Skip to main content

Endpoint Protection

How to set up an Endpoint Protection packageThis guide will walk through how a company admin can set up an Endpoint Protection installation package.
How to invite users to download Endpoint ProtectionNeed to get your users to install Endpoint Protection? We'll take you through inviting users to download the Endpoint Protection installer
How to run a remote scan using Endpoint ProtectionThis guide will walk you through the process of scanning a device remotely using Endpoint Protection.
How to use Endpoint Protection on WindowsEndpoint Security is mainly automated, but this guide will walk you through how to use the available options on your Windows PC.
How to install Endpoint Protection on LinuxThis guide will walk you through how to install Endpoint Protection on your Linux Desktop, Server or Embedded Device.
How to install Endpoint Protection on WindowsThis guide will walk you through how to install Endpoint Protection on your Windows Computer.
How to install Endpoint Protection on Mac OSA step-by-step guide on how to install the Defense.com Endpoint Security software on Mac OS devices.
How to uninstall Defense.com Endpoint Security from WindowsIn this guide, we will walk you through the step-by-step process of uninstalling Defense.com Endpoint Security from your Windows device.
Uninstalling Endpoint Protection From Mac OSIn this guide, we will walk you through the step-by-step process of uninstalling Defense.com Endpoint Security from your Mac device.
Understanding the modules included in Endpoint ProtectionThis guide provides details on the multiple elements of our Endpoint Protection software that work together to keep your devices secure.
How to deploy Endpoint Protection using Microsoft IntuneThis guide will take you step-by-step through the process of deploying Endpoint Protection to your end-users' devices using Intune.
Feature overview: Patch ManagementOverview of how the Patch Management module works in the Defense.com Endpoint Protection agent.
Feature overview: Device ControlAn overview of how the Device Control feature works in the Defense.com Endpoint Protection agent.
Feature overview: Content ControlAn overview of the Content Control functionality which is included in Defense.com Endpoint Protection.
Feature overview: Anti-ExploitAn overview of the Advanced Anti-Exploit functionality included with the Defense.com Endpoint Protection agent.
Feature overview: Anti-malwareAn overview of the Anti-malware functionality that is included as part of Defense.com Endpoint Protection.
Feature overview: FirewallAn overview of the firewall functionality in Defense.com Endpoint Protection.
Feature overview: Network Attack DefenseAn overview of the Network Attack Defense functionality in Defense.com Endpoint Protection.
Obtaining Logs from Endpoint Protection on Mac OSIn this guide, we will walk you through the process of obtaining logs from the Defense.com Endpoint Protection Tool on Mac OS
Obtaining logs from Endpoint Protection on WindowsIn this guide, we will walk you through the process of obtaining logs, which can be helpful in troubleshooting and resolving problems.
How to enable Full Disk Encryption using Endpoint ProtectionBetter understand how to get up and running with the Endpoint Protection Full Disk Encryption module.
How to update Defense.com Endpoint protection on WindowsIn this guide we'll go through the steps to ensure your Endpoint protection is up to date.
Feature overview: Full Disk EncryptionAn overview of the encryption capabilities of the Defense.com Endpoint Protection agent.