x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF

Technical Support

Need help?

 

What are the Adaptive Defense and Endpoint Protection components?

Information applies to:

Products
Adaptive DefenseAdaptive Defense 360Adaptive Defense 360 on Aether Platform
Endpoint ProtectionEndpoint Protection Plus

Endpoint Protection and Adaptive Defense products main components are:

  • The Web administration console
  • The Antivirus unit
  • The Firewall unit
  • The Device control unit
  • Exchange Servers unit (in Endpoint Protection Plus and Adaptive Defense 360)
  • Web access control (in Endpoint Protection Plus and Adaptive Defense)

The Web administration console

The IT resource protection can be managed from the Web administration console.

The Antivirus unit

The Antivirus unit includes the following protection:

  • Files: Permanent protection that monitors disk access.
  • Mail (only workstations): Protection for emails.
  • Web: Protection for Web browsing.

The Firewall unit

The Firewall unit monitors all the network connections, blocking or allowing access according to the rules configured. It implements detection and blocking of IDS intrusions and network virus attacks, which Trojans use to spread. The administrator can configure the firewall performance:

  • From the administration console (centralized administration): The administrator defines the settings to be applied on the computers managed. The firewall is configured in the Web administration console.
  • From the Panda icon (administered from the client): The firewall is configured by the end-user. There are a set of rules predefined by Panda which establish permissions for common applications. New rules can be created and existing ones can be modified in the local firewall settings console.

Device control

Popular devices like USB flash drives, CD/DVD readers, image devices, Bluetooth devices and modems can become an entry point for infections.

The device control settings allow you to configure the device control protection for the profile you are creating. Select the device or devices you want to authorize and specify their usage.

Exchange Server protection

Email messages, either circulating in the internal network or received from external sources, may contain malware and spam.

The Exchange Server protection neutralizes these messages, preventing infections and email overload due to spam traffic.

Web access control

This protection allows you to limit access to specific Web categories, and configure a list of URLs to allow or deny access to. This way, you will be able to optimize your network's bandwidth and increase your business productivity.

Help nÂș- 20170601 50002 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT