See
“Using the Risk log to delete quarantined files on your client computers”
on page 175.
To run a command from the Computer Status log
1
Click Monitors.
2
On the Logs tab, from the Log type list box, select Computer Status.
3
Click View Log.
4
Select a command from the Action list box.
5
Click Start.
If there are settings choices for the command that you selected, a new page
appears where you can configure the appropriate settings.
6
When you have finished configuration, click Yes or OK.
7
In the command confirmation message box that appears, click Yes.
8
In the Message dialog box, click OK.
If the command is not queued successfully, you may need to repeat this
procedure. You can check to see if the server is down. If the console has lost
connectivity with the server, you can log off the console and then log back
on to see if that helps.
To view command status details
1
Click Monitors.
2
On the Command Status tab, select a command in the list, and then click
Details.
To cancel a specific scan that is in progress
1
Click Monitors.
2
On the Command Status tab, click the Cancel Scan icon in the Command
column of the scan command that you want to cancel.
3
When a confirmation that the command was queued successfully appears,
click OK.
To cancel all in-progress and queued scans
1
Click Monitors.
2
On the Logs tab, from the Log type list box, select Computer Status.
3
Click View Log.
4
Select one or more computers in the list, and then select Cancel All Scans
from the command list.
281
Monitoring protection with reports and logs
Running commands on the client computer from the logs
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...