Managing The Quarantine - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

174
Managing Virus and Spyware Protection

Managing the Quarantine

Managing the Quarantine
Note: Unmanaged clients require a paid license to enable the submission
of file reputation data.
See
Licensing an unmanaged client"
Antivirus detections
Information about virus and spyware scan detections.
Antivirus advanced heuristic detections
Information about the potential threats that are detected by Bloodhound
and other virus and spyware scan heuristics.
These detections are the silent detections that do not appear in the Risk
log. Information about these detections is used for statistical analysis.
SONAR detections
Information about the threats that SONAR detects, which include high or
low risk detections, system change events, and suspicious behavior from
trusted applications.
SONAR heuristics
SONAR heuristic detections are silent detections that do not appear in
the Risk log. This information is used for statistical analysis.
7
Check Allow Insight lookups for threat detection to allow Symantec Endpoint
Protection to use the Symantec Insight reputation database to make decisions
about threats.
Insight lookups are enabled by default. You can disable this option if you do
not want to allow Symantec Endpoint Protection Small Business Edition to
query the Symantec Insight reputation database.
Download Insight, Insight Lookup, and SONAR use Insight lookups for threat
detection. Symantec recommends that you allow Insight lookups. Disabling
lookups disables Download Insight and may impair the functionality of SONAR
heuristics and Insight Lookup.
When virus and spyware scans detect a threat or SONAR detects a threat, Symantec
Endpoint Protection Small Business Edition places the files in the client computer's
local Quarantine.
See
Managing scans on client computers"
on page 68.
on page 136.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents