Download our FREE whitepaper on data loss prevention best practices. Download Now

Configuring the Employee Experience

TL;DR

  • The Endpoint Protector Client resides on the employee endpoint.
  • It can be configured in different modes depending on your requirements and the experience you want your users to have.
  • By default, the Client is set to “Normal.”
  • Additional modes include “Stealth,” “Hidden,” “Silent,” and “Panic.”
  • Understanding how these configurations will alter the employee experience before enabling is important.

Like many organizations, you might have unique requirements and want to adjust your employee’s Endpoint Protector experience based on their role or function. With this in mind, Endpoint Protector allows for customization of the Endpoint Protector Client to accommodate your unique needs!

In this Academy Guide, we’ll cover the Client Settings available and review how to implement them.

Where to find Client Settings

There are several settings that relate directly to the Endpoint Protector Client.  These settings establish the client’s behavior and can be configured for specific entity mapping.  Specific entity mappings include Global, Groups, Computers, and Users.

Login to the Endpoint Protector dashboard and select Global Settings within the Device Control module.

Click the image for full resolution.

Understand Client Modes

The Endpoint Protector Client offers several modes that define its behavior on an employee’s system. There are six modes to choose from, and they can be changed at any given time.  Below is a quick summary of each mode available for configuration by an Endpoint Protector Administrator.

Normal

The default deployment mode for the Endpoint Protector Agent. We recommend that you do not change from Normal mode to another mode without fully knowing what the other modes imply. If the Normal mode behavior does not suit your needs, Hidden or Silent modes are usually the best alternatives to consider.

Transparent

This mode is useful to block all devices, but users remain unaware of any restrictions or presence of the Endpoint Protector Client and its activity.

  • No system tray icon is displayed
  • No system tray notifications are shown
  • Everything is blocked, regardless if authorized or not
  • Administrator receives alerts for all activities

Stealth

This mode is useful to monitor all users and computers, but users remain unaware of any restrictions or presence of the Endpoint Protector Client and its activity.  Since everything is configured to allow, there will be no disruptions in the users’ day-to-day activities.

  • No system tray icon is displayed
  • No system tray notifications are shown
  • Everything is allowed, regardless if authorized or not
  • File shadowing and file tracing are enabled to see and monitor all user activity
  • Administrator receives alerts for all activities

Panic

This mode can be utilized under extreme situations, such as when a user has malicious intent or detected rogue activity.  With these special circumstances, the Administrator may toggle to this configuration in order to block all devices.  It is recommended to exercise extreme caution if using this mode.

  • System tray icon is displayed
  • System tray notifications are shown
  • Everything is blocked, regardless if authorized or not
  • File shadowing and file tracing are enabled to see and monitor all user activity
  • Administrator receives alerts when computers go in and out of Panic Mode

Hidden Icon

This mode is very similar to the Normal mode option.  The difference is that the Endpoint Protector Client is not visible to the user.

  • No system tray icon is displayed
  • No system tray notifications are shown
  • All configured rights and settings are applied as per their configuration

Silent

This mode is very similar to the Normal mode option.  The difference is that the pop-up notifications are not visible to the user.

  • System tray icon is displayed
  • No system tray notifications are shown
  • All configured rights and settings are applied as per their configuration

Additional Client Variables

Notifier Language

The Endpoint Protector Client Notifier language.

Policy Refresh Interval (sec)

The time interval at which the Endpoint Protector Client checks in with the Endpoint Protector Server and updates with the latest settings, rights, and policies.

Notifications Pop-up

The Administrator has the option to select between traditional (system tray) and pop-up notifications.  This setting relates directly to an end user’s experience once blocking is set to take place within policy.

Need help?

If you’d like further information and guidance on configuring the Endpoint Protector Client, please reach out to your Customer Success Manager, or get in touch with our support team here https://support.endpointprotector.com/hc/en-us/requests/new.

 

explainer-c_learning

Download our free ebook on
Data Loss Prevention Best Practices

Helping IT Managers, IT Administrators and data security staff understand the concept and purpose of DLP and how to easily implement it.

In this article:

    Request Demo
    check mark

    Your request for Endpoint Protector was sent!
    One of our representatives will contact you shortly to schedule a demo.

    * Your privacy is important to us. Check out our Privacy Policy for more information.