Assigning policies to endpoints
You can manage security settings on endpoints using policies.
From the Network page you can view, change and assign policies for each endpoint or group of endpoints.
Note
Security settings are available for managed endpoints only. To easier view and manage security settings, you can filter the network inventory only by managed endpoints.
To view the policy assigned to a particular endpoint:
Go to the Network page.
Select the group that you want from the left-side pane. All endpoints from the selected group are displayed in the right-side pane table.
Click the name of the managed endpoint you are interested in. An information window will appear.
Under General tab, in the Policy section, click the name of the current policy to view its settings.
You can change security settings as needed, provided the policy owner has allowed other users to make changes to that policy.
Note
Any change you make will affect all the endpoints assigned with the same policy.
For more information about changing policy settings, refer to this section.
To assign a policy to a computer or a group:
Go to the Network page.
Select the group that you want from the left-side pane. All endpoints from the selected group are displayed in the right-side pane table.
Select the check box of the endpoint or group that you want. You can select one or several objects of the same type only from the same level.
Click the
Assign policy button at the upper side of the table.Make the necessary settings in the Policy assignment window.
For more information, refer to Assigning policies.
Assigning policies to containers
You can manage security settings on containers using policies.
From the Network page you can view, change and assign policies for each container or container host.
Note
You can assign only on-access policies to container. This limitation does not extend to container hosts.
To view the security settings assigned to a particular container:
Go to the Network page.
Select the container host that you want from the left-side pane. All containers from the selected container host are displayed in the right-side pane table.
Click the name of the container host you are interested in. An information window will appear.
Under General tab, in the Policy section, click the name of the current policy to view its settings.
You can change security settings as needed, provided the policy owner has allowed other users to make changes to that policy.
Note
Any change you make will affect all the containers assigned with the same policy.
For more information about container policy settings, refer to this section.
To assign a policy to a container or a container host:
Go to the Network page.
Select the container host that you want from the left-side pane. All containers from the selected container host are displayed in the right-side pane table.
Select the check box of the entity that you want. You can select one or several objects of the same type only from the same level.
Click the
Assign Policy button at the upper side of the table.Make the necessary settings in the Policy assignment window.
Page Menu
- Bitdefender – GravityZone
- Threats Xplorer
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Endpoint types
- Add Mailbox
- Configure Email
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Allow file download blocked by Bitdefender
- Email Security Licensing & Provisioning
- Check my monthly subscription for Bitdefender Security for AWS
- Viewing notifications
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Create reports
- Report types
- Reports
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Repair client
- Restart machine
- Features distribution
- Network discovery
- Container Protection
- Update client
- Security for Storage
- Uninstall client
- eXtended Detection and Response (XDR)
- Install
- Endpoint Risk Analytics (ERA)
- Patch tasks
- Sandbox Analyzer
- Exchange scan
- Security for Exchange
- Deleting policies
- Full Disk Encryption
- Scan
- Email Security
- Scan for IOC
- Risk scan
- Device Control
- Computer policies
- Patch Management
- Renaming policies
- Network Attack Defense
- Changing policy settings
- Content Control
- Configuring profiles
- Firewall
- Assigning policies
- Advanced Anti-Exploit
- Creating policies
- HyperDetect
- Troubleshooting
- Advanced Threat Control
- Patch tasks
- Antimalware
- Credentials Manager
- Introduction
- Best practices
