GFI EndPointSecurity

How can we improve?

(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  1. Toggle client to use least restrictive group

    We're using GFI Endpoint to control data written to removable media. We want to allow all users to read from removable media, but want a small subset of users to write to removable media. I

    deally, the "Everyone" group would have read only access while a "Media Write Authorized" group would have Read/Write capability. As it stands now, this won't work because the "Everyone read only" is most restrictive and would be applied to, well, everyone. Can we set a bit in the policy to process permissions for least restrictive rather than most restrictive? Otherwise most new users to the…

    2 votes
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  2. Is there any other way to know who use GFI landguard?, Is it possible to add a login to the app and to know what actions are made for the te

    Is there any other way to know who use GFI landguard?, Is it possible to add a login to the app and to know what actions are made for the any technician

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  3. EP Security Volume Encryption Decrypt option along as Enter encripted pen password

    We would like to be able and have the option to volume decrypt in the same window when encrupted pen asks for encryption password.

    We ask this, so that we wont do any changes in encryption options policies.

    Thank you,

    José

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  4. Traveler program need not require user to have local admin rights to run.

    In my POC environment, all of the PCs & Laptops in the POC network will have the GFI End Point Security installed but the rest of the corporate PCs & laptops are not install with GFI and thus required the Traveller. And that's why I cannot agreed with the requirement of the users must has local PCs or Laptops Administrators privilege before he/sh could use the traveler.

    We will not have the direction to replace my existing DLP endpoint solution with GFI just because of this requirement. Thus, I am requesting for this feature to be added into GFI and…

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Reviewed  ·  2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  5. Blocking Removable Memory Cards

    At the moment, EPS does not have the features to block access to removable memory cards. It is only possible to do this on card 'reader'. However, if you allow access to this reader you would allow any memory cards to be access from the reader. Please vote for this feature guys.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  6. More control of temporary access

    When granting temporary access currently you give access to all types of a category (ie USB devices) for the time frame specified. We would like to be able to limit the access to a subset or in our example just bitlocker encrypted devices.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  7. View, count or export a list of Computers by policy

    It seems a list of computers that have a certain protection policy applied cannot be exported, counted or organized by policy. This can only be counted on screen. This would be an easy and useful feature to have if we are to continue the rollout of our Endpoint security installation.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  8. Auto Discover By IP Range

    Despite being able to Scan by IP range (Under Scanning > Scan Area), the GFI Console does not allow to Auto-Discover by IP range (Under Configuration > Computers > Auto Discovery Settings).

    We have 6 Jurisdictions and 6 GFI Servers, 1 Server per Jurisdiction. Auto Discovery by Domain is totally impractical because this pulls in ALL Workstations into EVERY GFI Server; rather than just those specified in the Scanned IP Range.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  9. Centralised Deployment Enhancement For Policies

    When deploying the GFI Agent, using SCCM or WDS for example, the Agent is deployed without the Policies. Policies are only picked up when the Agent is deployed from the Console.

    This is especially problematic with Microsoft Surface Pro devices, for which the Docking Station (which provides Ethernet connectivity) is completely blocked when the GFI Agent is deployed. The device must then be connected to Wi-Fi, have the GFI Agent removed from the console, and then re-deployed again but from the console instead.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  10. Case# GFI-160718-421294 for EndPointSecurity: Define priority for whitelisted hardware - Routing ID: [ ref:_00D80ZQDU._500C012HNEx:ref ]

    The manual process to increase of decrease the priority for whitelisted/blacklisted hardware is very disturbing...!

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  11. GFI Endpoint Security Offline Temporary Access

    The user/computer protected by GFI Endpoint Security requesting the temporary access using a request code should not mandatorily need to be connected to the network for an unlock code to be generated and temporary access validated. Very often, we have scenarios where no wired/wireless connection is available at certain sites but still temporary access is required on USB ports. For e.g, a user who in the middle of a presentation in the boardroom which is not connedted to any network needs to plug in the USB device of a guest. Or a user in a remote office or at home…

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  12. Laptops should view the site concentrator as an option for managed AV updates

    Laptops look for site concentrator before going to the Internet

    When managed antivirus gets updates, laptops should check for the presence of the site concentrator and then after a predetermined number of retries go to the Internet to download their definitions. In healthcare and education environments where a lot of laptops roam the campus, but never leave the site are placing a large burden on the Internet connection for updates. Managed antivirus on laptop do not use the site concentrator for updates. This simple solution would save a lot of bandwidth, especially on Monday mornings.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  13. Encryption for GFI ESEC

    Encryption for GFI EndPointSecurity

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  14. Poison Pill

    Poison Pill capability to destroy 'lost' data / hardware etc

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Flag idea as inappropriate…  ·  Admin →
  15. Policy

    I'd like to propose some changes to how the policies works.
    Now we have to create a lot of groups if we want to give different rights to different users.
    If we change Priorities such way that they applies through all created policies and affect all of them at once.
    for example: we have 2 policies:
    1. all users - include all domain users
    device - priority - action
    USB storage - 5 - deny
    cd-dvd - 6 - deny
    2. good users - several users that can use usb-sticks
    USB storage - 1 - allow all
    3. middle users…

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  16. Data Shadowing for ESEC

    Many competitors has a feature called "data shadowing". This feature enables the possiblity to copy files or type (defined in policy) to an hidden share.

    An administrator can later access these files to view which content and files are copied to the device (e.g. removable media).

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  17. Citrix XenDesktop

    Currently GFI Endpointsecurity doesn't support Citrix XenDesktop. It would be great if GFI has plan on it

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  18. Write access for Blackberry's

    Write access for Blackberry's
    I need the ability to allow write for blackberrys in order to sync. Currently after adding the device to my policy there is only a check box for allowing or disabling Read. I need to have a check box for write as well.

    Thanks

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  19. Comments per Policy

    It would be nice to be able to comment on a certain policy, so I can tell what its purpose is. Also it would be nice to see one extra screen in the Status | General overview: the number of Blocks and Allows per Policy (in numbers).

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  20. Exlcute range for automatic discovery

    It would be extremly helpfull, if there were the possibility to enter an excute, for avoiding, during the automatic dicovery, the installation of the EPS agent on PCs were it isn't desired?

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

GFI EndPointSecurity

Feedback and Knowledge Base