Reference Guide
Table of Contents
x
Global Allow policy example .................................................................................................................. 240
Quarantine List and Safe List policy examples ...................................................................................... 242
Threat Protection Policy Overview ............................................................................................................ 243
Configurable Actions - After Threat is Detected ............................................................................ 244
Reputation Service Sensitivity policies ........................................................................................... 244
Client Firewall Policies ....................................................................................................................... 245
Client Firewall options .................................................................................................................... 245
Client Firewall rules ........................................................................................................................ 245
Web Protection Policies ...................................................................................................................... 245
Designate a Threat Protection Signature Update Server .......................................................................... 246
Removable Media Encryption ........................................................................................................................ 247
Removable Media Encryption ..................................................................................................................... 247
Removable Media Policies that Require Logoff ..................................................................................... 250
Advanced Removable Media Encryption .................................................................................................... 251
Removable Media Policies that Require Logoff ..................................................................................... 259
Mac Encryption .............................................................................................................................................. 259
Mac Encryption........................................................................................................................................... 259
Advanced Mac Encryption .......................................................................................................................... 262
Port Control ................................................................................................................................................... 263
Port Control ............................................................................................................................................... 263
Advanced Port Control ............................................................................................................................... 265
Global Settings .............................................................................................................................................. 266
Advanced Global Settings .............................................................................................................................. 268