The following table shows the screens and elements with replicated configuration settings.
|
Screen |
Element |
|
|---|---|---|
|
|
Affected Hosts |
Only Saved Searches |
|
Affected Hosts - Host Details |
||
|
All Detections |
||
|
|
Schedules |
All settings |
|
Customization |
||
|
|
Scheduled |
All settings |
|
Source |
All settings |
|
|
|
|
All settings |
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
Hosts / Ports |
All settings |
|
Threat Detections |
||
|
Web Reputation |
||
|
Application Filters |
||
|
Deny List / Allow List |
||
|
Detection Rules |
||
|
Exceptions |
||
|
Packet Capture |
||
|
|
Setup |
Only the internal Virtual Analyzer proxy settings and the sandbox for macOS setting. |
|
File Submissions |
All settings |
|
|
|
||
|
|
Network Groups |
All settings |
|
Registered Domains |
||
|
Registered Services |
||
|
|
Threat Intelligence Sharing |
All settings |
|
Microsoft Active Directory |
||
|
Syslog |
||
|
|
Network |
Only Secure Protocol setting |
|
Proxy |
All settings |
|
|
SNMP |
||
|
Time |
||
|
Session Timeout |
||
|
|
All settings |
|
|
|
Only File Size Settings |
|
