Table of Contents
4.2 (EoS)
Expand all | Collapse all
-
- Set Up the Endpoint Infrastructure
- Activate Traps Licenses
-
- Endpoint Infrastructure Installation Considerations
- TLS/SSL Encryption for Traps Components
- Configure the MS-SQL Server Database
- Install the Endpoint Security Manager Server Software
- Install the Endpoint Security Manager Console Software
- Manage Proxy Communication with the Endpoint Security Manager
- Load Balance Traffic to ESM Servers
-
- Malware Protection Policy Best Practices
- Malware Protection Flow
- Manage Trusted Signers
-
- Remove an Endpoint from the Health Page
- Install an End-of-Life Traps Agent Version
-
-
- Traps Troubleshooting Resources
- Traps and Endpoint Security Manager Processes
- ESM Tech Support File
-
- Access Cytool
- View the Status of the Agent Using Cytool
- View Processes Currently Protected by Traps Using Cytool
- Manage Logging of Traps Components Using Cytool
- Restore a Quarantined File Using Cytool
- View Statistics for a Protected Process Using Cytool
- View Details About the Traps Local Analysis Module Using Cy...
- View Hash Details About a File Using Cytool
Database
The database stores administrative information, security
policy rules, endpoint history, and other information about security
events. The database is managed over the MS-SQL platform. Each database
requires a license and can communicate with one or more ESM Servers.
The database may be installed on the same server as the ESM Console
and ESM Server, such as in a standalone environment, or the database
can be installed on a dedicated server. For information on hardware
and software requirements for the database, see Database
Software Requirements.
During evaluation we recommend you use SQL Server Express
which enables you to easily migrate the database to SQL Server Standard
or SQL Server Enterprise.