This solution addresses Webroot SecureAnywhere Business – Endpoint Protection
Administrators with appropriate permissions can create policies and assign them to individual endpoints, or to groups of endpoints.
Policies define the behavior of Webroot SecureAnywhere on the endpoints where it is deployed. For example, you might create a policy only for the IT department that shows the license keycode on endpoint screens.
Policy names must be unique, so it's a good idea to plan your policies before creating them to avoid conflicts later.
To view policy settings, open the SecureAnywhere Endpoint Protection Policies tab, find the policy in the list, and double-click anywhere in the row.
The policy settings panel opens to the Basic Configuration settings.
To see a description of the policy settings, hover your cursor over each one to open its tooltip.
Choose a link from the chart below for further information on each policy setting:
|SecureAnywhere settings controlled by policies
| Basic Configuration
||General preferences that change the behavior of the SecureAnywhere program, such as whether the program icon appears in the endpoint's system tray and whether the user can shut down the program.
| Scan Schedule
||Settings that allow you to run scans at different times, change the scanning behavior, or turn off automatic scanning. If you do not modify the scan schedule, SecureAnywhere launches scans automatically every day, at about the same time you installed the software.
| Scan Settings
||Settings that provide more control over scans, such as performing a more thorough scan.
| Self Protection
||Additional protection that prevents malicious software from modifying the SecureAnywhere program settings and processes on the endpoint. If SecureAnywhere detects another product attempting to interfere with its functions, it launches a protective scan to look for threats.
||Threat analysis that SecureAnywhere performs when scanning endpoints. Heuristics can be adjusted for separate areas of the endpoints, including the local drive, USB drives, the Internet, the network, CD/DVDs, and when the endpoint is offline.
| Realtime Shield
||Settings that block known threats listed in Webroot's threat definitions and in Webroot's community database.
| Behavior Shield
||Settings that analyze the applications and processes running on the endpoints.
| Core System Shield
||Settings that monitor the computer system structures to ensure that malware has not tampered with them.
| Web Threat Shield
||Settings that protect endpoints as users surf the Internet and click links in search results.
| Identity Shield
||Protection from identity theft and financial loss. It ensures that sensitive data is protected, while safe-guarding users from keyloggers, screen-grabbers, and other information-stealing techniques.
||Firewall protection that monitors data traffic traveling out of computer ports. It looks for untrusted processes that try to connect to the Internet and steal personal information. The Webroot firewall works in conjunction with the Windows firewall, which monitors data traffic coming into the endpoints.
||User access to the SecureAnywhere program on the endpoint.
||Settings that control the System Cleaner behavior, such as an automatic cleanup schedule and what types of files and traces to remove from the endpoint.