Skip to main content

23 docs tagged with "features-and-operations"

View all tags

Client Modes Overview

Describes the six client modes in Netwrix Endpoint Protector, their behavior, and recommendations for when to use each mode. Explains differences between Normal, Transparent, Stealth, Panic, Hidden Icon, and Silent modes and links to additional documentation.

Creating eDiscovery Policies and Scans

This article explains how to create custom eDiscovery policies and manage scans in Netwrix Endpoint Protector, including how to define scan types, configure scan intervals, and review scan results.

OTP Device Code Compatibility

This article outlines recent improvements to the Offline Temporary Password (OTP) feature and the implementation of 8-digit device codes, which facilitate multiple device usage per company.

Overview of Remediation Actions in eDiscovery

This article describes the remediation options available after completing an eDiscovery scan in Endpoint Protector, helping to mitigate risks associated with sensitive data discovered on endpoints.

Process Pending Deletes

Explains why the Indexer service reports "process pending deletes" in the Netwrix Data Classification service viewer and how to improve Pending Deletes processing performance.

Restrict Applications or CLI Commands

Learn how to block or disable specific applications or CLI commands by creating an Applications denylist in Netwrix Endpoint Protector policy settings.

Search Logic - Netwrix Data Classification

How to restrict search results by using keywords, phrases, and operators in Netwrix Data Classification. Explains required and excluded term syntax and spacing rules, including Compound Term Processing behavior.

User Remediation Reporting

This article explains how to locate and review logs of end user responses to User Remediation interventions in Endpoint Protector.

What Are Cryptographic Hashes?

This article explains the purpose of cryptographic hashes and how to verify the integrity and authenticity of files downloaded from Endpoint Protector.