Professional Documents
Culture Documents
Panda Report As
Panda Report As
Panda Report As
Disabled protection, Protection with errors ,Install error etc. indicates that something may not
be quite right with the protection on those devices. You need to uninstall or install them to
clear those issues up.
Offline computers
Shows the number of computers that have not connected to the Panda Security cloud for a number of days. These
computers might be susceptible to security problems and require attention.
Outdated protection
These computers might be vulnerable to attacks from threats.
An indicator that is highly likely to be a cyberattack. These are generally attacks in early stages or in exploit phase. These
attacks do not normally use malware, as adversaries usually use the operating system’s own tools to execute the attack
and thereby hide the traces of their activity.
Before making an update to entire machines in the organization , we can test it on a group of
devices or a device specifically for knowing the impact of the update / upgrade.
Per-computer testing→ Testing
Exclusion
Prevents certain items or areas on the computer from being scanned. Unknown software is not blocked from running.
This, however, can open a security hole and is not recommended except where there are problems with the computer’s
performance. Authorized software module is recommended instead of exclusions.
Authorized software
Unlike exclusions it allows but not ignores.
Click the Authorize programs link to create a rule with the following information. Then, click Authorize:
Firewall
Panda Adaptive Defense 360 monitors the communications sent and received by each computer on the network, blocking
all traffic that matches the rules defined by you.
• System rules: Describe communication characteristics (ports, IP addresses, protocols, etc.), allowing or denying
the data flows that match the configured rules.
• Program rules : Allow or prevent the programs installed on users’ computers from communicating with other
computers.
• Intrusion detection system: Detects and rejects malformed traffic patterns that can affect the security or
performance of protected computers.
Device control
The device control feature enables you to control the behavior of protected Windows computers when they
connect to a removable or mass storage device. You can select the device or devices you want to authorize or
block, and specify their usage.