Views:

Procedure

  1. Configure settings as required.
    Section
    Settings
    Coexist Mode Conversion
    Permanently convert Security Agents using coexist mode into fully-functional Security Agents: Activates all functions on Security Agents installed in Co-exist mode
    Important
    Important
    You cannot undo this action. After converting coexist mode Security Agents into fully-functional Security Agents, the agent program attempts to uninstall any incompatible third-party security software on the endpoint. After the conversion completes, Apex One enables all necessary services and functions related to normal Security Agent functionality.
    If you need to use a coexist mode Security Agent on a converted endpoint, you must unistall the Security Agent program and reinstall a coexist mode Security Agent.
    Update Settings
    • Security Agents download updates from the Trend Micro ActiveUpdate Server: Configures Security Agents that cannot connect to the specified update source to attempt to update from the Trend Micro ActiveUpdate server
    • Enable schedule-based updates on Security Agents: Configures all Security Agents to enable schedule-based updates by default
    • Security Agents only update the following components: Controls how component updates proceed on the Security Agents
      • All components (including hotfixes and the agent program): Security Agents update all components
      • Pattern files, engines, drivers: Security Agents do not upgrade the Security Agent program or deploy hotfixes
      • Pattern files: Security Agents do not upgrade the Security Agent program, deploy hotfixes, or update engines and drivers
    Web Reputation Settings
    Display a notification when a website is blocked: Displays a notification message on the Security Agent after blocking a URL that violates a Web Reputation policy
    Behavior Monitoring Settings
    Display a notification when a program is blocked: Displays a notification message on the Security Agent after blocking a program that violates a Behavior Monitoring policy
    C&C Contact Alert Settings
    Display a notification when a C&C callback is detected: Displays a notification message on the Security Agent after detecting a C&C callback
    Central Quarantine Restore Settings
    Display a notification when a quarantined file is Restored: Displays a notification message on the Security Agent after restoring a quarantined file
    Predictive Machine Learning Settings
    Display a notification when a threat is detected: Displays a notification message on the Security Agent after Predictive Machine Learning detects an unknown threat
    Security Agent Self-protection
    • Protect Security Agent services: Prevents users or applications from terminating Security Agent services
    • Protect files in the Security Agent installation folder: Prevents users or applications from modifying or deleting files in the Security Agent installation folder
    • Protect Security Agent registry keys: Prevents users or applications from modifying, deleting, or adding registry values used by the Security Agent program
    • Protect Security Agent processes: Prevents users or applications from terminating Security Agent processes
    For more information, see Security Agent Self-protection.
    Scheduled Scan Settings
    Display a notification before a scheduled scan occurs: Displays a notification message on the Security Agent before a configured Scheduled Scan starts
    Cache Settings for Scans
    • Enable the digital signature cache: Configures the Security Agent to use the Behavior Monitoring Digital Signature Pattern to exclude files from Manual Scans, Scheduled Scans, and Scan Now
    • Enable the on-demand scan cache: Configures the Security Agent to maintain a local on-demand scan cache to exclude file during Manual Scan, Scheduled Scan, and Scan Now to improve scan performance
    For more information, see Cache Settings for Scans.
    POP3 Email Scan Settings
    Scan POP3 email: Enables POP3 mail scanning on the Security Agent
    For more information, see POP3 Mail Scan.
    Security Agent Access Restriction
    Do not allow users to access the Security Agent console from the system tray or Windows Start menu: Disables user access to the Security Agent console using the system tray or Windows Start menu
    Note
    Note
    This setting does not disable the Security Agent. The Security Agent runs in the background and continues to provide protection from security risks.
    Restart Notification
    Display a notification if the endpoint needs to restart to finish cleaning infected files: Displays a notification message on the Security Agent if the user needs to restart the endpoint to finish cleaning a malicious file