Table 1-2
Layers of protection (continued)
Benefit
Description
Protection
type
SONAR examines programs as they run, and
identifies and stops malicious behavior of new
and previously unknown threats. SONAR uses
heuristics as well as reputation data to detect
emerging and unknown threats.
Proactive Threat Protection uses SONAR to
protect against zero-day attack vulnerabilities
in your network. Zero-day attack vulnerabilities
are the new vulnerabilities that are not yet
publicly known. Threats that exploit these
vulnerabilities can evade signature-based
detection, such as spyware definitions. Zero-day
attacks may be used in targeted attacks and in
the propagation of malicious code. SONAR
provides real-time behavioral protection by
monitoring processes and threats as they
execute.
See
“Managing SONAR”
on page 196.
Proactive Threat
Protection
The management server enforces each protection by using an associated policy
that is downloaded to the client.
Figure 1-1
shows the categories of threats that each type of protection blocks.
23
Introducing Symantec Endpoint Protection Small Business Edition
About the types of threat protection that Symantec Endpoint Protection Small Business Edition provides
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...