Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- AD Authentication
- Endpoint Protector
sidebar_label: AD Admin Login Issues
tags: []
tags:
- administration-security-and-monitoring
title: "AD Admins Not Able to Log In"
knowledge_article_id: kA0Qk0000002B31KAE
products:
Expand All @@ -25,4 +26,4 @@ This article explains how to resolve issues where Active Directory (AD) administ

2. Navigate to **System Configuration** > **System Security** to ensure they match the configuration shown below.

![Password settings in System Security section of Endpoint Protector](./images/servlet_image_40736f16d061.png)
![Password settings in System Security section of Endpoint Protector](./../0-images/servlet_image_40736f16d061.png)
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,8 @@ keywords:
products:
- endpoint-protector
sidebar_label: Configure Session Timeout in the Administration In
tags: []
tags:
- administration-security-and-monitoring
title: "Configure Session Timeout in the Administration Interface"
knowledge_article_id: kA0Qk0000002B7WKAU
---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,8 @@ keywords:
products:
- endpoint-protector
sidebar_label: Configure Session Timeout Settings for the Adminis
tags: []
tags:
- administration-security-and-monitoring
title: "Configure Session Timeout Settings for the Administration Interface"
knowledge_article_id: kA0Qk0000002BDxKAM
---
Expand All @@ -29,7 +30,7 @@ Netwrix Endpoint Protector Server includes a session timeout feature for the Adm
## Instructions

1. Go to **System Configuration** > **System Settings** > **Session Settings** in the Netwrix Endpoint Protector Management Console.
![Session Settings in System Configuration of Endpoint Protector](./images/ka0Qk000000ESnd_0EMQk00000C7Bfn.png)
![Session Settings in System Configuration of Endpoint Protector](./../0-images/ka0Qk000000ESnd_0EMQk00000C7Bfn.png)

2. Modify the session timeout settings as needed:
- **Session Timeout**: Set the amount of time (between `5` and `60` minutes) a user can be inactive before the session expires.
Expand All @@ -38,4 +39,4 @@ Netwrix Endpoint Protector Server includes a session timeout feature for the Adm
> **NOTE:** If **Session Timeout** is set to `5` minutes and **Timeout Counter** is set to `60` seconds, after `4` minutes of inactivity a pop-up window will notify you that you will be logged out in `60` seconds.

3. If no activity occurs during the countdown, Netwrix Endpoint Protector displays a message indicating the session will expire. You can choose to log out or continue your session, which resets the session timeout interval.
![Session expiration warning in Endpoint Protector Management Console](./images/ka0Qk000000ESnd_0EMQk00000C7LTp.png)
![Session expiration warning in Endpoint Protector Management Console](./../0-images/ka0Qk000000ESnd_0EMQk00000C7LTp.png)
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- Google Authenticator
- Endpoint Protector
sidebar_label: Enable 2FA for System Admins
tags: []
tags:
- administration-security-and-monitoring
title: "Enable Two-Factor Authentication for System Admins with Google Authenticator App"
knowledge_article_id: kA0Qk0000002B34KAE
products:
Expand All @@ -24,7 +25,7 @@ This article explains how to enable two-factor authentication (2FA) for system a
1. Navigate to **System Configuration > System Administrators** in Endpoint Protector.
2. Find the system administrator and toggle the switch labeled **Two Factor Authenticator** to **On**.

![Two Factor Authenticator toggle for system administrator in Endpoint Protector](./images/servlet_image_618265510504.png)
![Two Factor Authenticator toggle for system administrator in Endpoint Protector](./../0-images/servlet_image_618265510504.png)

3. Scan the **QR Code** with the **Google Authenticator app** or enter the provided code into the app to configure the authenticator app.
4. Enter the authentication code from the app into the **Google 2FA Validation** field in Endpoint Protector after importing the account.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,8 @@ keywords:
products:
- endpoint-protector
sidebar_label: 'Error: Computers Displayed as "Unlicensed" Under List of Computers'
tags: []
tags:
- administration-security-and-monitoring
title: 'Error: Computers Displayed as "Unlicensed" Under List of Computers'
knowledge_article_id: kA0Qk0000002B6HKAU
---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,8 @@ keywords:
products:
- endpoint-protector
sidebar_label: Export Event Logs from Reports and Analysis
tags: []
tags:
- administration-security-and-monitoring
title: "Export Event Logs from Reports and Analysis"
knowledge_article_id: kA0Qk0000002B13KAE
---
Expand All @@ -29,9 +30,9 @@ This article explains how to export selected event logs from the **Reports and A

1. On the Endpoint Protector server, navigate to **Reports and Analysis**.
2. Apply a filter for the desired event logs.
![Applying filter for Blocked events in Reports and Analysis](./images/ka0Qk000000Ea6r_0EMQk00000CAcMt.png)
![Applying filter for Blocked events in Reports and Analysis](./../0-images/ka0Qk000000Ea6r_0EMQk00000CAcMt.png)
3. Click the **Create Export** button at the bottom of the list to generate an export file.
4. Download the generated `.csv` or `.xlsx` file from **View Export List**.
![View Export List in Reports and Analysis](./images/ka0Qk000000Ea6r_0EMQk00000CAkDx.png)
![View Export List in Reports and Analysis](./../0-images/ka0Qk000000Ea6r_0EMQk00000CAkDx.png)
5. Access and review the exported file as needed.
![Example of exported event log file](./images/ka0Qk000000Ea6r_0EMQk00000CAivK.png)
![Example of exported event log file](./../0-images/ka0Qk000000Ea6r_0EMQk00000CAivK.png)
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,8 @@ keywords:
products:
- endpoint-protector
sidebar_label: How to Check the History and Email Status of Alert
tags: []
tags:
- administration-security-and-monitoring
title: "How to Check the History and Email Status of Alerts"
knowledge_article_id: kA0Qk0000002B15KAE
---
Expand All @@ -30,8 +31,8 @@ This article explains how to check the alert history, log details, and the statu

1. Navigate to the desired alert category, such as **System Alerts**, **Device Control Alerts**, **Content Aware Alerts**, or **EasyLock Alerts**.
2. Click **View History** to see the list of generated alerts. The alerts are listed under **Alerts History**. Each alert listed in **Alerts History** is also sent via email.
![Alerts History page showing list of generated alerts](./images/ka0Qk000000Dzth_0EMQk00000CJ9iD.png)
![Alerts History page showing list of generated alerts](./../0-images/ka0Qk000000Dzth_0EMQk00000CJ9iD.png)
3. In the **Actions** column for the desired alert, click the three-line menu, and then click **View**.
![Actions column with View option highlighted](./images/ka0Qk000000Dzth_0EMQk00000CJ1Co.png)
![Actions column with View option highlighted](./../0-images/ka0Qk000000Dzth_0EMQk00000CJ1Co.png)
4. The **Log Details** and **Alert Details** will be displayed, along with the **E-mail Status**. Here, you can see if the email was sent successfully from the Netwrix Endpoint Protector Server.
![Log Details and E-mail Status section showing email delivery status](./images/ka0Qk000000Dzth_0EMQk00000CJA4n.png)
![Log Details and E-mail Status section showing email delivery status](./../0-images/ka0Qk000000Dzth_0EMQk00000CJA4n.png)
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,8 @@ products:
- endpoint-protector
visibility: public
sidebar_label: How to Identify and Remove Duplicate Computers
tags: []
tags:
- administration-security-and-monitoring
title: "How to Identify and Remove Duplicate Computers"
knowledge_article_id: kA0Qk0000002B5xKAE
---
Expand All @@ -31,6 +32,6 @@ This article explains how to identify and remove duplicate computers in Netwrix

1. In the Netwrix Endpoint Protector Console, navigate to the **Device Control** menu and select **Computers**.
2. In the Filters section, select **Duplicates** > **Yes** > **Apply**.
![Filtering for duplicate computers in Netwrix Endpoint Protector](./images/ka0Qk000000ETN7_0EMQk00000C91kL.png)
![Filtering for duplicate computers in Netwrix Endpoint Protector](./../0-images/ka0Qk000000ETN7_0EMQk00000C91kL.png)
3. Review the list of duplicate computers. You can further filter for **Licensed** and **Offline** computers.
4. Delete the unwanted duplicate entries to release the associated licenses.
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,8 @@ keywords:
products:
- endpoint-protector
sidebar_label: How to Set FQDN in Server Certificate Subject
tags: []
tags:
- administration-security-and-monitoring
title: "How to Set FQDN in Server Certificate Subject"
knowledge_article_id: kA0Qk0000002BB7KAM
---
Expand All @@ -40,7 +41,7 @@ Yes, this is possible. Follow these steps to set the FQDN in the server certific
8. A green banner will appear at the top of the screen stating that the server certificate will be regenerated in a few minutes. You will be logged out from the user interface and will need to log in again.
9. Wait a few minutes until the certificate is regenerated.

![Server Certificate Stack configuration page with FQDN field highlighted](./images/ka0Qk000000Dynx_0EMQk00000CKudS.png)
![Server Certificate Stack configuration page with FQDN field highlighted](./../0-images/ka0Qk000000Dynx_0EMQk00000CKudS.png)

### Important Notes

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,8 @@ keywords:
products:
- general
sidebar_label: How to Update Endpoint Protector or Unify Server
tags: []
tags:
- administration-security-and-monitoring
title: "How to Update Endpoint Protector or Unify Server"
knowledge_article_id: kA0Qk0000001EfFKAU
---
Expand All @@ -32,14 +33,14 @@ To find the version of the Netwrix Endpoint Protector server, follow the below s
2. Log in.
3. View the bottom right of the screen to find the version information.

![Netwrix Endpoint Protector version number](./images/ka0Qk0000004M3Z_0EMQk000005fb5Z.png)
![Netwrix Endpoint Protector version number](./../0-images/ka0Qk0000004M3Z_0EMQk000005fb5Z.png)

To find the version of the Unify server, follow the below steps:

1. Log in to the Unify web console.
2. Check the top left for the version information.

![Unify version number](./images/ka0Qk0000004M3Z_0EMQk000005fOGR.png)
![Unify version number](./../0-images/ka0Qk0000004M3Z_0EMQk000005fOGR.png)

## Updating with Live Update

Expand All @@ -53,9 +54,9 @@ To install the latest updates with Live Update, follow the below steps:
4. Check the box on the update(s) to be installed.
5. Select **Apply Updates.**

![How to check Live Update](./images/ka0Qk0000004M3Z_0EMQk000005fTch.png)
![How to check Live Update](./../0-images/ka0Qk0000004M3Z_0EMQk000005fTch.png)

![How to configure Live Update](./images/ka0Qk0000004M3Z_0EMQk000005fbGr.png)
![How to configure Live Update](./../0-images/ka0Qk0000004M3Z_0EMQk000005fbGr.png)

## Updating Using the Offline Patch Uploader

Expand All @@ -71,7 +72,7 @@ To apply an offline update, follow the below steps:
6. Click **Ok.**
7. Wait for the system to apply the update.

![The button to activate offline patching](./images/ka0Qk0000004M3Z_0EMQk000005fbNJ.png)
![The button to activate offline patching](./../0-images/ka0Qk0000004M3Z_0EMQk000005fbNJ.png)

## Verifying an Update Installed

Expand All @@ -82,6 +83,6 @@ To verify an update was applied to the Netwrix Endpoint Protector server, follow
3. Click on **View Applied EPP Software Updates.**
4. Look through the applied updates to see if the update was installed.

![The button to open the view of all updates](./images/ka0Qk0000004M3Z_0EMQk000005fbTl.png)
![The button to open the view of all updates](./../0-images/ka0Qk0000004M3Z_0EMQk000005fbTl.png)

![The list of all updates](./images/ka0Qk0000004M3Z_0EMQk000005fbWz.png)
![The list of all updates](./../0-images/ka0Qk0000004M3Z_0EMQk000005fbWz.png)
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- console access
- login IP restrictions
sidebar_label: Block Specific IP Addresses
tags: []
tags:
- administration-security-and-monitoring
title: "How to Block Specific IP Addresses from Accessing the Console"
knowledge_article_id: kA0Qk0000002B78KAE
products:
Expand All @@ -27,7 +28,7 @@ To block specific IP addresses from accessing the console, configure login IP re
2. Right-click the administrator account you want to restrict and select **Edit**.
3. Turn on **Enforce login IP restrictions**.

![Dialog box for enforcing login IP restrictions with the option enabled](./images/servlet_image_1e592ef62413.png)
![Dialog box for enforcing login IP restrictions with the option enabled](./../0-images/servlet_image_1e592ef62413.png)

4. Enter the IP addresses from which the user is not allowed to log in.
5. Click **Save** to apply the changes.
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,8 @@ keywords:
- devices
- Endpoint Protector
sidebar_label: Exporting Lists
tags: []
tags:
- administration-security-and-monitoring
title: "How to Export the List of Computers, Users, or Devices"
knowledge_article_id: kA0Qk0000002B6lKAE
products:
Expand All @@ -28,7 +29,7 @@ This article explains how to export the list of computers, users, or devices fro
1. Open the Endpoint Protector console and navigate to the **Device Control** section.
2. Select **Computers**, **Users**, or **Devices**.
3. Click **Choose action** and select **Export list of**...
![Export list action in Device Control](./images/servlet_image_df060b1c08ad.png)
![Export list action in Device Control](./../0-images/servlet_image_df060b1c08ad.png)
4. A banner appears at the top of the page indicating where the export file can be found.
5. On the **List of exports** page, navigate to **System Maintenance** > **Exported Entities**.
6. In the **Actions** menu, you can download or delete the exported list.
Expand All @@ -38,7 +39,7 @@ This article explains how to export the list of computers, users, or devices fro
1. Open the Endpoint Protector console and navigate to the **Device Control** section.
2. Select **Computers**, **Users**, or **Devices**.
3. Click **Choose action** and select **Schedule export list**.
![Schedule export action in Device Control](./images/servlet_image_7abe59223977.png)
![Schedule export action in Device Control](./../0-images/servlet_image_7abe59223977.png)
4. Select the **frequency** and **start date** for the export. Click **Schedule**.
5. A banner appears at the top of the page confirming that the export has been scheduled.
6. On the **List of exports** page, navigate to **System Maintenance** > **Exported Entities**.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- display limit
- report searches
sidebar_label: Increase Display Limit
tags: []
tags:
- administration-security-and-monitoring
title: "How to Increase the 200 Entries Display Limitation"
knowledge_article_id: kA0Qk0000002B76KAE
products:
Expand All @@ -26,4 +27,4 @@ To increase the display limit, follow these steps:
1. Log in to the **Endpoint Protector** console.
2. Navigate to **Device Control** > **Global Settings** > **Maximum no. of records returned in a report search**.
3. Increase this limit to your desired amount.
![Maximum number of records returned in a report search setting in Endpoint Protector](./images/servlet_image_1ec78e31c389.png)
![Maximum number of records returned in a report search setting in Endpoint Protector](./../0-images/servlet_image_1ec78e31c389.png)
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- default credentials
- security
sidebar_label: Change Default Credentials
tags: []
tags:
- administration-security-and-monitoring
title: "How to Locate and Change the Default Credentials for the Console"
knowledge_article_id: kA0Qk0000002B6cKAE
products:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- Endpoint Protector
- group management
sidebar_label: Select Multiple Computers and Users
tags: []
tags:
- administration-security-and-monitoring
title: "How to Select Multiple Computers and Users Within Groups"
knowledge_article_id: kA0Qk0000002B6FKAU
products:
Expand All @@ -25,7 +26,7 @@ This article explains how to select multiple computers and users within a group
2. Create a new group or open an existing group in **Edit mode**.
3. To select multiple computers/users, copy and paste the desired list of computers/users in the highlighted box on the right-hand side of the **Group Information** page.

![Paste list of computers into left box for multiselection](./images/servlet_image_b9e7bd968d5d.png)
![Paste list of computers into left box for multiselection](./../0-images/servlet_image_b9e7bd968d5d.png)

4. Click **Select all matched Items** to select all computers listed in the left box.
5. Selected computers are highlighted with blue check marks, and a green notification on the right side of the page shows how many items were matched.
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- administrator synchronization
- AD Authentication
sidebar_label: Set Up AD Administrator Synchronization
tags: []
tags:
- administration-security-and-monitoring
title: "How to Set Up Active Directory Administrator Synchronization"
knowledge_article_id: kA0Qk0000002B77KAE
products:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- Endpoint Protector
- system events
sidebar_label: Set Up E-mail Alerts
tags: []
tags:
- administration-security-and-monitoring
title: "How to Set Up E-mail Alerts"
knowledge_article_id: kA0Qk0000002B6UKAU
products:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- server performance
- storage management
sidebar_label: Set Up External Storage
tags: []
tags:
- administration-security-and-monitoring
title: "How to Set Up External Storage"
knowledge_article_id: kA0Qk0000002B7LKAU
products:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ keywords:
- Gmail
- Endpoint Protector
sidebar_label: Set Up SMTP With Gmail
tags: []
tags:
- administration-security-and-monitoring
title: "How to Set Up SMTP With Gmail"
knowledge_article_id: kA0Qk0000002B4LKAU
products:
Expand Down Expand Up @@ -37,7 +38,7 @@ This article explains how to configure SMTP settings in **Endpoint Protector** t
- **Send test email to my account:** Enabled
- **No-reply email address:** Default

![SMTP configuration for Gmail in Endpoint Protector](./images/servlet_image_e9d389c827d7.png)
![SMTP configuration for Gmail in Endpoint Protector](./../0-images/servlet_image_e9d389c827d7.png)

5. To use a custom no-reply email address, select **Custom** and enter your preferred email address, or leave the default.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,8 @@ keywords:
products:
- endpoint-protector
sidebar_label: Managing System Administrators and Administrator G
tags: []
tags:
- administration-security-and-monitoring
title: "Managing System Administrators and Administrator Groups"
knowledge_article_id: kA0Qk0000002BCTKA2
---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,8 @@ keywords:
products:
- endpoint-protector
sidebar_label: Resetting an Administrator Password
tags: []
tags:
- administration-security-and-monitoring
title: "Resetting an Administrator Password"
knowledge_article_id: kA0Qk0000002B2eKAE
---
Expand All @@ -34,9 +35,9 @@ This article explains how to reset an administrator password on the Netwrix Endp
4. Check **Require password change at next login** to allow the administrator to set a password of their choice upon their next login.
5. Save the modifications.

![Edit administrator password fields in Endpoint Protector](./images/ka0Qk000000EbSj_0EMQk00000CAmm2.png)
![Edit administrator password fields in Endpoint Protector](./../0-images/ka0Qk000000EbSj_0EMQk00000CAmm2.png)

![Require password change at next login option in Endpoint Protector](./images/ka0Qk000000EbSj_0EMQk00000CAaeP.png)
![Require password change at next login option in Endpoint Protector](./../0-images/ka0Qk000000EbSj_0EMQk00000CAaeP.png)

6. If you encounter any issues and are unable to reset the password, create a support ticket via the [Netwrix Support portal](https://www.netwrix.com/support.html) for assistance.
7. If the server is hosted on your end, the support team will contact you to schedule a remote session for resetting the password in the server's backend.
Loading
Loading