It would be extremely beneficial to be able to install the management console on to a workstation which would be able to access the EndPointSecutiy software installed on to a server. That would eliminate the necessity of logging on to the server every time access is needed to the EndPointSecutiy software.1 vote
Please could we have a drop-down to sort by the type of action ?
If we have a choice of looking for "Access granted", "Access denied", "Agent started", "Device connected" etc etc, then it makes it easier to track those users / devices who need to be white-listed or black-listed . . .
You already have drop downs for the machine name and user name, which is a great help.
I have just done a roll-out of ESEC and adding this type of sort would make life much easier . . .
If you configure file-type filter to allow docx, pptx, xlsx and other Office 2007/2010 file extentions but not zip files, the office files will be blockes because they will be detectet as zip files.1 vote
I know that this is a very hard work to do. Some customers ask me if there will be a chance to implement a full disk encryption in endpoint security/device warden.
The reason is, that on the port control market, some vendors like McAfee, Symantec, Sophos/Utimaco, Centertools, are implement a full disk encryption to get a complete security policy on their endpoints.
It would be a nice to have, to see that this will be implemented or to integrate a feature in the endpoint security management console to control another full disk encryption solution (like TrueCrypt).1 vote
Please consider implementing a splash screen for unauthorized devices, versus just the little pop up that displays in the lower right corner of the screen. USB LOCK RP is one product that does that...
Adding a comment Allow/Block on the email notifications.1 vote
On the ESEC console, we need to have role based view as per the admin using the console.1 vote
Block all the Roxio drivers. EndPointSecurity works by blocking the drivers. Unfortunately Roxio uses their own drivers.
In my case de Version: 10.3.0811 vote
There is no chance how to edit device description for already added devices - e.g. from device scan. This leads to you have a pile of devices and you do not know which is which...1 vote
iPhone, Win Phone 7.5 belong to Other device.
I do remember Win mobile 6.5 belong to PDA device.
Please change them.1 vote
Secure/Restrict the access of the GFI ENDPOINTSECURITY 2012 Console with a username/password to protect the unauthorized access1 vote
After EndpointSecurity push agent to client computer, some users may delete agent manually(by boot to Win PE from CDROM or any other way and delete agent program or any other way).
I understand it is hard to prevent.
But at least ESEC console should scan all agent status, if ESEC console cant find agent running on one computer which should running agent, ESEC send alert to admin and also show on console!
Right now ESEC can only know agent last message receive date.1 vote
When client offline, ESEC agent will record access activilies and send back to console when back to online.
If user reboot to WinPE and delete agent folder, we will never know what user ever did.
So I suggest to store such offline log to any other hidden location. When user back to online, ESEC push agent again, agent can detect the log and send back to console.1 vote
I saw thre is "Access Mask" in activity.
When I write a file to USB storage, the "Access Mask" includes "Create Files/Write Data....etc"
So I try to add a query in Log Browser and try to list events which include those "Access Mark". Strange, I cant find filter when edit query.
Waste such important information!1 vote
In the current Version of GFI Endpoint Security you can't use AD-Groups with vowel mutation. The Policy doesen't match on the client.
I would be nice when GFI implement this in a further version. In German the standard AD-Group for Admins is "Domänen-Admins". So now you can't use this group for a Policy in GFI EndPoint Security.1 vote
Is GFI planning to implement full disk encryption into endpoint security for Data at Rest like their competitors do? It would be a major selling point.1 vote
In the reporting you do not have the ability to give the exact path that the file originated from that was moved to a usb device. Means Source path of local hard drive not show in Report, only Destination path is available.
I Hope this Facility will be available in New Version1 vote
I would like to see some granularity in alerting options. Controlling CD/DVD access comes with a lot of noise every time someone launches explorer or any open/save dialogs and at login. I'd like to be able to disable Access denied event alerts from certain device categories or ports but not others. Right now it's all or nothing.
For example I'd like to be able to disable access denied alerts from CD/DVD devices but have them enabled for storage devices.1 vote
Advice to have the EndPointSecurity solution able to work on Mac and Linux Operating Systems. Not only Windows bases OS are currently available on companies networks environment
I have contacted your support that is not on even planned on a roadmap1 vote
We whitelist IronKeys in our environment, but would still like to log the activity of these devices when they are used.1 vote
- Don't see your idea?