About The Client Protection Status Icons - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

108
Managing clients

About the client protection status icons

Task
Check that client computers
have the right level of
protection
Adjust the protection on
client computers
Move endpoints from one
group to another to modify
protection (optional)
Let users control computer
protection (optional)
Remove the client software
from computers (optional)
About the client protection status icons
Tasks to manage client computers (continued)
Table 9-1
Description
You can check whether the client software is installed and whether the clients provide
the right level of protection.
You can view the status of each protection technology on your client computers.
See
Viewing the protection status of clients and client computers"
See
About the client protection status icons"
You can run reports or view logs to see whether you need to increase protection
or improve performance. For example, the scans may cause false positives. You
can also identify the client computers that need protection.
See
Monitoring endpoint protection"
You can modify protection based on specific attributes of the client software or
the client computers.
You can increase or decrease each type of protection based on the results in the
reports and logs.
See
The types of security policies"
See
About the types of threat protection that Symantec Endpoint Protection Small
Business Edition provides"
You can temporarily disable protection on the client computers if you need to
diagnose a problem or improve performance.
See
About enabling and disabling protection"
See
Running commands on the client computer from the console"
To change a client computer's level of protection, you can move it to a group that
provides more protection or less protection.
See
Moving a client computer to another group"
You can specify the kind of control that users have over the protection on client
computers.
For Virus and Spyware Protection and Proactive Threat Protection, you can lock
or unlock a check box to specify whether users can change individual settings.
See
Locking and unlocking policy settings"
If users need full control of the client, you can install an unmanaged client.
See
Converting an unmanaged client to a managed client"
See
Uninstalling the client"
You can check whether the client and the server communicate.
on page 108.
on page 261.
on page 118.
on page 21.
on page 111.
on page 105.
on page 122.
on page 82.
on page 109.
on page 114.
on page 115.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents