Verbatim Endpoint Protector Basic User Manual

Pc protection device

Advertisement

Quick Links

Endpoint
Protector
Basic
User Guide
English

Advertisement

Table of Contents
loading

Summary of Contents for Verbatim Endpoint Protector Basic

  • Page 1 Endpoint Protector Basic User Guide English...
  • Page 2: Table Of Contents

    Contents 1. Introduction 2. Endpoint Protector Product Family 3. System Requirements 4. Controlled Device Types 5. Installation 6. Getting Started 7. Rights 7.1. Devices 7.2. Device Class 8. Settings 8.1. File Tracing 8.2. Password protection 9. Reports and Analysis 10. E-mail Alerts 10.1.
  • Page 3: Introduction

    Endpoint Protector Basic is part of it and offers your home and offi ce PCs the best solution to control the use of portable devices on your protected PCs so you data cannot be copied unauthorized to unwanted devices.
  • Page 4: Controlled Device Types Yp

    PC for a successful completion of the installation process. After a successful installation Endpoint Protector Basic will always run in the background to protect your PCs endpoints when you or other...
  • Page 5: Getting Started

    This module will allow you to specify what specifi c device can be accessible on your PC. Each time a new device is connected to the PC while the Endpoint Protector Basic Settings application is open, you will see it automatically in the “Devices”...
  • Page 6: Device Class

    7.2. Device Class This module will allow you to specify what device class can be accessible on your PC. By default the following device types will have Allow Access rights: WiFi, Local Printers, Webcams and CD-ROMs. In order to change the rights for a device class, you need to click the select box next to the device class name. The options you have are: “Deny Access”, “Allow Access”...
  • Page 7: Settings

    The General Settings module gives you the option to deactivate File Tracing, which is activated by default. You can deactivate this feature if you do not need this additional security level. Here you can also password protect the access to the Endpoint Protector Basic User Interface, or select your Language settings. 8.1. File Tracing The fi...
  • Page 8: Password Protection

    To remove the Password protection, you have to click the “Reset password” button. After setting up a password, you will be asked to enter it each time you start Endpoint Protector Basic. In case you didn’t save a ‘Hint’, this functionality will be hidden in the Login dialog.
  • Page 9: Reports And Analysis

    9. Reports and Analysis The most powerful and detailed representation of activity recordings can be achieved using this module. It allows the administrator to see exactly what actions took place at what time. This information also contains the computer name, user and device used and also the action taken and the fi...
  • Page 10: E-Mail Alerts

    You can do that by accessing “System Alerts” in the “Alerts Setup” module. 10.1. Alerts Settings If you enable the e-mail notifi cation option you have to provide Endpoint Protector Basic with an SMTP e-mail account that will be used to send the e-mail notifi cations to a specifi ed e-mail address.
  • Page 11: Notifi Cation Messages

    PC user about the unauthorized use of a portable device. You will be also notifi ed from time to time, by a similar message, about the trial period of Endpoint Protector Basic if you are testing the...
  • Page 12: About

    12. About 12.1. License Key Registration Your version of Endpoint Protector Basic comes with a lifetime license; therefore you will be able to use the full functionality of the application on your PC. 12.2. Update Mechanism You can check for the availability of a newer Endpoint Protector Basic version by clicking the “Check for Update” button in the “About” module, “Update”...
  • Page 13: Support Pp

    14. Support Visit http://www.verbatim-europe.co.uk/en_1/support_usb-devices_1.html One of our team members will contact you in the shortest time possible. Even if you do not have a problem but miss some feature or just want to leave us general comment we would love to hear from you.

Table of Contents