The Panda Cloud Office Protection settings are based on the creation of profiles and groups of computers to which specific policies are assigned.
To configure a profile, select the Profiles option in the left panel of the Settings tab.
To create a new profile, select Create New Profile, or click the existing profiles to edit them.
These sections will be displayed in the menu on the left of the console once you have selected the profile to edit or create.
Here you can:
Enter a name for the profile.
Write a description of the profile.
Select the protection installation language.
- Access advanced installation settings.
From the Advanced options you can:
- Specify the path on which you want to install the program.
The default path is: %ProgramFiles%\Panda Security\WAC
- Configure, if necessary, the connection to the Internet via a proxy server.
Note: These details will be used, if they exist, as the first connection option for queries to the cloud.
Additionally, you can also enable the verification checkbox Request Internet access details if no connection is found.
- Indicate whether to enable or disable scanning with Collective Intelligence. It is not advisable to disable it as it will reduce the detection capabilities.
Note: If you select the Disable scans with Collective Intelligence checkbox, you will disable all automatic background scans: memory scans and scans of specific locations of the hard disk.
Also, if you select the Disable scans with Collective Intelligence checkbox, you will disable cloud scanning for all scan types: on-access and scheduled scans.
- You can also configure the frequency with which computer agents connect to the server.
- You can select a computer to be used as a proxy/repository server for all communications of computers with this same profile. This means that all computers will attempt to communicate with Panda’s servers through this computer. Additionally, this computer will store (from version 6.0), all files downloaded from the Internet so that they don’t have to be downloaded again if requested by another computer.
- Quarantine settings: You can establish an alternative path for items restored from quarantine if they cannot be restored to their original location.
- Uninstallation: You can implement password-protection to prevent accidental or unwanted uninstallation of the protection. This password will always be requested whenever there is an attempt to uninstall the protection or agent.
From the Updates tab you can:
- Enable or disable automatic updates of the protection engine and the virus signature file. You can also set how often the protection checks for new updates of the protection engine, and a time period or dates for the updates.
You can also enable the option Restart automatically computers if necessary to complete updates. In this case, you can select whether to automatically restart only stations, only servers or both.
- Enable or disable the automatic updates of the signature file and set how often to check for the availability for new updates.
Scheduled scans tab
Here you can configure the scans to be launched through the console.
You can create a new scan, modify a scan, or delete it.
Scans can be immediate, scheduled or periodic.
You can scan the whole PC, the hard disks, email and other items (in this case you must specify the path to scan).
Advanced Settings, where you can configure several options:
Here you can configure the warnings to be launched upon detecting malware.
There are two types of warnings:
Local warnings: Warnings which will be displayed on computers in which malware is detected.
Email warnings: In this case you have to configure the SMTP server to send the warnings and the address(es) to which to send them.
You can also configure the SMTP Server to send the warnings.
Apply to... tab
The groups to which the settings are being applied to are displayed.
Note: The only settings that apply to Linux systems are the ones related to the on-demand and scheduled scans. The rest of the settings do not applied on Linux.