Enterprise Edition 4.0
SPS EE 4.0 Getting Started Guide Nov. 2012
Page 14
Endpoint Security
Deploy the Endpoint
Protection Agent
■
Once the systems have been backed up deploy the Endpoint Protection Agent. The SEP agent can be
deployed in a number of ways but one of the most flexible is to use the Symantec Endpoint Protection
Integration Component with the Symantec Management Platform. This allows you to identify and group
endpoints and to perform additional steps during the install.
For instance, in organizations where an existing security solution or antivirus technology is already
installed, the SEPIC can be used to run uninstall scripts of the older technologies before installing the SEP
agent. This reduces potential risk of failed upgrades.
See the Endpoint Protection Implementation Guide for other deployment options.
Update definitions and
run a full system scan on
the endpoints
■
Run a full system scan on the endpoints with the latest virus definitions to identify any threats that may
be dormant on the endpoint. This can be a manual or scheduled scan that is defined in the SEP protection
policies.
Expanded Reporting on
trends/Key Performance
Indicators
Install IT Analytics for
Symantec Endpoint
Protection
■
Now that the endpoints are reporting to the Endpoint Protection Manager, install ITA for SEP. ITA for
SEP requires SQL to be configure with Analysis and Reporting Services for the IT Analytics Cube database
and Reports.
Security Automation
Install Workflow server
■
Install Workflow to enable process automation. See the Workflow SWAT resource page at
http://www.workflowswat.com to learn more about tying solutions together using Symantec Workflow.
Security Administration
Use the Protection
Center v2 for ongoing
security administration
■
The Symantec Protection Center v2 allows for centralized security management and provides the ability
to identify emerging threats across local and global environments. Protection Center v2 also allows you
to prioritize security information based on user roles and to accelerate time to protection with relevant,
actionable intelligence.