18.104.22.168 Addendum – Client Proxy Tab These settings only apply to the client system the installer created is used on (does not apply to the Creator-Configuration Tool itself) Enable Proxy Settings Enables proxy settings defined for update/download operations Proxy Server Address (domain or IP only) Port Username Password Socks 5 Proxy enable/disable Use the same […]
Installation of CryptoPrevent Bulk Creator is carried out with very few steps: Extract the ZIP archive downloaded from our site to a location of your choosing and make note of the location. This file contains the installer/setup routine for CryptoPrevent. Launch the installer executable file from the above location. Click next. It is not possible […]
CryptoPrevent Creator-Configurator Tool Main Interface Please enter in your company name for purchase identification purposes and the product key that was delivered as part of your bulk purchase. Copy and paste your product key exactly as you received it. The key should automatically validate after a delay that may last for a minute or more. […]
Load/Save Config tab The top portion of the tool’s interface shows the total number of remaining licenses associated with the product key previously entered. In the above example, 99 installations/licenses are available to assign to a particular configuration. Once installations/licenses are assigned to a particular configuration, they are reduced from your overall remaining installations. Installations/licenses […]
Protections tab The Minimum plan includes: Software restriction policy path rules for the appdata folder, all folders beneath appdata, the “local” (as opposed to “roaming”) appdata folder, and the Recycle Bin. It also includes protections related to program naming, including blocking of double file extensions and exploits related to the direction of text interpretation. Please […]
Filter Module tab: Filter Module can either selectively block certain executable file types or indiscriminately block them. The top three check boxes for the the .cpl, .scr, and .pif file types will check each files against our malware definitions and block them if a match is found. The lower three check boxes may be selected […]
FolderWatch tab: FolderWatch provides additional monitoring of a selection of common folders and, optionally, custom folders. Files flagged as potentially malicious will be quarantined in the folder specified here. It is important to note that subfolders are monitored in the case of the predefined user folders but not in the case of custom folders. It […]
Policies tab: Software Restriction Policy (SRP) Whitelist: The whitelist is a list of programs explicitly allowed via software restriction path rules. We provide a Whitelist EXEs already located in blocked locations upon install checkbox to simplify adding all existing items in blocked locations to the whitelist during client installation. You may predefine whitelist policies using […]
Updates tab: The updates tab allows you to enable a daily update schedule that runs at the hour of your choosing or at a randomly picked time. You may disable the reboot prompt for installation under Windows XP using the provided check box. Additional hash definitions will be downloaded from our servers if the Enable […]
Email Settings tab: This tab is used to enable email notifications of alerts. Alerts will be emailed using the provided credentials and options. Settings must be specified for every option except for email subject line text. Please note that Google will block external SMTP access unless you enable the “use less secure apps” option in […]
Join us for live tech chat, product questions, support, and technical training right here!
Customer or not, you are welcome to drop in and discuss anything ‘tech’ with us!
d7x Quick Tip – Automating the d7xRDT d7x Quick Tip – Automating the d7xRDT with d7x v19.6.18