Skip to content

Commit 8f6160c

Browse files
authored
Merge pull request #103 from netwrix/G/EPP/5.9.4.2/imagescheck
G/epp/5.9.4.2/imagescheck - Final reorg PR
2 parents c91f7d0 + 5fe1c95 commit 8f6160c

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+1510
-641
lines changed

docs/endpointprotector/5.9.4.2/admin/agent.md

Lines changed: 24 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,25 +13,37 @@ You can download the Endpoint Protector Agent directly from the Endpoint Protect
1313
information about downloading the Endpoint Protector Agent, refer to the
1414
[Client Software](/docs/endpointprotector/5.9.4.2/admin/systemconfiguration/overview.md#client-software) topic.
1515

16-
**NOTE:** You can use tools like Active Directory or JAMF to deploy the Endpoint Protector Agent in
16+
:::note
17+
You can use tools like Active Directory or JAMF to deploy the Endpoint Protector Agent in
1718
large networks.
19+
:::
1820

19-
**NOTE:** Starting with Endpoint Protector Server version 5.8.0.0, an additional security feature is
21+
22+
:::note
23+
Starting with Endpoint Protector Server version 5.8.0.0, an additional security feature is
2024
available to protect the integrity of the Agent. This feature, accessible via Device Control on the
2125
Global Settings page, is known as the Tamper Mode setting. It is designed to prevent unauthorized
2226
termination or modification of the Endpoint Protector Agent.
27+
:::
28+
2329

2430
## Agent Installation
2531

2632
For Windows and Mac, your input in installing the Endpoint Protector Agent is minimal. The
2733
Installation folder and Server information are already pre-configured, and downloadable from the
2834
Endpoint Protector Server.
2935

30-
**NOTE:** For Linux installation instructions, read the readmeLinux.txt file available under the Read
36+
:::note
37+
For Linux installation instructions, read the readmeLinux.txt file available under the Read
3138
this before installing link.
39+
:::
40+
3241

33-
**NOTE:** You can also install the Agent from a repository for Endpoint Protector Linux Agents
42+
:::note
43+
You can also install the Agent from a repository for Endpoint Protector Linux Agents
3444
starting with version 1.4.0.4., as described in the topic below.
45+
:::
46+
3547

3648
The following are several examples of supported distributions:
3749

@@ -124,11 +136,14 @@ and **allow** the Endpoint Protector Client Extension.
124136

125137
At this point, the macOS Endpoint Protector Client installation is completed.
126138

127-
**NOTE:** If EPPNotifier is not visible or notifications do not display after the installation or
139+
:::note
140+
If EPPNotifier is not visible or notifications do not display after the installation or
128141
upgrade of the Endpoint Protector Client on macOS, please resolve this issue by restarting your
129142
machine. In situations where the Endpoint Protector Client is installed and then uninstalled on
130143
macOS, you may still see EPPNotifier in the Notification settings. To remove it from the list, simply
131144
right-click and select "Reset notifications."
145+
:::
146+
132147

133148
### Debian Based Distributions
134149

@@ -210,5 +225,8 @@ This could be:
210225
- `wsl.exe --help` – This entry will target the specific command `wsl.exe --help`.
211226
- `wsl --list`– This entry will target the `wsl --list` command.
212227

213-
**NOTE:** Endpoint Protector Client cannot directly control the usage of WSL Bash command-line tools
228+
:::note
229+
Endpoint Protector Client cannot directly control the usage of WSL Bash command-line tools
214230
on Windows.
231+
232+
:::

docs/endpointprotector/5.9.4.2/admin/alerts.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,12 @@ sidebar_position: 100
99
From this section, you can define E-mail Alerts for the main events detected by Endpoint Protector:
1010
System Alerts, Device Control Alerts, Content Aware Alerts, and Enforced Encryption Alerts.
1111

12-
**NOTE:** Before creating alerts, make sure the Endpoint Protector E-mail Server Settings have been
12+
:::note
13+
Before creating alerts, make sure the Endpoint Protector E-mail Server Settings have been
1314
configured from the System Configuration, System Settings section. You also have the option to verify
1415
these settings by sending a test E-mail.
16+
:::
17+
1518

1619
For each Administrator to appear in the list of recipients for the Alerts, this has to be provided
1720
under the Administrator details from the System Configuration, System Administrators section.
@@ -35,8 +38,11 @@ Follow the steps to add a new Alert.
3538
- Updates and Support – set an alert regarding each module’s maintenance status (Device Control,
3639
Content Aware Protection, and eDiscovery)
3740

38-
**NOTE:** You can disable the Update and Support system alert from General Dashboard, System
41+
:::note
42+
You can disable the Update and Support system alert from General Dashboard, System
3943
Status.
44+
:::
45+
4046

4147
- Endpoint Licenses – set an alert to be notified of the percentage of used Endpoint Licenses and
4248
eliminate the risks of having unprotected endpoints as each network is constantly growing. Define
@@ -136,8 +142,11 @@ Follow the steps to create a content aware alert.
136142

137143
The alert sent on the email will also include a CSV file with a report of the threats found.
138144

139-
**NOTE:** Before creating the alert, ensure the selected Content Aware Policy is enabled on the
145+
:::note
146+
Before creating the alert, ensure the selected Content Aware Policy is enabled on the
140147
chosen Computer, User, Group, or Department.
148+
:::
149+
141150

142151
![Creating a Content Aware Alert](/img/product_docs/endpointprotector/5.9.4.2/admin/alerts/creatingcontentawarealertinfo.webp)
143152

docs/endpointprotector/5.9.4.2/admin/appliance.md

Lines changed: 61 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,10 @@ In this section you can set a preferential time zone and/or sync the appliance t
3030
- How often to synchronize – select from the drop-down a time interval when to synchronize of go
3131
with the default selection
3232

33-
**NOTE:** The appliances are prefigured to sync once a week with pool.ntp.org.
33+
:::note
34+
The appliances are prefigured to sync once a week with pool.ntp.org.
35+
:::
36+
3437

3538
- Current server time – the field displays the current server time
3639
- Automatic NTP Synchronization – opt in or out to trigger the NTP synchronization automatically
@@ -46,8 +49,11 @@ In this section you can set a preferential time zone and/or sync the appliance t
4649
In this section you can change the network settings for the appliance to communicate correctly in
4750
your network.
4851

49-
**NOTE:** Once you change the IP address, close and open again the Internet browser and then access
52+
:::note
53+
Once you change the IP address, close and open again the Internet browser and then access
5054
the Endpoint Protector Administration and Reporting Tool with the new IP address.
55+
:::
56+
5157

5258
![ Change the network settings for the appliance to communicate correctly in your network](/img/product_docs/endpointprotector/5.9.4.2/admin/appliance/ipconfg.webp)
5359

@@ -63,7 +69,10 @@ From this section, you can register and then verify the Endpoint Protector Clien
6369
signature. The client registration certificate is an additional security measure enabling
6470
certificate-based authentication.
6571

66-
**CAUTION:** The Client Registration Certificate feature is not available for Linux!
72+
:::warning
73+
The Client Registration Certificate feature is not available for Linux!
74+
:::
75+
6776

6877
**Step 1 –** Enable the custom certificate setting and then upload the certificate chain, Root CA and
6978
Intermediate;
@@ -84,8 +93,11 @@ just for testing the signature (for example the Endpoint Protector Client certi
8493
**Step 3 –** Click **Save** and allow 2 minutes for the information to be validated. You will view a
8594
successful message confirming the custom certificate was added and the test certificate is valid.
8695

87-
**NOTE:** The client registration authentication certificate and the Endpoint Protector server
96+
:::note
97+
The client registration authentication certificate and the Endpoint Protector server
8898
certificate must be issued by the same CA.
99+
:::
100+
89101

90102
For this feature to work, there must be cryptographic identities signed by the root CA deployed on
91103
the endpoints.
@@ -102,16 +114,25 @@ From this section, you can configure Server Certificate Validation, which ensu
102114
used for all communication requests on Endpoint Protector clients are validated. This feature is
103115
crucial for maintaining secure communication between various Endpoint Protector products.
104116

105-
**NOTE:** All certificate validation statuses will be reported to the Endpoint Protector Server and
117+
:::note
118+
All certificate validation statuses will be reported to the Endpoint Protector Server and
106119
stored for debugging purposes in Endpoint Protector Client logs.
120+
:::
107121

108-
**CAUTION:** Please use this feature responsibly, as improper certificate usage with certification
122+
123+
:::warning
124+
Please use this feature responsibly, as improper certificate usage with certification
109125
validation might disrupt Endpoint Protector Client to Endpoint Protector Server communication. For a
110126
successful connection, both server and client certificate validation must be enabled.
127+
:::
128+
111129

112-
**NOTE:** Starting from the 5.9.0 or later, enabling this option activates Endpoint Protector Server
130+
:::note
131+
Starting from the 5.9.0 or later, enabling this option activates Endpoint Protector Server
113132
Certificate Validation for all Endpoint Protector Client communication. This strengthens security by
114133
ensuring trusted and valid certificates are used.
134+
:::
135+
115136

116137
### Appliance Operations
117138

@@ -123,7 +144,10 @@ In this section you can perform appliance operations such as Reboot or Shutdown.
123144

124145
In this section you can manage user access to the Appliance through the SSH protocol.
125146

126-
**_RECOMMENDED:_** Set this option to **Enable** before requesting Support access.
147+
:::info
148+
Set this option to **Enable** before requesting Support access.
149+
:::
150+
127151

128152
![Manage user access to the Appliance through the SSH protocol](/img/product_docs/endpointprotector/5.9.4.2/admin/appliance/sshserver.webp)
129153

@@ -136,7 +160,10 @@ enables Endpoint Protector to transfer activity events to a SIEM server for anal
136160
In this section, you can add, edit or delete an existing SIEM Server integration. To edit or delete
137161
a SIEM Server you need to select an available SIEM server integration.
138162

139-
**CAUTION:** You can configure a maximum number of 4 SIEM Server integrations.
163+
:::warning
164+
You can configure a maximum number of 4 SIEM Server integrations.
165+
:::
166+
140167

141168
![Add, edit or delete an existing SIEM Server integration](/img/product_docs/endpointprotector/5.9.4.2/admin/appliance/siemserverintegration.webp)
142169

@@ -145,39 +172,54 @@ To create a SIEM Server, click **Add New** and provide the following information
145172
- SIEM Status – toggle switch to enable/disable the SIEM server
146173
- Disable Logging – toggle switch to enable/disable logging
147174

148-
**NOTE:** If you disable logging, logs will be stored on the Endpoint Protector server or on the
175+
:::note
176+
If you disable logging, logs will be stored on the Endpoint Protector server or on the
149177
SIEM server when SIEM is installed.
178+
:::
179+
150180

151181
- Server Name – add a server name
152182
- Server Description – add a description
153183
- Server IP or DNS – add the IP or DNS
154184
- Server Protocol – select the UDP or TCP server protocol
155185

156-
**NOTE:** Based on the protocol you select you can enable [SIEM Encryption](#siem-encryption).
186+
:::note
187+
Based on the protocol you select you can enable [SIEM Encryption](#siem-encryption).
188+
:::
189+
157190

158191
- Server Port – add a port
159192
- Exclude Headers - toggle switch to enable/disable log headers
160193

161-
**NOTE:** If you disable log headers, you will only export data to SIEM.
194+
:::note
195+
If you disable log headers, you will only export data to SIEM.
196+
:::
197+
162198

163199
- Log Types – select from the available options the logs to send to the SIEM Server
164200

165201
![SIEM Intergration - Adding a New Server](/img/product_docs/endpointprotector/5.9.4.2/admin/appliance/siemintegrationnewserver.webp)
166202

167-
**CAUTION:** Please be aware that the SIEM integration feature in Endpoint Protector comes with
203+
:::warning
204+
Please be aware that the SIEM integration feature in Endpoint Protector comes with
168205
certain limitations. To make use of the latest features of this SIEM integration, your environment
169206
must meet specific criteria. It should have been installed from image version 5.6.0.0 or a more
170207
recent version, and maintain an active HTTPS connection. Please note that SIEM integration is only
171208
accessible in environments that meet these stringent prerequisites.
209+
:::
210+
172211

173212
### SIEM Encryption
174213

175214
When using the TCP protocol, you have the option to encrypt communication to each SIEM server. In
176215
order to do so, enable the Encryption setting and then Upload the root CA that was used to sign the
177216
server certificate for the SIEM server in .pem format.
178217

179-
**CAUTION:** The certificate used on the SIEM server must be signed by the same CA as the one
218+
:::warning
219+
The certificate used on the SIEM server must be signed by the same CA as the one
180220
uploaded to the Endpoint Protector Server.
221+
:::
222+
181223

182224
Endpoint Protector will check the following:
183225

@@ -189,8 +231,11 @@ certificate; if any certificate of the chain is invalid, the connection will b
189231

190232
Make sure you update the certificate files when they expire.
191233

192-
**NOTE:** If you applied the latest patch using the option, and cannot view the SIEM encryption
234+
:::note
235+
If you applied the latest patch using the option, and cannot view the SIEM encryption
193236
setting, please contact Customer Support.
237+
:::
238+
194239

195240
### SIEM Export log formats
196241

@@ -325,7 +370,7 @@ The standard format for the E-Discovery fields is as follows:
325370

326371
#### Other SIEM Logs
327372

328-
User Login/User Logout
373+
**User Login/User Logout**
329374

330375
The standard format for the Other SIEM Logs fields is as follows:
331376

docs/endpointprotector/5.9.4.2/admin/cap_module/capmodule.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,11 @@ accidental or intentional file transfers of sensitive company data, such as:
1717
- Confidential files: sales and marketing reports, technical documents, accounting documents, customer
1818
databases, etc.
1919

20-
**CAUTION:** Endpoint Protector cannot scan encrypted files or applications that use encryption to
20+
:::warning
21+
Endpoint Protector cannot scan encrypted files or applications that use encryption to
2122
secure communication.
23+
:::
24+
2225

2326
To prevent sensitive data leakage, Endpoint Protector closely monitors all activity at various exit
2427
points:
@@ -39,13 +42,19 @@ Content Aware Protection comes as the second level of data protection available
3942
Protector. The module is displayed but requires a simple activation by pressing the Enable button.
4043
If not previously provided, the contact details of the Main Administrator will be required.
4144

42-
**NOTE:** Any details provided will only be used to ensure the Live Update Server is configured
45+
:::note
46+
Any details provided will only be used to ensure the Live Update Server is configured
4347
correctly and that the Content Aware Protection module was enabled successfully.
48+
:::
49+
4450

4551
![The module is displayed but requires a simple activation by pressing the Enable button](/img/product_docs/endpointprotector/5.9.4.2/admin/contentawareprotection/activation.webp)
4652

47-
**NOTE:** The Content Aware Protection module is separate from Device Control or eDiscovery modules,
53+
:::note
54+
The Content Aware Protection module is separate from Device Control or eDiscovery modules,
4855
and requires separate licensing.
56+
:::
57+
4958

5059
## Dashboard
5160

0 commit comments

Comments
 (0)