x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF

Technical Support

Need help?

 

What are Endpoint Protection components?

Information applies to:

Products
Endpoint Protection
Endpoint Protection Plus

Endpoint Protection has four (six in Endpoint Protection Plus) main components:

  • The Web administration console
  • The Antivirus unit
  • The Firewall unit
  • The Device control unit
  • Exchange Servers unit (only in PCOP Advanced)
  • Web access control (only in PCOP Advanced)

The Web administration console

The IT resource protection can be managed from the Web administration console.

The Antivirus unit

The Antivirus unit includes the following protection:

  • Files: Permanent protection that monitors disk access.
  • Mail (only workstations): Protection for emails.
  • Web: Protection for Web browsing.

The Firewall unit

The Firewall unit monitors all the network connections, blocking or allowing access according to the rules configured. It implements detection and blocking of IDS intrusions and network virus attacks, which Trojans use to spread. The administrator can configure the firewall performance:

  • From the administration console (centralized administration): The administrator defines the settings to be applied on the computers managed. The firewall is configured in the Web administration console.
  • From the Panda icon (administered from the client): The firewall is configured by the end-user. There are a set of rules predefined by Panda which establish permissions for common applications. New rules can be created and existing ones can be modified in the local firewall settings console.

Device control

Popular devices like USB flash drives, CD/DVD readers, image devices, Bluetooth devices and modems can become an entry point for infections.

The device control settings allow you to configure the device control protection for the profile you are creating. Select the device or devices you want to authorize and specify their usage.

Exchange Server protection (only available in PCOP Advanced)

Email messages, either circulating in the internal network or received from external sources, may contain malware and spam.

The Exchange Server protection neutralizes these messages, preventing infections and email overload due to spam traffic.

Web access control (only available in PCOP Advanced)

This protection allows you to limit access to specific Web categories, and configure a list of URLs to allow or deny access to. This way, you will be able to optimize your network's bandwidth and increase your business productivity.

Help nÂș- 20131126 50002 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





Do you need one of our technicians to connect to
your PC or device remotely to fix a problem?

Discover our Premium Services

ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT