About the client installation settings

Article:HOWTO80784  |  Created: 2012-10-24  |  Updated: 2013-10-07  |  Article URL http://www.symantec.com/docs/HOWTO80784
Article Type
How To


About the client installation settings

The Client Deployment Wizard prompts you to specify the group name and the protection technologies that you want to install on the client computer.

The protection technologies are grouped in feature sets. You can specify which feature sets are active on the client computer. You can assign feature sets according to the client group.

Table: Feature sets defines the components within the feature sets that you can install on the client computer.

Table: Feature sets

Feature set


Virus, Spyware, and Basic Download Protection

  • Virus and Spyware Protection

    Installs the core virus, spyware, and Download Protection features. Includes Auto-Protect real-time file scanning and manual file scanning.

  • Advanced Download Protection

    Allows you full control over detection aggressiveness. Download Insight detects a malicious file or potentially malicious file when a user tries to download it from a browser or a text messaging client. Download Insight uses reputation information to inspect downloaded files for security problems.

  • Email Protection

    Scans the emails for malicious code as they are sent or received.

See How Symantec Endpoint Protection uses reputation data to make decisions about files.

Proactive Threat Protection


    Replaces the TruScan technology in previous versions. SONAR operates in real time to identify malicious behavior of unknown threats.

  • Application and Device Control

    Monitors the applications on client computers and the hardware that connects to client computers.

See About SONAR.

See About application and device control.

Network Threat Protection

  • Firewall

    Guards against network threats by detecting and blocking inbound and outbound malicious traffic.

  • Intrusion Prevention

    Uses the signatures to identify attacks on client computers. For known attacks, Intrusion Prevention automatically discards the packets that match known threats.

See How a firewall works.

See How intrusion prevention works.

After installation, you can enable or disable the protection technologies in the security policies.

See About the types of threat protection that Symantec Endpoint Protection provides.

See Configuring client installation package features.

See About enabling and disabling protection when you need to troubleshoot problems.

See Performing the tasks that are common to all policies.

See Preparing for client installation.

Legacy ID


Article URL http://www.symantec.com/docs/HOWTO80784

Terms of use for this information are found in Legal Notices