8.0.3.4 Addendum – Client Proxy Tab These settings only apply to the client system the installer created is used on (does not apply to the Creator-Configuration Tool itself) Enable Proxy Settings Enables proxy settings defined for update/download operations Proxy Server Address (domain or IP only) Port Username Password Socks 5 Proxy enable/disable Use the same proxy settings for email Enable or disable using the same proxy settings defined for updates for sending emails as well...
Installation of CryptoPrevent Bulk Creator is carried out with very few steps: Extract the ZIP archive downloaded from our site to a location of your choosing and make note of the location. This file contains the installer/setup routine for CryptoPrevent. Launch the installer executable file from the above location. Click next. It is not possible to proceed without accepting the license agreement and clicking next. Choose whether or not to create a desktop shortcut and...
CryptoPrevent Creator-Configurator Tool Main Interface Please enter in your company name for purchase identification purposes and the product key that was delivered as part of your bulk purchase. Copy and paste your product key exactly as you received it. The key should automatically validate after a delay that may last for a minute or more. If the information was entered correctly and was validated successfully, the bottom portion of the tool will be exposed. Ensure...
Load/Save Config tab The top portion of the tool’s interface shows the total number of remaining licenses associated with the product key previously entered. In the above example, 99 installations/licenses are available to assign to a particular configuration. Once installations/licenses are assigned to a particular configuration, they are reduced from your overall remaining installations. Installations/licenses may be retrieved from a configuration as long as they have not been deployed. Placing a smaller number of installs...
Protections tab The Minimum plan includes: Software restriction policy path rules for the appdata folder, all folders beneath appdata, the “local” (as opposed to “roaming”) appdata folder, and the Recycle Bin. It also includes protections related to program naming, including blocking of double file extensions and exploits related to the direction of text interpretation. Please follow the provided link for more information regarding the right-to-left override character: https://www.google.com/search?q=right+to+left+override https://blogs.technet.microsoft.com/office_global_experience/2009/11/18/bidirectional-text-embedding-and-override View the client documentation for more...
Filter Module tab: Filter Module can either selectively block certain executable file types or indiscriminately block them. The top three check boxes for the the .cpl, .scr, and .pif file types will check each files against our malware definitions and block them if a match is found. The lower three check boxes may be selected to always prevent the execution of the respective file types. Program filtering for .exe and .com executables is always based...
FolderWatch tab: FolderWatch provides additional monitoring of a selection of common folders and, optionally, custom folders. Files flagged as potentially malicious will be quarantined in the folder specified here. It is important to note that subfolders are monitored in the case of the predefined user folders but not in the case of custom folders. It would be necessary to individually add subfolders to the custom list in order for them to be monitored. d7x Variables...
Policies tab: Software Restriction Policy (SRP) Whitelist: The whitelist is a list of programs explicitly allowed via software restriction path rules. We provide a Whitelist EXEs already located in blocked locations upon install checkbox to simplify adding all existing items in blocked locations to the whitelist during client installation. You may predefine whitelist policies using the Define button. d7x Variables can be used in the Custom Locations to apply protections generically to various OS versions...
Updates tab: The updates tab allows you to enable a daily update schedule that runs at the hour of your choosing or at a randomly picked time. You may disable the reboot prompt for installation under Windows XP using the provided check box. Additional hash definitions will be downloaded from our servers if the Enable Extended Definitions Files *beta* option is checked. As of this writing, over 50000 base definitions are applied and that number...
Email Settings tab: This tab is used to enable email notifications of alerts. Alerts will be emailed using the provided credentials and options. Settings must be specified for every option except for email subject line text. Please note that Google will block external SMTP access unless you enable the “use less secure apps” option in your Gmail account settings. This restriction applies to any software that uses Google’s SMTP access and is not specific to...