Workstation and Server Security Settings

Applies To: WatchGuard EPDR, WatchGuard EDR, WatchGuard EPP

Configure security settings profiles to define how WatchGuard Endpoint Security protects the computers on your network against threats and malware.

Settings vary for WatchGuard EPDR, WatchGuard EDR, and WatchGuard EPP. If you do not see a setting in the web UI, it is not supported by your product.

To configure a workstation and server security settings profile:

  1. From the top navigation bar, select Settings.
  2. From the left pane, select Workstations and Servers.
  3. Select an existing security settings profile to edit, copy an existing profile, or in the upper-right corner of the page, click Add to create a new profile.
    The Add Settings or Edit Settings page opens.

Screen shot of WatchGuard Endpoint Security, Add Settings dialog box

  1. In the Name text box, type a name for the settings profile.
  2. (Optional) In the Description text box, type a brief description of the settings profile.
  3. Select General to configure:
  4. To configure the behavior of advanced protection and anti-exploit protection against APTs, targeted attacks, and advanced malware, select Advanced Protection. For more information, see Advanced Protection.
  5. To configure parameters that control the antimalware protection against viruses and threats, select Antivirus. For more information, see Configure Antivirus Scanning.
  6. To configure parameters that control the firewall and the intrusion detection system against network attacks, select Firewall.
    For more information, see Configure Firewall Settings (Windows computers).
  7. To configure parameters that control user access to the peripheral devices connected to the computer, select Device Control.
    For more information, see Configure Device Control (Windows Computers).
  8. To restrict access to Web content categories and unknown pages, select Web Access Control. For more information, see Configure Web Access Control.
  9. Click Save.
  10. Select the profile and assign recipients, if required.
    For more information, see Assign a Settings Profile.

See Also

Security Settings

Copy a Settings Profile

Edit a Settings Profile