Sophos Community
Search
User
Help
Site
Search
User
All Groups
Knowledge Base
Blog
More
Cancel
Knowledge Base
Browse Topics
Advisories
-
CyberoamOS
+
Cyberoam Central Console
+
Cyberoam iView
+
Cyberoam Security Appliances (UTM and NGFW)
+
Cyberoam SSL VPN
+
Cyberoam Virtual Security
+
Cyberoam's On-Cloud Management Service
-
Endpoint Data Protection
FAQs
How Tos
Knowledge Base Information
+
Data Control and DLP
Email Appliance
+
Endpoint Security and Control
+
Free Tools
+
General
+
Mobile
+
PureMessage
+
Reflexion
+
SafeGuard encryption
+
Server protection
+
Sophos Central
Sophos Clean
Sophos Home
+
Sophos UTM 9
Web Appliance
+
XG Firewall
Tweets by @SophosSupport
Latest Articles
130259
What happens after Cyberoam Endpoint Data Protection License is expired?
Created: 14 Dec 2010
Applicable to Version : 3.20.1130 After the license is expired in Cyberoam Endpoint Data Protection, all the policies would still be applicable for the client agent which were last applied. But
130208
If the blocked application is renamed, can Cyberoam Endpoint Data Protection still block it?
Created: 15 Sep 2010
Applicable to Version : 3.20.1130 Yes. It is possible to block renamed application with Cyberoam Endpoint Data Protection. On Endpoint Data Protection console, Go to Basic Policy
130112
Which network ports are used for Cyberoam Endpoint Data Protection?
Created: 19 Apr 2010
Applicable to Version : 3.20.1130 The network ports used by Cyberoam Endpoint Data Protection Console are as follows: TCP: 8241 TCP: 8236 TCP: 8237 & 82
130110
Do we issue different keys for each module?
Created: 12 Apr 2010
Applicable to Version : 3.20.1130 No, Cyberoam Endpoint Data Protection issues only one key for all modules. E.g. Suppose the customer has already purchased module1, module2 and no
130103
How to restrict user or computer to delete or modify the files/folder on network resources?
Created: 1 Apr 2010
Applicable to Version : 10 We can achieve this by creating an Advanced Policy for Document as shown in the below screenshot: As per the policy, the computer Judith will not be ab
130102
Can I access multiple Endpoint Data Protection servers at remote branches from Head office with single console?
Created: 1 Apr 2010
Applicable to Version : 10 Yes, it just needs a single console at head office to access multiple Endpoint Data Protection servers at branch office. The primary requirement is server should
130101
If user machine is locked due to policy execution then can it be unlocked if user shutdown or restart that PC?
Created: 1 Apr 2010
Applicable to Version : 10 No, it won’t be unlocked on shutdown or restart of that PC. User machine can be unlocked only from Server.
130092
Is not there any limitation for storing the data (more than 2GB in MSDE), when we talk about Data-Removal (30 days)?
Created: 23 Mar 2010
Applicable to Version : 10 Cyberoam Endpoint Data Protection comes up by default with MSDE which is free but max DB file size limit is 2GB. Need not to worry on this limit as Cyberoam Endpoin
130091
If policy is applied on Computers as well as on User, which one would take precedence?
Created: 23 Mar 2010
Applicable to Version : 10 Cyberoam: The policy works in the precedence like User Policy à Computer Policy à Group Policy à The Whole Network Policy where
130090
Do I have to purchase separate license keys for each module?
Created: 23 Mar 2010
Applicable to Version : 10 No, at the time of purchasing the license for End Point Data Protection, the customer needs to provide the below information: 1. Number of Users.
>