Specifications and Settings

In this document, you will find comprehensive information regarding the specifications of the system, including compatibility details, supported operating systems, CPU consumption, RAM storage, and network bandwidth. Refer to the table below for a concise overview:

Specification Details
Compatibility Can seamlessly coexist with AVs and other third-party security programs.
Supported operating systems
      Windows 8
      Windows 8.1
      Windows 10
      Windows 11
CPU consumption Less than 1%.
RAM storage Less than 100MB.
Network bandwidth Negligible bandwidth

Settings

To configure the below mentioned settings : In the Endpoint Central console navigate to > Malware Protection > Settings.

  • Exclusions

    In certain scenarios, you may need to exclude specific files or folders from the scrutiny of Next-Gen Antivirus to accommodate your unique requirements. This can be particularly useful for preventing false positives or avoiding interference with trusted applications. Refer to this guide to add exclusions.

    Note: Exercise caution when configuring exclusions, as mismanagement may pose security risks; consult with IT security personnel for guidance.

  • Notification Settings:

    In Next-Gen Antivirus, you have the capability to enable alert notifications, ensuring that your cybersecurity team and users stay informed. This proactive approach enhances your overall security posture. Here's how you can configure it:

    • Administrator alerts:
      • Receive alerts via email for timely notification.
      • Stay informed on-the-go with mobile app notifications.
    • User Endpoint Notifications:
      • Users receive direct alerts on their endpoints for immediate.
  • Detection settings

    • Ransomware Detection Engine :
      • Audit only : Detects and alerts on identifying any ransomware incidents and is recommended to be used during the initial deployment. Once the incident is marked as True Positive, the files can be restored by a single click.
      • Kill mode : Detects and kills the ransomware and its child processes. It is recommended to deploy the configuration post auditing.
    • DeepAV ( Deep learning based antivirus ) :
      • Audit only : Detects and alerts on identifying any ransomware incidents.
      • Prevent :Blocks the execution of malicious processes by intercepting them before they can run.
    • Behavior Detection Engine :
      • Enabling behavior based detection will ensure detection of any suspicious activity in the enterprise network.
  • Clean up policy

    This setting defines how long the detected incidents and related information are retained. It can help in optimizing storage usage, but the data of the detected incidents would be erased after the specified days.

  • Add-on Configurations

    • Management Scope:

      This enables us to choose complete protection for all eligible endpoints or selectively enable for a test group of endpoints before rolling it to a broader environment. The number of endpoints protected can also be referred.

    • Disable Malware Protection:

      This option disables the feature of Malware Protection in Endpoint Central software. It would expose your endpoints to potential malware and anti-ransomware attacks. It can be re-enabled in the Malware Protection tab in the web console.