To ensure optimal performance and security, it's imperative to meet the specific system requirements outlined in this section. These requirements cover hardware and software compatibility, including supported operating systems, CPU and RAM capacity, and network bandwidth. Failure to adhere to these specifications may result in compromised security, reduced performance, and potential system instability. Refer to the table below for a concise overview:
Specification | Details |
---|---|
Compatibility | Can seamlessly coexist with AVs and other third-party security programs. |
Supported operating systems |
|
CPU consumption | Less than 1%. |
RAM storage | Less than 100MB. |
Network bandwidth | Negligible bandwidth |
To configure the below mentioned settings, open Endpoint Central console and navigate to Malware Protection > Settings.
In certain scenarios, you may need to exclude specific files or folders from the scrutiny of Next-Gen Antivirus to accommodate your unique requirements. This can be particularly useful for preventing false positives or avoiding interference with trusted applications. Refer to this guide to add exclusions.
Note: Exercise caution when configuring exclusions, as mismanagement may pose security risks; consult with IT security personnel for guidance.
This setting defines how long the detected incidents and related information are retained. It can help in optimizing storage usage, but the data of the detected incidents would be erased after the specified days.
In Next-Gen Antivirus, you have the capability to enable alert notifications, ensuring that your cybersecurity team and users stay informed. This proactive approach enhances your overall security posture. Here's how you can configure it:
This enables us to choose complete protection for all eligible endpoints or selectively enable for a test group of endpoints before rolling it to a broader environment. The number of endpoints protected can also be referred.
This option disables the feature of Malware Protection in Endpoint Central software. It would expose your endpoints to potential malware and anti-ransomware attacks. It can be re-enabled in the Malware Protection tab in the web console.