Assigning policies to endpoints
You can manage security settings on endpoints using policies.
From the Network page you can view, change and assign policies for each endpoint or group of endpoints.
Note
Security settings are available for managed endpoints only. To easier view and manage security settings, you can filter the network inventory only by managed endpoints.
To view the policy assigned to a particular endpoint:
Go to the Network page.
Select the group that you want from the left-side pane. All endpoints from the selected group are displayed in the right-side pane table.
Click the name of the managed endpoint you are interested in. An information window will appear.
Under General tab, in the Policy section, click the name of the current policy to view its settings.
You can change security settings as needed, provided the policy owner has allowed other users to make changes to that policy.
Note
Any change you make will affect all the endpoints assigned with the same policy.
For more information about changing policy settings, refer to this section.
To assign a policy to a computer or a group:
Go to the Network page.
Select the group that you want from the left-side pane. All endpoints from the selected group are displayed in the right-side pane table.
Select the check box of the endpoint or group that you want. You can select one or several objects of the same type only from the same level.
Click the
Assign policy button at the upper side of the table.
Make the necessary settings in the Policy assignment window.
For more information, refer to Assigning policies.
Assigning policies to containers
You can manage security settings on containers using policies.
From the Network page you can view, change and assign policies for each container or container host.
Note
You can assign only on-access policies to container. This limitation does not extend to container hosts.
To view the security settings assigned to a particular container:
Go to the Network page.
Select the container host that you want from the left-side pane. All containers from the selected container host are displayed in the right-side pane table.
Click the name of the container host you are interested in. An information window will appear.
Under General tab, in the Policy section, click the name of the current policy to view its settings.
You can change security settings as needed, provided the policy owner has allowed other users to make changes to that policy.
Note
Any change you make will affect all the containers assigned with the same policy.
For more information about container policy settings, refer to this section.
To assign a policy to a container or a container host:
Go to the Network page.
Select the container host that you want from the left-side pane. All containers from the selected container host are displayed in the right-side pane table.
Select the check box of the entity that you want. You can select one or several objects of the same type only from the same level.
Click the
Assign Policy button at the upper side of the table.
Make the necessary settings in the Policy assignment window.
Page Menu
- Bitdefender – GravityZone
- Report types
- Repair client
- Reconfigure client
- Configuration
- Operation
- Operation
- Best practices
- Viewing and managing scheduled reports
- Announcements
- Executive Summary
- Reports
- Restart machine
- Create reports
- Deleting notifications
- Configuring notification settings
- Taking report-based actions
- Saving reports
- Emailing reports
- Printing reports
- Notifications
- Notification types
- Viewing notifications
- Risk scan
- Best practices
- Credentials Manager
- Patch tasks
- Troubleshooting
- Creating policies
- Assigning policies
- Configuring profiles
- Changing policy settings
- Renaming policies
- Computer policies
- Check my monthly subscription for Bitdefender Security for AWS
- Scan for IOC
- Scan
- Deleting policies
- Exchange scan
- Patch tasks
- Install
- Uninstall client
- Update client
- Network discovery
- Patch Management
- Deleting endpoints
- Threats Xplorer
- Introduction
- Antimalware
- Advanced Threat Control
- HyperDetect
- Advanced Anti-Exploit
- Firewall
- Content Control
- Network Attack Defense
- Using Recovery Manager for encrypted volumes
- Device Control
- Email Security
- Full Disk Encryption
- Security for Exchange
- Sandbox Analyzer
- Endpoint Risk Analytics (ERA)
- eXtended Detection and Response (XDR)
- Security for Storage
- Container Protection
- Endpoint types
- Email Security Licensing & Provisioning
- Install Security Server through Control Center
- Install security agents – standard procedure
- Install Security Server manually
- AD Connect
- Bitdefender Endpoint Security Tools for Linux quick start guide
- Install security agents – use cases
- Whitelist Email
- Configure Email
- Add Mailbox
- Features distribution
- Network inventory
- Checking the endpoints status
- Viewing endpoint details
- Organizing endpoints into Groups
- Sorting, filtering and searching for endpoints
- Viewing and managing tasks
- Running tasks
- Creating quick reports
- Assigning policies