| Scan Method | 
Smart Scan: Smart scan agents benefit from local
                                    scans and in-the-cloud queries provided by File Reputation Services.
Conventional Scan: A conventional scan agent stores
                                    all components on the endpoint and scans all files locally. | 
| Antivirus/Anti-Spyware |  | 
| Firewall |  | 
| Web Reputation |  | 
| URL Filtering | 
Enable URL Filtering: URL filtering helps you control access to
                                    websites to reduce unproductive employee time, decrease Internet bandwidth usage,
                                    and
                                    create a safer Internet environment. You can choose a level of URL filtering protection
                                    or
                                    customize which types of websites you want to screen. 
High: Blocks known or potential security threats, inappropriate
                                          or possibly offensive content, content that can affect productivity or bandwidth,
                                          and
                                          unrated pages
Medium:  Blocks known security threats and inappropriate
                                          content
Low (default): Blocks known security threats
Custom: Select your own categories, and whether you
                                          want to block the categories during business hours or leisure hours. | 
| Behavior Monitoring | 
Enable Behavior Monitoring: Behavior Monitoring protects clients
                                    from unauthorized changes to the operating system, registry entries, other software,
                                    or
                                    files and folders. 
Enable all ransomware protection features 
Enable document
                                                   protection against unauthorized encryption or
                                                   modification: Protects documents from
                                                unauthorized changes. 
|  | Note
Enabling this option stops processes that
                                                               rename, modify and delete files, and then quarantines the
                                                               programs that are running these processes. | 
Automatically back up and restore files modified by
                                                   suspicious programs: Automatically backs up files modified by suspicious
                                                programs if document protection is enabled.
Enable blocking of
                                                   processes commonly associated with ransomware:
                                                Protects endpoints from ransomware attacks by blocking processes
                                                commonly associated with hijacking attempts.
(Desktop groups only) Enable program
                                                   inspection to detect and block compromised executable
                                                   files: Increases detection by monitoring
                                                processes for ransomware-like behavior.
Enable Intuit QuickBooks
                                             Protection: Protects all Intuit QuickBooks files and
                                          folders from unauthorized changes by other programs. Enabling this
                                          feature will not affect changes made from within Intuit QuickBooks
                                          programs, but will only prevent changes to the files from other
                                          unauthorized applications. | 
| Predictive Machine Learning | 
Enable Predictive Machine Learning: Predictive
                                    Machine Learning protects your network from new, previously unidentified, or unknown
                                    threats through advanced file feature analysis and heuristic process monitoring. 
File 
Quarantine: Select to
                                                automatically quarantine files that exhibit
                                                malware-related features based on the Predictive
                                                Machine Learning analysis
Log
                                                   only: Select to scan unknown files and
                                                log the Predictive Machine Learning analysis for
                                                further in-house investigation of the threat
Process 
Terminate: Select to
                                                automatically terminate processes or scripts that
                                                exhibit malware-related behaviors based on the
                                                Predictive Machine Learning analysis 
|  | Important
Predictive Machine Learning attempts to clean the
                                                               files that executed the malicious processes or
                                                               scripts. If the clean action is unsuccessful,
                                                               Predictive Machine Learning quarantines the
                                                               affected files. | 
Log
                                                   only: Select to scan unknown processes
                                                or scripts and log the Predictive Machine Learning
                                                analysis for further in-house investigation of the
                                                threat | 
| Mail Scan |  |