Table 11-3
Managing scans on client computers (continued)
Description
Task
You use scheduled scans and on-demand scans to
supplement the protection that Auto-Protect
provides. Auto-Protect provides protection when
you read and write files. Scheduled scans and
on-demand scans can scan any files that exist on
your client computers. They can also protect
memory, load points, and other important
locations on your client computers.
Note:
For managed clients, Symantec Endpoint
Protection Small Business Edition provides a
default scheduled scan that scans all files, folders,
and locations on the client computers.
See
“Setting up scheduled scans that run on
Windows computers”
on page 157.
See
“Setting up scheduled scans that run on Mac
computers”
on page 159.
See
“Running on-demand scans on client
computers”
on page 160.
Create scheduled scans and run
on-demand scans
You can customize Auto-Protect settings as well
as options in administrator-defined scans. You
might want to change scan settings to handle false
positive detections, optimize computer or scan
performance, or change scan actions or
notifications.
See
“Customizing the virus and spyware scans
that run on Windows computers”
on page 180.
See
“Customizing the virus and spyware scans
that run on Mac computers”
on page 181.
Customize scan settings for your
environment
137
Managing Virus and Spyware Protection
Managing scans on client computers
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...