About commands that you can run on client computers

Article:HOWTO81057  |  Created: 2012-10-24  |  Updated: 2014-09-21  |  Article URL http://www.symantec.com/docs/HOWTO81057
Article Type
How To


Subject


About commands that you can run on client computers

You can run commands remotely on individual clients or an entire group from the console.

You can enable and disable protection to troubleshoot problems on the client computer.

See About enabling and disabling protection when you need to troubleshoot problems.

Table: Commands that you can run on client computers

Commands

Description

Scan

Runs on-demand scan on the client computers.

If you run a scan command, and select a Custom scan, the scan uses the command scan settings that you configured on the Administrator-defined Scans page. The command uses the settings that are in the Virus and Spyware Protection policy that is applied to the selected client computers.

See Running on-demand scans on client computers.

Start Power Eraser Analysis

Runs a Power Eraser analysis on the selected computers. You should typically run Power Eraser only on a single computer or a small number of computers. You should only run Power Eraser when computers exhibit instability or have persistent problems. Unlike other scans, Power Eraser does not automatically remediate any potential threats. You must review the detections in the logs and specify which risks you want to remove or leave alone.

See Starting Power Eraser analysis from Symantec Endpoint Protection Manager.

Update Content

Updates content on clients by initiating a LiveUpdate session on the client computers. The clients receive the latest content from Symantec LiveUpdate.

See Configuring the LiveUpdate download schedule for Symantec Endpoint Protection Manager.

Update Content and Scan

Updates content by initiating a LiveUpdate session and runs an on-demand scan on client computers.

Restart Client Computers

Restarts the client computers.

If users are logged on to the client, they are warned based on the restart options that the administrator has configured for that client. You can configure client restart options on the General Settings page.

Note:

Restart options apply only to Windows client computers. Mac client computers always perform a hard restart. Linux client computers ignore this command.

See Restarting the client computers from Symantec Endpoint Protection Manager.

Note:

You can ensure that a client does not restart. You can add a registry key on the client that keeps it from restarting even if an administrator issues a restart command.

See Ensuring that a client does not restart.

Enable Auto-Protect

Enables Auto-Protect for the file system on the client computers.

By default, Auto-Protect for the file system is enabled. You might need to enable Auto-Protect from the console if you have allowed users to change the setting or if you disable Auto-Protect. You can lock the setting so that users on client computers cannot disable Auto-Protect.

See Customizing Auto-Protect for Windows clients.

See Customizing Auto-Protect for Mac clients.

If you want to enable or disable Auto-Protect for email, you must include the setting in the Virus and Spyware Protection policy.

Enable Network Threat Protection and Disable Network Threat Protection

Enables or disables the firewall and enables intrusion prevention on the client computers.

Note:

Mac client computers do not process this command.

See Managing firewall protection.

Enable Download Insight and Disable Download Insight

Enables or disables Download Insight on the client computers.

Note:

Mac client computers do not process this command.

See Managing Download Insight detections.

See Running commands on the client computer from the console.

See Running commands from the computer status log.

You can configure a limited administrator to have rights to some or none of these commands.

See Configuring the access rights for a limited administrator.


Legacy ID



v57237903_v81626096


Article URL http://www.symantec.com/docs/HOWTO81057


Terms of use for this information are found in Legal Notices