How to apply a Policy to a specific Configuration Profile and then to an Endpoint.
A Configuration Profile greatly simplifies ensuring that the desired protections and settings are as you intended for that specific endpoint or endpoint group.
- To apply a policy to an endpoint, the policy must first be applied to a Configuration Profile. Navigate to the System Configuration | Config Profiles page.
- To create a Configuration Profile, click the Add New Profile button at the top of the page.
- On the New Configuration Profile pop-up menu, you can configure exactly what actions ZeroLock® will take for each protection engine. Here settings can be fine-tuned for Ransomware, Cryptojacking, and Tampering protection, as well as for all Hash Rules set to deny based on an SHA-256 hash.
- To apply a policy to an endpoint, the policy must first be applied to a Configuration Profile. After naming and providing a description, navigate to the Default Control Policy block and, from the drop-down menu, select the policy you created. Only one policy may be applied to a Configuration Profile at a time. When done, select the CREATE button at the bottom of the menu.
- On successfully creating a new configuration profile you are returned to the Configurations Profiles page where you see the policy profile you created.