Home

User Manual

image

Contents

1. View History Bookmarks Tools Help dpoint Protector 4 Reporting and x J D aws marketplace ENDPOINT 4 Fel Dashboard i al Endpoint Management h h m Ce Endpoint Rights Note Endpoint Protector Client version higher than 4 1 0 0 is required for Content Aware Protection 4 End S The Endpoint Protector Chent can be installed on Windows 7 32bit and Gbit Content Aware Protection Windows Vista 32bit and 64bit X 10 Mobile Device Management ep Ubuntu tal Offline Temporary Password To instal the Endpoint Protector Chent on your cient computers please download it from the following location Reports and Analysis To nstal the cient software please provide the Endpoint Protector Server IP and Port A System Alerts Endpoint Protector Server P Endpoint Protector Server Port 43 Directory Services To install the cient software under a certain department please provide the Department Code Department Code defdep Windows 32bit version Version 4 1 7 0 Windows 64bit version Version 4 1 7 0 Mac OS X 10 5 Leopard Version 1 1 1 0 Mac 05 X 10 4 Tiger Version 1 0 9 0 Linux Version 1 0 0 1 one Download selected version Endpoint Protector Cient for Windows can be deployed over Active Directory For more information please refer to Endpoint Protector User Guide a System Parameters Qo Endpoint Protector 4 Copyright 2004 2013 CoSoSys Ltd AI nights
2. at You can also write an e mail to our Support Department under the Contact Us tab from the Support module Welcome tt Logout du ENDPOINT 4 PROTECTOR Reporting and Administration Tool Engish Q pa Dashboard Endpoint Management PR Cs Endpoint Rights Sender E mail Endpoint Settings eso than a Subject Content Aware Protection Content el Mobile Device Management ky Offline Temporary Password IBM Reports and Analysis A System Alerts Directory Services Send System Maintenance Q System Configuration a System Parameters O Support User Manual AD Deployment Guide Contact Support Endpoint Protector 4 Copyright 2004 2012 CoSoSys Ltd All rights reserved Advanced Search administrator cososys com Please describe here your problem or your suggestions Ready Version 4 1 0 2 One of our team members will contact you in the shortest time possible Even if you do not have a problem but miss some feature or just want to leave us general comment we would love to hear from you Your input is much appreciated and we welcome any input to make computing with portable devices safe and convenient 4 Important Notice Disclaimer Security safeguards by their nature are capable of circumvention CoSoSys cannot and does not guarantee that data or devices will not be accessed by unauthorized persons and CoSoSys disclaims any warranties to that effect to the fullest extent
3. permitted by law 2004 2013 CoSoSys Ltd Endpoint Protector My Endpoint Protector are trademarks of CoSoSys Ltd All rights reserved Windows is registered trademark of Microsoft Corporation Android is registered trademark of Google Inc Macintosh Mac OS X iOS MacBook are trademarks of Apple Corporation AWS and Amazon Web Services is a trademark of Amazon All other names and trademarks are property of their respective owners
4. prompted to save the private key to your computer Note You only need to generate a key pair once not each time you want to deploy an Amazon EC2 instance D Choose from your existing Key Pairs _ Create a new Key Pair NOTE You will not be able to connect to this instance unless you already know the password built in to this AMI 7 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual In the step Configure Firewall we recommend you to make the following settings Choose the option Create a new Security Group Give the Group a Name and a Description For Inbound Rules choose Create a new Rule choose Custom TCP rule from the dropdown Add port 80 and click Add Rule add port 443 and click Add Rule add port 22 and click Add Rule Click Continue Request Instances Wizard CHOOSE AN AM INSTANCE DETAILS CREATE KEY PAI CONFIGURE FIREWALL Security groups determine whether a network port is open or blocked on your instances You may use an existing security or we can help you create a new security group to allow access to your instances using the suggested ports below Add a ate your secunty group anytime using the Security a group Groups page Choose one or more of your existing Security Groups Create a new Security Group Group Name EPP Group Demo Group Description Port needed open for EPP Inbound Rules Create a Custom TCP rul
5. reserved 13 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual Now go to System Configuration gt Client Software and change the IP Address written in the field Endpoint Protector Server IP and change the IP in this field to the Elastic IP you have assigned to the Endpoint Protector Instance Endpoint Protector 4 Reporting and Administration Tool Mozilla Firefox Eile Edit View History Bookmarks Tools Help EC2 Management Console Endpoint Protector 4 Reporting and x P bitps 54 225 89 15 index php e C E aws marketplace La ENDPOINT 4 re ds mkinig Reporting and Administration Tool ET Dashboard i al Endpoint Management Gent k Ce Endpoint Rights Mote Endpoint Protector Client version higher than 4 1 0 0 is required for Content Aware Protection The Endpoint Protector Chent can be installed on A Endpoint Settings Windows 7 32bit and Gtit Content Aware Protection Windows Vista 32bit and 64bit Windows XP 32bit and 64bit Mac OS X 10 5 Snow Leopard m Mobile Device Management Mac OS X 10 4 Tiger Linux Ubuntu OpenSUSE Offline Temporary Password Reports and Analysis A System Alerts Endpoint Protector Server P Directory Services To install the cient software under a certain department please provide the Department Code Department Code defdep Windows 32bit version Version 4 1 7 0 Windows 64bit ver
6. yi ey N Have fun 2 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual or after logging in your AWS account in the AWS Management Console Services v EC2 EC2 Dashboard Launch Spot Request Register New AMI Copy Events Tags 4 Viewing Public Images All Platforms Endpoint Protector INSTANCES W Name AMIID Source instances W Endpoint Protector4 8 amiss ES Endpoint Protector 4 AMI Spot Requests Reserved Instances IMAGES Amis Bundle Tasks 1 3 Licensing for Endpoint Protector with AWS Endpoint Protector 4 is a Bring your Own License BYOL Instance It means you are paying Amazon for running the instance and you import your license file that you have purchased from CoSoSys or any CoSoSys Partner The license fee for using Endpoint Protector with AWS is the same as for licensing Endpoint Protector 4 as a Virtual Appliance To purchase a license please contact your CoSoSys Distribution Partner or sales cososys com 3 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual 1 4 Setting up an EC2 Instance After finding the Endpoint Protector 4 AMI in your AWS Management Console select it Services EC2 Dashboard Register New AMI Events Tags Viewing All Images AllPlatiorms Name AMI ID Source Owner ID Instances B amis Spot Requests Reserved Instances 0 EC2 Amazon Machine I
7. a ENDPOINT PROTECTOR User Manual Version 1 0 0 0 Cosos Ys I Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual Table of Contents 1 Getting Started 1 1 1 Introduction sise 1 1 2 Locate AMI of Endpoint Protector 4 on AWS Marketplace or AWS Management Console names ass aascaausaosenassnau ag ses 1 1 3 Licensing for Endpoint Protector with AWS cccccceeeeeeeeeees 2 1 4 Setting up an EC2 Instance LR 3 1 5 Accessing Endpoint Protector Web Interface 12 2 What Endpoint Protector does 14 Be 15 10 018 g Se E E EE S 17 4 Important Notice Disclaimer 008 18 This manual gives a short guidance on how to use an Endpoint Protector 4 server part AMI with Amazon Web Services short AWS It shows you the steps in order to run the Endpoint Protector 4 server part as an Amazon EC2 instance For information about general use of Endpoint Protector 4 and its features please consult the Endpoint Protector 4 User Manual Endpoint Protector 4 is available as an AMI on the AWS Marketplace to find it search for Endpoint Protector on the AWS Marketplace aa Amazon Web Services Home 2 awsmarketplace in or eat a va 1 Your Ac punt H Shop All Categories Endpoint Protector Go gt Your Software Software a Fe oo 7 z Infrastructure eae Re os We are hiring Application i Work hard Development
8. cy Terms of Use compute 1 amazonaws com Status Checks 2 2 checks pi none State Alarm Status running Alarm Status Security Groups State Owner Subnet ID Virtualization Reservation Platform Kernel ID AMI Launch Index Root Device Tenancy Lifecycle Security Groups EPP Group Demo Key Pair Name EPP Group Demo view rules runneng paravirtual 0 sdal default normal Virtualization paramrtual C 1 to 1 of 1 Items Feedback C 1 to 1 of 1 Instances Placement Group Feedback m 12 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual 1 5 Accessing Endpoint Protector Web Interface As a next step you can now access your Endpoint Protector through a web browser to continue and finalize the setup Login to interface through httpS Elastic IP using the Elastic IP you have assigned in the previous step Click continue trust or add exception when your web browser shows you a warning regarding the certificate of the accessed website The default user name to login the Endpoint Protector interface is root and the password is epp2011 First we recommend you to change the root account password to login in Endpoint Protector in order to secure your EPP instance from unauthorized access Change the root password under System Configuration gt System Administrators Endpoint Protector 4 Reporting and Administ pe File Edit
9. e new rule Port range e 0 80 of 49152 65535 Source 0 0 0 0 0 9 192 168 2 0 24 sg 47ad482e or 1234567890 default The ports are required as follows port 22 for support 80 for http access and 443 for interface access and client server communication 8 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual Review your settings and click Launch your instance Please review the information below then click Launch AMI Other Linux AMI ID ami mamm i386 Edit AMI Number of Instances 1 Availability Zone No Preference Instance Type T1 Micro tl micro Edit Advanced Details Key Pair Name No Key Pair Edit Key Pair Edit Firewall You see the message that your instance is launching Choose Close to finish the Launch Instance Wizard Note Your instances may take a few minutes to launch depending on the software you are running Note Usage hours on your new instances will start immediately and continue to accrue until you stop or terminate your instances You can perform the following tasks while your instances are launching gt Create Status Check atorms i3 You can use status check alarms to be notified if these instances fail status checks additional charges may apply gt Create EBS Volumes Additional charges may apply gt View your instances on the Instances page 9 Endpoint Protector Amazon Web Services EC2 for Endpoi
10. e Architecture i386 Platform Other Linux Elastic IPs Root Device Type ebs Root Device jdev sda1 Image Size 50 GiB jus Groups Block Devices dev sdal lt snap 9864 lade 8 false standard dev sdc snap a264 1ae4 4 false standard dev sdb snap 2164123e7 38 false standard dev sda2 ephemeralo ncers Key Pairs Virtualization paravirtual Network Interfaces State Reason 2008 2013 Amazon Web Services Inc or its affiliates All rights reserved Privacy Policy Terms of Use Feedback l console aws amazon com ec2 hometregion us east 15 Choose an Instance Type and Region Availability Zone and click Continue The default Endpoint Protector 4 AMI you are using is optimized to be run as a small T1 Micro instance It is the optimal size to support deployment with 50 protected Endpoints and 50 mobile iOS Android mobile devices To support larger deployment of Endpoint Protector please contact support endpointprotector com to have your instance adjusted for greater performance with one of our experts Request Instances Wizard CHOOSE AN AMI INSTANCE DETAILS Provide the details for your instance s You may also decide whether you want to launch your instances as on demand or spot instances ni dde Launch as an EBS Optimized instance additional charges apply Launch Instances EC2 Instances let you pay for compute capacity by the hour with no long term commitments This transforms what are commonly large fixed c
11. mages selected Select an image above AMIS Bundie Tasks Volumes Snapshots Security Groups Elastic IPs Placement Groups Load Balancers Key Pairs Network Interfaces Owner Visibility Private Status available Product Codes Architecture i386 C Ff tittotofiAMis gt gt AMI Name Description Platform Endpoint Protector 4 AMI Other Linux m 5 Feedback 4 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual Choose Launch Instance from the right click menu which will launch the Request Instance Wizard EC2 Dashboard Launch Spot Request Register New AMI Copy Events Tags Viewing All images All Platforms mn I lt lt 1to10of1AMis gt gt INSTANCES M Name gt AMID Source Owner ID Owner Visibility Status Product Codes Architecture AMI Name Description Platfomm M empty Private avaiable 1386 Endpoint Protector 4 AMI Other Linux Spot Requests i Reserved Instances 1 EC2 Amazon Machine _ Edit Description i non EC2 Amazon Machii Add Edit Tags 559 A 5 IMAGES amis Description Tags Bundle Tasks AMI ID AMI Name Endpoint Protector 4 AMI ELASTIC BLOCK STORE Volumes R SS5 Endpos Snapshots Source oint Protector 4 AMI Owner Visibility Private Product Code NETWORK amp SECURITY State available Kernel ID RAM Disk ID Security Groups Image Type machin
12. ndpoints e Mobile Device Management closely controls and monitors the entire mobile device fleet through dedicated MDM policies protecting sensitive company data while permitting a degree of freedom on what concerns the stored personal information Once integrated in a company or enterprise network it ensures a highly secure working environment for companies adopting and using the BYOD model 15 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual e Device Control enforces strong security policies for controlling and closely monitoring all portable storage device use inside the company network Once deployed inside companies networks the Device Control modules reduces the risks of data loss and data theft through unauthorized use of removable and mobile devices through USB etc e Content Aware Protection allows defining custom content aware policies for a detailed inspection detection and reporting of all sensitive content transfers outside the secured network Once enabled the Content Aware Protection module scans all possible exit points and ensures that no critical data leaves the company network either by transfers to removable media or directly via e mail file sharing applications or to the cloud 16 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual In case additional help such as the FAQs or e mail support is required please visit Our Support website directly
13. nt Protector User Manual Wait for the instance to start This might take a few minutes while the Status Checks appears as Initializing EC2 Dashboard Launch instance Actions v C Events Tags 4 Viewing Running Instances All instance Types Name Instance AMI ID Root Device Monitoring Security Groups Key Pair Name Virtualization Placement Group instances empt a ebs basic EPP Group Demo paravirtual Spot Requests Reserved Instances AMIS Bundie Tasks Volumes Snapshots Security Groups No EC2 Instances selected Elastic IPs Placement Groups m Load Balancers Select an instance above Key Pairs Network Interfaces Privacy Policy Terms of Use Feedback As a next step we recommend you to request an Elastic IP This is required so the Endpoint Protector Clients can communicate with the same IP Address in case the instance is restarted Without an Elastic IP Static IP the instance will assign a new IP address every time it is restarted and the Endpoint Protector Clients have to be reinstalled To request an Elastic IP go in the AWS Management Console to the option Network amp Security gt Elastic IPs and click Allocate New Address Release Address Associate Address Address Instance ID ENI ID Scope Public DNS instances v standard Spot Requests Reserved Instances AMIS Bundie Tasks 1 Address selected Address a 5 Security Groups Scope standard Elastic IPs Public DNS Placement Grou
14. or User Manual The Elastic IP is now associated with your Endpoint Protector Instance EC2 Dashboard Events Tags Instances Spot Requests Reserved instances AMIS Bundle Tasks Volumes Snapshots Security Groups Elastic IPs Placement Groups Load Balancers Key Pairs Network Interfaces After a few minutes the Endpoint Protector Instance is running and is associated with the Elastic IP EC2 Dashboard Events Tags instances Spot Requests Reserved instances AMIS Bundle Tasks Volumes Snapshots Security Groups Elastic IPs Placement Groups Load Balancers Key Pairs Network Interfaces 4 Allocate New Address Associate Address All Addresses X Viewing Disassociate Address 4 1 Address selected Address Address Instance ID Scope standard Public DNS Network Interface ID Private IP Address Network Interface Owner Allocation ID Privacy Policy Terms of Use Launch Instance Actions v Viewing Running Instances All instance Types X Type t1 micro 1 EC2 Instance selected EC2 Instance Description Status Checks Monitoring Tags AMI Endpoint Protector 4 AMI Zone us east 1b Type tl micro Scheduled Events No scheduled events VPC ID Source Dest Check Placement Group RAM Disk ID Key Pair Name IAM Role EBS Optimized false Block Devices sdal sdb sdc Network Interfaces Public DNS Privacy Poli
15. osts into much smaller variable costs Launch into EC2 Classic Availability Zone No Preference Request Spot Instances 5 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual Instance Details do not require any adjustments click Continue 0 Number of Instances 1 Availability Zone No Preference Advanced Instance Options H ecfic kernel or RAM disk to use with your instances You can also choose to enable CloudWatch Detailed Monitoring or enter data that wal be available from your instances once they launch Kernel ID UseDetour RAM Disk ID Use Defaut Monitoring E Enabie Cloudwatch detailed monitoring for this instance additional charges will apply User Data as text Use sheft enter to insert a newbne as file F bases4 encoded Termination Prevention a gainst acc idental termination Shutdown Behavior Stop Protection IAM Role None Storage Device Configuration does not require any changes click Continue If you remove any of the assigned EBS Volumes the Instance will fail to start O Number of Instances 1 Availability Zone No Preference Storage Device Configuration Your instance will be launched with the following storage device settings Edit these settings to add EBS volumes instance store volumes or edit the settings of the root volume apshot ID Size Volume Type IOPS Delete on Termination 6 Endpoint Pr
16. otector Amazon Web Services EC2 for Endpoint Protector User Manual Adding Tags is your own choice Click Continue Request Instances Wizard O Add tags to your instance to simplify the administration of your EC2 infrastructure A form of metadata tags consist of a case sensitive key value pair are stored in the cloud and are private to your account You can create user fnendly names that help you organize search and browse your resources For example you could define a tag with key Name and value Webserver You can add up to 10 unique keys to each instance along with an optional value for each key For more information go to Tagging Your Amazon EC2 Resources in the EC2 User Guide Key 127 characters maximum Value ters masimunt Remove N Add another Tag Maximum of 10 In the step Create Key Pair we recommend you to choose the option Proceed without a Key Pair If you choose to use a key pair you might have to share it with our support team for support requests If you choose to use Key Pair make sure it is only used for this instance Click Continue 2a Public private key s allow you to securely connect stance after it launches For Windows Server mstances a Key Pair is require sate se hr debver awe encrypted mth Lele For Linux server instances a key pair waaay you to ror into your instance To create 3 key pair enter a name and cick Create amp Download Your Key Pair You will be
17. ps Network Interface ID Private IP Address Key Pairs Network Interface Owner Allocation ID Network Interfaces Privacy Policy Terms of Use Feedback 10 Endpoint Protector Amazon Web Services EC2 for Endpoint Protector User Manual Now associate the Elastic IP with your Endpoint Protector Instance For that select the IP Address and click Associate EC2 Dashboard Allocate New Address Release Address Associate Address C Events Tags d Viewing All Addresses Search I itoiofiitems gt gt I INSTANCE Address Instance ID ENI ID Scope Public DNS manne eee Spot Requests IMAGES AMIS Bundie Tasks ELASTIC BLOCK STORE 1 Address selected eu Address aa 5 Snapshots Address NETWORK amp SECURITY Instance ID Security Groups Scope standard Elastic IPs Public DNS Placement Groups Network Interface ID Load Balancers a area sn dieu Network Interface Owner Network Interfaces Allocation ID 2008 2013 Amazon Web Services Inc or its affiliates All nghts reserved Privacy Policy Terms of Use console aws amazon com ec2 home region us east 1 Select the Endpoint Protector Instance from the dropdown list and click Yes Associate Associate Address Cancel X Select the instance to which you wish to associate this IP address Instance Select an instance Select an instance 11 Endpoint Protector Amazon Web Services EC2 for Endpoint Protect
18. sion Version 4 1 7 0 Mac OS X 10 5 Leopard Version 1 1 1 0 Mac OS X 10 4 Tiger Version 1 0 9 0 Linux Version 1 0 0 1 None Download selected version Endpoint Protector Cent for Windows can be deployed over Active Directory For more information please refer to Endpoint Protector User Guide a System Parameters H sx Endpoint Protector 4 Copyright 2004 2013 CoSoSys Lid AI nights reserved Now you can download the Endpoint Protector Client Software that has the Elastic IP Address already included Start an Endpoint Protector Client MSI and check in the field Server IP if it corresponds to the Elastic IP If this is the case you can start deploying your Clients to protect your Windows and Mac OS X endpoints ie Endpoint Protector Setup Server information Specify the server address and port Endpoint Protector is a complete Data Loss Prevention solution for companies networks of all sizes enabling a detailed control over removable mobile storage media and mobile devices both inside and outside the companies walls Welcome Guest Login pAg ENDPOINT 4 PROTECTOR Reporting and Administration Tool English 900 ao 000 amp Password Lock Data Loss Prevention Device Control Content Aware Protection Mobile Device Managment Endpoint Protector comprises three separate modules which used together ensures the next generation security of your e

Download Pdf Manuals

image

Related Search

Related Contents

Unit 3 Science and technology - National Geographic Learning  1804s-eng w-parts list 13112KB May 04 2006  Engine Torque Link Bracing Kit Engine Torque Link Installation      Basic Industrial Electric ELECTRICAL In industrial  MODALITÉS ET CONDITIONS DE VENTE DE LUMENPULSE 20  Betriebsanleit Colorado Gesamt - bei Karmann  Strait-Flex OS-400-8 Instructions / Assembly  Manual - Innovative Technology  

Copyright © All rights reserved.
Failed to retrieve file