Manage Endpoint Security Settings Profiles

Applies To: WatchGuard EPDR, WatchGuard EDR, WatchGuard EPP

On the Settings page of Service Provider Endpoint Manager, you can create and edit security settings profiles, and then assign them to an account, a group of accounts, or all the accounts you manage. Central management helps reduce administration time and inheritance enables quicker assignment of settings to account groups and sub-groups and the computer and devices in these groups.

To see security settings profiles, from the top navigation bar, select Settings. From the left pane, select the type of settings you want to see the profiles for.

For more information on how to create, copy, edit, and delete security settings profiles, see Manage Settings Profiles.

Profiles that you create in Service Provider Endpoint Manager support the same settings you can configure in WatchGuard Endpoint Security. These settings include:

Per-Computer Settings

Use these settings to configure features of the endpoint security product installed on user computers, such as agent visibility, software updates, and anti-tamper protection. For information on the available settings, see Configure Per-Computer Settings.

Workstations and Servers

Use these settings to specify how the endpoint security product reacts to threats and to set administrator rules for access to network resources to minimize the attack surface. For information on the available settings, see Workstation and Server Security Settings.

Indicators of Attack

Use these settings to enable or disable the Indicators of Attack you want to detect. Fore more information on the available settings, see Indicators of Attack Settings.

Program Blocking

Use these settings to specify which programs to block when they try to run. For information on the available settings, see Configure Program Blocking Security Settings (Windows computers).

Authorized Software

Use these settings to specify programs that you do not want WatchGuard Endpoint Security to block during classification. For information on the available settings, see Authorized Software Security Settings.

Android Devices

Use these settings to specify how the endpoint security product reacts to threats on Android phones and tablets. For information on the available settings, see Configure Android Device Security Settings.

For information on how to assign a security settings profile in Service Provider Endpoint Manager, see Assign Endpoint Security Settings in Endpoint Manager.

See Also

Assign Endpoint Security Settings in Endpoint Manager

Settings Ownership and Exceptions in Endpoint Manager