Verbatim Endpoint Protector Basic User manual

Endpoint
Protector
Basic
User Guide
English

2
C
ontent
s
1. Introduction
3
2. Endpoint Protector Product Family 3
py
3. System Requirements 3
yq
4. Controlled Device Types 4
yp
5. Installation
4
6. Getting Started 5
g
7. Rights 5
g
7
.
1
.
D
evices
5
7.2. Device Class 6
8. Settings 7
g
8.1. File Tracing 7
g
8.2. Password protection 8
p
9. Reports and Analysis 9
py
1
0
. E-mail Alerts 1
0
10.1. Alerts Settings 10
g
11. Notification Messages 11
g
12. About 12
12.1. License Key Registration 12
yg
12.2. Update Mechanism 12
p
13. Uninstall 12
14. Support 13
pp

3
1. Intr
od
u
c
ti
o
n
En
d
point Protector Basic™ wi
ll
h
e
l
p you secure your PCs en
d
points
b
y contro
ll
ing an
d
monitoring
d
evice use. You wi
ll
b
e a
bl
e to restrict t
h
e
use o
f
USB, FireWire and other ports and control portable device use your computer. You can
fi
nd a complete list o
f
all controlled device types
in the chapter “4. Controlled Device Types”. Therefore you are effectively preventing unwanted data introduction or data theft from your PC.
With Endpoint Protector Basic you can:
• Allow or restrict the use of any USB storage or other portable storage device on your computer
• Identify any USB storage device used in connection with your computer
• See the details of all USB storage devices connected to the computer at a certain moment
• Let the PCs administrator receive an e-mail message when an unauthorized USB storage device is connected to a workstation
• Use file tracin
g
to monitor file accesses on an
y
USB stora
g
e device
2. Endpoint Protector Product Famil
y
The End
p
oint Protector Product famil
y
offers device control and end
p
oint securit
y
for an
y
environment for home PCs or MACs, medium sized
offices or even entire enterprise networks.
Endpoint Protector Basic is part of it and offers your home and office PCs the best solution to control the use of portable devices on your
p
rotected PCs so
y
ou data cannot be co
p
ied unauthorized to unwanted devices.
Other
p
roducts
f
rom the End
p
oint Protector Product
f
amil
y
included:
• M
y
End
p
oint Protector (a Software as a Service solution to secure PCs and MACs over a internet
p
ortal htt
p
s://m
y
.End
p
ointProtector.com)
• Endpoint Protector (a client - server device control solution
f
or small and medium sized companies)
• Endpoint Protector Appliance (a hardware appliance device control solution
f
or small and medium sized companies and enterprises)
More in
f
ormation can be
f
ound here http://www.EndpointProtector.com
3. System Requirements
• Supporte
d
Operating Systems are:
• Windows 7
(
32bit / 64bit
)
• Windows Vista
(
32bit / 64bit
)
• Windows XP (Service Pack 2 is recommended)
• Windows 2
003
• Administrative ri
g
hts are re
q
uired in install the software on a PC and to be able to authorize or unauthorized devices
• 32MB o
f
available memory on the hard drive
• Minimum of 2
56
MB RAM is recommended

4
4. Contro
ll
e
d
Device T
yp
es
End
p
oint Protector Basic su
pp
orts a wide ran
g
e o
f
device t
yp
es which re
p
resent ke
y
sources o
f
securit
y
breaches. These devices can be
authorized which makes it
p
ossible
f
or the users to view, create or modi
fy
their content and
f
or administrators to view the data trans
f
erred to
and from the authorized devices.
• Removable Storage Devices
• Normal USB Flash Drives, U3 and Autorun Drives, Disk on Ke
y
, etc.
• USB 1.1, USB 2.0, USB 3.0
• Memory Cards - SD Cards, MMC Cards, and Compact Flash Cards, etc.
•
C
ard Readers - internal and external
• CD/DVD-P
l
ayer/Burner - interna
l
an
d
externa
l
• Digita
l
Cameras
• Smartp
h
ones / Han
dh
e
ld
s / PDAs (inc
l
u
d
es No
k
ia N-Series, B
l
ac
kb
erry, an
d
Win
d
ows CE) compati
bl
e
d
evices, Win
d
ows Mo
b
i
l
e
d
evices,
etc.
• iPods
/
iPhones
/
iPads
• MP3 P
l
ayer / Me
d
ia P
l
ayer Devices
• Externa
l
HDDs / porta
bl
e
h
ar
d
d
is
k
s
•
F
ir
eW
ir
e
De
vi
ces
• P
C
M
C
IA Devices
• Biometric Devices
• B
l
uetoot
h
• Printers (app
l
ies to seria
l
, USB an
d
LTP connection met
h
o
d
s)
• ExpressCar
d
(SSD)
• Wire
l
ess USB
• LPT/Parallel ports (By controlling the Parallel ports o
f
a PC using Endpoint Protector Basic, the network administrator can deny or allow
u
sers access to storage
d
evices connecte
d
to t
h
ese ports.) * APPLIES ONLY TO STORAGE DEVICES
• Flo
ppy
disk drives
5. Insta
ll
ation
To install Endpoint Protector Basic it is required that you are logged on the workstation with
f
ull administrative rights.
R
u
n th
e
EPPB
as
i
c
.
e
x
e
fi
l
e
.
End
p
oint Protector Basic will install itself in the start menu and create the End
p
oint Protector Basic
p
ro
g
ram
g
rou
p
. End
p
oint Protector Basic
will require in some cases that you restart your PC for a successful completion of the installation process.
A
f
ter a success
f
ul installation End
p
oint Protector Basic will alwa
y
s run in the back
g
round to
p
rotect
y
our PCs end
p
oints when
y
ou or other
users are
l
o
gg
e
d
into t
h
e PC.

5
6. Gettin
g
Starte
d
IMP
O
RTANT
!
Make sure you are logged in to the PC as administrator. Endpoint Protector Basic comes with a con
fi
guration Inter
f
ace, which will
be available
f
or logged in Administrators ONLY. I
f
a standard user (guest, restricted) logs into the system the con
fi
guration Inter
f
ace will not be
accessible and your PC ports are protected.
To start using Endpoint Protector Basic, go to Start > All Programs > Endpoint Protector Basic > Endpoint Protector Basic.
7. Rights
7.1. D
e
vi
ces
This module will allow you to specify what specific device can be accessible on your PC.
Each time a new device is connected to the PC while the End
p
oint Protector Basic Settin
g
s a
pp
lication is o
p
en,
y
ou will see it automaticall
y
in
the “Devices” list. In case you cannot see the device in the list, you can click the “Refresh” button from the bottom-right corner of the window
.
The status column indicates the current rights for the devices
.
•Red means that the device is blocked on your PC
•Green means that the device is allowed on
y
our PC
•Yellow means that the device has read onl
y
ri
g
hts on
y
our PC
•Gray means that the device is currently not connected to the PC
With a mouse click on a device’s status dot, a menu will open. This menu will give you access to the following settings:

6
7.2. Device C
l
ass
This module will allow you to specify what device class can be accessible on your PC.
B
y
default the followin
g
device t
yp
es will have Allow Access ri
g
hts: WiFi, Local Printers, Webcams and CD-ROMs.
In order to change the rights for a device class, you need to click the select box next to the device class name. The options you have are: “Deny
Access”, “A
ll
ow Access” an
d
“Rea
d
On
l
y Access”.

7
8. Sett
i
n
g
s
The General Settin
g
s module
g
ives
y
ou the o
p
tion to deactivate File Tracin
g
, which is activated b
y
de
f
ault. You can deactivate this
f
eature i
f
y
ou
d
o not nee
d
t
h
is a
dd
itiona
l
securit
y
l
eve
l
.
Here you can also password protect the access to the Endpoint Protector Basic User Interface, or select your Language settings.
8.1. File Tracing
The
fi
le tracing
f
eature allows the administrator to record the
fi
le properties o
f
fi
les that are written or read
f
rom or to portable storage devices
f
or later analysis.
You can then veri
f
y the
fi
les that have been accessed in the Logs Report,
f
rom the “Reports and Analysis” module.

8
8.2. Passwor
d
p
rotection
The access to the Endpoint Protector Basic User Inter
f
ace can be password protected.
A
f
ter introducin
g
y
our
p
assword settin
g
s,
y
ou need to click “Set
p
assword” button in order to save it.
You also have the o
p
tion to save a ‘Hint’ (reminder) for the Password. This mi
g
ht be hel
p
ful when for
g
ettin
g
the
p
assword.
To remove t
h
e Passwor
d
protection, you
h
ave to c
l
ic
k
t
h
e “Reset passwor
d
”
b
utton.
A
f
ter setting up a password, you will be asked to enter it each time you start Endpoint Protector Basic.
In case you didn’t save a ‘Hint’, this functionality will be hidden in the Login dialog.
O
ption
E
xp
l
anation
D
eny
A
cces
s
The device will be locked on your PC
A
ll
ow Access T
h
e
d
evice wi
ll
b
e a
ll
owe
d
on
y
our PC
Rea
d
On
l
y Acces
s
T
h
e
d
evice wi
ll
h
ave on
l
y rea
d
on
l
y rig
h
ts on your PC

9
9. Re
p
orts an
d
Ana
ly
sis
The most
p
ower
f
ul and detailed re
p
resentation o
f
activit
y
recordin
g
s can be achieved usin
g
this module. It allows the administrator to see
exactl
y
what actions took
p
lace at what time. This in
f
ormation also contains the com
p
uter name, user and device used and also the action
taken and the files accessed.
You can sort the events b
y
date & time, user, action, file t
yp
e,
p
roduct ID (PID), vendor ID (VID), etc. b
y
clickin
g
on the corres
p
ondent table
h
ea
d
er, e.g. “Timestamp”.

10
1
0
. E-mail Alerts
You have the option to receive a system alert in the form of an e-mail notification, each time an unauthorized device is connected to the PC
t
h
at is protecte
d
wit
h
En
d
point Protector Basic.
To enable Alerts by e-mail notification, you must configure the e-mail server host and provide a user name and password to that mail server.
You can do that by accessing “System Alerts” in the “Alerts Setup” module.
10.1. Alerts Settings
If you enable the e-mail notification option you have to provide Endpoint Protector Basic with an SMTP e-mail account that will be used to send
the e-mail noti
fi
cations to a speci
fi
ed e-mail address.
Please speci
f
y a sender and a recipient e-mail address. Enter your SMTP server address along with your username and password in case that
your SMTP server requires this in
f
ormation in order to send an e-mail.
You can also verif
y
if
y
our settin
g
s are correct b
y
clickin
g
the “Send test e-mail” button.
I
f
a
fi
rewall is installed on the PC that you are protecting with Endpoint Protector Basic, the
fi
rewall will request you
f
or authorization that
En
d
point Protector Basic is accessing t
h
e internet. P
l
ease grant En
d
point Protector Basic t
h
is aut
h
orization so you wi
ll
b
e a
bl
e to sen
d
an
d
r
ece
iv
e
e
-m
a
il n
o
ti
fi
ca
ti
o
n.

11
11. Notification Messa
g
es
In order to see notifications, the EPP Basic Notifier needs to be running.
In case
y
our Notifier is runnin
g
,
y
ou will see its icon in the S
y
stem Tra
y
.
When you right click the icon, you will have the option to launch the application, or to exit the Notifier.
Y
ou can restart the Notifier from Start > All Programs > Endpoint Protector Basic.
Every time a new device or an unauthorized device is connected to the protect PC, a message will pop up in the right corner of the screen. The
message will notify the PC user about the unauthorized use of a portable device.
Y
ou will be also notified from time to time, b
y
a similar messa
g
e, about the trial
p
eriod of End
p
oint Protector Basic if
y
ou are testin
g
the
sof
tw
a
r
e
as
a
tri
a
l.

12
12. Ab
o
ut
12.1. License Ke
y
Re
g
istration
Y
our version of End
p
oint Protector Basic comes with a lifetime license; therefore
y
ou will be able to use the full functionalit
y
of the a
pp
lication
on your PC.
12.2. Update Mechanism
Y
ou can check for the availability of a newer Endpoint Protector Basic version by clicking the “Check for Update” button in the “About” module,
“Update” menu.
I
f
there is a newer version available
y
ou will be asked i
f
y
ou want to download it.
The application will be downloaded directly to your PC.
After download is complete, you will have the option to “Install it” by clicking the button.
1
3
.
U
ninstall
To remove End
p
oint Protector Basic from
y
our PC,
p
lease
g
o to Control Panel > Add or Remove Pro
g
rams > End
p
oint Protector Basic >
Remove. Before doin
g
this
y
ou have to close End
p
oint Protector Basic Settin
g
s.
Uninstalling Endpoint Protector Basic will require entry of the Endpoint Protector Basic password even for users that have administrative rights
on t
h
e protecte
d
PC.
IMP
O
RTANT! Uninstalling the application will give full access to all USB drives that were and will be plugged into your PC
.

13
14. Su
pp
ort
Visit
h
ttp://www.ver
b
atim-europe.co.u
k
/en_1/support_us
b
-
d
evices_1.
h
tm
l
O
ne o
f
our team members will contact you in the shortest time possible.
Even i
f
you do not have a problem but miss some
f
eature or just want to leave us general comment we would love to hear
f
rom
you. Your input is much appreciated and we welcome any input to make computing with portable devices sa
f
e and convenient.
© 2004 – 2010 CoSoSys Ltd. All rights reserved. Windows is registered trademark o
f
Microso
f
t Corporation. All other names
and trademarks are property o
f
their respective owners.
Table of contents