Specifications and Configurations

In this document, you will find comprehensive information regarding the specifications of the system, including compatibility details, supported operating systems, CPU consumption, RAM storage, and network bandwidth. Refer to the table below for a concise overview:

Specification Details
Compatibility Can seamlessly coexist with AVs and other third-party security programs.
Supported operating systems
      Windows 8
      Windows 8.1
      Windows 10
      Windows 11
CPU consumption Less than 1%.
RAM storage Less than 100MB.
Network bandwidth Negligible bandwidth

Configurations

To configure the below mentioned settings : In the Endpoint Central console navigate to > Next-Gen Antivirus > Settings.

  • Exclusions

    In certain scenarios, you may need to exclude specific files or folders from the scrutiny of Next-Gen Antivirus to accommodate your unique requirements. This can be particularly useful for preventing false positives or avoiding interference with trusted applications. Refer to this guide to add exclusions.

    Note : Exercise caution when configuring exclusions, as mismanagement may pose security risks; consult with IT security personnel for guidance.

  • Notification Settings:

    In Next-Gen Antivirus, you have the capability to enable alert notifications, ensuring that your cybersecurity team and users stay informed. This proactive approach enhances your overall security posture. Here's how you can configure it:

    • Administrator alerts:
      • Receive alerts via email for timely notification.
      • Stay informed on-the-go with mobile app notifications.
    • User Endpoint Notifications:
      • Users receive direct alerts on their endpoints for immediate.
  • Detection settings
    • Ransomware Detection Engine :
      • Audit only : Detects and alerts on identifying any ransomware incidents and is recommended to be used during the initial deployment. Once the incident is marked as True Positive, the files can be restored by a single click.
      • Kill mode : Detects and kills the ransomware and its child processes. It is recommended to deploy the configuration post auditing.
    • DeepAV ( Deep learning based antivirus ) :
      • Audit only : Detects and alerts on identifying any ransomware incidents.
      • Prevent :Blocks the execution of malicious processes by intercepting them before they can run.
    • Behavior Detection Engine :
      • Enabling behavior based detection will ensure detection of any suspicious activity in the enterprise network.