Authorized Symantec
System Center console
Unauthorized Symantec
System Center console
Implementing enhanced server group security
Figure 1-2
Enhanced server group security
Read
Write
Read
Only
Read
Only
You can perform the following tasks to implement protection and monitor
unauthorized configuration changes:
Choose which computers to protect.
■
Create the access list.
■
Roll out the access list.
■
Log unauthorized configuration change attempts.
■
Primary Server
Read
Read
Only
Write
Secondary Server
Client
Managing Symantec AntiVirus
Enhancing server group security
Access List
Registry
Access List
Registry
49