GFI EndPointSecurity

How can we improve?

(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  1. automatically export settings

    Client has a very large organization and changes are done in a daily basis. In order to cater for so many changes in case of a failure client would like to have the export configuration option running automatically in a schedule. It would make administrator much easier once the changes would be saved and export in a periodic basis

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  2. Policy to Remove GFI Encryption

    Hi,

    We use bitlocker to go and do not want the GFI encryption option available to users. Can you please create a policy to remove and block it.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  3. custom name for usb device

    I want to expand proposition "USB same NAME, PID, VID, REV " It will be very useful to have ability to change name of specific usb device in something recognisable like "johns usb", so it would be easier to find it in database.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  4. Check content of copied files

    Is it possible to add a feature to know the content of the files that are copied from the system to a USB drive

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  5. Event logging for whitelisted devices

    For devices that are whitelisted, EndPointSecurity does not offer any event logging currently. This is problematic in an environment where someone wants to allow only certain USB drives to be accessed but also wants to keep track of user interactions for compliance purposes.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  6. Block unwated websites by right clicking on address

    Every day some websites "sneak" in -www. casino.com
    every day.
    I would like to be able to right click and block them for ever - or any website contacting me to sell or convince me to come to the wbesite

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  7. Encryption with whitelisted devices

    I am not able to access encrypted devices that have been whitelisted. I need to have full access on the USB devices to be able to access encrypted content.

    That is not an ideal situation. I would like to be able to block USB device as category and still be able to whitelist only certain products by their serial numbers and also have encryption on those USBs.

    As the product works right now it is either allow the entire category and have encryption or block the category and use whitelist but without encryption

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  8. Alerts and enumeration

    We have been using EPS for many years and untill the 2013 version it alerted us as to when a unauthorized user would use a device they should not. Now the EPS alerts to every computer just enumerating and not really accessing the devices. the company is now saying the product is working as intended. maybe so but it just started with the 2013 version. I hope the will fix the issue and release an update to us.

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  9. Configurable Windows Event Log

    When configured to log GFI EndpointSecurity events to Windows log, a new GFI EndpointSecurity log log is generated and registered in windows WMI. The size and retention settings for this log, however, seem to be hardcoded and enforced by the agent.

    For forensics reasons, we'd like to ensure the raw windows logs are never overwritten. Can some options be set in the GUI or at least in the XML config files to allow configuration of "Retention Method" and "Max Log Size" or otherwise disable the enforcement of the default values so that they can be changed in Windows?

    1 vote
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  10. Centralised Deployment Enhancement For Policies

    When deploying the GFI Agent, using SCCM or WDS for example, the Agent is deployed without the Policies. Policies are only picked up when the Agent is deployed from the Console.

    This is especially problematic with Microsoft Surface Pro devices, for which the Docking Station (which provides Ethernet connectivity) is completely blocked when the GFI Agent is deployed. The device must then be connected to Wi-Fi, have the GFI Agent removed from the console, and then re-deployed again but from the console instead.

    0 votes
    Sign in
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
1 2 4 Next →
  • Don't see your idea?

GFI EndPointSecurity

Feedback and Knowledge Base