Reference Guide

Security Management Server Virtual v10.2.7 AdminHelp
201
mitigation policy is in effect for that violation type.
Low
1) A file that was identified as a threat has been added to
the Global Safe List or deleted from the file system.
2) A threat has been detected and automatically
quarantined.
3) A file has been identified as a threat, but waived on the
computer.
4) The status of a current threat has changed (for example,
Threat > Quarantined, Quarantined > Waived, or Waived >
Quarantined).
Log Files Location <SYSTEM_DRIVE>:\ProgramData\DDP\Suite\Logs
String - File path
Specifies the location for the log files.
The default location is
<SYSTEM_DRIVE>:\ProgramData\DDP\Suite\Logs.
Enable Activity Logging
Selected
Selected
Not Selected
This policy is the "master policy" for all other Threat
Protection logging policies. If this policy is Not Selected, no
Threat Protection logging takes place, regardless of other
policy values.
A Selected value enables Threat Protection logging.
Debug Logging for Web Protection Not Selected
Selected
Not Selected
A Selected value enables verbose logging of Web
Protection activity.
Debug Logging for Client Firewall
Not Selected
Selected
Not Selected
A Selected value enables verbose logging of Firewall
activity.
Advanced Threat Prevention
Threat Prevention policies are available at the Enterprise, Endpoint Group, and Endpoint levels.
Policy descriptions also display in tooltips in the Management Console. In this table, master policies are
in bold font.
Policy Default Setting Description
Advanced Threat Prevention
This technology is powered by Cylance and protects your operating system by detecting and preventing
malware pre-execution. Advanced Threat Prevention uses artificial intelligence and predictive
mathematical models to quickly and accurately identify what is safe and what is a threat.
Advanced Threat
Prevention
Off
On
Off
Toggle ON to enable Advanced Threat Prevention. If this policy is toggled to
OFF, Advanced Threat Prevention is disabled, and policies are set to defaults
for activated devices. This results in Execution Control blocking threats, but
Auto Quarantine, Memory Protection, and Script Control will be disabled.
File Actions