Customizing Auto-Protect for email scans on Windows
computers
You can customize Auto-Protect for email scans on Windows computers.
See
“Customizing the virus and spyware scans that run on Windows computers”
on page 180.
See
“Managing the virus and spyware notifications that appear on client
computers”
on page 176.
To configure Internet Email Auto-Protect
1
In the console, open a Virus and Spyware Protection policy.
2
Under Windows Settings, click one of the following options:
■
Internet Email Auto-Protect
■
Microsoft Outlook Auto-Protect
3
On the Scan Details tab, check or uncheck Enable Internet Email
Auto-Protect.
4
Under Scanning, under File types, click one of the following options:
■
Scan all files
This is the default and most secure option.
■
Scan only selected extensions
You can improve scan performance by selecting this option, however, you
might decrease the protection on your computer.
5
Check or uncheck Scan files inside compressed files.
6
On the Actions tab, set any of the options.
See
“Changing the action that Symantec Endpoint Protection Small Business
Edition takes when it makes a detection”
on page 190.
7
On the Notifications tab, under Notifications, check or uncheck Display a
notification message on the infected computer. You can also customize the
message.
8
Under Email Notifications, check or uncheck any of the following options:
■
Insert a warning into the email message
■
Send email to the sender
■
Send email to others
Customizing scans
Customizing Auto-Protect for email scans on Windows computers
184
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...