Target objects define the scope of a rule and the endpoints to which a rule applies. An object can be one of the following:
A user defined in Active Directory.
Traps evaluates the logged on user the moment the user logs on. As a result, Traps will apply the policy of the logged on user regardless of the account used to open or run files.
A user group defined in Active Directory.
The Endpoint Security Manager does not support the following groups in Active Directory:
Renaming any of these groups in Active Directory causes the ESM Console to present the group as an option to which you can apply policy, however, the renamed group is not supported.
The name of a computer or mobile device defined in Active Directory.
A subdivision within Active Directory into which you can place users, groups, computers, and other organizational units.
A computer or mobile device on which the Traps agent is installed. The Endpoint Security Manager identifies existing endpoints by communication messages it receives from Traps agents.
For objects defined in Active Directory, the ESM Console provides autocompletion as you type.
Computer names may be offered as autocompletions even if they are not presently running Traps.
You can apply rules to all objects, to selected objects, or to all objects except those in the Exclude list.
Rules that you define for users and groups will apply to those users and groups, regardless of the endpoint on which they log in.
Uninstall or Upgrade Traps on the Endpoint
Uninstall or Upgrade Traps on the Endpoint Create a new agent actions rule to uninstall Traps from the target objects or upgrade Traps using software ...
Change the Uninstall Password
Change the Uninstall Password By default, you must enter the uninstall password specified during installation to uninstall Traps from an endpoint. Change the default password ...
Hide or Restrict Access to the Traps Console
Hide or Restrict Access to the Traps Console By default, a user can access the Traps Console to view information about the current status of ...
Manage Service Protection
Manage Agent Tampering Protection Agent tampering protection allows you to protect the Traps agents running on your endpoints. For flexible, granular control over agent tampering ...
Configure Anti-Ransomware Protection
Configure Anti-Ransomware Protection The Anti-Ransomware Protection MPM provides additional protection against ransomware. The module targets encryption-based activity associated with ransomware with the ability to analyze ...
Add a New Action Rule
Add a New Action Rule For each action rule, you can specify organizational objects, conditions, and actions to take on each endpoint. Action rules apply ...
Define Event Logging Preferences
Define Event Logging Preferences Traps stores event information and quarantined files in a temporary local storage folder. To adjust the size of the disk quota, ...
Define Memory Dump Preferences
Define Memory Dump Preferences When a protected process crashes or terminates abnormally, Traps records information about the event including the contents of memory locations and ...
Define Child Process Restrictions
Define Child Process Restrictions The child process restriction rule is supported in Traps 3.4 and earlier releases. To restrict child processes on endpoints running Traps ...