From eScan Wiki
Revision as of 12:05, 30 August 2008 WikiSysop (Talk | contribs) ← Previous diff |
Revision as of 16:18, 20 November 2008 WikiSysop (Talk | contribs) Next diff → |
||
Line 1: | Line 1: | ||
- | '''End Point Security -''' | + | == Endpoint Security == |
- | Shows the current status of End Point Security Protection level. The green color right tick mark denotes that the module is “Active” while the red color cross mark displays that the module is “InActive”. | ||
- | |||
- | On the End Point Security option page in the “Configuration” section, when clicked on the “Settings” option, one can change the End Point Security Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”. | ||
+ | '''Description''' :- Endpoint Security protects from threats that can infect through your system endpoints like USB based portable devices and application control. | ||
- | '''Configuration section -''' | + | '''Status displayed in the main Protection Window:- ''' |
- | When clicked on “Settings” the below options are available, through which the eScan software’s real-time End Point Security protection can be customized - | + | The green colored Tick mark indicates the Endpoint Security is active and running. |
- | a. Application Control:- | + | The red colored Cross mark indicates the Endpoint Security is inactive and stopped. |
- | This option helps in comtrolling the running /execution of any applications (programs) on the system and the network. | ||
- | It has different options like "Enable Application Control" and "List of Blocked Applications". | + | '''Configuration section ''' |
- | 1. Enable Application Control - | + | ''Status'' |
- | This option is useful in controlling the execution of unwanted and harmful programs in an organization's network. | + | Endpoint Security Status - This will display the status of the Endpoint Security in Running or Disabled mode. |
- | i) Enter Application to Block - | + | ''Stop / Start buttons''''' –''' Clicking stop / start button will disable or enable the Endpoint Securiy. |
- | This option helps to select (by browsing/searching) the programs (unwanted and harmful) that you want to block from running/executing in a network, thus preventing the systems and networks from being chocked/clogged and also securing the systems and networks from malwares. | ||
- | ii) List of Blocked Applications - | + | ''Settings button'' – To configure the Endpoint Security for real time monitoring click on the Settings button. |
- | This option lists all the programs that are blocked from being run/executed. It also has the option to allow these same programs to be run/executed and to do so, simply select the program that you want to allow from the available list and choose the allow option or right click on the desired program/s that you want to allow from the available list and select the allow option. | ||
+ | '''I. Application Control''' | ||
+ | This option helps in controlling the execution of any applications (programs) on the system. | ||
- | b. USB Control:- | + | '''A. Enable Application Control Section''' - To enable Application Control monitoring click on the Check box provided. To disable Application Control monitoring, uncheck on the Check box. |
- | This option helps in controlling the running /execution of any applications (programs) on the system and the network. | + | '''i. Enter Application to Block '''– To block an application / executable file from being executed in the system, add the name of the executable or click on Browse button to locate the file and then click on Block. |
+ | List of Blocked applications contains list of blocked executables under categories predefined by MicroWorld as well as lists defined by user under the category Custom Group. Predefined categories | ||
+ | Computer Games – This category contains the list of Computer game programs, which are blocked by default. | ||
+ | * Instant Messengers - This category contains the list of Instant messenger programs like Yahoo Messenger, MSN Messenger etc. that are blocked by default. | ||
+ | * Music Video Players - This category contains the list of Music Video Players programs, which are blocked by default. | ||
+ | * P2P Applications - This category contains the list of P2P Applications, which are blocked by default. | ||
+ | If any of the listed applications is required to be executed, users can uncheck on the box under the DONE column. If any of the listed applications is required to be blocked, users can check on the box under the DONE column. | ||
+ | To entirely block / allow a Group or Category, right click and select the required options i.e. Allow This Group or Block this Group. | ||
- | It has different options like "Enable USB Control" and "Whitelist". | ||
- | 1.Enable USB Control - | + | '''II. USB Control''' |
+ | This option helps in controlling the running /execution of any applications (programs) on the system via a USB Controlled device. This controls the execution of viruses / malwares spreading through a USB device. | ||
- | This option is useful in controlling the execution of unwanted and harmful programs in an organization's system and network from a USB. | + | '''A. Enable USB Control '''– To enable USB Control monitoring click on the Check box provided. To disable USB Control monitoring, uncheck on the Check box. |
+ | Settings - This section helps to customize the access to a USB Device and thereby control it. | ||
+ | # '''Ask for password '''– This option is enabled by default. This will prompt for a password for enabling the device to be connected to the system and to be accessed. The USB device will not be allowed to be connected or be accessed until the password is entered. | ||
+ | It is recommended to keep this option enabled. | ||
+ | # '''Use eScan Administrator''' - The password will be same as for eScan Protection Center to access the USB Device. | ||
+ | # '''Use Other password''' – User can define a password to access the USB Device. | ||
+ | # '''Do Virus Scan''' - This option is enabled by default. This option when selected, will begin the virus scanning check as and when the USB Device is activated.It is recommended to keep this option enabled. | ||
+ | # '''Read Only - USB '''– This option will enable the access of USB devices in Read Only mode. | ||
+ | # '''Disable AutoPlay '''- This option will disable the auto-execution of any program as and when a USB is connected. That is autorun of USB will be disabled. | ||
- | i) Settings – | + | '''Whitelist '''- This contains a list of USB Devices that can be accessed on a particular system (i.e. whitelisted). To add a device in the Whitelist, click on the ADD button and select the connected Device to be added. The details of these authorized USB Devices include its Serial Number and the Device Name. |
- | This option helps to customize the access to a USB Device and thereby control it. | ||
- | a) Ask for password – | + | '''Reports section''' - |
- | This is the default option set, it authorizes (valid credentials) the usage of the USB Device on a system without which access to the USB Device is not granted. | + | ''Statistics'' |
- | i. Use eScan Administrator - | + | * Total Application Allowed – Total number of application allowed by Endpoint Security. |
+ | * Total Application Blocked – Total number of application blocked by Endpoint Security. | ||
- | The password applied /given for the eScan Administrator would be used to access the USB Device. | + | # '''View Report '''– This will provide the report for Endpoint Security containing detail information of the applications that is allowed and blocked. |
- | + | ||
- | ii. Use Other password – | + | |
- | + | ||
- | Any other password (password other than the eScan Administrator) needs to be applied /given, once supplied, access to the USB Device is granted. | + | |
- | + | ||
- | b. Do Virus Scan - this is the default option set, it scans the USB Device for any virus infection. | + | |
- | + | ||
- | c. Read Only- USB - this scans for any virus infection when the USB Device is read/accessed. | + | |
- | + | ||
- | d. Disable AutoPlay - this option is very important as it helps in controlling the auto-execution of any program when the USB Device is inserted/pluged on a system. | + | |
- | + | ||
- | + | ||
- | 2. Whitelist - | + | |
- | + | ||
- | This is a whitelist of USB Devices (authorized usb devices) that can be accessed on a particular system. The details of these authorized USB Devices include it's Serial Number and the Device Name. | + | |
- | + | ||
- | The USB Control is an Anti-Data Theft prevention system. It helps to stop all unwanted and harmful programs from being run /executed on a system as well as the network, thus preventing the system and network from being de-graded, securing the systems and networks from malware attacks that spread themselves using this mode and above all keeping a check and control on the movement /leakage of classified confidential private data. | + | |
- | + | ||
- | At the bottom end of this End Point Security option page in the “Reports” section, there is an option available called the “View Events Log”. | + | |
- | + | ||
- | + | ||
- | + | ||
- | '''Reports section -''' | + | |
- | + | ||
- | The below options is available within - | + | |
- | + | ||
- | a. View Events Log - | + | |
- | + | ||
- | This logs the events (violations) found on the system. | + | |
- | + | ||
- | Along with the above statistical reports, it also displays the total applications allowed and blocked. | + | |
- | + | ||
- | + | ||
- | + | ||
- | Note:- Depending on the subscription, some of the listed items may be unavailable. | + |
Revision as of 16:18, 20 November 2008
Endpoint Security
Description :- Endpoint Security protects from threats that can infect through your system endpoints like USB based portable devices and application control.
Status displayed in the main Protection Window:-
The green colored Tick mark indicates the Endpoint Security is active and running.
The red colored Cross mark indicates the Endpoint Security is inactive and stopped.
Configuration section
Status
Endpoint Security Status - This will display the status of the Endpoint Security in Running or Disabled mode.
Stop / Start buttons – Clicking stop / start button will disable or enable the Endpoint Securiy.
Settings button – To configure the Endpoint Security for real time monitoring click on the Settings button.
I. Application Control
This option helps in controlling the execution of any applications (programs) on the system.
A. Enable Application Control Section - To enable Application Control monitoring click on the Check box provided. To disable Application Control monitoring, uncheck on the Check box.
i. Enter Application to Block – To block an application / executable file from being executed in the system, add the name of the executable or click on Browse button to locate the file and then click on Block. List of Blocked applications contains list of blocked executables under categories predefined by MicroWorld as well as lists defined by user under the category Custom Group. Predefined categories Computer Games – This category contains the list of Computer game programs, which are blocked by default.
- Instant Messengers - This category contains the list of Instant messenger programs like Yahoo Messenger, MSN Messenger etc. that are blocked by default.
- Music Video Players - This category contains the list of Music Video Players programs, which are blocked by default.
- P2P Applications - This category contains the list of P2P Applications, which are blocked by default.
If any of the listed applications is required to be executed, users can uncheck on the box under the DONE column. If any of the listed applications is required to be blocked, users can check on the box under the DONE column. To entirely block / allow a Group or Category, right click and select the required options i.e. Allow This Group or Block this Group.
II. USB Control
This option helps in controlling the running /execution of any applications (programs) on the system via a USB Controlled device. This controls the execution of viruses / malwares spreading through a USB device.
A. Enable USB Control – To enable USB Control monitoring click on the Check box provided. To disable USB Control monitoring, uncheck on the Check box. Settings - This section helps to customize the access to a USB Device and thereby control it.
- Ask for password – This option is enabled by default. This will prompt for a password for enabling the device to be connected to the system and to be accessed. The USB device will not be allowed to be connected or be accessed until the password is entered.
It is recommended to keep this option enabled.
- Use eScan Administrator - The password will be same as for eScan Protection Center to access the USB Device.
- Use Other password – User can define a password to access the USB Device.
- Do Virus Scan - This option is enabled by default. This option when selected, will begin the virus scanning check as and when the USB Device is activated.It is recommended to keep this option enabled.
- Read Only - USB – This option will enable the access of USB devices in Read Only mode.
- Disable AutoPlay - This option will disable the auto-execution of any program as and when a USB is connected. That is autorun of USB will be disabled.
Whitelist - This contains a list of USB Devices that can be accessed on a particular system (i.e. whitelisted). To add a device in the Whitelist, click on the ADD button and select the connected Device to be added. The details of these authorized USB Devices include its Serial Number and the Device Name.
Reports section -
Statistics
- Total Application Allowed – Total number of application allowed by Endpoint Security.
- Total Application Blocked – Total number of application blocked by Endpoint Security.
- View Report – This will provide the report for Endpoint Security containing detail information of the applications that is allowed and blocked.