About The Files And Folders That Symantec Endpoint Protection Excludes From Virus And Spyware Scans - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

146
Managing Virus and Spyware Protection
Managing scans on client computers
About the files and folders that Symantec Endpoint Protection excludes
from virus and spyware scans
Viruses and security risks (continued)
Table 11-6
Risk
Joke programs
Misleading applications
Parental control
programs
Remote access
programs
Security assessment
tool
Spyware
Trackware
When Symantec Endpoint Protection Small Business Edition detects the presence
of certain third-party applications and some Symantec products, it automatically
creates exclusions for these files and folders. The client excludes these files and
folders from all scans.
Note: The client does not exclude the system temporary folders from scans because
doing so can create a significant security vulnerability on a computer.
To improve scan performance or reduce false positive detections, you can exclude
files by adding a file or a folder exception to an Exceptions policy. You can also
Description
Programs that alter or interrupt the operation of a computer in
a way that is intended to be humorous or frightening. For
example, a joke program might move the recycle bin away from
the mouse when the user tries to delete it.
Applications that intentionally misrepresent the security status
of a computer. These applications typically masquerade as
security notifications about any fake infections that must be
removed.
Programs that monitor or limit computer usage. The programs
can run undetected and typically transmit monitoring
information to another computer.
Programs that allow access over the Internet from another
computer so that they can gain information or attack or alter a
user's computer.
Programs that are used to gather information for unauthorized
access to a computer.
Stand-alone programs that can secretly monitor system activity
and detect passwords and other confidential information and
relay it back to another computer.
Stand-alone or appended applications that trace a user's path on
the Internet and send information to the controller or hacker's
system.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents