12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
Table 9-2 lists the types of security policies that are included with Symantec
Endpoint Protection Small Business Edition. A default policy is provided for each
type.
Table 9-2
Security policy types
DescriptionPolicy type
The Virus and Spyware Policy provides the following
protection:
■ Detect, remove, and repair the side effects of known
viruses, worms, Trojan horses, and blended threats.
■ Detect, remove, and repair the side effects of known
spyware, adware, remote access programs, dialers,
hacking tools, and joke programs.
■ TruScan proactive threat scans analyze applications and
processes for behavior anomalies, to detect unknown
threats and security risks.
See “About managing protection scans” on page 111.
Virus and Spyware Policy
The Centralized Exceptions Policy lists the applications and
processes that are excluded from the Auto-Protect and
TruScan scans.
See “About exceptions” on page 125.
Centralized Exceptions
Policy
The Firewall Policy provides the following protection:
■ Block unauthorized users from accessing the computers
and networks that connect to the Internet.
■ Detect hacker attacks.
■ Eliminate unwanted sources of network traffic.
See “About managing firewall protection” on page 127.
Firewall Policy
The Intrusion Prevention Policy automatically detects and
blocks network attacks.
See “About managing Intrusion Prevention protection”
on page 137.
Intrusion Prevention Policy
The LiveUpdate Policy lists the settings that client
computers use to download content updates from
LiveUpdate.
See “About managing content updates from LiveUpdate”
on page 89.
LiveUpdate Policy
83Managing security policies and computer groups
About the security policies