When you first configured Endpoint Protection, you selected one of its default policies. A policy defines the SecureAnywhere settings on endpoints, such as the scan schedule and shielding behavior. 

            

You can continue to use your selected default policy or you can define more policies and assign them to endpoints. For example, you might want to give system administrators more control than you would other employees. In that case, you could create a new policy for administrators and keep everyone else on the default policy.

            

Note: To fully implement policies, you must have access permissions for Policies: Create & Edit and Policies: Assign Policies to Endpoints. To change access permissions, see Setting Console User Permissions.

            

To implement a policy:

            

  1. Log in to your Endpoint Protection console.

    The Endpoint Protection console displays, with the Status tab active.

            

  1. Click the Policies tab. 

                                               

    The Policies tab displays.

                                     

  

  1. Decide if you want to keep using your default policy.

    Your default policy is located on the left side of the pane, and is indicated by a white, horizontal arrow. 



  2. Double-click on your default policy to display the settings. 

    • Settings that apply to PC only are indicated by the Windows icon.

    • Settings that apply to PC and Mac are indicated by both the Windows icon and the Mac icon.

Note: You cannot see any settings for the Unmanaged policy, because that policy specifies that endpoint users have control, not the administrator. 


  1. Review the policy settings and determine if the default policy meets your business requirements. If not, as you cannot modify the Webroot defaults, you will need to create a new policy.

     For more information, see Creating Policies.
                   

  2. Once you create new policies, you can assign them to endpoints in the Group Management tab.

    For more information, see Applying Policies to Endpoint Groups.