The Log settings let you specify whether the server creates a log entry or
sends an email message when a traffic event matches the criteria that are
set for this rule.
Notifications
Customizing firewall rules
1
In the console, open a Firewall policy.
2
On the Firewall Policy page, click Rules.
3
On the Rules tab, in the Rules list, in the Enabled field, ensure that the box
is checked to enable the rule; uncheck the box to disable the rule.
Symantec Endpoint Protection Small Business Edition only processes the
rules that you enable. All rules are enabled by default.
4
Double-click the Name field and type a unique name for the firewall rule.
5
Right-click the Action field and select the action that you want Symantec
Endpoint Protection Small Business Edition to take if the rule is triggered.
6
In the Application field, define an application.
See
“Defining information about applications”
on page 215.
7
In the Host field, specify a host trigger.
See
“Blocking traffic to or from a specific server”
on page 224.
8
In addition to specifying a host trigger, you can also specify the traffic that
is allowed to access your local subnet.
See
“Allowing only specific traffic to the local subnet”
on page 225.
9
In the Service field, specify a network service trigger.
See
“Controlling whether networked computers can share messages, files,
and printing”
on page 225.
10
In the Log field, specify when you want Symantec Endpoint Protection Small
Business Edition to send an email message to you when this firewall rule is
violated.
See
“Setting up notifications for firewall rule violations”
on page 228.
11
If you are done with the configuration of the rule, click OK.
See
“Setting up firewall rules”
on page 219.
See
“About firewall rules”
on page 212.
223
Managing firewall protection
Setting up firewall rules
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...