Welcome to Endpoint Protection's Advanced Administration Guide.
This guide provides in-depth technical information that complements the online help (http://documents.managedprotection.pandasecurity.com/Help/v72000/Customers/Default/en-us/) included in the product, so that advanced users and administrators can make the most of the benefits provided by Endpoint Protection.
More specifically, in this guide you'll find useful technical information about the way Endpoint Protection works on the different operating systems, troubleshooting information and FAQ.
This version contains updated information on the detection flow in the transport protection for Exchange servers as well as how to set up a whitelist of allowed devices in Endpoint Protection.
In the latter case, the guide gives detailed information on how to create whitelists, import/export them, and how to identify a device when it is connected to a protected computer.
Intrusion prevention system (origin of IDS attacks and protection mechanisms)
Improved communication between computers and the Endpoint Protection server
Detection flow in the transport protection for Exchange servers
How to import/export whitelists of allowed devices and how to exclude detected devices from detection
If, while consulting this guide, you want to access the information provided in the online help about how to configure the protection modules included in the solution, click here:
http://www.pandasecurity.com/enterprise/downloads/docs/product/managedprotection/
We hope you find this Advanced Administration Guide useful.
IMPORTANT
For information about Endpoint Protection on computers with the following operating systems: Windows 2000, Windows XP SP0/SP1 (32-bit), Windows XP (64-bit), Windows Server 2003 SP0 (32-bit), Windows Server 2003 R2 SP0 (32-bit), Windows Server 2003 (64-bit) or Windows Server 2003 R2 (64-bit), refer to the Advanced Administration Guide for versions prior to 6.0 in the product documentation area.