Manage Endpoint Security Settings Profiles

Applies To: WatchGuard EPDR, WatchGuard EDR, WatchGuard EPP

On the Settings page of Service Provider Endpoint Manager, you can create and edit security settings profiles, and then assign them to an account, a group of accounts, or all the accounts you manage. Central management helps reduce administration time and inheritance enables quicker assignment of settings to account groups and sub-groups and the computer and devices in these groups.

To see security settings profiles, from the top navigation bar, select Settings. From the left pane, select the type of settings you want to see the profiles for.

For more information on how to create, copy, edit, and delete security settings profiles, see Manage Settings Profiles.

Profiles that you create in Service Provider Endpoint Manager support the same settings you can configure in WatchGuard Endpoint Security. These settings include:

Per-Computer Settings

Use these settings to configure features of the endpoint security product installed on user computers, such as agent visibility, software updates, and anti-tamper protection. For information on the available settings, see Configure Per-Computer Settings.

Workstations and Servers

Use these settings to specify how the endpoint security product reacts to threats and to set administrator rules for access to network resources to minimize the attack surface. For information on the available settings, see Workstation and Server Security Settings.

Indicators of Attack

Use these settings to enable or disable the Indicators of Attack you want to detect. Fore more information on the available settings, see Configure Indicators of Attack Settings.

Program Blocking

Use these settings to specify which programs to block when they try to run. For information on the available settings, see Configure Program Blocking Security Settings (Windows computers).

Authorized Software

Use these settings to specify programs that you do not want WatchGuard Endpoint Security to block during classification. For information on the available settings, see Configure Authorized Software Settings (Windows computers).

Android Devices

Use these settings to specify how the endpoint security product reacts to threats on Android phones and tablets. For information on the available settings, see Configure Android Device Security Settings.

Patch Management

Use these settings to specify how the Patch Management module discovers new security patches published by vendors for the Windows operating systems and third-party software installed across the network. For information on the available settings, see Configure Patch Management Security Settings.

Data Control

Use these settings to specify how the Data Control module monitors personal data on your network. For information on the available settings, see Data Control Settings.

Encryption

Use these settings to specify how the Full Encryption module monitors the encryption status of network computers and centrally manages the corresponding recovery keys. For information on the available settings, see Encryption Settings.

For information on how to assign a security settings profile in Service Provider Endpoint Manager, see Assign Endpoint Security Settings in Endpoint Manager.

See Also

Assign Endpoint Security Settings in Endpoint Manager

Settings Ownership and Exceptions in Endpoint Manager