exceptions (continued)
known risks 245
managing 238
Tamper Protection 248
exclusions
created automatically 146
exporting
policies 125
F
feature dependencies 170
File System Auto-Protect. See Auto-Protect
files
sharing 226
filters
saving in logs 279
firewall
about 205–207, 221
disabling 210
enabling 210
notification 216
rules 221
security level 211
stateful inspection 214
Firewall policies
about 207
firewall rules 213
about 212
adding
using blank rule 220
allowing traffic to local subnet 225
applications 214
adding 215
copying 221
email messages 228
host groups
adding 224
hosts 217
network service triggers 219
network services
adding 225
pasting 221
processing order
about 213
changing 213
setting up 219
full scans
when to run 139
G
global scan settings 188
group
about 101
add 104
blocking 104
computer assignment 105
policy assignment 124
group structure
about 103
groups
default 103
definition 103
H
hack tools 145
health state
viewing 108
host groups
adding to a rule 224
host triggers
firewall rules 217
hosts
adding to a rule 224
local and remote 217
source and destination 217
I
icons
shield 318
importing
policies 125
infected computers 134
Insight 151, 169
modifying settings 188
Insight Lookup
feature dependencies 170
installation
planning 35, 105
Internet bots 145
interoperability
of policy features 170
intrusion prevention 229
enabling or disabling in Intrusion Prevention
policy 233
how it works 232
signatures 233
347
Index
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...