Threat Prevention Browser Configurations

Configuring Threat Prevention

Threat Prevention safeguards users from accessing malicious websites, including phishing sites, malware sites, and sites that distribute malware. By configuring this policy, administrators can effectively protect users from a range of online threats, such as script execution vulnerabilities. This document will explain how to create the policy and about each configuration provided by Endpoint Central.

Kindly follow the steps given below to successfully create and deploy Threat Prevention policy:

  1. Open Endpoint Central console and navigate to Browsers -> Policies -> Threat Prevention.
  2. Click Create Policy and select the OS platform.
  3. Give a name for the policy.
  4. Refer below to know more about each of the Threat Prevention settings.
  5. Click Save to save the policy as a draft. Click Save & Publish to save the policy.
  6. Associate the policy to computers/groups of computers in which you want the isolation of web-applications to take place.

  7. Threat Prevention

Settings under Threat Prevention

This document will explain each configuration for Threat Prevention provided by Endpoint Central and the browsers it is applicable for.

Configuration Description Supported browsers
Phishing filter By enabling this, sites that contain malicious content in any from: ransomware, viruses, phishing campaigns etc., will be blocked. Google Chrome, Ulaa, Microsoft Edge, Internet Explorer, Mozilla Firefox and other Chromium-based browsers
File downloads By enabling this, download of all files will be blocked. Google Chrome, Ulaa, Microsoft Edge, Internet Explorer and other Chromium-based browsers
Over-ride certificate errors By selecting restrict button, users will not be able to proceed past certificate errors displayed by websites. Google Chrome, Ulaa, Microsoft Edge, Internet Explorer and other Chromium-based browsers
Verification of certificate with revocation list By selecting enable, certificates will be verified with certificate revocation list that contain a list of certificates that are dangerous and shouldn't be trusted. If certificate is part of the revocation list, a certificate error will be thrown to the user. Microsoft Internet Explorer
Zone Elevation Protection By enabling this, privilege applied to one zone that has lower security setting, will not be applied to a zone that needs higher security setting. Microsoft Internet Explorer
Browser Helper Object By disabling this, users can not load third party browser helper objects. Microsoft Internet Explorer
Flash Restriction By disabling this, Adobe Flash plugins will be restricted on sites. Microsoft Edge and Internet Explorer
IE Plugin Protection By disabling this, users will only be able to install those plugins that are signed by a developer, when he lands on a site with plugin requirements. Installation of unsigned plugins will be restricted. Microsoft Internet Explorer
Run scripts on web page By disabling this, scripts in web pages will not be rendered. Microsoft Internet Explorer
Unsigned IE plugins By disabling this, users will only be able to install those plugins that are signed by a developer, when he lands on a site with plugin requirements. Installation of unsigned plugins will be restricted. Microsoft Internet Explorer
Block websites with excessive ads if this configuration is enabled, websites that contain excessive ads will be blocked. Google Chrome, Microsoft Edge and other Chromium-based browsers
Block third party websites that inject code By enabling this configuration, untrusted third-party websites that tamper with browser content will be blocked. Google Chrome and other Chromium-based browsers