Home > Symantec Endpoint > Symantec Endpoint Protection Manager Guide

Symantec Endpoint Protection Manager Guide

Contents

To enable network scanning from the Symantec Endpoint Protection Manager (SEPM), please do the following: Under thePoliciesTab, selectVirus and Spyware Protection. The default scanning frequency is every hour (Configure Settings for Proactive Threat Protection, Scan Frequency tab) Auto-Protect: Antivirus and Antispyware Protection Configure Settings > File System Auto-Protect > Advanced Starts at Submit a Threat Submit a suspected infected fileto Symantec. If there is no package present in this list, from the Tasks menu, click Add Client Install Package. have a peek here

Supported Products A-Z Get support for your product, with downloads, knowledge base articles, documentation, and more. The existing policies appear in the right pane. LiveUpdate runs a little differently in SEP than it did in Symantec and Norton AntiVirus. Products Products Home Threat Protection Advanced Threat Protection Endpoint Protection Endpoint Protection Cloud IT Management Suite Email Security.cloud Data Center Security Blue Coat Products Information Protection Data Loss Prevention Encryption VIP

Symantec Endpoint Protection Manager Guide

Yes (unlocked) No (unlocked) Yes (LOCKED) ...scan remote files only when files are executed Yes (unlocked) N/A Yes (LOCKED) Trust files on remote computers running Auto-Protect Yes (unlocked) N/A Yes (LOCKED) The Symantec Endpoint Protection Manager comes with the following preconfigured Virus and Spyware Protection policies: High Security High Performance Balanced The Balanced policy is the default that applies to client groups. Provide feedback on this article Request Assistance Print Article Products Subscribe to this Article Manage your Subscriptions Search Again Situation Symantec Endpoint Protection 12.1 (SEP) increased the amount of flexibility and Once in the Antivirus and Antispyware policy, select TruScan Proactive Threat Scans from the list on the left Click the Scan Details tab.

How to modify Restart Settings at the client-group level: Login to the SEPM Click Clients Click the desired client-group (e.g. Well, you'll have to move the file back where it came from, and SEP won't remember where that is. You can also set the timeout before your computer removes the entries from the cache. Symantec Endpoint Protection Small Business Edition If client B's Auto-Protect is not trustworthy, client A's Auto-Protect scans the file.

Lock all three options by clicking the lock icon so that the icon shows a closed lock. Symantec Endpoint Protection Manager Console Try these resources. No No No Hack Tool? Yes (unlocked) Yes (unlocked) Yes (LOCKED) ...use keylogger sensitivity defaults defined by Symantec Yes (unlocked) Yes (unlocked) Yes (LOCKED) When a commercial keylogger is detected Log (unlocked) Log (unlocked) Log (LOCKED)

Solution Restart Settings may be configured in the SEPM at the client-group level and in the Client Install Settings template for SEP client installations. Symantec Cloud Yes, delete after 30 days Yes, delete after 30 days Yes, delete after 30 days ...delete oldest repaired files to limit folder size to X MB No No No Enable automatic Click OK Note: The above steps can be useful for adding or removing any product feature. By default, it runs automatically and closes itself when it finishes.

Symantec Endpoint Protection Manager Console

On theAuto-Protecttab, enableScan files on remote computers. https://support.symantec.com/en_US/article.DOC8645.html Click the Policies tab. Symantec Endpoint Protection Manager Guide This behavior is by design in order to minimize unnecessary restarts. Symantec Endpoint Protection 12.1.6 System Requirements References Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Security Response recommendations for Symantec Endpoint Protection 12.1 settings Legacy ID 2009081307565748 Terms of use for this information are

Ensure that Policy inheritance is OFF. navigate here Translated Content This is machine translated content Login to Subscribe Please login to set up your subscription. Disable Tamper Protection: Click the Clients Tab. Lock all options. Symantec Endpoint Protection 14

No No No Security Assessment Tool? Yes, delete after 30 days Yes, delete after 30 days Yes, delete after 30 days ...delete oldest non-repairable files to limit folder size to X MB No No No Miscellaneous Balanced Check to make sure that LiveUpdate ran by default: Right-click on the SEP yellow shield icon in the system tray (or as Microsoft calls it, notification area, the end of the Check This Out Create a SymAccount now!' Symantec™ Endpoint Protection 12.1.6 Installation and Administration Guide DOC8645 October 3rd, 2016 http://www.symantec.com/docs/DOC8645 Support / Symantec™ Endpoint Protection 12.1.6 Installation and Administration Guide Did this article resolve

For these and other instructions (how to assign policies to Endpoint Protection clients), see the installation and administration guide pertaining to your version of Symantec Endpoint Protection, Symantec Endpoint Protection Small Symantec Antivirus Click the policy you would like to modify and then click Edit the Policy. Modify the default communication settings: Click the Clients Tab.

No (unlocked) No (unlocked) No (LOCKED) Hack Tool?

Any option not locked is configurable at the client. ACCC About ACCC Accessibility Resources Jobs News and Alerts Policies and Guidelines Telecom ACCC Newsletter Reports Quick Links Get started Activate UIC NetID Change password Create accounts Blackboard Learn Emergency SMS Tags:software, antivirusService:Software Licensing and SalesSymantec Endpoint Protection, SEP, is Symantec AntiVirus® combined with anti-spyware, firewall, intrusion prevention system, application control, device control, and proactive threat scanning into a single client, all No No No Security Risk detections: 1st action / and 2nd action if first fails Quarantine/Leave alone—log only Quarantine/Leave alone—log only Quarantine/Leave alone—log only Adware: Override actions configured for security risks?

No Yes Products Products Home Threat Protection Advanced Threat Protection Endpoint Protection Endpoint Protection Cloud IT Management Suite Email Security.cloud Data Center Security Blue Coat Products Information Protection Data Loss Prevention If the trust option is enabled on both computers, the local Auto-Protect checks the remote computer's Auto-Protect settings. Click Antivirus and Antispyware. http://mseedsoft.com/symantec-endpoint/symantec-endpoint-protection-cannot-open-because-some-symantec-services-are-stopped.html Submit a False Positive Report a suspected erroneous detection (false positive).

Information for: Enterprise Small Business Consumer (Norton) Partners Our Offerings: Products Products A-Z Services Solutions Connect with us: Support

No No No Misleading Application? You can disable theOnly when files are executedoption to scan all files on remote computers, but you might impact your client computer performance. Click the Scan Detailstab Lock all options. Solution The Symantec Technology and Response (STAR) and the Symantec Endpoint Protection teams have worked together to incorporate Symantec's recommended security posture in Symantec Endpoint Protection Manager as the High Security

No (unlocked) “ No (unlocked) Spyware? No No No Remote Access? In the Auto-Protect Advanced Options dialog box, under Additional advanced options, clickNetwork. Supported Products A-Z Get support for your product, with downloads, knowledge base articles, documentation, and more.

Most likely the problem is that LiveUpdate was not run automatically and all that needs to be done is to run it. No No No Hack Tool? Actions When SEP finds a virus, worm, or expanded security threat -- spyware, adware and the like -- it has two actions that it can take. Yes Yes Yes ...common infection locations Yes Yes Yes ...well-known virus and security risk locations Yes Yes Yes Scan Compressed Files Yes, 3 levels deep Yes, 3 levels deep Yes, 3

This document explains the ways in which you can modify the relevant settings. Education Services Maximize your product competency and validate technical knowledge to gain the most benefit from your IT investments.