Threat Prevention Browser Configurations

Configuring Threat Prevention

Threat Prevention safeguards users from accessing malicious websites, including phishing sites, malware sites, and sites that distribute malware. By configuring this policy, administrators can effectively protect users from a range of online threats, such as script execution vulnerabilities. This document will explain how to create the policy and about each configuration provided by Endpoint Central.

Kindly follow the steps given below to successfully create and deploy Threat Prevention policy:

  1. Open Endpoint Central console and navigate to Browsers -> Policies -> Threat Prevention.
  2. Click Create Policy and select the OS platform.
  3. Give a name for the policy.
  4. Refer below to know more about each of the Threat Prevention settings.
  5. Click Save to save the policy as a draft. Click Save & Publish to save the policy.
  6. Associate the policy to computers/groups of computers in which you want the isolation of web-applications to take place.


 

Threat Prevention

Settings under Threat Prevention

This document will explain each configuration for Threat Prevention provided by Endpoint Central and the browsers it is applicable for.

ConfigurationDescriptionSupported BrowsersSupported Platforms
Phishing FilterEnabling this setting, protect browser against malware, abusive sites, Insecure extensions, phishing, malicious, and social engineering attacks.Chrome, Edge, Firefox, Ulaa & Chromium BrowsersWindows, Mac
File DownloadsEnable - Enable all File Downloads
Disable - Disable all File Downloads
Restrict Malicious File Downloads - Allow downloads but blocks malware and phishing downloads
Chrome, Edge, Ulaa & Chromium BrowsersWindows, Mac
Over-ride certificate errorsRestricting this setting prevents the user from bypassing certificate errors and visiting potentially unsafe websites.Chrome, Edge, Firefox, Ulaa, Chromium BrowsersWindows, Mac
Verification of certificate with revocation listInternet Explorer's certificate revocation list verifies certificates against a list of revoked ones, enhancing security by preventing usage of compromised certificates.Internet ExplorerWindows
Zone Elevation ProtectionThis policy enables Zone Elevation Protection which ensures that content from a lower security zone cannot execute scripts in a higher security zone.Internet ExplorerWindows
Browser Helper ObjectThis policy disables third-party Browser Helper Objects, which can be used to extend browser capabilities, but can also be used maliciously.Internet ExplorerWindows
Flash RestrictionRestrict Flash plugins and content. Flash is deprecated and known for its security vulnerabilities.Edge, Internet ExplorerWindows
IE Plugin ProtectionPrevents installation of unsigned ActiveX controls or plugins, allowing only verified signed plugins.Internet ExplorerWindows
Run scripts on webpagesThis policy disables the execution of scripts on websites, preventing potentially harmful script-based attacks.Internet ExplorerWindows
Unsigned IE pluginsPrevents installation of unsigned Internet Explorer plugins or add-ons, enforcing only digitally signed add-ons.Internet ExplorerWindows
Block websites with excessive adsAutomatically block websites that display intrusive or excessive ads.Chrome, Edge, Chromium BrowsersWindows, Mac
Block third party websites that inject codeBlocks untrusted third-party websites that attempt to inject unauthorized scripts or modify content on the webpage.Chrome, Chromium BrowsersWindows, Mac

Trusted by