📄️ Client Modes Overview
Describes the six client modes in Netwrix Endpoint Protector, their behavior, and recommendations for when to use each mode. Explains differences between Normal, Transparent, Stealth, Panic, Hidden Icon, and Silent modes and links to additional documentation.
📄️ Client Integrity Fail Events
This article explains the meaning of client integrity fail events and outlines their potential causes.
📄️ Creating eDiscovery Policies and Scans
This article explains how to create custom eDiscovery policies and manage scans in Netwrix Endpoint Protector, including how to define scan types, configure scan intervals, and review scan results.
📄️ How to View All eDiscovery Scan Results When the Number Exceeds the 10,000 Record Limit
Netwrix Endpoint Protector limits report displays to 10,000 entries; this article explains how you can view all eDiscovery scan results when the results exceed that limit by using filters or creating an audit log backup.
📄️ Display Destination URL in Reports
This article explains how to display the Destination URL in Content Aware Reports in Endpoint Protector.
📄️ Impact of Spectre and Meltdown on Endpoint Protect
Explains how the Spectre and Meltdown processor vulnerabilities affect Netwrix Endpoint Protector deployments and provides guidance for appliances, virtual appliances, and endpoints.
📄️ Locating the Default Username and Password for the
This article provides the default username and password for the Reporting and Administration Tool and recommends changing them immediately after setup.
📄️ Network Ports for Endpoint Protector Server and Cl
This article lists the network ports used by Netwrix Endpoint Protector Server and Client and explains firewall configuration required to ensure proper communication, updates, and Active Directory integration.
📄️ OTP Device Code Compatibility
This article outlines recent improvements to the Offline Temporary Password (OTP) feature and the implementation of 8-digit device codes, which facilitate multiple device usage per company.
📄️ Overview of Remediation Actions
This article describes the remediation options available after completing an eDiscovery scan in Endpoint Protector, helping to mitigate risks associated with sensitive data discovered on endpoints.
📄️ Recommendations for Endpoint Protector Interaction
This article provides recommendations for ensuring seamless interaction between Endpoint Protector and various security vendors, proxies, cloud access security brokers (CASBs), and web browsers.
📄️ Restrict Applications or CLI Commands
Learn how to block or disable specific applications or CLI commands by creating an Applications denylist in Netwrix Endpoint Protector policy settings.
📄️ Supported Platforms
This article outlines the platforms on which Endpoint Protector Server can be installed, including deployment methods and supported environments.
📄️ User Remediation Reporting
This article explains how to locate and review logs of end user responses to User Remediation interventions in Endpoint Protector.
📄️ Using Smart Groups for Automatic Computer and User
Use Smart Groups in Netwrix Endpoint Protector to automatically assign computers and users to groups by name patterns. Configure wildcard include and exclude rules to keep group membership current without manual intervention.
📄️ What Do the Colors Represent in Endpoint Protector
This article explains what the color indicators mean in the Endpoint Protector Server and Client. It maps each color to the corresponding device right or status so you can interpret device states at a glance.
📄️ Cryptographic Hashes Overview
This article explains the purpose of cryptographic hashes and how to verify the integrity and authenticity of files downloaded from Endpoint Protector.
📄️ Whitelist or Exclude EPP Processes
This article explains how to whitelist or exclude Endpoint Protector (EPP) processes in CrowdStrike to ensure proper functionality without interference from security policies.
📄️ Why Do Various Linux System Users Appear in the En
Explains why various Linux system users (for example, root, 65534, lightdm) appear in the Endpoint Protector user interface and how the client determines the active user.
📄️ eDiscovery Scanning Status Progress Bar
This article explains why the eDiscovery Scanning Status progress bar may drop to a lower percentage during a scan and the factors affecting its recovery time.