📄️ Can the EasyLock App Be Opened Without the Endpoin
Explains how to configure whether the EasyLock app requires the Netwrix Endpoint Protector agent to be installed before it can be opened and where to change the setting.
📄️ Create a System Backup
This article outlines the steps to create a backup of all settings, rights, policies, and integrations for disaster recovery or migration purposes.
📄️ Determine the Recommended Number of Endpoints for File Tracing and File Shadowing
Explains the recommended number of endpoints for enabling File Tracing and File Shadowing and how to avoid appliance performance issues caused by excessive log data.
📄️ Enable EasyLock Updates
This article explains how to enable EasyLock application updates and file shadowing for removable drives using the Endpoint Protector web console.
📄️ File Shadow Format for Documents Sent to Printers
Explains the file shadow formats Endpoint Protector saves for printed documents when Advanced Printer and MTP Scanning is enabled, including the default ` .txt ` representation and possible original-format ` .pdf ` files.
📄️ How to Set an Uninstall Protection Password
This article explains how to configure an uninstall protection password in Netwrix Endpoint Protector so that only authorized users can remove the client from managed devices.
📄️ How to Use EasyLock Without Endpoint Protector Sof
Explains how EasyLock behaves on a computer that does not have Netwrix Endpoint Protector or its client software, and how you can access encrypted data using a password and AES-256 encryption.
📄️ Backup Restore
This article provides step-by-step instructions for performing a backup restore for Endpoint Protector, ensuring data security and system integrity.
📄️ Reassign Enforced Encryption License
This article provides step-by-step instructions on how to reassign a valid Enforced Encryption license from the server to a USB storage device.
📄️ Locate Logs in Content Aware Report When Using Par
Learn how to locate logs in the Content Aware Report when partitions are used so you can find results that may be stored on a different partition.
📄️ Managing Enforced Encryption and File Tracing Sett
Describes how to manage Enforced Encryption settings in Endpoint Protector, including master password configuration, password complexity rules, and Enforced Encryption file tracing (including Offline File Tracing and File Shadowing).
📄️ Protect the Client from Unauthorized Uninstallatio
This article explains how you can secure the Netwrix Endpoint Protector (EPP) client on endpoint machines against unauthorized uninstallation by using an uninstall password and Tamper Mode.
📄️ Restart EPP Client
This article explains how to restart the Endpoint Protector (EPP) client on Windows, macOS, and Linux without restarting the computer.
📄️ System Backup V2 Not Showing in the Endpoint Prote
Explains why System Backup V2 may not appear in the Netwrix Endpoint Protector console for virtual appliances hosted on the Netwrix AWS platform and instructs you to contact Netwrix Support for remediation.
📄️ File Read-Write Event Overview
This article explains what a "File Read-Write" event is on the Endpoint Protector Server and provides instructions for setting up alerts and tracking existing alerts.