Worry-Free Business Security Agent (Windows) Policy Settings
Smart Scan
Smart Scan checks the reputation of each file against an extensive in-the-cloud database.
Data collected | File name |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Scan Method (Smart Scan is selected) |
Console settings |
Scan Method |
Real-Time Scan
Virus/Malware scanning checks files for known security risks.
Scheduled Scan
Virus/Malware scanning checks files for known security risks.
Manual Scan
Virus/Malware scanning checks files for known security risks based on an on-demand scan started from the Security Agents screen or the Security Agent console.
Scan Exclusion Lists: Real-Time Scan/Scheduled Scan/Manual Scan
The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during Real-Time Scan/Scheduled Scan/Manual Scan.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Exclusions > Real-Time Scan / Scheduled Scan / Manual Scan |
Console settings |
Real-Time Scan/Scheduled Scan/Manual Scan |
Behavior Monitoring
Behavior Monitoring provides a necessary layer of additional threat protection from programs that exhibit malicious behavior.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Behavior Monitoring |
Console settings |
Behavior Monitoring |
Behavior Monitoring: Approved/Blocked Program Lists
The Behavior Monitoring scan exclusion list contains programs that the Security Agent does not monitor using Behavior Monitoring. Behavior Monitoring automatically allows all approved programs to run and stops all blocked programs.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Exclusions > Behavior Monitoring |
Console settings |
Behavior Monitoring |
Predictive Machine Learning
Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks.
Data collected |
|
---|---|
Console location |
Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Predictive Machine Learning |
Console settings |
Predictive Machine Learning |
Vulnerability Protection
Vulnerability Protection uses a host-based intrusion prevention system (HIPS) to apply virtual patches to known vulnerabilities.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Vulnerability Protection |
Console settings |
Vulnerability Protection |
Web Reputation
Web reputation technology tracks the credibility of web domains accessed by endpoints.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Web Reputation |
Console settings |
Web Reputation |
Web Reputation: Browser Exploit Prevention
Browser Exploit Prevention identifies web browser exploits and malicious scripts, and prevents the use of these threats from compromising the web browser.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Web Reputation > Browser Exploit Prevention |
Console settings |
Browser Exploit Prevention |
Firewall
The Firewall blocks or allows certain types of network traffic by creating a barrier between the endpoint and the network.
Data collected |
|
---|---|
Console location | |
Console settings |
Endpoint Sensor
Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and historical analysis, you can perform Threat Investigations to discover hidden threats throughout your network and locate all affected endpoints.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Endpoint Sensor |
Console settings |
Endpoint Sensor |
Sample Submission
Sample Submission enables the Security Agent to detect and send suspicious files that may contain previously unknown threats directly to the Virtual Analyzer for further analysis.
Data collected | Suspicious executable file |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Sample Submission |
Console settings |
Sample Submission |
Device Control: Users Exception List
The Users Exception List rules allows specified users access to restricted devices. The Allow Rules override the endpoint settings.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Device Control > Exceptions > Users > Add Allow Rule > Rule name & Users |
Console settings |
Rule name & Users |
Device Control: Allowed Program List
The Allowed Program List contains program or publisher names that the Security Agent does not block using Device Control. Programs in the specified path or by the specified publisher can execute or perform read/write operations on files in restricted storage devices.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Device Control > Exceptions > Programs |
Console settings |
Programs |
Data Loss Prevention
Data Loss Prevention monitors endpoints and network traffic and can prevent the transmission of sensitive information.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Data Loss Prevention > Rules |
Console settings |
Rules |
Data Loss Prevention: Exceptions
The Data Loss Prevention Exception List contains network locations that the Security Agent does not monitor for sensitive information. Data Loss Prevention automatically takes the specified action according to the list type.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Data Loss Prevention > Exceptions > Non-monitored Targets & Non-monitored Removable Storage Devices |
Console settings |
Non-monitored Targets & Non-monitored Removable Storage Devices |
URL Filtering
URL Filtering allows administrators to block specific types of websites during different times of the day.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > URL Filtering |
Console settings |
URL Filtering |
Approved/Blocked URL Lists: Web Reputation/URL Filtering
The Approved/Blocked URL Lists contain URLs that the Security Agent does not monitor using Web Reputation/URL Filtering.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Approved/Blocked URL Lists |
Console settings |
Approved/Blocked URL Lists |
Application Control
Application Control prevents unwanted and unknown applications from executing on your endpoints.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Application Control |
Console settings |
Application Control |
Worry-Free Business Security Agent (Mac) Policy Settings
Real-Time Scan
Virus/Malware scanning checks files for known security risks based on the file operation performed.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Real-Time Scan |
Console settings |
Real-Time Scan |
Scheduled Scan
The specified path or full path list contains directories or full file paths that Mac Security Agent scans during a Scheduled Scan.
Manual Scan
Virus/Malware scanning checks files for known security risks based on an on-demand scan started from the Security Agents screen or the Security Agent console.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Manual Scan |
Console settings |
Manual Scan |
Predictive Machine Learning
Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Predictive Machine Learning |
Console settings |
Predictive Machine Learning |
Web Reputation
Web reputation technology tracks the credibility of web domains accessed by endpoints.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Web Reputation |
Console settings |
Web Reputation |
Endpoint Sensor
Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and correlation with threat intel, you can perform effective investigations to discover hidden threats throughout your network, locate all affected endpoints, and remediate swiftly.
Data Collected |
|
---|---|
Console Location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Endpoint Sensor |
Console Settings | Endpoint Sensor |
URL Filtering
URL Filtering allows administrators to block specific types of websites during different times of the day.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > URL Filtering |
Console settings |
URL Filtering |
Approved URL List
The Approved URL List contains URLs that the Security Agent does not monitor using Web Reputation / URL Filtering.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Approved URLs |
Console settings |
Approved URLs |
Scan Exclusion Lists
The Scan Exclusion Lists contain directories and file extensions that the Mac Security Agent does not scan.
Data collected |
|
---|---|
Console location | |
Console settings |
Worry-Free Business Security Agent (Android) Policy Settings
Real-Time Malware Scan
Virus/Malware scanning checks files for known security risks based on the file operation performed.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Scan Settings |
Console settings |
Scan Settings |
Web Reputation
Web reputation technology tracks the credibility of web domains accessed by endpoints.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Web Reputation |
Console settings |
Web Reputation |
Approved/Blocked URL Lists
The Approved/Blocked URL Lists contain URLs that the Android Security Agent does not monitor using Web Reputation.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Approved/Blocked URLs |
Console settings |
Approved/Blocked URLs |