12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
and that your network is not currently under attack. If your network is under
attack, then you want to find out who is behind the attack and how they attacked.
You can check the following displays to monitor the security of your environment:
You can check the following status
conditions:
■ Content dates and version numbers
■ Client connections
■ Enabled and disabled protections
You can click Details to see the status for
each client.
Home > Endpoint Status
System security overview
You can click Details to see the status for
each security protection technology.
Home > Security Status
Network attack activityHome > Virus and Risks Activity Summary
You can select Network Threat Protection
to see information about attack types and
sources.
Monitors > Summary Type
The data on the Home page in the following displays represents only the clients
that connected in the past 12 hours or 24 hours:
■ Virus Definitions Distribution
■ Intrusion Prevention Signatures
■ Status Summary
Your Home page preference settings determine the time period for which Symantec
Protection Center displays data. If you have many clients that are frequently
offline, your best monitoring option is to go to the logs and reports. In the logs
and reports, you can filter the data to include offline clients.
163Managing mobile clients and remote clients
About monitoring remote clients