Target objects define the scope of a rule and the endpoints to which a rule applies. An object can be one of the following:
A user defined in Active Directory.
Traps evaluates the logged on user the moment the user logs on. As a result, Traps will apply the policy of the logged on user regardless of the account used to open or run files.
The name of a computer or mobile device defined in Active Directory.
Computer names may be offered as autocompletions even if they are not presently running Traps.
A user group defined in Active Directory.
The Endpoint Security Manager does not support the following groups in Active Directory:
If you rename any of these groups in Active Directory, the ESM Console can present the group as an option to which you can apply policy, however, the renamed group is not supported.
AD Organizational Unit
A subdivision within Active Directory into which you can place users, groups, computers, and other organizational units.
A computer or mobile device on which the Traps agent is installed. The Endpoint Security Manager identifies existing endpoints by communication messages it receives from Traps agents.
A static or dynamic group whose membership is defined by specific endpoint characteristics such as hostname or IP address. To create an endpoint group, see Manage Endpoint Groups.
For objects defined in Active Directory, the ESM Console provides autocompletion as you type. Rules that you define for AD users and AD groups will apply to those users and groups, regardless of the endpoint on which they log in.
You can apply rules to all objects, to selected objects, or to all objects except those in the Exclude list.
Uninstall or Upgrade Traps on the Endpoint
Uninstall or Upgrade Traps on the Endpoint Create a new agent actions rule to uninstall Traps from the target objects or upgrade Traps using software ...
Hide or Restrict Access to the Traps Console
Hide or Restrict Access to the Traps Console By default, a user can access the Traps Console to view information about the current status of ...
Add a New Action Rule
Add a New Action Rule For each action rule, you can specify organizational objects, conditions, and actions to take on each endpoint. Action rules apply ...
Define Event Logging Preferences
Define Event Logging Preferences Traps stores event information and quarantined files in a temporary local storage folder. To adjust the size of the disk quota, ...
Change the Uninstall Password
Change the Uninstall Password By default, you must enter the uninstall password specified during installation to uninstall Traps from an endpoint. Change the default password ...
Create an Exploit Protection Rule
Create an Exploit Protection Rule An exploit protection rule uses exploit protection modules (EPMs) to protect processes in your organization from specific exploitation techniques. Each ...
Manage Service Protection
Manage Agent Tampering Protection Agent tampering protection allows you to protect the Traps agents running on your endpoints. For flexible, granular control over agent tampering ...
Collect New Process Information
Collect New Process Information By default, Traps protects the most commonly used and well-known processes on your endpoints. In addition, when WildFire is enabled, Traps ...
Define Heartbeat Settings Between the Agent and the ESM Ser...
Define Heartbeat Settings Between the Agent and the ESM Server During the heartbeat communication, the Traps agent requests the current security policy and sends a ...