Table 19-1
Tasks for monitoring endpoint protection (continued)
Description
Task
You can perform the following tasks to view or find which computers need additional
protection:
■
View the number of computers with Symantec Endpoint Protection Small Business
Edition disabled.
See
“Viewing system protection”
on page 264.
■
View the number of computers with out-of-date virus and spyware definitions.
See
“Viewing system protection”
on page 264.
■
Find the computers that have not been scanned recently.
See
“Finding unscanned computers”
on page 265.
■
View attack targets and sources.
See
“Viewing attack targets and sources”
on page 267.
Locate which client
computers need
protection
You can run commands from the console to protect the client computers.
See
“Running commands on the client computer from the logs”
on page 280.
For example, you can eliminate security risks on client computers.
See
“Checking the scan action and rescanning the identified computers”
on page 135.
Protect your client
computers
Events are the informative, notable, and critical activities that concern your Symantec
Endpoint Protection Manager and client computers. The information in the event logs
supplements the information is that is contained in the reports.
See
“About logs”
on page 277.
See
“Viewing logs”
on page 275.
Review events in the
logs
You can create and configure notifications to be triggered when certain security-related
events occur. For example, you can set a notification to occur when an intrusion attempt
occurs on a client computer.
See
“Setting up administrator notifications”
on page 291.
Configure notifications
to alert you when
security events occur
You can create and generate customized quick reports and you can schedule custom reports
to run regularly with the information that you want to see.
See
“Running and customizing quick reports”
on page 270.
See
“Creating scheduled reports”
on page 273.
See
“Saving and deleting custom reports”
on page 272.
See
“Configuring reporting preferences”
on page 268.
Create custom quick
reports and scheduled
reports for ongoing
monitoring
Viewing a daily or weekly status report
The Daily Status Report provides the following information:
263
Monitoring protection with reports and logs
Monitoring endpoint protection
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...