Skip to content

Commit 8b0b3d7

Browse files
EPP: minor changes (doc's cleanup) related to Agent install + EE FIPS details
1 parent 7936532 commit 8b0b3d7

File tree

4 files changed

+117
-103
lines changed

4 files changed

+117
-103
lines changed

docs/endpointprotector/admin/agent.md

Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,114 @@ termination or modification of the Endpoint Protector Agent.
3030
When enabling Debug logging, deploying a fresh installation, or during upgrade processes where critical drivers/services (such as DPI, browser plugins, or Outlook add-ins) must be reloaded, it is recommended to restart the operating system. This mandatory first step in troubleshooting ensures that all dependencies are properly initialized."
3131
:::
3232

33+
## Agent install parameters
34+
35+
To improve the Endpoint Protector installation process, use the Endpoint Protector tool that allows
36+
you to run installation-related actions, identify your current Linux distribution, and view Endpoint
37+
Protector Release Notes.
38+
39+
Use the following commands:
40+
41+
- i - install
42+
- u - uninstall
43+
- rn - release notes
44+
- l - distribution list
45+
46+
**Optional CLI commands for installers**
47+
48+
49+
### Windows
50+
You can also apply manual proxy settings using CLI commands:
51+
52+
Example:
53+
54+
msiexec.exe /i "C:\Work\Tools\EPPClientSetup.5.7.1.5_x86_64.msi" /q REBOOT=ReallySuppress
55+
RUNNOTIFIER=0 /log "C:\Windows\TEMP\epp-upgrade.log" WSIP="192.168.18.125"  WSPORT="8080" 
56+
DEPT_CODE="defdep"  PROXYIP="127.0.0.1" PROXYPORT="80" AUTHUSR="user_name" AUTHPASS="password"
57+
58+
Where:
59+
60+
- PROXY_IP – IP of the proxy
61+
- PROXY_PORT – Port of the proxy
62+
- AUTHUSR – Username (if authentication for proxy is needed)
63+
- AUTHPASS – Password (if authentication for proxy is needed)
64+
65+
You can also use CLI Commands below to install Endpoint Protector Client in specific mode of working.
66+
67+
- WSIP – server address
68+
- WSPORT – server port number
69+
- DEPT_CODE – department code
70+
- IPV6MAPPING – IPV6 Mapping IPv4 addresses
71+
- SUPPRESSRD – suppress FileRead/FileDelete events for NS and Removable devices
72+
- DISABLECAP – disabling loading of CAP drivers (CAP will not work)
73+
74+
:::note
75+
Starting with the 2511 Clients release, the install parameters "IPV6MAPPING," "SUPPRESSRD," and "DISABLECAP" will persist during the EPP Client upgrade process.
76+
:::
77+
78+
### macOS
79+
:::note
80+
For macOS, please contact the Netwrix Support team to obtain the latest version of the
81+
installer script, which allows customization of installation parameters.
82+
:::
83+
84+
85+
### Linux
86+
87+
For Linux, you can only use CLI arguments in the options to bypass proxy settings.sh file. To do so,
88+
follow these steps:
89+
90+
**Step 1 –** Access the installation folder, open a Terminal, and run the following command:
91+
92+
`cd pathToLinuxClientFolder`
93+
94+
**Step 2 –** To run commands as root, run the following command and type your password.
95+
96+
`sudo su`
97+
98+
**Step 3 –** Open the options.sh configuration file with the following command:
99+
100+
`gedit options.sh`
101+
102+
**Step 4 –** In the configuration file, you will view the following fields for the proxy setup:
103+
104+
#EPPCLIENT_HTTPS_PROXY=
105+
106+
#export EPPCLIENT_HTTPS_PROXY
107+
108+
**Step 5 –** Remove the # before each entry to apply the proxy setups.
109+
110+
**Step 6 –** For the first proxy setup, EPPCLIENT_HTTPS_PROXY, add the proxy server information in
111+
the address:port:user:password format.
112+
113+
**Example: EPPCLIENT_HTTPS_PROXY=address:port:user:password**
114+
115+
**Step 7 –** Save the changes, and then run the installation without having a VPN connection:
116+
117+
`bash install.sh`
118+
119+
Additional CLI commands for Linux in specific mode:
120+
121+
- #EPPCLIENT_SUPRESSRW - suppress FileRead/FileDelete events for NS and Removable devices
122+
- #EPPCLIENT_DISABLECAP - disabling loading of CAP drivers (CAP will not work)
123+
124+
## Bypass Proxy Settings
125+
126+
You have the ability to bypass proxy settings for all operating systems.
127+
128+
#### Windows and macOS
129+
130+
**Endpoint Protector Wizard Installer**
131+
132+
Select the option to **Use Manual Proxy Settings** from the Endpoint Protector Wizard installer and
133+
then provide the following information:
134+
135+
- Proxy IP – IP of the proxy server
136+
- Proxy Port – Port of the proxy
137+
- Select the Use authentication checkbox
138+
- Username – add proxy server username
139+
- Password – add proxy server password
140+
33141
## Agent Installation
34142

35143
For Windows and Mac, your input in installing the Endpoint Protector Agent is minimal. The
@@ -147,6 +255,7 @@ macOS, you may still see EPPNotifier in the Notification settings. To remove i
147255
right-click and select "Reset notifications."
148256
:::
149257

258+
For more information about Deep Packet Inspection and configurable options, please visit the dedicated [documentation section for DPI](/docs/endpointprotector/admin/cap_module/deeppacket.md).
150259

151260
### Debian Based Distributions
152261

18.5 KB
Loading

docs/endpointprotector/admin/ee_module/eemodule.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,17 @@ Enforced Encryption works on read-only mode if the device was formatted on Windo
3636
Encryption configured on Windows or some files were encrypted on Windows. On macOS, these files can be
3737
decrypted, except for NTFS due to incompatibility with Enforced Encryption.
3838

39+
40+
## Enforced Encryption 140-3 FIPS Validated Engine
41+
3942
:::note
4043
Starting with Netwrix Enforced Encryption version 3.0.0.2 (5.9.4.2 release), a new encryption engine has been introduced, replacing the previous 256-bit AES CBC-mode encryption with FIPS 140-3 validated cryptography. This FIPS 140-3 validated encryption provides the highest standards of data protection, ensuring compliance with the latest industry regulations. While the new encryption engine is fully backward compatible for existing users, allowing for a seamless upgrade and continued use of previously encrypted drives, USB sticks encrypted with the FIPS 140-3 validated engine will not be compatible with older Enforced Encryption Clients. Therefore, we recommend updating EE Clients to ensure compatibility.
4144
:::
4245

46+
To verify the version of the 140-3 FIPS validated engine and view certification details, check the "About" section in the Enforced Encryption application.
47+
48+
![Enforced Encryption FIPS engine details](eeaboutfips.webp)
49+
4350
## Enforced Encryption Deployment
4451

4552
Enforced Encryption is supported for both Mac and Windows computers.

docs/endpointprotector/admin/systemconfiguration/overview.md

Lines changed: 1 addition & 103 deletions
Original file line numberDiff line numberDiff line change
@@ -128,123 +128,21 @@ configuration file.
128128
Only the latest Endpoint Protector and Enforced Encryption Clients are available for download.
129129
:::
130130
131-
To improve the Endpoint Protector installation process, use the Endpoint Protector tool that allows
132-
you to run installation-related actions, identify your current Linux distribution, and view Endpoint
133-
Protector Release Notes.
134-
135-
Use the following commands:
136-
137-
- i - install
138-
- u - uninstall
139-
- rn - release notes
140-
- l - distribution list
141-
142131
When installing, you can simply click Generate to download a client with the configuration in the UI or
143132
copy the following details from this screen using the Copy button:
144133
145134
- Endpoint Protector Server IP
146135
- Endpoint Protector Server port
147136
- Deprtment Code
148137
149-
:::note
150-
Contact Customer Support to provide the tool as well as assistance.
151-
:::
152-
153138
154139
![Download and install the Endpoint Protector Client corresponding to your operating system](ClientSoftwarePage.png)
155140
156141
:::note
157142
Starting with the current release - 2509.0.1.0 - Endpoint Protector Client versions are displayed in the format XXXX.X.X.X on endpoints.
158143
:::
159144
160-
161-
### Bypass Proxy Settings
162-
163-
You have the ability to bypass proxy settings for all operating systems.
164-
165-
#### Windows and macOS
166-
167-
**Endpoint Protector Wizard Installer**
168-
169-
Select the option to **Use Manual Proxy Settings** from the Endpoint Protector Wizard installer and
170-
then provide the following information:
171-
172-
- Proxy IP – IP of the proxy server
173-
- Proxy Port – Port of the proxy
174-
- Select the Use authentication checkbox
175-
- Username – add proxy server username
176-
- Password – add proxy server password
177-
178-
**CLI commands**
179-
180-
You can also apply manual proxy settings using CLI commands:
181-
182-
Example:
183-
184-
msiexec.exe /i "C:\Work\Tools\EPPClientSetup.5.7.1.5_x86_64.msi" /q REBOOT=ReallySuppress
185-
RUNNOTIFIER=0 /log "C:\Windows\TEMP\epp-upgrade.log" WSIP="192.168.18.125"  WSPORT="8080" 
186-
DEPT_CODE="defdep"  PROXYIP="127.0.0.1" PROXYPORT="80" AUTHUSR="user_name" AUTHPASS="password"
187-
188-
Where:
189-
190-
- PROXY_IP – IP of the proxy
191-
- PROXY_PORT – Port of the proxy
192-
- AUTHUSR – Username (if authentication for proxy is needed)
193-
- AUTHPASS – Password (if authentication for proxy is needed)
194-
195-
You can also use CLI Commands below to install Endpoint Protector Client in specific mode of working.
196-
197-
- WSIP – server address
198-
- WSPORT – server port number
199-
- DEPT_CODE – department code
200-
- IPV6MAPPING – IPV6 Mapping IPv4 addresses
201-
- SUPPRESSRD – suppress FileRead/FileDelete events for NS and Removable devices
202-
- DISABLECAP – disabling loading of CAP drivers (CAP will not work)
203-
204-
:::note
205-
For macOS, please contact the Netwrix Support team to obtain the latest version of the
206-
installer script, which allows customization of installation parameters.
207-
:::
208-
209-
210-
#### Linux
211-
212-
For Linux, you can only use CLI arguments in the options to bypass proxy settings.sh file. To do so,
213-
follow these steps:
214-
215-
**Step 1 –** Access the installation folder, open a Terminal, and run the following command:
216-
217-
`cd pathToLinuxClientFolder`
218-
219-
**Step 2 –** To run commands as root, run the following command and type your password.
220-
221-
`sudo su`
222-
223-
**Step 3 –** Open the options.sh configuration file with the following command:
224-
225-
`gedit options.sh`
226-
227-
**Step 4 –** In the configuration file, you will view the following fields for the proxy setup:
228-
229-
#EPPCLIENT_HTTPS_PROXY=
230-
231-
#export EPPCLIENT_HTTPS_PROXY
232-
233-
**Step 5 –** Remove the # before each entry to apply the proxy setups.
234-
235-
**Step 6 –** For the first proxy setup, EPPCLIENT_HTTPS_PROXY, add the proxy server information in
236-
the address:port:user:password format.
237-
238-
**Example: EPPCLIENT_HTTPS_PROXY=address:port:user:password**
239-
240-
**Step 7 –** Save the changes, and then run the installation without having a VPN connection:
241-
242-
`bash install.sh`
243-
244-
Additional CLI commands for Linux in specific mode:
245-
246-
- #EPPCLIENT_SUPRESSRW - suppress FileRead/FileDelete events for NS and Removable devices
247-
- #EPPCLIENT_DISABLECAP - disabling loading of CAP drivers (CAP will not work)
145+
For more client install options, please refer to the dedicated article on [Agent Installation Options](/docs/endpointprotector/admin/agent.md)
248146
249147
## Client Software Upgrade
250148

0 commit comments

Comments
 (0)