
+
- u - uninstall
43
+
- rn - release notes
44
+
- l - distribution list
45
+
46
+
**Optional CLI commands for installers**
47
+
48
+
49
+
### Windows
50
+
You can also apply manual proxy settings using CLI commands:
- AUTHUSR – Username (if authentication for proxy is needed)
63
+
- AUTHPASS – Password (if authentication for proxy is needed)
64
+
65
+
You can also use CLI Commands below to install Endpoint Protector Client in specific mode of working.
66
+
67
+
- WSIP – server address
68
+
- WSPORT – server port number
69
+
- DEPT_CODE – department code
70
+
- IPV6MAPPING – IPV6 Mapping IPv4 addresses
71
+
- SUPPRESSRD – suppress FileRead/FileDelete events for NS and Removable devices
72
+
- DISABLECAP – disabling loading of CAP drivers (CAP will not work)
73
+
74
+
:::note
75
+
Starting with the 2511 Clients release, the install parameters "IPV6MAPPING," "SUPPRESSRD," and "DISABLECAP" will persist during the EPP Client upgrade process.
76
+
:::
77
+
78
+
### macOS
79
+
:::note
80
+
For macOS, please contact the Netwrix Support team to obtain the latest version of the
81
+
installer script, which allows customization of installation parameters.
82
+
:::
83
+
84
+
85
+
### Linux
86
+
87
+
For Linux, you can only use CLI arguments in the options to bypass proxy settings.sh file. To do so,
88
+
follow these steps:
89
+
90
+
**Step 1 –** Access the installation folder, open a Terminal, and run the following command:
91
+
92
+
`cd pathToLinuxClientFolder`
93
+
94
+
**Step 2 –** To run commands as root, run the following command and type your password.
95
+
96
+
`sudo su`
97
+
98
+
**Step 3 –** Open the options.sh configuration file with the following command:
99
+
100
+
`gedit options.sh`
101
+
102
+
**Step 4 –** In the configuration file, you will view the following fields for the proxy setup:
103
+
104
+
#EPPCLIENT_HTTPS_PROXY=
105
+
106
+
#export EPPCLIENT_HTTPS_PROXY
107
+
108
+
**Step 5 –** Remove the # before each entry to apply the proxy setups.
109
+
110
+
**Step 6 –** For the first proxy setup, EPPCLIENT_HTTPS_PROXY, add the proxy server information in
**Step 7 –** Save the changes, and then run the installation without having a VPN connection:
116
+
117
+
`bash install.sh`
118
+
119
+
Additional CLI commands for Linux in specific mode:
120
+
121
+
- #EPPCLIENT_SUPRESSRW - suppress FileRead/FileDelete events for NS and Removable devices
122
+
- #EPPCLIENT_DISABLECAP - disabling loading of CAP drivers (CAP will not work)
123
+
124
+
## Bypass Proxy Settings
125
+
126
+
You have the ability to bypass proxy settings for all operating systems.
127
+
128
+
#### Windows and macOS
129
+
130
+
**Endpoint Protector Wizard Installer**
131
+
132
+
Select the option to **Use Manual Proxy Settings** from the Endpoint Protector Wizard installer and
133
+
then provide the following information:
134
+
135
+
- Proxy IP – IP of the proxy server
136
+
- Proxy Port – Port of the proxy
137
+
- Select the Use authentication checkbox
138
+
- Username – add proxy server username
139
+
- Password – add proxy server password
140
+
33
141
## Agent Installation
34
142
35
143
For Windows and Mac, your input in installing the Endpoint Protector Agent is minimal. The
@@ -147,6 +255,7 @@ macOS, you may still see EPPNotifier in the Notification settings. To remove i
147
255
right-click and select "Reset notifications."
148
256
:::
149
257
258
+
For more information about Deep Packet Inspection and configurable options, please visit the dedicated [documentation section for DPI](/docs/endpointprotector/admin/cap_module/deeppacket.md).
Copy file name to clipboardExpand all lines: docs/endpointprotector/admin/ee_module/eemodule.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,10 +36,17 @@ Enforced Encryption works on read-only mode if the device was formatted on Windo
36
36
Encryption configured on Windows or some files were encrypted on Windows. On macOS, these files can be
37
37
decrypted, except for NTFS due to incompatibility with Enforced Encryption.
38
38
39
+
40
+
## Enforced Encryption 140-3 FIPS Validated Engine
41
+
39
42
:::note
40
43
Starting with Netwrix Enforced Encryption version 3.0.0.2 (5.9.4.2 release), a new encryption engine has been introduced, replacing the previous 256-bit AES CBC-mode encryption with FIPS 140-3 validated cryptography. This FIPS 140-3 validated encryption provides the highest standards of data protection, ensuring compliance with the latest industry regulations. While the new encryption engine is fully backward compatible for existing users, allowing for a seamless upgrade and continued use of previously encrypted drives, USB sticks encrypted with the FIPS 140-3 validated engine will not be compatible with older Enforced Encryption Clients. Therefore, we recommend updating EE Clients to ensure compatibility.
41
44
:::
42
45
46
+
To verify the version of the 140-3 FIPS validated engine and view certification details, check the "About" section in the Enforced Encryption application.
47
+
48
+

49
+
43
50
## Enforced Encryption Deployment
44
51
45
52
Enforced Encryption is supported for both Mac and Windows computers.
0 commit comments