Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 11 additions & 0 deletions docs/endpointprotector/admin/agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -170,6 +170,17 @@ Optional distributions will be provided on the product portal and are available

![The Agent enforces the Rights and Settings received from the Endpoint Protector Server on the protected endpoints (Windows, Mac, and Linux)](setupagenttwo.webp)

### Increased Communication Security

During interactive installation, the installer wizard includes an **Increased Communication Security** checkbox. When enabled, the EPP Client will use certificate-based authentication during the registration process and for all subsequent communication with the EPP Server.
This option corresponds to the **Client Registration Certificate** feature configured on the server side. Before enabling it, ensure that a cryptographic identity signed by the EPP Root CA has been deployed to the endpoint and is present in **Certificate Manager** under *Local Computer → Certificates → Personal*.


:::note
This option requires the **Client Registration Certificate** feature to be enabled and configured on the EPP Server ([**Appliance → Server Maintenance → Client Registration Certificate**](/docs/endpointprotector/admin/appliance.md)) before the client is installed. Enabling it without the corresponding server-side configuration will prevent the client from registering.
:::


### Installation on macOS with Deep Packet Inspection and VPN Traffic Intercept Active

Follow the steps to install on macOS with Deep Packet Inspection and VPN Traffic Intercept active.
Expand Down
55 changes: 38 additions & 17 deletions docs/endpointprotector/admin/appliance.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,16 +87,23 @@ In this section you can modify or add a DNS server address and then Save your ch

![Modify or add a DNS server address and then Save your changes](dnsconfg.webp)

### Client Registration Certificate
### Communication Security

By default, all communication between Endpoint Protector Clients and the Endpoint Protector Server is encrypted using mutual TLS (mTLS). Both sides present certificates during the TLS handshake, ensuring that data in transit is protected against interception.

From this section, you can register and then verify the Endpoint Protector Client certificate
signature. The client registration certificate is an additional security measure enabling
certificate-based authentication.
To further harden the registration and communication process, Endpoint Protector provides two additional, optional security features that build on this foundation: **Client Registration Certificate** and **Server Certificate Validation**. When enabled, these options introduce certificate pinning into the client lifecycle — verifying not just that communication is encrypted, but
that both endpoints are who they claim to be.

:::warning
The Client Registration Certificate feature is not available for Linux!
:::

### Client Registration Certificate

The Client Registration Certificate feature enriches the client registration process by adding a certificate verification component: the Endpoint Protector Server validates the client's certificate during the registration phase, ensuring that only clients presenting a cryptographic identity signed by a trusted CA are allowed to register.
This provides an additional layer of protection in the enrollment flow — ensuring that only authorized, managed devices can register with the EPP Server, even when operating on shared or untrusted networks.

**Configuration**

**Step 1 –** Enable the custom certificate setting and then upload the certificate chain, Root CA and
Intermediate;
Expand All @@ -117,6 +124,8 @@ just for testing the signature (for example the Endpoint Protector Client certi
**Step 3 –** Click **Save** and allow 2 minutes for the information to be validated. You will view a
successful message confirming the custom certificate was added and the test certificate is valid.

**Requirements**

:::note
The client registration authentication certificate and the Endpoint Protector server
certificate must be issued by the same CA.
Expand All @@ -134,30 +143,42 @@ the endpoints.

### Server Certificate Validation

From this section, you can configure Server Certificate Validation, which ensures that certificates
used for all communication requests on Endpoint Protector clients are validated. This feature is
crucial for maintaining secure communication between various Endpoint Protector products.
While Client Registration Certificate secures the registration phase, Server Certificate Validation extends certificate verification to all ongoing communication. When enabled, the Endpoint Protector Client validates the server's SSL certificate on every outbound request — ensuring that clients only communicate with a trusted, legitimate Endpoint Protector Server and cannot be redirected to a rogue or impersonated instance.
When enabled, the EPP Client validates the server's SSL certificate on every outbound request, verifying three key properties:
- **Certificate trust** — the server certificate must be issued by a trusted Certificate Authority recognized by the endpoint.
- **Expiration date** — the server certificate must be currently valid and not expired.
- **Hostname matching** — the server certificate's Common Name (CN) or Subject Alternative Name (SAN) must match the hostname the client is connecting to.


:::note
All certificate validation statuses will be reported to the Endpoint Protector Server and
stored for debugging purposes in Endpoint Protector Client logs.
Starting from the 5.9.0.0 or later, enabling this option activates Endpoint Protector Server Certificate Validation for all Endpoint Protector Client communication. This strengthens security by ensuring trusted and valid certificates are used.
:::

**Configuration**

From this section, you can configure Server Certificate Validation, which ensures that certificates used for all communication requests on Endpoint Protector clients are validated.

![From this section, you can configure Server Certificate Validation.](servercertalidation.webp)

Before enabling, verify that:
- The EPP Server certificate is valid and not expired.
- The EPP Server certificate is issued by a CA trusted by all managed endpoints.
- The EPP Server hostname matches the certificate's CN or SAN exactly.

**Client-Side Configuration**
The server-side configuration alone is not sufficient — the EPP Client must also be prepared to participate in certificate-based registration. This is done at installation time.
When installing the Endpoint Protector Client on Windows or macOS, the installer wizard includes an **Increased Communication Security** checkbox. Enabling this option instructs the EPP Client to use the certificate-based authentication flow during registration and all subsequent communication with the EPP Server. For detailed installation steps and a walkthrough of the installer wizard, refer to the [Agent Installation](/docs/endpointprotector/admin/agent.md#increased-communication-security) section.

:::warning
Please use this feature responsibly, as improper certificate usage with certification
validation might disrupt Endpoint Protector Client to Endpoint Protector Server communication. For a
successful connection, both server and client certificate validation must be enabled.
Please use this feature responsibly. Improper certificate configuration combined with enabled certificate validation may disrupt Endpoint Protector Client to Endpoint Protector Server communication.
**For a successful connection, both server and client certificate validation must be enabled.**
:::


:::note
Starting from the 5.9.0 or later, enabling this option activates Endpoint Protector Server
Certificate Validation for all Endpoint Protector Client communication. This strengthens security by
ensuring trusted and valid certificates are used.
All certificate validation statuses will be reported to the Endpoint Protector Server and
stored for debugging purposes in Endpoint Protector Client logs.
:::


### Appliance Operations

In this section you can perform appliance operations such as Reboot or Shutdown.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -424,3 +424,7 @@ Label names can be obtained from the NDC administrator. Consider using the exact
:::

![Confguration for Netwrix Data Classification](NDCClassification.png)

:::note
The NDC labeling feature is supported only on EPP Clients version 2605.x.x.x and later.
:::
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
10 changes: 6 additions & 4 deletions docs/endpointprotector/supportability/client-supportability.md
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ By following the official operating system vendor policies, we can:

The following outlines our current OS support approach for Windows, macOS, and Linux environments, including version requirements, exceptions, and links to vendor documentation for up‑to‑date lifecycle information.

## Windows Client and Server OS Support
### Windows Client and Server OS Support

Netwrix Endpoint Protector (EPP) Agent supports all **Microsoft Windows client and server operating systems** that remain within Microsoft’s **Mainstream Support** or **Extended Security Update (ESU)** phase. This includes:

Expand All @@ -133,20 +133,22 @@ When a Windows OS transitions from **Mainstream** to **Extended Support**, Netwr

However, customers should be aware that **legacy operating systems may lack compatibility with modern security components**—such as updated encryption libraries or secure communications mechanisms—which are increasingly required in current environments. These limitations are outside our control and may impact agent reliability or feature availability.

_Windows 10 End of Life Note_
#### Windows 10 End of Life Note

Windows 10 is currently in the final stages of support, with official end-of-service dates approaching for various editions. Once these dates pass, Netwrix will treat Windows 10 the same as other Extended Support operating systems:
Windows 10 has reached end of support. Netwrix will treat Windows 10 the same as other Extended Support operating systems:

- No development fixes will be committed for OS-specific issues
- Operation is “best effort” only
- Any known incompatibilities will be noted in the Netwrix Community Release Notes

[Source: Microsoft announcement](https://support.microsoft.com/en-us/windows/windows-10-support-has-ended-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281#:~:text=Windows%2010%20support%20has%20ended%20on%20October%2014%2C%202025%20%2D%20Microsoft%20Support.)

_General Guidance_

Customers are strongly encouraged to plan migrations to supported operating systems ahead of published Microsoft EOL timelines. This ensures continued compatibility, access to full product capabilities, and ongoing support.

**Important:**
Netwrix EPP is **not supported** on of Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2008, Windows 7, Windows XP, or any earlier versions. The final EPP Agent build with “best effort” support for these operating systems is 5.9.4.0 (Windows version 6.2.3.1010). No future builds will be produced for them.
Netwrix EPP is **not supported** on Early build of Windows 10 64bit, Windows 10 32bit, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2008, Windows 7, Windows XP, or any earlier versions. The final EPP Agent build with “best effort” support for these operating systems is 5.9.4.0 (Windows version 6.2.3.1010). No future builds will be produced for them.

### macOS Clients

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Here is the current state of all versions of Endpoint Protector Server.

| **Discontinued Support** | **Limited Support** | **N-1 Track (Active Support)** | **N Track (Active Support)** |
| --- | --- | --- | --- |
| All versions prior to 5.9.4.1 | 5.9.4.2 (5942)<br/><br/>In Limited Support from Oct 14, 2025 to Feb 11, 2026. (120 days)<br/><br/>No new feature development or critical fixes.<br/><br/>Support is limited to configuration guidance for 5942. | There is no N-1 track at this time. | 2509.0.1.0 (25.9)<br/><br/>Released Oct 14, 2025.<br/>Full Active Support. [Link to release notes](https://community.netwrix.com/t/major-version-announcement-endpoint-protector-server-version-2509/114025) |
| All versions prior to 5.9.4.2 <br/> Limited support ended Feb 11, 2026. | | There is no N-1 track at this time. | 2602.0.1.0 (Base image 2509/2510)<br/><br/>Released Feb 5, 2026.<br/>Full Active Support. [Link to release notes](https://community.netwrix.com/t/endpoint-protector-2602-0-1-0-server-patch-released/121912) |

# Support Definitions Used In This Document

Expand Down
Loading