GFI Software/GFI EndPointSecurity

http://www.gfi.com

GFI EndPointSecurity enables you to allow or deny access to a specific device as well as to assign (where applicable) ‘full’ or ‘read only’ privileges over every supported device (e.g. CD/DVD drives, PDAs) on a user by user basis.

Aim
The aim of this book is to provide access to important information that can help users make the best use of GFI EndPointSecurity, Wikibookians are therefore encouraged to update this content and/or send feedback, ideas and comments on how this documentation can be further improved via the wiki discussion page, GFI Forums, or by sending an email to documentation@gfi.com.

All feedback is welcome! Please contribute your topics with the above principles in mind.

Introduction
The key advantage of removable media devices (or portable devices) is easy access. In theory, this may be of great advantage for organizations, but still, it is a well-reported fact that access and security are at opposite ends of the security continuum. Developments in removable media technology are escalating. Newer versions of portable devices, such as flash memory, have increased in: As a result, internal users may deliberately or accidentally: In an attempt to control these threats, organizations have started to prohibit the use of (personally-owned) portable devices at work. Best practice dictates that you must never rely on voluntary compliance and the best way to ensure complete control over portable devices is by putting technological barriers.
 * Better storage capacity
 * Improved performance
 * Easier and faster to install
 * Physically small enough to carry in a pocket.
 * Take away sensitive data
 * Expose confidential information
 * Introduce malicious code (e.g. viruses, Trojans) that can bring the entire corporate network down
 * Transfer inappropriate or offensive material on to corporate hardware
 * Make personal copies of company data and intellectual property
 * Get distracted during work hours.

GFI EndPointSecurity is the security solution that helps you maintain data integrity by preventing unauthorized access and transfer of content to and from the following devices or connection ports: Through its technology, GFI EndPointSecurity enables you to allow or deny access and to assign ‘full’ or ‘read only’ privileges to: With GFI EndPointSecurity you can also record the activity of all devices or connection ports being used on your target computers (including the date/time of usage and by whom the devices were used).
 * USB Ports (e.g. Flash and Memory card readers, pen drives)
 * Firewire ports (e.g. digital cameras, Firewire card readers)
 * Wireless data connections (e.g. Bluetooth and Infrared dongles)
 * Floppy disk drives (internal and external)
 * Optical drives (e.g. CD, DVD)
 * Magneto Optical drives (internal and external)
 * Removable USB hard-disk drives
 * Other drives such as Zip drives and tape drives (internal and external).
 * Devices (e.g. CD/DVD drives, PDAs).
 * Local or Active Directory users/user groups.

Getting Started Guide
This user manual is a comprehensive guide aimed at assisting you in installing, and testing GFI EndPointSecurity. It describes how to use and configure GFI EndPointSecurity to achieve the best possible corporate security. The following links enables you to browse GFI EndPointSecurity Getting Started Guide.

Chapter 1: Introduces this manual.

Chapter 2: Provides basic information on GFI EndPointSecurity and how it works.

Chapter 3: Provides information on system requirements and how to install the GFI EndPointSecurity.

Chapter 4: Provides information on how to configure the installation of GFI EndPointSecurity using the Quick Start wizard.

Chapter 5: Provides information on how to test your GFI EndPointSecurity installation.

Chapter 6: Provides information on licensing and versioning.

Chapter 7: [http://support.gfi.com/manuals/en/esec4gsg/esec4gettingstartedguide.1.27.html Provides all the necessary information on how to deal with any problems encountered while using GFI EndPointSecurity. Also provides extensive support information.]

Chapter 8: Defines technical terms used within GFI EndPointSecurity.

Chapter 9: Provides a list of errors displayed during deployment of agents from the management console.

Administration and Configuration Manual for GFI EndPointSecurity
This user manual is a comprehensive guide aimed at assisting you in creating and deploying GFI EndPointSecurity protection policies. It describes how to use and configure GFI EndPointSecurity to achieve the best possible corporate security. The following links enables you to browse GFI EndPointSecurity Administration and Configuration manual.

Chapter 1: Introduces this manual.

Chapter 2: Provides basic information on GFI EndPointSecurity and how it works.

Chapter 3: Provides information on how to create new protection policies using the Create Protection Policy wizard.

Chapter 4: Provides information on how to deploy protection policies on to target computers.

Chapter 5: [http://support.gfi.com/manuals/en/esec4/esec4manual.1.23.html Provides information on how to monitor device and port usage activity on protected target computers. ]

Chapter 6: Provides information on how to monitor the status of agents deployed on protected target computers.

Chapter 7: Provides information on how to get further information about the GFI EndPointSecurity ReportPack.

Chapter 8: Provides information on how to locate and report all devices that are or have been connected to scanned target computers.

Chapter 9: Provides information on how to configure protection policy settings.

Chapter 10: Provides information on how to customize GFI EndPointSecurity settings.

Chapter 11: Provides information on how to uninstall GFI EndPointSecurity agents and GFI EndPointSecurity application.

Chapter 12: Provides information on licensing and versioning.

Chapter 13: [http://support.gfi.com/manuals/en/esec4/esec4manual.1.67.html Provides all the necessary information on how to deal with any problems encountered while using GFI EndPointSecurity. Also provides extensive support information.]

Chapter 14: Defines technical terms used within GFI EndPointSecurity.

Chapter 15: Provides a list of errors displayed during deployment of agents from the management console.

Troubleshooting
This section explains how you should go about resolving issues that you might encounter while using GFI EndPointSecurity. The main sources of information available are:
 * The manual - most issues can be solved by reading GFI EndPointSecurity manuals
 * Download product manuals from www.gfi.com


 * GFI Knowledge Base articles
 * GFI maintains a Knowledge Base, which includes answers to the most common problems. If you have a problem, please consult the Knowledge Base first. The Knowledge Base always has the most up-to-date listing of technical support questions and patches. To access the Knowledge Base, visit http://kbase.gfi.com/.


 * Web forum
 * User to user technical support is available via the web forum. The forum can be found at http://forums.gfi.com/.


 * Contacting GFI Technical Support
 * If you still cannot solve issues with the software, contact the GFI Technical Support team by filling in an online support request form or by phone.
 * Online: Fill out the support request form on: http://support.gfi.com/supportrequestform.asp. Follow the instructions on this page closely to submit your support request.
 * Phone: To obtain the correct technical support phone number for your region please visit http://www.gfi.com/company/contact.htm.
 * NOTE: Before you contact our Technical Support team, please have your Customer ID available. Your Customer ID is the online account number that is assigned to you when you first register your license keys in our Customer Area at https://customers.gfi.com/login.aspx.
 * GFI support will answer your query within 24 hours or less, depending on your time zone.