Configure Workstations and Servers Security Settings

Applies To: Endpoint Security Elite, Endpoint Security 360, Endpoint Security Prime, WatchGuard EDR, WatchGuard EDR Core, Endpoint Security Basic

Configure security settings profiles to define how Endpoint Security protects the workstations and servers on your network against threats, malware, and network attacks. Some features available in a workstations and servers profile vary by platform.

Feature Windows (Intel & ARM)

Linux

Mac (Intel & ARM)

Android

iOS

Privacy Supported Supported Supported Not Supported Not Supported
Network usage Supported Supported Supported Not Supported Not Supported
Zero-Trust Application Service Supported Supported Not Supported Not Supported Not Supported
Antivirus protection Supported Supported Supported Not Supported Not Supported
Windows Anti-Malware Scan Interface (AMSI) Supported Not Supported Not Supported Not Supported Not Supported
Anti-exploit protection, including code injection and vulnerable driver detection Supported (Not available on ARM systems) Not Supported Not Supported Not Supported Not Supported
Network attack protection Supported Not Supported Not Supported Not Supported Not Supported
Advanced security policies and blocked programs (Endpoint Security Elite only) Supported Not Supported Not Supported Not Supported Not Supported
Firewall and IDS Supported Not Supported Not Supported Not Supported Not Supported
Web access control Supported Not Supported Supported Not Supported Not Supported
Global Audit mode Supported Supported Supported Not Supported Not Supported

Settings vary for Endpoint Security Elite, 360, Prime, Basic, WatchGuard EDR, and EDR Core. Throughout this documentation, Endpoint Security refers generally to all products. If a setting is not visible in the Endpoint Security management UI, it is not supported by your product.

Your operator role determines what you can see and do in WatchGuard Cloud. Your role must have the Configure Security for Workstations and Servers permission to view or configure this feature. For more information, go to Manage WatchGuard Cloud Operators and Roles.

To configure a workstations and servers security settings profile:

  1. In WatchGuard Cloud, select Configure > Endpoint Security.
  2. Select Settings.
  3. From the left pane, select Workstations and Servers.
  4. Select an existing security settings profile to edit, copy an existing profile, or in the upper-right corner of the page, click Add to create a new profile.
    The Add Settings or Edit Settings page opens.

Screen shot of WatchGuard Endpoint Security, Add Settings dialog box

  1. In the Name text box, type a name for the settings profile.
  2. (Optional) In the Description text box, type a brief description of the settings profile.
  3. Select General to configure:
  4. To configure the behavior of the Zero-Trust Application Service, select Zero-Trust Application Service. For more information, go to Configure the Zero-Trust Application Service.
  5. To configure parameters that control the anti-malware protection against viruses and threats, including decoy files, select Antivirus. For more information, go to Configure Antivirus Scanning.

When you allocate WatchGuard EDR or EDR Core to a new account, and the account does not have a workstations and servers settings profile assigned, the default profile assigned to the All group has decoy files and anti-exploit disabled.

  1. To configure anti-exploit protection against APTs, targeted attacks, and advanced malware, select Anti-exploit. For more information, go to Configure Anti-Exploit Protection (Windows Computers)
  2. To configure network attack protection, select Network Attack Protection. For more information, go to Configure Network Attack Protection (Windows Computers).
  3. (Endpoint Security Elite only) To configure policies to detect and block suspicious scripts and unknown programs that use advanced infection techniques, select Advanced Security Policies. For more information, go to Configure Advanced Security Policies (Windows Computers).
  4. To configure parameters that control the firewall and the intrusion detection system against network attacks, select Firewall. For more information, go to Configure Firewall Settings (Windows Computers).
  5. To configure parameters that control user access to the peripheral devices connected to the computer, select Device Control. For more information, go to Configure Device Control (Windows Computers).
  6. To restrict access to Web content categories and unknown pages, select Web Access Control. For more information, go to Configure Web Access Control.
  7. To enable global Audit mode, select Audit mode. For more information, go to Configure Audit Mode.
  8. Click Save.
  9. Select the profile and assign recipients, if required.
    For more information, go to Assign a Settings Profile.

Configure Privacy

Endpoint Security collects the name and full path of the files it sends to WatchGuard Cloud for analysis, as well as the name of the logged in user. This information is used in the reports and forensic analysis tools shown in the management UI.

Your operator role determines what you can see and do in WatchGuard Cloud. Your role must have the Configure Security for Workstations and Servers permission to view or configure this feature. For more information, go to Manage WatchGuard Cloud Operators and Roles.

To enable data collection, in the Privacy section, enable the toggles.

Screen shot of WatchGuard Endpoint Security, Privacy settings

Configure Network Usage

Endpoint Security sends every unknown executable file found on user computers to WatchGuard Cloud for analysis. This behavior is configured so that it has no impact on the customer’s network bandwidth:

  • Endpoint Security only sends a compressed file up to 50 MB to WatchGuard Cloud each hour for each client.
  • The WatchGuard Agent sends each unknown file once only for all customers who use Endpoint Security.
  • Endpoint Security implements bandwidth management mechanisms to prevent intensive usage of network resources.

Your operator role determines what you can see and do in WatchGuard Cloud. Your role must have the Configure Security for Workstations and Servers permission to view or configure this feature. For more information, go to Manage WatchGuard Cloud Operators and Roles.

To configure network usage, in the Network Usage section:

  • In the Maximum number of MBs that can be transferred in an hour text box, type the maximum number of MB to transfer between the computers and devices on your network and WatchGuard Cloud.

Related Topics

Security Settings in Endpoint Security

Configure the Zero-Trust Application Service