Home

GFI EndPointSecurity, Add, 100-249u, 2Y, ENG

image

Contents

1. Q Specity the general details for this user D User name EndPointS ecurtuAdministratar Description Administrator user Email Mobile Number Computers H Multiple emails or computers can be specified by using semicolons as separator Network message alerts are sent to the computers specified mia Cancel Screenshot 106 EndPointSecurityAdministrator Properties options General tab 4 From the General tab key in the following details Account user name Account Description Email address Mobile number Computers network messages are sent to the specified computers Note More than one email address and more than one computer name IP address can be specified Separate entries with semicolons GFI EndPointSecurity 12 Alerting Options 132 Piri Lir m Na T ui a rj ar IrL Lo ili CPE Es L Pu i IN LEI LII aaa TA Tl L bk Hk at B Specify the user working hours AK C 06h 09h tah 15h 18h 2th 24h Marked time intervals are considered as work time Un marked times will be considered as outside working time a Screenshot 107 EndPointSecurityAdministrator Properties options Working Hours tab 5 Click Working Hours tab and mark the typical working hours of the user Marked time intervals are considered as working hours GFI EndPointSecurity 12 Alerting Options 133 EndPointSecurityAdministrator
2. Power Users User Group name Select Users or Groups Select this object type Users Groups or Built in security principals Object Types From this location tcdomainb com Locations Enter the object names to select examples H NOTE The powe connected to the Check Namez Advanced OK Cancel Screenshot 26 Power users options 4 In the Power Users dialog Option 1 Click Add to specify the user s group s that will be set as power users for this pro tection policy and click OK Option 2 Highlight user s group s and click Remove to demote from power users and click OK To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 4 Configuring access permissions for device categories GFI EndPointSecurity enables you to set permissions by device categories to Active Directory AD users and or user groups You can do this on a policy by policy basis GFI EndPointSecurity 6 Customizing Protection Policies 60 When a device category is not set to be controlled by the particular security policy the relevant entry is disabled For more information refer to Configuring controlled device categories page 57 To configure device category access permissions for users in a protection policy 1 Click Configuration
3. 22 a 25 2 5 Navigating the Management Console 2 0 0 cece cece cee ceeeceecccccceeeeeeeettteseeees 27 2 6 Testing your installation 2 0 aaa 29 2 6 1 Test preconditions 2 00 a 29 a PAK NAA 30 2 6 3 Reverting to default settings 22 2 2 a 33 3 Achieving Results 22 22222 kaaa 34 3 1 Preventing data leaks and malware infections 2 2 2 cece cece c eee eececcccccecceeeetteeeee 34 3 2 Automating network protection _ 1 2 2 2 a 35 3 3 Monitoring network activity from a central location 2 00 a 37 4 Adding Target Computers Uu 38 4 1 Adding computers manually 2 0 00 00 00 a 38 4 2 Adding computers automatically 2222 a 39 4 3 Configuring log on credentials 222 2 c cece cece cc ceeeccccccceeceeeeeteeeeeccceeeeeeees 42 5 Managing Protection Policies 45 5 1 Creating a new protection policy 1 0 0 ccc cece ce eeeeccccccceceeeeetttteceeees 45 5 2 Assigning a Protection Policy 2 202 222 ooo ccc ccc cece ceeceecccccceeeceeeeetttnceccceeeeeees 51 5 2 1 Deploy immediately c cece cece cece ceeteececececeeeeeeeteteteeseceeeees 52 5 2 2 Scheduled policy deployment 02Q cece ccc ec ceecccccccceeceeetettteceeceeeees 53 5 2 3 Deploying policies through Active Directory 2 2 ccc cece cece e eee ceeccccceceeeeeeees 54 5 3
4. Add pemissionf5 Add local domain users groups Grant temporary access Edit controlled device categories Edit controlled ports Switch to devices view BARA K Actions EF Delete pennission s H GF Increase priority Decrease priority Properties H GH Help H E Configuring and using Protection Policies Screenshot 39 Protection Policies sub tab users view GFI EndPointSecurity 6 Customizing Protection Policies 69 4 From the left pane click Switch to devices view or Switch to users view in the Common tasks section to switch grouping of permissions by devices ports or users Note In users view you will also see any power users specified within the policy 6 8 Configuring priorities for permissions GFI EndPointSecurity enables you to prioritize any permissions assigned to Active Directory AD users and or user groups You can do this on a policy by policy basis and on a user by user basis For example for a specific user specified within a specific protection policy you may decide to give priority 1 to USB port permissions and priority 2 to CD DVD drive permissions This means that if the user connects an external CD DVD drive via the USB port to the target computer permissions for the USB port will take precedence over permissions for the CD DVD drive pa Security 5 pecily the users and groups that are allowed to access the devices blocked by this protec
5. 3 The table below describes the available options of the Add Computer s dialog Table 10 Add Computer s dialog options Key in the name IP of the target computer to add and click Add Repeat this step for each target computer o you want to add to this protection policy Click Select In the Select Computers dialog select the relevant Domain Workgroup from the drop down list and click Search Enable the required computer s and click OK GFI EndPointSecurity 4 Adding Target Computers 38 Click From Domain Specify the required computer s from within the domain workgroup where GFI End PointSecurity resides Click Import Browse to the location of the text file that contains a list of computers to be imported rote Specify ONLY one computer name IP per line 4 Click Finish 4 2 Adding computers automatically GFI EndPointSecurity enables you to search for and add new computers when they are connected to your network at specified time intervals This enables you to automatically add computers as soon as they are detected on the network Through Auto Discovery features you can configure The frequency and schedule of the searches The discovery domain workgroup to scan The policy assigned to newly discovered target computers and the logon credentials By default Auto discovery settings are set to scan the Current domain workgroup domain workgroup where GFI EndPointSecurity resides I
6. Doman work Group Remove Screenshot 11 Auto Discovery options Discovery Area tab 6 Click Discovery Area tab and select the area to be covered by auto discovery For The following domains workgroups and Entire network except click Add and key in the Domain workgroup name GFI EndPointSecurity 4 Adding Target Computers 41 Auto Discovery Auto Discovery Discover Area Actions J Specify the actions that should be performed on the discovered EI computers and the default policy to be used Use as default policy Policy VW Install agents on discovered computers Use the security contest under which the GFI EndPomtSecurity Service is running Use the logon credentials epecihted below User Name administrator Password V Send alert TRE caros Avot Screenshot 12 Auto Discovery options Actions tab 7 Click Actions tab and from the Use as default policy drop down menu select the policy you want to assign to newly discovered computers 8 Select unselect Install agents on discovered computers to enable disable auto agent deploy ment Click Yes to confirm the enabling of Automatic Protection 9 Select the logon mode that GFI EndPointSecurity uses to log on to the target computer s and deploy agents protection policies By default GFI EndPointSecurity is configured to use the logon credentials of the currently logged on user accou
7. Mo Recipients Configured Configure Screenshot 71 Alerting Options General tab 4 In the Alerting Options dialog click General tab and select any of the following alert types to send Email alerts Network messages SMS messages GFI EndPointSecurity 6 Customizing Protection Policies 97 Alerting Options Filter Specify what alerts should be sent when a security event is generated Select the alert types that should be sent ET Send email alerts to Mo Recipients Configured gee Send network message to No Recipients Configured E 18 Send SMS message to Mo Recipients Configured Select users and groups Available users groups aa EndPomtSecurityadministrat Screenshot 72 Alerting Options Configuring users and groups 5 For each alert type enabled highlight the alert type and click Configure to specify alerts recip ients Click OK GFI EndPointSecurity 6 Customizing Protection Policies 98 Alerting Options General Filter Specify bor what type of events the alerts should be sent Select the event types that should be sent V Service Events 7 la Device connected events K iz Device disconnected events E 1a Access allowed events E Access denied events Ed id Encryption events Ok Cancel Apply Screenshot 73 Alerting Options Filter tab 6 Select Filte
8. Users list User Group Name Access Read Select Users or Groups Select this object type Users Groups or Built in security principals Object Types From this location tcdomainb com Locations Enter the object names to select examples Everyone Check Names Advanced Cancel Screenshot 7 Adding users Or groups 10 Click Add and specify the user with no administrative privileges to have access to the CD DVD device category specified in this protection policy and click OK Add permissions Users Select the users groups which will have access ko the devices parts Users list User Group Name Access Read write A Everyone Back Finish Cancel Screenshot 8 Selecting permission types per user or group 11 Enable the Access Read and Write permissions and click Finish GFI EndPointSecurity 2 Installing GFI EndPointSecurity 32 To deploy the protection policy updates on to the local computer 1 From the right pane click on the top warning message to deploy the protection policy updates The view should automatically change to Status gt Deployment 2 From the Deployment History area confirm the successful completion of the update onto the local computer Re accessing a CD DVD disc Upon the assignment of user permissions the specified user with no administrative privileges should now be allowed to access CD DVD discs through CD DVD drive
9. GFI EndPointSecurity stores event logs in an SQL Server database In a large network with a lot of activity the size of the database can grow exponentially and read write performance between GFI EndPointSecurity and the database may degrade It is recommended to configure log retention settings to automatically delete old or unwanted events or even create a new database when the current one reaches a specific size Refer to the following sections for information about Maintaining the database backend Using an existing SQL Server instance GFI EndPointSecurity 3 Achieving Results 37 4 Adding Target Computers GFI EndPointSecurity enables you to specify the computers you intend to deploy agents and protection policies on Topics in this chapter 4 1 Adding computers manually lee eee cee cence cece LLALLA LLALL LaaLa Lano anaana 38 4 2 Adding computers automatically oleic ahaaa aaa aLaaa LaL LALLA LLALLA LaaLa aL anaana 39 4 3 Configuring log on credentials aoaaa aaa aaao aa aaa eee eee eee eee DALLAL Laa LaaLa aLaaa 42 4 1 Adding computers manually To manually add a target computer 1 Click Configuration tab gt Computers 2 From Common tasks click Add computer s Add Computer s xX j Select the computers you want to add to this protection policy A Computer name or IF 192 168 3 24 Computer Name Finish Screenshot 9 Adding computers manually
10. GFI Product Manual GF EndPointSecurity Administrator Guide GFI The information and content in this document is provided for informational purposes only and is provided as is with no warranty of any kind either express or implied including but not limited to the implied warranties of merchantability fitness for a particular purpose and non infringement GFI Software is not liable for any damages including any consequential damages of any kind that may result from the use of this document The information is obtained from publicly available sources Though reasonable effort has been made to ensure the accuracy of the data provided GFI makes no claim promise or guarantee about the completeness accuracy frequency or adequacy of information and is not responsible for misprints out of date information or errors GFI makes no warranty express or implied and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document If you believe there are any factual errors in this document please contact us and we will review your concerns as soon as practical All product and company names herein may be trademarks of their respective owners GFI EndPointSecurity is copyright of GFI SOFTWARE Ltd 1999 2013 GFI Software Ltd All rights reserved Document Version 1 1 1 Last updated month day year 25 03 2013 Contents 1 ahdgera a LA 11 1 0 1 Terms and conv
11. Risk Assessment Statistics Status Deployment wh Statistics Monitor the device usage aggregated for all computers or select individual computers from the list below Select a computer to view its statistics All Computers Protection Status a0 15 10 5 0 12 00 AM 4 00 4M 8 00 AM 4 00 PM 8 00PM 12 00 AM Device Usage by Device Type Device Usage by Connectivity Port Tupe Allowed Blocked im Tupe Allowed Blocked H Floppy Disks 2161 2 558 F USB S CD DVD 397 7 292 Firewire co Storage Devices 223 92 1 PCMCIA Printers 0 k3 Bluetooth PDAs 0 Y Serial amp Parallel a Network Adapters o a Infrared was Modems 0 Secure Digital 5D all Imaging Devices 0 mii Internal e Human Interface Devices 1 Screenshot 80 Statistics sub tab To access the Statistics sub tab from GFI EndPointSecurity management console click Status tab gt Statistics The Statistics section contains information about GFI EndPointSecurity 8 Monitoring Device Usage Activity 106 Protection Status Device Usage by Device Type Device Usage by Connectivity Port 8 1 1 Protection Status 20 Allowed a P Blocked 10 0 12 00 AM 4 00 AM 2 00 AM 12 00 PM 4 00 PM 8 00 PM 12 00 AM Screenshot 81 Protection Status area This section graphically represents daily device usage on computers differentiating between devices that have been blocked and devices that have be
12. aoaaa aaoo aa oaao anoano anoano aao oan aa 108 AN 108 8 2 AA i OS n E CROC wnea ere Re ESO ane Ro Re 108 8 2 2 Advanced Filtering ieee cece ccc cece aaa LLALLA LLLA DLLD LAAL aa oaan 109 8 2 3 Logs Browser aaa a oo bce aa AP LG ed bees toes don a nba apa aa 110 8 2 4 Creating event queries 2 2 2 aa oaoa 00000000 a02 aa aa aD c ccc Daoa anrora nanan 111 9 Status Monitoring AA AA AA KAP 113 9 1 Risk Assessment view a 113 9 2 Statistics view oaoa ccc L bb bbb beeen 115 9 2 1 Protection Status 355 vis ono ng aa AA tn la tat tab a LL NANG na 116 9 2 2 Device Usage by Device Type 117 9 2 3 Device Usage by Connectivity Port 117 nA PAN 117 9 4 Deployment statusviewu cece cece ccc cece ee eec cece eeeeccecceeeteeceeeceeetetseeseesess 119 9 4 1 About Deployment statusview ieee cece cece ccc cee ceeececceeeteceeeeeeees 120 9 4 2 Current Deployments occ cece cece c cece ee ceeeeeecceeteeeeeeeeeetesceeseeees 121 9 4 3 Queued Deployments 0 c ccc cece eecececeeeeeceeeeeetteeeeeees 121 9 4 4 Scheduled Deployments c cece ccc c cece ce eeececcceeeceeeceecectteeeeeseeees 121 9 4 5 Deployment History u oaaao anaoa aa oaaao cece ccc eeeeceeeceeeeeecceeeesttecceeseeess 122 5 0 6 2 occie ane ee eee ee ee ee eee eee 123 10 1 GFI EndPointSecurity GFI ReportPack oie ccc eee ec oaa anana a ooann aa n 123 10 2 Generating Digest reports 123 11 Managing
13. 8 2 3 Logs Browser The Logs Browser sub tab allows you to access and browse events currently stored in the database backend GFI EndPointSecurity also includes a query builder to simplify searching for specific events With the events query builder you can create custom filters that filter events data and display only the information that you need to browse without deleting records from your database backend GFI EndPointSecurity 8 Monitoring Device Usage Activity 110 File Configure Help Discuss this wersion Status Activity Configuration Scanning Reporting General its Activity Log ilo Logs Browser ia Agent logs database 8 Events Event lupe Device Name Time E P 5 Read only access alowed TSSTcorp DYD ROM TS L3 4872010 4 02 57 PM FI Device connedivily events 8 Read only access allowed TSSTcorp DVD ROM TS L3 47872010 4 02 24 PM Gg Device connected events 7 5 Read only access alowed TSSTcorp DYD ROM TS L3 4872010 4 01 25 PM Device disconnected events T Read only access allowed TSSTcopDVD ROMTS L3 48 2010 4 01 25 PM EI E Access events 20 Full access allowed TSSTcorp DVD ROM TS L3 42872010 4 01 25 PM iy Access allowed events P E Read only access allowed Msft Virtual CDROM 4 8 2010 3 59 52 PM 5 Read only access allowed Msft Virtual CD ROM 4 5 2010 3 13 25 PM P pi Head only access allowed TSSTcorp DYO HOM TS L3 48 010 3 12 06 PM 3 4f Access denied events ou oe
14. Deployment Deployment History DateTime Computer Type Messages 4 42872010 4 52 33 PM P04 Installation The deployment was completed B 42872010 4 52 33 PM P04 Installation Installing the protection agent 1 4 6 2010 4 52 33 PM P04 Installation Installing the deployment service i 4 672010 4 52 32 PM PU Installation Copying the setup Files i 4 6 2010 4 52 37 PM P04 Installation Preparing files i 482010 4 52 32 PM P04 Installation Collecting information i 4 672010 4 52 32 PM arig Installation Checking if the computer i online 44872010 4 52 23 PM P04 Un inskallation The ur installation was completed Pde oni Aad Phd Pra In inetallatinn In inetallima Fhe nmtecthan anent a Screenshot 22 Deployment History area 2 From Deployment History confirm the successful completion of the update onto the local com puter For more information refer to Deployment status view page 119 5 3 2 Agents status Use the information displayed in the Agents Status area to determine the status of all deployment operations performed on your network target computers To view agents status 3 Click Status gt Agents Agents Status gt Computer Protection Policy Up to date Status Schedule EPO General Control es Online Last message received ak 46 2010 2 56 47 Pm 46 2070 2 53 05 PM NG P04 General Control No Update pending Online Last message received ak 4 8 2010 2 56 47 PM N A Screenshot 23 Agent s
15. The second is ko allow usage of removable devices but to monitor the activity by logging everything to the central database where it can then be accessed through the viewer or ReportCenter lt Back Finish Cancel Screenshot 18 Creating a new policy Global Permissions settings 10 From the Global Permissions dialog select the required global access permissions from Block any access to the controlled devices to block access to all selected devices ports Allow everyone to access the controlled devices to allow access to all selected devices ports If this option is selected activity monitoring will still be carried out on target computers covered by the protection policy 11 Click Next 12 Click File Type Filter and add the file types to block allow by this policy Note GFI EndPointSecurity enables you to restrict access based on file types It is also able to identify the real content of most common file types example DOC or XLS files and take the necessary actions applicable for the true file type This is most useful when file extensions are maliciously manipulated For more information refer to Configuring file type filters page 81 13 Click OK to close the File Type Filter dialog and return to the wizard 14 Click Encryption and enable configure the preferred encryption engine GFI EndPointSecurity 5 Managing Protection Policies 49 w Note In addition GFI EndPointSec
16. used 1 3 Components of GFI EndPointSecurity When you install GFI EndPointSecurity the following components are set up GFI EndPointSecurity 1 Introduction 12 gt GFI EndPointSecurity Management Console Management Console gt GFI EndPointSecurity Agent 1 3 1 GFI EndPointSecurity Management Console Through the Management Console you can Create and manage protection policies and specify which device categories and connectivity ports are to be controlled Remotely deploy protection policies and agents on to your target computers Grant temporary access to target computers to use specific devices View the device protection status of every computer that is being monitored Carry out scans on target computers to identify devices currently or previously connected Check logs and analyze what devices have been connected to every network computer Keeps track of which computers have an agent deployed and which agents need to be updated 1 3 2 GFI EndPointSecurity Agent The GFI EndPointSecurityagent is a client side service responsible for the implementation of the protection policies on target computer s This service is automatically installed on the remote network target computer after the first deployment of the relevant protection policy through the GFI EndPointSecurity management console Upon the next deployments of the same protection policy the agent will be updated and not re installed 1 4 Key Features GFI
17. 14 17 23 29 30 34 36 38 39 42 45 51 54 57 59 61 63 65 68 70 71 74 79 81 83 86 88 94 96 99 100 104 119 122 144 Q Quick Start wizard 25 29 126 S security encryption 88 supported connectivity ports 58 supported device categories 57 100 T target computer 17 22 38 51 53 100 104 117 144 147 Technical Support 148 temporary access 13 14 17 35 77 Index 154 Troubleshooter wizard 148 Troubleshooting 147 U user messages 35 138 140 V versions 11 W Web Forum 149 wizard Create Protection Policy wizard Quick Start wizard Troubleshooter wizard 25 47 148 GFI EndPointSecurity Index 155 USA CANADA AND CENTRAL AND SOUTH AMERICA 15300 Weston Parkway Suite 104 Cary NC 27513 USA Telephone 1 888 243 4329 Fax 1 919 379 3402 ussales gfi com UK AND REPUBLIC OF IRELAND Magna House 18 32 London Road Staines upon Thames Middlesex TW18 4BP UK Telephone 44 0 870 770 5370 Fax 44 0 870 770 5377 sales gfi com EUROPE MIDDLE EAST AND AFRICA GFI House San Andrea Street San Gwann SGN 1612 Malta Telephone 356 2205 2000 Fax 356 2138 2419 sales gfi com AUSTRALIA AND NEW ZEALAND 83 King William Road Unley 5061 South Australia Telephone 61 8 8273 3000 Fax 61 8 8273 3099 sales gfiap com
18. 140 13 3 Configuring GFI EndPointSecurity updates e eee ccccceeeeeeeeees 141 14 Miscellaneous ic c5921e 5g ces es ee segs et aaa NOO Gani Ob Sa sha each ice dadveueeadovesenady 143 14 1 Product licensing e cece cece cece ce eeeeteecececeeeeeeeetettteetceeeeeeees 143 14 2 Uninstalling GFI EndPointSecurity ua 143 14 2 1 Uninstalling GFI EndPointSecurityagents 20 22 c cece ccceeeeeeee 143 14 2 2 Uninstalling GFI EndPointSecurityapplication c cece eee eects 145 14 3 Product version information cc ccc cece cece cece ccccccecceeeeeceeeeecceeeeeseeeeeeeees 146 15 Troubleshooting and Support u 22 22 147 KCI CONS Lo 150 NING E E E E E EE E EE E E A E 154 Screenshot 1 Screenshot 2 Screenshot 3 Screenshot 4 Screenshot 5 Screenshot 6 Screenshot 7 Screenshot 8 Screenshot 9 Screenshot 10 Screenshot 11 Screenshot 12 Screenshot 13 Screenshot 14 Screenshot 15 Screenshot 16 Screenshot 17 Screenshot 18 Screenshot 19 Screenshot 20 Screenshot 21 Screenshot 22 Screenshot 23 Screenshot 24 Screenshot 25 Screenshot 26 Screenshot 27 Screenshot 28 Screenshot 29 Screenshot 30 Screenshot 31 Screenshot 32 Screenshot 33 Screenshot 34 Screenshot 35 Screenshot 36 Screenshot 37 Screenshot 38 List of Figures Navigating GFI EndPointSecurity user interface 0 22 2 eee eee eee cece 20 GFI EndPointSecurity installation domain a
19. Add permissions options Users 0000000000000 e cece cece eee ee cee ceeceeeeeeeeeee 67 Add permissions options Users 0000000000000 aa 0200o 0220n aoaaa ceeceeeeeeeeeee 68 Protection Policies sub tab devices View U 022222 e eee eee ee eee eee eee eee 69 Screenshot 39 Screenshot 40 Screenshot 41 Screenshot 42 Screenshot 43 Screenshot 44 Screenshot 45 Screenshot 46 Screenshot 47 Screenshot 48 Screenshot 49 Screenshot 50 Screenshot 51 Screenshot 52 Screenshot 53 Screenshot 54 Screenshot 55 Screenshot 56 Screenshot 57 Screenshot 58 Screenshot 59 Screenshot 60 Screenshot 61 Screenshot 62 Screenshot 63 Screenshot 64 Screenshot 65 Screenshot 66 Screenshot 67 Screenshot 68 Screenshot 69 Screenshot 70 Screenshot 71 Screenshot 72 Screenshot 73 Screenshot 74 Screenshot 75 Screenshot 76 Screenshot 77 Screenshot 78 Protection Policies sub tab users view e eee eee cece ee cece eee eee cece cence 69 Protection Policies sub tab Security area icc ence eee cece e cece eeeeeeeees 70 Black NISEOPUONS aka aaa pecan Se seine cae aan her gece nen 71 Select Devices options a 72 Select Devices options Select device serials 73 Select Devices options Edit Device serials 74 WHITTLE a 75 Select Devices options a 75 Select Devices options Select device serials 76 Select Devices options Ed
20. Click Configuration tab gt Options sub tab 2 From Configure select Database Backend 3 From the right pane click Change database backend Databae Eackend Settings Curent database settings is Server WIN 0B5OLEXPRE55 Database 8 EndPoint5ecurity2012R2 ser New database settings Please specify the name or IP of the machine hosting the Microsoft SQL Serwer MSDE database you want to use Server WIN O8 SQLEXPRESS Database EndPointSecunty2012R2 Use Windows authentication Use Microsoft SQL Server authentication User Password Screenshot 102 Change Database Backend 4 From the Server drop down menu select the SQL Server you want to use 5 Specify the name of the database in the Database text box 6 Select the authentication mode and specify the logon credentials if necessary 7 Click Apply and OK GFI EndPointSecurity 11 Managing the Database Backend 128 12 Alerting Options This chapter provides you with information about configuring the GFI EndPointSecurity alerting options and alerts recipients Alerting is a crucial part of GFI EndPointSecurity s operation which help you take remedial actions as soon as a threat is detected Topics in this chapter 12 1 Configuring alerting options 129 12 2 Configuring the alerts administrator account _ 22 222 occ cece cee ce eee ec cect eeeceeeeeeeees 131 12 3 Configuring alerts recipients cece cece ee eee eee cece eee e e
21. EndPointSecurity Administrator Guide contains solutions for all possible problems you may encounter If you are not able to resolve any issue please contact GFI Support for further assistance Common Issues The table below lists the most common issues which you may encounter during the initial setup and first time use of GFI EndPointSecurity and a possible solution for each Table 19 Troubleshooting Common issues Issue Possible Cause Possible Solution The com GFI EndPointSecurity management If a target computer is offline the deployment of the relevant puter is off console pings the target computer policy is rescheduled for an hour later GFI EndPointSecurity line at deployment to determine keeps trying to deploy that policy every hour until the target whether it is online and if not this computer is back online message is displayed Ensure that the target computer is switched on and connected to the network Failed to GFI EndPointSecurity was not able Ensure that your firewall settings enable communication between connect to to extract data from the registry of the target computers and the GFI EndPointSecurity server For the remote the target computer more information refer to System Requirements registry error Failed to GFI EndPointSecurity was not able For more details about the cause of the error and a possible gather to extract version related data solution refer to the system error message within the req
22. EndPointSecurity offers the following main features Table 2 GFI EndPointSecurityfeatures GFI EndPointSecurity features Group based In GFI EndPointSecurity you can configure and place computers into groups that are governed by one pro protection tection policy This allows you to configure a single protection policy and apply it to all the computers control that are members of that group Granular GFI EndPointSecurity enables you to allow or deny access to a specific device as well as to assign where access applicable full or read only privileges over every supported device e g CD DVD drives PDAs ona control user by user basis Scheduled GFI EndPointSecurity allows you to schedule the deployment of protection policies and any related con deployment figuration changes without the need to keep to the GFI EndPointSecurity management console open The deployment feature also handles failed deployments through automatic rescheduling Access Apart blocking a range of device categories GFI EndPointSecurity also allows blocking control By file type for example allow the user to read doc files but block access to all exe files By physical port all devices connected to particular physical ports for example all devices con nected to USB ports By device ID block access to a single device based on the unique Hardware ID of the device NOTE In Microsoft Windows 7 a feature called BitLocker To Go can be us
23. GFI ReportPack aa 123 10 2 Generating Digest reports ee ccc cee eee cece eee e cece eee eceeeeeeeeeeseeees 123 10 1 GFI EndPointSecurity GFI ReportPack To generate reports you need to download and install the GFI EndPointSecurity GFI ReportPack add on To download the add on visit http www gfi com endpointsecurity esecreportpack htm For more information about GFI EndPointSecurity GFI ReportPack 1 Click Reporting tab 2 From the left pane select either GFI EndPointSecurityGFl ReportPack or GFI ReportCenter Note An Internet connection is required 10 2 Generating Digest reports GFI EndPointSecurity enables you to generate Digest reports to the configured recipients Digest reports contain a summary of periodical activity statistics as detected by GFI EndPointSecurity Alert recipients are not Active Directory AD users and or user groups but are profile accounts created by GFI EndPointSecurity to hold the contact details of users intended to alerts It is best to create alert recipients prior to configuring alerts For more information refer to Configuring alerts recipients page 135 To configure Digest reports 1 Click Configuration tab gt Options sub tab 2 From Configure click Alerting Options and from the right pane click Configure the digest report GFI EndPointSecurity 10 Reporting 123 Digest Report Details Specify what alerts should be sent when
24. Introduction 20 2 Installing GFI EndPointSecurity This chapter provides you with information about preparing your network environment to successfully deploy GFI EndPointSecurity Topics in this chapter 2 1 System requirements elec cee eee ee LLALL LDAA LLDD LLDD eee ceeeeeeeeeeeeeseseeeeeeeeeees 21 2 2 Upgrading GFI EndPointSecurity 0 0 2022 i eee ee cece eee eee ence eee sees ceeeeeeeeeeees 22 2 3 Installing a new instance of GFI EndPointSecurity 22 0 0 2 eco c eee cee eee eee eee eeeeeeeeee 23 2 4 Post install configurations oaaao cece cece eee eee LLALLA LLALLA LLALLA LLALLA eeeeeeeeseeeeees 25 2 5 Navigating the Management Console 2 2 22 cece eee eee cee cece e cece cece eeeeeeeseeeceseeeeeees 27 2 6 Testing your installation o oleic cence eee aLaaa LALLA LLALL DALLAL LALLA LLa LaaLa anaa 29 2 1 System requirements Hardware requirements The table below lists the hardware requirements for GFI EndPointSecurity and GFI EndPointSecurity Agent Table 6 System requirements Hardware GFI EndPointSecurity GFI EndPointSecurity Agent Processor Minimum 2 GHz Minimum 1 GHz Recommended 2GHz Recommended 1 GHz RAM Minimum 512 MB Minimum 256 MB Recommended 1 GB Recommended 512 MB Free space Minimum 100 MB Minimum 50 MB Recommended 100 MB Recommended 50 MB Supported operating systems x64 x86 GFI EndPointSecurity and GFI EndPointSecurity Agent can
25. Messages x 12 02 2013 12 19 58 CATALYST PC Installation Failed to connect to the remote registry Attempted to perform an unauthorized i 12 02 2013 12 19 54 W710 Installation The deployment was completed i 12 02 2013 12 19 54 TCOFFICESERVER Installation The deployment was completed Pe 12 02 2013 12 19 50 KPO Installation The computer is offline Pe 12 02 2013 12 19 49 W7 11 Installation The computer is offline aye A Che dJ O FON La sir ee Pale hm Screenshot 20 Deploying a policy immediately Deployment sub tab 5 2 2 Scheduled policy deployment To schedule deployment of a protection policy 1 Click Configuration tab gt Computers 2 Highlight the required target computer s If more than one deployment is required you can high light all the required target computers at once and then deploy the policies to the selected set of target computers 3 From Actions click Schedule deployment GFI EndPointSecurity 5 Managing Protection Policies 53 5chedule deployment Es ij Schedule the deployment to start at the following date and L time Date October 2011 Time 00 07 47 aa Screenshot 21 Schedule deployment options 4 From Schedule deployment dialog select the deployment date and time and click OK w Note If the target computer is offline the deployment of the relevant policy is rescheduled for an hour later GFI EndPointSecuritykeeps trying to deploy that policy every
26. Status area 4 From Agents Status confirm the successful assignment of the correct protection policy to the target computer s and that agent deployment is up to date oO Note Each agent sends its online status to the main GFI EndPointSecurity installation at regular intervals If this data is not received by the main installation the agent is considered to be offline GFI EndPointSecurity 5 Managing Protection Policies 55 w Note If a target computer is offline the deployment of the relevant policy is rescheduled for an hour later GFI EndPointSecurity keeps trying to deploy that policy every hour until the target computer is back online For more information about the agents status area refer to the Agents status view section in the Monitoring statuses chapter GFI EndPointSecurity 5 Managing Protection Policies 56 6 Customizing Protection Policies This chapter provides you with information related to modifying the settings of your pre configured protection policies This enables you to tweak settings by time as you discover new security obstacles and possible vulnerabilities Topics in this chapter 6 1 Configuring controlled device categories cece cece cece eee eee ceeeeeeeeseeseeeee 57 6 2 Configuring controlled connectivity ports c cece cece cece ceeeeeeseeeeeereee 58 6 3 Configuring power users 59 6 4 Configuring access permissions for device categories 60 6 5 Configu
27. Verifying protection policy deployment 22 c cece cece cecccccccceceeeeeettteteceees 54 5 3 1 Deployment History naano aa oaa onno aao aa oaa Doa aa Laa oaa naonao aan 55 5 3 2 Agents status aaa 55 6 Customizing Protection Policies ccc c cece cece ecceeeecceeeeetteeeeeees 57 6 1 Configuring controlled device categories U AA cc cece cece eccecceeeeeeeeeeeee 57 6 2 Configuring controlled connectivity ports 58 6 3 Configuring power users 59 6 4 Configuring access permissions for device categories 60 6 5 Configuring access permissions for connectivity ports 0000 00 c eee e cece e eee eee 63 6 6 Configuring access permissions for specific devices _ 2 2 2 2 eee eee c eee naran 65 6 7 Viewing access permissions 2 2 cece cece cece cece LLALL LALLA ALLL LLLA LLLA LLLA L Laa Laaa 68 6 8 Configuring priorities for permissions oaao an2a aaa a Loa LaaLa aa aa naano an2a 70 6 9 Configuring device blacklist ccc cc cece aao L aa LLALLA LLALLA aa aana aan 70 6 10 Configuring device whitelist 20000000000000 a 74 6 11 Configuring temporary access privileges 7 6 11 1 Requesting temporary access for a protected computer 22222 22222 7 6 11 2 Granting temporary access to a protected computer 220 222 e cece eee 79 6 12 Configuring file type filters 81 6 13 Configuring
28. and Support 149 16 Glossary A Access permissions A set of permissions access read and write that are assigned to users and groups per device category connectivity port or a specific device Active Directory A technology that provides a variety of network services including LDAP like directory serv ices Alert recipient A GFI EndPointSecurity profile account to hold the contact details of users intended to receive e mail alerts network messages and SMS messages Alerts A set of notifications e mail alerts network messages or SMS messages that are sent to alert recipients when particular events are generated Alerts administrator account An alert recipient account that is automatically created by GFI EndPointSecurity upon instal lation Automatic discovery A GFI EndPointSecurity feature to search and discover computers that were newly connected to the network at configured scheduled times BitLocker To Go A Microsoft Windows 7 feature to protect and encrypt data on removable devices C Connectivity port An interface between computers and devices Create Protection Policy wizard A wizard to guide you in the creation and configuration of new protection policies Con figuration settings include the selection of device categories and ports to be controlled and whether to block or allow all access to them This wizard also allows the configuration of file type based filters encryption permissions as
29. be installed on a machine running any of the following operating systems Microsoft Windows Server 2012 Microsoft Windows Small Business Server 2011 Standard edition Microsoft Windows Server 2008 R2 Standard or Enterprise edition Microsoft Windows Server 2008 Standard or Enterprise edition Microsoft Windows Small Business Server 2008 Standard edition Microsoft Windows Server 2003 Standard Enterprise or Web edition Microsoft Windows Small Business Server 2003 Microsoft Windows 8 Professional or Enterprise Microsoft Windows 7 Professional Enterprise or Ultimate edition Microsoft Windows Vista Enterprise Business or Ultimate edition Microsoft Windows XP Professional Service Pack 3 GFI EndPointSecurity 2 Installing GFI EndPointSecurity 21 Agent Hardware requirements Processor 1GHz processor clock speed or better RAM 256 MB minimum 512 MB recommended Hard Disk 50 MB of available space Agent Software requirements Processor 1GHz processor clock speed or better gt RAM 256 MB minimum 512 MB recommended Hard Disk 50 MB of available space Other software components GFI EndPointSecurity requires the following software components for a fully functional deployment Microsoft Internet Explorer 5 5 or higher Microsoft NET Framework 2 0 or higher Microsoft SQL Server 2000 2005 or 2008 as the backend database Note A database backend is required for
30. built GSM SMS Server gt GFI FaxMaker SMS gateway Clickatell Email to SMS service gateway Generic SMS provides gateway 7 From the Set properties for the selected SMS system area highlight the property you want to configure and click Edit Repeat this step for each SMS system property you want to modify 8 Click Format SMS message to modify the Subject and Message as required Click Save 9 Click OK 12 2 Configuring the alerts administrator account GFI EndPointSecurity enables you to configure profile accounts to hold contact details of users intended to receive e mail alerts network messages and SMS messages Upon installation GFI EndPointSecurityautomatically creates an alerts administrator account Alert administrators are not Active Directory AD users and or user groups By default GFI EndPointSecurity automatically creates the EndPointSecurityAdministrator account for alerts purposes upon installation and sets it as a member of the EndPointSecurityAdministrators notification group To configure the GFI EndPointSecurityAdministrator account GFI EndPointSecurity 12 Alerting Options 131 1 Click Configuration tab gt Options sub tab 2 From Configure click Alerting Options gt Users sub node 3 From the right pane right click EndPointSecurityAdministrator and select Properties EndPointSecurity4dministrator Properties General Working Hours Alerts Member Of
31. computers based on settings of an assigned security policy You can create as many security policies as required and each policy can contain different settings for different authorization levels Refer to the following sections for information about Assigning protection policies Deploying policies immediately Deploying policies through Active Directory GFI EndPointSecurity 3 Achieving Results 34 3 Configure protection policy settings Configure the protection policy to block removable storage devices This prevents end users from using devices that allow them to transfer data from and to a computer Refer to the following sections for information about Viewing access permissions Configuring device blacklist 4 Configure notification alerts on attempted breach of the security policy GFI EndPointSecurity can send notifications to a single or group of recipients when an end user attempts to breach a security policy This enables you to immediately take the required actions and terminate unauthorized use of removable storage devices Refer to the following sections for information about Configuring alerts Configuring alerting options Configuring alerts recipients 5 Configure temporary access for genuine use of removable storage devices If a blocking protection policy is active GFI EndPointSecurity still enables you to temporary allow access to a device to genuinely transfer data to and from a computer Refer
32. devices and connection ports when such access is normally blocked on protected target computers for a specified duration and time window User message A message that is displayed by GFI EndPointSecurity agents on target computers when devices are accessed GFI EndPointSecurity 16 Glossary 153 17 Index A access permissions 30 33 35 49 60 63 65 68 Active Directory 12 14 34 36 50 54 59 60 63 65 68 70 81 96 123 131 135 alert recipients 35 96 135 alerts 14 16 35 51 96 118 123 129 131 135 142 alerts administrator account 35 131 135 automatic discovery 40 B BitLocker To Go 13 88 C Common Issues 147 connectivity port 51 108 117 D database backend 14 22 27 37 110 126 128 device blacklist 35 70 105 device category 31 61 68 115 Device Scan 103 device whitelist 35 74 105 digest report 123 E event logging 36 51 94 F file type filters 77 81 GFI EndPointSecurity G GFI EndPointSecurity agent application management console Temporary Access tool version 11 14 16 19 21 23 25 27 29 30 33 35 37 39 42 45 51 54 55 57 60 63 65 68 70 74 77 81 83 86 88 94 96 99 100 104 106 109 113 116 118 120 123 126 129 131 135 138 140 141 143 145 147 Glossary 150 H Human Interface Devices 18 47 58 L licensing 20 25 28 143 M msi file 54 p power users 15 26 30 33 35 59 70 protection policy 13
33. eee eeeeeees 139 Screenshot 113 Advanced Options Agent Security tab 2 02 2 lec cece cece cece ee eeeees 140 Screenshot 114 Custom Messages dialog options 2 222 2 eee eee e eee cee cece cece ee ceeeeceeeeesees 141 Screenshot 115 General tab Updates 20 2 2 l a 142 Screenshot 116 Editing license key U coco ce cece cece cece cece cece eee cee eee eeeseescecseeeeeseeees 143 Screenshot 117 Computers sub tab delete computer s 2 0 eee eee eee eee cee cece ee eeeeeeeees 144 Screenshot 118 Deployment sub tab _ 22 2222 llc e eee cece cee cece ee eeeceeeeeeeees 145 Screenshot 119 Uninstallation information message Uu 146 Screenshot 120 Specifying contact and purchase details 148 Screenshot 121 Specifying issue details and other relevant information to recreate the problen 148 Screenshot 122 Gathering machine information 0 22 22 c eee eee eee cee cee cece cee ceeeeeeeseeeees 148 Screenshot 123 Finalizing the Troubleshooter wizard 2 22 2 a 148 List of Tables Table 1 Terms and conventions used in this manual 2 222 222 e cece cece ee eee eee eee 11 Table 2 GFI EndPointSecurityfeatures a 13 Table 3 Deployment and Monitoring protection policy 2 22 2 a 15 Table 4 Deployment and Monitoring protection policy a 17 Table 5 Deployment and Monitoring protection
34. events 12 Invalid password events Device mounted events Create query Actions Edit query Delete query There 1s no event selected Help Configuring and using Logs Browser Tool O Events Screenshot 86 Logs Browser sub tab To access the Logs Browser sub tab from GFI EndPointSecurity management console click Activity tab gt Logs Browser To view more details about a particular event click on the event Additional information is displayed in the events description pane at the bottom of the sub tab 8 2 4 Creating event queries To create custom event queries 1 From GFI EndPointSecurity management console click Activity tab 2 Click Logs Browser sub tab 3 In the left pane right click Agent logs database node and select Create query GFI EndPointSecurity 8 Monitoring Device Usage Activity 111 Query Builder General I Create new queres to organize in a simpler way the collected 3 events Mame sP Oe Description Select events fors4P 4 Mot Computer Equal To XP 4 Edit Delete Clear Screenshot 87 Query Builder options 4 In the Query Builder dialog specify a name and a description for the new query 5 Click Add configure the required query condition s and click OK Repeat until all required query conditions have been specified 6 Click OK to finalize your settings The custom query is added as a sub node within Agent logs database node Note Y
35. hour until the target computer is back online 5 2 3 Deploying policies through Active Directory You can create a Windows installer package msi installation file that you can then deploy through Active Directory Group Policies across target computers in your domain To create the Windows installer package 1 Click Configuration tab gt Protection Policies 2 From the left pane select the protection policy for which you want to create the Windows installer package 3 From the right pane click Deploy through Active Directory in the Deployment section 4 Key in the File name of the msi file and browse to select the destination path 5 Click Save G Note For information on how to deploy software using Active Directory Group Policies in Microsoft Windows Server 2003 and Microsoft Windows Server 2008 refer to http support microsoft com kb 816102 5 3 Verifying protection policy deployment Once a protection policy is deployed it is recommended to verify that target computers were affected by the policy Verify if the deployment was successful from GFI EndPointSecurity 5 Managing Protection Policies 54 Deployment history area Agents status area 5 3 1 Deployment History Use the information displayed in the Deployment History area to determine whether deployment for each target computer completed successfully or whether errors were encountered To view the deployment history 1 Click Status gt
36. sub tab GFI EndPointSecurity 14 Miscellaneous 143 File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General Computers LA Protection Policies Options a Mit Computers amp All computers 1s Not Controlled Computers that can be controlled ere i oli Up To Date Last Update 5 12 02 2013 12 19 44 jE TCOFFIC Deployment n Ye 12 02 2013 12 19 54 Assign policy 12 02 2013 12 19 54 Move to group Set logon credentials Set description Common tasks Delete computer s Del Create new computer group Add computer s Delete computer s without uninstall Ny a i Deploy to all computers Date Time Mees Puto discovery settings 12 02 2013 16 28 37 Computer RES EUGTEST was deleted from the computers list 12 02 2013 16 28 34 Computer GFIACCEICA 8C54 was deleted from the computers list Arima 12 02 2013 16 28 29 Computer RESEARCH 21 was deleted from the computers list 4 II Deploy now 3 Computer 5 he Screenshot 117 Computers sub tab delete computer s 3 From the right pane right click target computer that you would like to uninstall and select Deleting Computer s Deleting com GFI EndPointSecurity will deploy protection policy updates and uninstalls Agent puter s with unin stallation Deleting com GFI EndPointSecurity will deploy protection policy updates and removes the r
37. the agent on to the local computer is not up to date then manually deploy the agent on to it For more information refer to the GFI Administration and Configuration Manual Ensure that the user account with no administrative privileges is not set as a power user in the General Control protection policy shipping default protection policy O Note If the user account is set as a power user then manually remove it from the power users group of the General Control protection policy shipping default protection policy For more information refer to the GFI EndPointSecurityAdministration and Configuration Manual 2 6 2 Test case Accessing a CD DVD disc Upon compliance with the previously outlined test pre conditions non administrative users are no longer allowed access to any devices or ports connected to the local computer To verify that both the device and media are inaccessible to the non administrative user 1 Log in to the local computer as the user with no administrative privileges 2 Insert the CD DVD disc in the CD DVD drive 3 From Windows Explorer locate the CD DVD drive and confirm that you are unable to view and open the contents stored on the CD DVD disc Assign permissions to user with no administrative privileges To assign CD DVD device access permissions to the user with no administrative privileges 1 Log in to the local computer as the user with administrative privileges Launch GFI EndPointSecur
38. welcome screen 2 From Risk Assessment select unselect Start a Risk Scan to enable disable the function to start a scan on your network to determine the risk level 3 Optional Click Risk scan settings and configure settings from the tabs described below GFI EndPointSecurity 2 Installing GFI EndPointSecurity 25 Table 7 Auto Discovery settings 7 Tab Scan Area Select the target area on which GFI EndPointSecurity scans the computers on the network Current domain workgroup GFI EndPointSecurity searches for new computers within the same domain workgroup where it is installed The following domains workgroups Select this option and click Add Specify the domains where GFI EndPointSecurity searches for new computers and click OK Entire network except Select this option and click Add Specify the domain workgroup that should be excluded during auto discovery and click OK IP range Select this option and click Add Specify the range of IP addresses that should be included or excluded during auto discovery and click OK Computer list Select this option and click Add Specify the domain workgroup that should be included or excluded during auto discovery and click OK Logon Cre Enable disable Logon using credentials below and specify a set of credentials that GFI dentials EndPointSecuritywill use to access computers that will be scanned Scan Device Select the device categories that GFI EndPointSe
39. well as logging and alerting options GFI EndPointSecurity 16 Glossary 150 Database backend A database used by GFI EndPointSecurity to keep an audit trail of all events generated by GFI EndPointSecurity agents deployed on target computers Deployment error messages Errors that can be encountered upon deployment of GFI EndPointSecurity agents from the GFI EndPointSecurity management console Device blacklist A list of specific devices whose usage is blocked when accessed from all the target computers covered by the protection policy Device category A group of peripherals organized in a category Device scan A GFI EndPointSecurity feature to search for all devices that are or have been connected to the scanned target computers Device whitelist A list of specific devices whose usage is allowed when accessed from all the target computers covered by the protection policy Digest report A summary report giving an account of the activity statistics as detected by GFI End PointSecurity Event logging A feature to record events related to attempts made to access devices and connection ports on target computers and service operations File type filters A set of restrictions that are assigned to users and groups per file type Filtering is based on file extension checks and real file type signature checks G GFI EndPointSecurity agent A client side service responsible for the implementation enforcement of th
40. 18 This section graphically represents all agents deployed on network computers differentiating between those currently online and offline This selection lists Target computer name and applicable protection policy The status of the GFI EndPointSecurity Agent whether currently deployed and up to date or await ing deployment The status of the target computer whether currently online or offline To deploy pending agents 1 Select one or more computers from Agents Status 2 Right click the selected computers and select Deploy selected agent s or Schedule deployment for selected agent s 3 Click OK Note If a target computer is offline deployment is differed by an hour GFI EndPointSecurity tries to deploy that policy every hour until the target computer is back online Note Each agent sends its online status to GFI EndPointSecurity at regular intervals If this data is not received by the main application the agent is considered to be offline 9 4 Deployment status view About Deployment status view Current Deployments Queued Deployments gt Scheduled Deployments Deployment History GFI EndPointSecurity 9 Status Monitoring 119 9 4 1 About Deployment status view GFI EndPointSecurity 2013 File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General Risk Assessment Statistics Status Deployment wll Deployment S
41. 2 19 58 CATALYST PC Installation Failed to connect to the remote registry Attempted to perform an unauthorized 12 02 2013 12 19 54 W710 Installation The deployment was completed i 12 02 2013 12 19 54 TCOFFICESERVER Installation The deployment was completed Pe 12 02 2013 12 19 50 XPI Installation The computer is offline x 12 02 2013 12 19 49 W711 Installation The computer is offline UP Mid d Tie AG LU at whi CO rs gl eons i Screenshot 118 Deployment sub tab 6 From the Deployment History area confirm the successful completion of the un installation from the target computer 14 2 2 Uninstalling GFI EndPointSecurityapplication To uninstall the GFI EndPointSecurity application o Note Run the uninstaller as a user with administrative privileges on the computer 1 From the Microsoft Windows Control Panel select Add Remove Programs or Programs and Fea tures option 2 Select GFI EndPointSecurity 3 Click Change to start the un installation of GFI EndPointSecurity application 4 Click Next at the Welcome screen to continue un installation GFI EndPointSecurity 14 Miscellaneous 145 GFT EndPointSecurity 2013 agents managed by this application were found If you continue the uninstall process then those agents will not be uninstalled and will remain orphans until another EndPointSecurity 2013 main application will take the ownership Do you want to continue Screenshot 119 Uninst
42. Administrat P 5 4 8 2010 3 08 49 PM TECHCOMSERYT WO Administrak P 35 4 8 2010 3 08 42 PM TECHCOMSERYT WO 4A dministrat 4 Access allowed User Mame W TECHCOMSERYTWON Administrator Device TS5T corp OYD ROM TS L3334 ATA Device File Path E Real File Type BA Device Information Description Channel 1 Target O Lun 0 Category CD 7 OWD System Class CDROM Connectivity Port Internal a Ewents Screenshot 84 Activity Log sub tab To access the Activity Log sub tab from GFI EndPointSecurity management console click Activity tab gt Activity Log To view more details about a particular event click on the event Additional information is displayed in the events description pane at the bottom of the sub tab To customize the Activity Log sub tab to suit your company s needs right click the header and select the columns that should be added to or removed from the view To change a column s position select the column header drag and drop it at the required position 8 2 2 Advanced Filtering This feature allows you to further filter down the device usage history logs using one or more criteria from the following set Application Path File path gt Device gt Event type GFI EndPointSecurity 8 Monitoring Device Usage Activity 109 File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General ila Activity Log ilo Logs Browser Activity L
43. EE Germany ID PK Personal identity number Bund Screenshot 59 Managing templates 6 14 Configuring file options GFI EndPointSecurity enables you to specify the options required to block or allow files based on size GFI EndPointSecurity also enables you to ignore large files when checking file type and content and archived files 1 From GFI EndPointSecurity management console click Configuration tab gt Protection Policies 2 From the left pane select the protection policy for which you want to specify file options restric tions 3 From the right pane click File options in the File control section GFI EndPointSecurity 6 Customizing Protection Policies 86 File Options m z Set general options used when checking accessed files lgnore files larger than C Block files larger than Files size 2 H NOTE To improve computer perfomance you can choose to ignore large files when checking file type and content Screenshot 60 File options 4 In the File options dialog select from the following options Table 13 File options User options Ignore files larger than Ignores files larger than the specified size when checking accessed files Block files larger than Blocks files larger than the specified size when checking accessed files GFI EndPointSecurity 6 Customizing Protection Policies 87 File Options m Search inside o a fo ang Maximum archive nesting level 10 Screenshot 61 Fi
44. It also enables you to encrypt devices that are not yet secured Note For more information refer to For more information refer to Customizing Protection Policies page 57 18 Configure logging and alerting options for this policy and click Next G Note For more information refer to Configuring event logging and Configuring alerts 19 Review the summary page for information about your policy and click Finish 5 2 Assigning a Protection Policy The next step is to link the relevant set of device access and connectivity port permissions to each target computer You can do this by assigning protection policies to target computers w Note Target computers can only be assigned one protection policy at a time To assign a protection policy on to a target computer 1 From the GFI EndPointSecurity management console select Configuration 2 Click Computers 3 Highlight the required target computer s G Note If assigning the same policy to more than one target computer select all the required target computers and then specify the protection policy for the selected set of target computers GFI EndPointSecurity 5 Managing Protection Policies 51 4 From the left pane click the Assign Protection Policyhyperlink in the Actions section Assign Protection Policy T Select the protection policy General Control Lk Cancel Screenshot 19 Assign Protection Policy Options 5 In the Assig
45. OK To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 17 Configuring alerts GFI EndPointSecurity can be configured to send alerts to specified recipients when particular events are generated You can configure alerts to be sent through several alerting options and also specify the types of events for which alerts are sent You can do this on a policy by policy basis Alert recipients are not Active Directory AD users and or user groups but are profile accounts created by GFI EndPointSecurity to hold the contact details of users intended to alerts It is best to create alert recipients prior to configuring alerts For more information refer to Configuring alerts recipients page 135 To specify alerting options for users in a protection policy 1 Click Configuration tab gt Protection Policies 2 From Protection Policies gt Security select the protection policy to configure 3 From the right pane click Alerting options in the Logging and Alerting section GFI EndPointSecurity 6 Customizing Protection Policies 96 Alerting Options Filter Specify what alerts should be sent when a security event ts generated Select the alert types that should be sent Send email alerts to No Recipients Configured E a Send network message to lt No Recipients Configured C F Send SMS message to
46. Properties Working Hours Slerts Member OF pa Specify the types of alerts this user is to receive Specify at what time and through which medium should alerts be sent to this user itis ever added to a protection policy alerting options During working Outside of working Hours Hours Email alerts Network message alerts SMS alerts FE Screenshot 108 EndPointSecurityAdministrator Properties options Alerts tab 6 Click Alerts tab and select the alerts to be sent and at what time alerts are sent EndPoint5ecurtyAdministrator Properties Alerts Member bi pA Select the notification groups bo which this user belongs Member of 3a EndPoint5 ecurityAdministrators Screenshot 109 EndPointSecurityAdministrator Properties options Member Of tab GFI EndPointSecurity 12 Alerting Options 134 7 Click Member Of tab and click Add to add the user to notification group s 8 Click Apply and OK 12 3 Configuring alerts recipients GFI EndPointSecurity enables you to configure other profile accounts apart from the default GFI EndPointSecurityAdministrator account to hold the contact details of users intended to receive e mail alerts network messages and SMS messages Alert recipients are not Active Directory AD users and or user groups but are profile accounts created by GFI EndPointSecurity to hold the contact details of users intended to alerts Creating alert recipients Editing alert recipien
47. Run Type in gpedit msc Browse to Computer Configuration gt Administrative Templates gt System gt Device Installation Under the Settings tab select the Enable option 2 3 4 5 Right click Allow remote access to the PnP interface and select Properties 6 7 Click Ok to save changes 8 Restart the computer To run a device scan GFI EndPointSecurity 7 Discovering Devices 100 1 Click Scanning tab 2 From Common tasks click Options 3 From the Options dialog select Logon Credentials tab 5 Scan Device Categories Scan Ports Specify the credentials that GFI EndPointSecunty will use to A connect to computers to be scanned By default GFI EndPoint Security performs the scan using the security context of the curently logged on user You may specify an altemate set of credentials to access the computers to be scanned Logon using credentials below User name johndoe Screenshot 74 Running a device scan Logon credentials tab 4 From the Logon Credentials tab of the Options dialog select unselect Logon using credentials below to enable disable use of alternate credentials Note If you do not specify any logon credentials GFI EndPointSecurity attempts to logon the target computer using the currently logged on user GFI EndPointSecurity 7 Discovering Devices 101 LA Select which device categories should be included in the scan Select the device categories 2CD DVD Ci St
48. TS 0k Cancel Screenshot 25 Controlled connectivity ports options 5 From the Controlled connectivity ports dialog select unselect the required connectivity ports that will be controlled by the protection policy and click OK To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 3 Configuring power users GFI EndPointSecurity enable you to specify Active Directory AD users and or user groups as power users Power users are automatically given full access to devices connected to any target computer GFI EndPointSecurity 6 Customizing Protection Policies 59 covered by a protection policy You can define sets of power users on a policy by policy basis You should exercise caution when using this feature since incorrectly specifying a user as a power user will lead to that user overriding all restrictions of the relevant protection policy To specify power users of a protection policy 1 Click Configuration tab gt Protection Policies 2 From Protection Policies 5 Security select the protection policy to configure 3 From the right pane click Power users in the Security section Power Users Power Users devices connected to the computers protected by this protection g Select the users to whom pou want to grant full access to the ah policy
49. a security event ts generated Select the alert types that should be sent 2 Send email alerts to EndPoint5 ecurty Administrator oes Send network message to lt No Recipients Configured Configure Screenshot 99 Digest Report options General tab 3 From the General tab of the Digest Report dialog select unselect the preferred alerting method 4 For each alert type selected click Configure to specify the user s group s to whom the alert is sent GFI EndPointSecurity 10 Reporting 124 Digest Report General FE Specify the report content and how frequent to be sent Select what to be included in the report content FI General Status ai Device Usage by Device Type Device Usage by Connectrvity Port Fy File Usage on Storage Devices Select how frequent the reports are sent O Daily Weekly O Monthly Screenshot 100 Digest Report options Details tab 5 Click Details tab to select unselect report content items to include in the digest report 6 Select the sending frequency of the report from Daily Weekly or Monthly 7 Click Apply and OK GFI EndPointSecurity 10 Reporting 125 11 Managing the Database Backend This chapter provides you information related to managing and maintaining the database where data gathered by GFI EndPointSecurity is stored After installing GFI EndPointSecurity you can choose to Download and install an instance of Microsoft SQL Server Express Edition an
50. abase GFI EndPointSecurity keeps an audit trail of these logs and provides the information in a set of dashboard views GFI EndPointSecurity s extensive dashboard views enable you to monitor network activity in real time allowing the administrator to take immediate action when a security risk is detected Configure GFI EndPointSecurity to periodically daily weekly monthly generate and send reports to IT and management staff for a full analysis view of endpoint security statuses Ej 1 Analyze network wide activity The sub tabs provided under the Status and Activity tabs enable you to monitor network activity from a central location These tabs provide you with risk assessment statistics statuses activity logs and deployment information using charts and tables Refer to the following sections for information about Analyzing risk assessment details Analyzing statistics Analyzing agent deployment details Analyzing activity logs 2 Generate reports based on activity logs generated by agents on the network GFI EndPointSecurity contains an extensive list of reports that can be used as they are or even modified to further suit your reporting requirements The ReportPack contains both technical reports for IT staff as well as executive reports for management purposes Refer to the following sections for information about Using GFI EndPointSecurity ReportPack Generating digest reports 3 Maintain the database backend
51. actor level The current encryption status on the endpoint The file type checking feature status The content checking feature status 9 2 Statistics view Use the Statistics sub tab to view the daily device activity trends and statistics for a specific computer or for all network computers GFI EndPointSecurity 9 Status Monitoring 115 GH EndPointSecurity 013 File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General Risk Assessment Statistics Status Deployment wl Statistics Monitor the device usage aggregated for all computers or select individual computers from the list below Select a computer to view its statistics All Computers Protection Status 20 15 10 5 0 12 00 AM 4 00 AM 8 4 00 PM 8 00 PM 12 00 AM Device Usage by Device Type Device Usage by Connectivity Port Tupe Allowed Blocked Hi Tupe Allowed Blocked lt 3 Floppy Disks 2161 2 558 F USB Si CD DVD 397 7 292 Firewire co Storage Devices 223 92 17 PCMCIA Printers o o Bluetooth PDAs gt Serial amp Parallel a Network Adapters T Infrared o Moderns Secure Digital 50 1 143 Si Imaging Devices B pi Internal 1 865 364 Human Interface Devices a II 4 I Screenshot 89 Statistics sub tab To access the Statistics sub tab from GFI EndPointSecurity management console click Status tab gt Statistics The Statistics section contains information about Protect
52. agent deployment NZA I GFI RESVM General Control No Pending agent deployment N A IR NICKATESTAUZ General Control No Pending agent deployment N A iy NICKATESTAUS General Control No Pending agent deployment N A ak mre miiectrre ts a ad Fl ll Ri nw kh et J Ma mee aeaa A EI Ffi Screenshot 93 Status sub tab This section lists Q The operational status of GFI EndPointSecurity management console service The user account under which the GFI EndPointSecurity service is running The time when the service was last started This section lists The operational status of the database server currently used by GFI EndPointSecurity The name or IP address of the database server currently used by GFI EndPointSecurity The name of the database where GFI EndPointSecurity is archiving events To modify any of the current database settings click Configure database This launches the Database Backend dialog For more information refer to Managing the Database Backend page 126 This section lists The operational status of the alerting server currently used by GFI EndPointSecurity The name or IP address of the alerting server currently used by GFI EndPointSecurity To modify any of the current alerts related settings click Configure alerting This launches the Alerting Options dialog For more information refer to Configuring alerts page 96 GFI EndPointSecurity 9 Status Monitoring 1
53. allation information message Note If any agents are still installed an information dialog is displayed asking you whether you would like to continue the agents will remain installed and orphans or stop the un installation process For more information about uninstalling agents refer to the Uninstalling GFI EndPointSecurity agents section in this chapter 5 Select Uninstall without deleting configuration files or Complete uninstall option and click Next to continue 6 Upon completion click Finish to finalize un installation 14 3 Product version information GFI Software Ltd releases product updates which can be manually or automatically downloaded from the GFI website To check if a newer version of GFI EndPointSecurity is available for download 1 Click General tab 2 From the left pane select Version Information 3 From the right pane click Check for newer version to manually check if a newer version of GFI EndPointSecurity is available Alternatively select Check for newer version at startup to auto matically check if a newer version of GFI EndPointSecurity is available for download every time the management console is launched GFI EndPointSecurity 14 Miscellaneous 146 15 Troubleshooting and Support This chapter explains how to resolve any issues encountered during installation of GFI EndPointSecurity The main sources of information available to solve these issues are This section and the rest of GFI
54. an either select a device with all its serials or else select some of the serials associated with the device Vendors list Devices list Vendors a Device description Device c lt All devices L c39 Floppy disk drive Floppy Disks vendor ID 0409 sa Generic USB Storage CFC USB Device Storage Devices Vendor ID Daec a Ca JetFlash TSS 12MIFZB 2L USB Device Storage Devices Vendor ID Deal C 23 M5 QDYD ROM CO DVD vendor ID ms eel NEC USB UFOOOx USE Device Floppy Disks Vendor ID samsung 3 SAMSUNG CD ROM SC 1454 CO DD Add New Device Screenshot 46 Select Devices options GFI EndPointSecurity 6 Customizing Protection Policies 75 5 In the Select Devices dialog enable or disable the devices to add to the whitelist from the Devices list and click Next Note If a required device is not listed click Add New Device to specify the details of the device you want to add to the whitelist and click OK Select Devices Select device serials Add to blacklist only devices with the specified serials All serials Only selected serials Device description Device category Product ID Serial c3 Floppy disk drive Floppy Disks MILE lt All serials gt lt Back Finish Cancel Screenshot 47 Select Devices options Select device serials 6 Select the required serials related option from All serials to whitelist all serial numbers of a specific device Click Finish and OK Only selecte
55. as completed Installation Installing the protection agent lnstallation Installing the deployment service Installation Copying the setup files Installation Freparing tiles Installation Collecting information Installation Checking if the computer is online Un inskallation The ur installation was completed In inetallatinn In inetallina the nmtechan anent mi ME bd This section displays an audit trail for all stages of all agent or protection policy deployments carried out by GFI EndPointSecurity The information provided includes the timestamp of each log entry the computer name deployment type and errors and information messages generated during the deployment process For more information refer to Troubleshooting and Support page 147 To remove displayed log entries right click in the Deployment History area and select Clear all messages GFI EndPointSecurity 9 Status Monitoring 122 10 Reporting The GFI EndPointSecurity GFI ReportPack is a fully fledged reporting add on to GFI EndPointSecurity This reporting package can be scheduled to automatically generate graphical IT level and management reports based on data collected by GFI EndPointSecurity giving you the ability to report on devices connected to the network device usage trends by machine or by user files copied to and from devices including actual names of files copied and much more Topics in this chapter 10 1 GFI EndPointSecurity
56. ata and intellectual property Get distracted during work hours In an attempt to control these threats organizations have started to prohibit the use of personally owned portable devices at work Best practice dictates that you must never rely on voluntary compliance and the best way to ensure complete control over portable devices is by putting technological barriers 1 2 About GFI EndPointSecurity GFI EndPointSecurity is the solution that helps you maintain data integrity by preventing unauthorized access and transfer of content to and from the following devices or connection ports USB Ports example Flash and Memory card readers pen drives Firewire ports example digital cameras Firewire card readers Wireless data connections example Bluetooth and Infrared dongles Floppy disk drives internal and external Optical drives example CD DVD Magneto Optical drives internal and external Removable USB hard disk drives Other drives such as Zip drives and tape drives internal and external Through its technology GFI EndPointSecurity enables you to allow or deny access and to assign full or read only privileges to Devices example CD DVD drives PDAs Local or Active Directory users user groups With GFI EndPointSecurity you can also record the activity of all devices or connection ports being used on your target computers including the date time of usage and by whom the devices were
57. ates automatically When the application starts up Installation Install updates automatically Notifications Show messages in the application Send alerts to the GFI EndPointSecunty Administrator user Check for updates 3 From the right pane configure the options described below Table 18 Update options Check for updates auto matically Install updates automatically Show messages in the appli cation Send alerts to the GFI End PointSecurityAdministrator user Check for updates GFI EndPointSecurity Connect to the GFI update servers and download product updates automatically Select When the application starts up or specify a day and time when to check and download updates If an update is found GFI EndPointSecurity will download and install the update auto matically If an update is found and installed a message is displayed in GFI EndPointSecurity application Once an update is downloaded and installed an email message is sent to the GFI End PointSecurity Administrator For more information refer to Configuring the alerts administrator account page 131 Click the link to instantly run the GFI EndPointSecurity updates engine download and install any missing updates 13 Configuring GFI EndPointSecurity 142 14 Miscellaneous The miscellaneous chapter gathers all the other information that falls outside the initial configuration of GFI EndPointSecurity Topics in this chapter 14 1 Produ
58. atus i e whether the computer is included in a GFI EndPointSecurity protection pol icy Total number of devices currently and historically connected Number of devices currently connected If a scanned target computer is not included in any GFI EndPointSecurity protection policy you can choose to deploy a protection policy to the computer To do this 1 Right click on the relevant computer name IP address under Computer column and select Deploy agent s 2 Select the protection policy to deploy Click Next to continue and Finish to start deployment 7 2 2 Devices list Devices lis Device Name Device Description Connected Device Category Connection Port Vendor ID Floppy disk drive Tes Floppy Disks Internal cs Matt Virtual CDROM Yes CD 7 DVD Internal matt Screenshot 78 Devices list area This section displays a detailed list of discovered devices for every scanned computer including Device name description and category Connectivity port Connection status i e whether the device is currently connected or not 7 3 Adding discovered devices to the database You can select one or more of the discovered devices from the Devices list and add them to the devices database These devices are then retrieved from this database whenGFI EndPointSecurity GFI EndPointSecurity 7 Discovering Devices 104 lists the devices currently connected to the target computers for the blacklist and whitelist For informati
59. central database is not configured no logging will be made Screenshot 69 Logging Options General tab 4 In the Logging Options dialog click General tab 5 Enable or disable the locations where to store events generated by this protection policy Log events to the you can view events through the Windows Event Viewer of every target computer or through GFI Windows Security EventsManager after they are collected in a central location Event Log Log events to the you can view the events within the Logs Browser sub tab in the GFI EndPointSecurity management central database console This option requires the configuration of a central database For more information refer to Managing the Database Backend page 126 If both options are enabled then the same data is logged in both locations GFI EndPointSecurity 6 Customizing Protection Policies 95 Logging Options General Filter ial Please specity the event types that should be logged Select what events should be logged on the computers contained in this protection policy a Service events E Device connected events 12 Device disconnected events ia Access allowed events la Access denied events P Encryption events Fd dq OK Cancel Screenshot 70 Logging Options Filter tab 6 Select Filter tab and select any of the following event types to log by this protection policy Click
60. ck Save Alerting Options Email Network EA af Specify the network settings to use when sending network alerts Specify the network message settings to use when sending net send alerts to the computers used by the administrators of the machines which triggered any monitoring alerts Format network message Network messages can be sent to both computers and users In the case of users the user must be logged on so as to successtully receive the message For both computers and users the messenger service must be enabled and started 0k Cancel Apply Screenshot 104 Alerting Options Network tab 5 Click Network tab 5 Format network message to edit the network message Click Save GFI EndPointSecurity 12 Alerting Options 130 Alerting Options Email Network 55 kaa Specify settings for available SMS systems through which 5 M5 alerts will be sent Select SMS In built GSM SMS Server Set properties for the selected SMS system Property Service Center Nu COM Port Baud Fate Initialization String Optional settings Format SMS message 0k Cancel Apply Screenshot 105 Alerting Options SMS tab 6 Click SMS tab and from the Select SMS drop down menu select the SMS gateway you want to use Supported SMS systems include gt n
61. content awareness cece cece cece cece ee eceeceeeececeeeteceeeetteeseees 83 6 13 1 Managing content awareness options 83 6 13 2 Managing template options e eee ceccccccceeeeeeteeteeeeeeees 85 6 14 Configuring file options LL e cece cece eee cceeeeeteeececeeeecseeeseteees 86 6 15 Configuring security encryption _ 2 200 c cece LLALLA DLLD LAAL aa oaa aan a 88 6 15 1 Configuring Microsoft BitLocker To Go devices 88 6 15 2 Configuring Volume Encryption oo c cece cece cece cece Laa aaa aana anaana 90 6 16 Configuring event logging 94 6 17 AN 96 6 18 Setting a policy as the default policy c cece ccccceceeteteeceees 99 7 DISCOVEFING DEVICES osetin abad AG atest Aba ana Ga BG BB Sect nati sna PA ba donee 100 7 1 Running a device scan cece aa oaao aa cece ce eeeteeeececeeeeceeeeetttecccccceeeeeeesenes 100 7 2 Analyzing device scan results 1100 0 cece ccc cece cece LaaLa DLADLA LLLA LLLA LL aa nanona 103 Ta BA COMDUCET S ev akma a OD AGE ga a aata aa Oe nT 104 7 2 2 DEVICES N E A e ES 104 7 3 Adding discovered devices to the database 0 000000000 0000000000 e ec cccccceeeeeeeeees 104 8 Monitoring Device Usage Activity cec ee cece cece 0a 2o22 2222an 106 S CS AA 106 8 1 1 Protection Status 2 20000 clic cece ccc eee aa 107 8 1 2 Device Usage by DeviceType oii c cece cece eceeeecceceeecceeeeeesees 107 8 1 3 Device Usage by ConnectivityPort
62. creenshot 42 Select Devices options 5 In the Select Devices dialog enable or disable the devices to add to the blacklist from the Devices list and click Next Note If a required device is not listed click Add New Device to specify the details of the device you want to add to the blacklist and click OK GFI EndPointSecurity 6 Customizing Protection Policies 72 Select Devices Select device serials Add to blacklist only devices with the specified serials All serials Only selected serials Device description Device category Product ID Serial c3 Floppy disk drive Floppy Disks MG cell serials gt lt Back Cancel Screenshot 43 Select Devices options Select device serials 6 Select the required serials related option from All serials to blacklist all serial numbers of a specific device Click Finish and OK Only selected serials to specify particular device serial number s to be added to the blacklist Next highlight the device and click Edit to specify the serial number s Click OK Finish and OK GFI EndPointSecurity 6 Customizing Protection Policies 73 Select Devices Select device serials Add to blacklist only devices with the specified serials All serials Only selected serials Product ID Serial 228 Floppy disk drive Floppy Edit Device serials 5 Floppy disk drive Custom serial Select the senals Mf Daec3260000001 a00 Devic
63. ct licensing cece eee eee e cee eee cee e cece seen eeesseeeeeeseenseenees 143 14 2 Uninstalling GFI EndPointSecurity 2 22 0222 o eee cece cence eee eect cece e eee eeceeseeeeeeeeee 143 14 3 Product version information 146 14 1 Product licensing After installing GFI EndPointSecurity you can enter your license key without re installing or re configuring the application To enter your license key 1 Click General tab 2 From the left pane select Licensing Screenshot 116 Editing license key 3 From the right pane click Edit 4 In the License Key text box key in the license key provided by GFI Software Ltd 5 Click OK to apply the license key 14 2 Uninstalling GFI EndPointSecurity GFI EndPointSecurityenables you to easily uninstall both the GFI EndPointSecurity agents and the GFI EndPointSecurity application This chapter covers the following topics Uninstalling GFI EndpointSecurity agents Uninstalling GFI EndpointSecurity application 4 Warning GFI EndPointSecurity agents are not uninstalled automatically during the un installation of the GFI EndPointSecurity application It is best that first you uninstall the GFI EndPointSecurity agents and next the GFI EndPointSecurity application 14 2 1 Uninstalling GFI EndPointSecurityagents To uninstall a GFI EndPointSecurityagent 1 From the GFI EndPointSecurity management console click Configuration tab 2 Click Computers
64. ctivity tab to monitor device usage across the network and logged events for a specific computer or for all network computers The Activity section contains information about Activity Log Advanced Filtering Logs Browser Creating event queries 8 2 1 Activity Log This sub tab allows you to monitor the devices in use on the network Select the computer and or user from the relevant drop down lists to filter the Activity Log list by computer and or by user In addition this tab allows you to further filter down the list by the provided time filters GFI EndPointSecurity 8 Monitoring Device Usage Activity 108 GFI EndPointSecurity 2013 uy 5 5 58B Wa File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General ita Activity Log Ha Logs Browser 5 O Activity Log Monitor the use of devices across the network Select or type the computer name Select or type the user name Timetrame All Computers w All Users Advanced filtering Time Description 5 4 8 2010 4 02 24 PM TECHCOMSERYT WO Administrat 35 4 8 2010 4 01 28 PM TECHCOMSERYT WO Administrak 5 47872010 4 01 25 PM TECHCOMSERYT WO Administrak P 5 47872010 4 01 25 PM TECHCOMSERYT WO Administrat P pi 44872010 3 53 57 PM TCOOMAINA administrator on com pi 4072010 3 12 28 PM TCDOMAINA administrator on com 35 4 8 2010 3 12 06 PM TECHCOMSERYT WO AA dmintstrak P 5 4 8 2010 3 12 02 PM TECHCOMSERYT WO
65. curitywill include in the scan Categories Scan ports Select the device connection ports that GFI EndPointSecuritywill include in the scan Click Apply and OK to close the Risk Assessment dialog and click Next at the Quick Start Wizard From Auto Discovery select unselect Enable Auto Discovery to turn on off auto discovery When Auto Discovery is enabled GFI EndPointSecurity periodically scans your network for new computers Select unselect Install agents on discovered computers to turn on off automatic deployment of GFI EndPointSecurity Agents on newly discovered computers Optional Click Auto discovery settings and configure settings from the tabs described below Table 8 Auto Discovery settings 10 11 Tab Auto Dis Enable disable auto discovery and configure a schedule when GFI EndPointSecurity scans your network for covery new computers Discovery Select where GFI EndPointSecurity searches for new computers Select from Area Current domain workgroup GFI EndPointSecurity searches for new computers within the same domain workgroup where it is installed The following domains workgroups Select this option and click Add Specify the domains where GFI EndPointSecurity searches for new computers and click OK Entire network except Select this option and click Add Specify the domain workgroup that should be excluded during auto discovery and click OK Actions Configure the actions taken by GFI EndPointSecur
66. d ab Secure Digital 50 e Internal lt Back Ned Cancel Screenshot 52 Grant temporary access options Device categories and connection ports 5 Enable the required device categories and or connection ports from the list to which you will be granting temporary access and click Next Grant temporary access Time restrictions Specify the time restrictions For this temporary unlock The code will unlock the usage of devices For The unlock code can be activated only in the Following interval di 812010 w 5 36 48 PM 2 4 812010 s 6 36 46 PM Wote The unlock key can t be activated outside the interval specified above lt Back Med Cancel Screenshot 53 Grant temporary access options Time restrictions 6 Specify the duration during which access is allowed and the validity period of the unlock code and click Next GFI EndPointSecurity 6 Customizing Protection Policies 80 7 Take note of the Unlock code generated Communicate the code to the user requesting tem porary access and click Finish 6 12 Configuring file type filters GFI EndPointSecurity enables you to specify file type restrictions on files such as DOC or XLS files being copied to from allowed devices You can apply these restrictions to Active Directory AD users and or user groups You can do this on a policy by policy basis Filtering is based on file extension checks and real file type signature checks Real f
67. d serials to specify that only particular device serial number s are to be added to the whitelist Next highlight the device and click Edit to select the serial number s to white list Click OK Finish and OK GFI EndPointSecurity 6 Customizing Protection Policies 76 Select Devices Select device serials Add to blacklist only devices with the specified serials CO All serials Only selected serials Product ID Serial 228 Floppy disk drive Floppy Edit Device serials 5 Floppy disk drive Custom eral Select the serials Qaecs2Z 60000001 a00 Device description Device category Screenshot 48 Select Devices options Edit Device serials To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 11 Configuring temporary access privileges GFI EndPointSecurity enables you to grant temporary access to users This enables them to access devices and connection ports on protected target computers for a specified duration time window You can do this on a policy by policy basis When temporary access is granted any permissions and settings e g file type filters set in the protection policy applicable for the target computer are temporarily overridden For more information refer to How GFI EndPointSecurityworks Temporary Access page 17 m Requestin
68. d to automatically create a database for GFI EndPointSecurity This can be done through the Quick Start wizard Connect to an available Microsoft SQL Server instance and connect to an existing database or else create a new one This can be done through the Quick Start wizard the General Status or the Options sub tabs Topics in this chapter 11 1 Maintaining the database backend i eee cece eee eee cece eee aLaaa anaana oaan naa 126 11 2 Using an existing SQL Server instance ieee eee eee eee eee ee eee eee eee ceeeeeeeeseeeees 128 11 1 Maintaining the database backend Periodical database maintenance is essential in order to prevent your database backend from growing too much GFI EndPointSecurity provides you with the facility to configure parameters that automatically maintain your database backend To configure database backend maintenance 1 Click Configuration tab gt Options sub tab 2 From Configure select Database Backend 3 From the right pane click Database maintenance GFI EndPointSecurity 11 Managing the Database Backend 126 Maintenance Maintenance z IF pou need to limit the size of the database backend you can select to delete events penodically Configure how often you want to delete events from the backend database to limit its size Database maintenance options Never delete events Backup events older than the specified period Delete events older than t
69. dPointSecurity 6 Customizing Protection Policies 65 1 Click Configuration tab gt Protection Policies From Protection Policies 5 Security select the protection policy to configure Click Security sub node A U N From the left pane click Add permission s in the Common tasks section Add permissions Control entities Specify For which type of item do you want to setup the permissions For Add permissions For Device categories e g Floppy disks Storage devices Connectivity ports e g USB Firewire z Back Cancel Screenshot 34 Add permissions options Control entities 5 In the Add permissions dialog select Specific devices and click Next GFI EndPointSecurity 6 Customizing Protection Policies 66 Add permissions Specific devices Select the devices For which to setup the permissions Vendors list Devices list Vendors Device description lt All devices gt Floppy disk drive Vendor ID samsung a Generic USE Storage CFC USE Device Vendor ID ms ee JetFlash 1551 MJP2B L USB Device Vendor ID Deal0 ams CIDVD ROM Vendor ID Daec L ee NEC USB UFOOOs USE Device vendor ID 0409 F SAMSUNG CD ROM SC 1464 Screenshot 35 Add permissions options Specific devices 6 Enable or disable the required devices from the Devices list for which to configure permissions and click Next If a required device is not listed click Add New Device to specify the details of t
70. devices such as iPods USB devices and smartphones has increased the risk of deliberate and or unintentional data leaks and other malicious activity It is very simple for an employee to copy large amounts of sensitive data onto an iPod or USB stick or to introduce malicious and illegal software onto your network through these devices GFI EndPointSecurityquickly and easily helps you combat these critical threats without needing to lock down all ports and disturbing your daily operations Topics in this chapter Tel acl En Ce Al NAA 11 1 2 About GFI EndPointSecurity 02 02 2 eee aoaaa a LaaLa aLa LLa eee eee DALALDALA DALLAL oaaao aLa aaa 12 1 3 Components of GFI EndPointSecurity coe cece cece ee cee cece cece eee ceeeeceeseeeesseeeeeees 12 1 4 Key Features cece cece eee cece eee e cece cee eens eee e eee ceeeeeeeeeeeseeseeeseerteenees 13 1 5 How GFI EndPointSecurity works Deployment and Monitoring 22 22 eee cece cece eeeee 14 1 6 How GFI EndPointSecurity works Device ACCESS ee eee eee cee cece e cece cee ceeceecceeseeseees 16 1 7 How GFI EndPointSecurityworks Temporary Access 17 1 8 Supported device categories 18 1 9 Supported connectivity ports 19 1 10 Navigating the Management Console 2 22 c occ cece cece cee cece cece cece ce eceeecceeeeeeeee 19 1 0 1 Terms and conventions used in this guide Table 1 Terms and conventions used in this manual O Additional infor
71. dministrator account setup 2 2 24 GFI EndPointSecurity installation license key details 24 Navigating GFI EndPointSecurity user interface 0 0 0 22 2 e eee eee eee 28 Selecting control entities 31 Selecting device categories to assign permissions _ 2 22 22 cece eee cee cee cece ec eeceeeeees 31 Adding users Or groups 2 a 32 Selecting permission types per user Or groyp _ 22 222 eee eee ee eee eee cece eee eeeeeeeees 32 Adding computers manually 2 2 222 22 e eee eee eee cece cece cece ee ceeeecceeeeeerseeees 38 Auto Discovery options Auto Discovery tab e eee ee eee eee cee cece cee eeeeeee 40 Auto Discovery options Discovery Area tab 022 222 eee eee eee cee cece cee eeeeeee 41 Auto Discovery options Actions tab _ 0 2 22 lice e cece cece cece eee eceeeeceeeeees 42 Logon Credentials dialog options _ 2 22 22 l eee eee cece eee cece eee e cece cece ceeeeeeeeeees 43 Creating a new policy General settings 45 Creating a new policy Controlled Categories and Ports settings 46 Controlled Device Categories options AA 47 Controlled connectivity ports options a 48 Creating a new policy Global Permissions settings 22 2 22222 e eee eee eee cece eee 49 Assign Protection Policy Options 022 222 cece eee cece cence eee e cee ceeeeeeeeeeeees 52 Deploying a policy i
72. duce your data leakage risk level Computer Name Status m ENDPOINT Unprotected TCOFFICESER VER Unprotected Protect computers Show scan details rr A N W710 Unprotected 7 k W7 07 Protected ARIELLETESTOS Offline CATALYST PC Offine EUGENIA TEST Dffline ng GFI CCEICA78C54 Offline Summary of last assessment Protected by GFI EndPointSecurity IL GFI RESDUAL Offline iL GFI RESVM Offline Time 30 01 2013 10 59 MiA 75 00 95 in Target o Current Domain Worl baat F ro t EC te d i 6 2 5 ii bl G NICKATEST ALI 5 O Hiline Successful scans 4 RESEARCH O1 Offline Protected endpoints 1 i RESEARCH V5 Offline Unprotected endpoints 3 I RES EUGTEST Offine Devices discovered View device usage statistics Device Threat Level Device Usage 6 Selected endpoint details O Low 83 33 36 Floppy Disks W7 07 Protected Risk level Medium Co Medium 13 04 CD DVD Risk factors 7 A High 3 62 Storage Devices High threat devices found Control device Printers i i PDA Devices Encryption disabled Enable Network Adapters File type checking Enable Modems faked chechi pi a Imaging Devices Enable Human Interface Devices Other Devices NICKATESTAL2 Offline a a a pa aaa aa GG AE Screenshot 88 Risk Assessment sub tab To access the Risk Assessment sub tab from GFI EndPointSecurity management console click Status tab 5 Risk Assessment Description This section shows The gauge show
73. e Directory or other deployment deployment options An MSI file will contain all the security settings configured in a particular protection policy through MSI Agent Agent management functions such as update and un install are protected by a user configurable pass management word This means that any other GFI EndPointSecurity instances will not have access to the agent man password agement options Device The GFI EndPointSecurity engine can be used to scan and detect the presence of devices on the net discovery work even on computers that are not assigned any protection policy The information gathered about detected devices can then be used to build security policies and assign access rights for specific devices Logs An in built tool allows the administrator to browse logs of user activity and device usage that is detected browser by GFI EndPointSecurity Alerting GFI EndPointSecurity allows you to configure e mail alerts network messages and SMS messages that can be sent to specified recipients when devices are connected or disconnected when device access is allowed or blocked and upon service generated events Custom When users are blocked from using devices they are shown popup messages explaining the reasons why messages the device was blocked GFI EndPointSecurity allows the customization of these messages Database To maintain the size of the database backend GFI EndPointSecurity can be set to backup or delete maintenance ev
74. e description Device category Screenshot 44 Select Devices options Edit Device serials To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 10 Configuring device whitelist GFI EndPointSecurity enables you to specify which device s can be accessed by everyone The whitelist is granular so you can even whitelist a specific device with a specific serial number You can do this on a policy by policy basis For an updated list of devices currently connected to the target computers run a device scan and add the discovered devices to the devices database prior to configuring whitelisted devices For more information refer to Discovering Devices page 100 To add whitelist devices to a protection policy 1 Click Configuration tab 5 Protection Policies 2 From Protection Policies gt Security select the protection policy to configure 3 From the right pane click Devices WhiteList in the General Control section GFI EndPointSecurity 6 Customizing Protection Policies 74 white list n ng Specify which are the devices that should be accessible to a everone Devices list Device Description Device category Product Remove Screenshot 45 White list options 4 In the Whitelist dialog click Add to select devices to add to the whitelist Select Devices Select Devices 7 You c
75. e protection pol icies on the target computer s GFI EndPointSecurity 16 Glossary 151 GFI EndPointSecurity application A server side security application that aids in maintaining data integrity by preventing unauthorized access and transfer of content to and from devices and connection ports GFI EndPointSecurity management console The user interface of the GFI EndPointSecurity server side application GFI EndPointSecurity Temporary Access tool A tool which is available on the target computers It is used by the user to generate a request code and later to enter the unlock code in order to activate the temporary access once it is granted by the administrator Upon activation the user will have access to devices and con nection ports when such access is normally blocked on his protected target computer for the specified duration and time window Global permissions A Create Protection Policy wizard step that prompts the user to either block or else to allow access to all devices falling in a category or which are connected to a port of the target com puters covered by the protection policy GPO See Group Policy Objects Group Policy Objects An Active Directory centralized management and configuration system that controls what users can and cannot do on a computer network Human Interface Devices A specification that is part of the universal serial bus USB standard for a class of peripheral devices These devices suc
76. e the scan is complete Use the Scanning tab to scan target computers and discover connected devices By default GFI EndPointSecurity scans all supported device categories and connectivity ports A discovered target computer can be any computer on the network and may not be included in any GFI EndPointSecurity protection policy The device scan must be executed under an account that has administrative privileges over the target computer s Topics in this chapter 7 1 Running a device scan a 100 7 2 Analyzing device scan results ccuscccascacecinaceuuveredancenscesdsendiiee gatas tae ciebancegucsaseewnenaeendeas 103 7 3 Adding discovered devices to the database 0 0 0 cece cece cece ccecececeeeceecceeceeees 104 7 1 Running a device scan Running a device scan is essential in order to discover new devices GFI EndPointSecurity enables you to search for new devices that are connected to your target computer This enables you to add new devices as soon as they are detected on it G Note A new security policy has been introduced in Microsoft Vista Microsoft Windows 7 and Microsoft Windows 2008 which needs to be enabled in order for the GFI EndPointSecurity device scanner to enumerate the physical devices located on the machine To enable remote access to the Plug and play interface 1 Logon to the Microsoft Windows Vista 7 or Server 2008 computer with administrative privileges Click Start 5
77. ected to target computers protected by this policy To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 2 Configuring controlled connectivity ports GFI EndPointSecurity enables you to select which supported connectivity ports should be controlled or not by a protection policy You can do this on a policy by policy basis GFI EndPointSecurity 6 Customizing Protection Policies 58 w Note Unspecified ports will be fully accessible from the target computers covered by the protection policy As a result GFI EndPointSecurity cannot monitor and block devices connected to a port that is not controlled by the protection policy To configure which ports will be controlled by a specific protection policy 1 Click Configuration tab gt Protection Policies 2 From Protection Policies gt Security select the protection policy to configure 3 Click Security 4 From Common tasks click Edit controlled ports Controlled connectivity ports Controlled connectivity ports a Select which connectivity ports should be controlled by this mag ECWrky policy Devices list v USB I Firewire NG PCMCIA Fi EJ Bluetooth 2 Serial amp Parallel T Infrared B Secure Digital SD E Internal NOTE 4 non controlled connectivity port is fully accessible by all LIS
78. ed to protect and encrypt data on removable devices GFI EndPointSecurity performs checks on real file types encrypted with Windows 7 BitLocker To Go Device The administrator can define a list of specific devices that are permanently allowed and others that are whitelist permanently banned and blacklist GFI EndPointSecurity 1 Introduction 13 GFI EndPointSecurity features Power users The administrator can specify users or groups who would always have full access to devices that are otherwise blocked by GFI EndPointSecurity Temporary The administrator is able to grant temporary access to a device or group of devices on a particular com access puter This feature allows the administrator to generate an unlock code that the end user can use to obtain a time limited access to a particular device or port even when the GFI EndPointSecurity agent is not connected to the network Status The dashboard s user interface shows the statuses of live and deployed agents database and alerting dashboard servers the GFI EndPointSecurity service as well as statistical data with charts The main application keeps track of the live agent status by communicating with its deployed agents Maintenance tasks are performed automatically once an agent goes online Active From the GFI EndPointSecurity management console it is possible to generate MSI files that can be later Directory deployed using the Group Policy Object GPO feature within the Activ
79. ee e cence ceeseeeseeseeseeees 135 12 4 Configuring groups of alert recipients 02 22 22 eee eee eee eee eee cece aa anoano naa 135 12 1 Configuring alerting options GFI EndPointSecurity allows you configure the following alerting options The mail server settings sender details and email message that are used when email alerts The network message to use when sending network alerts The SMS gateway and SMS message that is used when sending SMS alerts To configure alerting options 1 Click Configuration tab gt Options sub tab 2 From Configure right click Alerting Options node and select Edit alerting options Alerting Options Email N etwork 5 F Sal j Speci the mail server settings to use when sending email alerts Specify one or more mail servers to use when sending email alerts in order of priority The alternative mall servers will only be used when mail servers with higher priority cannot be contacted or return errors Add Remove Format Email Message ok Cancel Appl Screenshot 103 Alerting Options Email tab GFI EndPointSecurity 12 Alerting Options 129 3 From Email tab click Add to specify your mail server settings Click OK to close the Mail server properties dialog 4 To edit the email message click Format Email Message modify the Subject and Message fields as required and cli
80. egory or connectivity port is not set to be controlled by the particular security policy the relevant permission is disabled For more information refer to Configuring controlled device categories or Configuring controlled connectivity ports To view all permissions assigned to users in a protection policy 1 Click Configuration tab gt Protection Policies 2 From Protection Policies gt Security select the protection policy to configure 3 Click Security In the right pane you can view all the set permissions for this protection policy GFI EndPointSecurity 6 Customizing Protection Policies 68 GFI EndPointSecurity 2013 File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General X Computers 5 Protection Policies Options Protection Policies i A The protection policy updates are not yet applied on all computers Click here to deploy the protection policy updates CTRL D Ef General Control i Security amp Security g Policy T oem Specify the users and groups that are allowed to access the devices blocked by this protection policy El 22 Users Floppy Disks CD DVD iar Storage Devices A Printers Common tasks PDA Devices Pr E Network Adapters pemissionls Mod Add local domain users groups am NO Grant temporary access Edit controlled device categories Edit controlled ports Switch to devices view Full Access Full Access Full Access Fu
81. elevant computer entry puter s from the Computers list However it leaves the agent installed on the target computer This is useful in without unin the event that the target computer was removed from the network and GFI End stallation PointSecurityapplication is unable to connect to it to uninstall the agent 4 Click Yes to confirm the deletion of the selected computer from the list 5 From the right pane click on the top warning message to deploy the protection policy updates The view should automatically change to Status gt Deployment GFI EndPointSecurity 14 Miscellaneous 144 T GF End PointSecurity 2013 Sea File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General Risk Assessment Statistics Status Deployment wll Deployment Status Monitor the progress of current protection agent deployments You can also check which deployments are scheduled and go through the deployment history log Current Deployments z Queued Deployrnents Computer Progress Type Computer Type W7_07 75 Installation There are no items to show in this view Scheduled Deployments Computer Deploy on Type IU GFI CCE1CA78C54 12 02 2013 13 19 42 Installation O LANGUARDW8 12 02 2013 13 19 48 Installation II W711 12 02 2013 13 19 45 Installation WA XPO1 12 02 2013 13 19 50 Installation r Deployment History Date Time Computer Type Messages x 12 02 2013 1
82. en allowed by the agents The information provided can be filtered for a specific computer or for all network computers 8 1 2 Device Usage by Device Type Device Usage by Device Type at st ssti i s O C CRC Type Allowed Blocked Total Count c29 Floppy Disks 2 98 90 ca CD DVD 2 161 397 2 5000 co storage Devices 1 939 5 353 292 Ham Printers 11 p 16 i PDAs 10 7 17 E Network Adapters 16 13 23 aa Modems 6 5 11 80 Imaging Devices z Hi 12 Human Interface Devices 4 4 o e Other Devices 200 23 223 Screenshot 82 Device Usage by Device Type area This section enumerates device connection attempts by device type that were either allowed or blocked The information provided can be filtered for a specific computer or for all network computers GFI EndPointSecurity 8 Monitoring Device Usage Activity 107 8 1 3 Device Usage by Connectivity Port Device Usage by Connectivity Port rabbi Tupe Allowed Blocked Total Count ip USE 1 339 1 197 2 536 l 9 Firewire 0 0 0 L PEMCIA 6 3 5 EJ Bluetooth 1 1 2 Serial amp Parallel 0 0 0 T Infrared 0 0 D Secure Digital 50 1 143 4 347 5 490 e4 Internal 1869 354 2 223 Screenshot 83 Device Usage by Connectivity Port area This section enumerates device connection attempts by connectivity port that were either allowed or blocked The information provided can be filtered for a specific computer or for all network computers 8 2 Activity Use the A
83. entions used in this guide U a 11 1 1 Portable media device threats 2222200000000 00000 aaa 11 1 2 About GFI EndPointSecurity 2 aa 12 1 3 Components of GFI EndPointSecurity 222 aa 12 1 3 1 GFI EndPointSecurity Management Console 2 2 2 22 ccc cccccec ce ceeccccccceeeeeeeees 13 1 3 2 GFI EndPointSecurity Agent 00 22 c cece cccccccccceeeeeeeteeecccceeeeeeeeees 13 Cg DAA AP 13 1 5 How GFI EndPointSecurity works Deployment and Monitoring eee 14 1 6 How GFI EndPointSecurity works Device ACCESS 2 2 cece ecccccceeceeececccececeeeeeeeees 16 1 7 How GFI EndPointSecurityworks Temporary ACCESS 2 2 2 2 2c cece cee eeeceeccccceceeeeeeees 17 1 8 Supported device categories 2 2 2 eee aa 18 1 9 Supported connectivity ports 202 2 c ccc c cece eeeeeecccccecececeetetteeecccceeeeeees 19 1 10 Navigating the Management Console 20 2 cece cece cece cece ec ccccccccccceceetteeeececeeeeeees 19 2 Installing GFI EndPointSecurity _ 22000 002 2 coco eec eee cece cece e cee eeeeeeeeeee 21 2 1 System requirements 2 2 c cece cece cece ccccccceeeeeeeeeeeeecccceeeeeeeeetttteseceeeeeeeeeees 21 2 2 Upgrading GFI EndPointSecurity 2020 00 00 c cece ceccccccceceeeeetettetecccceeeeees 22 2 3 Installing a new instance of GFI EndPointSecurity 0 2 0 2 2 a 23 2 4 Post install configurations
84. ents older than a custom number of hours or days Device For maximum security GFI EndPointSecurity can be configured to encrypt storage devices using AES 256 encryption encryption Encryption can be enforced on specific computers running agents over the network Data leakage risk assess ment Content awareness The dashboard enables users to see potential data leakage risk for each endpoint Use the provided tips and perform suggested actions to reduce risks levels The content awareness feature enables users to look into files entering the endpoints via removable Devices Content is identified based on predefined or custom regular expressions and dictionary files By default the feature looks for secure confidential details such as passwords and credit card numbers 1 5 How GFI EndPointSecurity works Deployment and Monitoring GFI EndPointSecurity protection policy deployment and monitoring operations can be divided in the four logical stages described below GFI EndPointSecurity 1 Introduction 14 Administrator uses GFI EndPointSecurity management console GFI EndPointSecurity management console O Configure computers O Deployment Deploy protection policy Configure computers to be protected Configure credentials O Customize protection policy Configure device Configure access conmectivity port permissions usage permissions Configure power users Configure event logging and notifications blackl
85. es 8 Use the Add Edit and Remove buttons to manage file types 9 Click OK 6 15 2 Configuring Volume Encryption Volume Encryption enables you to encrypt the contents of USB devices using AES 256 encryption When volume encryption is enforced users must provide a password to encrypt or access storage devices data To enforce Volume Encryption on installed agents w Note Encryption on demand is possible even if not forced by the administrator directly by the end user by clicking the Encrypt entry from the shell context menu of a removable drive GFI EndPointSecurity 6 Customizing Protection Policies 90 1 From GFI EndPointSecurity management console click Configuration tab gt Protection Policies 2 From the left pane select the protection policy for which to apply encryption policy 3 From the right pane click Encryption in the Security section General Q Enable and configure the encryption engine you want to use Windows 7 BitLocker to Go Encryption On systems running Windows 7 GFI EndPointSecunty can detect devices encrypted with BitLocker to Go and apply different permissions to them Select the checkbox below if you want to enable this feature Enable detection of encrypted devices On E Enable volume encryption The user password for an encrypted device can be reset in case the user Reset user password forgots the password Screenshot 65 Encryption options General tab 4 Select E
86. es will be fully accessible from the target computers covered by the protection policy As a result GFI EndPointSecurity cannot monitor and block devices falling in a category that is not controlled by the protection policy To configure devices controlled by a protection policy GFI EndPointSecurity 6 Customizing Protection Policies 57 1 Click Configuration tab gt Protection Policies From Protection Policies 5 Security select the protection policy to configure Click Security A U N From Common tasks click Edit controlled device categories Controlled Device Categories Controlled Device Categories i F Select which device categories should be controlled by this ay Security policy Device categories list ex Floppy Disks A CD DVD amp Storage Devices y Printers H PDA Devices E Network Adapters aa Modems a0 Imaging Devices JEE amp Ea a Human Interface Devices lt 8 Other Devices H MOTE 4 non controlled device category is fully accessible by all UZETE 0k Cancel Screenshot 24 Controlled Device Categories options 5 From the Controlled Device Categories dialog select unselect the required device categories that will be controlled by the protection policy and click OK Ye Important If you enable Human Interface Devices and deny access such devices users will not be able to use USB keyboards and mice conn
87. example optical drives connected internally on PCI 1 10 Navigating the Management Console GFI EndPointSecurity management console provides you with all the administrative functionality to monitor and manage device access usage GFI EndPointSecurity 1 Introduction 19 S GF EndPoint5ecurity 2013 File Configure Help Status Activity Configuration Protection Policies 3 24 General Control Py Security Common tasks Add pemission s _ Add local domain users groups Edit controlled device categories Edit controlled ports Switch to devices view Actions Delete permission s Increase priority Decrease priority Properties 1 Computer s E Tools Reporting General amp Computers Eal Protection Policies 7 Options pa Security Specify the users and groups that are allowed to access the devices blocked by this protection policy gt ser 2 Administrators Power User 82 GFILESEC_Bluetooth_FullAccess EJ Bluetooth GFILESEC_CdDwd_FullAccess GFI ESEC CdDvd ReadOnly el CD DVD E 22 GFILESEC_Firewire_FullAccess 2 GFI ESEC Foppy FullAccess 28 GFILESEC_Floppy_ReadOnly 2 GFILESEC_HID_FullAccess 2 GFI ESEC ImagingDevices FullAccess al Imaging Devices 22 GFI ESEC Infrared FullAccess 2 GFI ESEC Intemal FullAccess 2 GFLLESEC Modem FullAccess 2 GFI ESEC NetworkDevices Full Access a Network Adapters 2 GFI_ESEC_OtherDevices_F
88. figuration Access and configure the default protection policies Scanning Scan target computers and discover connected devices Reporting Download or launch GFI EndPointSecurity GFI ReportPack to generate your reports General Check for GFI EndPointSecurity updates as well as version and licensing detail Sub tabs Left Pane Right Pane OO GFI EndPointSecurity Access more settings and or information about the selected tab from section 1 Access configuration options provided in GFI EndPointSecurity The configuration options are grouped into three sections including Common Tasks Actions and Help Available only for some tabs Configure the configuration options selected from the left pane Available only for some tabs 2 Installing GFI EndPointSecurity 28 2 6 Testing your installation Once GFI EndPointSecurity is installed and the Quick Start wizard is completed test your installation to ensure that GFI EndPointSecurity is working correctly Follow the instructions in this section to verify the correctness of both the GFI EndPointSecurity installation as well as the operations of the shipping default protection policy This section contains the following information Test preconditions Test case Reverting to default settings 2 6 1 Test preconditions The following test pre conditions and settings are required ONLY for the purpose of this test Device setup For the following test you requi
89. fiter applies Template Create template Users Groups User Group name Screenshot 57 Add a new template 5 Click Add and select or key in the template from the Template drop down list 6 Click Add to specify the user s group s and click OK Repeat the preceding two sub steps for each template that will be applied 7 Click OK Select Users or Groups Select this object type Users Groups or Built in security principals From this location WIN 08 Enter the object names to select examples Screenshot 58 Selecting users or groups 6 13 2 Managing template options To add edit or remove predefined templates 1 Click Templates and select a template from the Template list 2 Click Add Edit or Remove to change or delete templates GFI EndPointSecurity 6 Customizing Protection Policies 85 Content Awareness Add edit or remove content blocking templates Name Description Austria ID 7MR 7ahl National identification number Austria ID ASVG Social insurance number Austria ID ssPIN New national identification number Belgium ID Identification number of the Bulgaria ID EGM Uniform Civil Number Czech Slovakia ID RC Birth Number Czech Slovakia ID COP Citizen s Identification Card Nu Denmark ID CPR Personal Identification Number Estonia ID IK Personal identification code Finland ID HETU Personal identity code France ID NIR Social security number INS
90. g temporary access for a protected computer ny Granting temporary access to a protected computer 6 11 1 Requesting temporary access for a protected computer To generate a request code tool GFI EndPointSecurity 6 Customizing Protection Policies 77 4L Devices Temporary Access Screenshot 49 Devices Temporary Access icon 1 From the Control Panel click Devices Temporary Access O GA EndPointSecurity Temporary Access fo a m GFI EndPoint5ecurity To temporary unlock the devices on this computer contact your administrator a and provide him the following Information Computer name BOGY Request code ddmnz5 TSP KOLA mONDEN yde To unlock the computer type the unlock code that pour administrator provided pou Unlock code Screenshot 50 GFI EndPointSecurityTemporary Access tool 2 In the GFI EndPointSecurity Temporary Access dialog take note of the Request code generated Communicate the following details to your security administrator Request code gt Device connection port type When you require access For how long you require access Keep the GFI EndPointSecurity Temporary Access tool open 3 When the administrator sends the unlock code key it in the Unlock code field i Note An unlock code keyed in on the protected target computer outside the specified validity period will not activate temporary access 4 Click Unlock to activate temporary access You are now able to access t
91. gt Protection Policies 2 From Protection Policies gt Security select the protection policy to configure 3 Click Security gt Set Permissions 4 From Common tasks click Add permission s GFI EndPointSecurity 6 Customizing Protection Policies 63 Add permissions Control entities Specify For which type of item do you want to setup the permissions For Add permissions For Device categories e g Floppy disks Storage devices Connectivity ports e g USB Firewire Specific devices z Back Cancel Screenshot 31 Add permissions options Control entities 5 In the Add permissions dialog select Connectivity ports and click Next Add permissions Connectivity ports Select the connectivity ports For which to setup the permissions Connectivity ports W USB mi 2 Firewire pamela Fi Bluetooth Serial amp Parallel FI T Infrared B secure Digital 5D C 85 Internal lt Back Cancel Screenshot 32 Add permissions options Connectivity ports 6 Enable or disable the required connectivity ports for which to configure permissions and click Next GFI EndPointSecurity 6 Customizing Protection Policies 64 7 Click Add to specify the user s group s that will have access to the connectivity ports spec ified in this protection policy and click OK Add permissions Users Select the users groups which will have access
92. h as a mice keyboards and joysticks enable users to input data or to interact directly with the computer M MSI file A file generated by GFI EndPointSecurity for later deployment using GPO or other deployment options It can be generated for any protection policy and contains all the relevant configured security settings including installation settings for unprotected target computers Power user A power users is automatically given full access to devices connected to any target computer covered by the protection policy GFI EndPointSecurity 16 Glossary 152 Protection policy A set of device access and connectivity port permissions that can be configured to suit your company s device access security policies Q Quick Start wizard A wizard to guide you in the configuration of GFI EndPointSecurity with custom settings It is launched upon the initial launch of GFI EndPointSecurity management console and is intended for first time use S Security encryption A set of restrictions configured to either block or else to allow users groups to access specific file types stored on devices that are encrypted with BitLocker To Go These restrictions are applied when the encrypted devices are connected to the target computers covered by the protection policy T Target computer A computer that is protected by a GFI EndPointSecurity protection policy Temporary access A period of time during which users are allowed to access
93. he device for which to configure permissions and click OK Add permissions Users Select the users groups which will have access ko the devices parts Users lisk User Group Name Access Read Select Users or Groups Select this object type Users Groups or Built in security principals Object Types From this location tcdomainb com Enter the object names to select examples Check Namez Screenshot 36 Add permissions options Users GFI EndPointSecurity 6 Customizing Protection Policies 67 7 Click Add to specify the user s group s that will have access to the specific devices specified in this protection policy and click OK Add permissions Users Select the users groups which will have access ko the devices ports Users list User Group Mame Access Read write 2 tedomainb com John Smith Cancel Screenshot 37 Add permissions options Users 8 Enable or disable Access Read and Write permissions for each user group you specified and click Finish To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 7 Viewing access permissions GFI EndPointSecurity enables you to view all permissions assigned to Active Directory AD users and or user groups You can do this on a policy by policy basis When a device cat
94. he most up to date listing of technical support questions and patches In case that the information in this guide does not solve your problems next refer to GFI SkyNet by visiting http kb gfi com GFI EndPointSecurity 15 Troubleshooting and Support 148 Web Forum User to user technical support is available via the GFI web forum Access the web forum by visiting http forums gfi com Request technical support If none of the resources listed above enable you to solve your issues contact the GFI Technical Support team by filling in an online support request form or by phone Online Fill out the support request form and follow the instructions on this page closely to sub mit your support request on http support gfi com supportrequestform asp Phone To obtain the correct technical support phone number for your region visit http www gfi com company contact htm O note Before contacting Technical Support have your Customer ID available Your Customer ID is the online account number that is assigned to you when first registering your license keys in the GFI Customer Area at http customers gfi com We will answer your query within 24 hours or less depending on your time zone Documentation If this manual does not satisfy your expectations or if you think that this documentation can be improved in any way let us know via email on documentation gfi com GFI EndPointSecurity 15 Troubleshooting
95. he required device and or connection port GFI EndPointSecurity 6 Customizing Protection Policies 78 6 11 2 Granting temporary access to a protected computer To grant temporary access 1 From GFI EndPointSecurity management console click Configuration tab gt Protection Policies sub tab 2 From the left pane select the protection policy that includes the computer on which temporary access needs to be granted 3 From the right pane click Grant temporary access in the Temporary Access section Request code Enter request code Grant temporary access J The user has to use the GFI EndPomt5 ecurty Temporary Access tool which is Installed on the client computer to generate the request code Request code Fe Computer Mame taal Screenshot 51 Grant temporary access options Request code 4 In the Grant temporary access dialog key in the request code received from the user in the Request code field The computer name from which the request code was generated is displayed in the Computer Name field Click Next GFI EndPointSecurity 6 Customizing Protection Policies 79 Grant temporary access Device categories and connection ports Select the device categories and connection ports that will be granted temporary ACCESS Select device categories and connection ports H Device categories v Connection ports w USE g Firewire vt PCMCIA Bluetooth z 7 Serial amp Parallel wla Infrare
96. he specified period a30 Days Roll over database when its size reaches 4 GE Screenshot 101 Maintenance options 4 From the Maintenance dialog configure how often events are deleted from the database back end Select from the options described below Table 17 Database maintenance options Never delete events Keep all events in your database backend without deleting old ones Note Ensure that manual deletion of old records is done to prevent GFI EndPointSecurity performance loss Backup events older than the Select this option and specify how old events have to be before they are backed up specified period in a separate database Delete events older than the Select this option and specify how old events have to be before they are deleted specified period Roll over database when its size Specify the maximum size a database can grow before GFI EndPointSecurity auto reaches matically switches to a new database 5 Click Apply and OK O Note Since Microsoft SQL Express 2005 has a database size limitation of 4 GB and Microsoft SQL Express 2008 R2 has a database limitation of 10 GB it is recommended to use Roll over database option For more information on Microsoft SQL Server Edition engine specifications refer to http go gfi com pageid ESEC SqlSpecs GFI EndPointSecurity 11 Managing the Database Backend 127 11 2 Using an existing SQL Server instance To connect to an existing SQL Server instance 1
97. ided by GFI EndPointSecurity 1 Click Start gt Programs gt GFI EndPointSecurity2013 gt GFI EndPointSecurity2013 Trou bleshooter 2 Click Next at the wizard welcome screen Screenshot 120 Specifying contact and purchase details 3 Key in your contact details so that our support team would be able to contact you for further anal ysis information Click Next Screenshot 121 Specifying issue details and other relevant information to recreate the problem 4 Specify the error you are getting and other information that would help our support team rec reate this issue Click Next Screenshot 122 Gathering machine information 5 The troubleshooter scans your system to get hardware information You can manually add more information in the space provided or click Next Screenshot 123 Finalizing the Troubleshooter wizard 6 At this stage the troubleshooter creates a package with the information gathered from the pre vious steps Next send this package to our support team so they can analyze and troubleshoot your problem Click the buttons described below for sending options Open Containing Folder Opens the folder containing the troubleshooter package so that you can send the package manually via email Go to GFI Support Opens the support page of GFI website 7 Click Finish GFI SkyNet GFI maintains a comprehensive knowledge base repository which includes answers to the most common problems GFI SkyNet always has t
98. ile type signature checking can be done on the following file types AVI BMP CAB CHM HTM JPE JPEG JPG MSG MSI OCX P7M TIF TIFF TXT URL Note 1 DLL LNK PDF WAV DOC M4A PPT XLS EMF MDB RAR ZIP EXE MP3 RTF DOCX GIF HLP MPEG MPG SCR SYS XLSX PPTX For any other file type not specified above filtering is based only on the file extension Note 2 File type filtering is only applied to device categories and or ports for which permissions have been set to allow access To configure file type restrictions for users in a specific protection policy 1 From GFI EndPointSecurity management console click Configuration tab gt Protection Policies 2 From the left pane select the protection policy for which you want to specify file type restric tions 3 From the right pane click File type Filter in the File control section GFI EndPointSecurity 6 Customizing Protection Policies 81 File type Filter Filter z Specify which are the file type restrictions for the protection policy Allow all files but black the usage of the following files types O Block all files but allow the usage of the following files types im File type Users Groups Im ege Everyone Add Edit Remove i NOTE File type filtering applies only on controlled device calegones ports devices where the permissione configuration allows access Screenshot 54 File type Filter options 4 In the File
99. in the GFI End activates tem PointSecurity Temporary Access tool to activate the temporary access and to be able to use the porary device required devices ports access GFI EndPointSecurity 1 Introduction 17 1 8 Supported device categories In GFI EndPointSecurity devices are organized into the following categories amp Floppy disks amp CDs DVDs Printers PDAs including Pocket PCs Sy Smart phones Network Adapters including FE ng Ethernet adapters ng Wi Fi adapters ng Removable adapters USB Firewire PCMCIA es Modems including ng Smart phones ng Mobile phones sit Imaging Devices Digital cameras Webcams Scanners Human Interface Devices Keyboards gt Mice Game controllers ix Storage Devices including gt USB Pen drives Digital Media Players e g MP3 MP4 players Flash and Memory Card Readers Multi drive USB devices i e devices that do not mount as a single drive 5 Other Devices Bluetooth dongles ports Infrared dongles ports GFI EndPointSecurity 1 Introduction 18 Zip drives Tape drives MO magneto optical drives internal and external 1 9 Supported connectivity ports GFI EndPointSecurity scans for devices that are or have been connected on the following ports Y USB B secure Digital SD Firewire Bluetooth Infrared 7 PCMCIA 7 Serial amp Parallel Internal
100. ing risk assessment results of the network computers The option to re scan the network to obtain the latest risk assessment results The Time of the last risk assessment GFI EndPointSecurity 9 Status Monitoring 114 BOO This section lists the cumulative values of the number of Scanned endpoints Successful scans Protected endpoints Unprotected endpoints Devices discovered This section also represents The network where agents are installed The time and date of the last risk assessment This section graphically represents the number of agents that are currently Awaiting installation on network computers Protected by GFI EndPointSecurity Not protected by GFI EndPointSecurity This section represents all agents deployed on network computers differentiating between those currently online and those that are offline For more information refer to Status view page 117 This section graphically represents the device threat percentage levels as logged by the agents of network computers that have GFI EndPointSecurityinstalled on them This section graphically represents the percentages of user accesses per device category of the total cumulative amount of user accesses to devices as logged by the agents User accesses to devices refer to both allowed and blocked device accesses This section lists The user account under which the GFI EndPointSecurity service is running gt The risk f
101. ion refer to Discovering Devices page 100 Note Power users will override any blacklisted devices and thus will be able to access blacklisted devices To add devices to the blacklist of a specific protection policy 1 Click Configuration tab gt Protection Policies 2 From Protection Policies gt Security select the protection policy to configure 3 From the right pane click Devices Blacklist in the General Control section Black fist Black list r Specify which are the devices that will be accessible to gi eVernone Devices list Device Description Device category Floppy disk drive Floppy Disks Remove _ Cancel Apply Screenshot 41 Black list options 4 In the Black list dialog click Add to select devices to add to the blacklist GFI EndPointSecurity 6 Customizing Protection Policies 71 Select Devices Select Devices You can either select a device with all its serials or else select some of the serials associated with the device Vendors list Devices list Vendors Device description Device c lt All devices C Floppy disk drive Floppy Disks Vendor ID 0409 Op Generic USB Skorage CFC USB Device Storage Devices vendor ID Qaec F JetFlash T5512MIF2B 2L USB Device Storage Devices vendor ID Deal as CDYVD ROM CD DVD vendor IC ms ae NEC USB UFOOOx USE Device Floppy Disks vendor ID samsung C 23 SAMSUNG CD ROM SC 1484 CD DVD Add New Device S
102. ion Status Device Usage by Device Type Device Usage by Connectivity Port 9 2 1 Protection Status Protection Status 4 00 AM Screenshot 90 Protection Status area GFI EndPointSecurity 9 Status Monitoring 116 This section graphically represents daily device usage on computers differentiating between devices that have been blocked and devices that have been allowed by the agents The information provided can be filtered for a specific computer or for all network computers 9 2 2 Device Usage by Device Type Device Usage bv Device Type pig Tupe Allowed Blocked Total Count CG Floppy Disks 2 ata g0 25 CD DVD 2 161 397 2 558 co Storage Devices 1 939 5 353 292 Hm Printers 11 5 16 PDAs 10 7 17 E Network Adapters 16 13 29 a Modems 6 5 11 80 Imaging Devices z Hi 12 Human Interace Devices 4 4 a S Other Devices 200 23 223 Screenshot 91 Device Usage by Device Type area This section enumerates device connection attempts by device type that were either allowed or blocked The information provided can be filtered for a specific computer or for all network computers 9 2 3 Device Usage by Connectivity Port Device Usage by Connectivity Port Tupe Allowed Blocked Total Count ip USB 1 339 1 157 2 536 2 Firewire 0 0 0 1 PCMCIA 6 3 9 EJ Bluetooth 1 1 2 NG Serial amp Parallel 0 0 0 T Infrared D D D a Secure Digital 50 1 143 4 347 ES 490 E Internal 1 569 354 2223 Screenshot 92 Device Usage by Connecti
103. is assigned to newly discovered devices If a protection policy is not configured for deployment create a policy that can be assigned to new agents that are being installed on discovered computers The default policy must be assigned to a new agent but can be changed from the Configuration tab gt Computers sub tab Security settings and device behavior are dictated by the policy Refer to the following section for information about Customizing Protection Policies Setting a policy as the default policy 4 Assign protection policies automatically Configure GFI EndPointSecurity to automatically deploy protection policies on new agents Refer to the following sections for information about Scheduling policy deployment Deploying policies through Active Directo Verifying protection policy deployment 5 Monitor device activity GFI EndPointSecurity enables you to maintain an audit trail of activity logs generated by agents deployed on network computers event logging must be enabled The Status and Activity tabs enable you to view statuses and statistical information about endpoints agents and GFI EndPointSecurity Refer to the following sections for information about Configuring event loggin View device usage activit View device usage statistics GFI EndPointSecurity 3 Achieving Results 36 3 3 Monitoring network activity from a central location Agents generate activity logs that are stored in an SQL Server dat
104. ist whitelist filters Monitor device usage activity Configure device Configure device Configure file type statistics view Device Scan Figure 1 Protection policy Deployment and Monitoring The table below describes the stages depicted above Table 3 Deployment and Monitoring protection policy Description Stage 1 The administrator specifies which protection policy is assigned to which computers and the log on cre Configure dentials to be used by GFI EndPointSecurity to access the target computers and deploy the agents computers Stage 2 The administrator can customize a protection policy before or after deploying it Customization options Customize include the creation of power users addition of blacklisted whitelisted devices and device access per protection missions policy GFI EndPointSecurity 1 Introduction 15 Stage 3 The administrator deploys the protection policy Upon the first deployment of a protection policy a GFI Deploy pro 8 EndPointSecurity agent is automatically installed on the remote network target computer Upon the tection pol next deployments of the same protection policy the agent will be updated and not re installed icy Stage 4 When agen
105. it Device serials 7 Devices Temporary Access ICON o 12 222 eee cece ee eee cece eet eee cee eeceeeeeeeeseeeeees 78 GFI EndPointSecurityTemporary Access tool 78 Grant temporary access options Request code 79 Grant temporary access options Device categories and connection ports 80 Grant temporary access options Time restrictions 022 22 eee eee eee eee eee eee eee 80 File type Filter options 82 File type Filter and user options 2 2 22 2 oie cece cece cece eee e cece ee cee eeceeeceeeeeeeees 83 Content awareness options 2 2 22222 eee eee cece eee cece eee eee eee eee eee ee eeeeeeeeeeeee 84 Add a new template _ 2 2 02 2 aaao adanadan aaa Laaa cece eee cece eceeeeeeeeseeeceseeseeeeeees 85 SCIECTING Users OF STOUDS core cenledst La tat BAKA beeen Lb eds ble kari GAGA Ain bang bulsa seiede 85 Managing templates u 22 l icc c cece eee cece cece cee e cece eee eee eee eeeceeseeesereeeseees 86 PIC ODEONS cinsore aati get sues scacieivs GOB AA needa didn Ga GG Sa ue 87 File type Filter and user options 0 2 22 22 cee cece ccc eee eee e cece cece cece cee cceeceeeeeees 88 Encryption options General tab 20 0 0 cece cece cece ccc c cence scencenes 89 Encryption options Permissions tab 2 22 c eee eee cece cee cece cece ceeeeeeee 89 Encryption options File type Filter tab 2 cece cc cece ec ceeceeeeeee 90 Encryp
106. ity Click on the Configuration tab Click on the Protection Policies sub tab From the left pane select the General Control protection policy Click on the Security sub node NY DBD oO LR W N From the left pane click the Add permission s hyperlink in the Common tasks section GFI EndPointSecurity 2 Installing GFI EndPointSecurity 30 Add permissions Control entities Specify For which type of item do you wank to setup the permissions For Add permissions For Device categories e g Floppy disks Storage devices Connectivity ports e g USB Firewire Specific devices z Back Cancel Screenshot 5 Selecting control entities 8 In the Add permissions dialog select the Device categories option and click Next to continue Add permissions Device categories Select the device categories For which to setup the permissions Device categories V Floppy Disks 7 2G CD DVD a Storage Devices Ba Printers Ei H PDA Devices E E Network Adapters W s Modems ai Imaging Devices L Human Interface Devices Mot controlled _ SS other Devices lt Back Cancel Screenshot 6 Selecting device categories to assign permissions 9 Enable the CD DVD device category and click Next GFI EndPointSecurity 2 Installing GFI EndPointSecurity 31 Add permissions Users Select the users groups which will have access to the devices parts
107. ity when a new computer is discovered Also select the policy that these settings apply to Click Apply and OK to close the Auto Discovery dialog and click Next at the Quick Start Wizard From Power Users select unselect Set GFI EndPointSecurity Power Users to enable disable power users features Members of the power users group have access to any connected device effected by this policy Click Select Power Users and from the Power Users dialog click Add to add users from your domain workgroup Click Apply and OK to close the Power Users dialog and click Next at the Quick Start Wizard GFI EndPointSecurity 2 Installing GFI EndPointSecurity 26 12 13 14 15 From Users Groups select unselect Configure Users Groups to create domain workgroup users and bind them to device categories and connectivity ports settings selected in the next step Click Select which Users Groups to create From the Configure Users Groups dialog select the devices and or connection ports for which users are created on To manage every supported device and port from this policy click Select All Click Close to close the Configure Users Groups and click Next at the Quick Start Wizard From Database select the database type you want to use as the database backend Select from the options described below Table 9 Database backend options 16 17 Don t configure the Finalize the Quick Start Wizard and configure the database backend
108. later For more infor database at this time mation refer to ACM Use an already Use an instance of Microsoft SQL Server already installed on the same machine you are install installed SQL Server ing GFI EndPointSecurity or any other machine on the network instance Install a local instance Select this option to download and install an instance of Microsoft SQL Server Express on the of SQL Express Edi same machine you are installing GFI EndPointSecurity An Internet connection is required tion Optional Click Advanced database settings to specify the SQL Server address database name logon method and the respective credentials Click Apply and OK to close the Database Backend dialog Click Next and wait for the settings to be applied Click Finish to close the Quick Start Wizard 2 5 Navigating the Management Console GFI EndPointSecurity management console provides you with all the administrative functionality to monitor and manage device access usage GFI EndPointSecurity 2 Installing GFI EndPointSecurity 27 S GF EndPoint5ecurity 2013 File Configure Help Status Activity Configuration Tools Reporting General amp Computers Eal Protection Policies 7 Options Protection Policies pa Security 2 24 General Control er Security Common tasks Add pamissionis Add local domain users groups Edit controlled device categories _ Edit controlled ports Switch to devices view Actions Delete
109. le type Filter and user options 5 From the Archive Options tab enable disable Search inside archives and specify the archive nesting level to use when checking archive files 6 Click OK 6 15 Configuring security encryption GFI EndPointSecurity enables you to configure settings which specifically cater for encrypted devices It also enables you to encrypt devices which are not yet secured Configuring Microsoft BitLocker To Go devices Configuring Volume Encryption 6 15 1 Configuring Microsoft BitLocker To Go devices GFI EndPointSecurity can detect storage devices encrypted with Microsoft BitLocker To Go This enables you to configure different permissions on such devices To enable Microsoft BitLocker To Go detection 1 From GFI EndPointSecurity management console click Configuration tab gt Protection Policies 2 From the left pane select the protection policy for which to apply the encryption policy 3 From the right pane click Encryption in the Security section GFI EndPointSecurity 6 Customizing Protection Policies 88 a Enable and configure the encryption engine you want to use Windows 7 BitLocker to Go Encryption i On systems running Windows 7 GFI EndPointSecunty can detect devices encrypted with BitLocker to Go and apply diferent pemissions to them Select the checkbox below if you want to enable this feature Enable detection of encrypted devices Configure on E Enable volume encryption The use
110. ll Access Full Access Full Access Full Access Full Access Full Access ail Imaging Devices E Other Devices Oo mon kh o na A amp Cs e Cs Cs Es x Screenshot 38 Protection Policies sub tab devices view GH EndPointSecurity 2013 File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General amp Computers f5 Protection Policies Options Protection Policies A The protection policy updates are not yet applied on all computers Click here to deploy the protection policy updates CTRL D El General Control a Security Specify the users and groups that are allowed to access the devices blocked by this protection policy Sa Administrators Power User S8 GFILESEC_Bluetooth_FullAccess 48 GFI ESEC CdDvd FullAccess 2 GFI ESEC CdDvd ReadOnly 2 GFILESEC_Firewire_FullAccess 2 GFILESEC_Aoppy_FullAccess 2 GFILESEC_Aoppy_ReadOnly 2 GFLESEC HID FullAccess g8 GFI ESEC ImagingDevices FullAccess 82 GFI_ESEC_Infrared_FullAccess 2 GFILESEC_Intemal_FullAccess 88 GFILESEC_Modem_FullAccess S8 GFILESEC_NetworkDevices_FullAccess 82 GFLESEC OtherDevices FullAccess 8 GFILESEC_PCMCIA_FullAccess S amp GFILESEC_PDA_FullAccess S amp GFILESEC_Printer_FullAccess 2 GFILESEC_SecureDigital_FullAccess 2 GFILESEC_SerialParallel_FullAccess S8 GFILESEC_StorageDevices_FullAccess 2 GFI_LESEC_StorageDevices_ReadOnly GF ESEC USB FullAccess HAF A Common tasks
111. mation and references essential for the operation of GFI EndPointSecurity o Important notifications and cautions regarding potential issues that are commonly encountered gt Step by step navigational instructions to access a specific function Bold text Items toselect such as nodes menu options or command buttons Italics text Parameters and values that you must replace with the applicable value such as custom paths and fil enames Code Indicates text values to key in such as commands and addresses 1 1 Portable media device threats The key advantage of removable media devices or portable devices is easy access In theory this may be of great advantage for organizations but still it is a well reported fact that access and security are at opposite ends of the security continuum Developments in removable media technology are escalating Different versions of portable devices such as flash memory have increased in GFI EndPointSecurity 1 Introduction 11 Better storage capacity Improved performance Easier and faster to install Physically small enough to carry in a pocket As a result internal users may deliberately or accidentally Take away sensitive data Expose confidential information Introduce malicious code example viruses Trojans that can bring the entire corporate network down Transfer inappropriate or offensive material on to corporate hardware Make personal copies of company d
112. messages you want the GFI EndPointSecunty agent to display to the user when a device is accessed Select message type Message type Message Computer reboot is required Warning An administrat Acces allowed to a controlled device Access allowed ta desi W Access blocked to a controlled device Access blocked to devi Fa Temporary access granted Temporary access grar Edit message Cancel Screenshot 114 Custom Messages dialog options 3 Select unselect the message types you want to customize 4 For each message type selected click Edit message modify the text as required and click Save Repeat this step for each message you want to modify 5 Click Apply and OK 13 3 Configuring GFI EndPointSecurity updates GFI EndPointSecurity can be configured to download and install updates automatically on a schedule or on startup To configure updates 1 Click General tab 2 From the left pane click Updates GFI EndPointSecurity 13 Configuring GFI EndPointSecurity 141 GFI EndPoint5ecurity 2013 File Configure Help Status Activity Configuration General to Version Information Update Licensing Support Support Center Knowledge Base GFI Forums Submit feedback Links Home page How to purchase Other GFI Products Screenshot 115 General tab Updates Discuss this version Scanning Reporting General Update Check Check for upd
113. mmediately Deployment sub tab 00 00 20 22 e eee eee eee 53 Schedule deployment options aa 54 Deployment History area cic c eee ee cee cece eee e cee e cece eee eeeeeeeeceseeeeeeees 55 Agent s Status area _ 2 22 2 ieee c cece cece eee eee cece cence eee e eee eeeeeeeeceeeeseeeeees 55 Controlled Device Categories options 2 022 2 c ieee cece eee cece cece cee eeeeeeeeeees 58 Controlled connectivity ports options 222 o eee e cece cee eee eee e cece cece eeeeeeees 59 Power users options cst chien coveosicaudanehddedecsuwsdcbuatauewdcbsdadwiaeudndevdaessadadensodeuceacs 60 Add permissions options Control entities e cece ee eee eee cee eee eeee 61 Add permissions options Device categories 62 Add permissions options Users e eee c eee eee cece ec eee cece ee ceeeeececeeceeeeees 62 Add permissions options Users o cece cece cece eee e cee cee cece ec ce cee ceeceeeeeeeeeees 63 Add permissions options Control entities cece cece eee cee eee cee cece eee 64 Add permissions options Connectivity ports 022 22 eee cece eee eee e cece ee eeeeeee 64 Add permissions options Users _ 2 2 2 2 22 i cece cece cece eee cee cee cece eee e cee ceeceeeeseeeeees 65 Add permissions options Control entities 00 0002 co cece cece eee eee eee eee eens 66 Add permissions options Specific devices 67
114. n Protection Policy dialog select the required protection policy from the drop down list and click OK 5 2 1 Deploy immediately To immediately deploy a protection policy on target computers 1 Click Configuration tab 5 Computers sub tab 2 Highlight the required target computer s If more than one deployment is required you can high light all the required target computers at once and then deploy the protection policies to the selected set of target computers 3 From Actions click Deploy now The view should automatically change to Status 5 Deployment GFI EndPointSecurity 5 Managing Protection Policies 52 T GF End PointSecurity 2013 Sea File Configure Help Discuss this version Status 7 Activity Configuration Scanning Reporting General Risk Assessment Statistics Status Deployment a Deployment Status Monitor the progress of current protection agent deployments You can also check which deployments are scheduled and go through the deployment history log Current Deployments z Queued Deployrnents Computer Progress Type Computer Type IG W7 07 754 Installation There are no items to show in this view Scheduled Deployments Computer Deploy on Type II GFI CCEICA78C54 12 02 2013 13 19 42 Installation IF LANGUARDW8 12 02 2013 13 19 48 Installation TJ W71 1 12 02 2013 13 19 45 Installation WA XPO1 12 02 2013 13 19 50 Installation 4 4 Deployment History Date Time Computer Type
115. nable volume encryption Click Configure Click Reset user password to reset the encryption password for a specific user GFI EndPointSecurity 6 Customizing Protection Policies 91 Volume Encryption Securty G Y Specify the recovery password and enable the user password ia secunty Specify a recovery password that can be used to reset the user password for an encrypted device in case the user forgets the password Recovery Password Use the password security to enforce restrictions to passwords specified by users when encrypting devices Enable user password security Minimum password lenght 5 Screenshot 66 Encryption options Security tab 5 From the Security tab configure the features described below Table 14 Volume encryption Security options Recovery Password Key in a password used if users forget or lose their passwords Enable user pass Enforce restrictions to passwords specified by end users In Minimum password length specify word security the minimum acceptable password length GFI EndPointSecurity 6 Customizing Protection Policies 92 Volume Encryption Security G E Select the users groups which will have volume encryption 1 enforced upon Enforce all users in the following list O Enforce all users except those in the following list Leer tedormainb com johrsnnth tedomainb com johndoe Remove Screenshot 67 Encryption options Users tab 6 Select Users tab and config
116. nguage you want to install and click OK 3 Click Next at the Welcome screen to start setup 4 Read carefully the End User License Agreement If you agree to the terms laid out in the agreement select accept the license agreement and click Next GFI EndPointSecurity 2 Installing GFI EndPointSecurity 23 ja GF EndPointSecurity 2013 Setup RJ o User Account Information Please enter requested data The GFI EndPomtSecurnty 2013 Service listens for important events generated by protection agents and logs them to a central database It is recommended to run the service under a domain administrator account Set up the GFI EndPointSecunty 013 Service to run under Account ENDPOINT Sohn Smith Password IIT ICI Iii iii iti NOTE Specify the user name in the format DOMAIN administrator Back Next gt Cancel Screenshot 2 GFI EndPointSecurity installation domain administrator account setup 5 Key in the logon credentials of an account with administrative privileges and click Next to continue j8 GFI EndPointSecurity 2013 Setup Ao License Kep 4 ba Enter the Following information to personalize pour installation 3 Please enter pour name company and license key If you do not have a license key you can continue the installation and specily a license key later Without a valid license key you will have limited functonallity Full Mame John Smith Company MyCompany License Key Click Register t
117. nstall agent s settings are set to assign the General Control protection policy shipping default protection policy on to the newly discovered computers To configure the Auto Discovery settings 1 Click Configuration tab gt Computers 2 From Common tasks click Auto discovery settings GFI EndPointSecurity 4 Adding Target Computers 39 Auto Discovery Enable automatic discovery to detect computers newly 2 connected to the network Start discovery now Fi Enable automatic discovery to detect computers newly connected to the network Schedule Start discovery ak October 17 2011 06 58 PM Hourly Recur evem 1 weekls on Daily L Sunday V Monday Weekly C Tuesday E Wednesday Monthly C Thursday E Friday E Saturday Lk Cancel Screenshot 10 Auto Discovery options Auto Discovery tab 3 Click Start discovery now to run auto discovery immediately 4 Select unselect Enable automatic discovery to detect computers newly connected to the net work to enable disable Auto Discovery 5 From the Schedule section select the start date and set frequency of the searches from Hourly Daily Weekly or Monthly GFI EndPointSecurity 4 Adding Target Computers 40 Auto Discovery Auto Discover ek Select the area from where the new computers have to be 4 discovered Current domain workgroup O The following domains workgroups O Entire network except
118. nt from which GFI EndPointSecurity application is running 10 Select unselect Send alert to enable disable alerting options For more information refer to Configuring alerting options page 129 11 Click Apply and OK 4 3 Configuring log on credentials GFI EndPointSecurity requires to log on to the target computers in order to Deploy agents and protection policy updates Keep track of the protection status of all target computers This requires that GFI EndPointSecurity is run under an account that has administrative privileges over your network target computers example a domain administrator account To specify logon credentials for a target computer GFI EndPointSecurity 4 Adding Target Computers 42 1 Click Configuration tab 5 Computers 2 Right click on a computer from the list and click Set logon credentials w Note If you want to set multiple computers to log on using the same credentials highlight the required computers right click on one of them and click Set logon credentials Alternatively click Set logon credentials from Actions Logon Credentials Logon Credentials Pi Specify the credentials which will be used to logon to computers at contained within this protection policy O Use the security contest under which the GFI EndPoint Security 2E vICe 1 TUFF Use the logon credentials specified below User Name pamith Password Screenshot 13 Logon Credentials dialog option
119. o obtain a free 30 day evaluation key Register lt Back Next gt Cancel Screenshot 3 GFI EndPointSecurity installation license key details 6 Key in the Full Name and Company If you have a license key update the License Key details and click Next GFI EndPointSecurity 2 Installing GFI EndPointSecurity 24 w Note The license key can be keyed in after installation or expiration of the evaluation period of GFI EndPointSecurity For more information refer to Product licensing 7 Key in or browse to select an alternative installation path or click Next to use the default path and proceed with the installation 8 Click Back to re enter installation information or click Next and wait for the installation to complete 9 Upon installation completion enable or disable the Launch GFI EndPointSecurity checkbox and click Finish to finalize installation 2 4 Post install configurations On the initial launch of GFI EndPointSecurity management console the Quick Start wizard is automatically launched This enables you to configure important GFI EndPointSecurity settings for first time use The Quick Start wizard consists of the following steps and guides you to configure Risk Assessment Automatic discovery Power users gt Users groups Database backend G Note The Quick Start Wizard can be re launched from File 5 Quick Start Wizard To use the Quick Start Wizard 1 Click Next at the wizard
120. o use when deploying agents and protection policy updates A FA Deployment options Number of deployment threads Deployment timeout seconda Screenshot 112 Advanced Options Deployment tab 4 Click Deployment tab and key in the required Number of deployment threads and Deployment timeout seconds values GFI EndPointSecurity 13 Configuring GFI EndPointSecurity 139 Advanced Options a a Communication Deployment Agent Security E Specify the agents control password Agents control is restricted only to instances that are using the same agent password E Enable agent control Password Confirm password Cia Screenshot 113 Advanced Options Agent Security tab 5 Click Agent Security tab and select unselect Enable agent control Use this option to assign par ticular logon credentials to all GFI EndPointSecurity Agents deployed on your network 6 Click Apply and OK 13 2 Configuring user messages GFI EndPointSecurity enables you to customize the messages that is displayed by GFI EndPointSecurity Agents on target computers when devices are accessed To customize user messages 1 Click Configuration tab gt Options sub tab 2 From Configure right click Custom Messages and select Customize user messages GFI EndPointSecurity 13 Configuring GFI EndPointSecurity 140 Custom Messages General o Configure which
121. og Monitor the use of devices across the network Select or type the computer name Select or type the user name Timetrame All Computers All Users ka Advanced filtering Time Description Advanced filtering P 23 4 9 2010 4 02 24 PM TECHCOMSERYTWO4Administrat E Pl 4 8 2010 4 01 28 PM TECHCOMSERVTWONAdministrat Applicata Paih T 23 4 9 2010 40 25PM TECHCOMSERVTWONAdministrat P 23 4 9 2010 4 01 25 PM TECHCOMSERYT WO Administra 423 4 9 2010 3 59 52 PM TCDOMAINAkadministrator on com File path P pi 4872010 3 13 28 PM TCOOMAINA administrator on com T 23 4 9 2010 3 12 06 PM TECHCOMSERYTWONAdministrat 5 4 8 2010 3 12 02 PM TECHCOMSERYT WO Administrat Device P 25 4 8 2010 3 08 49 PM TECHCOMSERYT WO Administrat P 25 4 8 2010 3 08 42 PM TECHCOMSERYT WO Adminiatrat Ewent type Head only access allowed Head only access denied Access allowed Full access allowed User Name WS STECHCOMSERYT WO Administrator F Ful denied Device TSS Tcorp DVD ROM TS L3334 ATA Device cb File Path E Device connected Real File Type MAA Device disconnected Agent has started Device Information Description Channel 1 Target 0 Lun 0 Agent has stopped Category CD DVD System Class CDROM Connectivity Port Intermal 4 a Events Screenshot 85 Activity Log sub tab Advanced filtering To access advanced filtering options of Activity Log click Advanced filtering in the Activity Log sub tab
122. omputers protected by this policy 7 Click Controlled Connectivity Ports GFI EndPointSecurity 5 Managing Protection Policies 47 Controlled connectivity ports Controlled connectivity ports e Select which connectivity ports should be controlled by this ma security policy Devices list gt PCMCIA E3 Bluetooth 1 Serial amp Parallel T Infrared B Secure Digital SD Cas Internal i NOTE 4 non controlled connectivity port is fully accessible by all UZETE Screenshot 17 Controlled connectivity ports options 8 From the Controlled connectivity ports dialog select the required connectivity ports that you want to control by this new policy Click OK to close the Controlled connectivity ports dialog and return to the wizard 9 Click Next GFI EndPointSecurity 5 Managing Protection Policies 48 Create Protection Policy Create Protection Policy 7 This wizard will guide you through the most important steps to create a new protection policy A General Set whether to allow or block access to the previously defined device categories Mame and ports Protection Block any access ko the controlled devices Controlled Categories and j Forts mae Allow everyone bo access the controlled devices Global Permissions Storage Devices Monitoring Logging and Alerting Options Finalize Finish Mote There are two general scenarios when using SFI EndPointSecurity The First is to block all removable devices
123. on refer to Configuring device blacklist or Configuring device whitelist Devices list Device Name Device Description Connected Device Category Connection Port Vendor ID Floppy disk drive es Floppy Disks Internal Internal matt CD PAD Ys heft Virtual CO ROM mn Add ko devices database Screenshot 79 Devices list area Add device to devices database To add devices to the devices database 1 Select one or more devices to add to the devices database from the Devices list section 2 Right click on the selected devices and select Add to devices database 3 Click OK GFI EndPointSecurity 7 Discovering Devices 105 8 Monitoring Device Usage Activity This chapter provides you with information about monitoring the activity of your network devices GFI EndPointSecurity enables you to keep an audit trail of all events generated by GFI EndPointSecurity Agents deployed on network computers To maintain an audit trail you must enable logging For more information refer to Configuring event logging page 94 Topics in this chapter 8 1 Statistics na AG NGA DSL nG Lk G LILA BOUUA NGA tere leeds bnns NILLG aaa 106 BAAN OIN AA AA 108 8 1 Statistics Use the Statistics sub tab to view the daily device activity trends and statistics for a specific computer or for all network computers GFI EndPointSecurity 2013 File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General
124. ons to import Protection Policies Computer GFI EndPointSecurity 2 Installing GFI EndPointSecurity 22 Security settings gt Options Logging options Database options Upgrading from GFI LanGuard Portable Storage Control If the computer on which you are installing GFI EndPointSecurity is protected by a GFI LanGuardPortable Storage Control agent you first need to uninstall that agent To do this 1 Open GFI LanGuard Portable Storage Control configuration console 2 Delete the agent from the computer where GFI EndPointSecurity will be installed oO Note This process should be done only for the computer where GFI EndPointSecurity will be installed 3 Close the GFI LanGuard Portable Storage Control configuration console application and proceed to installing GFI EndPointSecurity 4 When installing GFI EndPointSecurity you are asked to confirm whether you want to import configurations from the previous version Click Yes to import configurations G Note GFI LanGuard Portable Storage Control agents that were protecting your computers will be automatically added to a protection policy called Legacy Agents in GFI EndPointSecurity 2 3 Installing a new instance of GFI EndPointSecurity To install GFI EndPointSecurity 1 Logon the machine where GFI EndPointSecurity is going to be installed using administrative privileges 2 Double click the GFI EndPointSecurity executable file 2 Select the la
125. orage Devices mg wa Human Interface Devices E3 Other Devices Screenshot 75 Running a device scan Scan device categories tab 5 Click Scan Device Categories tab and select the device categories you want to include in the scan GFI EndPointSecurity 7 Discovering Devices 102 Logon Credentials Scan Device Categories 5can Ports 2 Select which device connection ports should be included in the ng scan Select the connection ports Serial amp Parallel Secure Digital SD Screenshot 76 Running a device scan Scan ports tab 6 Click Scan Ports tab and select the connection ports you want to include in the scan 7 Click Apply and OK 8 To specify scan target computers Inthe right pane key in the computer name or IP address of the target computer s in the Scan target text box Click New Scan to start scanning the specified computer 7 2 Analyzing device scan results Device Scan results are displayed in two sections Computers Devices list GFI EndPointSecurity 7 Discovering Devices 103 7 2 1 Computers Computers Computer User Protected Devices Devices Connected Version a POT TCOOMAINA administrator Yes 2 2 420100324 Ba P04 TCDOMAINA Administrator Yes 2 2 A 20100 324 Screenshot 77 Computers area This section displays device scan summary results for every scanned target computer including The computer name IP address The user currently logged on Protection st
126. ore Controlled Connectivity Ports Ports that are not selected will not be controlled and cannot be monitored Global Permissions l or blocked Storage Devices Monitoring Logging and Alerting Options Finalize Finish MOTE IF the Human Interface Devices Category is controlled and access to the category is denied users will be unable to access the usb keyboard amp mouse lt Back Mext gt Finish Cancel Screenshot 15 Creating a new policy Controlled Categories and Ports settings 5 Click Controlled Device Categories GFI EndPointSecurity 5 Managing Protection Policies 46 Controlled Device Categories Controlled Device Categories T Select which device categories should be controlled by this Spe Security policy Device categories list lt Floppy Disks CD DYD co Storage Devices y Printers i POA Devices Network Adapters W a Modems Si maging Devices 3 Human Interface Devices 8 Other Devices H MOTE A non controlled device category 1s fully accessible by all UZETE Screenshot 16 Controlled Device Categories options 6 From the Controlled Device Categories dialog select the required device categories you want to control by this new policy Click OK to close the Controlled device categories dialog and return to the wizard a Important If Human Interface Devices is enabled and access is denied users will not be able to use USB keyboards and mice connected to target c
127. ou can also filter the results of existing event queries by creating more specific sub queries To do this right click on a query and select Create query GFI EndPointSecurity 8 Monitoring Device Usage Activity 112 9 Status Monitoring This chapter provides with information related to monitoring the status of GFI EndPointSecurity as well as the status of GFI EndPointSecurity Agents The status views provide you with graphs and statistical information related to device usage Topics in this chapter 9 1 Risk Assessment view ee cece eee eect eee cece cece eee cece eee ceeeeeeeeeeeeeseeees 113 9 2 Statistics VIEW pas eee se ee eee eee 115 2a SUS VION AA AA 117 9 4 Deployment status view 119 9 1 Risk Assessment view Use the Risk Assessment sub tab to view the status of Risk assessment level on the network computers with GFI EndPointSecurity agents installed on them GFI EndPointSecurityagents deployed on network computers Device usage such as the number and percentage of devices blocked and the number of devices allowed Device threat level of devices on the network GFI EndPointSecurity 9 Status Monitoring 113 File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General Risk Assessment Statistics Status Deployment A Data Leakage Risk Assessment View Report Assess the data leakage risk of your endpoints and network m A Re
128. oups of alert recipients 12 4 1 Creating groups of alert recipients To create a new group of alert recipients 1 Click Configuration tab gt Options sub tab 2 Click Alerting Options gt Groups sub node 3 From the left pane click Create group Creating New Group General a Specify the name and members tor this group Group name Mew group Description Members Remove Screenshot 110 Creating New Group options 4 From the Creating New Group dialog key in the group name and an optional description 5 Click Add to select the user s that belong to this notification group and click OK 12 4 2 Editing group of alert recipients properties To edit group of alert recipient s properties 1 Click Configuration tab 5 Options sub tab 2 Click Alerting Options gt Groups sub node 3 From the right pane right click the group you want to edit and select Properties 4 For more information on how to edit the settings of groups refer to Creating groups of alert recip ients 12 4 3 Deleting groups of alert recipients To delete a group of alert recipients GFI EndPointSecurity 12 Alerting Options 136 1 Click Configuration tab 5 Options sub tab Click Alerting Options gt Groups sub node From the right pane right click the group you want to delete and select Delete A U N Click Yes to confirm deletion of the group GFI EndPointSecurity 12 Alerting Options 137 13 Configuring GFI EndPoin
129. permission s Increase priority Decrease priority Properties 2 Administrators Power User 82 GFILESEC_Bluetooth_FullAccess EJ Bluetooth GFILESEC_CdDwd_FullAccess GFI ESEC CdDvd ReadOnly el CD DVD E 22 GFILESEC_Firewire_FullAccess 2 GFI ESEC Foppy FullAccess 28 GFILESEC_Floppy_ReadOnly 2 GFILESEC_HID_FullAccess 2 GFI ESEC ImagingDevices FullAccess al Imaging Devices 22 GFI ESEC Infrared FullAccess 2 GFI ESEC Intemal FullAccess 2 GFLLESEC Modem FullAccess 2 GFI ESEC NetworkDevices Full Access a Network Adapters 2 GFI_ESEC_OtherDevices_FullAccess E3 Other Devices M2 GFILESEC_PCMCIA_FullAccess EH 82 GFILESEC_PDA_FullAccess 82 GF ESEC Printer FullAccess 1 Computer s E Fi 3 er papra m Pie e i F HS Screenshot 4 Navigating GFI EndPointSecurity user interface Ko 6 lets Discuss this version Specify the users and groups that are allowed to access the devices blocked by this protection policy gt ser Full Access Read Only Access Full Access Full Access Full Access GFI EndPointSecurity Management Console consists of the sections described below Tabs 1 Navigate between the different tabs of GFl EndPointSecurity management console The available tabs are Status Monitor the status of GFI EndPointSecurity and statistical information on device access Activity Monitor devices used on the network Con
130. policy a 17 Table 6 System requirements Hardware 2 21 Table 7 Auto Discovery settings l cic cece cece eee cece cece eee ence cence ceneeeeeeeeeeeeees 26 Table 8 Auto Discovery settings 20 222 l ice cece cece cece cece cece cece cece cece ee ee cee seeeeseeeeeeees 26 Table 9 Database backend options 2 222 2 eee eee ene cee cee cece ec eect cece cece eee e cee seeeeeeeseeeees 27 Table 10 Add Computer s dialog options cle eee cece cece e cece cece eee eeceeeeeeeeeseeseees 38 Table 11 Logon credentials options cece cece eee eee ec ec eee cece eee eee eee cee eeeeeeeeseeeees 43 Table 12 Auto Discovery settings l lec cc eee cece cece ec ee cee eee eee eee e cee eeeeeeeeeeeeeeees 50 Table 13 File options User options a 87 Table 14 Volume encryption Security options 0000000000000 a002 cece cece eee eeceeeeeee 92 Table 15 Volume encryption User options 0000000000000200 cece eee ee cee eeececeeeeeeees 93 Table 16 Volume encryption Traveler options 0000000000000 a 0022an eee eceeceeeeeeees 94 Table 17 Database maintenance options 0000000000000000 cece cece eee eeeeeceeeeeeeeeeees 127 Table 18 Update options a 142 Table 19 Troubleshooting Common issues 2 22 2 a 147 1 Introduction The proliferation of consumer
131. porary Access GFI EndPointSecurity temporary access operations can be divided in three logical stages temporary access Input unlock code unlock code n EREA O request code User requests and activates temporary Gevice access Input temporary specify device access request category and code connectivity port reguest code Administrator grants temporary access akp o code restriction Figure 3 Requesting granting temporary access The table below describes the stages depicted above Table 5 Deployment and Monitoring protection policy Stage 1 User The user executes the GFI EndPointSecurity Temporary Access tool from the computer on which the requests tem device is to be accessed The tool is used to generate a request code which the user communicates porary device with the administrator The user also needs to inform the administrator on the device types or con access nection ports that need to be accessed and for how long will devices ports access be required Stage 2 The administrator uses the Temporary Access feature within the GFI EndPointSecurity management Administrator console to enter the request code specify devices ports and time restrictions An unlock code is gen grants tem erated which the administrator then communicates with the user porary access Stage 3 User Once the user receives the unlock code sent by the administrator this code is entered
132. r password for an encrypted device can be reset in case the user Reset user password forgots the password Screenshot 62 Encryption options General tab 4 Select Enable detection of encrypted devices and click Configure Permissions File type Filter Select the users qroups which will have access to encrypted devices Permissions User Group Name Head LA tcdomainb com John Smith Remove Screenshot 63 Encryption options Permissions tab GFI EndPointSecurity 6 Customizing Protection Policies 89 5 Click Add to specify the users and groups with access to encrypted devices BitLocker Encryption Permissions File tyoe Filter Specify which are the file type restrictions for the protection policy Use the same File type filters used for nor encrpted devices Allow all files but black the usage of the following files types Block all files but allow the usage of the following files types File type Users Groups B4 chm Everyone Remove UE Cancel Apply Screenshot 64 Encryption options File type Filter tab 6 Select the File type Filter tab to configure the file types to restrict 7 Select the restriction to apply to this policy Use the same File type filters used for non encrypted devices Allow all files but block the usage of the following file types Block all files but allow the usage of the following file typ
133. r tab select any of the following event types for which alerts are sent by this pro tection policy Click OK To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 18 Setting a policy as the default policy GFI EndPointSecurity provides you with the facility to define the protection policy that is assigned to newly discovered network computers by the agent deployment feature You can do this on a policy by policy basis By default the agent deployment feature is set to use the General Control protection policy but you can elect any other protection policy as the default policy To elect another protection policy as the default protection policy 1 Click Configuration tab 5 Protection Policies 2 From Protection Policies gt Security select the protection policy to configure 3 From the left pane click Set as default policy in the Common tasks section GFI EndPointSecurity 6 Customizing Protection Policies 99 Discovering Devices GFI EndPointSecurity enables you to transparently and rapidly query organizational network endpoints locating and reporting all devices that are or have been connected to the scanned target computers The application granularly identifies endpoint devices connected to the target computers both currently and historically and displays the detailed information on screen onc
134. re CD DVD drive connected to the local computer CD DVD disc containing accessible contents preferably a disc the contents of which were acces sible prior to the installation of GFI EndPointSecurity Note Other devices and media may be used such as Floppy Disks or pen drives User accounts For this test ensure the availability of two user accounts on the same computer where GFI EndPointSecurity is installed One with no administrative privileges One with administrative privileges Configuration settings The configuration of the Quick Start wizard allows you to fine tune GFI EndPointSecurity to suit your company s needs which may not match the pre test settings required by this test As a result some GFI EndPointSecurity configuration settings need to be set as indicated below for this test to succeed Ensure the local computer is listed in the Status gt Agents view If the local computer is not listed then manually include it within the computers list For more information refer to the GFI End PointSecurity Administration and Configuration Manual Ensure the shipping default protection policy is deployed on the local computer and is up to date To verify check in the Status 5 Agents view that the protection policy is set to General Control the deployment is Up to date the local computer is Online GFI EndPointSecurity 2 Installing GFI EndPointSecurity 29 iy Note If the deployment of
135. reenshot 98 Deployment History area a 122 Screenshot 99 Digest Report options General tab cece cece eee eee eeceeceeeees 124 Screenshot 100 Digest Report options Details tab 2 22 2 e cece eee eeeeeees 125 Screenshot 101 Maintenance options _ 2 222 22 a 127 Screenshot 102 Change Database Backend 2 22 2 a 128 Screenshot 103 Alerting Options Email tab 2 0 02 22 l 00 cee cece cece cece eceeeeeeeeeees 129 Screenshot 104 Alerting Options Network tab c cece cece cece eee eee cee eeeeeeeeees 130 Screenshot 105 Alerting Options SMS tab cece cece eee cece eee e cee eeeeeeeeseeseeees 131 Screenshot 106 EndPointSecurityAdministrator Properties options General tab 2 22 2 132 Screenshot 107 EndPointSecurityAdministrator Properties options Working Hours tab 133 Screenshot 108 EndPointSecurityAdministrator Properties options Alerts tab 2 2 22 22222222222 134 Screenshot 109 EndPointSecurityAdministrator Properties options Member Of tab 2 2 134 Screenshot 110 Creating New Group options 22 22 22 i eee e eee cece eee cece cee cee ceeeeeeeeeeeees 136 Screenshot 111 Advanced Options Communication tab 22 2 22 2 a 138 Screenshot 112 Advanced Options Deployment tab 2 222 2 o cece eee eee cee cee eee
136. ring access permissions for connectivity ports 63 6 6 Configuring access permissions for specific devices 65 6 7 Viewing access permissions l 22 2 2 cece cece eee eee eee eee ee seceeceeeeeeceeeeceees 68 6 8 Configuring priorities for permissions 2 2222 2 eee eee eee e eee cece eee ee cee ceeceeceeceeeeeeseeseees 70 6 9 Configuring device blacklist cece cece ee eee cece eee eee cee eeeeeeeeeeeeeee 70 6 10 Configuring device whitelist ieee eee eee cece ee eee cece eee ee eeeeeeceeseeseeeee 74 6 11 Configuring temporary access privileges 71 6 12 Configuring file type filters aana aaa oaaao aa nec LaaLa LLALL DALLAL ALLAL LaL nanona 81 6 13 Configuring content awareness 2 aaa aaao eee eee cee cece eee LDAA LLALLA LDL DLLD ALLAL Laa an2 aan an 83 6 14 Configuring file options aoaaa aana ahaaa aa aoaaa ALDADA ALDA L DALLAL LLALL DALLAL aano aa a 86 6 15 Configuring security encryption aoaaa aaa aoaaa aaa LaaLa LLALLA LLALLA LLLA LaaLa oLan an 88 6 16 Configuring event logging 94 6 17 Configuring alerts 96 6 18 Setting a policy as the default policy aaan anaana eee LaaLa oaaao a nananana 99 6 1 Configuring controlled device categories GFI EndPointSecurity enables you to select which supported device categories should be controlled or not by a protection policy You can do this on a policy by policy basis Note Unspecified devic
137. rogress Tupe IG TWWINGPTESTYEAZ Maka Installation Screenshot 95 Current Deployments area This section displays a list of deployments currently taking place The information provided includes the computer name deployment progress and deployment type The deployment is an installation un installation or update 9 4 3 Queued Deployments Queued Deployments mp Computer Type My 10 0 0 7 Installation Fy 10 0 0 8 Installation 110 0 0 5 Installation Screenshot 96 Queued Deployments area This section displays a list of pending deployments The information provided includes the computer name and deployment type 9 4 4 Scheduled Deployments a Scheduled Deployments Computer Deploy on Type PO XPCLIENTO Z 971072009 1 43 10 PM Installation PO PCLIENTOB 3 10 2003 1 43 10 PM Installation Screenshot 97 Scheduled Deployments area This section displays a list of scheduled deployments The information provided includes the computer name scheduled time and deployment type GFI EndPointSecurity 9 Status Monitoring 121 9 4 5 Deployment History Deployment History Date Time Screenshot 98 Deployment History area 4 9 2010 4 52 56 PM 4872010 4 52 33 PM 4 5 2010 4 52 33 PM 4 5 2010 4 52 32 PM 4872010 4 52 32 PM 4 5 2010 4 52 32 PM 4 5 2010 4 52 32 PM 4 0 2010 4 52 23 PM AIRMN 4514 Ph Computer PO APO P04 PO APO POA PO PUA Phd Type Messages Installation The deployment w
138. s 3 The table below describes the available logon credentials options Table 11 Logon credentials options Use the security context under which GFI End Use the same credentials that are running GFI End PointSecurity service is running PointSecurity Use the logon credentials specified below Specify alternate credentials to use when logging in remote target computers Note Specify credentials which have administrative privileges over scan targets 4 Click Apply and OK GFI EndPointSecurity 4 Adding Target Computers 43 w Note By default GFI EndPointSecurity is configured to use the logon credentials of the currently logged on user account running GFI EndPointSecurity GFI EndPointSecurity 4 Adding Target Computers 44 5 Managing Protection Policies This chapter describes how to deploy newly created protection policies and schedule them Prior to deployment you can also modify the settings of your protection policy Topics in this chapter 5 1 Creating a new protection policy l cece cee eee eee eee eee ee cee eeeseeeeeeesees 45 5 2 Assigning a Protection Policy _ 00 2 l lee eee ee eee LLLA LLLA LLLA LLa aL Laana 51 5 3 Verifying protection policy deployment ZA 54 5 1 Creating a new protection policy GFI EndPointSecurity ships with a default protection policy so that the software is operational upon installation You can create further protection policies to suit your compan
139. s connected to the local computer To verify that both the device and media are now accessible to the non administrative user 1 Log in to the local computer as the user with no administrative privileges 2 Insert the same CD DVD disc in the CD DVD drive 3 From Windows Explorer locate the CD DVD drive and confirm that you are now able to view and open the contents stored on the CD DVD disc 2 6 3 Reverting to default settings To revert any GFI EndPointSecurity configuration settings back to the pre test scenario do the following for the user with no administrative privileges 1 Remove the user account from the local computer if it was created only for this test and is no longer required 2 Manually include the user in the power users list if it was set as a power user prior to this test For more information refer to the GFI EndPointSecurity Administration and Configuration Manual 3 Delete the CD DVD device access permissions to the user if it was not assigned CD DVD device access permissions prior to this test For more information refer to the GFI EndPointSecurity Administration and Configuration Manual GFI EndPointSecurity 2 Installing GFI EndPointSecurity 33 3 Achieving Results This chapter provides you with step by step instructions about how to block unauthorized devices from the network and secure endpoints using GFI EndPointSecurity This chapter helps you achieve positive legal compliance results while ens
140. s to select examples Check Names Advanced Cancel Screenshot 29 Add permissions options Users GFI EndPointSecurity 6 Customizing Protection Policies 62 6 Click Add to specify the user s group s that will have access to the device categories specified in this protection policy and click OK Add permissions Users Select the users groups which will have access ko the devices ports Users list User Group Mame Access Read write 2 tedomainb com John Smith lt Back Finish Cancel Screenshot 30 Add permissions options Users 7 Enable or disable Access Read and Write permissions for each user group you specified and click Finish To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 5 Configuring access permissions for connectivity ports GFI EndPointSecurity provides you with the facility to set permissions by connectivity ports to Active Directory AD users and or user groups You can do this on a policy by policy basis When a connectivity port is not set to be controlled by a protection policy the relevant permission is disabled For more information refer to Configuring controlled connectivity ports page 58 To configure connectivity port usage permissions for users within a specific protection policy 1 Click Configuration tab
141. secure confidential details such as social security numbers and primary account numbers as well as information related to companies and enterprises such as names of diseases drugs dangerous chemicals and also trivial language or ethnic racist terms You can configure content checking as a global policy in a similar fashion to the file checking mod ule 6 13 1 Managing content awareness options To configure content awareness options for users in a specific protection policy GFI EndPointSecurity 6 Customizing Protection Policies 83 1 From GFI EndPointSecurity management console click Configuration tab gt Protection Policies 2 From the left pane select the protection policy for which to specify content restrictions 3 From the right pane click Content awareness in the File control section Content Awareness Templates Specify which are the file content restrictions for the protection Allow all files but block the usage of files containing the following Template Edit Remove H NOTE Content blocking applies only on controlled device categories ports devices where the pemissions configuration allows access Screenshot 56 Content awareness options 4 In the Content awareness dialog click Add to select the template to apply to this policy GFI EndPointSecurity 6 Customizing Protection Policies 84 Content Awareness Select the template and specify which are the users to which this
142. stall the able to be installed or uninstalled solution refer to the system error message within the deployment by the service running on the tar parenthesis service get computer error GFI EndPointSecurity 15 Troubleshooting and Support 147 Issue Possible Cause Possible Solution Installation Installation of the GFI End For more details about the cause of the error and a possible failed PointSecurity agent is complete solution refer to the agent installation log files on the target but is not marked as installed computer at windir EndPointSecurity within the registry The version and build numbers of the GFI End PointSecurity agent are not the same as those of the GFI End PointSecurity management con sole Un Uninstallation of GFI End For more details about the cause of the error and a possible solu installation PointSecurity agent is complete tion refer to the agent installation log files on the target com failed but is not marked as uninstalled puter at windir EndPointSecurity within the registry The oper GFI EndPointSecurity has encoun Please use the Troubleshooter Wizard to contact the GFI ation failed tered an unexpected error Technical Support team due to an To open the Troubleshooter Wizard navigate to Start gt Programs unknown gt GFI EndPointSecurity 2013 gt GFI EndPointSecurity 2013 exception Troubleshooter Using GFI EndPointSecurity Troubleshooter To use the troubleshooting tool prov
143. storing device access data and for reporting purposes GFI EndPointSecurity provides the option to either use an available Microsoft SQL Server or else to automatically download and install Microsoft SQL Server 2005 Express on the same computer where GFI EndPointSecurity management console is installed Firewall ports TCP port 1116 default required by GFI EndPointSecurity Agents to notify GFI EndPointSecurity their statuses and to send device access events Without this port open the administrator has to either manually monitor events of each target computer or automatically via GFI EventsManager For more information refer to http www sgfi com eventsmanager 2 2 Upgrading GFI EndPointSecurity Upgrading from GFI EndPointSecurity 3 or later If you have GFI LanGuard Portable Storage Control or an earlier version of GFI EndPointSecurity it is possible to upgrade to the latest version of GFI EndPointSecurity Upgrading from GFI EndPointSecurity 3 or later to GFI EndPointSecurity2013 is straightforward The upgrade process is part of the GFI EndPointSecurity2013 installation process and includes Uninstalling GFI EndPointSecurity 3 or later Importing GFI EndPointSecurity 3 configuration settings When installing GFI EndPointSecurity you are asked to confirm whether you want to import configurations from the previous version Click Yes to import configurations You are then prompted to specify which of the following configurati
144. tSecurity GFI EndPointSecurity enables you to configure the computers you intend to install updates and display user messages on Topics in this chapter 13 1 Configuring advanced options 2 eee eee eee eee eee eee eee cence eee LLALLA LaaLa aLaaa aa 138 13 2 Configuring user messages 140 13 3 Configuring GFI EndPointSecurity updates 141 13 1 Configuring advanced options GFI EndPointSecurity allows you to configure the following Agent advanced options Main communication TCP IP port Deployment options Agents control password To configure advance options 1 Click Configuration tab gt Options sub tab 2 From Configure right click Advanced Options node and select Modify advanced options Advanced Options Communication Deployment KS Spec GFI EndPoint5 ecuriy communication port GF EndPomb5 ecurity uses TCPAP to communicate between the main application and the agents Specify the port number that should be used for this communication Main application port 1116 Cancel Screenshot 111 Advanced Options Communication tab GFI EndPointSecurity 13 Configuring GFI EndPointSecurity 138 3 From the Communication tab key in the required TCP IP port number to be used for com munication between GFI EndPointSecurity and GFI EndPointSecurity Agents By default port 1116 is specified Advanced Options Deployment Agent Security Specify the options t
145. tab gt Protection Policies 2 From Protection Policies 5 Security select the protection policy to configure 3 From Common tasks click Add permission s Add permissions Control entities Specify For which type of item do you want to setup the permissions For Add permissions For Device categories e g Floppy disks Storage devices Connectivity ports e g USB Firewire Specific devices z Back Cancel Screenshot 27 Add permissions options Control entities 4 In the Add permissions dialog select Device categories and click Next GFI EndPointSecurity 6 Customizing Protection Policies 61 Add permissions Control entities Specify For which type of item do you want to setup the permissions For Add permissions For Device categories e g Floppy disks Storage devices Connectivity ports e g USB Firewire Specific devices z Back Cancel Screenshot 28 Add permissions options Device categories 5 Enable or disable the required device categories for which to configure permissions and click Next Add permissions Users Select the users groups which will have access to the devices parts Users list Access Read User Group Name Select Users or Groups Select this object type Users Groups or Built in security principals Object Types From this location tcdomainb com Locations Enter the object name
146. tatus Monitor the progress of current protection agent deployments You can also check which deployments are scheduled and go through the deployment history log Current Deployments z Queued Deployments Computer Progress Type Computer Type my W7_07 754 Installation There are no items to show in this view 5cheduled Deployments Computer Deploy on Type NG GFI CCEICA78C54 12 02 2013 13 19 42 Installation IN LANGUARDWE 12 02 2013 13 19 48 Installation IN W711 12 02 2013 13 19 49 Installation 1 XP01 12 02 2013 13 19 50 Installation 4 a 4 Deployment History Date Time Computer Type Messages a Pe 12 02 2013 12 19 58 CATALYST PC Installation Failed to connect to the remote registry Attempted to perform an unauthorized LI 1202 2113 12 19 54 W710 Installation The deployment was completed 1202 2013 12 19 54 TCOFFICESERVER Installation The deployment was completed Pe 14 02 2013 12 19 50 APO Installation The computer is offline x 12 02 2013 12 19 49 W711 Installation The computer is offline e lmet lle i eA PT Cares 94 Deployment sub tab Use the Deployment sub tab to view Current deployment activity Queued deployments bn ph Scheduled deployments Deployment history To access the Deployment sub tab from GFI EndPointSecurity management console click Status tab gt Deployment GFI EndPointSecurity 9 Status Monitoring 120 9 4 2 Current Deployments FS Current Deployments Computer P
147. that you want to control from the tabs described below Table 12 Auto Discovery settings Tab File Type GFI EndPointSecurity enables you to specify file type restrictions on files such as DOC or XLS files being Filter copied to from allowed devices You can apply these restrictions to Active Directory AD users and or user groups GFI EndPointSecurity 5 Managing Protection Policies 50 Tab Content GFI EndPointSecurity enables you to specify the file content restrictions for a particular protection policy Awareness The content awareness feature looks into files transiting the endpoints via removable devices and it identifies content based on pre configured and custom regular expressions and dictionary files By default the module looks for secure confidential details such as social security numbers and primary account numbers as well as information related to companies and enterprises such as names of diseases drugs dangerous chemicals and also trivial language or ethnic racist terms You can configure content checking as a global policy in a similar fashion to the file checking module File GFI EndPointSecurityenables you to specify the options required to block or allow files based on size GFI Options EndPointSecurity also enables you to ignore large files when checking file type and content and archived files Encryption GFI EndPointSecurity enables you to configure settings that specifically cater for encrypted devices
148. the Database Backend e tcc e cece eeeeeeeeeees 126 11 1 Maintaining the database backend 2 2 een cc eecccceeeeeeeeeeeeeees 126 11 2 Using an existing SQL Server instance 2 222 222 ioc e cece ec eecccccceeeeeeeeeeeee 128 12 Nga AO AA AA 129 12 1 Configuring alerting options cece cece cece cceceececeeecettteeeeeeeeeeees 129 12 2 Configuring the alerts administrator account 2 0200 e cece cece 22222 131 12 3 Configuring alerts recipients cece cece cece eee cc eee ALLAL ALLAL a Laa oaa naa 135 12 3 1 Creating alert recipients Z ccc cece cece cece cece LLALLA Loa aa nannaa 135 12 3 2 Editing alert recipient properties cece cece cee eee cccceecceeeeeeeees 135 12 3 3 Deleting alert recipients cic ccc cece c cece ceeeccecceecsetteeseeeees 135 12 4 Configuring groups of alert recipients e eee ceccccceccceeeeeeeees 135 12 4 1 Creating groups of alert recipients ceeeeccccceeceeees 136 12 4 2 Editing group of alert recipients properties 136 12 4 3 Deleting groups of alert recipients cece ccc eee cece ccceeeeeeeeeeees 136 13 Configuring GFI EndPointSecurity u cece cece cece cece e cc eeeceeececeeeeeees 138 13 1 Configuring advanced options cece ccc cece cece ccececcceeeceeteeeeceeeeeeeeeeees 138 13 2 Configuring user messages cece c cece eee eeeeeceeeececeeeeeetteeeeeeeeeeees
149. tion options General tab l cece cece cece cee eee eee eee eeeeee 91 Encryption options Security tab cece cece cence ee cece cece cee ceeeceeeeees 92 Encryption options Users tab a 93 Encryption options Traveler tab cece cee cee eee cece ec eeeeeeeee 94 Logging Options General tab e ce cee cence cee oora orao 95 Logging Options Filter tab 22 22 loci aa 96 Alerting Options General tab 2 022 cece cece cee cece ececeeeeeseeees 97 Alerting Options Configuring users and groups 22 222 2 e eee eee eee cece ec eeceeeeeees 98 Alerting Options Filter tab cence cee cece ec eee eee cecceeceeseeeeeeeeees 99 Running a device scan Logon credentials tab o elec cece eee eee eee eee 101 Running a device scan Scan device categories tab 0 022 22 c cee eee ee eee ee eee 102 Running a device scan Scan ports tab e eee eee eee 103 COM pure SAGA clan ae caste AA batt dh ta AG ef oe ae PG ed a es 104 DEVIC CSH LG APR 104 Screenshot 79 Devices list area Add device to devices database eee eee eee ee eee 105 Screenshot 80 Statistics sub tab eee cece eee cece eeeeeeeeeeeees 106 Screenshot 81 Protection Status area eee cece ee eee eee eee cece eee cece ee eeeeees 107 Screenshot 82 Device Usage by Device T
150. tion policy User Priority Access Aead Wl ibe Status LA JohnDoe USE Full Access 3 CD DVD 2 Full Access Screenshot 40 Protection Policies sub tab Security area To prioritize permissions assigned to users in a protection policy 1 Click Configuration tab gt Protection Policies 2 From Protection Policies gt Security select the protection policy to configure 3 Click Security sub node 4 From the left pane click Switch to users view in the Common tasks section to switch grouping of permissions by users 5 Right click the Security section and select Expand all 6 Highlight the required device or port 7 From the left pane click Increase priority or Decrease priority in the Actions section To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 9 Configuring device blacklist GFI EndPointSecurity enables you to specify which device s can be made inaccessible to everyone The blacklist is granular so you can even blacklist a specific device with a specific serial number You can do this on a policy by policy basis GFI EndPointSecurity 6 Customizing Protection Policies 70 For an updated list of devices currently connected to the target computers run a device scan and add the discovered devices to the devices database prior to configuring blacklisted devices For more informat
151. to the devices parts Users list User Group Name Access Read Select Users or Groups Select this object type Users Groups or Built in security principals Object Types From this location tcdomainb com Locations Enter the object names to select examples Check Names Advanced Cancel Screenshot 33 Add permissions options Users 8 Enable or disable Access Read permissions for each user group you specified and click Finish To deploy protection policy updates on target computers specified in the policy 1 Click Configuration tab gt Computers 2 From Common tasks click Deploy to all computers 6 6 Configuring access permissions for specific devices GFI EndPointSecurity enables you to set permissions by specific devices to Active Directory AD users and or user groups You can do this on a policy by policy basis For example you can assign read only permissions to a specific company approved USB pen drive Attempts to use any other non approved USB pen drives will be blocked w Note For an updated list of devices currently connected to the target computers run a device scan and add the discovered devices to the devices database prior to configuring access permissions for specific devices For more information refer to Discovering Devices page 100 To configure specific device access permissions for users in a protection policy GFI En
152. to the following sections for information about How GFI EndPointsecurity works Temporary Access 3 2 Automating network protection After configuring GFI EndPointSecurity you can automatically protect new computers that are detected on reachable networks This can be achieved by specifying the domain s and or workgroup s that must be scanned for new computers and upon detection of one GFI EndPointSecurity installs an agent automatically and assigns it the default policy Policies can be changed from Configuration tab gt Computers sub tab GFI EndPointSecurity 3 Achieving Results 35 1 Automatically discover devices on the network GFI EndPointSecurity enables you to automatically add new computers that are connected to the network This allows you to scan a specified domain or workgroup and add the computers that are found in it Refer to the following sections for information about Running a device scan Analyzing device scan results Adding discovered devices to the database 2 Deploy agents on new discovered devices GFI EndPointSecurity can be configured to automatically install agents on new computers that are added to the database An agent must be installed on each computer that requires protection Refer to the following sections for information about Adding computers automaticall Configuring advanced options Configuring log on credentials 3 Optional Configure the protection policy that
153. ts have been deployed the administrator can monitor all device access attempts via the Man Monitor agement Console receive alerts and generate reports through GFI EndPointSecurity GFI ReportPack device access 1 6 How GFI EndPointSecurity works Device Access GFI EndPointSecurity device access operations can be divided in three logical stages CN Device usage blocked poe amp 5 a Error attaches message davice Yes Device blacklisted Device pa whitelisted memory devices Devices Port permission a Printers Device usage File type allowed allowed Figure 2 Device access The table below describes the stages depicted above GFI EndPointSecurity 1 Introduction 16 Table 4 Deployment and Monitoring protection policy Stage 1 Device The user attaches a device to a target computer protected by GFI EndPointSecurity attached to com puter Stage 2 Pro The GFI EndPointSecurity agent installed on the target computer detects the attached device and tection policy goes through the protection policy rules applicable to the computer user This operation deter enforcement mines whether the device is allowed or blocked from being accessed Stage 3 Device The user either receives an error message indicating that device usage has been blocked or else is usage allowed to access the device allowed blocked 1 7 How GFI EndPointSecurityworks Tem
154. ts properties Deleting alert recipients 12 3 1 Creating alert recipients To create a new alert recipient 1 Click Configuration tab gt Options sub tab 2 From Configure click Alerting Options gt Users sub node 3 From the left pane click the Create user 4 For more information about configuring the settings to create a new recipient refer to Con figuring the alerts administrator account 12 3 2 Editing alert recipient properties To edit alert recipient s properties 1 Click Configuration tab gt Options sub tab 2 From Configure click Alerting Options gt Users sub node 3 From the right pane right click the user you want to edit and select Properties 4 For more information about configuring the settings to edit a recipient refer to Configuring the alerts administrator account 12 3 3 Deleting alert recipients To delete an alert recipient 1 Click Configuration tab gt Options sub tab 2 From Configure click Alerting Options gt Users sub node 3 From the right pane right click the user you want to edit and select Delete 4 Click Yes to confirm deletion 12 4 Configuring groups of alert recipients GFI EndPointSecurity enables you to organize your alert recipients into groups in order to facilitate the management of alert recipients Creating groups of alert recipients Editing group of alert recipients properties GFI EndPointSecurity 12 Alerting Options 135 Deleting gr
155. type Filter dialog select the restriction to apply to this policy Allow all files but block the usage of the following file types Block all files but allow the usage of the following file types GFI EndPointSecurity 6 Customizing Protection Policies 82 File type Filter Select the file type and specify which are the users to which this filter applies File type Why Users Groups User Group name s tedomainb corJohn 5 mith UE Cancel Screenshot 55 File type Filter and user options 5 Click Add and select or key in the file type from the File type drop down list 6 Click Add to specify the user s group s who are allowed blocked from accessing the specified file type and click OK Repeat the preceding two sub steps for each file type to restrict 7 Click OK twice To deploy protection policy updates on target computers specified in the policy 1 From GFI EndPointSecurity management console click Configuration tab gt Computers sub tab 2 From the left pane click Deploy to all computers in the Common tasks section 6 13 Configuring content awareness GFI EndPointSecurity enables you to specify the file content restrictions for a particular protection policy The content awareness feature looks into files transiting the endpoints via removable devices and it identifies content based on pre configured and custom regular expressions and dictionary files By default the module looks for
156. uired from the target computer Oper parenthesis information ating System version and GFI End error PointSecurity agent version Failed to GFI EndPointSecurity was not able For more details about the cause of the error and a possible build the to add the necessary configuration solution refer to the system error message within the required files within the deployment file parenthesis installation msi installation file of the GFI End files error PointSecurity agent This error occurs before the deployment file is copied onto the target computer Failed to GFI EndPointSecurity was not able For more details about the cause of the error and a possible solu copy the to copy the deployment file msi tion refer to the system error message within the parenthesis files to the installation file onto the target Salud on Cannone For further information about network connectivity and security puter A possible cause can be that the permissions refer to error administrative share C that GFI http kb gfi com articles SkyNet_ EndPointSecurity is using to Article KBID003754 retURL 2Fapex 2FSupportHome amp popup true connect to the target computer is disabled Timeout Agent deployment onto the target Try to deploy the GFI EndPointSecurity agent again computer is either taking too long to complete or else is blocked Failed to GFI EndPointSecurity agent was not For more details about the cause of the error and a possible in
157. ullAccess E3 Other Devices 82 GFILESEC_PCMCIA_FullAccess 22 GFILESEC_PDA_FullAccess 82 GF ESEC Printer FullAccess Fi 3 er papra m Pie e i F HS Screenshot 1 Navigating GFI EndPointSecurity user interface Ko 6 lets Discuss this version Full Access Read Only Access Full Access Full Access Full Access GFI EndPointSecurity Management Console consists of the sections described below O OO Tabs Navigate between the different tabs of GFI EndPointSecurity management console The available tabs are Status Monitor the status of GFI EndPointSecurity and statistical information on device access Activity Monitor devices used on the network Configuration Access and configure the default protection policies Scanning Scan target computers and discover connected devices Reporting Download or launch GFI EndPointSecurity GFI ReportPack to generate your reports General Check for GFI EndPointSecurity updates as well as version and licensing detail Sub tabs Access more settings and or information about the selected tab from section 1 Left Pane Access configuration options provided in GFI EndPointSecurity The configuration options are grouped into three sections including Common Tasks Actions and Help Available only for some tabs Right Pane Configure the configuration options selected from the left pane Available only for some tabs GFI EndPointSecurity 1
158. ure the following options Table 15 Volume encryption User options Enforce all users in the fol Select the users that will have volume encryption enforced on their portable devices lowing list Use the Add and Remove buttons to manage selected users Enforce all users except Select the users that will be exempt from volume encryption Use the Add and those in the following list Remove buttons to manage selected users GFI EndPointSecurity 6 Customizing Protection Policies 93 Volume Encryption Users Traveler Allow usage of Traveler application on encrypted devices to On make the encrypted content available on machines without GFI EndPoint5 ecurty agent installed Copy Traveler to device for the following users O Copy Traveler to device for everyone except the following users Leer tedomainb com ohrdoe tedomainb com johnamith tedomainb conmjose Screenshot 68 Encryption options Traveler tab Note Traveler is an application that can be automatically installed on storage devices using GFI EndPointSecurity This application enables you to un encrypt data encrypted by GFI EndPointSecurity on storage devices from computers that are not running a GFI EndPointSecurity Agent 7 Select Traveler tab and configure the following options Table 16 Volume encryption Traveler options Copy Traveler to device for the fol Select the users that will have Traveler installed on their machines Use the lowing
159. uring that your network is protected using the most up to date vulnerability detection methods and techniques Topics in this chapter 3 1 Preventing data leaks and malware infections 00 o occ e cece cece cece ec ceecceeceecceeceeeceeees 34 3 2 Automating network protection eee cece eee e cece cee e cece cece cece eeeeceeeceeseeeseersceseeees 35 3 3 Monitoring network activity from a central location 3 1 Preventing data leaks and malware infections Most data theft happens internally by employees manually transferring data onto removable storage devices Using unauthorized removable storage devices can expose the network to a higher risk of malware infections GFI EndPointSecurity enables you to comprehensively control access to portable storage devices with minimal administrative effort Temporary access can be granted to end users for a device on a particular computer for a particular timeframe 1 Deploy agents on computers that require protection GFI EndPointSecurity Agents are used to secure computers on the network Agents can be deployed manually when installing agents on specific computers or automatically when installing agents on every new endpoint discovered on the network Refer to the following sections for information about Adding computers manuall Adding computers automaticall Configuring log on credentials 2 Create a protection policy to block removable storage Agents secure
160. urity can also allow or block Active Directory AD users and or user groups from accessing specific file types stored on devices that are encrypted with BitLocker To Go These restrictions are applied when the encrypted devices are connected to the target computers covered by the protection policy For more information refer to Configuring security encryption page 88 15 Click OK to close the Encryption dialog and return to the wizard 16 Click Next Pa Create Protection Policy Create Protection Policy This wizard will guide you through the most important steps to create a new protection policy maka A File Type Filter Name F Control access to files by file type Identify the file type from the content PAGG for most common file types Controlled Categories and Content Awareness Ports Control access to files with specific content Global Permissions j Storage Devices Note By setting a file type and or content filter devices from the Storage Device category will be accessible for everyone and the control will be Monitoring done based on the file type and or the content filter Logging and Alerting Options Finaliz File Options j Set general options to be used when checking accessed files Finish Encryption Storage Devices can be encrypted to protect contained data A protection policy can specify how an encrypted device will be controlled 17 From Storage Devices select the required options
161. users Add and Remove buttons to manage selected users Copy Traveler to device for everyone Select the users that will be exempt from having Traveler installed Use the except the following users Add and Remove buttons to manage selected users 8 Click Apply and OK 6 16 Configuring event logging GFI EndPointSecurity agents record events related to attempts made to access devices and connection ports on target computers The agents also record events related to service operations You can specify where these events are to be stored and also what types of events are to be logged You can do this on a policy by policy basis To specify logging options for users in a protection policy GFI EndPointSecurity 6 Customizing Protection Policies 94 1 Click Configuration tab gt Protection Policies 2 From Protection Policies 5 Security select the protection policy to configure 3 From the right pane click Set Logging Options in the Logging and Alerting section Logging Options Filter Specify where the security event logs generated by GFI EndPoint5 ecurity agents should be logged The computers contained in this policy will Log events to the Windows Security Event Log The events can be viewed using the Windows Event Viewer or collected to a central location using GFI Eventsh anager Log events to the central database To configure the central database select Configure phons4B ackend Database from the top menu IF the
162. vity Port area This section enumerates device connection attempts by connectivity port that were either allowed or blocked The information provided can be filtered for a specific computer or for all network computers 9 3 Status view Use the Status sub tab to determine the status of all deployment operations performed on your network targets For each target computer information displayed shows GFI EndPointSecurity 9 Status Monitoring 117 File Configure Help Discuss this version Status Activity Configuration Scanning Reporting General Risk Assessment Statistics Status Deployment A Status Monitor the status of the agent deployed on the computers protected by the GFI EndPoint5ecurity protection policies Service Status 1 Database Backend Status Alerting Status FW The GFI EndPoint Securty service is s Database server is running b Alerting server is configured User name elohn Smith Server WIN OE SQLEXPRESS Server WIN7 OS SQLEXPRESS Start time 4 12 2012 18 53 58 Database EndPointSecunty2012R2 Configure database Online Status Agents Status Computer Protection Policy Up to date Status 15 ARIELLETESTO3 General Control No Pending agent deployment N A I BAJADA General Control Na Pending agent deployment N A IR CATALYST PC General Control No Pending agent deployment N A I GFI CCEICA78C54 General Control No Pending agent deployment N A iy GFI RESDUAL General Control No Pending
163. y s device access security policies To create a new protection policy 1 Click Configuration tab gt Protection Policies 2 From Common tasks click Create new protection policy Create Protection Policy Create Protection Policy This wizard will quide you through the most important steps to create a new protection policy General Enter the name of the new protection policy Name 4 f Policy Protection Controlled Categories and Forts Global Permissions You can either create a Blank Policy or copy the settings from an existing Storage Devices protection policy Monitoring Blank protection policy Logging and Alerting Options 5 gt Copy the settings of an existing protection policy Finalize Finish pa General Control Ca Ca Screenshot 14 Creating a new policy General settings GFI EndPointSecurity 5 Managing Protection Policies 45 3 Key in a unique name for the new protection policy 4 Select whether you want to create a blank policy or copy the settings from an existing policy Click Next In the settings area select the required settings inheritance option from Create Protection Policy Create Protection Policy This wizard will guide you through the most important steps to create a new protection policy A General Controlled Device Categories Mame os Device Categories that are not selected will not be controlled and cannot A CHA be monitored or blocked Controlled Categories and ne Sh
164. ype area 107 Screenshot 83 Device Usage by Connectivity Port area c cece eee eee eee cee eeeeeeeeeees 108 Screenshot 84 Activity Log sub tab l licen eee eee ee eee cece cece eeecceeeeeseeseeees 109 Screenshot 85 Activity Log sub tab Advanced filtering 110 Screenshot 86 Logs Browser sub tab oie ccc ce eee cee cece eee cece eee cence eeeceeeeseesenees 111 Screenshot 87 Query Builder options _ 22 22 22 lice oaaao aaah aaao LaaLa LLALLA eens eee ceeseeeeeeeeeees 112 Screenshot 88 Risk Assessment sub tab 0 2 cece cece eee eee eee ete eee eee ee ee eeeeeee 114 Screenshot 89 Statistics sub tab ccc cece cee eee cece ee eee ee eee eeeeeeeeeeeees 116 screenshot 90 Protection Status areas nana adda badi wa k ARALAN ag SeoiebstSceke iwhedecel i EN 116 Screenshot 91 Device Usage by Device Type area eee cee eee cece eee eeceeeeeeesenees 117 Screenshot 92 Device Usage by Connectivity Port area eee eee e cece eeeseeees 117 DOhESMSMOL 955 Stars SUID CAND AA 118 Screenshot 94 Deployment sub tab a 120 Screenshot 95 Current Deployments area o eee eee eee cece cece eee cece cece eee eeeeeceeceeeeeeeees 121 Screenshot 96 Queued Deployments area cece ee ee eee eee LaaLa LLa LLALL aa Laa Lannan 121 Screenshot 97 Scheduled Deployments area cee eee eee ence eee ee eeeceeeeeeeseeees 121 Sc

Download Pdf Manuals

image

Related Search

Related Contents

Manual - Gefen  Monopolar Devices    Samsung Rugby 4 Manuel de l'utilisateur  G-scan取扱説明書(レクサス編)第11版  Stylitis-10_B User Manual - Symmetron Electronic Applications  Samsung AQ09MSBX Manual de utilizare  Dataram DTM65523C memory module  Télévision - La Gruyere Online  ExcaliburTM DAP 6456/SNMP  

Copyright © All rights reserved.
Failed to retrieve file