Click Deployment on Windows in the side menu. A section will be displayed with four tabs to configure the agent's behavior with respect to updates, scheduled scans, warnings and advanced installation and connectivity settings.
Refer to chapter Updating the protection on Windows systems for more information about updates
Here you can configure aspects related to the installation of the protection on computers, as well as the connection of these computers to the Internet and to the Adaptive Defense servers. You can also configure options related to the suspicious file quarantine.
Specify in which directory you want to install the protection. Adaptive Defense will show a default path, which you can change if you want.
You can specify if you want Adaptive Defense to uninstall any existing third-party security products from your computers, or if you prefer both products to coexist. Bear in mind that if you choose to uninstall all existing third-party security software on a specific configuration profile, every computer that has that profile assigned will have its protection removed as soon as it receives the new configuration.
Click here for a complete list of the antivirus solutions that Adaptive Defense uninstalls automatically.
Establish how often you want computers to send information to the Adaptive Defense servers about the status of the protection installed. This must be a value between 12 and 24 hours.
Centralize server communication through the following computer:
Specify the computer through which connections with the Adaptive Defense server will be centralized. To do that, select the relevant checkbox and click Select. In the Select computer window, choose a computer or search for it using the Find button. Then click OK.
The administrator password allows you to uninstall and configure the local protection in administrator mode. That is, it allows you to uninstall Adaptive Defense from the network computers, or allow end users themselves to enable or disable their protection from the Adaptive Defense local console. These options are not mutually exclusive, so you can select both at the same time.
This section also allows you to enable the new Anti-Tamper protection, which prevents unauthorized users and certain types of malware from stopping the protection installed on the network.