Most Popular Articles
Most Helpful Articles
Table of Contents
Knowledge Base Information
Cyberoam Virtual UTM
Endpoint Data Protection
What happens after Cyberoam Endpoint Data Protection License is expired?
If the blocked application is renamed, can Cyberoam Endpoint Data Protection still block it?
Which network ports are used for Cyberoam Endpoint Data Protection?
Do we issue different keys for each module?
How to restrict user or computer to delete or modify the files/folder on network resources?
Can I access multiple Endpoint Data Protection servers at remote branches from Head office with single console?
If user machine is locked due to policy execution then can it be unlocked if user shutdown or restart that PC?
Is not there any limitation for storing the data (more than 2GB in MSDE), when we talk about Data-Removal (30 days)?
If policy is applied on Computers as well as on User, which one would take precedence?
Do I have to purchase separate license keys for each module?
How could I restrict the range to be discovered under ‘Remote Installer’ for specific subnet?
My machine is not getting listed under ‘Remote Installer’ procedure. What can be the reason?
How does Cyberoam Endpoint Data Protection discover the host?
What is the limitation of disk space to hold the data of Cyberoam Endpoint Data Protection agent when the machine is offline?
What will happen in Cyberoam Endpoint Data Protection agent with imaging solutions like Symantec Ghost, etc?
Can we shut down, restart or log off agent PC from Cyberoam Endpoint Data Protection server?
What is the difference between UNINSTALL and DELETE functions?
Why I am not able to edit/delete the policy for group/user?
What is the significance of ‘Only offline’ while creating policies?
How to restore Endpoint Data Protection in case of MSDE?
How to backup Endpoint Data Protection in case of MSDE?
Does Cyberoam Endpoint Data Protection Patch management would Patch Windows Service Pack?
How to do remote installation of Agent on Work Group Environment?
Endpoint Data Protection is configured to block file delete option but still user is able to do the same using command prompt.
What does ‘only offline’ option available in the policy configuration do?
Is the communication between server and agent encrypted?
I have a policy applied to a user, what happens if I move the user to a different group? Which policy takes precedence?
What modules can one buy?
Do I need to re-install the agent after I set the checkcode on the server?
Why I am not able to see the option to enable disk encryption under local removable storage?
Is it possible to buy the Asset Management module for a few users and all the modules for the rest of the users?
Is it possible to install agents from a centralized location in a workgroup environment?
Is it possible to install the agent on a Linux or Macintosh OS?
For how many days is the demo available?
Does one require administrator rights of the machine to install the agent in a workgroup environment?
What is the difference between ‘Alert’ & ‘Warning’?
How can I view the list of applications that can be blocked by the Endpoint Data Protection solution?
How often does the client communicate with the server i.e. the default polling time?
Is it possible to log emails sent via webmail like Yahoo mail or Hotmail?
How to control the network from getting flooded by Endpoint Data Protection data?
Is it possible to archive the files being transferred via Instant Messengers?
Which databases are compatible with Endpoint Data Protection server?
Can I use Endpoint Data Protection even if I do not have a database server?
How can I change the console password?
Is it possible for the user to uninstall the agent if they have administrator rights of the computer?
Why am I not able to see the Endpoint Data Protection service in my task manager?
Techsheet & Datasheets
Cyberoam SSL VPN
Cyberoam Central Console
Cyberoam's On-Cloud Management Service
Search for ...
All of the words entered
Any of the words entered
The exact phrase entered
Boolean (text contains +/-)
Full Text Search
Copyright © 2013 Cyberoam Technologies Pvt. Ltd.
All rights reserved.
Knowledge Base Software
Powered By: NovoSolutions, Inc.