Reference Guide

Security Management Server Virtual v10.2.10 AdminHelp
ix
Protection of SystemRoot ............................................................................................................... 175
Encryption Rules for Encryption External Media ................................................................................ 175
What Happens When Policies Tie ....................................................................................................... 175
Encryption Rules for Generic Drive Statements ................................................................................. 175
Remove System Data Encryption (SDE) ...................................................................................................... 175
Authentication ............................................................................................................................................... 176
Authentication ........................................................................................................................................... 176
Advanced Authentication ........................................................................................................................... 177
Threat Prevention ......................................................................................................................................... 184
Threat Prevention ...................................................................................................................................... 184
Advanced Threat Prevention ..................................................................................................................... 188
Client Firewall Settings and Rules ............................................................................................................. 222
Client Firewall Options ....................................................................................................................... 222
Client Firewall Rules ........................................................................................................................... 225
Policies Set by Application Control ........................................................................................................... 228
Advanced Threat Events tab fields and filters .......................................................................................... 229
Manage Enterprise Advanced Threats - Protection ................................................................................... 229
Threats ................................................................................................................................................... 230
File Details ............................................................................................................................................. 231
Script Control Table ............................................................................................................................... 232
Manage Enterprise Advanced Threats - Agents ......................................................................................... 232
Manage Enterprise Advanced Threats - Certificate ................................................................................... 232
Manage Enterprise Advanced Threats - Cylance Score and Threat Model Updates .................................. 233
Threat Model Updates ............................................................................................................................ 233
Manage Enterprise Advanced Threats - Global List ................................................................................... 234
Global Quarantine .................................................................................................................................. 234
Safe ......................................................................................................................................................... 235
Unassigned .............................................................................................................................................. 236
Manage Enterprise Advanced Threats - Options ........................................................................................ 237
Threat Data Report .................................................................................................................................... 237
Export Data ............................................................................................................................................ 238
Advanced Threat Prevention Classifications ............................................................................................. 238
Enable Compatibility Mode for Memory Protection .................................................................................. 238
Disconnected Mode Policy Examples ......................................................................................................... 240