Are iOS Devices Recognized When Connected to a Windows PC?
This article addresses whether Endpoint Protector recognizes iOS devices when connected to a Windows PC.
This article addresses whether Endpoint Protector recognizes iOS devices when connected to a Windows PC.
Explains how to block file transfers to or from network shares by configuring the Content Aware Protection policy. Includes step-by-step instructions and examples for specifying network share paths.
This article explains how you can prevent access to EasyLock-protected folders from machines that do not have the Endpoint Protector agent installed, ensuring only endpoints with the agent can open EasyLock folders.
Yes. Endpoint Protector can block internal card readers on Mac by treating them as the USB Storage Device device class; set the class rights to Deny to block the reader.
Explains how to block an internal card reader on a Mac using Netwrix Endpoint Protector (EPP) and how user remediation affects inserted SD cards.
Step-by-step instructions to configure rights for Outside Hours and Outside Network in Netwrix Endpoint Protector, including how to enable policies, set working hours, define DNS settings, and configure fallback rights.
Describes the sections within the Device Control module of Netwrix Endpoint Protector and explains how to manage devices, computers, users, groups, global settings, and custom device classes.
This article explains why the notification "Cannot execute command! An error occurred!" appears in the Endpoint Protector Server UI and how to resolve it.
This article addresses the issue of new devices not appearing in the List of Devices on a protected computer and provides troubleshooting steps to resolve the problem.
Explains why macOS shows "Failed to initiate USB device" when launching EasyLock from Finder with read-only access enforced, and how to launch EasyLock using the Netwrix Endpoint Protector Client or Notifier.
When an Easylock administrator role is assigned to an administrator group, the Global rights option does not appear in the Device Control submenu. This article explains the cause, confirms that this is expected behavior, and provides steps to reproduce and options to request a change.
This article explains how EasyLock software integrates with the Endpoint Protector Server and Client software, detailing the steps to configure and use it effectively.
This article explains how to add specific devices to the allow list using the web console interface.
If you are experiencing issues with Easylock, back up the data on your USB drive using these step-by-step procedures to secure your files and restore access.
Explains whether you can charge an iPhone on a computer managed by Netwrix Endpoint Protector and which device permissions allow charging.
Use the Deny Access but Allow Charging right to allow iOS devices to charge while access is denied. This article shows where to configure this setting in the Netwrix Endpoint Protector Console and provides important notes about its behavior.
This article explains how to configure user remediation for Device Control in Netwrix Endpoint Protector, including global, group, and device-level settings. It also shows how to configure remediation pop-ups, justifications, and device-specific rights.
This article provides step-by-step instructions on how to control iDevices such as iPhones, iPads, and iPods Touch within Endpoint Protector on Mac computers.
Explains why the Read Only access right is unavailable for iPhone devices and lists the supported access rights you can assign.
This article explains how to locate your scanner in the controlled device list within the Endpoint Protector Console.
This article explains how to globally whitelist a specific device in Endpoint Protector (EPP) by creating a custom class. You will learn how to identify devices using attributes and configure access permissions.
Learn how to locate and modify access rights for Network Shares in Endpoint Protector Device Control. This article explains the permission model, priority order, and specific restrictions that apply to Network Shares on Windows and macOS.
Steps to diagnose and resolve issues where devices do not appear in the client list for Netwrix Endpoint Protector by checking certificates and digital signatures.
This article explains why the Read Only access right may not function as expected after changing access rights and provides guidance on how to ensure the correct permissions are applied.
Explains why setting WiFi rights to Allow Access does not immediately enable WiFi on a computer running the Endpoint Protector client and what to do.
Learn how to set or remove rights for a specific device in the Netwrix Endpoint Protector console. Follow step-by-step instructions to assign or revoke device rights for users, computers, or groups.
This article explains the rights hierarchy for devices in Netwrix Endpoint Protector and how permissions are applied and overridden. It also shows how to set precedence between Computer and User rights and explains Custom Classes.
This article explains why an iPhone may remain blocked by Endpoint Protector despite having Allow Access rights and provides guidance on how to resolve the issue.
This article explains why Endpoint Protector detects cameras as Digital Cameras on some computers and as Windows Portable Devices (MTP) on others.
Explains why Netwrix Endpoint Protector detects printers with internal storage as USB storage devices and how device type information is reported by the operating system.
Explains how Netwrix Endpoint Protector identifies smartphones and why a single phone may be detected as multiple device types depending on manufacturer and configuration.