Managing remote clients

Article:HOWTO55290  |  Created: 2011-06-29  |  Updated: 2011-12-16  |  Article URL
Article Type
How To


Managing remote clients

Your network may include some clients that connect to the network from different locations. You may need to manage these clients differently from the clients that connect only from within the network. You may need to manage some clients that always connect remotely over a VPN, or clients that connect from multiple locations because employees travel. You may also need to manage security for some computers that are outside your administrative control. For example, you may allow customers, contractors, vendors, or business partners to have limited access to your network. Some employees may connect to your network using their own personal computers, and you may need to manage these clients differently.

In all these cases, you must deal with greater security risk. Connections may be less secure, or the client computers may be less secure, and you may have less control over some clients. To minimize these risks to your overall network security, you should assess the different kinds of remote access that clients have to your network. You can then apply more stringent security policies based on your assessment.

To manage the clients that connect to your network differently because of the security risks that they pose, you can work with Symantec Endpoint Protection's location awareness.

You apply different policies to clients that pose a greater risk to your network based on their location. A location in Symantec Endpoint Protection is defined as the type of connection that a client computer uses to connect to your network. A location can also include information about whether the connection is located inside or outside your corporate network.

You define locations for a group of clients. You then assign different policies to each location. Some security settings can be assigned to the entire group regardless of location. Some settings are different depending on location.

Table: Managing remote clients



Set up groups based on assessment of security risk

See Managing groups of clients.

Set up locations for groups of remote clients

See Managing locations for remote clients.

Configure communication settings for locations

See Configuring communication settings for a location.

Strengthen your security policies

See About strengthening your security policies for remote clients.

Turn on client notifications

See About turning on notifications for remote clients.

Customize client log management settings

See Customizing log management settings for remote clients.

Manage load balancing and roaming

See Managing load balancing and roaming for remote clients.

Monitor remote clients

See About monitoring remote clients.

Legacy ID


Article URL

Terms of use for this information are found in Legal Notices