How-to apply a Policy to a specific Configuration Profile and apply it to an Endpoint.
A Configuration Profile greatly simplifies ensuring that the desired protections and settings are as you intended for that specific endpoint or endpoint group.
- To apply a policy to an endpoint, the policy must first be applied to a Configuration Profile. Navigate to the System Configuration | Config Profiles page.
- To create a Configuration Profile, click the Add New Profile button at the top of the page.
- On the New Configuration Profile pop-up menu, you can configure exactly what actions ZeroLock will take for each protection engine. Here settings can be fine-tuned for Ransomware, Cryptojacking, and Tampering protection, as well as settings for all Hash Rules set to deny based on a SHA-256 hash.
- In order to apply the policy that was created, navigate to the Default Control Policy drop-down menu, and select the preferred policy. Only one policy may be applied to a Configuration Profile at a time. Once complete, select the Create button at the bottom of the menu.
- In order to apply the policy that was created, navigate to the Default Control Policy drop-down menu, and select the preferred policy. Only one policy may be applied to a Configuration Profile at a time. Once complete, select the Create button at the bottom of the menu.
4. On successfully creating a new configuration profile you are returned to the Configurations Profiles page.