12.0
Table Of Contents
- Implementation Guide for Symantec™ Endpoint Protection Small Business Edition
- Technical Support
- Contents
- 1. Introducing Symantec Endpoint Protection Small Business Edition
- About Symantec Endpoint Protection Small Business Edition
- About the types of protection
- Single console management
- How you are protected out-of-the-box
- Key features of Symantec Endpoint Protection Small Business Edition
- Components of Symantec Endpoint Protection Small Business Edition
- Where to get more information about Symantec Endpoint Protection Small Business Edition
- 2. Planning the installation
- 3. Installing Symantec Protection Center
- 4. Preparing for client installation
- 5. Installing the Symantec Endpoint Protection Small Business Edition client
- 6. Migrating to Symantec Endpoint Protection Small Business Edition
- 7. Starting the Symantec Protection Center console
- 8. Monitoring endpoint protection
- About monitoring endpoint protection
- Viewing the Daily Status Report
- Viewing the Weekly Status Report
- Viewing system protection
- Viewing virus and risk activity
- Viewing client inventory
- Finding unscanned computers
- Finding offline computers
- Viewing risks
- Viewing attack targets and sources
- About events and event logs
- 9. Managing security policies and computer groups
- 10. Managing content updates from LiveUpdate
- 11. Managing notifications
- 12. Managing product licenses
- 13. Managing protection scans
- About managing protection scans
- How protection scans work
- About the default protection scan settings
- Enabling File System Auto-Protect
- Scheduling an administrator-defined scan
- Scanning computers
- Updating virus definitions on computers
- About managing quarantined files
- Enabling or disabling TruScan proactive threat scans
- About adjusting the protection scans
- About exceptions
- 14. Managing firewall protection
- 15. Managing intrusion prevention protection
- 16. Managing administrator accounts
- 17. Managing disaster recovery
- A. Maintaining and troubleshooting Symantec Endpoint Protection Small Business Edition
- Restarting client computers
- Finding managed computers
- Converting an unmanaged computer
- Finding the server host name and IP address
- Modifying email server settings
- Modifying the server installation settings
- Investigating client problems
- Troubleshooting Symantec Protection Center communication problems
- Troubleshooting content update problems
- Providing information for Symantec Support
- B. Managing mobile clients and remote clients
- Index
4
In the policy, on the Overview pane, specify the following information:
Type Virus and Spyware for Marketing.Policy Name
Type Custom policy for the Marketing department.Description
5
In the policy, on the File System Auto-Protect pane, check scanfileson remote
computers.
6
Click OK.
Locking and unlocking policy settings
You can lock and unlock policy settings. Computer users cannot change locked
policy settings. A padlock icon appears next to a lockable policy setting.
To lock or unlock a policy setting
1
In the console, click Policies.
2
On the Policies page, select a policy, and then right-click Edit.
3
Click a padlock icon to lock or unlock the corresponding setting.
4
Click OK.
How policies are assigned to groups
You assign a policy to a computer through a group. Every group has exactly one
policy of each protection type that is assigned to it at all times.
See “About the security policies” on page 82.
See “Assigning a policy to a group” on page 87.
Policies are assigned to computer groups as follows:
■ At initial installation, the Symantec default security policies are assigned to
the My Company parent group.
■ The security policies in the My Company parent group are automatically
assigned to each newly created child group.
■ You replace a policy in a group by assigning another policy of the same type.
You can replace a policy that is assigned to the My Company parent group or
to any child group.
Managing security policies and computer groups
How policies are assigned to groups
86