Managing Tamper
Protection
This chapter includes the following topics:
■
About Tamper Protection
■
Changing Tamper Protection settings
About Tamper Protection
Tamper Protection provides real-time protection for Symantec applications that
run on servers and clients. It prevents non-Symantec processes such as worms,
Trojan horses, viruses, and security risks, from affecting Symantec resources.
You can configure the software to block or log attempts to modify Symantec
resources.
Note:
Tamper Protection runs on Windows clients only. It does not run on Mac
clients.
If you use third-party security risk scanners that detect and defend against
unwanted adware and spyware, these scanners typically affect Symantec resources.
If you have Tamper Protection enabled when you run such a scanner, Tamper
Protection generates a large number of notifications and log entries. A best practice
for Tamper Protection is to always leave it enabled. Use log filtering if the number
of the events that Tamper Protection generates is too large.
You can turn off Tamper Protection notifications on client computers. You can
also create exceptions for the applications that Tamper Protection detects.
See
“Creating a Tamper Protection exception”
on page 248.
14
Chapter
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...