Sophos Community
  • User
  • Help
  • Site
  • Search
  • User
  • All Groups
  • Knowledge Base
  • Blog
  • More
  • Cancel

Knowledge Base

Browse Topics
  • Advisories
  • -CyberoamOS
    • +Cyberoam Central Console
    • +Cyberoam iView
    • +Cyberoam Security Appliances (UTM and NGFW)
    • +Cyberoam SSL VPN
    • +Cyberoam Virtual Security
    • +Cyberoam's On-Cloud Management Service
    • -Endpoint Data Protection
      • FAQs
      • How Tos
    • Knowledge Base Information
  • +Data Control and DLP
  • Email Appliance
  • +Endpoint Security and Control
  • +Free Tools
  • +General
  • +Mobile
  • +PureMessage
  • +Reflexion
  • +SafeGuard encryption
  • +Server protection
  • +Sophos Central
  • Sophos Clean
  • Sophos Home
  • +Sophos UTM 9
  • Web Appliance
  • +XG Firewall
Tweets by @SophosSupport
Latest Articles
  • 130259
    What happens after Cyberoam Endpoint Data Protection License is expired?
    Created: 14 Dec 2010
    Applicable to Version : 3.20.1130 After the license is expired in Cyberoam Endpoint Data Protection, all the policies would still be applicable for the client agent which were last applied. But
  • 130208
    If the blocked application is renamed, can Cyberoam Endpoint Data Protection still block it?
    Created: 15 Sep 2010
    Applicable to Version : 3.20.1130 Yes. It is possible to block renamed application with Cyberoam Endpoint Data Protection. On Endpoint Data Protection console, Go to Basic Policy
  • 130112
    Which network ports are used for Cyberoam Endpoint Data Protection?
    Created: 19 Apr 2010
    Applicable to Version : 3.20.1130 The network ports used by Cyberoam Endpoint Data Protection Console are as follows: TCP: 8241 TCP: 8236 TCP: 8237 & 82
  • 130110
    Do we issue different keys for each module?
    Created: 12 Apr 2010
    Applicable to Version : 3.20.1130 No, Cyberoam Endpoint Data Protection issues only one key for all modules. E.g. Suppose the customer has already purchased module1, module2 and no
  • 130103
    How to restrict user or computer to delete or modify the files/folder on network resources?
    Created: 1 Apr 2010
    Applicable to Version : 10 We can achieve this by creating an Advanced Policy for Document as shown in the below screenshot: As per the policy, the computer Judith will not be ab
  • 130102
    Can I access multiple Endpoint Data Protection servers at remote branches from Head office with single console?
    Created: 1 Apr 2010
    Applicable to Version : 10 Yes, it just needs a single console at head office to access multiple Endpoint Data Protection servers at branch office. The primary requirement is server should
  • 130101
    If user machine is locked due to policy execution then can it be unlocked if user shutdown or restart that PC?
    Created: 1 Apr 2010
    Applicable to Version : 10 No, it won’t be unlocked on shutdown or restart of that PC. User machine can be unlocked only from Server.
  • 130092
    Is not there any limitation for storing the data (more than 2GB in MSDE), when we talk about Data-Removal (30 days)?
    Created: 23 Mar 2010
    Applicable to Version : 10 Cyberoam Endpoint Data Protection comes up by default with MSDE which is free but max DB file size limit is 2GB. Need not to worry on this limit as Cyberoam Endpoin
  • 130091
    If policy is applied on Computers as well as on User, which one would take precedence?
    Created: 23 Mar 2010
    Applicable to Version : 10 Cyberoam: The policy works in the precedence like User Policy à Computer Policy à Group Policy à The Whole Network Policy where
  • 130090
    Do I have to purchase separate license keys for each module?
    Created: 23 Mar 2010
    Applicable to Version : 10 No, at the time of purchasing the license for End Point Data Protection, the customer needs to provide the below information: 1. Number of Users.
>
Sophos Footer
  • T&Cs
  • Help
  • Cookie Info
  • Contact Support

© 1997 - 2019 Sophos Ltd. All rights reserved.