12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
About exceptions
Exceptions are known security risks and processes you want to exclude from the
protection scans. In some cases, exceptions can reduce scan time and increase
system performance.
You specify exceptions in the Centralized Exceptions Policy.
Click Help for more information about configuring exceptions.
Table 13-7 lists the types of exceptions that you can exclude from the protection
scans.
Table 13-7
Exception types
DescriptionType
You can exclude the following security risks:
■ Known security risks
■ Files
■ Folders
■ Extensions
Security risk
exceptions
You can exclude processes from the TruScan proactive threat
scans. You can specify the action to take for a known process that
the TruScan proactive threat scans detect. You can force the
detection of a process.
TruScan proactive
threat scan exceptions
You can exclude files from Tamper Protection.
Tamper Protection provides real-time protection for Symantec
applications that run on the server and the client computers.
Tamper Protection prevents non-Symantec processes from
affecting Symantec processes.
See the Help on the client computer for more information about
Tamper Protection.
Tamper Protection
exception
You can use the Centralized Exceptions Policy to control the type of exceptions
that computer users can specify.
You can allow computer users to specify the following exceptions:
■ Security risk
■ File
■ Folder
■ Extension
125Managing protection scans
About exceptions