GFI EndPointSecurity

How can we improve?

(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  1. Data Shadowing for ESEC

    Many competitors has a feature called "data shadowing". This feature enables the possiblity to copy files or type (defined in policy) to an hidden share.

    An administrator can later access these files to view which content and files are copied to the device (e.g. removable media).

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  2. Policy

    I'd like to propose some changes to how the policies works.
    Now we have to create a lot of groups if we want to give different rights to different users.
    If we change Priorities such way that they applies through all created policies and affect all of them at once.
    for example: we have 2 policies:
    1. all users - include all domain users
    device - priority - action
    USB storage - 5 - deny
    cd-dvd - 6 - deny
    2. good users - several users that can use usb-sticks
    USB storage - 1 - allow all
    3. middle users…

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  3. Poison Pill

    Poison Pill capability to destroy 'lost' data / hardware etc

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Flag idea as inappropriate…  ·  Admin →
  4. Encryption for GFI ESEC

    Encryption for GFI EndPointSecurity

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  5. Case# GFI-160718-421294 for EndPointSecurity: Define priority for whitelisted hardware - Routing ID: [ ref:_00D80ZQDU._500C012HNEx:ref ]

    The manual process to increase of decrease the priority for whitelisted/blacklisted hardware is very disturbing...!

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  6. EP Security Volume Encryption Decrypt option along as Enter encripted pen password

    We would like to be able and have the option to volume decrypt in the same window when encrupted pen asks for encryption password.

    We ask this, so that we wont do any changes in encryption options policies.

    Thank you,

    José

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  7. Laptops should view the site concentrator as an option for managed AV updates

    Laptops look for site concentrator before going to the Internet

    When managed antivirus gets updates, laptops should check for the presence of the site concentrator and then after a predetermined number of retries go to the Internet to download their definitions. In healthcare and education environments where a lot of laptops roam the campus, but never leave the site are placing a large burden on the Internet connection for updates. Managed antivirus on laptop do not use the site concentrator for updates. This simple solution would save a lot of bandwidth, especially on Monday mornings.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  8. GFI Endpoint Security Offline Temporary Access

    The user/computer protected by GFI Endpoint Security requesting the temporary access using a request code should not mandatorily need to be connected to the network for an unlock code to be generated and temporary access validated. Very often, we have scenarios where no wired/wireless connection is available at certain sites but still temporary access is required on USB ports. For e.g, a user who in the middle of a presentation in the boardroom which is not connedted to any network needs to plug in the USB device of a guest. Or a user in a remote office or at home…

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  9. Configurable Windows Event Log

    When configured to log GFI EndpointSecurity events to Windows log, a new GFI EndpointSecurity log log is generated and registered in windows WMI. The size and retention settings for this log, however, seem to be hardcoded and enforced by the agent.

    For forensics reasons, we'd like to ensure the raw windows logs are never overwritten. Can some options be set in the GUI or at least in the XML config files to allow configuration of "Retention Method" and "Max Log Size" or otherwise disable the enforcement of the default values so that they can be changed in Windows?

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  10. Alerts and enumeration

    We have been using EPS for many years and untill the 2013 version it alerted us as to when a unauthorized user would use a device they should not. Now the EPS alerts to every computer just enumerating and not really accessing the devices. the company is now saying the product is working as intended. maybe so but it just started with the 2013 version. I hope the will fix the issue and release an update to us.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  11. Centralised Deployment Enhancement For Policies

    When deploying the GFI Agent, using SCCM or WDS for example, the Agent is deployed without the Policies. Policies are only picked up when the Agent is deployed from the Console.

    This is especially problematic with Microsoft Surface Pro devices, for which the Docking Station (which provides Ethernet connectivity) is completely blocked when the GFI Agent is deployed. The device must then be connected to Wi-Fi, have the GFI Agent removed from the console, and then re-deployed again but from the console instead.

    0 votes
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
1 2 4 Next →
  • Don't see your idea?

GFI EndPointSecurity

Feedback and Knowledge Base