Who is this article for?
CrashPlan for Small Business, no.
Code42 for Enterprise, yes.
Link: Product plans and features.
This article contains a reference guide for settings used to enable endpoint monitoring for your entire Code42 environment. To access endpoint monitoring, navigate to Settings > Endpoint Monitoring.
Enables or disables scanning of file metadata on all removable media, such as USB drives or SD cards.
Enables or disables detection of syncing files using these cloud storage apps:
Enables or disables detection of files accessed by web browsers on Windows devices, including file uploads and downloads.
This may also include other instances of a browser accessing a file, such as opening a local file to view it in a web browser without actually uploading it.
Enables or disables detection of file-restore activity, such as restores of files belonging to other users.
Enables or disables detection of dangerous, malicious, or sensitive file metadata and file contents based on specified patterns using the YARA rule framework. Pattern matching requires creating a YARA rule file and manually deploying it to each user device. Unlike the other types of endpoint monitoring, pattern matching only searches files included in the user's backup file selection.
Pattern matching can scan for MD5 hash and filename matches on any file, but does not extract file contents of binary or compressed files. Practically speaking, this means pattern matching only searches the contents of plain text files, unless you create a rule targeting a specific binary string.
Google's Drive File Stream retrieves files by mounting a temporary internal drive partition on the user's device and streaming files to the temporary drive. The Code42 app only monitors file movement to external drives, so it does not detect this activity.
Learn more: Code42 Education Pass training videos
We also have a training module about the Code42 Security Center. The module is 4 videos that are 5–8 minutes long. These videos cover how to enable endpoint monitoring, review security events, and monitor user activity to help you protect against internal and external threats to your organization’s intellectual property.