By default, the client moves any files that security risks
infect to the Quarantine on the infected computer. The client
also tries to remove or repair the risk's side effects.
If a security risk cannot be quarantined and repaired, the
second action is to log the risk.
By default, the Quarantine contains a record of all actions
that the client performed. You can return the client
computer to the state that existed before the client tried the
removal and repair.
On Windows client computers, you can disable Auto-Protect
scanning for security risks. You might want to temporarily
disable Auto-Protect scanning of security risks if detection
of a security risk could compromise a computer's stability.
Other types of scans continue to detect the risk.
Security risks
Detections by SONAR are considered suspicious events. You configure actions for
these detections as part of the SONAR configuration.
See
“Managing SONAR”
on page 196.
For Windows client computers, you can assign a first and a second action for
Symantec Endpoint Protection Small Business Edition to take when it finds risks.
You can configure different actions for viruses and security risks. You can use
different actions for scheduled, on-demand, or Auto-Protect scans.
Note:
On Windows client computers, the list of the detection types for security
risks is dynamic and changes as Symantec discovers new categories. New categories
are downloaded to the console or the client computer when new definitions arrive.
For Mac client computers, you can specify whether or not Symantec Endpoint
Protection Small Business Edition repairs the infected files that it finds. You can
also specify whether Symantec Endpoint Protection Small Business Edition moves
the infected files that it cannot repair into the Quarantine. You can configure the
settings for all administrator-defined scans or for Auto-Protect scans.
See
“Managing the Quarantine”
on page 174.
Setting up scheduled scans that run on Windows
computers
You configure scheduled scans as part of a Virus and Spyware Protection policy.
The scan settings are different for Windows clients and for Mac clients.
157
Managing Virus and Spyware Protection
Setting up scheduled scans that run on Windows computers
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...