12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
Table 13-1
Protection scan management (continued)
DescriptionTask
In most cases, the default scan settings provide adequate
protection for computers.
If necessary, you can increase or decrease protection as
follows:
■ Prevent the computer users from changing scan
settings.
■ Change the time that a scan is scheduled to run.
■ Change the repair actions that occur when a virus is
detected.
■ Schedule a startup scan to run when the users log on
to the computers.
See “About adjusting the protection scans” on page 124.
Adjust scan settings
You can exclude a security risk or process from a
protection scan.
See “About exceptions” on page 125.
Identify scan exceptions
You or the computer users can quarantine infected files.
If a quarantined file cannot be fixed, you or the computer
users must decide what to do with the infected file.
See “About managing quarantined files” on page 123.
Manage quarantined files
Exceptions are the known security risks and processes
that you want to exclude from the protection scans.
See “About exceptions” on page 125.
Configure exceptions
How protection scans work
Protection scans identify and neutralize or eliminate viruses and security risks
on your computers. Protection scans examine files for the viruses that match
definitions in a virus dictionary. Protection scans identify unknown behavior
anomalies in applications and processes.
See “About the types of protection scans” on page 115.
113Managing protection scans
How protection scans work