diff --git a/docs/endpointprotector/admin/agent.md b/docs/endpointprotector/admin/agent.md index b7f64c1698..0348573274 100644 --- a/docs/endpointprotector/admin/agent.md +++ b/docs/endpointprotector/admin/agent.md @@ -179,7 +179,7 @@ the macOS Endpoint Protector Agent. **Step 3 –** Decompress the downloaded file. -![Installation on macOS with Deep Packet Inspection and VPN Traffic Intercept Active](clientinstallationios.webp) +![Installation on macOS with Deep Packet Inspection and VPN Traffic Intercept Active](./systemconfiguration/ClientSoftwarePage.png) **Step 4 –** Open the **.pkg** file and follow the installation steps and give the requested permissions. @@ -194,7 +194,11 @@ checkbox, and then **save** the changes. **Device Control** > **Users/Computer/Group/Global Settings** > **Manage Settings** > **Endpoint Protector Client** > **Deep Packet Inspection**. -![Activating Deep Packet Inspection](dpion.webp) +![Activating Deep Packet Inspection](./systemconfiguration/dpion.webp) + +:::note +For more information about Deep Packet Inspection and configurable options, please visit the dedicated [documentation section for DPI](/docs/endpointprotector/admin/cap_module/deeppacket.md). +::: **Step 7 –** Go to the **System Configuration** section, then **System Settings** > **Deep Packet Inspection Certificate**, and download the **CA Certificate**. @@ -227,7 +231,7 @@ Inspection Certificate**, and download the **CA Certificate**. - Block Internet Access – this option will end the Internet connection until the end-user approves the Endpoint Protector Proxy Configuration once the computer is rebooted. -![Activate Intercept VPN Traffic](interceptvpntraffic.webp) +![Activate Intercept VPN Traffic](./systemconfiguration/interceptvpntraffic.webp) **Step 15 –** **Save** the changes. @@ -255,8 +259,6 @@ macOS, you may still see EPPNotifier in the Notification settings. To remove i right-click and select "Reset notifications." ::: -For more information about Deep Packet Inspection and configurable options, please visit the dedicated [documentation section for DPI](/docs/endpointprotector/admin/cap_module/deeppacket.md). - ### Debian Based Distributions While the installation process is similar, each distribution and version have their own @@ -301,7 +303,7 @@ The following are several examples of supported distributions: ![RedHat based distributions](redhatbaseddistributionstwo.webp) -### Setting the Server IP +#### Setting the Server IP For all RedHat-based distributions, you need to follow an additional step after executing the above commands in order to set the Endpoint Protector Server IP. @@ -312,7 +314,7 @@ Based on each distribution, follow the corresponding method: ![Setting the Endpoint Protector Server IP](setserveriptwo.webp) -### The Windows Subsystem for Linux +## The Windows Subsystem for Linux The Windows Subsystem for Linux (WSL) allows you to run native Linux distributions directly within your Windows environment. However, due to its nature, the Endpoint Protector Client cannot be diff --git a/docs/endpointprotector/admin/cap_module/deeppacket.md b/docs/endpointprotector/admin/cap_module/deeppacket.md index 9a88a3845e..b17c21b776 100644 --- a/docs/endpointprotector/admin/cap_module/deeppacket.md +++ b/docs/endpointprotector/admin/cap_module/deeppacket.md @@ -93,10 +93,7 @@ generated. **Step 4 –** Reboot the endpoint to enforce a new Certificate. -:::note -Issuing the Deep Packet Inspection Certificate on Windows is handled automatically and -transparently by the Endpoint Protector Client. No additional steps are required. -::: + ![Configuring the Deep Packet Inspection - Auto-refresh Certificate feature](autorefreshcert.webp) EPP DPI module generates a certificate only at the first time a user visits a website and caches that certificate for subsequent visits to the same website. The certificate cache deletion interval can be configured in EPP Server versions 5.8.0.0 and above (please refer to this UM section [System Settings - DPI certificate](/docs/endpointprotector/admin/systemconfiguration/systemsettings) . Alternatively, the certificate cache is cleared either upon computer reboot or when the DPI feature is disabled. @@ -105,8 +102,14 @@ Endpoint Protector employs the same criteria as the Chromium open-source web bro If needed, this feature can be configured through the DPI Bypass option described here [Global Settings - DPI configuration](/docs/endpointprotector/admin/dc_module/globalsettings#dpi-configuration). +### DPI on Windows -## Deep Packet Inspection Certificate on macOS +:::note +Issuing the Deep Packet Inspection Certificate on Windows is handled automatically and +transparently by the Endpoint Protector Client. No additional steps are required. +::: + +### DPI Certificate on macOS Due to the latest changes in the macOS 11.0 that affect Deep Packet Inspection, a new Root Certificate is needed in order for the Deep Packet Inspection feature to work on the mentioned macOS @@ -153,8 +156,7 @@ Linux users to manually add the new certificate into the keychain. On Windows, t be updated automatically. ::: - -## Deep Packet Inspection Certificate on Linux +### DPI Certificate on Linux Due to system-level requirements in Linux, adding the Deep Packet Inspection certificate involves specific steps to ensure compatibility. The certificate enables Endpoint Protector to perform secure diff --git a/docs/endpointprotector/admin/systemconfiguration/dpion.webp b/docs/endpointprotector/admin/systemconfiguration/dpion.webp index 012d718b68..5102d13d05 100644 Binary files a/docs/endpointprotector/admin/systemconfiguration/dpion.webp and b/docs/endpointprotector/admin/systemconfiguration/dpion.webp differ diff --git a/docs/endpointprotector/admin/systemconfiguration/interceptvpntraffic.webp b/docs/endpointprotector/admin/systemconfiguration/interceptvpntraffic.webp index 7da4392938..040b4987d8 100644 Binary files a/docs/endpointprotector/admin/systemconfiguration/interceptvpntraffic.webp and b/docs/endpointprotector/admin/systemconfiguration/interceptvpntraffic.webp differ