1. When creating initial policies, enable Auto-Upload only.
a. With Auto-Upload enabled, suspicious files that have never been analyzed by
Cylance are sent to Cylance for further analysis. This is only for files that are
set to auto-run or are manually executed by the user.
No personally identifiable information is shared with the Threat Defense
Console or with other tenants (organizations).
If the file is available for you to download (to perform your own threat
research), the file name is replaced with the SHA256 hash and removes the file
extension to prevent accidental detonation of the malicious file.
WARNING: The contents of the downloaded file are not altered. If you change
the file name to include the original file extension (like EXE), the file will work
if launched.
b. The Agent uses Execution Control and Process Monitor to analyze running
processes only.
This includes all files that run at startup, that are set to auto-run, and that are
manually executed by the user.
The Agent only sends alerts to the Console. No files are blocked or
Quarantined.
c. Check the Console for any threat alerts.
The goal is to find any applications or processes that are required to run on the
endpoint that are considered a threat (Abnormal or Unsafe).
Configure a policy or console settings to Allow these to run if this happens (for
example, Exclude folders in a policy, Waive the files for that device, or add the
files to the Safe List).
d. Use this initial policy for a day to allow applications and processes that are
typically used on the device to run and be analyzed.
There may be applications and processes that run periodically on a device (for
example, once a month) that might be considered a threat. It is up to you to decide if
you want to run that during this initial policy or remember to monitor the device when it
runs as scheduled.
2. After Execution Control and Process Monitor are complete, enable Background
Threat Detection — Run Once and Watch For New Files.
a. The Background Threat Detection scan can take up to one week, depending on
how busy the system is and the number of files on the system that require
analysis.
b. It is recommended to set Background Threat Detection to Run Once. Due to the
predictive nature of Dell’s technology, periodic scans of the entire disk are not
necessary. You can implement periodic scanning for compliance purposes
(example: PCI compliance).
Installation and Administrator Guide
| 11