Can Netwrix Endpoint Protector (NEP) view detailed file metadata information, such as the document owner of Word files and other document properties?
|
|
2
|
34
|
September 8, 2025
|
Understand how to report access to specific network share without block it
|
|
2
|
48
|
August 22, 2025
|
What’s one device or app you were surprised to discover was putting your data at risk?
|
|
0
|
22
|
August 14, 2025
|
Require a button to export all the e-discovery logs
|
|
3
|
42
|
August 13, 2025
|
Which Reporting feature do you depend on the most, and what makes it essential for you?
|
|
0
|
29
|
August 4, 2025
|
When Endpoint Protector alerts you of a potential data breach (e.g. unauthorized data transfers), what steps do you typically follow?
|
|
2
|
44
|
July 29, 2025
|
Are AI tools considered potential data egress channels in your organization, and do you plan to implement controls to manage these risks?
|
|
4
|
70
|
July 29, 2025
|
Managing Shadow Files
|
|
7
|
63
|
July 21, 2025
|
How do you balance blocking vs. monitoring in your data protection strategy?
|
|
1
|
31
|
July 16, 2025
|
Handling files in the recycling bin with eDiscovery
|
|
8
|
63
|
September 12, 2025
|
How to block native screenshot functionality on Ubuntu 24.04
|
|
3
|
63
|
September 6, 2025
|
How to block or log file uploads or personally identifiable information (PII) using CAP when using ChatGPT
|
|
6
|
103
|
August 26, 2025
|
Assessment of CAP Policy Rollout and Performance Impact for File Monitoring
|
|
3
|
55
|
August 23, 2025
|
New Outlook Addin - Downtime
|
|
2
|
54
|
August 19, 2025
|
About SBOM (Software Bills Of Materials)
|
|
3
|
66
|
July 27, 2025
|
Identifying and Auditing Content Aware Protection (CAP) Policy Assignments in Endpoint Protector
|
|
3
|
40
|
June 30, 2025
|
Where can find I get the files for EPP?
|
|
3
|
133
|
April 29, 2025
|