Configuration of the Configuration Profiles

From Securepoint Wiki




| Last adaptation to the version:}}
























































































De.png
En.png
Fr.png


This Wiki article explains how to create and manage configuration profiles in the Antivirus Pro Portal.

Last adaptation to the version: 3.1 (10.2019)

New:



Overview of the Configuration Profiles

Overview of the Configuration Profiles

All existing configuration profiles are displayed in this menu. Here, configuration profiles can be edited, created or deleted.
Any number of configuration profiles can be created. This allows different areas, locations or departments to be mapped and differentiated.

Aktion Beschreibung

Konfigurationsprofil bearbeiten

Konfigurationsprofil bearbeiten

Konfigurationsprofil clonen

Legt eine neues Konfigurationsprofil an und kopiert alle Einstellungen des gewählten Profils

Konfigurationsprofil löschen

Löscht das Konfigurationsprofil. Nur möglich, wenn keine Objekte mit diesem Prodil verknüpft sind.

Creating a Configuration Profile

  Creating a Configuration Profile


Profile settings

Profile settings

Caption Description
Name Free choice of name for the configuration profile.
Owner Firm , which is to have access to the profile can be selected as the owner.

The assignment of the owner to a company determines who can use this configuration profile. When a configuration profile is created for a reseller (at the top of the group hierarchy), only that reseller has access to that profile. If a profile is created for a customer, this customer and the reseller can access the profile and define recipients for notifications.
  Configuration profiles that should not be visible to the end customer must be assigned to the reseller company.  

takes over the settings. A transfer to the clients takes place in the menu  Groups with to all devices assigned to this profile of one group.

Save & transmit

New New function 
accepts the settings and transfers them directly to all clients assigned to this profile in all groups.



MSI configuration

MSI configuration

The following parameters can be set for the MSI configuration.
Caption Default Description
System protection    Real-time monitoring of the entire system
Email Protection    Scans emails for malware & viruses
Spam protection    Checks emails for spam
Automatic Updates    Automatic verification and installation of new software updates and virus database updates
Update following installation    One-time virus database and software update after installation
Autoscan    This option can be used to configure an automatic scan.
Daily Scan    The scan is performed daily
Weekly Scan Day of the week The scan is performed once a week on that day.
Monthly Scan dd The scan is performed once a month on that day.
Scan type Choice of   Only one preconfigured scan type can be defined.  
Quick system check checks the Windows installation directory.
Most computer malware on a Windows system is located in this directory.
System partitions checks the drive or partition on which the operating system is located.
This checks all archives, directories, folders, and files on the system partition.
Entire computer checks all drives of the local PC, including plugged in USB drives.
Scan time 17:00 Time at which the scan is to be performed (17:00 if not specified)
Proxy IP address  
Proxy Port   The port number must be between 1 and 65535.
Proxy Athentification    If activated, the MSI user name and password will be requested during the download.



Exclusions

Exclusions

The following exclusions can be configured:

Type Parameter
File & Folder Exclusion File & folder path e.g.: C:\example_folder or C:\example_folder\exclusion_01.exe
Process exclusion Process name e.g: Exclusion.exe
Theses Actions are available:
Add exclusions
New     Export exclusions Exclusions can be exported and saved as .txt files.
New     Import exclusions Exclusions can be imported as .txt files.
If a file contains more than 250 exclusions, it will be truncated after 250 entries.
Edit Exclusion
Deletes this exclusion



Client configuration

Client configuration

Extras

Caption Default Description
Setting the password    The password is entered when transferring the configuration.
We recommend that passwords be stored in a password store, as we do not store passwords.

Caption Default Description

System protection
Monitoring the system    Can be disabled in the Guard section.
PUA and PUP detection    Can be disabled in the Guard section.
System monitoring after reboot    Can be deactivated in the Tools menu → Settings / tab Extras.
Use default settings    Can be deactivated in the Tools menu → Settings / tab Exclusions.
Maximum file size (In MB) 128 Size in MB up to which files are scanned.
nn Default value in the default settings 128 MB
Participate in signature quality assurance    Can be deactivated in the Tools menu → Settings / tab Extras.

Email Protection
Monitoring emails    Can be deactivated in the Tools menu → Settings / Email.
Save infected attachments    Can be deactivated in the Tools menu → Settings / Email.

Anti-SPAM
Enable Anti-SPAM    Can be activated in the menu Extra → Settings / Tab Anti-SPAM.
Check online    Additionally checks against online blacklists and databases. Requires more time.
Action on SPAM email auswahl}} Can be configured in the Extra menu → Settings / tab Anti-SPAM
Possible Spam Scoring 3 Can be configured in the Extra menu → Settings / tab Anti-SPAM
Spam Scoring 7 Can be configured in the Extra menu → Settings / tab Anti-SPAM

Update
Search for updates automatically    Can be disabled in the Extra menu → Settings / tab Update.
Install product updates automatically    Can be disabled in the Extra menu → Settings / tab Update.

Logging
Log system supervision in the main log    Can be activated in the Tools menu → Settings / tab Logging.
Record logs for scans    Can be activated in the Tools menu → Settings / tab Logging.
Record all data when scanning    Can be activated in the Tools menu → Settings / tab Logging.
Overwrite logs    Can be activated in the Tools menu → Settings / tab Logging.

Extras
Use Proxy-Server    Can be activated in the Tools menu → Settings / tab Update.
Use System Proxy    Can be activated in the Tools menu → Settings / tab Update.
Proxyserver Address     Can be activated in the Tools menu → Settings / tab Update.
Proxyserver port     Can be activated in the Tools menu → Settings / tab Update.
Proxyserver login    Can be activated in the Tools menu → Settings / tab Update.
Password protection    Can be activated in the Tools menu → Settings / tab Extras at Password protection.
New  Join reseller preview    The client receives beta versions with partly new and revised functions.
Even if these versions already have a high quality standard, they should not be used on critical productive systems.



Notification settings

Notification settings

  Notifications are only sent for devices that are linked to this configuration profile via their group membership.  

Notification settings
Caption Default Description
Outdated after 28 Number of days after which a device is to be reported as outdated. The value must be an integer!
Time of examination 8 o'clock Time at which the status 'outdated' is checked.


Recipient settings

Caption Parameter Description
Recipient Selection or input An existing user or an e-mail address can be defined for notifications.
  Recipient settings
Virus found   
Security status Client insufficient   
Client not up to date   
Actions Deletes the notifications for this recipient.

Benachrichtigungsmail

The notification e-mail contains information about

  • the affected device
  • the found virus
  • Date and time of the find
  • New   File path and name
  • a link to mute (no further notifications)