﻿<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>LevelBlue Knowledge Base » Knowledgebase » Legacy Products » EndPoint Security</title><generator>InstantKB.NET 2.0.6</generator><description>LevelBlue Knowledge Base</description><link>https://support.levelblue.com/kb/</link><webMaster>website@m86security.com</webMaster><lastBuildDate>Tue, 21 Apr 2026 19:38:04 GMT</lastBuildDate><ttl>20</ttl><item><title>What versions of Marshal Security products are currently supported by LevelBlue Technical Support?</title><link>https://support.levelblue.com/kb/Goto10920.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;MailMarshal (SEG) &lt;/li&gt;    &lt;li&gt;MailMarshal ECM/MailMarshal Exchange &lt;/li&gt;    &lt;li&gt;MailMarshal SPE &lt;/li&gt;    &lt;li&gt;MailMarshal SES &lt;/li&gt;    &lt;li&gt;Marshal Reporting Console &lt;/li&gt;    &lt;li&gt;WebMarshal &lt;/li&gt;    &lt;li&gt;Bitdefender for Marshal&lt;/li&gt;    &lt;li&gt;McAfee for Marshal &lt;/li&gt;    &lt;li&gt;Sophos for Marshal &lt;/li&gt;    &lt;li&gt;Other Products    &lt;ul&gt;        &lt;li&gt;MailMarshal Appliance e10000 &lt;/li&gt;        &lt;li&gt;MailMarshal Management Pack for MOM &lt;/li&gt;        &lt;li&gt;MailMarshal Management Pack for SCOM &lt;/li&gt;        &lt;li&gt;Marshal EndPoint Security &lt;/li&gt;        &lt;li&gt;Security Reporting Center &lt;/li&gt;        &lt;li&gt;Firewall Suite &lt;/li&gt;        &lt;li&gt;imMarshal for MSN &lt;/li&gt;        &lt;li&gt;Counterspy for Marshal &lt;/li&gt;        &lt;li&gt;Kaspersky for Marshal&lt;/li&gt;        &lt;li&gt;PestPatrol for Marshal &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;p&gt;What versions of Content Security (Marshal) products are currently supported by LevelBlue Technical Support? &lt;/p&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;For full details about supported versions of current products, see the articles linked below:&lt;/p&gt;&lt;a name="seg"&gt;&lt;/a&gt;&lt;blockquote style="margin-right: 0px;" dir="ltr"&gt;&lt;/blockquote&gt;&lt;h3&gt;Premises Email Security&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20961.aspx" class="ApplyClass" target="_blank"&gt;Article Q20961&lt;/a&gt; covers the following products:    &lt;ul&gt;        &lt;li&gt;MailMarshal (SEG) &lt;/li&gt;        &lt;li&gt;MailMarshal ECM/MailMarshal Exchange &lt;/li&gt;        &lt;li&gt;Secure Email Server (SES) &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Web Content Security&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20962.aspx" class="ApplyClass" target="_blank"&gt;Article Q20962&lt;/a&gt; covers WebMarshal. &lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Service Provider Email Security&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20963.aspx" class="ApplyClass" target="_blank"&gt;Article Q20963&lt;/a&gt; covers MailMarshal SPE. &lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Anti-Virus and Reporting&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20964.aspx" class="ApplyClass" target="_blank"&gt;Article Q20964&lt;/a&gt; covers the following products:    &lt;ul&gt;        &lt;li&gt;Bitdefender for Marshal&lt;/li&gt;        &lt;li&gt;McAfee for Marshal &lt;/li&gt;        &lt;li&gt;Sophos for Marshal &lt;/li&gt;        &lt;li&gt;Marshal Reporting Console&lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;hr /&gt;&lt;h3&gt;Deprecated and Discontinued Products&lt;/h3&gt;&lt;dl&gt;    &lt;dt&gt;e10000 (MailMarshal Node Appliance)&lt;/dt&gt;    &lt;dd&gt;End of support: March 31, 2011&lt;/dd&gt;    &lt;dt&gt;EndPoint Security&lt;/dt&gt;    &lt;dd&gt;    End of support: May 1, 2013&lt;/dd&gt;    &lt;dt&gt;MailMarshal Management Pack for MOM&lt;/dt&gt;    &lt;dd&gt;End of support: May 1, 2013&lt;/dd&gt;    &lt;dt&gt;MailMarshal Management Pack for SCOM&lt;/dt&gt;    &lt;dd&gt;End of support: May 1, 2013&lt;/dd&gt;    &lt;dt&gt;Security Reporting Center (Windows Version)&lt;/dt&gt;    &lt;dd&gt;End of support: December 31, 2009&lt;/dd&gt;    &lt;dt&gt;Security Reporting Center (Solaris Version)&lt;/dt&gt;    &lt;dd&gt;Withdrawn&lt;/dd&gt;    &lt;dt&gt;Firewall Suite&lt;/dt&gt;    &lt;dd&gt;Withdrawn&lt;/dd&gt;    &lt;dt&gt;imMarshal for MSN&lt;/dt&gt;    &lt;dd&gt;Withdrawn&lt;/dd&gt;    &lt;dt&gt;Counterspy for Marshal&lt;/dt&gt;    &lt;dd&gt;End of support: January 1, 2014&lt;/dd&gt;    &lt;dt&gt;Kaspersky for Marshal&lt;/dt&gt;    &lt;dd&gt;End of support: November 22, 2023&lt;/dd&gt;    &lt;dt&gt;PestPatrol for Marshal&lt;/dt&gt;    &lt;dd&gt;End of support: January 1, 2014&lt;/dd&gt;    &lt;dt&gt;&lt;br /&gt;    &lt;/dt&gt;&lt;/dl&gt;&lt;dl&gt;&lt;em&gt;    &lt;dt&gt;This article was previously published as: &lt;/dt&gt;    &lt;dd&gt;NETIQKB33882 &lt;/dd&gt;    &lt;/em&gt;&lt;/dl&gt;</description><pubDate>Sun, 26 Nov 2023 18:02:27 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Where do I send a feature request for a LevelBlue Marshal product?</title><link>https://support.levelblue.com/kb/Goto12703.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;MailMarshal (SEG)&lt;/li&gt;    &lt;li&gt;MailMarshal ECM/MailMarshal Exchange&lt;/li&gt;    &lt;li&gt;MailMarshal SPE&lt;/li&gt;    &lt;li&gt;WebMarshal&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Where do I send a feature request for a LevelBlue Marshal product? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;If you want to request a new feature or you want to suggest an improvement for any product, you can &lt;a href="https://support.levelblue.com/contact-support.asp" class="ApplyClass" target="_blank"&gt;contact Technical Support&lt;/a&gt;. You can also enquire through your account manager or reseller.&lt;/p&gt;</description><pubDate>Sun, 01 Mar 2020 00:00:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>What are the System Requirements for EndPoint Security clients?</title><link>https://support.levelblue.com/kb/Goto11772.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;What are the System Requirements for EndPoint Security clients?&lt;/LI&gt;&lt;LI&gt;What disk formats does EndPoint Security support?&lt;/LI&gt;&lt;LI&gt;What Operating System versions does EndPoint Security support?&lt;/LI&gt;&lt;LI&gt;Why are users on some computers always allowed access to all Device Classes when they should not be?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;The EndPoint Security &lt;STRONG&gt;client &lt;/STRONG&gt;can be installed on the following Microsoft Windows versions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Vista &lt;STRONG&gt;(32 bits only)&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Server 2003&lt;/LI&gt;&lt;LI&gt;XP&lt;/LI&gt;&lt;LI&gt;2000 (Service Pack 4)&lt;/LI&gt;&lt;LI&gt;NT (Service Pack 6a, IE4 or above)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The &lt;STRONG&gt;server&lt;/STRONG&gt; component is &lt;STRONG&gt;not &lt;/STRONG&gt;supported on Vista.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EndPoint Security does not support installation on 64 bit systems.&lt;/STRONG&gt; &lt;/P&gt;&lt;UL&gt;&lt;LI&gt;EndPoint Security is a 32 bit application. It depends heavily on drivers that have not been tested on 64 bit systems.&lt;/LI&gt;&lt;/UL&gt;&lt;H2 dir=ltr&gt;Notes: &lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV&gt;On &lt;STRONG&gt;Windows NT&lt;/STRONG&gt; the granularity of control is reduced to Full Control, No Control. &lt;/DIV&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV&gt;Read Only access is not supported on NT.&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV&gt;File auditing is not supported on NT.&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;DIV&gt;On &lt;STRONG&gt;Windows 2000&lt;/STRONG&gt;, writable CDROM devices might be accessible through Roxio Easy CD Creator.&lt;/DIV&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV&gt;To resolve this issue, ensure that you have installed &lt;STRONG&gt;Service Pack 4&lt;/STRONG&gt; for Windows 2000.&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;The client computer disks must use the &lt;STRONG&gt;NTFS&lt;/STRONG&gt; file system. If the disks do not use NTFS, access restrictions will not be enforced.&lt;/LI&gt;&lt;LI&gt;For &lt;STRONG&gt;encrypted USB&lt;/STRONG&gt; devices, the minimum size is 64MB. EndPointSecurity uses the FAT32 file system for encrypted devices.&lt;/LI&gt;&lt;/UL&gt;</description><pubDate>Mon, 01 Jun 2009 23:09:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Does EndPoint Security perform audit logging for floppy drives?</title><link>https://support.levelblue.com/kb/Goto12123.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marsahl EndPoint Security &lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Does EndPoint Security perform audit logging for floppy drives?&lt;/LI&gt;&lt;LI&gt;Are internal drives audited by EndPoint Security?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;Internal floppy disk drives are legacy devices. Disk insertion into these drives is not logged in the EndPoint Security Audit Log. &lt;/P&gt;&lt;P&gt;However Audit Log records are created for USB based &lt;STRONG&gt;external &lt;/STRONG&gt;floppy drives. &lt;/P&gt;&lt;H2&gt; &lt;/H2&gt;</description><pubDate>Fri, 11 Jul 2008 01:40:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Does EndPoint Security restrict USB port access?</title><link>https://support.levelblue.com/kb/Goto12122.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Does EndPoint Security restrict USB port access?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;EndPoint Security restricts access to &lt;STRONG&gt;devices&lt;/STRONG&gt; connected to the USB port based on the type of device, according to a predefined policy. &lt;/P&gt;&lt;P&gt;For example one can allow access to a USB Memory stick but not an iPod.&lt;/P&gt;EndPoint Security does not restrict access to hardware ports.</description><pubDate>Fri, 11 Jul 2008 01:36:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>What transport mechanism does EndPoint Security use?</title><link>https://support.levelblue.com/kb/Goto12121.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security &lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;What transport mechanism does EndPoint Security use?&lt;/LI&gt;&lt;LI&gt;How are policy updates sent from the EndPoint Security server to clients?&lt;/LI&gt;&lt;LI&gt;How are EndPoint client deployments sent?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;EndPoint Security communicates between server and clients using HTTPS (secure HTTP protocol). The web server used is Microsoft IIS.&lt;/P&gt;</description><pubDate>Fri, 11 Jul 2008 01:32:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Policy enforcement pop-ups not showing</title><link>https://support.levelblue.com/kb/Goto12120.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security &lt;LI&gt;Windows 2000 client computers&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Policy enforcement pop-ups do not display&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;&lt;P&gt;Windows 2000 clients require a restart after client installation before policy enforcement pop-ups are available. &lt;/P&gt;&lt;P&gt;A reboot notification will be displayed at the time of deployment, unless the EndPoint Security administrator has disabled notifications in the Control Center – Client Settings dialog. &lt;/P&gt;&lt;H2&gt;Resolution:&lt;/H2&gt;&lt;P&gt;Ensure that Widnows 2000 computers are restarted after deployment of the EndPoint Security client.&lt;/P&gt;</description><pubDate>Fri, 11 Jul 2008 00:45:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>I/O Error when accessing encrypted USB device</title><link>https://support.levelblue.com/kb/Goto12119.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Why do users see a Windows I/O error when attempting to read from an encrypted USB device?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;This behavior is by design. If a user tries to access an encrypted USB device &lt;STRONG&gt;without the correct password,&lt;/STRONG&gt; Windows returns an I/O error. &lt;/P&gt;&lt;P&gt;Windows returns this error when attempting to access media that cannot be read for any reason.&lt;/P&gt;&lt;P&gt;When the correct password is used, the device will be readable.&lt;/P&gt;&lt;H2&gt;&lt;FONT size=2&gt;&lt;/FONT&gt; &lt;/H2&gt;</description><pubDate>Fri, 11 Jul 2008 00:22:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Client status shows ?? as version number</title><link>https://support.levelblue.com/kb/Goto12117.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security &lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Clilent status display shows a client with version number of '??'&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;The client computer may have been rebuilt, or the client installation is corrupt.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Resolution:&lt;/H2&gt;&lt;P&gt;To resolve this issue, re-deploy the client to the affected computer.&lt;/P&gt;</description><pubDate>Fri, 11 Jul 2008 00:13:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Policy updates after re-installation of the server</title><link>https://support.levelblue.com/kb/Goto12116.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security &lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;If the EndPoint Security server is re-installed, will clients retrieve policy from the server?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;If you re-install the EndPoint Security server, clients will automatically pick up a new policy if the policy on the server has been updated. &lt;/P&gt;&lt;P&gt;If the default has not been changed, clients may not automatically pick up the policy. To ensure that the clients collect the new policy, administrators should ensure that the policy is updated at the server after a re-installation.&lt;/P&gt;&lt;P&gt;It is best practice to re-deploy clients after re-installation of the server. This will ensure that all clients pick up the policy and client status is correctly displayed.&lt;/P&gt;</description><pubDate>Fri, 11 Jul 2008 00:06:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>What are the limits on the temporary access period?</title><link>https://support.levelblue.com/kb/Goto12048.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;What are the limits on the temporary access period?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;The temporary access period cannot be shorter than 30 minutes, or longer than 5 days.&lt;/P&gt;&lt;P&gt;If temporary access is granted for less than 30 minutes then access is allowed for 30 minutes. Likewise if temporary access is granted for a period exceeding 5 days access will only be allowed for 5 days.&lt;/P&gt;</description><pubDate>Mon, 05 May 2008 22:45:00 GMT</pubDate><dc:creator>SPE Team</dc:creator></item><item><title>Does EndPoint Security change anything in Active Directory?</title><link>https://support.levelblue.com/kb/Goto12049.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Does EndPoint Security change anything in Active Directory?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;No, EndPoint Security does not make any changes in Active Directory.  EndPoint Security queries AD to retrieve user and group names. Access controls for the existing users and groups are created entirely within EndPoint Security. &lt;/P&gt;</description><pubDate>Wed, 30 Apr 2008 03:15:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Securing access to Smart Phones</title><link>https://support.levelblue.com/kb/Goto12047.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security &lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;How can I ensure that access through Smart Phones is controlled?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;Smart phones use multiple communication technologies. In order to secure access to these devices, be sure to block all the technologies these devices use. &lt;/P&gt;&lt;P&gt;For example you may need to block Smartphone, WiFI, Bluetooth and Infra-Red.&lt;/P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;Because of the variety of devices and access methods, you should &lt;STRONG&gt;test and confirm to your satisfaction&lt;/STRONG&gt; that the appropriate classes are set correctly for the devices that might be used on your network. &lt;/P&gt;</description><pubDate>Wed, 30 Apr 2008 03:06:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Policy Customizer Custom Classes and USB Flash Disks</title><link>https://support.levelblue.com/kb/Goto12046.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Why are USB flask disks not always shown as belonging to a custom class?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P align=left&gt;You can use the Policy Customizer to create custom classes that contain specific USB Flash Disks. &lt;/P&gt;&lt;P align=left&gt;If a custom class contains specific definitions of USB Flash disk(s), they will appear in the "Detected By EndPoint Security" window as assigned to that custom class, &lt;STRONG&gt;as long as&lt;/STRONG&gt; the custom class is &lt;STRONG&gt;above &lt;/STRONG&gt;the pre-defined "USB Flash disks" class in the Policy Customizer hierarchy. &lt;/P&gt;&lt;P align=left&gt;If the custom class is moved below the pre-defined "USB Flash Disks" then the Policy Class changes to "USB Flash Disks"&lt;/P&gt;&lt;P align=left&gt;To ensure that the custom class applies, place it above "USB Flash Disks" in the hierarchy.&lt;/P&gt;&lt;H2 align=left&gt;Note:&lt;/H2&gt;&lt;P align=left&gt;This behavior is specific to USB Flash Disks and does not affect any other devices that may be detected by EndPoint Security.&lt;/P&gt;</description><pubDate>Wed, 30 Apr 2008 03:01:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How does EndPoint Security affect devices mounted as NTFS partitions?</title><link>https://support.levelblue.com/kb/Goto12045.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;How does EndPoint Security affect devices mounted as NTFS partitions?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;If a user has mounted a USB drive as an NTFS folder (and not as a drive letter), then applying EndPoint Security will not block the device. This issue only affects the specific device, not any similar device that may be connected later. Devices are uniquely identifiable and Windows remembers how it mounted each unique device.&lt;/P&gt;&lt;P&gt;Once the EndPoint Security client is deployed to a workstation, the user cannot mount any additional devices as folders. &lt;/P&gt;&lt;P&gt;If the user requires a NTFS mount, the administrators can unblock the USB class for that user on that machine to permit the new folder to be mounted, and then re-apply the policy.&lt;/P&gt;</description><pubDate>Wed, 30 Apr 2008 02:21:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Does EndPoint Security stop devices being mounted?</title><link>https://support.levelblue.com/kb/Goto11841.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Does EndPoint Security stop devices being mounted?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;If a user connects an external device (such as a USB memory device, or external hard disk connected by either a USB or Firewire interface), if the Device Class is blocked for the user the device will not be visible to that user.&lt;/P&gt;&lt;P&gt;The device is mounted,  and it may be available to the Windows system and other users.&lt;/P&gt;</description><pubDate>Wed, 26 Sep 2007 04:52:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Why is a user still denied access to a device even though they have been granted access?</title><link>https://support.levelblue.com/kb/Goto11829.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Why is a user still denied access to a device even though they have been granted access?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;Marshal EndPoint Security enforces a &lt;STRONG&gt;Deny &lt;/STRONG&gt;policy over an &lt;STRONG&gt;Allow &lt;/STRONG&gt;policy. If a User Group has been explicitly denied access to a device and within that Group a User has been allowed access, the User will still be denied access to the device.    &lt;/P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;To &lt;STRONG&gt;Deny &lt;/STRONG&gt;and &lt;STRONG&gt;Allow&lt;/STRONG&gt; Users within a group, allow all the Users access and then explicitly &lt;STRONG&gt;Deny &lt;/STRONG&gt;the Users you dont want to have access.&lt;/P&gt;</description><pubDate>Wed, 19 Sep 2007 23:21:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>Can EndPoint Security provide me copies of files accessed on client computers?</title><link>https://support.levelblue.com/kb/Goto11824.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Can EndPoint Security provide me copies of files that are being accessed, stored or moved to and from controlled devices?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;No, EndPoint Security cannot currently record file content. &lt;/P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;The File Access Log shows the following for each attempted file access:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;File type&lt;/LI&gt;&lt;LI&gt;File name&lt;/LI&gt;&lt;LI&gt;Client computer&lt;/LI&gt;&lt;LI&gt;Device class&lt;/LI&gt;&lt;LI&gt;Date and time&lt;/LI&gt;&lt;LI&gt;Type of access &lt;/LI&gt;&lt;LI&gt;Process or software requesting access&lt;/LI&gt;&lt;LI&gt;Allowed or blocked&lt;/LI&gt;&lt;/UL&gt;</description><pubDate>Mon, 17 Sep 2007 03:16:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Can EndPoint Security control access over Bluetooth, WiFi, and Infrared?</title><link>https://support.levelblue.com/kb/Goto11823.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Can EndPoint Security control access over Bluetooth, WiFi, and Infrared?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;Yes, EndPoint Security can control these types of ports. &lt;/P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;You cannot set policy for individual devices over Bluetooth, WiFi, or Infrared. You can only enable or disable each of the types of ports, for all devices.&lt;/P&gt;</description><pubDate>Mon, 17 Sep 2007 03:00:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>What is required to control access through Palm OS devices?</title><link>https://support.levelblue.com/kb/Goto11782.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;What is required to control access through Palm OS devices?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;Blocking Palm OS-based devices does not prevent a memory device mounted on the Palm device from being accessed. &lt;/P&gt;&lt;P&gt;Also, if the Palm device has WiFi, Bluetooth or Infra-Red capability, it may be able to connect using these methods.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;To control access to a Palm OS device you must configure both the &lt;STRONG&gt;Palm &lt;/STRONG&gt;and &lt;STRONG&gt;Other Plug And Play Storage Device&lt;/STRONG&gt; Classes in the EndPoint Security policy. This will control the ability to Hotsync with Palm devices, and also any attached storage such as Secure Digital, Sony Memory Stick or Compact Flash cards. &lt;/LI&gt;&lt;LI&gt;It is also necessary to disable the WiFi, Bluetooth and Infra-Red capabilities of a computer to prevent access by Palm OS devices over these connection methods. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Therefore, in summary, to completely block a Palm OS-based device, deny access to the following Device Classes: &lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Palm&lt;/LI&gt;&lt;LI&gt;Other Plug And Play&lt;/LI&gt;&lt;LI&gt;Infra-Red&lt;/LI&gt;&lt;LI&gt;WiFi&lt;/LI&gt;&lt;LI&gt;Bluetooth&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Note:&lt;/H2&gt;&lt;P&gt;Because of the variety of devices and access methods, you should &lt;STRONG&gt;test and confirm to your satisfaction&lt;/STRONG&gt; that the appropriate classes are set correctly for the devices that might be used on your network. &lt;/P&gt;</description><pubDate>Mon, 17 Sep 2007 02:46:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Active Directory and DNS Configuration Considerations</title><link>https://support.levelblue.com/kb/Goto11822.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;What are the important DNS setup requirements to ensure EndPoint Security can use Active Directory?&lt;/LI&gt;&lt;LI&gt;Can EndPoint Security manmage machines in multiple Active Directory Domains?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;Marshal EndPoint Security makes extensive use of Active Directory to detect and contact client systems. &lt;/P&gt;&lt;H3&gt;Trusted Domains&lt;/H3&gt;&lt;P&gt;To select users and groups in a different domain and to deploy the client software through the Console's Active Directory browser, you need to have established a trusted relationship between the domain you are logged in to and the target domain.&lt;/P&gt;&lt;H3&gt;DNS Considerations&lt;/H3&gt;&lt;P&gt;Malfunctioning of the DNS will significantly affect the operation of Active Directory. Therefore it is essential to configure DNS correctly, so that Active Directory will function properly.&lt;/P&gt;&lt;P&gt;For a more in-depth treatment of DNS configuration for Active Directory, see the following Microsoft Knowledge Base article: &lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="http://support.microsoft.com/kb/237675" target=_blank&gt;KB237675&lt;/A&gt;: Setting Up the Domain Name System for Active Directory&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Review the following configuration items to ensure that DNS is healthy and that the Active Directory DNS entries will be registered correctly:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;DNS IP configuration&lt;/LI&gt;&lt;LI&gt;Active Directory DNS registration&lt;/LI&gt;&lt;LI&gt;Dynamic zone updates&lt;/LI&gt;&lt;LI&gt;DNS forwarders&lt;/LI&gt;&lt;/UL&gt;</description><pubDate>Mon, 17 Sep 2007 02:29:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Smartphone devices can be accessed via Windows Explorer after client deployment</title><link>https://support.levelblue.com/kb/Goto11821.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Why can Smartphone devices be accessed via Windows Explorer even though the policy restricts them?&lt;/LI&gt;&lt;LI&gt;Just deployed EndPoint Client and some devices are not being blocked.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;If a device had already been used in the user session in which the client agent was deployed, access may not be blocked. This is because blocking logic is checked at the time of the original connection. &lt;/P&gt;&lt;P&gt;To fully block devices you may need to log off/log on, or restart the system. &lt;/P&gt;</description><pubDate>Mon, 17 Sep 2007 02:11:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Can I install the EndPoint Security client without deploying it from the server?</title><link>https://support.levelblue.com/kb/Goto11796.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Can I install the EndPoint Security client without deploying it from the server?&lt;/LI&gt;&lt;LI&gt;Can I deploy the EndPoint Security client with an Active Directory Group Policy Object?&lt;/LI&gt;&lt;LI&gt;Can I install the EndPoint Security client using drive imaging such as Ghost?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;The EndPoint Security distribution package includes a MSI based client installation package.&lt;/P&gt;&lt;P&gt;You can use this package to create Ghost images or GPO deployments.&lt;/P&gt;&lt;P&gt;For more details, see the &lt;FONT face="Courier New"&gt;ReadMe.txt&lt;/FONT&gt; file in the MSI_Client folder of the distribution package. This file includes instructions about file locations and configuration settings.&lt;/P&gt;&lt;H2&gt;Note:&lt;/H2&gt;&lt;P&gt;When you install a client locally, the EndPoint Security server software must be running and accessible by HTTPS from the client in order for client registration and policy updates to occur.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description><pubDate>Tue, 04 Sep 2007 03:56:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Can EndPoint Security use the same IIS as other websites?</title><link>https://support.levelblue.com/kb/Goto11800.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Can I install EndPoint Security and other websites on the same server using IIS?&lt;/LI&gt;&lt;LI&gt;Can I use the IIS Lockdown tool on the EndPoint Security server?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;EndPoint Security uses Microsoft Internet Information Services (IIS) or Apache web server software on the server to communicate by HTTPS with clients.&lt;/P&gt;&lt;P&gt;If you install EndPoint Security using IIS, Marshal recommends using a dedicated installation of IIS on a non-internet facing server. &lt;/P&gt;&lt;P&gt;The IIS lockdown tool &lt;STRONG&gt;must not&lt;/STRONG&gt; be applied to the IIS installation.&lt;/P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;EndPoint Security will use IIS if it is available, or automatically install Apache if necessary.&lt;/P&gt;</description><pubDate>Tue, 04 Sep 2007 03:52:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How can I deny most access and permit selected users?</title><link>https://support.levelblue.com/kb/Goto11799.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Marshal EndPoint Security &lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;How can I deny most access and permit access for selected users only ?&lt;/LI&gt;&lt;LI&gt;I want to create a restrictive policy for use of removable devices&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;You can set a default policy for EndPoint Security using the Default Policy Wizard in the Console (&lt;STRONG&gt;Tools &amp;gt; Default Policy Wizard&lt;/STRONG&gt;).&lt;/P&gt;&lt;P&gt;You can choose to allow or deny access by default.&lt;/P&gt;&lt;P&gt;You can also quickly set any device class to "no access" using the Wizard at any time. &lt;/P&gt;&lt;P&gt;After you set the basic policy, you can set up exceptions for individual users or user groups.&lt;/P&gt;</description><pubDate>Tue, 04 Sep 2007 03:35:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item></channel></rss>