Getting up and running on Symantec Endpoint Protection Small Business Edition for the first time
|Article:HOWTO54901|||||Created: 2011-06-29|||||Updated: 2011-12-20|||||Article URL http://www.symantec.com/docs/HOWTO54901|
You should assess your security requirements and decide if the default settings provide the balance of performance and security you require. Some performance enhancements can be made immediately after you install Symantec Endpoint Protection Manager.
Table: Tasks to install and configure Symantec Endpoint Protection Small Business Edition lists the tasks you should perform to install and protect the computers in your network immediately.
Table: Tasks to install and configure Symantec Endpoint Protection Small Business Edition
Install or migrate the management server
Whether you install the product for the first time, upgrade from a previous version, or migrate from another product, you install Symantec Endpoint Protection Manager first.
You can add the groups that contain computers based on the level of security or function the computers perform. For example, you should put computers with a higher level of security in one group, or a group of Mac computers in another group.
See Adding a group.
Modify the Virus and Spyware Protection policy
Change the following default scan settings:
Activate the product license
Purchase and activate a license within 30 days of product installation.
Prepare computers for client installation (optional)
Before you install the client software, perform the following tasks, if necessary:
Install the client software with the Client Deployment Wizard
Deploy the client software.
Check that the computers are listed in the groups that you expected and that the client communicates with the management server
In the management console, on the> page:
Check the LiveUpdate schedule and adjust if necessary
Make sure that the content updates download to client computers at a time that affects users the least.
Configure Symantec Endpoint Protection Manager to send email alerts
Alerts and notifications are critical to maintaining a secure environment and can also save you time.
Configure notifications for a single risk outbreak and when a new risk is detected
Create a notification for aand modify the notification for .
For these notifications, do the following:
Table: Tasks to perform two weeks after you install displays the tasks to perform after you install and configure the product to assess whether the client computers have the correct level of protection.
Table: Tasks to perform two weeks after you install
Article URL http://www.symantec.com/docs/HOWTO54901