Skip to main content

Server Functionality

Once the Endpoint Protector Hardware or Virtual Appliance setup is complete, access the User Interface from the assigned IP address.

The default Endpoint Protector Appliance IP address is https://192.168.0.201

NOTE: Always use the IP address with HTTPS (Hypertext Transfer Protocol Secure).

Use the default login credentials for the root account. To obtain the password, submit a support ticket through the Netwrix Customer Portal.

For detailed information on settings change or creating additional administrators, refer to the System Configuration topic.

Page for default login credentials for the root account

Configuration Wizard

The Configuration Wizard provides you with several steps to define basic settings. These include setting up the Server Time Zone, importing Licenses, Server Update or uploading Offline Patches, Global device rights, E-mail Server settings, Main Administrator details, etc. You can change these settings at any time.

The Configuration Wizard is available only if the basic settings for the Endpoint Protector have never been configured.

As an additional security measure, a session timeout is implemented for 300 seconds (5 minutes) of inactivity. If you are not active for this amount of time, you are notified the session will expire and logged out unless you select to continue the session.

NOTE: You can customize the session timeout and timeout counter from the System Configuration topic.

The Configuration Wizard provides you with several steps to define basic settings

General Dashboard

In this section, you can view general information as graphics and charts related to the most important activities logged by Endpoint Protector.

You will view more specific dashboards on the Device Control, Content Aware Protection and eDiscovery sections.

View general information as graphics and charts related to the most important activities

System Status

In this section you can view general information of the system’s functionality, alerts, and backup status.

View general information of the system’s functionality, alerts, and backup status

From the System Functionality section, you can enable Endpoint Protector, as well as just specific modules (Device Control, Content Aware Protection, or eDiscovery).

Enable EPP , as well as just specific modules

From the System Status subsection, you can enable the HDD Disk Space and Log Rotation.

NOTE: If this setting is enabled, when the Server’s disk space reaches a certain percentage (starting from 50% up to 90%), old logs will be automatically overwritten by the new ones.

Enable the HDD Disk Space and Log Rotation.

From the System Alerts subsection, you can enable important alerts notifying the expiration of the APNS Certificate, Updates, and Support or Passwords.

Enable important alerts

From the System Backup subsection, you can enable the System Backup.

Enable the System Backup

Live Update

From this section, you can check and apply the latest security and Endpoint Protector Server updates.

NOTE: This feature communicates through port 80. Whitelist the liveupdate.endpointprotector.com (IP: 178.63.3.86) domain.

Check and apply the latest security and  Server updates

Software Update

Management of software updates

Click Configure Live Update to select manual or automatic live updates check, the number of retries, and manage the Automatic Reporting to the LiveUpdate Server.

Configuring Live Updates

Click Check Now to search for the Endpoint Protector Server updates displayed in the Available Updates section. You can select and install an update with Apply Updates, or all updates with Apply all updates. To view the latest installed updates, click View Applied Updates.

You can also schedule an update. Select an entry from the available updates, click Schedule update and then use the calendar to select the date and confirm your selection.

Checking for available EPP server Updates

Use the Offline Patch upload option to select the offline patches from your computer and successively install them to the latest Endpoint Protector version.

NOTE: To request the Offline Patch, submit a support ticket through the Netwrix Customer Portal.

Select the offline patches from your computer and successively install them to the latest

CAUTION: Before upgrading your Endpoint Protector server to the 5.7.0.0 server version from a pre-5206 version and adjacent OS image, you need to enable database partitions. For assistance, submit a support ticket through the Netwrix Customer Portal.

Security Updates

You can use this section to check and apply different types of security updates, view information on recent updates checked or installed, and a list of updates available.

NOTE: The security update options will only be available for customer-hosted instances (e.g. AWS, Goggle, etc.) with the exception for Operating System and Kernel upgrades.

NOTE: Updates are not tested beforehand but are pulled from the official Linux repository.

To ensure the updates will not harm the system, follow these actions:

  • test the updates in a test environment first
  • make a VM snapshot
  • make a system backup from the System Maintenance, the System Backup v2 section

Select one of the security updates type available and then click Check Updates:

  • Security – this will update all security-related updates of installed packages (Critical and High)
  • Other – this will download and apply any update available to 3rd party libraries, kernel, OS packages and MySQL database
  • All Updates – this will download and apply Informational and Optional/Unclassified updates

If there are updates available, click Apply Updates.

Applying Backend Security Updates

NOTE: For history of applied Backend Updates go to admin action report and choose Apply Updates under Activity filter.

NOTE: Due to patching nature, some updates may automatically restart the Endpoint Protector server or other sub-services in the background

Effective Rights

In this section you can view currently applied Device Control or Content Aware Protection policies. Based on the options you select from the Effective Rights Criteria form, you can view information based on rights, users, computers, device types, specific devices, report type (PDF or XLS), including Outside Hours and Outside Network Policies, and more.

Once the report is generated, from the Actions column, you can download or delete it.