Best practices for Backup Exec 2014 and Symantec Endpoint Protection

Article:HOWTO74438  |  Created: 2012-03-07  |  Updated: 2014-07-15  |  Article URL http://www.symantec.com/docs/HOWTO74438
Article Type
How To


Subject


Best practices for Backup Exec 2014 and Symantec Endpoint Protection

Best practices include tips and recommendations to help you use Symantec Backup Exec and Symantec Endpoint Protection effectively. For more information, see the Backup Exec 2014 Administrator's Guide.

The following best practices help ensure effective integration between Backup Exec and Symantec Endpoint Protection:

  • Install Symantec Endpoint Protection Manager on the Backup Exec server to enable integration features between Backup Exec and Symantec Endpoint Protection. If Internet Explorer's Trusted sites security level is set to High, you must add the following URL to the Internet Explorer Security tab as a trusted site:

    http://securityresponse.symantec.com

  • Create special backup jobs for your most crucial data and configure them to run automatically when Symantec's ThreatCon level escalates. This strategy helps ensure that your vital data is safely backed up as soon as global threats are detected.

  • Consider the types of jobs that you want to run automatically and the potential impact they can have on your system resources. The ThreatCon level can be raised at any time without warning. If you configure large or resource-intensive jobs to run automatically, they may interfere with your normal business operations. You should also carefully consider the impact of setting Symantec Endpoint Protection integration as a global default for all new jobs. When the ThreatCon level is raised, all jobs with the default setting run automatically. If they are configured for integration with Symantec Endpoint Protection, even completed, nonrecurring jobs rerun automatically.

  • Ensure that you have Internet connectivity for the Backup Exec server on which Symantec Endpoint Protection is installed. The Backup Exec server must be connected to the Internet to update the ThreatCon level.


Legacy ID



v70444889_v72686290


Article URL http://www.symantec.com/docs/HOWTO74438


Terms of use for this information are found in Legal Notices