Reference Guide

Manage Policies
200
File Actions
Unsafe Executable Auto Quarantine with
Executable Control Enabled
Selected
Selected
Not Selected
If selected, Unsafe executable files are automatically
quarantined or blocked to prevent their execution.
Note: If you Auto Quarantine, it is highly recommended
that before deployment, you test Auto Quarantine only on
devices using a test policy to observe the behavior and
ensure that no business-critical applications are blocked at
execution.
Abnormal Executable Auto Quarantine with
Executable Control Enabled
Selected
Selected
Not Selected
If selected, Abnormal executable files are automatically
quarantined or blocked to prevent their execution.
Note: If you Auto Quarantine, it is highly recommended
that before deployment, you test Auto Quarantine only on
devices using a test policy to observe the behavior and
ensure that no business-critical applications are blocked at
execution.
Memory Actions
Memory Protection Enabled Not Selected
Selected
Not Selected
This policy must be selected to use all other Memory
policies. If this policy is Not Selected, no Memory Action
policies are enforced, regardless of other policy values.
NOTE: Before enabling Memory Protection, enable
Compatibility Mode, to ensure applications function
properly on the client computer. For instructions on how
to enable Compatibility Mode, see
Enable_Compatibility_Mode_for_Memory_Protection.htm.
Compatibility Mode does not apply to Mac clients.
See advanced settings
Policy Default Setting Description
Threat Protection
This technology protects computers by identifying and taking action against threats of malware and
malicious activity involving files, folders, the registry, and processes.
Threat Protection Off
On
Off
Toggle to ON to enable Threat Protection. If toggled to
OFF, no Threat Protection policies are applied.
Threat Protection includes Malware Protection, Web
Protection, and Client Firewall.
Exploit Protection Selected
Selected
Not Selected
This policy is the "master policy" for all other Exploit
Protection policies. If this policy is Not Selected, no Exploit
Protection policies are enforced, regardless of other policy
values.
A Selected value means that Exploit Protection is enabled.
Exploit Protection monitors for application vulnerabilities
and keeps buffer overflow exploits from executing
arbitrary code on the computer.
This policy must be set to Selected to enable Exploit
Protection. If this policy is Not Selected, no Exploit
Prevention policies are applied.
Action on Malicious Activity for Files and
Folders
Block and Report
Block Only
Report Only