How Symantec Endpoint Protection Small Business Edition Uses Reputation Data To Make Decisions About Files - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

How Symantec Endpoint Protection Small Business Edition uses reputation data to make decisions about files

Task
Allow clients to submit information
about reputation detections to
Symantec
How Symantec Endpoint Protection Small Business
Edition uses reputation data to make decisions about
files
Managing Download Insight detections (continued)
Table 11-15
Description
By default, clients send information about reputation detections to
Symantec.
Symantec recommends that you enable submissions for reputation
detections. The information helps Symantec address threats.
See
Enabling or disabling client submissions to Symantec Security
Response"
Symantec collects information about files from its global community of millions
of users and its Global Intelligence Network. The collected information forms a
reputation database that Symantec hosts. Symantec products leverage the
information to protect client computers from new, targeted, and mutating threats.
The data is sometimes referred to as being "in the cloud" since it does not reside
on the client computer. The client computer must request or query the reputation
database.
Symantec uses a technology it calls Insight to determine each file's level of risk
or "security rating."
Insight determines a file's security rating by examining the following
characteristics of the file and its context:
The source of the file
How new the file is
How common the file is in the community
Other security metrics, such as how the file might be associated with malware
Scanning features in Symantec Endpoint Protection Small Business Edition
leverage Insight to make decisions about files and applications. Virus and Spyware
Protection includes a feature that is called Download Insight. Download Insight
relies on reputation information to make detections. If you disable Insight lookups,
Download Insight runs but cannot make detections. Other protection features,
such as Insight Lookup and SONAR, use reputation information to make detections;
however, those features can use other technologies to make detections.
on page 172.
Managing Virus and Spyware Protection
169

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents