Table A-9
Symantec Endpoint Protection Small Business Edition client
protection (continued)
Linux
Mac
Windows
Server 2003,
Windows
Server 2008,
64-bit
Windows
Server 2003,
Windows
Server 2008,
32-bit
Windows XP
(SP2),
Windows
Vista,
Windows 7,
64-bit
Windows XP
(SP2),
Windows
Vista,
Windows 7,
32-bit
Client feature
No
No
Yes
Yes
Yes
Yes
Microsoft Outlook
Auto-Protect
No
No
Yes
Yes
Yes
Yes
SONAR
No
No
Yes
Yes
Yes
Yes
Firewall
No
No
Yes
Yes
Yes
Yes
Intrusion Prevention
No
No
Yes, with
limitations
Yes
Yes, with
limitations
Yes
Tamper Protection
See
“Management features by platform”
on page 339.
See
“Virus and Spyware Protection policy settings available for Windows and
Mac”
on page 340.
See
“LiveUpdate policy settings available for Windows and Mac”
on page 341.
Management features by platform
Table A-10
explains the management features that are available for the Windows
and Mac client platforms.
Table A-10
Comparison between Symantec Endpoint Protection Manager
features for Windows and Mac
Mac
Windows
Feature
No
Yes
Deploy client remotely from
Symantec Endpoint Protection
Manager
Yes
Yes
Manage client from Symantec
Endpoint Protection Manager
No
Yes
Update virus definitions and
product from management server
339
Migration and client deployment reference
Management features by platform
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...