- Go to Agents > Firewall > Profiles.
- Click Add.
- Click Enable this profile to allow Apex One to deploy the profile to Security Agents.
- Type a name to identify the profile and an optional description.
- Select a policy for this profile.
- Specify the agent endpoints to which Apex One applies the policy.
                                                  Select endpoints based on the following
                                                  criteria:
- IP address 
- Domain: Click the button to open and select domains from the agent tree. Note:- Only users with full domain permissions can select domains. 
- Endpoint name: Click the button to open, and select Security Agent endpoints from, the agent tree. 
- Platform 
- Logon name 
- NIC description: Type a full or partial description, without wildcards. Tip:- Trend Micro recommends typing the NIC card manufacturer because NIC descriptions typically start with the manufacturer’s name. For example, if you typed "Intel", all Intel-manufactured NICs will satisfy the criteria. If you typed a particular NIC model, such as "Intel(R) Pro/100", only NIC descriptions that start with "Intel(R) Pro/100" will satisfy the criteria. 
- 
                                                  Agent location: Select from the following: - 
                                                  Internal - Security Agents can connect to a configured reference server Note:Click Edit reference server list to configure location settings. For more information, see Reference Servers. 
- 
                                                  External - Security Agents cannot connect to a configured reference server 
 
- 
                                                  
 
- 
                                                  Select whether to grant users the privilege
                                                  to change the firewall security level or edit a
                                                  configurable list of exceptions to allow specified
                                                  types of traffic.
                                                   
                                                  For details, see Firewall Policies. 
- Click Save.
Views: 
				
			
		 
		