Implementation Guide for Symantec™ Endpoint Protection Small Business Edition

Article:DOC2363  |  Created: 2010-08-10  |  Updated: 2010-08-10  |  Article URL
Article Type


This guide includes procedures to install and manage the product.


Table of Contents:
About Symantec Endpoint Protection Small Business Edition
About the types of protection
Single console management
How you are protected out-of-the-box
Key features of Symantec Endpoint Protection Small Business Edition
Components of Symantec Endpoint Protection Small Business Edition
Where to get more information about Symantec Endpoint Protection Small Business Edition
Technical Support resources
Planning the installation
Network architecture considerations
Guidelines for managing portable computers
About trialware
Product license requirements
System requirements
Internationalization requirements
VMware support
About Microsoft Virtual Server support
Preparing your computers for installation
Installing Symantec Protection Center
About the installation wizards
About the Symantec Protection Center installation settings
Installing the server and the console
Configuring the server
Creating the database
What to do after you install Symantec Protection Center
Uninstalling Symantec Protection Center
Preparing for client installation
How to configure firewalls for remote deployment
How to prepare computers for remote deployment
Installing the Symantec Endpoint Protection Small Business Edition client
About managed and unmanaged computers
About the client installation settings
Deploying clients
Deploying clients by using Email Notification Installation
Deploying clients by using Remote Push Installation
Deploying clients by using Custom Installation
About reinstalling client protection
Installing an unmanaged computer
Uninstalling the client
Migrating to Symantec Endpoint Protection Small Business Edition
Migrating legacy installations
About migrating computer groups
Migrating group settings and policy settings
Upgrading Symantec Endpoint Protection Small Business Edition
About the Symantec Protection Center Welcome screen
Using the console logon screen
Logging on to the console
Logging on to a remote console
Resetting a forgotten password
What you can do from the console
Configuring console preferences
About monitoring endpoint protection
Viewing the Daily Status Report
Viewing the Weekly Status Report
Viewing system protection
Viewing virus and risk activity
Viewing client inventory
Finding unscanned computers
Finding offline computers
Viewing risks
Viewing attack targets and sources
About viewing events and event logs
Viewing the Computer Status Log
Viewing the Network Threat Protection Log
Viewing the TruScan Proactive Threat Scan Log
Managing security policies and computer groups
Managing groups of computers
Viewing assigned computers
Creating a group
Blocking a group
Moving a computer
About types of security policies
Viewing assigned policies
Adjusting a policy
Creating a policy
Locking and unlocking policy settings
How policies are assigned to groups
How computers get policy updates
Assigning a policy to a group
Testing a security policy
Managing content updates from LiveUpdate
About LiveUpdate
How clients receive content updates
About the default LiveUpdate schedule settings
Configuring LiveUpdate for the server
Enabling and disabling LiveUpdate for clients
Checking LiveUpdate server activity
Viewing LiveUpdate downloads
Manually downloading content updates to Symantec Protection Center
About managing notifications
How notifications work
About the default notifications
Viewing notifications
Creating a notification
Creating a notification filter
Managing product licenses
About licenses
About the Symantec Licensing Portal
Creating a Symantec Licensing Portal account
Checking license status
About purchasing a license
Registering a serial number
Importing a license
About upgrading trialware
About renewing a license
Downloading a license file
Backing up your license files
Managing protection scans
How protection scans work
About the types of protection scans
About the default protection scan settings
Enabling File System Auto-Protect
Scheduling an administrator-defined scan
Scheduling a startup scan
Scheduling a triggered scan
Scanning computers
Updating virus definitions on computers
About managing quarantined files
Enabling or disabling TruScan proactive threat scans
About adjusting the protection scans
About exceptions
Configuring an exception
Managing firewall protection
How the firewall works
How the firewall rules work
About firewall rules and stateful inspection
About the firewall security levels
About the default firewall protection
Enabling firewall protection
Adjusting the firewall security level
Configuring a firewall notification
About adjusting firewall protection
Managing Intrusion Prevention protection
How Intrusion Prevention protection works
About managing the default Intrusion Prevention settings
Enabling Intrusion Prevention
Blocking an attacking computer
Specifying Intrusion Prevention exceptions
Managing administrator accounts
About administrator accounts
Creating an administrator account
Editing an administrator account
Enabling forgotten passwords
Managing disaster recovery
About preparing for disaster recovery
Backing up the database
Moving the server
Reinstalling Symantec Protection Center
Restoring the database
Loading a disaster recovery file
Restarting client computers
Finding managed computers
Converting an unmanaged computer
Finding the server host name and IP address
Modifying email server settings
Modifying the server installation settings
Investigating client problems
Troubleshooting Symantec Protection Center communication problems
Troubleshooting content update problems
Providing information for Symantec Support
About mobile clients and remote clients
About setting up groups for remote clients
About strengthening your security policies for remote clients
About best practices for Firewall Policy settings
About best practices for Virus and Spyware Policy settings
About best practices for LiveUpdate Policy settings
About client notifications
About monitoring remote clients


Implementation_Guide_SEPSBE12.0.pdf (2 MBytes)

Article URL

Terms of use for this information are found in Legal Notices