From eScan Wiki
(Difference between revisions)
Revision as of 08:14, 8 September 2010 WikiSysop (Talk | contribs) ← Previous diff |
Revision as of 08:26, 14 October 2010 WikiSysop (Talk | contribs) Next diff → |
||
Line 1: | Line 1: | ||
- | {| class="wikitable" border="0" | ||
- | |||
- | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | ||
- | | style="width:56%; color:#000;" | | ||
- | {| style="width:280px; border:none; background:none;" | ||
- | | [[Image:Escan_wikipedia.jpg|left|<!--We add confidence to computing-->]] | ||
- | |} | ||
- | |width="1000pt" style="width:11%; font-size:95%;" white-space:nowrap;| | ||
- | <B><p> General</p></B> | ||
- | * [[Main Page|<font color="blue">Home</font>]] | ||
- | * [[Marketing|<font color="blue">Marketing</font>]] | ||
- | * [[Events|<font color="blue">Events</font>]] | ||
- | * [[Marketing/Advertisement|<font color="blue">Advertisement</font>]] | ||
- | * [[Escan/english/Security_Awareness|<font color="blue">Security Awareness</font>]] | ||
- | |width="1000pt" style="width:11%; font-size:95%; white-space:nowrap;" | | ||
- | <B><p> Knowledgebase</p></B> | ||
- | * [[Technical Info|<font color="blue">Technical Information</font>]] | ||
- | * [[Beta Testing|<font color="blue">Beta Testing</font>]] | ||
- | * [[Release Candidate|<font color="blue">Release Candidate</font>]] | ||
- | * [[User Guide|<font color="blue">User Guides</font>]] | ||
- | * [[Escan/english/Technologies|<font color="blue">Technologies</font>]] | ||
- | |width="1000pt" style="width:11%; font-size:95%;white-space:nowrap;" | | ||
- | <B><p> Support</p></B> | ||
- | * [[EMail|<font color="blue">eMail</font>]] | ||
- | * [[Online Chat|<font color="blue">Online Chat</font>]] | ||
- | * [[Telephonic Support|<font color="blue">Telephone</font>]] | ||
- | * [[Remote Support|<font color="blue">Remote Support</font>]] | ||
- | * [[Forums|<font color="blue">Forums</font>]] | ||
- | |} | ||
{| class="wikitable" border="0" | {| class="wikitable" border="0" | ||
|} | |} | ||
Line 42: | Line 13: | ||
{| class="wikitable" border="0" | {| class="wikitable" border="0" | ||
|} | |} | ||
- | !<h2 id="mp-tfp-h2" style="margin:0; background:#C7E587; font-size:120%; font-weight:bold; border:10 solid #afa3bf; text-align:left; color:#000; padding:0.2em 0.4em">eScan Version 10 Online Help</h2> | + | <h2 id="mp-tfp-h2" style="margin:0; background:#C7E587; font-size:120%; font-weight:bold; border:10 solid #afa3bf; text-align:left; color:#000; padding:0.2em 0.4em">eScan Version 10 Online Help</h2> |
{| class="wikitable" border="0" | {| class="wikitable" border="0" | ||
- | |- | + | |
- | |width="1000pt"| | + | |
|} | |} | ||
Revision as of 08:26, 14 October 2010
| · Articles · FAQ · Troubleshooting | · Technical Information - Main Page |
eScan Version 10 Online Help
Endpoint Security
Contents |
Description
Endpoint Security protects from threats that can infect through your system endpoints like USB based portable devices and application control.
Status in main Protection Center Window
The green colored Tick (√) mark indicates the Endpoint Security is active and running.
The red colored Cross mark (X) indicates the Endpoint Security is inactive and stopped.
Configuration section
- Status
- Endpoint Security Status - This will display the status of the Endpoint Security in Running or Disabled mode.
- Stop / Start buttons – Clicking stop / start button will disable or enable the Endpoint Securiy.
- Settings button – To configure the Endpoint Security for real time monitoring click on the Settings button.
- I. Application Control
- This option helps in controlling the execution of any applications (programs) on the system.
- A. Enable Application Control Section - To enable Application Control monitoring click on the Check box provided. To disable Application Control monitoring, uncheck on the Check box.
- i. Enter Application to Block – To block an application / executable file from being executed in the system, add the name of the executable or click on Browse button to locate the file and then click on Block.
- List of Blocked applications contains list of blocked executables under categories predefined by MicroWorld as well as lists defined by user under the category Custom Group.
- Predefined categories:
- Computer Games – This category contains the list of Computer game programs, which are blocked by default.
- Instant Messengers - This category contains the list of Instant messenger programs like Yahoo Messenger, MSN Messenger etc. that are blocked by default.
- Music Video Players - This category contains the list of Music Video Players programs, which are blocked by default.
- P2P Applications - This category contains the list of P2P Applications, which are blocked by default.
- If any of the listed applications is required to be executed, users can uncheck on the box under the DONE column. If any of the listed applications is required to be blocked, users can check on the box under the DONE column.
- To entirely block / allow a Group or Category, right click and select the required options i.e. Allow This Group or Block this Group.
- II. USB Control
- This option helps in controlling the running /execution of any applications (programs) on the system via a USB Controlled device. This controls the execution of viruses / malwares spreading through a USB device.
- A. Enable USB Control – To enable USB Control monitoring click on the Check box provided. To disable USB Control monitoring, uncheck on the Check box.
- Settings - This section helps to customize the access to a USB Device and thereby control it.
- Ask for password – This option is enabled by default. This will prompt for a password for enabling the device to be connected to the system and to be accessed. The USB device will not be allowed to be connected or be accessed until the password is entered.Note It is recommended to keep this option enabled.
- Use eScan Administrator - The password will be same as for eScan Protection Center to access the USB Device.
- Use Other password – User can define a password to access the USB Device.
- Do Virus Scan - This option is enabled by default. This option when selected, will begin the virus scanning check as and when the USB Device is activated.It is recommended to keep this option enabled.
- Read Only - USB – This option will enable the access of USB devices in Read Only mode.
- Disable AutoPlay - This option will disable the auto-execution of any program as and when a USB is connected. That is autorun of USB will be disabled.
- Whitelist - This section will contain the list of all the whitelisted USB devices, which will be allowed to be accessed without prompting for a password.
- Part 1
- To whitelist a single USB device,
- insert the USB device, which is to be whitelisted (Note: on first time inserting the device, you will be prompted for a password),
- enter the password when prompted (default password would be admin or the local Microsoft Windows login password),
- after entering the correct password, then click on the Add button in the Whitelist section of the USB Control (refer to the USB Control of the Endpoint Security Settings in the eScan Protection Center),
- select the USB device to be whitelisted and click OK.
- Part 1
- Part 2
- (Note: this feature will be available only after applying the Hotfix ver.1.0.0.409 and above. Click here for eScan Hotfix)
- To whitelist a group of USB device from the same manufacturer with a specific range of Serial numbers,
- click on the Custom button,
- In the Serial no. box, add a wildcard character (*) to the Serial No.
- for eg.if the display shows the following:
- Serial No. - 5RR917VL
- Device Name - JetFlash TS2GJFV30 USB Device
- then you can add as
- Serial No. - 5RR9*
- Device Name - JetFlash TS2GJFV30 USB Device
- Or
- Serial No. - *
- Device Name - JetFlash TS2GJFV30 USB Device
- (This will allow all the USB device with Device name JetFlash TS2GJFV30 USB Device)
- 3. Click on Ok.
Reports section
- Statistics
- Total Application Allowed – Total number of application allowed by Endpoint Security.
- Total Application Blocked – Total number of application blocked by Endpoint Security.
- View Report – This will provide the report for Endpoint Security containing detail information of the applications that is allowed and blocked.
Glossary
Main Feature Index