Once you have organized your computers into logical groups, you can more easily
manage your security policies.
See
“Performing tasks that are common to all security policies”
on page 119.
How you can structure groups
You can create multiple groups and subgroups to match the organizational
structure of your company. You can base your group structure on function, role,
geography, or a combination of criteria.
Table 8-2
Criteria for creating groups
Description
Criterion
You can create groups based on the types of computers to be managed, such
as laptops, desktops, and servers. Alternatively, you can create multiple
groups that are based on usage type. For example, you can create a Mobile
group for the clients that travel and a Local group for the clients that remain
in the office.
Function
You can create groups for department roles, such sales, engineering, finance,
and marketing.
Role
You can create groups based on the offices, cities, states, regions, or countries
where the computers are located.
Geography
You can create groups based on a combination of criteria. For example, you
can use the function and the role.
You can add a parent group by role and add child subgroups by function, as
in the following scenario:
■
Sales, with subgroups of laptops, desktops, and servers.
■
Engineering, with subgroups of laptops, desktops, and servers.
Combination
For example, suppose that a company has telemarketing and accounting
departments. These departments have staff in the company's New York, London,
and Frankfurt offices. All computers in both departments are assigned to the same
group so that they receive virus and security risk definitions updates from the
same source. However, IT reports indicate that the telemarketing department is
more vulnerable to risks than the accounting department. As a result, the system
administrator creates separate telemarketing and accounting groups.
Telemarketing clients share configuration settings that strictly limit how users
can interact with their antivirus and security risk protection.
See the knowledge base article
Best Practices for Creating Group Structure
.
103
Managing groups of client computers
How you can structure groups
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...