Specifying how Symantec Endpoint Protection handles monitored applications

Article:HOWTO80925  |  Created: 2012-10-24  |  Updated: 2013-10-07  |  Article URL http://www.symantec.com/docs/HOWTO80925
Article Type
How To


Subject


Specifying how Symantec Endpoint Protection handles monitored applications

You can monitor a particular application so that you can create an exception for how Symantec Endpoint Protection handles the application. After Symantec Endpoint Protection learns the application and the management console receives the event, the application appears in the application list in the Application Exception dialog. The application list appears empty if the client computers in your network have not yet learned any applications.

The applications list includes the applications that you monitor as well as the files that your users download. Symantec Endpoint Protection applies the action when either Symantec Endpoint Protection detects the application or the application runs.

The applications also appear in the list for DNS and Host File Change Exception.

See Monitoring an application to create an exception for the application.

See Creating exceptions for Symantec Endpoint Protection

See Monitoring the applications and services that run on client computers

See Creating an exception for an application that makes a DNS or host file change

To specify how Symantec Endpoint Protection handles monitored applications

  1. On the Exceptions Policy page, click Exceptions.

  2. Click Add > Windows Exceptions > Application.

  3. In the View drop-down list, select All, Watched Applications, or User-allowed Applications.

  4. Select the applications for which you want to create an exception.

  5. In the Action drop-down box, select Ignore, Log only, Quarantine, Terminate, or Remove.

    The Ignore and Log only actions apply when scans detect the application. The Terminate, Quarantine, and Remove actions apply when the application launches.

  6. Click OK.


Legacy ID



v39871557_v81626096


Article URL http://www.symantec.com/docs/HOWTO80925


Terms of use for this information are found in Legal Notices