3
On the Rules tab, in the Rules list, select the rule you want to edit, right-click
the Service field, and then click Edit.
4
In the Service List dialog box, check box beside each service that you want
to trigger the rule.
5
To add an additional service for the selected rule only, click Add.
6
In the Protocol dialog box, select a protocol from the Protocol drop-down
list.
7
Fill out the appropriate fields.
8
Click OK.
9
Click OK.
10
Click OK.
See
“About firewall rule network services triggers”
on page 219.
See
“Setting up firewall rules”
on page 219.
See
“Editing a policy”
on page 122.
See
“Customizing firewall rules”
on page 221.
Permitting clients to browse for files and printers in the
network
You can enable the client to either share its files or to browse for shared files and
printers on the local network. To prevent network-based attacks, you may not
want to enable network file and printer sharing.
You enable network file and print sharing by adding firewall rules. The firewall
rules allow access to the ports to browse and share files and printers. You create
one firewall rule so that the client can share its files. You create a second firewall
rule so that the client can browse for other files and printers.
The settings work differently based on the type of control that you specify for
your client, as follows:
Users on the client can enable these settings automatically by
configuring them in Network Threat Protection.
Client control or mixed
control
A server firewall rule that specifies this type of traffic can
override these settings.
Mixed control
These settings are not available on the client.
Server control
Managing firewall protection
Setting up firewall rules
226
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...