eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 11:16, 30 August 2008
WikiSysop (Talk | contribs)

← Previous diff
Revision as of 12:05, 30 August 2008
WikiSysop (Talk | contribs)

Next diff →
Line 5: Line 5:
On the End Point Security option page in the “Configuration” section, when clicked on the “Settings” option, one can change the End Point Security Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”. On the End Point Security option page in the “Configuration” section, when clicked on the “Settings” option, one can change the End Point Security Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”.
-1. Configuration section - + 
 + 
 +'''Configuration section -'''
When clicked on “Settings” the below options are available, through which the eScan software’s real-time End Point Security protection can be customized - When clicked on “Settings” the below options are available, through which the eScan software’s real-time End Point Security protection can be customized -
Line 81: Line 83:
Along with the above statistical reports, it also displays the total applications allowed and blocked. Along with the above statistical reports, it also displays the total applications allowed and blocked.
 +
 +
 +
 +Note:- Depending on the subscription, some of the listed items may be unavailable.

Revision as of 12:05, 30 August 2008

End Point Security -

Shows the current status of End Point Security Protection level. The green color right tick mark denotes that the module is “Active” while the red color cross mark displays that the module is “InActive”.

On the End Point Security option page in the “Configuration” section, when clicked on the “Settings” option, one can change the End Point Security Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”.


Configuration section -

When clicked on “Settings” the below options are available, through which the eScan software’s real-time End Point Security protection can be customized -

a. Application Control:-

This option helps in comtrolling the running /execution of any applications (programs) on the system and the network.

It has different options like "Enable Application Control" and "List of Blocked Applications".

1. Enable Application Control -

This option is useful in controlling the execution of unwanted and harmful programs in an organization's network.

i) Enter Application to Block -

This option helps to select (by browsing/searching) the programs (unwanted and harmful) that you want to block from running/executing in a network, thus preventing the systems and networks from being chocked/clogged and also securing the systems and networks from malwares.

ii) List of Blocked Applications -

This option lists all the programs that are blocked from being run/executed. It also has the option to allow these same programs to be run/executed and to do so, simply select the program that you want to allow from the available list and choose the allow option or right click on the desired program/s that you want to allow from the available list and select the allow option.


b. USB Control:-

This option helps in controlling the running /execution of any applications (programs) on the system and the network.

It has different options like "Enable USB Control" and "Whitelist".

1.Enable USB Control -

This option is useful in controlling the execution of unwanted and harmful programs in an organization's system and network from a USB.

i) Settings –

This option helps to customize the access to a USB Device and thereby control it.

a) Ask for password –

This is the default option set, it authorizes (valid credentials) the usage of the USB Device on a system without which access to the USB Device is not granted.

i. Use eScan Administrator -

The password applied /given for the eScan Administrator would be used to access the USB Device.

ii. Use Other password –

Any other password (password other than the eScan Administrator) needs to be applied /given, once supplied, access to the USB Device is granted.

b. Do Virus Scan - this is the default option set, it scans the USB Device for any virus infection.

c. Read Only- USB - this scans for any virus infection when the USB Device is read/accessed.

d. Disable AutoPlay - this option is very important as it helps in controlling the auto-execution of any program when the USB Device is inserted/pluged on a system.


2. Whitelist -

This is a whitelist of USB Devices (authorized usb devices) that can be accessed on a particular system. The details of these authorized USB Devices include it's Serial Number and the Device Name.

The USB Control is an Anti-Data Theft prevention system. It helps to stop all unwanted and harmful programs from being run /executed on a system as well as the network, thus preventing the system and network from being de-graded, securing the systems and networks from malware attacks that spread themselves using this mode and above all keeping a check and control on the movement /leakage of classified confidential private data.

At the bottom end of this End Point Security option page in the “Reports” section, there is an option available called the “View Events Log”.


Reports section -

The below options is available within -

a. View Events Log -

This logs the events (violations) found on the system.

Along with the above statistical reports, it also displays the total applications allowed and blocked.


Note:- Depending on the subscription, some of the listed items may be unavailable.


eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers