Administrator Guide
● Terminate - The process call is blocked if an application attempts to call a memory violation process. The application that
made the call is terminated.
The following exploit types are detected:
● Stack Pivot
● Stack Protect
● Scanner Memory Search
● Malicious Payload
For more information about Exploit policies, see AdminHelp, available in the Management Console.
Events tab
NOTE:
An event is not necessarily a threat. An event is generated when a recognized file or program is quarantined, safe listed, or
waived.
The Events tab displays any threat events that occur on the device and displays them by event type as assigned by Advanced
Threat Prevention. Data is removed when the system restarts.
Examples of event types include:
Threat Found
Threat Removed
Threat Quarantined
Threat Waived
Threat Changed
Provision a Tenant
A tenant must be provisioned in the Dell Server before Advanced Threat Prevention enforcement of policies becomes active.
Prerequisites
● Must be performed by an administrator with the system administrator role.
● Must have connectivity to the Internet to provision on the Dell Server.
● Must have connectivity to the Internet on the client to display the Advanced Threat Prevention online service integration in
the Management Console.
● Provisioning is based off of a token that is generated from a certificate during provisioning.
● Advanced Threat Prevention licenses must be present in the Dell Server.
46
Tasks