TruScan proactive threat scan settings for legacy clients. Many of the settings
can be locked so that users on client computers cannot change the settings.
Table 13-1
Managing SONAR
Description
Task
Learn how SONAR detects unknown threats.
Information about how SONAR works can help
you make decisions about using SONAR in your
security network.
See
“About SONAR”
on page 195.
See
“About the files and applications that SONAR
detects”
on page 196.
Learn how SONAR works
To provide the most complete protection for your
client computers you should enable SONAR.
SONAR interoperates with some other Symantec
Endpoint Protection Small Business Edition
features. SONAR requires Auto-Protect.
You can use the Computers tab to check whether
Proactive Threat Protection is enabled on your
client computers.
Note:
Legacy clients do not report Proactive
Threat Protection status to Symantec Endpoint
Protection Manager.
See
“Enabling or disabling SONAR”
on page 200.
Check that SONAR is enabled
SONAR settings are part of a Virus and Spyware
Protection policy.
See
“About the default Virus and Spyware
Protection policy scan settings”
on page 153.
Check the default settings for SONAR
SONAR uses reputation data in addition to
heuristics to make detections. If you disable
Insight lookups, SONAR makes detections by
using heuristics only. The rate of false positives
might increase, and the protection that SONAR
provides is limited.
You enable or disable Insight Lookups in the
Submissions dialog.
See
“Enabling or disabling client submissions to
Symantec Security Response”
on page 172.
Make sure that Insight lookups are
enabled
197
Managing SONAR
Managing SONAR
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...