Processes Protected by the Default Policy
Table of Contents
4.2 (EoS)
Expand all | Collapse all
-
- Set Up the Endpoint Infrastructure
- Activate Traps Licenses
-
- Endpoint Infrastructure Installation Considerations
- TLS/SSL Encryption for Traps Components
- Configure the MS-SQL Server Database
- Install the Endpoint Security Manager Server Software
- Install the Endpoint Security Manager Console Software
- Manage Proxy Communication with the Endpoint Security Manager
- Load Balance Traffic to ESM Servers
-
- Malware Protection Policy Best Practices
- Malware Protection Flow
- Manage Trusted Signers
-
- Remove an Endpoint from the Health Page
- Install an End-of-Life Traps Agent Version
-
-
- Traps Troubleshooting Resources
- Traps and Endpoint Security Manager Processes
- ESM Tech Support File
-
- Access Cytool
- View the Status of the Agent Using Cytool
- View Processes Currently Protected by Traps Using Cytool
- Manage Logging of Traps Components Using Cytool
- Restore a Quarantined File Using Cytool
- View Statistics for a Protected Process Using Cytool
- View Details About the Traps Local Analysis Module Using Cy...
- View Hash Details About a File Using Cytool
Processes Protected by the Default Policy
The Endpoint Security Manager and Traps come preconfigured
to protect common applications and processes. These processes vary depending on the associated content
update version. To determine which processes are supported in a
given release, look up the content update version associated with
the release (see Associated Software Versions) and then
review the release notes for the content update on the Support portal.
The process type, as shown on the Process Management page,
does not indicate whether a process is used in the default security
policy. Instead, the process type only indicates whether the process
can be used in an exploit protection rule. For more information,
see Process
Protection Types.