12.0

Table Of Contents
Network Threat Protection
about 15
event log 76
notification
about 9596
acknowledging 97
creating 98
creating filters 98
default 96
types 96
viewing 97
P
policies
updating for remote clients 161162
policy
about 79, 82
adjusting 84
creating 85
exceptions 82
Firewall 82, 133
group assignment 84, 8687
Intrusion Prevention 82
LiveUpdate 82, 9192
testing 87
user locks 86
Virus and Spyware 82, 117
port number 33
portable computer 24
Proactive Threat Protection
about 14
product
about 13
components 17
key features 16
sources 18
protection scan
about 111, 113
adjusting settings 124
administrator-defined 115, 121, 124
backup actions 124
configuring exceptions 124, 126
default settings 117
exceptions 111, 125
File System Auto-Protect 115, 120
Internet Email Auto-Protect 115
known viruses 113
Microsoft Outlook Auto-Protect 115
notify actions 124
protection scan (continued)
on demand 115, 122
quarantined files 111, 123
repair actions 124
scanning 122123
startup 115, 121
Tamper Protection 125
triggered 115, 122
TruScan proactive threat scans 115, 124
types of 115
updating definitions 123
user locks 124
R
reboot. See restart
remote clients
definition 159
monitoring 162
report
Client Inventory Details 73
Comprehensive Risk 74
Computers Not Scanned 73
Daily Status 71
favorite 71
Infected and At Risk Computers 74
New Risks Detected in the Network 74
Top Sources of Attack 74
Top Targets Attacked 74
Top Traffic Notifications 74
Weekly Status 71
restart 76, 153
S
server
configuring 37
database 37, 156
email server 37
email settings 33, 37, 156
heartbeat 87
host name 156
installation settings 33, 156
installing 28, 31, 35, 37
IP address 156
port number 33, 37
post-installation tasks 37
Server Installation Wizard 32
system requirements 25
uninstalling 39
167Index