GFI EndPointSecurity

How can we improve?

(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  1. "Access Mask" in avtivity

    I saw thre is "Access Mask" in activity.
    When I write a file to USB storage, the "Access Mask" includes "Create Files/Write Data....etc"
    That's good.
    So I try to add a query in Log Browser and try to list events which include those "Access Mark". Strange, I cant find filter when edit query.
    Waste such important information!

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  2. Is there any other way to know who use GFI landguard?, Is it possible to add a login to the app and to know what actions are made for the te

    Is there any other way to know who use GFI landguard?, Is it possible to add a login to the app and to know what actions are made for the any technician

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  3. Client offline log store to different location

    When client offline, ESEC agent will record access activilies and send back to console when back to online.
    If user reboot to WinPE and delete agent folder, we will never know what user ever did.
    So I suggest to store such offline log to any other hidden location. When user back to online, ESEC push agent again, agent can detect the log and send back to console.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  4. client delete agent detection

    After EndpointSecurity push agent to client computer, some users may delete agent manually(by boot to Win PE from CDROM or any other way and delete agent program or any other way).

    I understand it is hard to prevent.
    But at least ESEC console should scan all agent status, if ESEC console cant find agent running on one computer which should running agent, ESEC send alert to admin and also show on console!

    Right now ESEC can only know agent last message receive date.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  5. Secure/Restrict the access of the GFI ENDPOINTSECURITY Console

    Secure/Restrict the access of the GFI ENDPOINTSECURITY 2012 Console with a username/password to protect the unauthorized access

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  6. iPhone, Win Phone 7.5 belong to Other device

    iPhone, Win Phone 7.5 belong to Other device.
    I do remember Win mobile 6.5 belong to PDA device.
    Please change them.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  7. ESEC - edit devices added to the database

    There is no chance how to edit device description for already added devices - e.g. from device scan. This leads to you have a pile of devices and you do not know which is which...

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  8. Block all the Roxio drivers

    Block all the Roxio drivers. EndPointSecurity works by blocking the drivers. Unfortunately Roxio uses their own drivers.
    In my case de Version: 10.3.081

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  9. Role Based view of ESEC

    On the ESEC console, we need to have role based view as per the admin using the console.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  10. Adding Allow/Block on email notifications.

    Adding a comment Allow/Block on the email notifications.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  11. Splash Screen for Unauthorized Devices

    Please consider implementing a splash screen for unauthorized devices, versus just the little pop up that displays in the lower right corner of the screen. USB LOCK RP is one product that does that...
    Thanks,
    Betty

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  12. Full Disk Encryption in Device Warden

    I know that this is a very hard work to do. Some customers ask me if there will be a chance to implement a full disk encryption in endpoint security/device warden.

    The reason is, that on the port control market, some vendors like McAfee, Symantec, Sophos/Utimaco, Centertools, are implement a full disk encryption to get a complete security policy on their endpoints.

    It would be a nice to have, to see that this will be implemented or to integrate a feature in the endpoint security management console to control another full disk encryption solution (like TrueCrypt).

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Flag idea as inappropriate…  ·  Admin →
  13. Office 2007/2010 files should not be detected as zip files

    If you configure file-type filter to allow docx, pptx, xlsx and other Office 2007/2010 file extentions but not zip files, the office files will be blockes because they will be detectet as zip files.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  14. Sort by access type / action type, under Activity screen

    Please could we have a drop-down to sort by the type of action ?
    If we have a choice of looking for "Access granted", "Access denied", "Agent started", "Device connected" etc etc, then it makes it easier to track those users / devices who need to be white-listed or black-listed . . .

    You already have drop downs for the machine name and user name, which is a great help.

    I have just done a roll-out of ESEC and adding this type of sort would make life much easier . . .

    Thanks

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  15. Remote Management Console

    It would be extremely beneficial to be able to install the management console on to a workstation which would be able to access the EndPointSecutiy software installed on to a server. That would eliminate the necessity of logging on to the server every time access is needed to the EndPointSecutiy software.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  16. Exlcute range for automatic discovery

    It would be extremly helpfull, if there were the possibility to enter an excute, for avoiding, during the automatic dicovery, the installation of the EPS agent on PCs were it isn't desired?

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Flag idea as inappropriate…  ·  Admin →
  17. Comments per Policy

    It would be nice to be able to comment on a certain policy, so I can tell what its purpose is. Also it would be nice to see one extra screen in the Status | General overview: the number of Blocks and Allows per Policy (in numbers).

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  18. Write access for Blackberry's

    Write access for Blackberry's
    I need the ability to allow write for blackberrys in order to sync. Currently after adding the device to my policy there is only a check box for allowing or disabling Read. I need to have a check box for write as well.

    Thanks

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  19. Citrix XenDesktop

    Currently GFI Endpointsecurity doesn't support Citrix XenDesktop. It would be great if GFI has plan on it

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  20. Traveler program need not require user to have local admin rights to run.

    In my POC environment, all of the PCs & Laptops in the POC network will have the GFI End Point Security installed but the rest of the corporate PCs & laptops are not install with GFI and thus required the Traveller. And that's why I cannot agreed with the requirement of the users must has local PCs or Laptops Administrators privilege before he/sh could use the traveler.

    We will not have the direction to replace my existing DLP endpoint solution with GFI just because of this requirement. Thus, I am requesting for this feature to be added into GFI and…

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Reviewed  ·  2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

GFI EndPointSecurity

Feedback and Knowledge Base