Deployment of security configurations
Web-based attacks like ransomware, man in the browser attacks, phishing campaigns, watering hole attacks and other social engineering and drive-by attacks, all make use of browsers as an entry point to gain access to the data present in computers. The purpose of some is to wreck havoc while some steal sensitive enterprise data. IT administrators have no way to collectively administer security settings, preventing malware attacks and at the same time ensuring data security.
With Threat Prevention Policies, you can put a stop to
- Phishing campaigns
- Ransomware attacks through drive-by attacks
- Downloads containing malware
- Social Engineering attacks through compromised plugins
Click here to understand the functionality of each configurations provided within Threat Prevention policy.
With Data Leakage Prevention Policies, you can put a stop to
- Insider threats
- Password persistence on sites
- Clipboard copy between sites
Click here to understand the functionality of each configurations provided within Data Leakage Prevention policy.
With browser customization policies, you can
- Enhance end users's browsing experience
- Deploy policies to multiple browsers from a central location
- Manage and control security configurations
Click here to understand the functionality of each configurations provided within Threat Prevention policy.
How to create and deploy policies to computers:
Follow the below steps to deploy policy to a computer
- Navigate to Policies tab
- Click on the policy that you want to create. Let's take Threat Prevention Policy for example. Click on Threat Prevention
- Configure the policy according to your requirements
- Click on Save & Publish button
- From the table, click on the Action button corresponding to the policy that you created
- Click on Deploy to computer(s) or Deploy to Group(s) based on requirement
The policy will be deployed to the selected computers/groups