Table 10-2
Tasks common to all policies (continued)
Description
Task
You can lock and unlock some Virus and Spyware
Protection policy settings. Computer users cannot change
locked policy settings. A padlock icon appears next to a
lockable policy setting.
See
“Locking and unlocking policy settings”
on page 122.
Lock and unlock policy
settings
If you want to change the settings in an existing policy, you
can edit it. You can increase or decrease the protection on
your computers by modifying its security policies. You do
not have to reassign a modified policy unless you change
the group assignment.
See
“Editing a policy”
on page 122.
Edit a policy
To put a policy into use, you must assign it to one or more
groups.
See
“Assigning a policy to a group”
on page 123.
Assign a policy
Symantec recommends that you always test a new policy
before you use it in a production environment.
See
“Testing a security policy”
on page 124.
Test a policy
You can replace one policy with another.
See
“Replacing a policy”
on page 125.
Replace a policy
Instead of adding a new policy, you may want to copy an
existing policy to use as the basis for the new policy.
See
“Copying and pasting a policy”
on page 121.
Copy and paste a policy
You can export an existing policy if you want to use it in a
different group. You can then import the policy and apply
it to a group.
See
“Exporting and importing policies”
on page 125.
Export and import a policy
If a policy is no longer useful, and you do not want to keep
it in the database, you can delete it.
See
“Deleting a policy permanently”
on page 126.
Delete a policy
Using policies to manage security
Performing tasks that are common to all security policies
120
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...