The instructions indicated in this article apply to the traditional management platform. If your query refers to a product based on Aether Platform, please access the article on the required URLs and ports for products based on Aether , or else, check the Knowledge Base , where you will find answers to frequently asked questions. If you still haven't switched to Aether , please contact your sales representative or reseller and request the platform migration.
The Endpoint Protection settings are based on the creation of profiles and groups of computers to which specific policies are assigned. To configure the antivirus settings in a profile, proceed as follows:.
Additionally, upon clicking Advanced settings , you will be able to select different items to exclude from the file protection, namely:.
You can also enable the option to Scan files with any extension when created or modified. The email protection scans emails at protocol level. It scans inbound emails POP3 protocol. The Mail section provides the following options:. Additionally, upon clicking the Advanced settings link you will be able to select different extensions to exclude from the scans.
Whenever you get an intrusion attempt pop-up, please ensure that you only authorize the connection to programs you trust. If you are unsure about the program, it is best not to allow the connection.
Nonetheless, these permissions can always be modified through the firewall settings afterwards. Factory rules are control rules recommended by our experts and affect the communication of certain applications. Through factory rules you can establish connection rules that will affect the entire system. These rules have a lower priority than user rules.
To save the changes made to the settings in all tabs , click OK. The changes will be applied in the next protection update. Updates are carried out every four hours by default. However, the update frequency can be configured in the Updates section of the Windows and Linux tab. Updates can also be performed on-demand by right-clicking the Panda icon in the Windows system tray and selecting Update.
Technical Support Need help? How is the firewall configured from the Endpoint Protection administration console? From the administration console: The administrator defines the settings to be applied on managed computers in the Web administration console.
From the Panda icon: The end-user configures the firewall. New rules can be created or existing ones can be modified in the local firewall configuration console.
The first thing to select in the Web console is the firewall performance. The options available are:. Allow configuration of the firewall by the client : You can configure the firewall through the local console.
0コメント