Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual page 12

Implementation guide
Table of Contents

Advertisement

12
Contents
Chapter 13
Chapter 14
Chapter 15
Chapter 16
About SONAR ............................................................................ 195
Managing SONAR ....................................................................... 196
Enabling or disabling SONAR ....................................................... 200
About Tamper Protection ............................................................. 201
Changing Tamper Protection settings ............................................ 202
Managing firewall protection ........................................................ 205
How a firewall works ............................................................. 206
Creating a firewall policy ............................................................. 209
Enabling and disabling a firewall policy .................................... 210
Adjusting the firewall security level ......................................... 211
About firewall rules .................................................................... 212
processing order ............................................................ 213
Changing the order of firewall rules ......................................... 213
How the firewall uses stateful inspection .................................. 214
About firewall rule application triggers .................................... 214
About firewall rule host triggers .............................................. 217
About firewall rule network services triggers ............................. 219
Setting up firewall rules .............................................................. 219
Adding a new firewall rule ...................................................... 220
Copying and pasting firewall rules ........................................... 221
Customizing firewall rules ..................................................... 221
How intrusion prevention works ................................................... 232
About Symantec IPS signatures ..................................................... 233
intrusion prevention ............................................................. 233
.............................................................. 195
......................................... 201
.......................................... 205
...................................... 229

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents