■
Which computers are infected?
■
Which computers need scanning?
■
What risks were detected in the network?
Note:
Symantec Endpoint Protection Small Business Edition pulls the events that
appear in the reports from the event logs on your management servers. The event
logs contain time-stamps in the client computers' time zones. When the
management server receives the events, it converts the event time-stamps to
Greenwich Mean Time (GMT) for insertion into the database. When you create
reports, the reporting software displays information about events in the local
time of the computer on which you view the reports.
Table 19-1
Tasks for monitoring endpoint protection
Description
Task
The following list describes some of the tasks that you can perform to monitor the security
status of your client computers.
■
Obtain a count of detected viruses and other security risks and view details for each
virus and security risk.
See
“Viewing risks”
on page 266.
■
Obtain a count of unprotected computers in your network and view the details for each
computer.
See
“Viewing system protection”
on page 264.
■
View the number of computers with up-to-date virus and spyware definitions.
See
“Viewing system protection”
on page 264.
■
View the real-time operational status of your client computers.
See
“Viewing the protection status of clients and client computers”
on page 109.
■
View the number of computers that are offline.
See
“Finding offline computers”
on page 265.
■
Review the processes that run in your network.
See
“Monitoring SONAR detection results to check for false positives”
on page 198.
■
Locate which computers are assigned to which groups.
See
“Viewing assigned computers”
on page 105.
■
Locate which policies are assigned to which groups.
See
“Viewing assigned policies”
on page 124.
■
View the licensing information on the client computers, which includes the number
of valid seats, over-deployed seats, expired seats, and expiration date.
See
“Checking license status”
on page 64.
See
“Viewing client inventory”
on page 266.
See
“Viewing a daily or weekly status report”
on page 263.
Review the security
status of your network
Monitoring protection with reports and logs
Monitoring endpoint protection
262
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...