Endpoint Protector Release History

Learn about the current and previous Endpoint Protector updates. Information regarding changes and enhancements is detailed in chronological order below.

09-July-2019

Endpoint Protector – Product Update

Server Version 5.2.0.6
Windows Client: 4.9.8.9
Mac Client: 1.6.8.9
Linux Client: 1.3.1.8
EasyLock Client: 2.0.1.1

Endpoint Protector 5

Server Version: 5.2.0.6

Improvements:

  • The option to export the entire list of entities as a CSV file has been added on List of Computers, List of Users and List of Groups.
  • OCR support has been added for Macs.
  • The predefined Offline Temporary Password intervals have been extended and now include also 15 minutes OTPs.
  • A granularity setting has been added for the Failed Login alert, allowing configuration for each super administrator whether or not they want to receive such alerts.
  • A new Alert when computers have not been seen in “X” days can be set.
  • The System Backup v2 has been added. In this version, it is intended as a migration tool from old Appliances to newer ones.
  • Sections such as Online Devices, Online Users, Online Computers, Events and Admin Actions have been redesigned.
  • The recently redesigned Directory Services now also accepts defining a connection via DNS, not just on IP.
  • The Read Only Administrator is now part of the ACL offering.
  • Various security improvements as well as multiple small improvements on various sections of the product.

Bug fixes:

  • The “Department” filter did not work as intended on the List of Groups. Fixed.

Device Control

  • The Read-Only right has been added for Network Share drives for Windows and Macs.
  • The Deny Access but Allow Charging for Apple devices (iPhones, iPads and iPods) is now available on Windows.
  • The functionality when adding Already Existing Devices has been extended and can be done based on New Device (VID/PID/Serial Number), Device Serial Number Range and Bulk List of Devices.
  • The list of TrustedDevices Level 3 has been extended.

Bug fixes:

  • The Allow Access and exclude from CAP Scanning failed to work in some scenarios, after a computer restart. Fixed.

Content Aware Protection

  • The Print Screen can now be controlled also on Macs.
  • Additional PIIs like the Ukrainian Phone Number are now detected.
  • 8x8 Virtual Desktop, Mattermost, DameWare have been added to the controlled applications list.
  • Improved behavior for Thin Client and VDI environments where Users were not included in the polices (just Computers).
  • Additional use cases where content included special characters are now covered (e.g.: some specific Cyrillic, Chinese, Korean, etc. characters).
  • Additional file types such as .segd, .segy, .rode and .vds are now detected.
  • Improved confidential content detection from Excel files.

Bug fixes:

  • Fixed some inconsistencies that occurred when using Outlook 2010.

Windows Client Version: 4.9.8.9

Improvements:

  • The Read-Only right has been added for Network Share drives.
  • The Deny Access but Allow Charging for Apple devices (iPhones, iPads and iPods) is now available.

Bug fixes:

  • E-mail subject was not automatically populated when the user requested an Offline Temporary Password. Fixed.

Mac Client Version: 1.6.8.9

Improvements:

  • Improved behavior for scenarios where the right “Block WiFi if wired network connection is present” is used, in association with USB-C network adapters.
  • The Client is now notarized by Apple to comply with the latest macOS software distribution requirements.
  • The Read-Only right has been added for Network Share drives.

Bug fixes:

  • E-mail subject was not automatically populated when the user requested an Offline Temporary Password. Fixed.

EasyLock Enforced Encryption Client: 2.0.1.1

Improvements:

  • EasyLock can now be opened when USB devices have Read Only Access. Intended restrictions such as not being able to copy files to the encrypted panel apply.
  • An additional measure of security has been added when wiping the device.
  • A login timer delay has been implemented after each failed login attempt.
  • Manual deployment has been improved on Macs using a target disk mode and a thunderbolt connection to another Mac device.
Request Demo
* Your privacy is important to us. Check out our Privacy Policy for more information.