See
“Performing tasks that are common to all security policies”
on page 119.
See
“Viewing assigned policies”
on page 124.
To assign a policy to a group
1
In the console, click Policies.
2
On the Policies page, select a policy, and then click Assign the policy.
3
In the Assign policy dialog box, select the groups, and then click Assign.
4
Click OK to confirm.
Viewing assigned policies
You can verify that your security policies are assigned to the correct groups from
the Computers page. You can also view policy settings from this page.
See
“Assigning a policy to a group”
on page 123.
See
“Performing tasks that are common to all security policies”
on page 119.
Click Help for more information about the assigned policies.
To view assigned policies
1
In the console, click Computers.
2
On the Computers page, on the Policies tab, in the group tree, click a group.
The policies that are assigned to the selected group are shown. Click a policy
to view its settings.
Click Tasks for more options.
Testing a security policy
Symantec recommends that you test a policy before you use it in a production
environment.
See
“Performing tasks that are common to all security policies”
on page 119.
To test a policy
1
Create a group to use for policy testing.
2
Assign the test policy to the test group.
3
Identify three or four managed computers to use for policy testing.
If necessary, install the client software on the computers. Install the
computers as managed computers.
Using policies to manage security
Viewing assigned policies
124
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...