Follow the steps below to access the advanced settings:
Click the Settings menu.
Click the profile to configure.
In the menu on the left, click Windows and Linux.
Click Advanced settings.
Here you can configure aspects related to the installation of the protection on computers, as well as the connection of these computers to the Internet and to the Endpoint Protection servers. You can also configure options related to the suspicious file quarantine.
Indicate in which directory you want to install the protection. Endpoint Protection will show a default path, which you can change if you want.
Automatically uninstalling other security products
You can specify if you want Endpoint Protection to uninstall any existing third-party security products from your computers, or if you prefer both products to coexist.
Bear in mind that if you choose to uninstall all existing third-party security software on a specific configuration profile, every computer that has that profile assigned will have its protection removed as soon as it receives the new configuration.
For more information about the default behavior for the different versions of the protection (trial or commercial versions), click here.
On Linux computers, the protection is installed in a default folder that cannot be changed.
Administrators can disable scans with Collective Intelligence. It is advisable to keep this option enabled if you want to benefit from all the protection provided by Collective Intelligence.
On Linux computers it is not possible to disable the connection to Collective Intelligence. Therefore, as long as a Linux computer is connected to the Internet, the installed protection will leverage Collective Intelligence.
Establish how often you want the computer to send information to the Endpoint Protection servers about the status of the protection installed.
You can change the default frequency, but it must be a value between 12 and 24 hours.
You can also specify the computer through which connections with the Endpoint Protection server are centralized.
To do this, select the relevant checkbox and click Select. In the Select computer window, choose a computer or search for it using the Find button. Then click OK.
To check the requirements of the computer used to establish connections with the server, click here.
Files in quarantine are analyzed to determine whether they represent a threat or not.
If they do not represent a threat, you can restore them by using the Restore option in the Quarantine window and indicating the path to which they must be restored.
This option is not available for Linux or OS X computers.
The administrator password allows you to uninstall and configure the local protection in administrator mode. That is, it allows you to uninstall Endpoint Protection from the network computers, or allow end users themselves to enable or disable their protection from the Endpoint Protection local console. These options are not mutually exclusive, so you can select both at the same time.
This section also allows you to enable the new Anti-Tamper protection, which prevents unauthorized users and certain types of malware from stopping the protection installed on the network.
Click here for more information about administrator mode.