Table A-11
Virus and Spyware Protection policy settings (Windows and Mac
only)
Mac
Windows
Policy setting
You can specify either of the following
actions:
■
Automatically repair infected files
■
Quarantine files that cannot be
repaired
You can specify first and second actions
when different types of virus or risk are
found. You can specify the following
actions:
■
Clean
■
Quarantine
■
Delete
■
Leave alone
Define actions for scans
Remediation is automatically associated
with actions.
You can specify the following remediation
actions:
■
Back up files before repair
■
Terminate processes
■
Stop services
Specify remediation if a virus
or a risk is found
Custom only
Active, Full, Custom
Set scan type
No
Yes
Retry scheduled scans
No
Yes
Set scans to check additional
locations (scan
enhancement)
No
Yes
Configure storage migration
scans
Yes
Yes
Configure scan exceptions
See
“Management features by platform”
on page 339.
See
“LiveUpdate policy settings available for Windows and Mac”
on page 341.
See
“Client protection features by platform”
on page 338.
LiveUpdate policy settings available for Windows and
Mac
Table A-12
displays the LiveUpdate policy options that the Windows client and
the Mac client support.
341
Migration and client deployment reference
LiveUpdate policy settings available for Windows and Mac
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...