Endpoint Protection

 View Only
  • 1.  How to apply Application and Device Control(disable USB only)

    Posted May 11, 2015 10:08 PM

    Hi All,
    Last week, I tested disable USB device from Symantec manager system appear some problems with client install pack symantec endpoint client basicAll of them can't disable Usb device .I need a solution.pls help me.Thanks! (with pack full is OK).

    note: My OS server : windows 2008 R2, All client : Windows XP not join domain



  • 2.  RE: How to apply Application and Device Control(disable USB only)

    Posted May 12, 2015 12:31 PM

    Was any error message present?

    See here:

    Block or allow devices in Endpoint Protection



  • 3.  RE: How to apply Application and Device Control(disable USB only)

    Posted May 12, 2015 12:37 PM

    Seems like you have Basic protection installed, that will not have application and device control, install full protection

    https://support.symantec.com/en_US/article.HOWTO55369.html

    About the types of threat protection that Symantec Endpoint Protection provides
     
     
    If you want to modify you can do this
     
    How to add or remove features to existing Symantec Endpoint Protection (SEP) client installations
     
     
    More info on this set here
     


  • 4.  RE: How to apply Application and Device Control(disable USB only)

    Posted Jul 02, 2015 03:43 AM

    Hi,

    Thank you!



  • 5.  RE: How to apply Application and Device Control(disable USB only)

    Posted Aug 09, 2015 10:46 PM

    Application and device control are part of Proative thread protection.

    Proactive Threat Protection

    Proactive Threat Protection uses SONAR to protect against zero-day attack vulnerabilities in your network. Zero-day attack vulnerabilities are the new vulnerabilities that are not yet publicly known. Threats that exploit these vulnerabilities can evade signature-based detection, such as spyware definitions. Zero-day attacks may be used in targeted attacks and in the propagation of malicious code. SONAR provides real-time behavioral protection by monitoring processes and threats as they execute.

    Application and Device Control monitors and controls the behavior of applications on client computers and manages the hardware devices that access client computers.

    See Managing SONAR.

    See About application and device control.

    See Setting up application and device control.

    SONAR examines programs as they run, and identifies and stops malicious behavior of new and previously unknown threats. SONAR uses heuristics as well as reputation data to detect emerging and unknown threats.

    Application Control controls what applications are allowed to run or access system resources.

    Device Control manages the peripheral devices that users can attach to desktop computers.