Reference Guide
Manage Policies
202
A Selected value scans all files (including .zip files) before
downloading. This option prevents users from accessing a
downloaded file until Threat Protection marks the file as
clean.
Downloaded files are sent to Threat Protection for
scanning. Threat Protection performs a Reputation Service
lookup on the file. If a downloaded file is detected as a
threat, Threat Protection takes action on the file and alerts
the user.
Enable Secure Search Not Selected
Selected
Not Selected
A Selected value enables Secure Search, automatically
blocking malicious sites in search results based on safety
rating.
Block Links to Risky Sites in Search Results Not Selected
Selected
Not Selected
A Selected value prevents users from clicking links to risky
sites in search results.
See advanced settings
Policy Default Setting Description
Client Firewall
This technology protects computers by allowing administrators to determine which network traffic is
permitted to pass between end user computers and the network.
Client Firewall Off
On
Off
Toggle to ON to enable Client Firewall. If toggled to OFF, no
Client Firewall Settings or Rules are applied.
Client firewall is a stateful firewall.
See advanced settings
Policy Default Setting Description
Protection Settings
This technology allows control over Threat Prevention settings such as display of threat event
notifications on the client computer and Web Protection and Client Firewall logging.
Suppress Popup Notifications Not Selected
Selected
Not Selected
If Selected, popup notifications of Advanced Threat
Prevention events are disabled on the computer.
Minimum Popup Notification Level High
High
Medium
Low
Severity level of events that result in popup notifications
that display on the computer.
High allows only notifications of critical events to display.
Low displays all on-screen notifications for all events.
Listed below are examples of events:
High
1) Protection status has changed. (Protected means that
the Advanced Threat Prevention service is running and
protecting the computer and needs no user or
administrator interaction.)
2) A threat is detected and policy is not set to
automatically address the threat.