Each rule summary and management page in the ESM Console displays details about the rules that define your organization’s security policy. To narrow the number of rules that the ESM Console displays, you can filter the rules using the filter control at the top of each column. Use the filter control to define either one or two values to filter on rule status, rule name, rule description, or modification date.
The operators that are available for each column depend on the column type. For example, you can filter columns that display text using any of the following operators to search for a string value: Is equal to, Is not equal to, Starts with, Contains, Does not contain, or Ends with. For columns that display a date, you can filter for a specific date or a date range using any of the following operators: Is equal to, Is not equal to, Is after or equal to, Is after, Is before or equal to, or Isbefore.
The ESM Console identifies columns that have active filters with an applied filter icon and a blue background. To remove the filter, click the icon and then select Clear.
The following table shows the columns, operators, and values that you can use to filter the rules.
Export and Import Policy Files
Export and Import Policy Files From each rule management page on the ESM Console, you can import and export rules. This enables you to: Back ...
User-Defined Rules A user-defined rule is a rule that you—or additional administrators with access to the ESM Console—create to manage the Traps security policy and ...
File Hash Search Conditions
File Hash Search Conditions Search fields at the top of the Hash Control page allow you to filter using one or more search conditions. For ...
Traps Endpoint Security Manager Known Issues
Known issues with the Traps Endpoint Security Manager and Traps agent 4.1. ...
Collect New Process Information
Collect New Process Information By default, Traps protects the most commonly used and well-known processes on your endpoints. In addition, when WildFire is enabled, Traps ...
Save Rules To save a rule, you must complete all required fields for that rule type. Tabs with required fields are indicated by a red ...
Example: Using Wildcards and Variables in Restriction Rules
Example: Using Wildcards and Variables in Policy Rules The following table displays examples of using wildcards and variables to specify a filename (regardless of location), ...
Upgrade to Traps 4.1
Upgrade to Traps 4.1 The Traps™ 4.1 release comprises the Endpoint Security Manager (ESM) Server, the ESM Console, and the Traps agent. Use the following ...
DLL File Protection
DLL File Protection Traps now extends its malware protection capabilities to block malicious DLL files on Windows endpoints. To provide a layered approach to DLL ...