Configure Workstations and Servers Security Settings

Applies To: WatchGuard Advanced EPDR, WatchGuard EPDR, WatchGuard EDR, WatchGuard EPP

Configure security settings profiles to define how WatchGuard Endpoint Security protects the workstations and servers on your network against threats, malware, and network attacks.

Settings vary for WatchGuard Advanced EPDR, EPDR, EDR, EDR Core, and EPP. Throughout this documentation, WatchGuard Endpoint Security refers generally to all products. If you do not have a setting in the Endpoint Security management UI, it is not supported by your product.

When you allocate WatchGuard EDR or EDR Core to a new account, and the account does not have a workstations and servers settings profile assigned, the default profile assigned to the All group has anti-exploit and decoy files disabled.

To configure a workstations and servers security settings profile:

  1. In WatchGuard Cloud, select Configure > Endpoints.
  2. Select Settings.
  3. From the left pane, select Workstations and Servers.
  4. Select an existing security settings profile to edit, copy an existing profile, or in the upper-right corner of the page, click Add to create a new profile.
    The Add Settings or Edit Settings page opens.

Screen shot of WatchGuard Endpoint Security, Add Settings dialog box

  1. In the Name text box, type a name for the settings profile.
  2. (Optional) In the Description text box, type a brief description of the settings profile.
  3. Select General to configure:
  4. To make sure that Advanced Protection does not block an unclassified program, add it to the Authorized Software list. For more information, go to Configure Authorized Software Settings (Windows Computers).
  5. To configure the behavior of advanced protection and anti-exploit protection against APTs, targeted attacks, and advanced malware, select Advanced Protection. For more information, go to Advanced Protection.
  6. To configure parameters that control the antimalware protection against viruses and threats, including decoy files, select Antivirus. For more information, go to Configure Antivirus Scanning.
  7. To configure parameters that control the firewall and the intrusion detection system against network attacks, select Firewall.
    For more information, go to Configure Firewall Settings (Windows Computers).
  8. To configure parameters that control user access to the peripheral devices connected to the computer, select Device Control.
    For more information, go to Configure Device Control (Windows Computers).
  9. To restrict access to Web content categories and unknown pages, select Web Access Control. For more information, go to Configure Web Access Control.
  10. To enable global Audit mode, select Audit mode. For more information, go to Configure Audit Mode.
  11. Click Save.
  12. Select the profile and assign recipients, if required.
    For more information, go to Assign a Settings Profile.

Related Topics

Security Settings in Endpoint Security

Copy a Settings Profile

Edit a Settings Profile