![]() Right-click the Webroot icon from the system tray menu, then select Open.Double-click the Webroot shortcut icon on the desktop.From the endpoint,do one of the following:.To open the SecureAnywhere main interface on a Windows Computer: Opening SecureAnywhere on Windows Computers For Mac computers, see SecureAnywhere Mac User Guide. Note: For complete instructions on using the SecureAnywhere interface on the endpoint, see the Webroot SecureAnywhere for PC User Guide. Opening SecureAnywhere on Mac Computers.Opening SecureAnywhere on Windows Computers.This topic contains the follow procedures and information: This might be necessary if you assign an endpoint to the Unmanaged policy, which is not controlled through the Management Portal. Various other trademarks are held by their respective owners.On occasion, you may need to access an endpoint to change settings in the SecureAnywhere interface. WatchGuard and the WatchGuard logo are registered trademarks or trademarks of WatchGuard Technologies in the United States and other countries. To add an exclusion in Webroot SecureAnywhere Endpoint Protection for Mac:įor information about the integration testing methods, see TDR Testing Methodology. Click Add Application to exclude the path.Open Webroot SecureAnywhere Endpoint Protection in the client.To add an exclusion in Webroot SecureAnywhere Endpoint Protection for Windows: To exclude directories used by the TDR Host Sensor, add the exclusions for the files listed in the Integration Summary. Configure Exclusions in Webroot SecureAnywhere Endpoint Protection Repeat these steps to add each exclusion. To apply the exception to all hosts, in the Hosts / Groups text box, type All Hosts.(Optional) In the Description text box, type a description for this exclusion.Folders specified in an exclusion must end with a backslash. In the Path text box, type the path to exclude.The Exclusion page opens with the Custom tab selected. In the Host Sensor section, select Exclusions. ![]() Log In to TDR in WatchGuard Cloud as an Owner.Entities to exclude: Files and Processes.Unless otherwise noted, configure each TDR exclusion with these options, which are selected by default: In your TDR account, add the TDR exclusions for the paths shown in the Integration Summary. If you do not want to exclude all the recommended paths in a predefined exclusion set, you can add exclusions manually. You must also add the TDR exclusions to your AV software to avoid potential conflicts. For information about predefined AV exclusion sets, see Configure TDR Exclusions. TDR updates these exclusion sets as needed. Predefined exclusion sets include all recommended exclusions for the AV tool. This AV tool has a predefined exclusion set available. TDR has predefined AV exclusion sets for the most common third-party AV tools. ![]() To add the exclusions to TDR, you can either use Predefined Exclusion Sets or add the exclusions manually. Before you deploy a Host Sensor on computers that have Webroot installed, add exclusions for the Webroot file paths as TDR Exclusions in your TDR account. In your TDR account, add the exclusions to manually identify paths for files and processes that you do not want Host Sensors to monitor. If the Host Sensor and Webroot detect and respond to a threat at the same time, this can cause high utilization of system resources such as CPU, Memory and Disk I/O. The Mac test environment for this deployment included:
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |