ICDM Policy Type and Required Protection Component Features
search cancel

ICDM Policy Type and Required Protection Component Features

book

Article ID: 271561

calendar_today

Updated On:

Products

Endpoint Security Complete

Issue/Introduction

You would like to know what are the protection component feature require for each of the ICDM Policy Types.

Resolution

 

Policy Type

Protection Features Required (Components)

Documents

Adaptive Protection

  • Malware Protection
  • Behavioral Analysis (SONAR) 

Using Adaptive Protection

App Control

  • Application Control (Application Hardening)

Application Control

Compliance

  • Firewall
  • Policy targeting Quarantine rule: The Default Quarantine Firewall Policy is automatically targeted to these devices to restrict them

Using Host Integrity

Custom Application Behavior

  • Custom Application Behaviors
  • Device Control

Managing Custom Application Behaviors

Detection and Response

  • Integrated with the SES agent.
  • SONAR is needed for Recorder data.

 

Note: Make sure you have the required SES Complete (SESC) subscription to view and enable the Detection and Response policy on the cloud console.

Getting started with Symantec Endpoint Detection and Response

Device Control

  • Custom Application Behaviors
  • Device Control

Blocking or allowing an external device using Device Control

Exploit Protection

  • Memory Exploit Mitigation is only available if you have installed Intrusion Prevention.

Managing Memory Exploit Mitigation (MEM) policies

Firewall

  • Firewall

 

Note: If Firewall is enabled, Intrusion Prevention is also enabled automatically. If Firewall is disabled, Intrusion Prevention can be either disabled or enabled.

Managing the Symantec Endpoint Security firewall

Intrusion Prevention

  • Intrusion Prevention

 

Note: If Intrusion Prevention is disabled, Firewall is also disabled automatically. If Intrusion Prevention is enabled, Firewall can be either enabled or disabled.

Managing intrusion prevention in Symantec Endpoint Security

Malware Protection

  • Antimalware
  • Behavioral Analysis (SONAR) installed by Default
  • Includes Adaptive Protection

Antimalware policy - Advanced Settings

Network Integrity

  • Secure Connection protection For Windows 10 only.
  • Integrated with the SES agent.
  • Network Integrity automatically detects and validates rogue Wi-Fi networks and spoofed carrier networks.

Network Integrity FAQs

Getting started with Network Integrity

Threat Defense for AD

  • Threat Defense for Active Directory.

 

Note: Must have Symantec Agent 14.3 RU4 or later to leverage the breach prevention features of Threat Defense for AD in the cloud console.

Using Threat Defense for Active Directory

Web and Cloud Access Protection

  • Web and Cloud Access Protection

Getting started with Web and Cloud Access Protection

Allow List

  • Symantec Integrated Cyber Defense Manager (ICDm) - Integrated with the SES agent.

Managing denied items and allowed items from the central list

Deny List

  • Symantec Integrated Cyber Defense Manager (ICDm) - Integrated with the SES agent.

Managing denied items and allowed items from the central list

Feature Selection

  • Symantec Integrated Cyber Defense Manager (ICDm) - Integrated with the SES agent.

Using the Feature Selection policy to assign protection features to Windows devices

System

  • Symantec Integrated Cyber Defense Manager (ICDm) - Integrated with the SES agent.

System policy: General settings

Trusted Updater

  • Tied to App Control
  • Symantec Integrated Cyber Defense Manager (ICDm) - Integrated with the SES agent.

Specifying trusted updaters