Reference Guide
Manage Policies
188
Action on Malicious Activity for
Files and Folders
Block and Report
Block Only
Report Only
Block and Repor
t
Prevents users from modifying or deleting Thr
eat
Protection system files and folders and sets the action to
take upon attempt.
Block Only: Blocks activity but does not report to the
Server.
Report Only: Reports activity to the Server but does not
block activity.
Block and Report (default): Blocks and
reports activity to
the Server.
Action on Malicious Activity for
Registry
Block and Report
Block Only
Report Only
Block and Repor
t
Prevents users from modifying or deleting Threat
Protection registry keys and values and sets the action to
take upon attem
pt.
Block Only: Blocks activity but does not report to the
Server.
Report Only: Reports activity to the Server but does not
block activity.
Block and Report (default): Blocks and reports activity to
the Server.
Exploit Protection
Selected
Selected
Not Sel
ected
This policy is the "master policy" for all other Exploit
Protection policies. If this policy is Not Selected, no
Exploit Protection policies are enforced, regardless of
other policy values.
A Selected value means that Exploit Protection is
enabled.
Exploit Protection monitors for application vulnerabilities
and keeps buffer overflow exploits from executing
arbitrary code on the computer.
This policy must be set to Selected to enable Exploit
Protection. If this policy is Not Selected, no Exploit
Preven
tion policies will be applied.
On-Access Protection
Selected
Selected
Not Selected
This policy is the "master policy" for all other On
-Access
Protection policies. If this policy is Not Selected, no On
-
Access Protection policies are enforced, regardless of
other policy values.
A Selected value means that On
-Access Protection is
enabled.
This policy must be set to Selected to enable On
-Access
Protection. If this policy is Not Selected, no On
-Access
Protection policies will be applied.
See advanced settings
Policy Default Setting
Description
Web Protection
This technology protects computers by leveraging a web-based content ranking system to determine if a site
that a user is browsing is considered safe or not. This technology also grants the administrator the ability to
define what happens when an unsafe site is navigated to (allow, block, warn).
Web Protection
Off
On