Can the EasyLock App Be Opened Without the Endpoint Protector Agent Installed?
Explains how to configure whether the EasyLock app requires the Netwrix Endpoint Protector agent to be installed before it can be opened and where to change the setting.
Explains how to configure whether the EasyLock app requires the Netwrix Endpoint Protector agent to be installed before it can be opened and where to change the setting.
This article outlines the steps to create a backup of all settings, rights, policies, and integrations for disaster recovery or migration purposes.
Explains the recommended number of endpoints for enabling File Tracing and File Shadowing and how to avoid appliance performance issues caused by excessive log data.
This article explains how to enable EasyLock application updates and file shadowing for removable drives using the Endpoint Protector web console.
Explains the file shadow formats Endpoint Protector saves for printed documents when Advanced Printer and MTP Scanning is enabled, including the default ` .txt ` representation and possible original-format ` .pdf ` files.
This article provides step-by-step instructions for performing a backup restore for Endpoint Protector, ensuring data security and system integrity.
This article provides step-by-step instructions on how to reassign a valid Enforced Encryption license from the server to a USB storage device.
This article explains how to configure an uninstall protection password in Netwrix Endpoint Protector so that only authorized users can remove the client from managed devices.
Explains how EasyLock behaves on a computer that does not have Netwrix Endpoint Protector or its client software, and how you can access encrypted data using a password and AES-256 encryption.
Learn how to locate logs in the Content Aware Report when partitions are used so you can find results that may be stored on a different partition.
Describes how to manage Enforced Encryption settings in Endpoint Protector, including master password configuration, password complexity rules, and Enforced Encryption file tracing (including Offline File Tracing and File Shadowing).
This article explains how you can secure the Netwrix Endpoint Protector (EPP) client on endpoint machines against unauthorized uninstallation by using an uninstall password and Tamper Mode.
This article explains how to restart the Endpoint Protector (EPP) client on Windows, macOS, and Linux without restarting the computer.
Explains why System Backup V2 may not appear in the Netwrix Endpoint Protector console for virtual appliances hosted on the Netwrix AWS platform and instructs you to contact Netwrix Support for remediation.
This article explains what a "File Read-Write" event is on the Endpoint Protector Server and provides instructions for setting up alerts and tracking existing alerts.