📄️ iOS Device Recognition
This article addresses whether Endpoint Protector recognizes iOS devices when connected to a Windows PC.
📄️ Block File Transfers to or from Network Shares
Explains how to block file transfers to or from network shares by configuring the Content Aware Protection policy. Includes step-by-step instructions and examples for specifying network share paths.
📄️ Blocking EasyLock Folder Access on Machines...
This article explains how you can prevent access to EasyLock-protected folders from machines that do not have the Endpoint Protector agent installed, ensuring only endpoints with the agent can open EasyLock folders.
📄️ Can Endpoint Protector Block Internal Card Readers
Yes. Endpoint Protector can block internal card readers on Mac by treating them as the USB Storage Device device class; set the class rights to Deny to block the reader.
📄️ Can You Block an Internal Card Reader on Mac?
Explains how to block an internal card reader on a Mac using Netwrix Endpoint Protector (EPP) and how user remediation affects inserted SD cards.
📄️ Configuring Rights for Outside Hours and Outside N
Step-by-step instructions to configure rights for Outside Hours and Outside Network in Netwrix Endpoint Protector, including how to enable policies, set working hours, define DNS settings, and configure fallback rights.
📄️ Device Control Sections Overview
Describes the sections within the Device Control module of Netwrix Endpoint Protector and explains how to manage devices, computers, users, groups, global settings, and custom device classes.
📄️ Error: "Cannot execute command! An error occurred!"
This article explains why the notification "Cannot execute command! An error occurred!" appears in the Endpoint Protector Server UI and how to resolve it.
📄️ Error: Failed to Initiate USB device
Explains why macOS shows "Failed to initiate USB device" when launching EasyLock from Finder with read-only access enforced, and how to launch EasyLock using the Netwrix Endpoint Protector Client or Notifier.
📄️ Devices Not Visible
This article addresses the issue of new devices not appearing in the List of Devices on a protected computer and provides troubleshooting steps to resolve the problem.
📄️ Global Rights Option Not Displayed When Easylock R
When an Easylock administrator role is assigned to an administrator group, the Global rights option does not appear in the Device Control submenu. This article explains the cause, confirms that this is expected behavior, and provides steps to reproduce and options to request a change.
📄️ How to Back Up Data from a USB Drive When Experien
If you are experiencing issues with Easylock, back up the data on your USB drive using these step-by-step procedures to secure your files and restore access.
📄️ How to Charge an iPhone on a Computer Controlled b
Explains whether you can charge an iPhone on a computer managed by Netwrix Endpoint Protector and which device permissions allow charging.
📄️ How to Configure Deny Access but Allow Charging fo
Use the Deny Access but Allow Charging right to allow iOS devices to charge while access is denied. This article shows where to configure this setting in the Netwrix Endpoint Protector Console and provides important notes about its behavior.
📄️ How to Configure User Remediation for Device Contr
This article explains how to configure user remediation for Device Control in Netwrix Endpoint Protector, including global, group, and device-level settings. It also shows how to configure remediation pop-ups, justifications, and device-specific rights.
📄️ How to Set Access Rights for an iPhone
Explains why the Read Only access right is unavailable for iPhone devices and lists the supported access rights you can assign.
📄️ How EasyLock Works with EPP
This article explains how EasyLock software integrates with the Endpoint Protector Server and Client software, detailing the steps to configure and use it effectively.
📄️ Add Devices to Allow List
This article explains how to add specific devices to the allow list using the web console interface.
📄️ Control iDevices on Endpoint Protector
This article provides step-by-step instructions on how to control iDevices such as iPhones, iPads, and iPods Touch within Endpoint Protector on Mac computers.
📄️ View Scanner in Controlled Device List
This article explains how to locate your scanner in the controlled device list within the Endpoint Protector Console.
📄️ Whitelisting a Device
This article explains how to globally whitelist a specific device in Endpoint Protector (EPP) by creating a custom class. You will learn how to identify devices using attributes and configure access permissions.
📄️ Managing Network Share Rights in Device Control
Learn how to locate and modify access rights for Network Shares in Endpoint Protector Device Control. This article explains the permission model, priority order, and specific restrictions that apply to Network Shares on Windows and macOS.
📄️ Missing Devices in the Client List
Steps to diagnose and resolve issues where devices do not appear in the client list for Netwrix Endpoint Protector by checking certificates and digital signatures.
📄️ Read Only Access Issues
This article explains why the Read Only access right may not function as expected after changing access rights and provides guidance on how to ensure the correct permissions are applied.
📄️ Resolve WiFi Connection Issues When Rights Are Set
Explains why setting WiFi rights to Allow Access does not immediately enable WiFi on a computer running the Endpoint Protector client and what to do.
📄️ Set Rights for a Specific Device
Learn how to set or remove rights for a specific device in the Netwrix Endpoint Protector console. Follow step-by-step instructions to assign or revoke device rights for users, computers, or groups.
📄️ Understanding the Rights Hierarchy for Devices
This article explains the rights hierarchy for devices in Netwrix Endpoint Protector and how permissions are applied and overridden. It also shows how to set precedence between Computer and User rights and explains Custom Classes.
📄️ Why Is a Printer Detected as an USB Storage Device
Explains why Netwrix Endpoint Protector detects printers with internal storage as USB storage devices and how device type information is reported by the operating system.
📄️ Why Smartphones Are Detected as Multiple Device Ty
Explains how Netwrix Endpoint Protector identifies smartphones and why a single phone may be detected as multiple device types depending on manufacturer and configuration.
📄️ iPhone Blocked by Endpoint Protector
This article explains why an iPhone may remain blocked by Endpoint Protector despite having Allow Access rights and provides guidance on how to resolve the issue.
📄️ Why Endpoint Protector Detects Cameras
This article explains why Endpoint Protector detects cameras as Digital Cameras on some computers and as Windows Portable Devices (MTP) on others.