You would like to know what are the required protection features (components), for each of the ICDM Policy Types.
Symantec Endpoint Security (SES)
|
Policy Type |
Protection Features Required (Components) |
Documents |
|
Adaptive Protection |
|
|
|
App Control |
|
|
|
Compliance |
|
|
|
Custom Application Behavior |
|
|
|
Detection and Response |
Note: Make sure you have the required SES Complete (SESC) subscription to view and enable the Detection and Response policy on the cloud console. |
Getting started with Symantec Endpoint Detection and Response |
|
Device Control |
|
Blocking or allowing an external device using Device Control |
|
Exploit Protection |
|
|
|
Firewall |
Note: If Firewall is enabled, Intrusion Prevention is also enabled automatically. If Firewall is disabled, Intrusion Prevention can be either disabled or enabled. |
|
|
Intrusion Prevention |
Note: If Intrusion Prevention is disabled, Firewall is also disabled automatically. If Intrusion Prevention is enabled, Firewall can be either enabled or disabled. |
|
|
Malware Protection |
|
|
|
Network Integrity |
|
|
|
Threat Defense for AD |
Note: Must have Symantec Agent 14.3 RU4 or later to leverage the breach prevention features of Threat Defense for AD in the cloud console. |
|
|
Web and Cloud Access Protection |
|
|
|
Allow List |
|
Managing denied items and allowed items from the central list |
|
Deny List |
|
Managing denied items and allowed items from the central list |
|
Feature Selection |
|
Using the Feature Selection policy to assign protection features to Windows devices |
|
System |
|
|
|
Trusted Updater |
|