12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
Table 9-1
Policy and group management
DescriptionTask
The Symantec security policies define the protection
technologies that protect your computers from known
and unknown threats. Become familiar with the policies.
Review the default protection for each policy protection
type.
See “About the security policies” on page 82.
Learn about Symantec security
policies
You organize computers with similar security needs into
groups. Review the groups. Create the groups that match
your organizational structure.
See “About computer groups” on page 81.
See “Creating a group” on page 81.
Review computer groups
Symantec Endpoint Protection Small Business Edition
protects your computers out-of-the-box. You do not have
to adjust the policy settings unless you want to modify
the out-of-the-box protection.
See “About managing protection scans” on page 111.
See “About managing firewall protection” on page 127.
See “About managing Intrusion Prevention protection”
on page 137.
You can optionally allow computer users to modify the
protection on their computers.
See “Locking and unlocking policy settings” on page 86.
Symantec recommends that you test a security policy
before you use it in a production environment.
See “Testing a security policy” on page 87.
Adjust security policy settings
You assign a policy to a computer through a group. Every
group has exactly one policy of each protection type that
is assigned to it at all times.
See “How policies are assigned to groups” on page 86.
See “Moving a computer” on page 82.
Review policy assignments
You or the computer users manage unmanaged computers. Unmanaged computers
do not communicate with Symantec Protection Center to get security policies.
You can convert the computers that were installed as unmanaged computers to
managed computers.
Managing security policies and computer groups
About managing security policies and computer groups
80