Configuring Web Threat Protection in the command line
In the command line, you can manage Web Threat Protection using the Web Threat Protection predefined task (Web_Threat_Protection).
The task starts automatically if one of the supported browsers is detected in the system and local management of Web Threat Protection settings is allowed on the device (a policy is not applied or the "lock" is not set in the policy properties).
You can start and stop the task manually. You can configure Web Threat Protection settings by editing the settings of the Web Threat Protection predefined task.
Web Threat Protection task settings
Setting | Description | Values |
---|---|---|
| Specifies the action to be performed upon detection of an infected object in web traffic. |
|
| Enables or disables checking of links against the databases of malicious web addresses. |
|
| Enables or disables checking of links against the databases of phishing web addresses. |
|
| Enables or disables the use of heuristic analysis for scanning web pages for phishing links. |
|
| Enables or disables checking of links against the databases of adware web addresses. |
|
| Enables or disables the scanning of links against the database of web addresses containing legitimate applications that intruders can use to compromise the devices or data. |
|
| Enables or disables the usage of a list of trusted web addresses. The application does not scan trusted web addresses for viruses or other malicious objects. You can specify trusted web addresses using the |
|
| Specifies trusted web addresses. | The default value is not defined. You can use masks to specify web addresses. Masks are not supported to specify IP addresses. |