studentspot.blogg.se

Webroot security threat control
Webroot security threat control





  1. Webroot security threat control software#
  2. Webroot security threat control Pc#
  3. Webroot security threat control mac#
  4. Webroot security threat control windows#

Webroot security threat control windows#

Lists SecureAnywhere in the Windows Add/Remove Programs panel. Show SecureAnywhere in Add/Remove Programs Lists SecureAnywhere in the Windows Startup menu items. Opens the Webroot splash screen when the endpoint starts. Provides quick access to SecureAnywhere functions by placing the Webroot icon in the endpoint system tray.

Webroot security threat control Pc#

This setting applies only to PC endpoints. Provides quick access to the main interface by placing the shortcut icon on the endpoint desktop. Show a SecureAnywhere shortcut on the desktop

Webroot security threat control software#

The Basic Configuration settings control the behavior of the SecureAnywhere software on managed endpoints. Note: Your changes do not take effect until you promote them. If you are ready to implement the changes, click the Save Changes button, then click the Promote Draft Changes to Live button.If you're not ready to implement the changes, click the Save Changes button and return to the Policy tab.The colors are so that you can easily scan the list. Note: The green color indicates that the setting is On the Orange color indicates the setting is Off. Continue editing each section for that policy, making sure to click Save Changes before you move to another section.Īny policy with changes not yet implemented displays in the Draft Changes column.When you're done making changes for a selection, click the Save Changes button.

webroot security threat control

  • In the Draft column, for each Setting, double-click in the cell to view the options, then, from the drop-down menu, select the appropriate setting.įor a complete description of each setting, see the following tables in this procedure.
  • In the Section column, select the category you want to edit.
  • The Draft column is where you make changes.

    webroot security threat control

    The Live column displays how the setting is currently implemented on the endpoints.

    Webroot security threat control mac#

  • Settings that apply to PC and Mac are indicated by both the Windows icon and the Mac icon.
  • Settings that apply to PC only are indicated by the Windows icon.
  • The Setting column displays the name of the policy, in addition to which: The settings window for that policy displays, with the Basic Configuration setting selected in the Section column.
  • In the Policy Name column, find the policy you want to change and double-click it.
  • The Endpoint Protection console displays, with the Status tab active.

    webroot security threat control

  • Log in to your Endpoint Protection console.
  • Provides user access to the SecureAnywhere program on the endpoint.Ĭontrols System Optimizer behavior, such as an automatic cleanup schedule and what types of files and traces to remove from the endpoint. The Webroot firewall works in conjunction with the Windows firewall, which monitors data traffic coming into the endpoints. It looks for untrusted processes that try to connect to the Internet and steal personal information. Monitors data traffic traveling out of computer ports. It ensures that sensitive data is protected, while safe-guarding users from keyloggers, screen-grabbers, and other information-stealing techniques. Protects from identity theft and financial loss.

    webroot security threat control

    Protects endpoints as users surf the Internet and click links in search results. Monitors the computer system structures to ensure that malware has not tampered with them. Heuristics can be adjusted for separate areas of the endpoints, including the local drive, USB drives, the Internet, the network, CD/DVDs, and when the endpoint is offline.īlocks known threats listed in Webroot's threat definitions and in Webroot's community database.Īnalyzes applications and processes running on the endpoints. Provides threat analysis that SecureAnywhere performs when scanning endpoints. If SecureAnywhere detects another product attempting to interfere with its functions, it launches a protective scan to look for threats. Provides additional protection that prevents malicious software from modifying the SecureAnywhere program settings and processes on the endpoint. Provides more control over scans, such as performing a more thorough scan. If you do not modify the scan schedule, SecureAnywhere launches scans automatically every day, at about the same time you installed the software. General preferences that change the behavior of the SecureAnywhere program, such as whether the program icon displays in the endpoint's system tray and whether the user can shut down the program.Īllows you to run scans at different times, change the scanning behavior, or turn off automatic scanning. Policies control the following SecureAnywhere settings on managed endpoints. Note: You cannot change Webroot default policy settings. For more information, see Creating Policies. If needed, you can make temporary changes, called creating drafts, and then implement them later, called promoting to live. Once you create a policy, you can change its settings to suit your business purposes.







    Webroot security threat control