Management and Security powered by Landesk
Endpoint Security help
Use this dialog box (Tools > Configuration > Agent Settings > Endpoint Security) to create and edit Endpoint Security settings.
This dialog box contains the following pages.
- About the Endpoint Security: General settings page
- About the Endpoint Security: Digital signatures page
- About the Endpoint Security: Default policy
- About the Endpoint Security: Trusted folders page
- About the Endpoint Security: Monitored folders page
Use this page to configure location awareness (trusted network) and other access settings.
- Name: Identifies the settings with a unique name.
- Administrator: Specifies administrator password and options.
- Use a password for Administrator: Specifies the password required on devices configured with this Endpoint Security settings in order to perform certain actions on the protected device.
- Allow Windows Service Control Manager to stop the Endpoint Security service: Lets the end user stop the Endpoint Security service on the client.
- Client interface: Specifies how the Endpoint Security client displays on managed devices.
- Show icon in the taskbar notification area: Displays the notification area icon in the client interface.
- Show violation balloon tips: Displays a message on the end-user device if a blocked operation occurs.
- Show Start menu shortcut in Ivanti Management group: Displays a program icon for the Endpoint Security client in the Start menu (click Start > Programs > Ivanti Management)
- Global hotkeys: Specifies hotkey shortcuts used for particular Endpoint Security features.
- Device Control bypass hotkey: Enables you to define a hotkey sequence that allows temporary access to a blocked device. The default hot key is Ctrl+Shift+F1. To enter the desired hotkey sequence, place the cursor in the text box, and then press (and hold) the keys in the order you want.
- Save: Saves your changes and closes the dialog.
Use this page to view and manage trusted digitally-signed applications and vendors.
- Do not trust digitally signed applications: Don't automatically trust digitally-signed applications. Disables the rest of the dialog-box options.
- Trust all digitally signed applications: Automatically trust digitally-signed applications. Be careful when using this. While being digitally signed does imply some degree of credibility, it doesn't guarantee that an application should be allowed in your environment.
- Trust digitally signed applications from these vendors: Only trust digitally-signed applications from the vendors you specify. A basic list of reputable vendors is in the Trusted vendors list by default. You can use the buttons below that list to modify it.
- Discovered vendors: Vendors found by the inventory software scanner on managed devices.
- Trusted vendors: Vendor names to trust. Use wildcards to make sure the vendor name matches variations in the name that appears on their digitally-signed applications.
- Add, Edit, and Delete: Use these to manage vendor names in the vendor lists.
Use this page to configure the security component agent settings and trusted file list settings.
Components: Select the agent setting you want to use for each component.
- Trusted file lists: Use the Add and Edit buttons to configure the trusted file lists you want to use.
- Learning list: When a component is set to learning mode, learned file information is added to this list.
- Add learning activity only into the learning list: Only updates the learning list you specified.
- Add learning activity into each list where the same file already exists: Updates all trusted file lists that already have an entry for the learned file.
Use this dialog box to specify folder paths on managed devices that should be considered trusted.
Click Add and specify a folder path and the rights you want to give that folder and all its child folders.
Use this dialog box to specify folder paths on managed devices that should be monitored. All files and child folders contained in a monitored folder are monitored. Use the Security activity tool's Application control section (Tools > Security and Compliance > Security activity) to view notifications on monitored folders. If any endpoint security actions need your attention, you'll also see a notification when you log in to the Endpoint Manager console.
Click Add and specify a folder path, the file patterns, exclusions, and file activities to be monitored.
Was this article useful?
The topic was:
Not what I expected
Copyright © 2017, Ivanti. All rights reserved.