Managing Tamper Protection; About Tamper Protection - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

Managing Tamper
Protection
This chapter includes the following topics:

About Tamper Protection

Tamper Protection provides real-time protection for Symantec applications that
run on servers and clients. It prevents non-Symantec processes such as worms,
Trojan horses, viruses, and security risks, from affecting Symantec resources.
You can configure the software to block or log attempts to modify Symantec
resources.
Note: Tamper Protection runs on Windows clients only. It does not run on Mac
clients.
If you use third-party security risk scanners that detect and defend against
unwanted adware and spyware, these scanners typically affect Symantec resources.
If you have Tamper Protection enabled when you run such a scanner, Tamper
Protection generates a large number of notifications and log entries. A best practice
for Tamper Protection is to always leave it enabled. Use log filtering if the number
of the events that Tamper Protection generates is too large.
You can turn off Tamper Protection notifications on client computers. You can
also create exceptions for the applications that Tamper Protection detects.
See
About Tamper Protection
Changing Tamper Protection settings
Creating a Tamper Protection exception"
Chapter
on page 248.
14

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents