Table of Contents
R81 Harmony Endpoint Server Administration Guide|16
Planning for Compliance Rules
357
Configuring Compliance Policy Rules
358
Ensuring Alignment with the Deployed Profile
358
VPN Client Verification
359
Compliance Action Rules
360
Compliance Check Objects
361
Compliance Remediation Objects
363
Service Packs for Compliance
365
Required Applications and Files
366
Prohibited Applications and Files
367
Anti-Malware for Compliance
368
Ensuring that Windows Server Updates Are Installed
369
Monitoring Compliance States
370
The Heartbeat Interval
370
Configuring the "About to be Restricted" State
371
Application Control
372
Creating the List of Applications on the Reference Computer
373
Appscan Command Syntax
373
Importing the Appscan XMLFile to the Endpoint Security Management Server
376
Configuring If Imported Applications Are Allowed or Blocked by Default
377
Configuring Application Permissions in the Application Control Policy
378
Using the Reputation Service to Allow or Block Applications
381
Pre-Requisites for Using the Reputation Service
381
Using the Reputation Service with a Proxy
382
Enabling the Reputation Service
382
Disabling or Enabling Windows Subsystem for Linux (WSL)
383
Preventing the Leakage of Sensitive Information Through Git (Developer Protection)
384
Client-Side Warning Notifications
385
Installing the Application Control Policy
386
Client Settings
387