Table 17-3
Creating exceptions for Symantec Endpoint Protection Small
Business Edition (continued)
Description
Task
Supported on Windows clients.
Specifies how Symantec Endpoint Protection
Small Business Edition handles an application
that is detected by virus and spyware scans
(including Download Insight), SONAR, Tamper
Protection, or application learning. You can use
the exception to specify how Download Insight
handles an application that your users try to
download.
You can force Symantec Endpoint Protection
Small Business Edition to detect an application
by specifying an Application to monitor
exception. Then you can create an Application
exception to specify how scans handle the
application.
The application exception is a SHA-2 hash-based
exception. Legacy exceptions for TruScan
proactive threat scans appear as SHA-1
hash-based exceptions. Legacy clients support
SHA-1 exceptions only. The file fingerprint in the
exceptions list is preceded by a 2 or a 1
respectively to indicate the file hash type.
See
“Specifying how Symantec Endpoint
Protection Small Business Edition handles an
application that scans detect or that users
download”
on page 247.
Specify how scans handle detected or
downloaded applications
Managing exceptions
Creating exceptions for Symantec Endpoint Protection Small Business Edition
242
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...