Advanced configuration of the application

In this section

Computer protection scope

File Threat Protection

Web Threat Protection

Network Threat Protection

Scan

Update tasks

Local tasks

Backup

Reports

Managed Detection and Response

Endpoint Detection and Response (KATA)

Endpoint Detection and Response Optimum

FileVault Disk Encryption

Password protection

Page top