12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
Table 13-3
Scan types
DescriptionScan type
Auto-Protect scans continuously inspect files and email data as
they are written to or read from a computer. Auto-Protect scans
automatically neutralize or eliminate detected viruses and
security risks.
The Auto-Protect scans are as follows:
■ File System Auto-Protect
File System Auto-Protect loads at computer startup. It
inspects all files for viruses and security risks, and blocks
the security risks from being installed. It can optionally scan
files by file extension, scan files on remote computers, and
scan floppies for boot viruses. It can optionally back up files
before it attempts to repair the files, and terminate processes
and stop services.
■ Internet Email Auto-Protect
Internet Email Auto-Protect scans the email messages that
use the POP3 or SMTP communications protocol over the
Secure Sockets Layer. It scans the message text and the
message attachments in incoming messages and outgoing
messages.
■ Microsoft Outlook Auto-Protect
Microsoft Outlook Auto-Protect scans Outlook email
messages. It scans the message text and the message
attachments in incoming messages and outgoing messages.
Auto-Protect scans
Administrator-defined scans detect viruses and security risks
by examining files and processes. Administrator-defined scans
can inspect memory and load points.
The administrator-defined scans are as follows:
■ Scheduled scans
A scheduled scan runs on the client computers at designated
times. The concurrently scheduled scans run sequentially.
If a computer is turned off during a scheduled scan, the scan
does not run unless it is configured to retry missed scans.
You can schedule an active, full, or custom scan.
■ Startup scans and triggered scans
Startup scans run when the users log on to the computers.
Triggered scans run when new virus definitions are
downloaded to computers.
■ On-demand scan
The on-demand scan provides immediate results. The
administrators can run the on-demand scan from the console.
Administrator-defined
scans
Managing protection scans
How protection scans work
116