Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them

Secure your data and stay compliant while employees work from home. Remote deployment in 30 minutes.

Endpoint Protector Knowledge Base

Below you can explore FAQs related to Endpoint Protector and find the information you need. For any other additional questions, suggestions, and improvements please contact the support team.

Why doesn’t the Read Only Right work as intended after changing access rights?

There are several ways of interacting with Read Only Access Rights - from installing the Endpoint Protector Client and changing the default rights to generating Offline Temporary Passwords. While deploying the Client, just like any other software installation, will require a reboot prompted by the OS, the other actions will not.

When Read Only Access is changed for a device (either restricting access from Allow Access or providing more access from Deny Access) a simple re-plug will ensure the correct rights are assigned. For optical drive units, simply re-inserting the CD/DVD in the unit should eliminate any unwanted behavior.
Was this article helpful?
YES NO
Can you please tell us how we can improve this article.
Thank you for your feedback!