Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions docs/endpointprotector/5.9.4.2/admin/cap_module/_category_.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
{
"label": "Content Aware Protection",
"position": 40,
"collapsed": true,
"collapsible": true,
"link": {
"type": "doc",
"id": "capmodule"
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ enable the setting on the specific device from Device Control, Global settings,

- Policy Template – select a custom notification from the drop-down list or create one from System
Parameters, Device Types and Notification,
[Custom Content Aware Protection Notifications](/docs/endpointprotector/5.9.4.2/admin/overview_6.md#custom-content-aware-protection-notifications)
[Custom Content Aware Protection Notifications](/docs/endpointprotector/5.9.4.2/admin/systempar.md)
section
- Policy Status – enable to set policy status to active
- Client Notifications – enable this setting to send notifications to clients
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -242,7 +242,8 @@ To remediate the threat, the user has to follow these steps:
- click **Authorize**

**NOTE:** You can manage more settings for the Self Remediate feature from System Preferences and
[User Remediation](/docs/endpointprotector/5.9.4.2/admin/overview_6.md#user-remediation) sections.
[User Remediation](/docs/endpointprotector/5.9.4.2/admin/systempar.md#user-remediation) sections.
[User Remediation](/docs/endpointprotector/5.9.4.2/admin/systempar.md#user-remediation) sections.

User Remediation for Content Aware Protection can remediate file transfers via web domains.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -282,7 +282,7 @@ application that is subject to this functionality.

**NOTE:** The Deep Packet Inspection functionality needs to be first enabled from **Device
Control** > **Settings** (Global, Groups, Computers, etc.). For detailed information on, refer to
the [Device Control](/docs/endpointprotector/5.9.4.2/admin/module/module.md) topic.
the [Device Control](/docs/endpointprotector/5.9.4.2/admin/dc_module/dcmodule.md) topic.

## Certificate status matrix

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,6 @@
"collapsible": true,
"link": {
"type": "doc",
"id": "module"
"id": "dcmodule"
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ Endpoint Protector Server to another and aims to correlate the device rights and
You can also import the devices directly from Active Directory.

**NOTE:** For detailed information on Active Directory, refer to the
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/overview_4.md) topic.
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/directoryserv.md) topic.

### Priority order

Expand All @@ -50,7 +50,7 @@ set per Device Types (USB Storage Device, Digital Camera, iPod, Thunderbolt, Chi
etc.).

**NOTE:** For detailed information, refer to the
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/overview_4.md) topic.
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/directoryserv.md) topic.

If you configure device rights granularly for all entities, the priority order will be the following,
starting with the highest:
Expand Down Expand Up @@ -128,7 +128,7 @@ You can manually create a new computer at any time by providing the computer par
information mentioned above or import computers from Active Directory.

For more details about Active Directory, go to the
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/overview_4.md) topic. You can also assign the computers to
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/directoryserv.md) topic. You can also assign the computers to
the following for a better organization:

- Devices and Computers e.g., several computers within the same office
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@ levels, depending on the degree of protection offered by a device (trusted devic
Encryption are TD level 1).

For detailed information on Trusted Device™ and Enforced Encryption, refer to the
[Trusted Device™](/docs/endpointprotector/5.9.4.2/admin/module_1.md#trusted-device) topic.
[Trusted Device™](../ee_module/eemodule.md) topic.

**NOTE:** With the WiFi – Block if wired network is present option you can disable the WiFi
connection, while a wired network connection is present. The WiFi connection will be available when
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -124,7 +124,8 @@ the Client’s behavior for each specific entity (Global, Groups, and Computers
**NOTE:** For this setting to work successfully, enable the Minifilter Driver setting.

- User Remediation Pop-up – this setting is available when the
[User Remediation](/docs/endpointprotector/5.9.4.2/admin/overview_6.md#user-remediation) feature is active and enables
[User Remediation](/docs/endpointprotector/5.9.4.2/admin/systempar.md#user-remediation) feature is active and enables
[User Remediation](/docs/endpointprotector/5.9.4.2/admin/systempar.md#user-remediation) feature is active and enables
User Remediation pop-up notifications for end-users.
- Enforce User Remediation Pop-up - this setting is available only if the User Remediation Pop-up
setting is enabled. When this setting is enabled, end-users cannot disable User Remediation Pop-up
Expand Down Expand Up @@ -704,7 +705,7 @@ Users, or Computers.
**CAUTION:** When triggered, fallback policies supersede the standard device rights. Regarding
fallback policies, the Outside Network Policies supersede the Outside Hours Policies.

**NOTE:** For [Content Aware Protection](/docs/endpointprotector/5.9.4.2/admin/module/module_1.md), the Outside Network
**NOTE:** For [Content Aware Protection](/docs/endpointprotector/5.9.4.2/admin/cap_module/capmodule.md), the Outside Network
and Outside Hours Policy Type also needs to be selected.

![Manage Outside Network and Outside Hours Policies, for both Device Control and Content Aware modules](/img/product_docs/endpointprotector/5.9.4.2/admin/devicecontrol/outsidehoursnetwork.webp)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ information mentioned above. Users can also be imported into Endpoint Protector
Directory.

For detailed information on Active Directory, refer to the
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/overview_4.md) chapter.
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/directoryserv.md) chapter.

There are two users created by default during the installation process of Endpoint Protector:

Expand Down Expand Up @@ -96,7 +96,7 @@ You can manually create a new group at any time by providing the group informati
Groups can also be imported into Endpoint Protector from Active Directory.

**NOTE:** For detailed information on Active Directory, refer to the
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/overview_4.md) topic.
[Directory Services](/docs/endpointprotector/5.9.4.2/admin/directoryserv.md) topic.

The Actions column offers multiple options related to the group’s management like Edit, Manage
Rights, Manage Settings, History, and Delete.
Expand Down
10 changes: 10 additions & 0 deletions docs/endpointprotector/5.9.4.2/admin/ed_module/_category_.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
{
"label": "eDiscovery",
"position": 50,
"collapsed": true,
"collapsible": true,
"link": {
"type": "doc",
"id": "edmodule"
}
}
10 changes: 10 additions & 0 deletions docs/endpointprotector/5.9.4.2/admin/ee_module/_category_.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
{
"label": "Enforced Encryption",
"position": 70,
"collapsed": true,
"collapsible": true,
"link": {
"type": "doc",
"id": "eemodule"
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -429,7 +429,7 @@ can add up to a maximum of 10 justifications. By default, several justificatio
but make sure that at least one justification is enabled all the time.

To enable and enforce the end-user to view User Remediation pop-up notifications, manage the option
from Device Control, Global Settings, [Device Control](/docs/endpointprotector/5.9.4.2/admin/module/module.md).
from Device Control, Global Settings, [Device Control](/docs/endpointprotector/5.9.4.2/admin/dc_module/dcmodule.md).

![Justifications List](/img/product_docs/endpointprotector/5.9.4.2/admin/systemparameters/justflist.webp)

Expand All @@ -451,12 +451,12 @@ section, click **Create**, fill in the mandatory fields and **Save**.
![Custom Device Control User Remediation Notifications](/img/product_docs/endpointprotector/5.9.4.2/admin/systemparameters/customdcuserremediationnotif.webp)

**Step 3 –** Enable the **User Remediation Pop-up** setting from the
[Device Control](/docs/endpointprotector/5.9.4.2/admin/module/module.md) topic and then select the **customized notification**
[Device Control](/docs/endpointprotector/5.9.4.2/admin/dc_module/dcmodule.md) topic and then select the **customized notification**
from the User Remediation Notification Template drop-down list;

![User Remediation Pop-up](/img/product_docs/endpointprotector/5.9.4.2/admin/systemparameters/userremediationpopup.webp)

**Step 4 –** Navigate to [Device Control](/docs/endpointprotector/5.9.4.2/admin/module/module.md), Device Types section and
**Step 4 –** Navigate to [Device Control](/docs/endpointprotector/5.9.4.2/admin/dc_module/dcmodule.md), Device Types section and
enable **User Remediation** for devices with limited access – devices that have full access
permission cannot benefit from the User Remediation feature.

Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "Getting Started"
description: "Getting Started"
sidebar_position: 10
sidebar_position: 2
---

# Getting Started
Expand Down Expand Up @@ -52,7 +52,7 @@ Information.
- Create Custom Policies to configure device access rules.
- Customize policies based on device types and access requirements.

See the [Device Control](/docs/endpointprotector/5.9.4.2/admin/module/module.md) topic for additional information.
See the [Device Control](/docs/endpointprotector/5.9.4.2/admin/dc_module/dcmodule.md) topic for additional information.

## Configuring Content Aware Protection

Expand All @@ -62,7 +62,7 @@ See the [Device Control](/docs/endpointprotector/5.9.4.2/admin/module/module.md)
- Create Custom Policies to define file monitoring and protection rules.
- Specify Denylists, Predefined Content, or Custom Content to identify sensitive data.

See the [Content Aware Protection](/docs/endpointprotector/5.9.4.2/admin/module/module_1.md) topic for more
See the [Content Aware Protection](/docs/endpointprotector/5.9.4.2/admin/cap_module/capmodule.md) topic for more
information.

## Configuring an eDiscovery Scan
Expand All @@ -73,7 +73,7 @@ information.
- Create custom scan policies to identify sensitive data at rest on endpoint systems.
- Configure scan options and remediation actions (Encrypt, Decrypt, Delete).

See the [eDiscovery](/docs/endpointprotector/5.9.4.2/admin/module.md) topic for additional more information.
See the [eDiscovery](/docs/endpointprotector/5.9.4.2/admin/ed_module/edmodule.md) topic for additional more information.

## Configuring the User Experience

Expand All @@ -82,7 +82,7 @@ See the [eDiscovery](/docs/endpointprotector/5.9.4.2/admin/module.md) topic for
- Navigate to Device Control > Client Settings.
- Configure Client Modes (Normal, Transparent, Stealth, etc.) and Notification Preferences.

See the [Device Control](/docs/endpointprotector/5.9.4.2/admin/module/module.md) topic for more information.
See the [Device Control](/docs/endpointprotector/5.9.4.2/admin/dc_module/dcmodule.md) topic for more information.

### Configuring User Remediation Settings

Expand All @@ -92,7 +92,7 @@ See the [Device Control](/docs/endpointprotector/5.9.4.2/admin/module/module.md)
- Configure settings such as Time Interval for user actions and User Remediation Pop-up
notifications.

See the [System Parameters](/docs/endpointprotector/5.9.4.2/admin/overview_6.md) topic for more information.
See the [System Parameters](/docs/endpointprotector/5.9.4.2/admin/systempar.md) topic for more information.

### Setting Up Offline Temporary Password

Expand All @@ -101,7 +101,7 @@ See the [System Parameters](/docs/endpointprotector/5.9.4.2/admin/overview_6.md)
- Navigate to Offline Temporary Passwords.
- Generate passwords to provide temporary access rights when User Remediation is unavailable.

See the [Offline Temporary Password](/docs/endpointprotector/5.9.4.2/admin/overview_1.md) topic for more
See the [Offline Temporary Password](/docs/endpointprotector/5.9.4.2/admin/otpassword.md) topic for more
information.

## Deploying Agents
Expand All @@ -121,7 +121,7 @@ See the [System Configuration](/docs/endpointprotector/5.9.4.2/admin/systemconfi
- Duplicate "Report Only" CAP policies and modify them to enforce restrictions.
- Activate blocking policies to prevent unauthorized data movements.

See the [Content Aware Protection](/docs/endpointprotector/5.9.4.2/admin/module/module_1.md) topic for more
See the [Content Aware Protection](/docs/endpointprotector/5.9.4.2/admin/cap_module/capmodule.md) topic for more
information.

## Performing Remediation within eDiscovery
Expand All @@ -133,7 +133,7 @@ information.
risks.

See the
[eDiscovery Scan Result and Actions](/docs/endpointprotector/5.9.4.2/admin/module/module.md)
[eDiscovery Scan Result and Actions](/docs/endpointprotector/5.9.4.2/admin/dc_module/dcmodule.md)
topic for more information.

## Deploying Enforced Encryption
Expand All @@ -157,4 +157,4 @@ topic for more information.
- Monitoring Devices:
- Manage Enforced Encryption devices in Clients list section.

See the [Enforced Encryption](/docs/endpointprotector/5.9.4.2/admin/module_1.md) topic for more information.
See the [Enforced Encryption](/docs/endpointprotector/5.9.4.2/admin/ee_module/eemodule.md) topic for more information.
36 changes: 35 additions & 1 deletion docs/endpointprotector/5.9.4.2/index.md
Original file line number Diff line number Diff line change
@@ -1 +1,35 @@
# Endpoint Protector 5.9.4
---
title: "Netwrix Endpoint Protector 5.9.4.2"
description: "Netwrix Endpoint Protector"
sidebar_position: 1
---

# Netwrix Endpoint Protector

Netwrix Endpoint Protector is a comprehensive Data Loss Prevention (DLP) solution designed to
safeguard endpoint systems from data ex-filtration and loss. In today's interconnected world, where
portable storage devices and internet connectivity are ubiquitous, the risk of data theft and
accidental loss is ever-present.

Traditional network security measures often struggle to prevent data breaches originating from
endpoints such as laptops, desktops, and servers. Endpoint Protector addresses this challenge with a
robust suite of features including Device Control, Content Aware Protection, eDiscovery, and
Enforced Encryption.

Device Control empowers organizations to manage and monitor all device activities at the endpoint,
ensuring that sensitive data remains protected from unauthorized access or transfer. Content Aware
Protection extends this security by scanning and detecting sensitive content at all potential exit
points, whether it is being copied to external devices or transmitted over the internet.

Moreover, Endpoint Protector facilitates compliance with regulatory standards such as PCI-DSS,
HIPAA, and GDPR through predefined discovery patterns and response strategies. It caters to diverse
organizational needs, from protecting intellectual property and client lists to ensuring compliance
with industry-specific regulations.

With Endpoint Protector, administrators gain a centralized, web-based interface for seamless
management and enforcement of security policies across all endpoints. Whether preventing accidental
data leakage or mitigating risks from insider threats, Endpoint Protector offers essential tools to
safeguard critical business data.

The subsequent sections will detail the deployment, setup, and configuration steps necessary to
implement Endpoint Protector and begin protecting your endpoints against data breaches effectively.
10 changes: 0 additions & 10 deletions docs/endpointprotector/5.9.4.2/overview/_category_.json

This file was deleted.

35 changes: 0 additions & 35 deletions docs/endpointprotector/5.9.4.2/overview/overview.md

This file was deleted.

Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "What's New"
description: "What's New"
sidebar_position: 20
sidebar_position: 3
---

# What's New
Expand Down
Loading