Rule Types for Each Endpoint Security Component
The table shows if the policy for each Endpoint Security component is enforced for each user or for each computer (the Rule Type).
The table also shows that you can define a Connected policy for all components. For some components you can also define Disconnected and Restricted policies.
|
Note - Deployment Rules are defined for computers, not for users. |
Component |
Rule Type |
Connected |
Disconnected |
Restricted |
---|---|---|---|---|
Computer |
|
|
|
|
User |
|
|
|
|
OneCheck |
User |
|
|
|
User |
|
|
|
|
User |
|
|
|
|
SandBlast Agent Anti-Ransomware, Behavioral Guard and Forensics |
Computer |
|
|
|
User |
|
|
|
|
SandBlast Agent Threat Extraction |
User |
|
|
|
User |
|
|
|
|
Computer |
|
|
|
|
Firewall |
User |
|
|
|
Access Zones |
User |
|
|
|
User |
|
|
|
|
Client Settings |
User |
|
|
|