- Overview
- CylanceON-PREM architecture
- Steps to get Start with CylanceON-PREM
- Requirements: CylanceON-PREM
- Configuring the CylanceON-PREM virtual appliance
- Configuring the console
- Log in to CylanceON-PREM
- Administrative dashboard
- Filter lists
- Export lists
- Policies
- Setting up the CylancePROTECT agent
- Adding the CA certificate to endpoints
- Installing the CylancePROTECT Desktop agent for Windows
- Installing the CylancePROTECT Desktop agent for macOS
- Installing the CylancePROTECT Desktop agent for Linux
- Manually update the Linux driver
- Upgrading the CylancePROTECT Desktop agents
- Using virtual machines
- Device management
- Threat management
- Global lists
- Administration
- Managing users
- Managing roles
- Update profile information
- Audit logs
- Managing Certificates
- Setting up email notifications
- Settings
- Upgrade CylanceON-PREM
- Reboot the virtual appliance
- Configure session timeout
- Update CylanceON-PREM SSL certificate version 1.3.1 and later
- Update CylanceON-PREM SSL certificate version 1.2.2.1 and earlier
- Change the certificate cipher mode
- Enable maintenance mode
- Change network settings
- Check an IP address
- Change the log level
- Download logs
- Configure syslog/SIEM settings
- Update database connection settings
- Configure active directory
- Configure identity provider settings
- Using certificate-based authentication
- Add a banner to the login screen
- Applications
- CylanceON-PREM API
- Troubleshooting
- Agent not communicating with CylanceON-PREM
- Web browser reports insecure webpage
- Unable to connect to external database
- Configure static IP using the OVF tool
- Remote server 404 error in log files
- Log in with a local administrator account
- Online Certificate Status Protocol issues
- A user is not receiving email notifications
- Before you contact support
Add a policy rule
You can create tags and tag rules to group devices within
CylanceON-PREM
. After this, you can create a policy rule that uses the Tag condition to apply a policy to the group of devices. See Add a device tag and Add a tag rule for more information. Policies can only be associated with one rule. If the Add New Rule button is disabled, it means no policies exist or all policies are assigned to a rule and you will need to create a new policy. See Add a policy for more information. Policy rules are not evaluated until the rule set is saved.
- In the console, on the menu bar, clickRules > Policy Rules.
- ClickAdd New Rule. You can add multiple rules to the rule set at the same time. Rules run based on their order in the rule set. You can reorder the rule by clicking and dragging the rule to the correct location in the rule set.
- Enter aRule Name.
- Optionally, you can enter a Rule Description.
- Select a policy forDevices affected will receive the following policy.
- Create a rule condition. Rule conditions contain three parts that are used to determine whether a policy rule will be applied: evaluation property, operator, and value. If the rule condition evaluates toTrue, the policy will be applied to a device.
- Click an evaluation property from the drop-down list besideDevice Name.
- Click an operator from the drop-down list besideStarts With. See Policy rule operators for a description of all available operators.
- Enter or select a value for the conditions. This varies depending on the other conditions selected. For example, selecting Device Name will require entering some device name information; selecting Operating System will require selecting a target OS from a list.
- ClickAdd "And" conditionorAdd "OR" condition blockto add another condition to the rule, then enter the condition information.
- ClickSave.