Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual page 22

Implementation guide
Table of Contents

Advertisement

22
Introducing Symantec Endpoint Protection Small Business Edition
About the types of threat protection that Symantec Endpoint Protection Small Business Edition provides
Protection
Description
type
Virus and
Virus and Spyware Protection protects
Spyware
computers from viruses and security risks, and
Protection
in many cases can repair their side effects. The
protection includes real-time scanning of files
and email as well as scheduled scans and
on-demand scans. Virus and spyware scans
detect viruses and the security risks that can
put a computer, as well as a network, at risk.
Security risks include spyware, adware, and
other malicious files.
See
on page 136.
Network Threat
Network Threat Protection provides a firewall
Protection
and intrusion prevention protection to prevent
intrusion attacks and malicious content from
reaching the computer that runs the client
software.
The firewall allows or blocks network traffic
based on the various criteria that the
administrator sets. If the administrator permits
it, end users can also configure firewall policies.
The Intrusion Prevention System (IPS) analyzes
all the incoming and the outgoing information
for the data patterns that are typical of an
attack. It detects and blocks malicious traffic
and attempts by outside users to attack the
client computer. Intrusion Prevention also
monitors outbound traffic and prevents the
spread of worms.
See
See
client computers"
Layers of protection
Table 1-2
Managing scans on client computers"
Managing firewall protection"
Managing intrusion prevention on your
on page 229.
Benefit
Virus and Spyware Protection detects new
threats earlier and more accurately using not
just signature-based and behavioral-based
solutions, but other technologies.
Symantec Insight provides faster and more
accurate malware detection to detect the new
and the unknown threats that other
approaches miss. Insight identifies new and
zero-day threats by using the collective
wisdom of over millions of systems in
hundreds of countries.
Bloodhound uses heuristics to detect a high
percentage of known and unknown threats.
Auto-Protect scans files from a signature list
as they are read from or written to the client
computer.
The rules-based firewall engine shields
computers from malicious threats before
they appear.
The IPS scans network traffic and files for
indications of intrusions or attempted
intrusions.
Browser Intrusion Prevention scans for
attacks that are directed at browser
vulnerabilities.
Universal download protection monitors all
downloads from the browser and validates
that the downloads are not malware.
on page 205.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents