[Ended] Daily Knowledge Dive #40: Rate and Earn 200 Coins!
  

Sangfor Jojo Lv5Posted Jun-23-2025 09:22

Hey everyone!
  
We're excited to announce a new interactive activity called "Daily Knowledge Dive". This is a fantastic opportunity to engage with our community while enhancing your knowledge.


1. How It Works:

Step 1. Daily Document Reading
Each day, we will share a specific document for you to read.

Link:  Endpoint Secure V6.0.4 Security Hardening Guide


Step 2. Vote for Quality and Give Feedback
After reading, we invite you to vote on the document's quality and share feedback. You can provide the following possible feedback:
     A. Incomplete and missing information, like configuration steps and illustrations
     B. The screenshots do not match the description
     C. Massive disordered hierarchical headings
     D. Massive grammar and spelling issues

!!! Please provide your feedback based on the following standardized reply format:
From Chapter:  chapter name (For example: 2.3 Athena XDR Side)
Issue Description:  xxxxxx


Step 3. Get rewards for your participation
1) Each user who votes will receive 20 Coins!
2) If you find quality issues in the document, please provide a screenshot or a detailed description of the problem. For each adopted feedback, you will earn 200 Coins! If your feedback is the same or similar to others, we will adopt the first and complete one.

<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Warm Tips:
1) We only accept and adopt the feedback and suggestions, including the above three topics.
2) The "Download" button is ineffective because the function is used for a markdown editor and can't be improved at present. Therefore, it is a known issue that will not be adopted if you report it to us.

--------------------------------------------------------------------------------------------------------------------------------------
Single Poll, 11 voters in all
You do not have the permission to vote here.

This topic contains more resources

You must log in to download or view the file. Not registered yet? Register

x
Ali Vayani Lv1Posted Jun-23-2025 22:09
  
After reviewing the provided document, here's my feedback:

From Chapter: 1.5.4 Check Login Security Policy.
Issue Description: The screenshot provided on page 12 does not match the description of checking "Global Options and select Password Security Policy". The screenshot appears to be for "Edit Account" and shows options for restricting IP login, rather than the global password security policy.

From Chapter: 1.5.5 Use Multi-Factor Authentication
Issue Description: The screenshot on page 13 shows "Password Security Policy" settings, which is incongruent with the heading and content of Section 1.5.5, which is about "Multi-Factor Authentication". The relevant screenshot for multi-factor authentication appears to be below the "Password Security Policy" screenshot on the same page.

From Chapter: 1.7 Disable SSH Access
Issue Description: The screenshot on page 15 shows "Port Blocking" settings, while the preceding instruction is to "Go to System > System > Network > Advanced and disable the SSH Service". The screenshot relevant to disabling SSH service is actually on page 7 , within the "Network Interfaces Routing Advanced" section, under "SSH Service". The screenshot on page 15 should be explicitly linked to the subsequent instruction about enabling "Port Blocking".

From Chapter: 1.9 Enable Alert Function
Issue Description: The screenshot on page 17 shows the "SMTP Server" settings, but the description about enabling "Alert notification" and showing the screenshot for "Alert Options" is on page 18. This creates a slight mismatch in the flow between the text and the accompanying visuals on pages 17 and 18.

Zonger Lv5Posted Jun-24-2025 03:58
  
Endpoint Secure Manager cannot access the Internet due to incorrect DNS, gateway or proxy configuration.
Verify and correct routing, DNS and gateway settings under System > System > Network.
If restricted by security policy configure a proxy under System > Network > Advanced.
Zonger Lv5Posted Jun-24-2025 04:00
  
Endpoint Secure Manager is directly accessible from the public Internet and can increase the attack surface.
It is suggested to avoid direct internet exposure. Use a secure method for remote access.
Zonger Lv5Posted Jun-24-2025 04:01
  
Old, unused or redundant admin accounts increase security risk. Kindly delete inactive/test/resigned user accounts via System > Administrators
Zonger Lv5Posted Jun-24-2025 04:02
  
Any IP can attempt admin login which allows potential external threats. Restrict admin access by IP range via System > Administrators > Edit.
Zonger Lv5Posted Jun-24-2025 04:02
  
Password only authentication is vulnerable. Enable TOTP based MFA under each admin account for secure login.
Zonger Lv5Posted Jun-24-2025 04:03
  
Use of weak encryption or lack of SSL certificate for Manager access. Enable TLS 1.2+ and import an SSL certificate via System > System > General.

Zonger Lv5Posted Jun-24-2025 04:04
  
Admins are not notified of system issues like high CPU, memory or license limits. Configure SMTP and enable alert notifications via System > System > General and Alert Options.
Sameena Jameel Lv1Posted Jun-24-2025 12:31
  
From Chapter: 1.2 Network Connectivity Check
Issue Description: The screenshot on page 6 does not match the description for configuring proxy policy. The description states to go to "System > Network > Advanced path"  to configure proxy policy, but the screenshot provided on page 6 shows "Network Interfaces Routing Advanced" with an empty content area, and no proxy settings are visible. The relevant screenshot showing proxy settings is on page 7, which is not directly next to the description.



From Chapter: 1.7 Disable SSH Access
Issue Description: The instructions state to go to "System > System > Network > Advanced and disable the SSH Service". The screenshot on page 15, which is meant to illustrate disabling SSH service and enabling port blocking, shows "Network Interfaces Routing Advanced" with an SSH Service section. However, the screenshot focuses on "Port Blocking" at the bottom, and the "SSH Service" section is partially obscured and does not clearly show how to disable it. The image on page 15 is difficult to read.

From Chapter: 1.8 Use SSL/TLS Protocol & SSL Cert
Issue Description: The instructions state to "Go to System > System > General to enable higher versions of TLS protocols, such as TLS1.2"  and to "import an SSL certificate". The screenshot on page 17, which should illustrate these settings, is blurry and the relevant sections ("SSL/TLS Protocol" and "SSL Certificate") are not clearly legible.


From Chapter: 1.9 Enable Alert Function
Issue Description: The instructions mention configuring SMTP information by going to "System > System > General path". The screenshot on page 17, intended to show SMTP configuration, is blurry, making it difficult to read the SMTP Server details. Additionally, enabling alert notification is stated to be configured via "System > System > Alert Options path", and the screenshot on page 18 that depicts the "Alert Options" is also blurry, hindering readability.