Customize

Policies

Policies determine how vedSecure behaves on each endpoint. Good policy design keeps the product strict where it matters and flexible where work would otherwise be interrupted.

Last updated: April 15, 2026

Policy scope and assignment

Policies can be assigned to individuals, teams, device classes, or staged cohorts. This makes it possible to handle very different endpoint roles without duplicating an entire security model for each group.

  • Executive policy
  • Engineering policy
  • Finance policy
  • Shared workstation policy

What a policy can control

Each vedSecure policy can shape exclusions, release cadence, ransomware folder protection, response automation, notification routes, and scan depth.

{
  "realtimeProtection": true,
  "behaviorEngine": "balanced",
  "scanMode": "smart-background",
  "protectedFolders": ["Finance", "Contracts", "Backups"],
  "exclusions": ["C:\\BuildCache"],
  "autoQuarantine": true
}

Policy review habits

Policies should be reviewed on a schedule, especially after internal tooling changes, department workflow changes, or new release-channel adoption. Unreviewed exclusions tend to become long-term risk debt.