About the client installation settings
The Client Deployment Wizard prompts you to specify the group name and the protection technologies that you want to install on the client computer.
The protection technologies are grouped in feature sets. You can specify which feature set that are active on the client computer. Feature sets are assigned according to the client group.
Table: Feature sets defines the components within the feature sets that you can install on the client computer.
Table: Feature sets
Virus and Spyware Protection
Installs the core virus, spyware, and Download Protection features. Includes Auto-Protect real-time file scanning and manual file scanning.
Allows you full control over detection aggressiveness. Download Insight detects a malicious file or potentially malicious file when a user tries to download the file from a browser or a text messaging client. Download Insight uses reputation information to inspect downloaded files for security problems.
Scans the emails for malicious code as they are sent or received.
See How Symantec Endpoint Protection uses reputation data to make decisions about files.
Replaces the TruScan technology in previous versions. SONAR operates in real time to identify malicious behavior of unknown threats.
Monitors the applications on client computers and the hardware that connects to client computers.
Proactive Threat Protection is disabled on the computers that run supported Windows Server operating systems.
See About SONAR.
See About application and device control.
Guards against network threats by detecting and blowing inbound and outbound malicious traffic.
Uses the signatures to identify attacks on client computers. For known attacks, Intrusion Prevention automatically discards the packets that match known threats.
See How a firewall works.
See How intrusion prevention works.
See About the types of threat protection that Symantec Endpoint Protection provides.
See Configuring client installation package features.
After installation, you can enable or disable the protection technologies in the security policies.
See About enabling and disabling protection.
See Performing tasks that are common to all security policies.