12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
Table 13-3
Scan types (continued)
DescriptionScan type
TruScan proactive threat scan analyzes application behavior
and process behavior. TruScan proactive threat scan determines
if an application or process exhibits characteristics of known
threats. This type of protection is often called protection from
zero-day attacks.
TruScan proactive threat scan detects characteristics of the
following known threats:
■ Trojan horses
■ Worms
■ Keyloggers
■ Adware and spyware
■ Applications that are used for malicious purposes
TruScan proactive threat
scans
About the default protection scan settings
The default protection scan settings are defined in three Symantec policies. The
policies provide different levels of protection.
The default Virus and Spyware Policy provides a good balance between security
and performance.
Table 13-4
Virus and Spyware Policy settings
DescriptionSetting
The following settings are locked:
■ In the scheduled scan, the setting to back up files before the
files are repaired is locked.
■ In the File System Auto-Protect scan, the setting to block
security risks from being installed is locked.
User locks
The policy is assigned to the My Company parent group at initial
installation.
See “How policies are assigned to groups” on page 86.
Group assignment
117Managing protection scans
About the default protection scan settings