Symantec™ Endpoint Protection and Symantec Network Access Control 12.1.2 Client Guide

Article:DOC3719  |  Created: 2011-03-04  |  Updated: 2014-09-17  |  Article URL
Article Type



Symantec™ Endpoint Protection and Symantec Network Access Control 12.1.2 Client Guide


This guide includes procedures for users to use and configure the Symantec Endpoint Protection Small Business Edition client.

1. Getting started on the client
About the Symantec Endpoint Protection client
About the Symantec Network Access Control client
Getting started on the Status page
About managed clients and unmanaged clients
Checking whether the client is managed or unmanaged
About the alert icons on the Status page
How can I protect my computer with Symantec Endpoint Protection?
Scanning your computer immediately
Pausing and delaying scans
Troubleshooting computer issues with the Symantec Help support tool
2. Responding to alerts and notifications
Types of alerts and notifications
About scan results
Responding to a virus or a risk detection
Responding to Download Insight messages that ask you to allow or block a file that you try to download
Responding to the Symantec Endpoint Protection pop-up notifications that appear on Windows 8 computers
Responding to messages that ask you to allow or block an application
Responding to expired license messages
Responding to messages to update the client software
3. Making sure that your computer is protected
Managing your computer's protection
Updating the computer's protection
Updating the content immediately
Updating the content on a schedule
Manually updating policies on the client
How to determine whether the client is connected and protected
Hiding and displaying the notification area icon
About the logs
Viewing the logs
Enabling the Packet Log
About enabling and disabling protection when you need to troubleshoot problems
Enabling or disabling protection on the client computer
Enabling or disabling Auto-Protect
Enabling, disabling, and configuring Tamper Protection
4. Managing scans
Managing scans on your computer
How virus and spyware scans work
About viruses and security risks
About the types of scans
About the types of Auto-Protect
How scans respond to a virus or risk detection
How Symantec Endpoint Protection uses reputation data to make decisions about files
Scheduling a user-defined scan
Scheduling a scan to run on demand or when the computer starts up
Managing Download Insight detections on your computer
Customizing Download Insight settings
Customizing virus and spyware scan settings
Configuring actions for malware and security risk detections
About excluding items from scans
Excluding items from scans
Managing quarantined files on your client computer
About quarantining files
Quarantining a file from the Risk log or Scan log
Manually submitting a potentially infected file to Symantec Security Response for analysis
Automatically deleting files from the Quarantine
Enabling or disabling early launch anti-malware (ELAM)
How to manage the Symantec Endpoint Protection pop-up notifications that appear on Windows 8 computers
About submitting information about detections to Symantec Security Response
Submitting information about detections to Symantec Security Response
About the client and the Windows Security Center
Managing SONAR on your client computer
Changing SONAR settings
5. Managing the firewall and intrusion prevention
Managing firewall protection
How a firewall works
Managing firewall rules
The elements of a firewall rule
About the firewall rule, firewall setting, and intrusion prevention processing order
How the firewall uses stateful inspection
Adding a firewall rule
Changing the order of firewall rules
Enabling and disabling firewall rules
Exporting and importing firewall rules
Enabling or disabling firewall settings
Enabling network file and printer sharing
Allowing or blocking applications from accessing the network
Creating a firewall rule for an application when it accesses the network from your computer
Configuring the client to block traffic when the screensaver is active or the firewall does not run
Managing intrusion prevention
How intrusion prevention works
Enabling or disabling intrusion prevention
Configuring intrusion prevention notifications
6. Managing Symantec Network Access Control
How Symantec Network Access Control works
How the client works with an Enforcer
Running a Host Integrity check
Remediating your computer
Configuring the client for 802.1x authentication
Reauthenticating your computer
Viewing the Symantec Network Access Control logs


Client_Guide_SEP12.1.2.pdf (1.4 MBytes)
Руководство по работе с клиентом Symantec™ Endpoint Protection и Symantec Network Access Control
Client_Guide_SEP12.1.2_Russian.pdf (1.5 MBytes)

Podręcznik klienta Symantec™ Endpoint Protection i Symantec Network Access Control
Client_Guide_SEP12.1.2_Polish.pdf (1.5 MBytes)
Průvodce pro klienty aplikace Symantec™ Endpoint Protection a Symantec Network Access Control
Client_Guide_SEP12.1.2_Czech.pdf (1.5 MBytes)

Legacy ID


Article URL

Terms of use for this information are found in Legal Notices