12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
Managing mobile clients
and remote clients
This appendix includes the following topics:
■ About mobile clients and remote clients
■ About setting up groups for remote clients
■ About strengthening your security policies for remote clients
■ About client notifications
■ About monitoring remote clients
About mobile clients and remote clients
Today's workforce is no longer tied to a single location, because employees
increasingly work remotely or from multiple locations. This situation has created
a type of client that is distinct from other clients in your network. A mobile client
is defined as a client that moves physically from location to location. Employees
who travel in the course of their job typically use these client computers. Such
client computers connect to the network intermittently and are often in an
unknown state. Their users typically log on through a virtual private network
(VPN). Remote clients are defined as clients that always connect from the same
location, but they are not physically located within the corporate network. Typical
examples of remote clients are employees who work from their homes and logon
through a VPN. Both types of clients are subject to similar risks and should be
treated similarly.
Mobile clients and remote clients are more at risk than the clients that always
reside within your corporate network. Mobile clients and remote clients are outside
B
Appendix