End-user guide for Keeper Forcefield - Windows Endpoint Protection for Sensitive Data
Keeper Forcefield is an advanced endpoint security product for Windows that protects sensitive applications and processes from unauthorized access. It is specifically designed to defend against threats such as memory scraping and credential harvesting from malicious software installed via phishing or other attacks.
Forcefield integrates directly with the Keeper Desktop application and operates silently in the background to ensure data protection without impacting performance or usability.
To get started, install the Keeper Desktop App.
After installation:
Navigate to Settings > Security in Keeper Desktop
Toggle Keeper Forcefield ON
Once enabled, Forcefield will immediately begin protecting your machine.
The system tray provides a Forcefield status and the ability to check for a new version.
Kernel-Level Protection: Installs a lightweight driver that monitors and restricts memory access to protected applications.
Selective Memory Restriction: Blocks unauthorized processes from reading memory of protected applications.
Smart Process Validation: Only untrusted processes are blocked. Trusted system processes function normally.
Seamless Integration: Works silently in the background without disrupting user experience.
The following applications are protected by process name and validated via code signature:
Keeper Applications:
Keeper Desktop
Keeper Secrets Manager
Keeper Commander
Keeper Gateway
Keeper Bridge
KeeperChat
Keeper Importer
Web Browsers:
Chrome
Microsoft Edge
Firefox
Brave
Opera
Vivaldi
If you would like Keeper Forcefield to protect additional applications, please email us at forcefield@keepersecurity.com and we'll consider your request.
Enhanced Security: Prevents memory scraping and credential theft.
Lightweight: Minimal impact on system performance.
User Controlled: Toggle on/off from Keeper Desktop.
Broad Compatibility: Supports Windows 10 and above.
For more in-depth information regarding Keeper ForceField including IT Admin rollout guidance, see the Enterprise Guide: