Table 13-1
Managing SONAR (continued)
Description
Task
You can use the SONAR log to monitor events.
You can also view the SONAR Detection Results
report (under Risk Reports) to view information
about detections.
See
“Monitoring SONAR detection results to check
for false positives”
on page 198.
See
“Monitoring endpoint protection”
on page 261.
Monitor SONAR events to check for
false positive detections
SONAR might detect the files or applications that
you want to run on your client computers. You
can use an Exceptions policy to specify exceptions
for the specific folders or applications that you
want to allow. For the items that SONAR
quarantines, you can create an exception for the
quarantined item from the SONAR log.
See
“Managing exceptions for Symantec Endpoint
Protection Small Business Edition”
on page 238.
Prevent SONAR from detecting the
applications that you know are safe
Symantec recommends that you enable
submissions on your client computers. The
information that clients submit about detections
helps Symantec address threats. The information
helps Symantec create better heuristics, which
results in fewer false positive detections.
See
“Enabling or disabling client submissions to
Symantec Security Response”
on page 172.
Allow clients to submit information
about SONAR detections to Symantec
Monitoring SONAR detection results to check for false
positives
The client collects and uploads SONAR detection results to the management
server. The results are saved in the SONAR log. Legacy clients do not support
SONAR. Legacy clients collect similar events from TruScan proactive threat scans,
however, and include them in the SONAR log.
To determine which processes are legitimate and which are security risks, look
at the following columns in the log:
Managing SONAR
Monitoring SONAR detection results to check for false positives
198
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...