Skip to main content
All Collections
Endpoint Protection
Endpoint Protection
How to set up an Endpoint Protection PackageThis guide will walk through how a company admin user can set up an Endpoint Protection installation package.
How to invite users to download Endpoint ProtectionThis guide walks you through how to invite users to download your Endpoint Protection Package.
How to run a remote Endpoint Protection scanThis guide will walk you through the process of running an Endpoint Protection scan remotely!
How to use Endpoint Protection on WindowsEndpoint Security is mainly automated, but this guide will walk you through how to use the available options on your Windows PC.
How to install Endpoint Security on your Linux DeviceThis guide will walk you through how to install Endpoint Protection on your Linux Desktop, Server or Embedded Device.
How to install Endpoint Protection on WindowsThis guide will walk you through how to install Endpoint Protection on your Windows Computer.
How to install Endpoint Protection on Mac OSA step-by-step guide on how to install the Defense.com Endpoint Security software on Mac OS devices.
Uninstalling Defense.com Endpoint Security from WindowsIn this guide, we will walk you through the step-by-step process of uninstalling Defense.com Endpoint Security from your Windows device.
Uninstalling Endpoint Protection From Mac OSIn this guide, we will walk you through the step-by-step process of uninstalling Defense.com Endpoint Security from your Mac device.
Understanding the modules included in Endpoint ProtectionThis guide provides details on the multiple elements of our Endpoint Protection software that work together to keep your devices secure.
Deploying Defense.com Endpoint Security from IntuneHow to deploy Defense.com Endpoint Security from Microsoft Intune
Feature overview: Patch ManagementOverview of how the Patch Management module works in the Defense.com Endpoint Protection agent.
Feature overview: Device ControlAn overview of how the Device Control feature works in the Defense.com Endpoint Protection agent.
Feature overview: Content ControlAn overview of the Content Control functionality which is included in Defense.com Endpoint Protection.
Feature overview: Anti-ExploitAn overview of the Advanced Anti-Exploit functionality included with the Defense.com Endpoint Protection agent.
Feature overview: Anti-malwareAn overview of the Anti-malware functionality that is included as part of Defense.com Endpoint Protection.
Feature overview: FirewallAn overview of the firewall functionality in Defense.com Endpoint Protection.
Feature overview: Network Attack DefenseAn overview of the Network Attack Defense functionality in Defense.com Endpoint Protection.
Obtaining Logs from Endpoint Protection on Mac OSIn this guide, we will walk you through the process of obtaining logs from the Defense.com Endpoint Protection Tool on Mac OS
Obtaining Logs from Endpoint Protection on WindowsIn this guide, we will walk you through the process of obtaining logs, which can be helpful in troubleshooting and resolving problems.
How to set up Full Disk Encryption using Endpoint ProtectionBetter understand how to get up and running with the Endpoint Protection Full Disk Encryption module.