Cyberoam Central Console
Cyberoam Security Appliances (UTM and NGFW)
Cyberoam SSL VPN
Cyberoam Virtual Security
Cyberoam's On-Cloud Management Service
Endpoint Data Protection
Knowledge Base Information
Data Control and DLP
Endpoint Security and Control
Sophos UTM 9
Tweets by SophosSupport
Change Cyberoam Endpoint Data Protection Data Directory
Created: 16 Dec 2010
Applicable to all versions above 3.20.1130 Article describes procedure to change Cyberoam Endpoint Data Protection Data Directory. This document has 3 sections Classificati
What happens after Cyberoam Endpoint Data Protection License is expired?
Created: 14 Dec 2010
Applicable to Version : 3.20.1130 After the license is expired in Cyberoam Endpoint Data Protection, all the policies would still be applicable for the client agent which were last applied. But
Created: 30 Nov 2010
If the blocked application is renamed, can Cyberoam Endpoint Data Protection still block it?
Created: 15 Sep 2010
Applicable to Version : 3.20.1130 Yes. It is possible to block renamed application with Cyberoam Endpoint Data Protection. On Endpoint Data Protection console, Go to Basic Policy
Integrate Active Directory with Cyberoam Endpoint Data Protection server
Created: 29 Jun 2010
Applicable to Version : 3.20.1130 Active Directory Domain Importfeature enables to pre-group the computers and users connected to Cyberoam Endpoint Data Protection Server in the domain. On
Which network ports are used for Cyberoam Endpoint Data Protection?
Created: 19 Apr 2010
Applicable to Version : 3.20.1130 The network ports used by Cyberoam Endpoint Data Protection Console are as follows: TCP: 8241 TCP: 8236 TCP: 8237 & 82
Do we issue different keys for each module?
Created: 12 Apr 2010
Applicable to Version : 3.20.1130 No, Cyberoam Endpoint Data Protection issues only one key for all modules. E.g. Suppose the customer has already purchased module1, module2 and no
Export Agent List
Created: 7 Apr 2010
Applicable to Version : 3.20.1130 Requirement To export the entire list of computer where the agent is installed. Solution Steps Logon to Cyberoam Endpoi
Install the Cyberoam Endpoint Data Protection Agent using Logon Script
Created: 5 Apr 2010
Applicable to Version : 3.20.1130
How to restrict user or computer to delete or modify the files/folder on network resources?
Created: 1 Apr 2010
Applicable to Version : 10 We can achieve this by creating an Advanced Policy for Document as shown in the below screenshot: As per the policy, the computer Judith will not be ab