EasyLock 2 User Manual
EasyLock 2 User Manual
User Manual
I | EasyLock | User Manual
Table of Contents
1. Introduction ........................................... 1
2. System Requirements .............................. 2
3. Deployment ........................................... 3
3.1. Download EasyLock ........................................................... 3
3.2. Install EasyLock on USB storage devices .............................. 4
3.3. Install EasyLock on Local Folders, Cloud Storage and more .... 5
3.4. Install EasyLock Enforced Encryption on USB storage devices . 5
3.5. Setting up EasyLock (all versions) ....................................... 5
3.6. Password retries ............................................................... 6
6. Support ............................................... 14
7. Disclaimer ............................................ 15
1 | EasyLock | User Manual
1. Introduction
There are several EasyLock versions available. Although they are very similar
and both offer the same encryption capabilities and ease of use, there are some
things to consider when choosing the right version, based on your scenarios.
With the intuitive Drag & Drop interface, files can be quickly copied to and from
the device for fast, secure and efficient workflow.
2 | EasyLock | User Manual
2. System Requirements
Both EasyLock and EasyLock Enforced Encryption work on almost any Mac or
Windows computers and have a very small footprint.
• Starting with Windows XP (with the latest Service Packs and updates) up
to the latest versions of Windows 10
A removable USB storage device to start the application from (e.g. USB Flash
Drive, External Hard Drive, Memory Card etc.).
If the portable storage device has a manual write protection switch (lock), it
must be in the unprotected (writable) position to be able to use EasyLock.
Information
If EasyLock is being used to encrypt local folders, CDs & DVDs or cloud
storage applications, the USB port is not required.
3 | EasyLock | User Manual
3. Deployment
Tips
Although the EasyLock Setup will include both the Windows and Mac
versions, ensure a proper corelation for the initial deployment phase.
E.g.: if the initial setup will be made on a Windows computer, use the
EasyLockSetup.exe
E.g.: if the initial setup will be made on a Mac, use the EasyLockSetup.dmg
Information
Alternatively, for EasyLock Enforced Encryption, configurations can be
made on the Endpoint Protector Server for an automatic deployment. This
will eliminate the need to download the installation software.
The main difference is that the initial location will be a local folder. After the
installation, EasyLock can be moved either in the cloud storage solution or,
burned on a CD or DVD.
• For manual deployment, EasyLock will have to be copied onto the Root of
the device
Information
For EasyLock Enforced Encryption, the Endpoint Protector Administrator
might have additional tools available to help in case a user lost their
password. However, this is not always the case as it depends on multiple
circumstances.
This security measure ensures data protection in case the device is lost or stolen.
Therefore, data on the portable storage device cannot be recovered or recreated.
It is permanently erased.
Information
For EasyLock Enforced Encryption, the Endpoint Protector Administrator
has the option to customize several password settings. This includes
password retries, validity, format, history, etc.
might have additional tools available to help in case a user lost their
password. However, this is not always the case as it depends on multiple
circumstances.
7 | EasyLock | User Manual
4.1. Password
The password can be changed at any time from within EasyLock, after login. This
can be done either from the toolbar area by going to Options > Security Settings
or by pressing the hotkey Ctrl + O.
For the EasyLock Enforced Encryption version, this can be changed from Options
> Change Password.
By selecting or deselecting them in the View > Toolbar, they can be displayed or
hidden in the toolbar.
8 | EasyLock | User Manual
The drag & drop functionality makes working with files and folders as simple as
possible. A user only has to drop the desired items that need to be copied on the
EasyLock windows and files and folders will be safe and secure.
The Preferences settings allow for confirmation messages for actions such as
Delete, Copy or Move to be displayed or disabled. In the Enforced Encryption
version, this section is called Confirmation Action.
10 | EasyLock | User Manual
For the EasyLock Enforced Encryption version, data cannot be viewed or edited
directly within the application. The desired documents will need to be copied
from EasyLock onto a different location (e.g.: user’s desktop) in order to be
modified.
Tips
Data can be viewed or edited directly from the EasyLock application.
EasyLock remains locked while files within encrypted area are accessed.
11 | EasyLock | User Manual
Both the stand-alone EasyLock for USB storage devices and the EasyLock
Enforced Encryption versions can be used in combination with Endpoint
Protector, turning any USB storage device into a TrustedDevice Level 1.
The TD Level1 +, otherwise Read Only access right is also available. The USB
storage device is on Read-Only and EasyLock Enforced Encryption can be
automatically deployed from the Endpoint Protector Client. The deployment can
be done by pressing the yellow device icon that is allocated to the USB device in
the Endpoint Protector Client.
12 | EasyLock | User Manual
Tips
The TrustedDevice Level 1 is also available within My Endpoint Protector.
Therefore the EasyLock for USB storage devices can also be used in
cobination with the SaaS version of our DLP solution.
By activating the File Tracing option, all data transferred to and from devices
using EasyLock is recorded and logged for later auditing. The logged information
is automatically sent to the Endpoint Protector Server (if Endpoint Protector
Client is present on that computer and there is a working Internet connection).
In case the Endpoint Protector Client is not present, the information is stored
locally in an encrypted format on the device. It will be sent to the Endpoint
Protector Server at a later time when, the device is connected to a protected
computer, with a working internet connection.
Tips
The same complex password settings are also available for the user
password. These can be enforced by the Endpoint Protector administrators
to ensure compliance with the internal security policies.
There is also the option to extend this functionality to include a list of other
trusted Endpoint Protector Servers.
14 | EasyLock | User Manual
6. Support
Additional support resources are available. Please visit our website for more
manuals, FAQs, videos and tutorials and more at:
www.endpointprotector.com/resoruces.
7. Disclaimer