eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 15:31, 9 March 2015
Webmktg (Talk | contribs)
('''Description''')
← Previous diff
Revision as of 11:37, 30 May 2015
Webmktg (Talk | contribs)
('''Configuration section''')
Next diff →
Line 79: Line 79:
:::::*'''Block'''. This button blocks the selected application in the Custom Group from running. :::::*'''Block'''. This button blocks the selected application in the Custom Group from running.
:::::*'''Delete'''. This button deletes the selection application from the Custom Group. :::::*'''Delete'''. This button deletes the selection application from the Custom Group.
- +'''Define Time Restriction'''
 +Using this option you can Enable / Disable application control feature. This feature helps you define time restriction when you want to allow or block access to the applications based on specific days and between pre-defined hours during a day.
 +For example -
 +You can allow your kids to play computer games between 6-7 pm without violating the Application Control Policies defined by you, by disabling the module during 6-7 PM through Define Time Restriction feature.as shown below.
 +[[Image: Endpoint Security - TRes.jpg|center]]
:'''II. Device Control''' :'''II. Device Control'''

Revision as of 11:37, 30 May 2015

eScan Version 14 Online Help

Back

Endpoint Security


Contents


Description

Endpoint Security is the sixth module of the eScan for ISS. This module protects your computer or Endpoints from data thefts and security threats through USB or FireWire® based portable devices. It comes with an Application control feature, which helps you block unwanted applications from running on your computer. In addition, this feature provides you with a comprehensive reporting feature that helps you determine which applications and portable devices are allowed or blocked by eScan.

 

 

When you select the Endpoint Security icon, the tabbed page of ePC provides you with information regarding its status, options for configuring the module, and links to reports on the recent scans performed by the module.

The tabbed page shows two sections: Configuration and Reports. These two sections are described as follows:

Configuration section

This section provides you with information regarding the status of the Endpoint Security module.

This section displays the following information.
Endpoint Security Status - It shows whether the Endpoint Security module is running or not.
Application Control- It displays the status of Application Control.
Device Control- It displays the status of Device Control.

 

 

In addition, you can configure the following settings.

Stop / Start options This link enables or disables the Endpoint Security module. You can easily switch the Endpoint Security module from the start state to the stop state and vice versa by using this link.
Settings This link opens the Endpoint Security Settings dialog box, which helps you configure the Endpoint Security module for real time monitoring.


The Endpoint Security Settings dialog box

This dialog box has two tabs: Application Control and USB Control. These two tabs are described as follows:
I. Application Control
This tab helps you control the execution of programs on the computer. By default, all the controls on this tab are disabled,except Block List and White list tab.

 

 

This tab helps you configure the following settings.


  • Enable Application Control Section - Select this check box, if you want to enable Application Control feature, which helps you to block application.
  • Enter Application to Block – This field and Browse button is available only when you select Enable Application Control check box.

Type or click the Browse button to select name of the application that you want to block, and then click the Block button. If you want to delete an application, click an appropriate application from the group that you want to delete, and then click the Delete button.

List of Blocked applications - This list contains blocked executables under categories that are predefined by MicroWorld. Each of the applications listed in the predefined categories are blocked by default. In addition, you can also add executables that you need to block to the Custom Group category. You can unblock an executable by clearing the check box next to it. The predefined categories include the following:
  • Computer Game - This category contains the list of computer games, which are blocked by default.
  • Instant Messengers - This category contains the list of instant messenger programs like Yahoo!® Messenger, MSN® Messenger, which are blocked by default.
  • Music Video Players. This category contains the list of music video players programs, which are blocked by default.
  • P2P Applications - This category contains the list of P2P applications, which are blocked by default.

Note: eScan will detect and block harmful or blocked applications even if they are renamed and given another extension.

The Endpoint Security Settings dialog box also shows these buttons.
  • Block. This button blocks the selected application in the Custom Group from running.
  • Delete. This button deletes the selection application from the Custom Group.

Define Time Restriction Using this option you can Enable / Disable application control feature. This feature helps you define time restriction when you want to allow or block access to the applications based on specific days and between pre-defined hours during a day. For example - You can allow your kids to play computer games between 6-7 pm without violating the Application Control Policies defined by you, by disabling the module during 6-7 PM through Define Time Restriction feature.as shown below.

II. Device Control
The Endpoint Security feature of ‘e Scan protects your computer from malicious software that may enter your computer via USB storage devices. It does this by asking you for the password whenever you plug in a USB storage device.

 

 

The Device Control tab of the Endpoint Security Settings dialog box helps you configure the following settings.


  • Enable Device Control – You should select this check box if you need to monitor all the USB storages devices connected to your computer.
Settings -
This section helps you customize the settings for controlling access to USB storage devices.
  1. Block USB Ports - You should select this check box if you need to block all the USB ports.
  2. Ask for Password - This check box is selected by default. You should select this check box if you need ‘e Scan to prompt for a password whenever a USB storage device is connected to the computer. You will not be able to access the USB storage device until you enter the correct password. As a best practice, you should always keep this check box selected.
  3. Use eScan Administrator - You should select this check box if you need ‘e Scan to prompt you to enter the ePC password whenever you try to access a USB storage device.
  4. Use Other Password - You can also specify a unique password for accessing USB Storage devices. You should select this check box if you need ‘e Scan to prompt you for a password whenever you try to access a USB storage device.
  5. Do Virus Scan - [Default] When you select this option, the Endpoint Security module runs a virus check when the USB storage device is activated. As a best practice, you should always keep this option selected.
  6. Disable AutoPlay - [Default] When you select this option, ‘e Scan disables the automatic execution of any program stored on a USB storage device when you connect the device. Note: When a USB storage device is mounted as a CD, the Endpoint Security module will not prevent AUTORUN from executing.
  7. Read Only-USB - This option allows you to access the USB device in read-only mode.

Reports section

This section displays the following information.
  • Total Applications Allowed - It shows the total number of applications allowed by the Endpoint Security module.
  • Total Applications Blocked - It shows the total number of applications blocked by the Endpoint Security module.

 

 


In addition, you can view the following reports.
  • View Report – This link opens up the Report For Endpoint Security window.


The Report for Endpoint Security window

This window displays the report for the Endpoint Security module for a given range of dates in a tabular format when you click the Generate Report button.

 

 

  • Generate Report - You should select a range of dates and then click this button to generate a report for the Endpoint Security module for that range of dates.

eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers