12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
Table 14-1
Firewall protection management (continued)
DescriptionTask
You can enable the default firewall protection or the
custom firewall protection.
See “About the default firewall protection” on page 133.
See “Enabling firewall protection” on page 134.
See “Adjusting the firewall security level” on page 134.
Enable firewall protection
Regularly check the firewall protection status on your
computers.
See “About monitoring endpoint protection” on page 69.
Monitor firewall protection
How the firewall works
Firewall protection prevents unauthorized users from accessing your computers
and networks that connect to the Internet.
The packets of data that travel across the Internet contain information about the
following:
■ Sending computers
■ Intended recipients
■ How the packet data is processed
■ Ports that receive the packets
A packet is a discrete chunk of data that is part of the information flow between
two computers. Packets are reassembled at their destination to appear as an
unbroken data stream.
The ports are the channels that divide the stream of data that comes from the
Internet. The applications that run on a computer listen to the ports. The
applications accept the data that is sent to the ports.
Network attacks exploit weaknesses in vulnerable applications. Attackers use
these weaknesses to send the packets that contain malicious programming code
to ports. When vulnerable applications listen to the ports, the malicious code lets
the attackers gain access to the computer.
Firewall protection works in the background. Firewall protection monitors the
communication between your computers and other computers on the Internet. It
creates a shield that allows or blocks attempts to access the information on your
computers. It warns you of connection attempts from other computers. It warns
Managing firewall protection
How the firewall works
128