Views:
You can configure the Behavior Monitoring Exception List for your Worry-Free Business Security Services customers and deploy the list to multiple customers or device groups.
Important
Important
When deploying the Behavior Monitoring Exception List settings, be aware of the following:
  • For the Device (Default) group, Security Agents automatically enable Behavior Monitoring.
  • For the Server (Default) group, Security Agents automatically enable Behavior Monitoring and the Unauthorized Change Prevention Service.
  • For manual groups:
    • Security Agents installed on desktop platforms automatically enable Behavior Monitoring.
    • Security Agents installed on server platforms automatically enable Behavior Monitoring, but you must manually enable the Unauthorized Change Prevention Service using the Worry-Free Business Security Services console.
For more information, see the Worry-Free Business Security Services Online Help.

Procedure

  1. Go to Customers.
  2. Select one or more customers from the Company list.
  3. Click Policy Settings and select Behavior Monitoring Exception List.
    The Behavior Monitoring Exception List screen appears.
  4. Select the customers or specific device groups that you want to configure.
    Note
    Note
    To select specific types of device groups, use the Select Groups drop-down button to select or remove device groups from the policy setting. By default, Remote Manager selects all device groups for all customers.
  5. Click Configure Policy >.
  6. Configure the policy settings for the Approved Program List and/or the Blocked Program List.
    1. Use the drop-down box to specify how changes affect each list.
      • Select an action: The default setting which does not apply any changes the current policy settings
      • Append: Remote Manager adds the specified items to the existing list
      • Delete: Remote Manager removes the specified items from the existing list
        Note
        Note
        If Remote Manager does not locate the specified item in the existing list, Remote Manager does not perform any action on the list.
      • Overwrite: Remote Manager deletes all items from the existing list and replaces the list with the specified items
        WARNING
        WARNING
        You cannot undo this action. If you choose to replace the entire list, you cannot recover the previous list items.
    2. Type the full program paths that apply to the policy.
      Specify multiple entries using the semicolon (;) or ENTER key.
      The Behavior Monitoring Exception List accepts the asterisk (*) and question mark (?) wildcard characters, and environment variables.
      For more information on wildcard characters, see Behavior Monitoring Exception List Wildcard Support.
      For more information on environment variables, see Supported environment variables.
  7. Click Deploy Policy Settings.
    Remote Manager deploys the changes to the specified customers or device groups. You can monitor the status of the policy deployment from the Administration logs.
    For more information, see Viewing administration logs.