12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
About managing quarantined files ................................................. 123
Enabling or disabling TruScan proactive threat scans ....................... 124
About adjusting the protection scans ............................................. 124
About exceptions ........................................................................ 125
Configuring an exception ....................................................... 126
Chapter 14 Managing firewall protection .......................................... 127
About managing firewall protection ............................................... 127
How the firewall works ................................................................ 128
How the firewall rules work .................................................... 129
About firewall rules and stateful inspection .............................. 132
About the firewall security levels ............................................ 133
About the default firewall protection ............................................. 133
Enabling firewall protection ......................................................... 134
Adjusting the firewall security level ............................................... 134
Configuring a firewall notification ................................................. 135
About adjusting firewall protection ................................................ 135
Chapter 15 Managing intrusion prevention protection .................. 137
About managing Intrusion Prevention protection ............................. 137
How Intrusion Prevention protection works .................................... 138
About the default Intrusion Prevention settings ............................... 139
Enabling Intrusion Prevention ...................................................... 139
Blocking an attacking computer .................................................... 140
Specifying Intrusion Prevention exceptions .................................... 140
Chapter 16 Managing administrator accounts ................................. 143
About managing administrator accounts ........................................ 143
About administrator accounts ....................................................... 144
Creating an administrator account ................................................ 145
Editing an administrator account .................................................. 145
Enabling forgotten passwords ....................................................... 145
Chapter 17 Managing disaster recovery ............................................ 147
Managing disaster recovery .......................................................... 147
About preparing for disaster recovery ............................................ 148
Backing up the database .............................................................. 149
Moving the server ....................................................................... 149
Reinstalling Symantec Protection Center ........................................ 150
Restoring the database ................................................................ 151
Loading a disaster recovery file ..................................................... 152
11Contents