Home » Specifications & Settings
 

Specifications and Settings

System Requirements

To ensure optimal performance and security, it's imperative to meet the specific system requirements outlined in this section. These requirements cover hardware and software compatibility, including supported operating systems, CPU and RAM capacity, and network bandwidth. Failure to adhere to these specifications may result in compromised security, reduced performance, and potential system instability. Refer to the table below for a concise overview:

Specification Details
Compatibility Can seamlessly coexist with AVs and other third-party security programs.
Supported operating systems
  • Windows 8
  • Windows 8.1
  • Windows 10
  • Windows 11
CPU consumption Less than 1%.
RAM storage Less than 100MB.
Network bandwidth Negligible bandwidth

Configuring Settings

To configure the below mentioned settings, Navigate to Settings.

Exclusions

In certain scenarios, you may need to exclude specific files or folders from the scrutiny of Malware Protection to accommodate your unique requirements. This can be particularly useful for preventing false positives or avoiding interference with trusted applications. Refer to this guide to add exclusions.

Exclusion Settings

Note: Exercise caution when configuring exclusions, as mismanagement may pose security risks; consult with IT security personnel for guidance.

Detection Settings

  1. DeepAV (Deep learning based Antivirus) Engine:
    • Detection Trigger: These determine when a file scan is initiated.
      • On Execute: The file is scanned whenever a process is initiated. The file from which the process is being created will be scanned. This trigger is always active and cannot be disabled.
      • On DLL Load: The file scan is conducted when the Dynamic Link Libraries (DLLs) associated with a process are loaded. The DLL which was being loaded will be scanned.
      • On Write: Files are analysed as they are written, identifying and blocking threats before execution. It is initiated when a file is acquired through a web browser download, or when it is transferred (copied/moved) from within or outside the system.
    • Detection Policy:
      • Audit only: Detects and alerts on identifying any ransomware incidents.
      • Prevent: Blocks the execution of malicious processes by intercepting them before they can run.
  2. Behavior Detection Engine:
    • Enabling behavior based detection will ensure detection of any suspicious activity in the enterprise network.

Detection Settings

Clean up policy

This setting defines how long the detected incidents and related information are retained. It can help in optimizing storage usage, but the data of the detected incidents would be erased after the specified days.

Clean up Policy Settings

Notification Settings

In Malware Protection, you have the capability to enable alert notifications, ensuring that your cybersecurity team and users stay informed. This proactive approach enhances your overall security posture. Here's how you can configure it:

  • Administrator alerts:
    • Receive alerts via email for timely notification.
    • Stay informed on-the-go with mobile app notifications.
  • User Endpoint Notifications:
    • Users receive direct alerts on their endpoints for immediate.

Notification Settings

Add-on Configurations

  • Management Scope:

    This enables us to choose complete protection for all eligible endpoints or selectively enable for a test group of endpoints before rolling it to a broader environment. The number of endpoints protected can also be referred.

  • Disable Malware Protection:

    This option disables the feature of Malware Protection in Endpoint Central software. It would expose your endpoints to potential malware and anti-ransomware attacks. It can be re-enabled in the Malware Protection tab in the web console.

Add-on Configuration Settings

If you have any further questions, please refer to our Frequently Asked Questions section for more information.

Was this article helpful?

Thank you for your feedback!

Sorry about that!

By clicking "Submit", you agree to processing of personal data according to thePrivacy Policy.
Back to Top