Changing the action that Symantec Endpoint Protection Small
Business Edition takes when it makes a detection ....................... 190
Allowing users to view scan progress and interact with scans ............. 192
Chapter 13
Managing SONAR
.............................................................. 195
About SONAR ............................................................................ 195
About the files and applications that SONAR detects ......................... 196
Managing SONAR ....................................................................... 196
Monitoring SONAR detection results to check for false positives ......... 198
Enabling or disabling SONAR ....................................................... 200
Chapter 14
Managing Tamper Protection
......................................... 201
About Tamper Protection ............................................................. 201
Changing Tamper Protection settings ............................................ 202
Chapter 15
Managing firewall protection
.......................................... 205
Managing firewall protection ........................................................ 205
How a firewall works ............................................................. 206
About the Symantec Endpoint Protection firewall ...................... 207
Creating a firewall policy ............................................................. 209
Enabling and disabling a firewall policy .................................... 210
Adjusting the firewall security level ......................................... 211
About firewall rules .................................................................... 212
About the firewall rule, firewall setting, and intrusion prevention
processing order ............................................................ 213
Changing the order of firewall rules ......................................... 213
How the firewall uses stateful inspection .................................. 214
About firewall rule application triggers .................................... 214
About firewall rule host triggers .............................................. 217
About firewall rule network services triggers ............................. 219
Setting up firewall rules .............................................................. 219
Adding a new firewall rule ...................................................... 220
Copying and pasting firewall rules ........................................... 221
Customizing firewall rules ..................................................... 221
Chapter 16
Managing intrusion prevention
...................................... 229
Managing intrusion prevention on your client computers .................. 229
How intrusion prevention works ................................................... 232
About Symantec IPS signatures ..................................................... 233
Enabling or disabling network intrusion prevention or browser
intrusion prevention ............................................................. 233
Contents
12
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...