EndPointSecurity Section
Overview GFI EndPointSecurity has been installed successfully and the required agents have been deployed. However, all agents appear offline and no events are forwarded to the GFI EndPointSecurity mai...
Overview All activity logging prior to a specific date is missing in the Logs Browser and Activity Log. However, the events can be found in the GFI EndPointSecurity Windows event log on the agent mach...
Versions / Builds AffectedEndPointSecurity 2012 build 20120104 StatusResolved Problem SummaryWhen the policy allows access to CD/DVD or other devices, the first access is allowed, but re-inserting a C...
Overview You may suspect that a deployed agent is not starting after the reboot of the target machine. Information The EndPointSecurity Agents start automatically. Please view the image below for an...
Overview You may want to export the list of allowed USB devices in EndPointSecurity. Information Unfortunately, that is not currently a feature available in EndPointSecurity's UI. Given the fact tha...
Versions / Builds AffectedEndPointSecurity 2013 builds 20130408 / 20130719 StatusOpen Problem SummaryWhen plugging in a Windows Phone such as a Nokia Lumia, the device is allowed and there are no even...
Answer This can be found in the Control Panel. The tool is called Devices Temporary Access....
AnswerGFI EndPointSecurity controls access to a device separately, per user. GFI EndPointSecurity will have information on which user is accessing a device and is therefore able to decide in real time...
Answer During the installation of EndPointSecurity the installer will ask if you want it to create Active Directory groups to be used in the product. This is intended as a convenience but can cause co...
Answer If users are unable to run executable files, traveler will not be able to run the decryption. A user account needs Read/Write permission for traveler to decrypt data on a storage device....