12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
the safety of your corporate defenses. The management of these clients places an
extra burden on administrators to maintain the safety of the network and its data.
You might have mobile clients and remote clients in your network for a number
of different reasons, and they might exhibit different patterns of usage. For
example, you may have some internal computers that periodically move outside
your corporate environment. You may have some sales personnel whose computers
are never inside the network. You may have some client computers that need to
connect to your network but are completely outside your administrative control.
For example, you may allow customers, contractors, vendors, or business partners
limited access to your network. You may have employees who connect to the
corporate network using their own personal computers.
Some mobile users and remote users might have a less stringent attitude toward
Internet browsing than you want, and therefore exhibit riskier behavior. The
mobile users and remote users that do not work directly for your business may
not be as educated about computer security as your employees. For example, they
might be more likely to open email messages or attachments from unknown
sources while on your network. They may be more likely to use weak passwords.
Mobile users and remote users in general may be more likely to make unauthorized
changes or to customize their computers. For example, they may be more likely
to download and use an application that has not been approved for corporate use.
Mobile users and remote users may be so focused on doing their work as quickly
as possible that they fail to think about computer security.
Because it is a best practice to treat both remote clients and mobile clients
similarly, we refer to both types of clients as remote clients.
About setting up groups for remote clients
The number of groups you need depends on two main factors: the types of remote
clients you have and the security restrictions you want to apply to each type of
client. The types of remote clients you create separate groups for may include the
following:
■ Employees that log on to your network through a virtual private network
(VPN).
■ Employees that log on to your network without using a VPN.
■ Users that are not employees of your company but who need access to your
network.
After you determine the types of remote clients that you have, you should consider
what security restrictions to apply to each of them. You control security
restrictions with policies. Each type of protection is controlled with its own policy.
Managing mobile clients and remote clients
About setting up groups for remote clients
160