12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
To prepare your computers for installation
1
Uninstall third-party virus protection software.
Symantec does not recommend that you run two virus protection programs
on the same computer. The programs can affect the performance and
effectiveness of Symantec Endpoint Protection Small Business Edition.
Follow your company's software removal procedure to uninstall your
third-party virus protection programs. For example, you can use the Windows
Add or Remove Programs tool to uninstall the programs.
See your third-party documentation for information about uninstalling the
virus protection programs.
See your Windows documentation for information about the Add or Remove
Programs tool.
2
Uninstall your Symantec legacy virus protection software if you do not plan
to migrate the settings.
See “About migrating to Symantec Endpoint Protection Small Business
Edition” on page 55.
See your Symantec documentation for information on uninstalling the legacy
virus protection software.
3
Set administrative rights to your client computers.
To install the client software, you need administrative rights to the computer
or to the Windows domain. If you do not want to provide users with
administrative rights to their computers, use Remote Push Installation to
remotely install the client software. Remote Push Installation requires you
to have local administrative rights to the computers.
Client installation upgrades the MSI to version 3.1, which requires
administrative rights. If all your computers are upgraded to MSI 3.1, your
users only require elevated privileges to install the client.
29Planning the installation
Preparing your computers for installation