Views:

Worry-Free Business Security Agent (Windows) Policy Settings

Smart Scan

Smart Scan checks the reputation of each file against an extensive in-the-cloud database.

Data collectedFile name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Scan Method (Smart Scan is selected)
Console settings

Scan Method

Scan Method

Back to top

Real-Time Scan

Virus/Malware scanning checks files for known security risks.

Data collected
  • File name
  • File path
Console location
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Real-Time Scan
    Real-Time Scan
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Real-Time Scan > Configure Settings > Real-Time Scan Settings > Target > Files with specified extensions
    Files with specified extensions
Console settings

Back to top

Scheduled Scan

Virus/Malware scanning checks files for known security risks.

Data collected
  • File name
  • File path
Console location
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Scheduled Scan
    Scheduled Scan
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Scheduled Scan > Configure Settings > Scheduled Scan Settings > Target > Files with specified extensions
    Files with specified extensions
Console settings

Back to top

Manual Scan

Virus/Malware scanning checks files for known security risks based on an on-demand scan started from the Security Agents screen or the Security Agent console.

Data collected
  • File name
  • File path
Console location
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Manual Scan
    Manual Scan
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Manual Scan > Configure Settings > Manual Scan Settings > Target > Files with specified extensions
    Files with specified extensions
Console settings

Back to top

Scan Exclusion Lists: Real-Time Scan/Scheduled Scan/Manual Scan

The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during Real-Time Scan/Scheduled Scan/Manual Scan.

Data collected
  • File name
  • Directory path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Exclusions > Real-Time Scan / Scheduled Scan / Manual Scan
Console settings

Real-Time Scan/Scheduled Scan/Manual Scan

Scan Exclusion Lists

Back to top

Behavior Monitoring

Behavior Monitoring provides a necessary layer of additional threat protection from programs that exhibit malicious behavior.

Data collected
  • URL
  • File name
  • File path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Behavior Monitoring
Console settings

Behavior Monitoring

Behavior Monitoring

Back to top

Behavior Monitoring: Approved/Blocked Program Lists

The Behavior Monitoring scan exclusion list contains programs that the Security Agent does not monitor using Behavior Monitoring. Behavior Monitoring automatically allows all approved programs to run and stops all blocked programs.

Data collected
  • File name
  • Full program path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Exclusions > Behavior Monitoring
Console settings

Behavior Monitoring

Behavior Monitoring

Back to top

Predictive Machine Learning

Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks.

Data collected
  • URL
  • File name
  • File path
  • Digital signature signer
Console location

Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Predictive Machine Learning

Console settings

Predictive Machine Learning

Predictive Machine Learning

Back to top

Vulnerability Protection

Vulnerability Protection uses a host-based intrusion prevention system (HIPS) to apply virtual patches to known vulnerabilities.

Data collected
  • IP address
  • MAC address
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Vulnerability Protection
Console settings

Vulnerability Protection

Vulnerability Protection

Back to top

Web Reputation

Web reputation technology tracks the credibility of web domains accessed by endpoints.

Data collected
  • URL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Web Reputation
Console settings

Web Reputation

Web Reputation

Back to top

Web Reputation: Browser Exploit Prevention

Browser Exploit Prevention identifies web browser exploits and malicious scripts, and prevents the use of these threats from compromising the web browser.

Data collected
  • Suspicious or malicious URLs
  • HTTP header/HTML files from suspicious or malicious URLs
  • Browser information
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Web Reputation > Browser Exploit Prevention
Console settings

Browser Exploit Prevention

Browser Exploit Prevention

Back to top

Firewall

The Firewall blocks or allows certain types of network traffic by creating a barrier between the endpoint and the network.

Data collected
  • IP address
  • User name
  • Email address
  • Phone number
Console location
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Firewall
    Firewall
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Firewall > Advanced mode > Exception List > Add > Firewall Exception
    Firewall Exception
Console settings

Back to top

Endpoint Sensor

Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and historical analysis, you can perform Threat Investigations to discover hidden threats throughout your network and locate all affected endpoints.

 
This feature requires special licensing
 
Data collected
  • Command line
  • File name
  • File owner
  • File signer
  • Host name
  • IP address
  • Process owner
  • Registry data
  • User name
  • URL
  • Windows event log
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Endpoint Sensor
Console settings

Endpoint Sensor

Endpoint Sensor

Back to top

Sample Submission

Sample Submission enables the Security Agent to detect and send suspicious files that may contain previously unknown threats directly to the Virtual Analyzer for further analysis.

 
This feature requires special licensing.
 
Data collectedSuspicious executable file
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Sample Submission
Console settings

Sample Submission

Sample Submission

Back to top

Device Control: Users Exception List

The Users Exception List rules allows specified users access to restricted devices. The Allow Rules override the endpoint settings.

Data collected
  • User name
  • Active Directory user account
  • Host name
  • Email address
  • Phone number
  • IP address
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Device Control > Exceptions > Users > Add Allow Rule > Rule name & Users
Console settings

Rule name & Users

Rule name & Users

Back to top

Device Control: Allowed Program List

The Allowed Program List contains program or publisher names that the Security Agent does not block using Device Control. Programs in the specified path or by the specified publisher can execute or perform read/write operations on files in restricted storage devices.

Data collected
  • Program path
  • File name
  • Digital signature provider
  • Company information
  • Email address
  • Phone number
  • User name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Device Control > Exceptions > Programs
Console settings

Programs

Programs

Back to top

Data Loss Prevention

Data Loss Prevention monitors endpoints and network traffic and can prevent the transmission of sensitive information.

Data collected
  • Domain
  • Process name
  • Process
  • Source
  • Destination
  • Email sender
  • Email subject
  • Email recipients
  • URL
  • FTP user
  • Rule name
  • Forensic data
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Data Loss Prevention > Rules
Console settings

Rules

Rules

Back to top

Data Loss Prevention: Exceptions

The Data Loss Prevention Exception List contains network locations that the Security Agent does not monitor for sensitive information. Data Loss Prevention automatically takes the specified action according to the list type.

Data collected
  • IP address
  • Host name
  • FQDN
  • User name
  • Email address
  • Phone number
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Data Loss Prevention > Exceptions > Non-monitored Targets & Non-monitored Removable Storage Devices
Console settings

Non-monitored Targets & Non-monitored Removable Storage Devices

DLP Exceptions

Back to top

URL Filtering

URL Filtering allows administrators to block specific types of websites during different times of the day.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > URL Filtering
Console settings

URL Filtering

URL Filtering

Back to top

Approved/Blocked URL Lists: Web Reputation/URL Filtering

The Approved/Blocked URL Lists contain URLs that the Security Agent does not monitor using Web Reputation/URL Filtering.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Approved/Blocked URL Lists
Console settings

Approved/Blocked URL Lists

Approved-Blocked URL Lists

Back to top

Application Control

Application Control prevents unwanted and unknown applications from executing on your endpoints.

Data collected
  • File name
  • File path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Application Control
Console settings

Application Control

Application Control

Application Control

Back to top

Worry-Free Business Security Agent (Mac) Policy Settings

Real-Time Scan

Virus/Malware scanning checks files for known security risks based on the file operation performed.

Data collected
  • File path
  • File name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Real-Time Scan
Console settings

Real-Time Scan

Real-Time Scan

Back to top

Scheduled Scan

The specified path or full path list contains directories or full file paths that Mac Security Agent scans during a Scheduled Scan.

Data collected
  • File path
  • File name
Console location
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Scheduled Scan
    Scheduled Scan
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Scheduled Scan > Configure Settings > Scheduled Scan Settings > Target > Files with specified extensions
    Files with specified extensions
Console settings

Back to top

Manual Scan

Virus/Malware scanning checks files for known security risks based on an on-demand scan started from the Security Agents screen or the Security Agent console.

Data collected
  • File path
  • File name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Manual Scan
Console settings

Manual Scan

Manual Scan

Back to top

Predictive Machine Learning

Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks.

Data collected
  • URL
  • File name
  • File path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Predictive Machine Learning
Console settings

Predictive Machine Learning

Predictive Machine Learning

Back to top

Web Reputation

Web reputation technology tracks the credibility of web domains accessed by endpoints.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Web Reputation
Console settings

Web Reputation

Web Reputation

Back to top

Endpoint Sensor

Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and correlation with threat intel, you can perform effective investigations to discover hidden threats throughout your network, locate all affected endpoints, and remediate swiftly.

 
This feature requires special licensing.
 
Data Collected
  • Endpoint GUID
  • OS SKU, detail version & patch history
  • Installed Application records
  • Endpoint name
  • IP address
  • User name
  • Process command line
  • Process owner
  • File name & full path
  • File owner
  • File signer
  • URL
Console LocationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Endpoint Sensor
Console SettingsEndpoint Sensor

Endpoint Sensor Mac

Back to top

URL Filtering

URL Filtering allows administrators to block specific types of websites during different times of the day.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > URL Filtering
Console settings

URL Filtering

URL Filtering

Back to top

Approved URL List

The Approved URL List contains URLs that the Security Agent does not monitor using Web Reputation / URL Filtering.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Approved URLs
Console settings

Approved URLs

Approved URLs

Back to top

Scan Exclusion Lists

The Scan Exclusion Lists contain directories and file extensions that the Mac Security Agent does not scan.

Data collected
  • File path
  • File name
  • User name
  • Phone number
  • File extension
Console location
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Exclusions > Files
    Files
  • Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Exclusions > File Extensions
    File Extensions
Console settings

Back to top

Worry-Free Business Security Agent (Android) Policy Settings

Real-Time Malware Scan

Virus/Malware scanning checks files for known security risks based on the file operation performed.

Data collected
  • File path
  • File name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Scan Settings
Console settings

Scan Settings

Scan Settings

Back to top

Web Reputation

Web reputation technology tracks the credibility of web domains accessed by endpoints.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Web Reputation
Console settings

Web Reputation

Web Reputation

Back to top

Approved/Blocked URL Lists

The Approved/Blocked URL Lists contain URLs that the Android Security Agent does not monitor using Web Reputation.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Approved/Blocked URLs
Console settings

Approved/Blocked URLs

Approved-Blocked URLs

Back to top