Reference Guide
Table of Contents
x
Authentication ............................................................................................................................................... 192
Authentication ........................................................................................................................................... 192
Advanced Authentication ........................................................................................................................... 193
Threat Prevention ......................................................................................................................................... 199
Threat Prevention ...................................................................................................................................... 199
Advanced Threat Prevention ..................................................................................................................... 203
Client Firewall Settings and Rules ............................................................................................................. 233
Client Firewall Options ....................................................................................................................... 233
Client Firewall Rules ........................................................................................................................... 235
Policies Set by Application Control ........................................................................................................... 238
Advanced Threat Events tab fields and filters .......................................................................................... 239
Manage Enterprise Advanced Threats - Protection ................................................................................... 239
Threats ................................................................................................................................................... 239
File Details ............................................................................................................................................. 241
Script Control Table ............................................................................................................................... 241
Manage Enterprise Advanced Threats - Agents ......................................................................................... 242
Manage Enterprise Advanced Threats - Certificate ................................................................................... 242
Manage Enterprise Advanced Threats - Cylance Score and Threat Model Updates .................................. 243
Threat Model Updates ............................................................................................................................ 243
Manage Enterprise Advanced Threats - Global List ................................................................................... 244
Global Quarantine .................................................................................................................................. 244
Safe......................................................................................................................................................... 245
Unassigned .............................................................................................................................................. 246
Manage Enterprise Advanced Threats - Options ........................................................................................ 247
Threat Data Report .................................................................................................................................... 247
Export Data ............................................................................................................................................ 248
Advanced Threat Prevention Classifications ............................................................................................. 248
Enable Compatibility Mode for Memory Protection................................................................................... 248
Disconnected Mode Policy Examples ......................................................................................................... 249
Global Allow policy example .................................................................................................................. 249
Quarantine List and Safe List policy examples ...................................................................................... 252
Threat Protection Policy Overview ............................................................................................................ 253
Configurable Actions - After Threat is Detected ............................................................................ 254
Reputation Service Sensitivity policies ........................................................................................... 254