Manage Saved Rules
Table of Contents
4.2 (EoS)
Expand all | Collapse all
-
- Set Up the Endpoint Infrastructure
- Activate Traps Licenses
-
- Endpoint Infrastructure Installation Considerations
- TLS/SSL Encryption for Traps Components
- Configure the MS-SQL Server Database
- Install the Endpoint Security Manager Server Software
- Install the Endpoint Security Manager Console Software
- Manage Proxy Communication with the Endpoint Security Manager
- Load Balance Traffic to ESM Servers
-
- Malware Protection Policy Best Practices
- Malware Protection Flow
- Manage Trusted Signers
-
- Remove an Endpoint from the Health Page
- Install an End-of-Life Traps Agent Version
-
-
- Traps Troubleshooting Resources
- Traps and Endpoint Security Manager Processes
- ESM Tech Support File
-
- Access Cytool
- View the Status of the Agent Using Cytool
- View Processes Currently Protected by Traps Using Cytool
- Manage Logging of Traps Components Using Cytool
- Restore a Quarantined File Using Cytool
- View Statistics for a Protected Process Using Cytool
- View Details About the Traps Local Analysis Module Using Cy...
- View Hash Details About a File Using Cytool
Manage Saved Rules
After saving the rule, the name and description appear
in the appropriate system logs and tables.
Select the rule to view details and perform any of the following
actions:
Action | Description |
---|---|
Duplicate | (Action rules only) Create a new
rule from an existing rule. |
Delete | Discard the rule; the rule is removed from
the system. To delete multiple rules at the same time, select
the rules and then select Delete Selected (non-Default) from
the action menu |
Activate/Deactivate | If the rule was previously saved but not
applied, you can Activate the rule to add
it to the current security policy. If the rule is active, you can Deactivate it
to remove the rule from the current security policy but not from
the system. To activate or deactivate multiple rules at the
same time, select the rules and then select Activate
Selected or Deactivate Selected from
the menu |
Edit | Edit the rule definition. Selecting this
option opens the rule configuration dialog and allows you to change
the rule definition. For more information, see Create
an Exploit Protection Rule. |
Import Rules/Export Selected | From the action menu |
Show Default Rules/Hide Default
Rules | From the action menu |
Clone | When you show default rules and then select
a rule, the ESM Console displays additional details about the rule
settings and an option to Clone the rule.
Cloning enables you to create a new rule that overwrites the default
policy settings. For more information, see Show
or Hide the Default Policy Rules. |