Components of Symantec Endpoint Protection Small Business Edition

Article:HOWTO81305  |  Created: 2012-10-25  |  Updated: 2014-11-04  |  Article URL http://www.symantec.com/docs/HOWTO81305
Article Type
How To


Subject


Components of Symantec Endpoint Protection Small Business Edition

Table: Main product components describes the main components of Symantec Endpoint Protection Small Business Edition.

Table: Main product components

Component

Description

Symantec Endpoint Protection Manager

Symantec Endpoint Protection Manager is a management server that manages the client computers that connect to your company's network.

Symantec Endpoint Protection Manager includes the following subcomponents:

  • The management server software provides secure communication to and from the client computers and the console.

  • The console is the interface to the management server. The console software coordinates and manages security policies, client computers, reports, logs, roles and access, administrative functions, and security. You can also install a remote console and use it to log on to the management server from any computer with a network connection.

  • The embedded database stores security policies and events and is installed with Symantec Endpoint Protection Manager.

See What you can do from the console.

See Installing Symantec Endpoint Protection Manager.

Symantec Endpoint Protection Small Business Edition client

The Symantec Endpoint Protection Small Business Edition client runs on the following platforms:

  • The Windows client protects computers by using virus and spyware scans, SONAR, Download Insight, a firewall, an intrusion prevention system, and other protection technologies. It runs on the servers, desktops, and portable computers that you want to protect.

  • The Symantec Endpoint Protection Mac client protects computers by using virus and spyware scans and an intrusion prevention system.

See What is Symantec Endpoint Protection Small Business Edition?.

See How Symantec Endpoint Protection uses layers to protect computers.


Legacy ID



v17119278_v81626097


Article URL http://www.symantec.com/docs/HOWTO81305


Terms of use for this information are found in Legal Notices