Panda Report As

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Panda Adaptive Defense 360

The Management Console

Disabled protection, Protection with errors ,Install error etc. indicates that something may not
be quite right with the protection on those devices. You need to uninstall or install them to
clear those issues up.

Offline computers
Shows the number of computers that have not connected to the Panda Security cloud for a number of days. These
computers might be susceptible to security problems and require attention.

Outdated protection
These computers might be vulnerable to attacks from threats.
An indicator that is highly likely to be a cyberattack. These are generally attacks in early stages or in exploit phase. These
attacks do not normally use malware, as adversaries usually use the operating system’s own tools to execute the attack
and thereby hide the traces of their activity.

Before making an update to entire machines in the organization , we can test it on a group of
devices or a device specifically for knowing the impact of the update / upgrade.
Per-computer testing→ Testing

Exclusion
Prevents certain items or areas on the computer from being scanned. Unknown software is not blocked from running.
This, however, can open a security hole and is not recommended except where there are problems with the computer’s
performance. Authorized software module is recommended instead of exclusions.

Authorized software
Unlike exclusions it allows but not ignores.

Click the Authorize programs link to create a rule with the following information. Then, click Authorize:
Firewall
Panda Adaptive Defense 360 monitors the communications sent and received by each computer on the network, blocking
all traffic that matches the rules defined by you.
• System rules: Describe communication characteristics (ports, IP addresses, protocols, etc.), allowing or denying
the data flows that match the configured rules.
• Program rules : Allow or prevent the programs installed on users’ computers from communicating with other
computers.
• Intrusion detection system: Detects and rejects malformed traffic patterns that can affect the security or
performance of protected computers.

Device control
The device control feature enables you to control the behavior of protected Windows computers when they
connect to a removable or mass storage device. You can select the device or devices you want to authorize or
block, and specify their usage.

Web access control


With this protection, you can limit access to specific web content categories and individual URLs to optimize
network bandwidth and increase business productivity.
Denying access to specific web pages : Panda Adaptive Defense 360 groups the web pages it classifies
into 160 content categories. To deny access to a certain type of web content category, select it from the list. If a
user visits a web page that belongs to one of the forbidden categories, a warning web page is displayed indicating
that access is denied and the reason.
Denying access to pages categorized as unknown : You can deny access to uncategorized pages
by selecting the toggle Deny access to pages categorized as unknown.

You might also like