12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
Network Threat Protection
about 15
event log 76
notification
about 95–96
acknowledging 97
creating 98
creating filters 98
default 96
types 96
viewing 97
P
policies
updating for remote clients 161–162
policy
about 79, 82
adjusting 84
creating 85
exceptions 82
Firewall 82, 133
group assignment 84, 86–87
Intrusion Prevention 82
LiveUpdate 82, 91–92
testing 87
user locks 86
Virus and Spyware 82, 117
port number 33
portable computer 24
Proactive Threat Protection
about 14
product
about 13
components 17
key features 16
sources 18
protection scan
about 111, 113
adjusting settings 124
administrator-defined 115, 121, 124
backup actions 124
configuring exceptions 124, 126
default settings 117
exceptions 111, 125
File System Auto-Protect 115, 120
Internet Email Auto-Protect 115
known viruses 113
Microsoft Outlook Auto-Protect 115
notify actions 124
protection scan (continued)
on demand 115, 122
quarantined files 111, 123
repair actions 124
scanning 122–123
startup 115, 121
Tamper Protection 125
triggered 115, 122
TruScan proactive threat scans 115, 124
types of 115
updating definitions 123
user locks 124
R
reboot. See restart
remote clients
definition 159
monitoring 162
report
Client Inventory Details 73
Comprehensive Risk 74
Computers Not Scanned 73
Daily Status 71
favorite 71
Infected and At Risk Computers 74
New Risks Detected in the Network 74
Top Sources of Attack 74
Top Targets Attacked 74
Top Traffic Notifications 74
Weekly Status 71
restart 76, 153
S
server
configuring 37
database 37, 156
email server 37
email settings 33, 37, 156
heartbeat 87
host name 156
installation settings 33, 156
installing 28, 31, 35, 37
IP address 156
port number 33, 37
post-installation tasks 37
Server Installation Wizard 32
system requirements 25
uninstalling 39
167Index