Traps Agent Settings Rules
Agent settings rules enable you to change preferences related to Traps from a central location. From the SettingsAgentSettings page, you can create rules to manage the following Traps settings:
Configure a size quota for endpoint logs. For more information, see Define Event Logging Preferences.
Determine the frequency at which the Traps agent sends a heartbeat message to the ESM Server. The optimal frequency is determined according to the number of endpoints in the organization and the typical network load. For more information, see Define Heartbeat Settings Between the Agent and the ESM Server.
Configure the amount of time, known as the timeout value, after which Traps stops initiating attempts to reconnect to the ESM Server when the server becomes unreachable. Configure the grace period to specify when Traps should attempt to reestablish communication. For more information, see Define Communication Settings Between the Agent and the ESM Server.
Configure Traps agents to collect new processes from endpoints. When this option is enabled, Traps reports every new process that runs on an endpoint to the ESM Server. You can view the processes in the Process Management view of the ESM Console and choose whether to create security rules related to the processes. For more information, see Collect New Process Information.
User Visibility and Access
Determine whether and how end users can access the Traps Console application. Optionally, you can configure the console so that only administrators can access it. For more information, see Hide or Restrict Access to the Traps Console.
Customize the general settings for all user alerts, including the display image and footer. You can also configure the title that appears on user alerts related to protection modules, restrictions, and unknown files. For more information, see Create a Custom User Alert Message.
Agent Tampering Protection
(Windows only) Provides granular control over service protection settings. Prevent attempts to disable or make changes to the Traps processes, services, registry keys and values, and files. When enabled, users cannot tamper with the Traps components for which you enabled tamper protection. For more information, see Manage Agent Tampering Protection.
(Windows only) By default, users and administrators must enter a password to uninstall the Traps application. Use this option to change the password. For more information, see Change the Uninstall Password.
Traps does not apply agent setting rules until the Traps agent receives the updated security policy, typically with the next heartbeat communication with the server. To manually retrieve the latest security policy from the ESM Server, select Check In Now on the Traps Console.
Select a rule on the Settings page to display additional information about that rule and other actions that you can perform to manage the rule (Delete, Activate/Deactivate, or Edit). For more information, see Manage Agent Settings Rules.
Manage Agent Settings Rules
Manage Agent Settings Rules Create agent settings rules from a central location to change preferences related to Traps. Traps Agent Settings Rules Add a New ...
Add a New Agent Settings Rule
Add a New Agent Settings Rule For each agent settings rule, you can specify organizational objects, conditions, and Traps preferences to apply. Agent settings rules ...
Policy Rule Types
Policy Rule Types A complete endpoint security policy comprises policies that target specific methods of protection. The rules that make up each of these policies ...
Manage Service Protection
Manage Agent Tampering Protection Agent tampering protection allows you to protect the Traps agents running on your endpoints. For flexible, granular control over agent tampering ...
Traps Troubleshooting Resources
Traps Troubleshooting Resources To troubleshoot Traps and the Endpoint Security Manager (comprising an ESM Server, the ESM Console, and a database), use the following resources: ...
Manage Protection Settings on the Endpoint Using Cytool
Manage Protection Settings on the Endpoint Using Cytool By default, Traps protects core processes, registry keys, Traps files, and Traps services according to the service ...
Why can’t I upgrade or uninstall Traps?
Why can’t I upgrade or uninstall Traps? Symptom Traps Setup reports the following error: Service “Traps” (CyveraService) failed to start. Verify that you have sufficient ...
Malware Protection Flow
Malware Protection Flow To protect the endpoint from malicious and unknown executable files, the malware prevention engine employs four methods of protection: Phase 1: Evaluation ...
DLL File Protection
DLL File Protection Traps now extends its malware protection capabilities to block malicious DLL files on Windows endpoints. To provide a layered approach to DLL ...