You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/endpointprotector/5.9.4.2/admin/appliance.md
+61-16Lines changed: 61 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,10 @@ In this section you can set a preferential time zone and/or sync the appliance t
30
30
- How often to synchronize – select from the drop-down a time interval when to synchronize of go
31
31
with the default selection
32
32
33
-
**NOTE:** The appliances are prefigured to sync once a week with pool.ntp.org.
33
+
:::note
34
+
The appliances are prefigured to sync once a week with pool.ntp.org.
35
+
:::
36
+
34
37
35
38
- Current server time – the field displays the current server time
36
39
- Automatic NTP Synchronization – opt in or out to trigger the NTP synchronization automatically
@@ -46,8 +49,11 @@ In this section you can set a preferential time zone and/or sync the appliance t
46
49
In this section you can change the network settings for the appliance to communicate correctly in
47
50
your network.
48
51
49
-
**NOTE:** Once you change the IP address, close and open again the Internet browser and then access
52
+
:::note
53
+
Once you change the IP address, close and open again the Internet browser and then access
50
54
the Endpoint Protector Administration and Reporting Tool with the new IP address.
55
+
:::
56
+
51
57
52
58

53
59
@@ -63,7 +69,10 @@ From this section, you can register and then verify the Endpoint Protector Clien
63
69
signature. The client registration certificate is an additional security measure enabling
64
70
certificate-based authentication.
65
71
66
-
**CAUTION:** The Client Registration Certificate feature is not available for Linux!
72
+
:::warning
73
+
The Client Registration Certificate feature is not available for Linux!
74
+
:::
75
+
67
76
68
77
**Step 1 –** Enable the custom certificate setting and then upload the certificate chain, Root CA and
69
78
Intermediate;
@@ -84,8 +93,11 @@ just for testing the signature (for example the Endpoint Protector Client certi
84
93
**Step 3 –** Click **Save** and allow 2 minutes for the information to be validated. You will view a
85
94
successful message confirming the custom certificate was added and the test certificate is valid.
86
95
87
-
**NOTE:** The client registration authentication certificate and the Endpoint Protector server
96
+
:::note
97
+
The client registration authentication certificate and the Endpoint Protector server
88
98
certificate must be issued by the same CA.
99
+
:::
100
+
89
101
90
102
For this feature to work, there must be cryptographic identities signed by the root CA deployed on
91
103
the endpoints.
@@ -102,16 +114,25 @@ From this section, you can configure Server Certificate Validation, which ensu
102
114
used for all communication requests on Endpoint Protector clients are validated. This feature is
103
115
crucial for maintaining secure communication between various Endpoint Protector products.
104
116
105
-
**NOTE:** All certificate validation statuses will be reported to the Endpoint Protector Server and
117
+
:::note
118
+
All certificate validation statuses will be reported to the Endpoint Protector Server and
106
119
stored for debugging purposes in Endpoint Protector Client logs.
120
+
:::
107
121
108
-
**CAUTION:** Please use this feature responsibly, as improper certificate usage with certification
122
+
123
+
:::warning
124
+
Please use this feature responsibly, as improper certificate usage with certification
109
125
validation might disrupt Endpoint Protector Client to Endpoint Protector Server communication. For a
110
126
successful connection, both server and client certificate validation must be enabled.
127
+
:::
128
+
111
129
112
-
**NOTE:** Starting from the 5.9.0 or later, enabling this option activates Endpoint Protector Server
130
+
:::note
131
+
Starting from the 5.9.0 or later, enabling this option activates Endpoint Protector Server
113
132
Certificate Validation for all Endpoint Protector Client communication. This strengthens security by
114
133
ensuring trusted and valid certificates are used.
134
+
:::
135
+
115
136
116
137
### Appliance Operations
117
138
@@ -123,7 +144,10 @@ In this section you can perform appliance operations such as Reboot or Shutdown.
123
144
124
145
In this section you can manage user access to the Appliance through the SSH protocol.
125
146
126
-
**_RECOMMENDED:_** Set this option to **Enable** before requesting Support access.
147
+
:::info
148
+
Set this option to **Enable** before requesting Support access.
149
+
:::
150
+
127
151
128
152

129
153
@@ -136,7 +160,10 @@ enables Endpoint Protector to transfer activity events to a SIEM server for anal
136
160
In this section, you can add, edit or delete an existing SIEM Server integration. To edit or delete
137
161
a SIEM Server you need to select an available SIEM server integration.
138
162
139
-
**CAUTION:** You can configure a maximum number of 4 SIEM Server integrations.
163
+
:::warning
164
+
You can configure a maximum number of 4 SIEM Server integrations.
165
+
:::
166
+
140
167
141
168

142
169
@@ -145,39 +172,54 @@ To create a SIEM Server, click **Add New** and provide the following information
145
172
- SIEM Status – toggle switch to enable/disable the SIEM server
146
173
- Disable Logging – toggle switch to enable/disable logging
147
174
148
-
**NOTE:** If you disable logging, logs will be stored on the Endpoint Protector server or on the
175
+
:::note
176
+
If you disable logging, logs will be stored on the Endpoint Protector server or on the
149
177
SIEM server when SIEM is installed.
178
+
:::
179
+
150
180
151
181
- Server Name – add a server name
152
182
- Server Description – add a description
153
183
- Server IP or DNS – add the IP or DNS
154
184
- Server Protocol – select the UDP or TCP server protocol
155
185
156
-
**NOTE:** Based on the protocol you select you can enable [SIEM Encryption](#siem-encryption).
186
+
:::note
187
+
Based on the protocol you select you can enable [SIEM Encryption](#siem-encryption).
188
+
:::
189
+
157
190
158
191
- Server Port – add a port
159
192
- Exclude Headers - toggle switch to enable/disable log headers
160
193
161
-
**NOTE:** If you disable log headers, you will only export data to SIEM.
194
+
:::note
195
+
If you disable log headers, you will only export data to SIEM.
196
+
:::
197
+
162
198
163
199
- Log Types – select from the available options the logs to send to the SIEM Server
164
200
165
201

166
202
167
-
**CAUTION:** Please be aware that the SIEM integration feature in Endpoint Protector comes with
203
+
:::warning
204
+
Please be aware that the SIEM integration feature in Endpoint Protector comes with
168
205
certain limitations. To make use of the latest features of this SIEM integration, your environment
169
206
must meet specific criteria. It should have been installed from image version 5.6.0.0 or a more
170
207
recent version, and maintain an active HTTPS connection. Please note that SIEM integration is only
171
208
accessible in environments that meet these stringent prerequisites.
209
+
:::
210
+
172
211
173
212
### SIEM Encryption
174
213
175
214
When using the TCP protocol, you have the option to encrypt communication to each SIEM server. In
176
215
order to do so, enable the Encryption setting and then Upload the root CA that was used to sign the
177
216
server certificate for the SIEM server in .pem format.
178
217
179
-
**CAUTION:** The certificate used on the SIEM server must be signed by the same CA as the one
218
+
:::warning
219
+
The certificate used on the SIEM server must be signed by the same CA as the one
180
220
uploaded to the Endpoint Protector Server.
221
+
:::
222
+
181
223
182
224
Endpoint Protector will check the following:
183
225
@@ -189,8 +231,11 @@ certificate; if any certificate of the chain is invalid, the connection will b
189
231
190
232
Make sure you update the certificate files when they expire.
191
233
192
-
**NOTE:** If you applied the latest patch using the option, and cannot view the SIEM encryption
234
+
:::note
235
+
If you applied the latest patch using the option, and cannot view the SIEM encryption
193
236
setting, please contact Customer Support.
237
+
:::
238
+
194
239
195
240
### SIEM Export log formats
196
241
@@ -325,7 +370,7 @@ The standard format for the E-Discovery fields is as follows:
325
370
326
371
#### Other SIEM Logs
327
372
328
-
User Login/User Logout
373
+
**User Login/User Logout**
329
374
330
375
The standard format for the Other SIEM Logs fields is as follows:
**CAUTION:** Endpoint Protector cannot scan encrypted files or applications that use encryption to
20
+
:::warning
21
+
Endpoint Protector cannot scan encrypted files or applications that use encryption to
21
22
secure communication.
23
+
:::
24
+
22
25
23
26
To prevent sensitive data leakage, Endpoint Protector closely monitors all activity at various exit
24
27
points:
@@ -39,13 +42,19 @@ Content Aware Protection comes as the second level of data protection available
39
42
Protector. The module is displayed but requires a simple activation by pressing the Enable button.
40
43
If not previously provided, the contact details of the Main Administrator will be required.
41
44
42
-
**NOTE:** Any details provided will only be used to ensure the Live Update Server is configured
45
+
:::note
46
+
Any details provided will only be used to ensure the Live Update Server is configured
43
47
correctly and that the Content Aware Protection module was enabled successfully.
48
+
:::
49
+
44
50
45
51

46
52
47
-
**NOTE:** The Content Aware Protection module is separate from Device Control or eDiscovery modules,
53
+
:::note
54
+
The Content Aware Protection module is separate from Device Control or eDiscovery modules,
0 commit comments