The event type and the action that the client has taken on the
process, such as cleaning it or logging it. Look for the following
event types:
■
A possible legitimate process is listed as a Potential risk found
event.
■
A probable security risk is listed as a Security risk found event.
Event
The process name.
Application
The type of malware that SONAR or a TruScan proactive threat scan
detected.
Application type
The path name from where the process was launched.
File/Path
The Event column tells you immediately whether a detected process is a security
risk or a possible legitimate process. However, a potential risk that is found may
or may not be a legitimate process, and a security risk that is found may or may
not be a malicious process. Therefore, you need to look at the Application type
and File/Path columns for more information. For example, you might recognize
the application name of a legitimate application that a third-party company has
developed.
See
“Creating exceptions from log events in Symantec Endpoint Protection
Manager”
on page 249.
To monitor SONAR events
1
In the console, click Monitors > Logs.
2
On the Logs tab, in the Log type drop-down list, click SONAR.
3
Select a time from the Time range list box closest to when you last changed
a scan setting.
4
Click Advanced Settings.
5
In the Event type drop-down list, select one of the following log events:
■
To view all detected processes, make sure All is selected.
■
To view the processes that have been evaluated as security risks, click
Security risk found.
■
To view the processes that have been evaluated and logged as potential
risks, click Potential risk found.
199
Managing SONAR
Monitoring SONAR detection results to check for false positives
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...