Dell Endpoint Security Suite Enterprise Platform Policy Differences
Summary: Different Advanced Threat Protection (ATP) policies are available for Windows, Mac, and Linux platforms when using Dell Endpoint Security Suite Enterprise. This article explains the supported ATP policies for each platform. ...
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
Note:
- As of May 2022, Dell Endpoint Security Suite Enterprise has reached End of Maintenance. This article is no longer updated by Dell. For more information, reference the Product Life Cycle (End of Support / End of Life) Policy for Dell Data Security. If you have any questions on alternative articles, either reach out to your sales team or contact endpointsecurity@dell.com.
- Reference Endpoint Security for additional information about current products.
Affected Products:
- Dell Endpoint Security Suite Enterprise
Affected Operating Systems:
- Windows
- Mac
- Linux
Cause
Not Applicable
Resolution
| Policy Name | Windows | Mac | Linux |
|---|---|---|---|
| Advanced Threat Protection | * | * | * |
| File Action: Unsafe Executable Auto Quarantine With Executable Control Enabled | * | * | * |
| File Action: Unsafe Executable Auto Upload Enabled | * | * | * |
| File Action: Abnormal Executable Auto Quarantine With Executable Control Enabled | * | * | * |
| File Action: Abnormal Executable Auto Upload Enabled | * | * | * |
| Allow Execution of Files in Exclude Folders | * | * | * |
| Auto Delete | * | N/A | * |
| Days Until Deleted | * | N/A | * |
| Memory Action: Memory Protection Enabled | * | * | * |
| Memory Action: Enable Exclude executable files | * | * | * |
| Memory Action: Exclude executable files | * | * | * |
| Memory Action: Exploitation: Stack Pivot | * | * | * |
| Memory Action: Exploitation: Stack Protect | * | * | N/A |
| Memory Action: Exploitation: Overwrite Code | * | N/A | N/A |
| Memory Action: Exploitation: Scanner Memory Search | * | N/A | N/A |
| Memory Action: Exploitation: Malicious Payload | * | N/A | N/A |
| Memory Action: Process Injection: Remote Allocation of Memory | * | * | N/A |
| Memory Action: Process Injection: Remote Mapping of Memory | * | * | N/A |
| Memory Action: Process Injection: Remote Write to Memory | * | * | N/A |
| Memory Action: Process Injection: Remote Write PE to Memory | * | N/A | N/A |
| Memory Action: Process Injection: Remote Overwrite Code | * | N/A | N/A |
| Memory Action: Process Injection: Remote Unmap of Memory | * | N/A | N/A |
| Memory Action: Process Injection: Remote Thread Creation | * | * | N/A |
| Memory Action: Process Injection: Remote APC Scheduled | * | N/A | N/A |
| Memory Action: Process Injection: DYLD Injection (Mac OS X only) | N/A | * | * |
| Memory Action: Escalation: LSASS Read | * | N/A | N/A |
| Memory Action: Escalation: Zero Allocate | * | * | N/A |
| Execution Control: Prevent Service Shutdown from Device | * | N/A | N/A |
| Kill Unsafe Running Process and Sub-Processes | * | * | * |
| Execution Control: Background Threat Detection | * | * | * |
| Execution Control: Watch For New Files | * | * | * |
| Execution Control: Set Maximum Archive File Size to Scan | * | * | * |
| Enable Exclude Specific Folders (includes subfolders) | * | * | * |
| Execution Control: Exclude Specific Folders (includes subfolders) | * | * | * |
| Application Control | * | N/A | N/A |
| Enable Change Window | * | N/A | N/A |
| Suppress Popup Notifications | * | * | N/A |
| Minimum Popup Notification | * | * | N/A |
| Enable BIOS Assurance | * | N/A | N/A |
| Script Control | * | N/A | N/A |
| Script Control Mode | * | N/A | N/A |
| Script Control Active Script | * | N/A | N/A |
| Script Control Macros | * | N/A | N/A |
| Script Control PowerShell | * | N/A | N/A |
| Script Control PowerShell Console | * | N/A | N/A |
| Enable Script Control Approve Scripts in Folders (and Subfolders) | * | N/A | N/A |
| Script Control Approve Scripts in Folders (and Subfolders) | * | N/A | N/A |
| Enable Auto-upload of Log Files | * | * | * |
| Global Allow | * | N/A | N/A |
| Quarantine List | * | N/A | N/A |
| Safe List | * | N/A | N/A |
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.
Videos
Affected Products
Dell Endpoint Security Suite EnterpriseArticle Properties
Article Number: 000129772
Article Type: Solution
Last Modified: 14 Nov 2023
Version: 9
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.