Home

Endpoint Protector Basic - User Manual

image

Contents

1. With the intuitive Drag amp Drop interface files can be quickly copied to and from the device for fast secure and efficient workflow EasyLock is a portable application that does not require any installation process on the host PC and is always portable Wherever the portable storage device goes EasyLock is saved on the device and can be used on any Windows MAC or Linux computer 2 System Requirements Operating Systems Windows 7 all versions Windows Vista all versions Windows XP Service Pack 2 is recommended Mac OS 10 5 or higher Linux openSUSE 11 2 other distributions may be available on demand Available USB port Removable USB Storage Device to start the application from e g USB Flash Drive External Hard Drive Memory Card etc If the portable storage device has a manual write protection switch lock it must be in the unprotected writable position to be able to use EasyLock EasyLock does not require Administrative rights 3 Installation To install EasyLock on a USB flash drive or other portable USB storage device e On Windows OS run the EasyLockSetup exe file select the drive letter corresponding to the USB device and press lt Finish gt The EasyLock application will automatically be installed in the Root folder of the selected device Destination USB Flash Drive Please select the USB Flash Drive on which you want the EasyLock software to be installed cosos
2. to ensure that no data is copied on the portable device without being properly encrypted User does not have the possibility to copy data in unencrypted state to the TrustedDevice on an Endpoint Protector client PC 15 EasyLock User Manual 8 All file transfer from an Endpoint Protector client PC to the device can be recorded if file tracing and file shadowing are activated in Endpoint Protector Actions such as file deletion or file renaming are also recorded 9 Administrators can later audit what user with what device on what PC has transferred what files If a TrustedDevice fails to get authorization from Endpoint Protector it will not be usable by the user The device will be blocked and the user will not be able to access the device 4 1 File Tracing on EasyLock TrustedDevices File Tracing on EasyLock TrustedDevices is a new feature of Endpoint Protector 4 used in combination with EasyLock that allows monitoring of files copied in an encrypted way on portable devices By activating the File Tracing option all data transferred to and from devices using EasyLock is recorded and logged for later auditing The logged information is automatically sent to Endpoint Protector Server if Endpoint Protector Client is present on that computer and there is a working Internet connection In case that Endpoint Protector Client is not present the information is stored locally in an encrypted format on the device and it will be
3. can now be securely removed If a message saying The device cannot be stopped right now appears you have to close your Windows Explorer EasyLock or any other application that is still accessing the data on the USB Drive 7 Support In case additional help such as the FAQs or e mail support is required you can visit the support website directly at http www cososys com help html 8 Important Notice DIRK raa Security safeguards by their nature are capable of circumvention CoSoSys cannot and does not guarantee that data or devices will not be accessed by unauthorized persons and CoSoSys disclaims any warranties to that effect to the fullest extent permitted by law 2004 2012 Copyright CoSoSys Ltd Endpoint Protector My Endpoint Protector TrustedDevices and EasyLock are trademarks of CoSoSys Ltd All rights reserved Windows and NET Framework are registered trademarks of Microsoft Corporation All other names and trademarks are property of their respective owners
4. sent at a later time from any other computer with Endpoint Protector Client installed For more details on activating and using File Tracing on EasyLock TrustedDevices please consult the Endpoint Protector 4 User Manual Note The File Tracing feature on EasyLock TrustedDevices is available at the moment only for Windows OS 5 Configuring TrustedDevice use in EPP or MyEPP To learn how to configure the use of TrustedDevice in combination with Endpoint Protector please consult the Endpoint Protector User Manual To find out more about Endpoint Protector visit www EndpointProtector com Before you unplug your portable storage device from the USB port of your computer you have to use the Safely Remove Hardware option from the system tray otherwise you risk corrupting the data on your USB Drive To Safely Remove Hardware double click on the system tray icon then select the USB Drive you want to remove from the list and click on the Stop button lt Wy 4 12 52 PM es safely Remove Hardware Select the device you want to unplug or eject and then click Stop When Windows notifies you that it is safe to do so unplug the device from your computer Hardware devices USB Mass Storage Device USB Mass Storage Device at Location 0 Properties Stop Display device components Close 18 EasyLock User Manual A message will appear indicating that the portable storage device
5. A EasyLock I EasyLock User Manual Table of Contents Sa ECC ONN a4 cok incivaraneunanaesoewsee sieuwmeresars 1 2 5ystem Requirement cccccccceeecceeeeeess 2 Emig sc alic Olt esapead neque T se ieanpeane tks 3 3 1 Setting up EasyLock tacicscncscecse ocincecoumendestendecedne ecnsedanwceaneeerdt 6 3 2 Setting up a Password sssssssrrrssssssssannnnnnnnnrressssssennnnnnnn 7 3 3 Password retriesS sssssssssssrrrrrrrrrrrssssssrnnnnnnrrrrrrreesssrnrnrnn 9 3 4 Display SSUNNGS vqcaienssccelmcducrscestadanderdauatdantienngiacdacdbiecdaaediae 9 3 5 Using Drag amp Drop to copy files sssssssssssssrrrrrsssssssrrrrrrnn 10 3 6 Opening and modifying files within EasyLock cc0eeeaes 12 BaF SECUN SCUINGS rran r E EE LE R AEA 13 4 How EasyLock works with EPP or MyEPP 14 4 1 File Tracing on EasyLock TrustedDeviCes eeeeeeeee eens 15 5 Configuring TrustedDevice use in EPP or MyEPP 16 6 Safely Remove Hardware cssccccesseueueens 17 TOG rcs vadeeageo vg harsh seacaayseauecnsasnacueuas 19 8 Important Notice Disclaimer 08 20 1 Introduction Protecting data in transit is essential to ensure no third party has access to data in case a device is lost misplaced or stolen EasyLock allows portable devices to be identified as TrustedDevices in combination with Endpoint Protector and protects data on the device with Government approved 256bit AES CBC mode encryption
6. Next gt to continue Protecting your sensitive data in transit Military strength 256 bit AES encryption C 7 EasyLock User Manual 3 2 Setting up a Password In order to secure encrypt your data you will need to set up a password The password must be at least 6 six characters long For security reasons it is recommended that you incorporate letters numbers and symbols into your password Password setup Set Password Password Confirm Password Password reminder Password Info Please enter a new password The password must have at least 6 characters It is recommended that you incorporate letters numbers and symbols for maximum security net Enter your password and then confirm it It is recommended that you also set up a password reminder that will help you in case you forget your password Click Next to continue 8 EasyLock User Manual Password setup Set Password Password eocccece Confirm Password eeeeeeee Password reminder My Reminder Password Info Please dick lt Next gt to continue Finalize Your security parameters are configured successfully To complete the Setup Wizard and begin using EasyLock please press the lt Finish gt button below 9 EasyLock User Manual 3 3 Password retries Each time the application starts you will be asked for security reasons to introduce your password F
7. ed ensuring that your data stay safe and private 11 EasyLock User Manual File Edit View Options Help a apoE Sale a Date Modified 6 14 2011 12 15 14 PM C Users Guest Desktop Images mage3 jpg g 6 14 2011 12 15 22 PM 141 32 141 32KB 144709 bytes b J New folder File lder 4 7 2011 2 2 a J Stuff File lder 3 7 2011 6 4 _ FZMkDr F8 Dele F9 Rename F10 Quit The file encryption and transfer status can be seen with the help of the progress bar When the bar reaches the end your files have been copied and encrypted 5 EasyLock 0 9 22 0 TRIAL 1 o Eile Edit View Options Help Saol Gj gt C WUsers Guest Desktop Images image3 jpg Name i Size Type Date Modifi imagel jpg 4 BB Desktop File lder 6 14 2011 image2ipg b J Docs File lder 3 8 2011 3 2 egg gt fy EasyLock2 File Ider 6 14 2011 a i Images File Ider 4 28 2011 9 b Ji Mylmages File lder 4 28 2011 9 imag jpg 76KB jpgFile 3 7 2011 4 5 imag jpg 72KB jpgFile 3 7 2011 5 2 imag jpg 141KB jpgFile 3 7 2011 6 4 gt D New folder File ider 4 7 2011 2 2 4 Stuff File Ider 3 7 2011 6 4 _ F6 Move FZMk Dir F9Rename F9 Rename F10 Quit Clicking on an item with the right mouse button will give you access to options such as Refresh Copy and Delete Copying files from your HDD to the portable storage device using Explore
8. or that case that your drive was lost or stolen the number of password retries is limited to 10 ten After the password has been entered wrongly 10 ten times in a row EasyLock will safely erase all encrypted files stored on the portable storage device The data on the portable storage device can thereafter not be recovered or recreated It is permanently erased 3 4 Display Settings In the toolbar area of EasyLock there are several options available for customizing the EasyLock display window Swap Panels to interchange the display of the USB Drive and My Computer panels Show or hide My Computer Panel to display the My Computer Panel Show Tree View to display a tree like structure Show Detailed View to show additional information about the files Show List View to display the items as a list The available options can be selected also directly from the main menu under the View section 10 EasyLock User Manual A new option Preferences allows you to select whether you want to have a confirmation message displayed before deleting copying or moving files Confirmation Get confirmation before Delete Copy Move 3 5 Using Drag amp Drop to copy files A key feature of EasyLock is the Drag amp Drop functionality which allows you to simply drag the file s and or folder s that you want to copy on the device and drop them onto the window of EasyLock These files will be automatically encrypt
9. ot have access to the files 13 EasyLock User Manual 3 7 Security settings The security settings can be modified from within EasyLock After logging in you can modify your password To do this you need to access the security settings menu This can be done by either selecting Options gt Security Settings from the toolbar area or by pressing the hotkey Ctrl O Old Password New Password Confirm New Password New Password Reminder Password Info Please enter your old password When using EasyLock on a portable storage device as a TrustedDevice Level 1 in combination with Endpoint Protector or My Endpoint Protector the hosted SaaS Solution it will ensure that all data copied from an Endpoint Protector secured Client PC to the device will be encrypted Normal Scenario for the use of a TrustedDevice Level 1 is 1 User connects device to Endpoint Protector protected Client PC Device is checked for authorization client PC is communicating with Endpoint Protector Server to check for authorization If device is an authorized TrustedDevice Level 1 and the User or Machine is authorized to use TrustedDevice Level 1 the EasyLock software on the device will automatically open User can transfer files via Drag amp Drop in EasyLock Data transferred to the devices is encrypted via 256bit AES User cannot access the device directly using Windows Explorer or similar applications e g Total Commander
10. r is not recommended 12 EasyLock User Manual We recommend using either the Drag amp Drop feature or the shortcut keys for copying and pasting Ctrl C and Ctrl V to transfer data to your portable storage device though the EasyLock interface In the toolbar area of EasyLock you can find additional icons that you can also use to copy and encrypt your files Note that the files on your portable storage device are not visible after encryption unless EasyLock is running To exit EasyLock select the File menu and choose Exit or simply click the X button in the upper right corner of the application window 3 6 Opening and modifying files within EasyLock Copied data on device can be viewed and edited directly from within EasyLock This function is accessible with the Open command or double clicking the desired file The user has to open documents from the device with the associated application EasyLock will try to close these documents once it has exited If a document is modified saved with the same name or even to the same folder it will be encrypted and stored on the device If a document is modified and saved but fails to be encrypted for example when the device is unexpectedly removed it will be encrypted the next time EasyLock is started Attention When EasyLock is started by Endpoint Protector as a trusted application opening documents from the device option is disabled as the associated application does n
11. ys 4 EasyLock User Manual e On MAC OS run the EasyLockSetup dmg file select the drive letter corresponding to the USB device and press lt Finish gt The EasyLock application will automatically be installed in the Root folder of the selected device Destination USB Flash Drive Please select the USB Flash Drive on which you want the EasyLock software to be installed 5 EasyLock User Manual e On Linux OS run the EasyLockSetup file select the drive letter corresponding to the USB device and press lt Finish gt The EasyLock application will automatically be installed in the Root folder of the selected device EasyLockSetup Destination USB Flash Drive Please select the USB Flash Drive on which you want the EasyLock software to be installed 6 EasyLock User Manual 3 1 Setting up EasyLock To start EasyLock simply double click the EasyLock file that is saved in the root folder of the portable storage device When using the portable storage device as a TrustedDevices in combination with Endpoint Protector the Client PC to which the device is connected must have received authorization from the Endpoint Protector server otherwise the device will not be accessible on an Endpoint Protector protected PC or EasyLock will not autostart Introduction To configure your device please follow the menus and directions You will be required to set a password Please push lt

Download Pdf Manuals

image

Related Search

Related Contents

仕様書2  Anker A7234011  Samsung Samsung Galaxy Tab A 9.7" LTE Инструкция по использованию  ENGLISH 2 TableofConTenTs  OWNERS MANUAL - Quality Craft    Belkin F8Z441EAB MP3 accessory  Texto completo  POLAR INSTRUMENTS Toneohm 950 Operation  Sony DCR-TRV255E Camcorder User Manual  

Copyright © All rights reserved.
Failed to retrieve file