Virus and Spyware Protection policy settings based on platform

Article:HOWTO81349  |  Created: 2012-10-25  |  Updated: 2014-09-21  |  Article URL http://www.symantec.com/docs/HOWTO81349
Article Type
How To


Subject


Virus and Spyware Protection policy settings based on platform

Table: Virus and Spyware Protection policy settings based on platform lists the differences in the settings that are available for Windows clients, Mac clients, and Linux clients.

Note:

Symantec Endpoint Protection Small Business Edition Small Business Edition does not support Linux clients.

Table: Virus and Spyware Protection policy settings based on platform

Policy setting

Windows

Mac

Linux (12.1.5 only)

Administrator-defined scans

  • Scheduled scans (Active, Full, Custom)

  • On-demand scans

  • Triggered scans

  • Startup scans

  • Scheduled scans (Custom)

  • On-demand scans

  • Scheduled scans (Custom)

  • On-demand scans

Email scans

  • Internet email Auto-Protect

  • Microsoft Outlook Auto-Protect

No

No

Retry missed scheduled scans

Yes

No

Yes

Randomized scheduled scans

Yes

No

No

What to scan

  • Scan additional locations

  • Scan memory

  • Scan selected folders

  • Scan selected extensions

  • Scan storage migration locations

  • Scan files inside compressed files

  • Scan for security risks

  • Scan all or selected folders

  • Scan hard drives and removable drives

  • Scan files inside compressed files

  • Scan all files

  • Scan all or selected folders

  • Scan selected extensions

  • Scan files inside compressed files

  • Scan for security risks

User-defined scans

  • Active scan

  • Full scan

  • Custom scan of individual folders, files, and extensions

  • Full scan

  • Custom scan of individual folders and files

  • Full scan

  • Custom scan of individual folders and files

Auto-Protect

  • Enable Auto-Protect

  • Scan all files

  • Scan only selected extensions

  • Determine file types by examining file contents

  • Scan for security risks

  • Scan files on remote computers

  • Scan when files are accessed, modified, or backed up

  • Scan floppies for boot viruses, with the option to delete the boot virus or log it only

  • Always delete newly created infected files or security risks

  • Preserve file times

  • Enable Auto-Protect

  • Automatically repair infected files

  • Quarantine files that cannot be repaired

  • Scan compressed files

  • Scan all files

  • Scan only selected folders

  • Scan everywhere except in selected folders

  • Scan for security risks

Scan on mount, current clients:

  • Data disks

  • All other disks and devices

Scan on mount, legacy clients (12.1.3 and earlier):

  • Data disks

  • All other disks and devices

  • Music or video disks

  • iPod players

  • Show progress during scan

  • Enable Auto-Protect

  • Scan all files

  • Scan only selected extensions

  • Scan removable media

  • Scan for security risks

  • Scan files on remote computers

  • Scan when files are accessed or modified

  • Scan inside compressed files

Define remediation actions for detections

  • Clean (only applies to malware)

  • Quarantine

  • Delete

  • Leave alone (log only)

The actions apply to categories of malware and security risks that Symantec periodically updates.

  • Repair infected files

  • Quarantine files that cannot be repaired

  • Clean (only applies to malware)

  • Quarantine

  • Delete

  • Leave alone (log only)

Set actions to take while a scan is running

  • Stop the scan

  • Pause a scan

  • Snooze a scan

  • Scan only when the computer is idle

(12.1.4 and later)

  • Stop the scan

  • Pause a scan

  • Snooze a scan

  • Scan only when the computer is idle

No

Tune scan performance for scan speed or application speed

Yes

No

No

Download Insight

Yes

No

No

Shared Insight Cache

Yes

No

No

Bloodhound

Yes

No

No

SONAR

Yes

No

No

TruScan legacy client settings (11.0)

Yes

No

No

Early Launch Anti-Malware Driver

Windows 8 and Windows Server 2012

No

No

Power Eraser (12.1.5 only)

Yes

No

No

See Preventing and handling virus and spyware attacks on client computers.

See Client protection features based on platform

See Management features based on platform

See Exceptions policy settings based on platform.


Legacy ID



v36908958_v81626097


Article URL http://www.symantec.com/docs/HOWTO81349


Terms of use for this information are found in Legal Notices