12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
Note: Management servers migrate to clients.
Table 6-2
Migration summary
DescriptionActionStep
Prepare your legacy installation for migration as follows:
■ Disable scheduled scans.
The migration might fail if a scan is running during migration.
■ Disable LiveUpdate.
Conflicts might occur if LiveUpdate runs on the client computers during
migration.
■ Turn off roaming service.
Migration might hang and fail to complete if the roaming service is running
on the client computers.
■ Unlock server groups.
Unpredictable results might occur if the server groups are locked.
■ Turn off Tamper Protection.
Tamper Protection can cause unpredictable results during migration.
■ Uninstall and delete reporting servers.
Uninstall the reporting servers, and optionally delete the database files.
See your Symantec legacy virus protection software documentation for more
information.
Prepare the legacy
installation
1
Migrate the legacy group settings and policy settings.
See “About migrating computer groups” on page 58.
See “Migrating group settings and policy settings” on page 58.
Migrate legacy group
and policy settings
2
Verify and optionally adjust the migrated group settings and policy settings.
See “Viewing assigned computers” on page 81.
See “Moving a computer” on page 82.
See “Viewing assigned policies” on page 84.
See “About adjusting the protection scans” on page 124.
Verify migrated data3
Import your legacy license file into Symantec Endpoint Protection Small Business
Edition.
See “Importing a license” on page 107.
Import legacy license4
Deploy the client to the legacy computers.
See “About deploying clients” on page 48.
Deploy the client
software
5
57Migrating to Symantec Endpoint Protection Small Business Edition
Migrating legacy installations