Configuring Predictive Machine Learning Settings

You can configure the Predictive Machine Learning Settings list for your Worry-Free Business Security Services customers and deploy the list to multiple customers or device groups.

Note:

Predictive Machine Learning requires a functional Internet connection to connect to the Smart Protection Network.

  1. Go to Customers.
  2. Select one or more customers from the Company list.
  3. Click Policy Settings and select Predictive Machine Learning Settings.

    The Predictive Machine Learning Settings screen appears.

  4. Select the customers or specific device groups that you want to configure.
    Note:

    To select specific types of device groups, use the Select Groups drop-down button to select or remove device groups from the policy setting. By default, Remote Manager selects all device groups for all customers.

  5. Click Configure Policy >.
  6. Select the Action to apply to the policy.
    • Select an action: The default setting which does not apply any changes the current policy settings

    • Enable Predictive Machine Learning: Enables Predictive Machine Learning on the selected device groups

      The Detection Settings section appears.

    • Disable Predictive Machine Learning: Disables Predictive Machine Learning on the selected device groups

  7. Under Detection Settings, select the type of detections and related action that Predictive Machine Learning takes.

    Detection Type

    Actions

    File

    • Quarantine: Select to automatically quarantine files that exhibit malware-related features based on the Predictive Machine Learning analysis

    • Log only: Select to scan unknown files and log the Predictive Machine Learning analysis for further in-house investigation of the threat

    Process

    • Terminate: Select to automatically terminate processes or scripts that exhibit malware-related behaviors based on the Predictive Machine Learning analysis

      Important:

      Predictive Machine Learning attempts to clean the files that executed the malicious processes. If the clean action is unsuccessful, the managed product quarantines the affected files.

    • Log only: Select to scan unknown processes or scripts and log the Predictive Machine Learning analysis for further in-house investigation of the threat

  8. Click Deploy Policy Settings.

    Remote Manager deploys the changes to the specified customers or device groups. You can monitor the status of the policy deployment from the Administration logs.

    For more information, see Viewing Administration Logs.