■
Date that the application was last changed
■
File fingerprint
6
Click OK.
7
Click OK.
See
“About firewall rules”
on page 212.
See
“Editing a policy”
on page 122.
See
“About firewall rule application triggers”
on page 214.
Notifying the users that access to an application is blocked
You can send users a notification that an application that they want to access is
blocked. This notification appears on the users' computers.
Note:
Enabling too many notifications can not only overwhelm your users, but
can also alarm them. Use caution when enabling notifications.
To notify the users that access to an application is blocked
1
In the console, open a Firewall policy.
2
On the Firewall Policies page, click Rules.
3
Enable custom firewall protection.
4
On the Notifications tab, check the following options that you want to apply:
A notification appears when the client blocks an
application.
Display notification on the
computer when the client
blocks an application
Click Set Additional Text and customize the
notification.
Customizing the notification text is optional.
Add additional text to
notification
5
Click OK.
See
“Managing firewall protection”
on page 205.
See
“Enabling and disabling a firewall policy”
on page 210.
See
“About firewall rules”
on page 212.
See
“About firewall rule application triggers”
on page 214.
Managing firewall protection
About firewall rules
216
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...