Client Integrity Fail Events
This article explains the meaning of client integrity fail events and outlines their potential causes.
This article explains the meaning of client integrity fail events and outlines their potential causes.
Describes the six client modes in Netwrix Endpoint Protector, their behavior, and recommendations for when to use each mode. Explains differences between Normal, Transparent, Stealth, Panic, Hidden Icon, and Silent modes and links to additional documentation.
This article explains how to create custom eDiscovery policies and manage scans in Netwrix Endpoint Protector, including how to define scan types, configure scan intervals, and review scan results.
This article explains how to display the Destination URL in Content Aware Reports in Endpoint Protector.
Netwrix Endpoint Protector limits report displays to 10,000 entries; this article explains how you can view all eDiscovery scan results when the results exceed that limit by using filters or creating an audit log backup.
Explains how the Spectre and Meltdown processor vulnerabilities affect Netwrix Endpoint Protector deployments and provides guidance for appliances, virtual appliances, and endpoints.
This article provides the default username and password for the Reporting and Administration Tool and recommends changing them immediately after setup.
This article lists the network ports used by Netwrix Endpoint Protector Server and Client and explains firewall configuration required to ensure proper communication, updates, and Active Directory integration.
This article outlines recent improvements to the Offline Temporary Password (OTP) feature and the implementation of 8-digit device codes, which facilitate multiple device usage per company.
This article describes the remediation options available after completing an eDiscovery scan in Endpoint Protector, helping to mitigate risks associated with sensitive data discovered on endpoints.
Explains why the Indexer service reports "process pending deletes" in the Netwrix Data Classification service viewer and how to improve Pending Deletes processing performance.
This article provides recommendations for ensuring seamless interaction between Endpoint Protector and various security vendors, proxies, cloud access security brokers (CASBs), and web browsers.
Learn how to block or disable specific applications or CLI commands by creating an Applications denylist in Netwrix Endpoint Protector policy settings.
How to restrict search results by using keywords, phrases, and operators in Netwrix Data Classification. Explains required and excluded term syntax and spacing rules, including Compound Term Processing behavior.
This article outlines the platforms on which Endpoint Protector Server can be installed, including deployment methods and supported environments.
This article explains how to locate and review logs of end user responses to User Remediation interventions in Endpoint Protector.
Use Smart Groups in Netwrix Endpoint Protector to automatically assign computers and users to groups by name patterns. Configure wildcard include and exclude rules to keep group membership current without manual intervention.
This article explains the purpose of cryptographic hashes and how to verify the integrity and authenticity of files downloaded from Endpoint Protector.
This article explains what the color indicators mean in the Endpoint Protector Server and Client. It maps each color to the corresponding device right or status so you can interpret device states at a glance.
This article explains what usage and license data Netwrix Data Classification sends to Netwrix. It confirms that collected sensitive data remains on-premises and lists the specific telemetry counters transmitted.
This article explains how to whitelist or exclude Endpoint Protector (EPP) processes in CrowdStrike to ensure proper functionality without interference from security policies.
Explains why various Linux system users (for example, root, 65534, lightdm) appear in the Endpoint Protector user interface and how the client determines the active user.
This article explains why the eDiscovery Scanning Status progress bar may drop to a lower percentage during a scan and the factors affecting its recovery time.