Endpoint Protector-User Manual PDF
Endpoint Protector-User Manual PDF
User Manual
I | Endpoint Protector | User Manual
Table of Contents
1. Introduction ........................................... 1
1.1. What is Endpoint Protector? ............................................... 2
1.2. Main Features ................................................................... 4
1.2.1. Centralized web based Device Management / Dashboard ..... 4
1.2.2. Control your data flow: File Tracing / File Shadowing ........... 4
1.2.3. Audit Trail – Device Activity Logging .................................. 5
1.2.4. Audit Trail – Reporting and Analysis Tools .......................... 5
1.2.5. File Whitelist................................................................... 5
1.2.6. Easy Enforcement of Your Security Policies ......................... 5
1.2.7. Network "Offline" Mode to Support Your Field Employees ..... 5
1.2.8. Enforced Encryption - protecting sensitive data in transit /
TrustedDevice ............................................................................ 6
1.2.9. Client Uninstall Protection ................................................ 6
1.2.10. Client Stop Protection / Tamper Protection ......................... 6
1.2.11. Backup Scheduler ........................................................... 6
1.3. Controlled Device Types / Ports .......................................... 7
1.4. Conclusions ...................................................................... 9
3. Management ........................................ 16
3.1. Devices.......................................................................... 16
3.2. Device Functionality ........................................................ 17
3.2.1. Give / Deny Access to Devices ........................................ 18
3.2.2. Enable Device Read-Only Access ..................................... 20
3.2.3. TrustedDevice Level 1 to Level 4 ..................................... 20
3.2.4. WiFi - Block if wired network is present............................ 20
3.3. Computers ..................................................................... 21
3.4. Groups .......................................................................... 23
3.5. Users ............................................................................ 24
II | Endpoint Protector | User Manual
4. Rights ................................................. 26
4.1. Device Rights ................................................................. 27
4.2. User Rights .................................................................... 28
4.3. Computer Rights ............................................................. 29
4.4. Group Rights .................................................................. 30
4.5. Global Rights .................................................................. 31
4.6. File Whitelist .................................................................. 32
6. Settings ............................................... 39
6.1. Computer Settings .......................................................... 42
6.2. Group Settings ............................................................... 43
6.3. Global Settings ............................................................... 44
6.4. File Tracing .................................................................... 45
6.5. File Shadowing ............................................................... 46
1. Introduction
Portable storage devices such as USB flash drives, external HDDs, digital
cameras and MP3 players/iPods are virtually everywhere and are connected to a
Windows PC or Macintosh via plug and play within seconds.
With virtually every PC or MAC having easily accessible USB, FireWire and other
ports, the theft of data or accidental loss of data is for individuals a mere child‟s
play.
The modular and intuitive Web-based administration interface has been designed
to offer fast access to controlling computer, devices and user behavior in a large
network. It also offers several ways to track any kind of portable device related
activity registered on the system. A detailed report including timestamps, file
names, action(s) taken, logged user, etc. allows for pin-pointing malicious
behavior and users.
3 | Endpoint Protector | User Manual
The system‟s design also allows the CoSoSys team to perform easy
customizations and extensions requested by clients. Better automation and
express reports can be developed accordingly to customer demands. In the same
time this structure is easy to update and maintain, making the usability even
greater.
Endpoint Protector is the only solution that gives companies of any size the
ability to let users take advantage of the increasingly important functionality of
USB and other ports without losing control over data and compliance.
This endpoint security device control solution is designed to control usage of all
portable storage and to keep track of what data users are taking from and to
their work computers on any kind of portable storage devices.
As not all portable storage devices are used with the intent to harm the
company, many legitimate reasons commonly justify the need of such devices to
increase network users‟ productivity. Thus, Endpoint Protector allows authorized
use of certain device types or specific devices such as the companies‟ own USB
Flash Drives to handle and transfer confidential data.
Endpoint Protector creates an audit trail that shows the use and activity of
portable storage devices in corporate networks. Thus, administrators have the
possibility to trace and track file transfers through endpoints and then use the
audit trail as legal evidence for data theft. For more details on Endpoint
Protector, please see the Data Sheet available on the company‟s website.
http://www.EndpointProtector.com
4 | Endpoint Protector | User Manual
Endpoint Protectors full feature set is available for Windows. A reduced feature
set is available for Macintosh (OS X).
Protects PCs from threats posed by removable portable storage and endpoint
devices like USB Flash Drives, MP3 Players, iPods, digital cameras and other
devices that could be intentionally or accidentally used to leak, steal, lose, virus
or malware infect your data. Even self-executing devices like a USB Flash Drive
with a CD-ROM autorun feature such as U3 Drives will not be accessible and
thereby pose no threats.
Protected PCs that are temporary or frequently disconnected from the network
like laptops stay protected based on the last locally saved policy. All notifications
are transmitted at the next network connection.
6 | Endpoint Protector | User Manual
Normal USB Flash Drives, U3 and Autorun Drives, Disk on Key, etc.
Wireless USB
LPT/Parallel ports
By controlling the Parallel ports of a PC using Endpoint Protector, the
network administrator can deny or allow users access to storage devices
connected to these ports.
* APPLIES ONLY TO STORAGE DEVICES
Memory Cards - SD Cards, MMC Cards, and Compact Flash Cards, etc.
These devices can be enabled / disabled via Endpoint Protector.
Digital Cameras
These devices can be enabled / disabled via Endpoint Protector.
8 | Endpoint Protector | User Manual
FireWire Devices
These devices can be enabled / disabled via Endpoint Protector.
PCMCIA Devices
These devices can be enabled / disabled via Endpoint Protector.
Biometric Devices
These devices can be enabled / disabled via Endpoint Protector.
Bluetooth
These devices can be enabled / disabled via Endpoint Protector.
Printers
Applies to serial, USB and LTP connection methods. These devices can be
enabled / disabled via Endpoint Protector.
ExpressCard (SSD)
These devices can be enabled / disabled via Endpoint Protector.
9 | Endpoint Protector | User Manual
1.4. Conclusions
As information theft and data leakage are a reality of today‟s business world,
effectively preventing all possible security breaches is becoming an ultimate
concern for enterprise security experts. Endpoint security comes to complete
your existing security policies, aiming to render it full proof.
As it enables your employees to use devices you have already invested in and it
protects your company from losses generated by attacks from outside and
within, all financial costs entailed by implementing Endpoint Protector, such as
purchase, implementation and usage training expenses, are fully justified by the
yielded return on investment.
10 | Endpoint Protector | User Manual
2. Server Functionality /
Server Components
Client user (the user who will use the devices and the computers)
The server side of Endpoint Protector has different parts working close together:
The web service is started as long as the web server is running, and it is ready to
respond to each client request.
Dashboard – Lets you view statistics of the server such as the number of clients
and devices currently corrected, total number of computers, log and shadow size,
last logged action, newest added client, etc. and also provides shortcuts to the
essential management tools.– Lets you view statistics of the server such as the
number of clients and devices currently corrected, total number of computers,
log and shadow size, last logged action, newest added client, etc. and also
provides shortcuts to the essential management tools.
In this module, the administrator can edit, manage rights and settings for or
even delete devices, computers or groups. He can also create groups and add or
remove client users.
13 | Endpoint Protector | User Manual
Rights – Used to determine and define rules of access. Six subsections are found
here Devices Rights, User Rights, Computers Rights, Group Rights, Global Rights
and File Whitelist.
This is the most important module of Endpoint Protector. In this module the
administrator can set up and enforce security policies by assigning specific rights
to devices, computers, computer groups and global device access. Please refer to
paragraph 4“Rights” for more information.
In this module the administrator can modify global settings such as the log
upload interval, local log and shadow size, as well as manage computer and
computer group‟s settings. The functionality mode (Normal, Stealth,
Transparent, etc) can also be set from here.
Similar to the Dashboard, this module displays usage statistics on past and
current activities, but with more details.
System Parameters – Here you can determine the functionality of the entire
system. This module includes sections such as Device and File Types, System
Licenses and System Security
In case you enter the IP address, please note that you must use the HTTPS
(Hypertext Transfer Protocol Secure) prefix, followed by the IP address of the
Endpoint Protector Server.
15 | Endpoint Protector | User Manual
Example: https://127.0.0.1/index.php .
(In case of using the Endpoint Protector Appliance the default IP address is
https://192.168.0.201).
If you use Internet Explorer, we recommend that you add this page to Internet
Explorer‟s trusted sites. To do this, follow the steps in paragraph 15 “Installing
Root Certificate to your Internet Browser”.
USERNAME: root
PASSWORD: epp2009
To change the user name and password and to create additional administrators
please see paragraph 10.2 “System Administrators”.
16 | Endpoint Protector | User Manual
3. Management
3.1. Devices
In this module the administrator can manage all devices in the system. Endpoint
Protector has an automatic system implemented meaning that it will
automatically add any unknown devices connected to client computers to the
database, thus making them manageable.
Manage Rights is actually a shortcut to the Devices Rights module, and will be
explained in one of the following chapters.
The status column indicates the current rights for the devices.
Depending on the network policy, administrators can use the following settings:
The administrator can configure these settings for each device individually and
can also choose for what computer(s), user(s) and group(s) they will apply to.
The File Whitelisting feature allows the super administrator to control the transfer
of only authorized files to previously authorized portable storage devices.
Once configured, you can enable this feature for devices, users, computers and
groups. To do this, simply access the Rights module and select device, computer,
user or group rights, depending on the rights priority configuration of your
server.
19 | Endpoint Protector | User Manual
Select the device, user, computer or group you wish to manage rights for and
click the + (plus) button at the bottom of the page, under “Already Existing
Devices”
Once you do that, the Device Wizard will appear, allowing you to select the
device(s) you wish to manage. Please note that you need to allow access to the
storage device in order to able to enable the File Whitelisting for it.
Selecting a device will allow you to select one of the rights for that device.
Once you select a portable device, and choose “Allow Access” for it, you will also
have the option to enable File Whitelisting for that device.
20 | Endpoint Protector | User Manual
The device(s) you selected will appear in the “Already Existing Devices” section.
To change or delete added devices use either “Rights Wizard” or “Remove” action
buttons.
The administrator can configure each device individually and can also choose for
what computer(s), user(s) and group(s) it will apply to.
3.3. Computers
This is the module responsible for managing the client computers.
NOTE!
Computers can also be imported into Endpoint Protector from Active Directory
using the Active Directory Plug-in.
For details, please consult the paragraph 10.1.1 “Active Directory Import”.
3.4. Groups
This module is responsible for editing groups. Edit it is the only command
available from this sections.
Grouping computers and client users will help the administrator to manage the
rights, or settings for these entities in an efficient way. This can be done from
the Group Rights and Group Settings tabs.
24 | Endpoint Protector | User Manual
3.5. Users
The client users are the end users who are logged on a computer on which the
Endpoint Protector Client software is installed.
This module has a self completing mechanism: as soon as a user has some
activity on the system and he is new in the system, he will be added to the
system database.
There are two users created by default during the installation process of Endpoint
Protector.
noUser – is the user linked to all events performed while no user was logged in
to the computer. Remote users‟ names who log into the computer will not be
logged and their events will be stored as events of noUser. Another occurrence of
noUser events would be to have an automated script/software which accesses a
device when no user is logged in to the specific computer.
autorunUser – indicates that an installer has been launched by Windows from the
specific device. It is the user attached to all events generated by the programs
launched from the specific device when Autoplay is enabled in the Operating
System.
25 | Endpoint Protector | User Manual
The users can be arranged in groups for easier management at a later point.
Users can also be imported into Endpoint Protector from Active Directory through
the Active Directory Plug-in.
For details, please consult the paragraph 10.1.1 Active Directory Import”.
26 | Endpoint Protector | User Manual
4. Rights
The modules in this area will allow the administrator to define which device can
be used on computers, groups and which client users have access to them.
Example: If global rights indicate that no computer on the system has access to
a specific device, and for one computer that device has been authorized, then
that computer will have access to that device.
27 | Endpoint Protector | User Manual
After selecting a computer, you select the computers and group of computers for
which the device has specified rights.
28 | Endpoint Protector | User Manual
The administrator can use the “Edit All” action here to edit rights for all groups at
one.
31 | Endpoint Protector | User Manual
The super administrator can manage exactly what files can be copied to
removable devices, and which cannot. In order to use this feature, the
administrator must create a folder in which the authorized files will be kept and
he must set this address in the “Folder” field.
After copying the required files into the previously created folder, he must simply
press the “Refresh” button for a list to be generated.
33 | Endpoint Protector | User Manual
Finally, he must check the box next to each file to enable it, and click the “Save”
button. The files will be hashed and will receive permission to be copied.
This feature is only available to the Super Administrator user and cannot be
modified by regular administrators.
Note!
This only works for outbound transfers. Files copied from external sources onto
client (protected) computers will still be processed using the existing system
policy.
34 | Endpoint Protector | User Manual
5. Offline Temporary
Password
Note!
Once a device is temporarily authorized, any other rights/settings saved
afterwards for this device will not take immediate effect, until the time period is
passed and the connection with the Server is re-established.
A password is unique for a certain device and time period. In conclusion, the
same password cannot be used for a different device or for the same device
twice.
The password will give permission to the device for the specified amount of time.
The time intervals which can be selected are: 30 minutes, 1 hour, 2 hours, 4
hours, 8 hours, 1 day, 2 days, 5 days, 14 days and 30 days.
35 | Endpoint Protector | User Manual
The administrator can either search for an existing device using the search
wizard
or, in case the device is not already in the database, he can introduce the device
code communicated by the client user (explained in below paragraph).
The obtained password will be communicated to the user for temporarily allowing
his specific device as explained bellow.
37 | Endpoint Protector | User Manual
The user will select the device from the list and contact the administrator at the
displayed contact information.
The user will tell the administrator the code for the device and the administrator
will tell the user the password, after generating it on the Server (see above
paragraph for password generation).
The password will be inserted in the correspondent field and applied by clicking
“Enter”.
38 | Endpoint Protector | User Manual
6. Settings
The settings are attributes which are inherited. Settings are designed to be
applied on computers, groups and global (applies to all the computers). The rule
of inheritance is the following (from the most important to less important):
The settings and the rights for computers are sent to the client computer at an
exact interval of time, set in this section.
41 | Endpoint Protector | User Manual
Refresh Interval (in seconds) – represents the time interval at which the client
will send a notification to the server with the intent to inform the server of its
presence in the system. The server will respond by checking the settings and
rights and updating them if needed, so the client can behave accordingly.
Log Upload Interval (in minutes) – represents the maximum time interval at
which the client will send the locally stored log information to the server. This
time interval can be smaller than the default value in case the log size is greater
than the Local Log Size setting.
Local Log Size (in kilobytes) – represents the maximum size of the log which
can be stored by the client on the client pc. If this value is reached then the
client will send this information to the server.
This mechanism is optimal when a client computer has a lot of activity, because
it will send the information very quickly to the server, so the administrator can
be informed almost instantly about the activities on that computer.
Shadow Upload Interval (in minutes) – represents the maximum time interval
at which the client will send the locally stored shadow information to the server.
Minimum File Size for Shadowing (in kilobytes) – represents the minimum
file size that should be shadowed. If a value is set here than files smaller in size
than that value will not be shadowed. If “0” –null is the value set for this field,
then it will be ignored and only the maximum file size will be taken into
consideration.
Maximum File Size for Shadowing (in kilobytes) – represents the maximum
file size that should be shadowed. If a value is set here, then files larger in size
than that value will not be shadowed. If “0” –null is the value set for this field,
than it will be ignored and only the minimum file size will be taken into
consideration.
42 | Endpoint Protector | User Manual
Defining custom settings for all computers is not necessary, since a computer is
perfectly capable of functioning correctly without any manual settings defined. It
will do this by either inheriting the settings of a group it‟s in or, if not possible,
the global settings, which are mandatory and exist in the system with default
values from installation.
43 | Endpoint Protector | User Manual
It is an essential feature for administrators since they can keep track of all data
that‟s being transferred to and from devices. All traffic is recorded and logged for
later auditing.
Administrators have the ability to enable or disable the file tracing feature. This
can be done from within the Endpoint Protector Administration and Reporting
Tool.
If you wish to disable the file tracing feature, simply uncheck the box next to it
and click “Save”.
46 | Endpoint Protector | User Manual
Same as File Tracing, Shadowing of files can be turned on or off, from the
“System Configuration -> System Policies” module of the Endpoint Protector
Reporting and Administration Tool. Please note, however, that this feature
cannot be used without the File Tracing feature enabled.
Refresh Interval (in seconds) – Represents the time interval at which the client
will send a notification to the server with the intent to inform the server of its
presence in the system. The server will respond by checking the settings and
rights and updating them if needed, so the client can behave accordingly.
Log Upload Interval (in minutes) – Represents the maximum time interval at
which the client will send the locally stored log information to the server. This
time interval can be smaller than the default value in case the log size is greater
than the Local Log Size setting.
Local Log Size (in kilobytes) – represents the maximum size of the log which
can be stored by the client on the client pc. If this value is reached then the
client will send this information to the server.
This mechanism is optimal when a client computer has a lot of activity, because
it will send the information very quickly to the server, so the administrator can
be informed almost instantly about the activities on that computer.
Shadow Upload Interval (in minutes) – Represents the maximum time interval
at which the client will send the locally stored shadow information to the server.
Local Shadow Size (in MB) – Represents the maximum size of shadowed files
stored by the client on a client PC. When this value is reached, the client will
start overwriting existing files in order for it to not exceed the specified limit.
Minimum File Size for Shadowing (in KB) – Represents the minimum file size
that should be shadowed. If a value is set here than files smaller in size than that
value will not be shadowed. If “0” –null is the value set for this field, than it will
be ignored and only the maximum file size will be taken into consideration.
Maximum File Size for Shadowing (in KB) – Represents the maximum file
size that should be shadowed. If a value is set here, then files larger in size than
that value will not be shadowed. If “0” –null is the value set for this field, then it
will be ignored and only the minimum file size will be taken into consideration.
48 | Endpoint Protector | User Manual
The shadow directory can be selected from the “System Configuration” module
under the “System Settings” tab.
Since shadow size can reach large amounts, we strongly recommend that a
separate, large capacity Hard Disk is used for shadow storage.
Note!
Shadowing Files can be delayed due to network traffic and Endpoint Protector
Settings for different computers or file sizes. Shadowed files are usually available
after a few minutes.
49 | Endpoint Protector | User Manual
The administrator has the possibility of exporting both the search results or the
entire log report as an Excel file, which can later be printed out for detailed
analysis.
51 | Endpoint Protector | User Manual
Offers real time* monitoring of the client computers registered on the system
which have an established connection with the server.
The administrator has the possibility of accessing the log for a certain computer
by pressing the “List” action button.
Pressing this button will take you to the logs report where it will only display the
actions of that specific computer for which the button was pushed.
54 | Endpoint Protector | User Manual
The administrator can see which devices are connected to what computers and
also the client user who is accessing them. The administrator can also use the
action buttons “List” and “Manage Rights” to quickly administer the device.
56 | Endpoint Protector | User Manual
The administrator has the possibility of either exporting the log for a computer as
an Excel document or simply view it in the Logs Report module. Both reports will
contain all activities performed by the computer in question.
57 | Endpoint Protector | User Manual
Just like in the Computer History module, the administrator has the possibility of
either exporting the log for a computer as an Excel document or simply view it in
the Logs Report module.
58 | Endpoint Protector | User Manual
If viewed as such, the Excel report will, again, offer the complete information
regarding the device: VID, PID, Serial Number. , where it was used, what action
did it suffer, who changed the rights for it, etc.
59 | Endpoint Protector | User Manual
7.10. Statistics
The Statistics module will allow you to view system activity regarding data traffic
and device connections. The integrated filter makes generating reports easy and
fast. Simply select the field of interest and click the “Apply filter” button.
60 | Endpoint Protector | User Manual
7.11. Graphics
Endpoint Protector let‟s you visualize the traffic in your environment making
audit trails easier and more efficient.
Transferred data in MB
The Graphics module of Endpoint Protector can be accessed from the “Reports &
Analysis” module, by clicking the “Graphics” tab.
Selecting the timeline for the graphs is done by selecting the “From” and “To”
date of the desired date range. After selecting the date range click the “Change”
button to update the graph.
Besides the categorized view of data traffic, Endpoint Protector can also generate
a Top 10, 20 and 30 for the category you are currently viewing.
62 | Endpoint Protector | User Manual
8. System Alerts
Before you can create an e-mail alert, you must configure the server host and
provide a user name and password to that mail server. You can do that by
accessing “System Settings” in the “System Configuration” module.
63 | Endpoint Protector | User Manual
You can also verify if your settings are correct by checking the box next to “Send
test e-mail to my account”.
You also have to configure the e-mail of your current user with which you are
accessing Endpoint Protector; by default, “root”. To do this, go to “System
Configuration” > “System Administrators”.
64 | Endpoint Protector | User Manual
The actions available here are Edit, Edit Info and Delete.
Select the option “Edit info” for the desired user and complete the required fields.
After you are done, click “Save”.
Go back to “Define System Alerts” and click “Create” to start creating the first
alert.
65 | Endpoint Protector | User Manual
Then select the Group, Client, Computer, Device type or Device, - depending if
you mean a single device or all devices of a certain type-, and the event that will
trigger the notification.
You can also select one or more users to receive the same notification(s). This is
useful in case there is more than one administrator for Endpoint Protector.
The “Client” and “Group” fields do not influence the triggering of the alert so
there is no need to fill them out. Setting up a value for the “Group” field means
that the alert will be triggered when the selected event occurs for any clients or
computers in that group.
you try deleting any items (Users, Groups, Computers etc.) that have been used
in setting up an alert, you will receive a notification, and you will not be able to
delete them.
67 | Endpoint Protector | User Manual
9. System Parameters
Note!
9.2. Rights
This list contains the rights which can be assigned on the system at any time.
70 | Endpoint Protector | User Manual
9.3. Events
This list contains the events which will be logged for further reference.
Note!
Changing this list without CoSoSys‟ acknowledgement can limit system
functionality and performance; however, such customizations/implementations
can be performed by request by one of our specialists as part of our Professional
Services offered to customers.
71 | Endpoint Protector | User Manual
Attention!
The Excel document has to be formatted in a specific way. Only the first column
in the excel sheet is taken into consideration and the first line in the excel sheet
is ignored.
73 | Endpoint Protector | User Manual
The second option, “Data Security Privileges”, allows you to restrict Sensitive
Data sections access only to Super Administrators. If this option is selected, then
only super administrators are able to view the “Reports and Analysis” section. If
this option is not selected, then super administrators and also administrators are
able to view the “Reports and Analysis” section.
The “Re-read” command will force all computers to re-read rights instantly. This
is useful in case you modified the global system settings and computers need a
longer time to get their rights from the Server.
75 | Endpoint Protector | User Manual
You can also access the “System Lockdown” and “ON/OFF” buttons from this
module as well as the “Re-read” command.
ON/OFF – Pressing this button (OFF) will stop all Endpoint Protector related
activities completely. This means that all devices, even those previously blocked,
will now be usable, logging of traffic will stop as well as file shadowing.
76 | Endpoint Protector | User Manual
This module also contains advanced settings which influence the functionality
and stability of the system.
The previous versions of the AD Plug In (ADPlugIn.msi) can interfere with the
new functionality of Active Directory on Endpoint Protector Server version 3.0.3.1
or higher. Please make sure you uninstall this add-on in case of an update of the
server to this version.
77 | Endpoint Protector | User Manual
Enter the Active Directory domain controller server name, the domain name and
a username and password in the format as in the examples presented in the
form. First, you can push the “Test Connection” button to test if the connection is
established successfully. If the connection is valid, push the “Next” button.
Note!
This operation might take some time, depending on the volume of data that
needs to be imported.
79 | Endpoint Protector | User Manual
In the next step, simply select what items you would like to import by clicking
the checkbox next to them and finally, select “Import”.
If the import procedure was successful, you will see the message “Import
completed”.
80 | Endpoint Protector | User Manual
This module allows you to synchronize the entities in Endpoint Protector with the
entities in Active Directory (Computers, Users, and Groups).
You can either examine existing synchronizations by clicking the “View Sync List”
button,
81 | Endpoint Protector | User Manual
or, if you have the requirements, simply click “Next” to set up your
synchronization settings.
Enter the Active Directory domain controller server name, the domain name and
a username and password in the format as in the examples presented in the
form.
82 | Endpoint Protector | User Manual
You can also check if your settings are correct by clicking the “Test Connection”
button.
You should see a message “Connection is valid” on the top of the page.
Note!
This operation might take some time, depending on the volume of data that
needs to be synchronized.
In the next step, simply select what items you would like to synchronize by
clicking the checkbox next to them, define a sync interval and select “Sync”.
83 | Endpoint Protector | User Manual
You can set up multiple synchronizations from multiple locations at once. These
can be viewed and canceled in the “View Sync List”.
http://www.microsoft.com/downloads/details.aspx?FamilyId=0A6D4C24-8CBD-
4B35-9272-DD3CBFC81887&displaylang=en
Preparations:
1. Create a shared network folder and be sure to set the sharing and security
permissions for the folder to “Everyone” – Read Only. Copy to this location
the files „EPPClientSetup_x86_32.msi‟ and „EPPClientSetup_x86_64.msi‟.
86 | Endpoint Protector | User Manual
2. From the Endpoint Protector web interface, after selecting “Next”, enter
the required information in the correct format and push the “Test
Connection” button. Before continuing with the deployment process you
will need to run “AD Setup”.
3. Run AD Setup from Endpoint Protector Web interface for each domain you
have setup in your organization.
87 | Endpoint Protector | User Manual
As a result of this step you will get a new folder located on the Endpoint
Protector Server, under: InstallPath\endpointprotector\sieratool\web\ad\
with the following name: ADSetup-“DOMAINNAME”
2. Copy the rest of the files and folders to a new created folder located on
the Domain Controller
2. In the next step a tree is being built with the computers that exist in the
Endpoint Protector‟s database and were imported from Active Directory.
Here you have to select the computers to which you want to deploy the
Endpoint Protector Client.
89 | Endpoint Protector | User Manual
Next time the computers from the Endpoint Protector Group reboot, the Startup
script will run and it will install Endpoint Protector Client on each of them.
This script has to be run on all Active Directory on which you want to deploy
Endpoint Protector Client.
What it does:
Each computer you select for deployment will be added as a member of the
group Endpoint Protector Group, and so applying the policies/settings defined in
this GPO.
90 | Endpoint Protector | User Manual
4. Click on “Advanced…”
6. Select your machine from the list. The format will be “IUSR_your machine
name”.
7. Click “OK”
95 | Endpoint Protector | User Manual
8. Check the box next to “Write” for your newly added Internet Guest
Account user.
9. Click “OK”.
If you created two separate folders, one for log files, the other for shadowed
files, repeat the aforementioned steps for the remaining folder.
96 | Endpoint Protector | User Manual
Pease consult the “Setting up policies” chapter of this document for more
information on this area.
97 | Endpoint Protector | User Manual
After installing the Endpoint Protector 2009 Server, we strongly recommend that
you create a System Snapshot before modifying anything. In this case you can
revert back to the original settings if you configure the server incorrectly.
To create a System Snapshot, access the module from System Configuration and
click “Make Snapshot”.
Enter a name for the snapshot, and a description. Select also what you wish to
store in the snapshot, Only Rights, Only Settings, or Both.
To restore a previously created snapshot click the “Restore” button next to the
desired snapshot.
- Restore
Confirm restoration by clicking the “Restore” button again in the next window.
99 | Endpoint Protector | User Manual
Here you can select the logs you wish to back-up. Simply select and option and
click “Make Backup”.
100 | Endpoint Protector | User Manual
You should see the message “Backup Completed” in the top-center of your
browser.
You can download and view the logs by selecting the “click here” link.
To import a log file, click the “Import Logs” button then search for the log file,
via the “Browse” button.
Here you can schedule an automatic backup routine by setting two trigger
conditions:
Backup time interval - allows you to select a certain time interval for repeating
the backup operation
Backup size limit - allows you to select a maximum size for the logs to be backed
up
In case that you don't wish to set a specific value for one or both of these
options, please leave the specific field(s) blank. After specifying the logs to be
backed up automatically based on their creation time, please click "Save" in
order for your options to be applied.
101 | Endpoint Protector | User Manual
You can view the created backups by using the Backup List option.
102 | Endpoint Protector | User Manual
Device Rights, Computer Rights, Group Rights and Global Rights. You can find
descriptions of these items in the previous paragraphs. Before configuring
computers and devices, there are certain aspects of Endpoint Protector you
should be aware of.
Computer Rights, Group Rights and Global Rights form a single unit and they
inherit each-others settings, meaning that changes to any one of these modules
affect the other ones. There are three levels of hierarchy: Global Rights, Group
Rights and Computer Rights, the later being the deciding factor in rights
management.
The Device Rights module surpasses all settings from Computer Rights, Group
Rights and Global Rights. If you give permission to a device to be available to
clients, it will be usable under any circumstances.
103 | Endpoint Protector | User Manual
DEVICE
RIGHTS
GLOBAL
RIGHTS
GROUP
RIGHTS
COMPUTER
RIGHTS
CLIENT
COMPUTER
For example: in Global Rights, assign Allow for device X. If in Computer Rights,
the same device does not have permission to be used; the device will not be
usable. Same applies vice-versa: if the device lacks permission to be used in
Global Rights, and has permission under Computer Rights, the device will be
usable to the client. The same applies for Global Rights and Group Rights: if
under Global Rights the device does not have permission to be used, and under
Group Rights permission exists, the device will be available to the client.
CLIENT ALLOWED
NOT NOT
ALLOWED ALLOWED
NOT
COMPUTER ALLOWED ALLOWED ALLOWED
104 | Endpoint Protector | User Manual
Endpoint Protector features several functionality modes for users, computers and
groups. These modes are accessible for each item (users, computers, groups)
from the Settings module of Endpoint Protector using the “Edit” button.
There are four modes from which you can choose from:
Stealth Mode
Transparent Mode
Panic Mode
file shadowing and file tracing are enabled to see and monitor all user
activity
Administrator receives alert (dashboard also shows alerts) when PCs are
going in and out of Panic mode
106 | Endpoint Protector | User Manual
While fewer administrators are recommended for easier data loss prevention, it is
easier to manage a large network with more.
Here you can see a list of current Administrator and Super Administrators.
Enter the desired user name and password for the new account, then set if the
account is active or not or whether is a super admin or not.
Is active – if this option is not enabled the selected user cannot log in to the
Endpoint Protector console. Use this option in case you want to create temporary
admin or super admin privileges to a certain user and then remove them or if
you want to disable an administrator but do not want to delete his credentials
from the server.
Online Users – Online users are end users who have logged on to a client
computer.
Online Computers – Online Computers are client computers which have been
set up to communicate with the Endpoint Protector server by installing the
Endpoint Protector Client. Here you can see a list of computers which are
currently powered on and you can view the actions they have taken.
User History – This module records all of the users (clients) that have been
registered via the Endpoint Protector Client in the Endpoint Protector Server. You
can also find more information on the client users, such as first name, last name,
phone number, e-mail(s) and the actions they have taken.
Device History – Here you will find a history of recorded devices and actions.
These are sorted by device type, device name, owner, description, TD
(TrustedDevices), vendor and product ID (VID, PID), serial number and last
known time of connection. You can export the history for each device separately
in an Excel format.
12.7. Search
Endpoint Protector‟s search feature lets you easily find what you are looking for,
whether is a newly added device, user or a previously created computer or
group.
To use the advanced search feature of Endpoint Protector, log in and access the
“Dashboard” module, then the “Search” module.
Now you can choose to search for computers, devices, users or groups. Endpoint
Protector also lets you choose the number of results you see on each page.
If you are not sure what you are looking for, you may browse through all
computers, devices, users and groups just below the “Search” button, in the
same window.
For easier navigation, these items can be sorted by Type (device, user, computer
and group), name, description, and actions.
110 | Endpoint Protector | User Manual
Damage control
Protecting Data in Transit is essential to ensure no third party has access to data
in case a device is lost or stolen. The Enforced Encryption solution gives
administrators the possibility to protect confidential data on portable devices in
case of loss or theft. If a TrustedDevice fails to get authorization from the
Endpoint Protector 2009 Server, it will not be usable.
Level 1 - Minimum security for office and personal use with a focus on
software based encryption for data security. Offers companies already
regulatory compliance.
Any USB Flash Drive and most other portable storage devices can be
turned into a TrustedDevice Level 1 with EasyLock Software from
CoSoSys.
No hardware upgrade is required.
http://www.endpointprotector.com/en/index.php/products/easylock
Level 3 - High security level with strong hardware based encryption that
is mandatory for sensitive enterprise data protection for regulatory
compliance such as SOX, HIPAA, GBLA, PIPED, Basel II, DPA, or PCI
95/46/EC.
Requires special hardware that includes advanced security software and
hardware based encryption and that has been tested for TrustedDevice
Level 3.
User can transfer files via Drag & Drop in EasyLock from the PC to the
TrustedDevice.
User cannot access the device using Windows Explorer or similar applications
(e.g. Total Commander).
User does not have the possibility to copy data in unencrypted state to the
TrustedDevice.
Administrator can audit what user, with what device, on what PC, has transferred
what files.
112 | Endpoint Protector | User Manual
To install EasyLock on an USB Flash drive one has to copy the file "EasyLock.exe"
to the root folder of a partition associated with that device.
Access the drop-down box next to USB Storage Device and select the desired
level of TrustedDevices you wish to grant access to.
http://www.endpointprotector.com/en/index.php/products/easylock
113 | Endpoint Protector | User Manual
114 | Endpoint Protector | User Manual
The Endpoint Protector Client is the application which once installed on the client
Computers (PC‟s), communicates with the Endpoint Protector Server and blocks
or allows devices to function, as well as sends out notifications in case of
unauthorized access.
To use this password-protect feature, please consult the paragraph 9.6 “System
Security / Client Uninstall Protection”.
The password sent by the Endpoint Protector Server is hashed and stored in the
registry. If it is deleted, the uninstall process will instantly stop. Tampering with
the registry value of the hash will lead to an irremovable client.
116 | Endpoint Protector | User Manual
You will be prompted to enter the root password to perform administrative tasks.
117 | Endpoint Protector | User Manual
Now, go to the Certificate file you downloaded from the Appliance Setup Wizard-
>Appliance Server Certificate-> and install the Certificate.
Click the Certificate Error button just next to the IE address bar as shown.
By clicking the “Certificate Error” button, a pop-up window appears. Just click the
“View certificates” in that pop-up window.
Another pop-up Certificate window will appear with three tabs namely “General”,
“Details” and “Certification Path”.
Select the “General” tab and then click “Install Certificate...” button as shown
above.
119 | Endpoint Protector | User Manual
Another Welcome to the Certificate Import Wizard pops up. Just click the Next
button.
120 | Endpoint Protector | User Manual
In Certificate Import Wizard window, select “Place all certificates in the following
store” radio button.
Another “Completing the Certificate Import Wizard” pops up. Just click the
“Finish” button.
122 | Endpoint Protector | User Manual
Close the Internet Explorer browser and try to access the Endpoint Protector
Administration and Reporting Tool IP address again.
123 | Endpoint Protector | User Manual
Just click Get Certificate button and then the Confirm Security Exception button.
Here you can find a list of terms and definitions that are encountered throughout
the user manual.
File Tracing - this feature will track all data that was copied to and from prior
authorized portable storage devices.
File Shadowing – this feature saves a copy of all, even deleted files that were
used in connection with controlled devices on a network storage server.
Devices – refers to a list of known portable storage devices, ranging from USB
storage devices to digital cameras, LTP storage devices and biometric devices.
TrustedDevices – portable storage devices that carry a seal of approval from the
Endpoint Protector Server and can be utilized according to their level (1-4). For
more information please see “Enforced Encryption with TrustedDevices” section.
Client - refers to the client user who is logged in on a computer and who
facilitates the transaction of data.
Rights – applies to computers, devices, groups, users and global rights; it stands
for privileges that any of these items may or may not possess.
Events – are a list of actions that hold major significance in Endpoint Protector.
There are currently 17 events that are monitored by Endpoint Protector:
Disabled – refers to devices; the action of removing all rights from the
device, making it inaccessible and therefore unusable.
File read - a file located on a portable device was opened by a user or the
file was automatically opened if the portable device was autorun by the
operating system.
Device not TD – means that a device is not trusted and does not have
automatic access to files
Delete – refers to computers, users, groups, alerts and devices; the action
of removing any of these items from the list
17. Support
In case additional help, such as the FAQs or e-mail support is required, please
visit our support website directly at http://www.cososys.com/help.html.
One of our team members will contact you in the shortest time possible.
Even if you do not have a problem but miss some feature or just want to leave
us general comment we would love to hear from you. Your input is much
appreciated and we welcome any input to make computing with portable devices
safe and convenient.
129 | Endpoint Protector | User Manual
© 2004 – 2010 CoSoSys Ltd.; Endpoint Protector Basic, EPPBasic, Endpoint Protector, My
Endpoint Protector are trademarks of CoSoSys Ltd. All rights reserved. Windows is
registered trademark of Microsoft Corporation. Macintosh, Mac OS X are trademarks of
Apple Corporation. All other names and trademarks are property of their respective
owners.