Running Commands On The Client Computer From The Console - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

114
Managing clients

Running commands on the client computer from the console

Running commands on the client computer from the
console
Commands that you can run on client computers (continued)
Table 9-4
Commands
Description
Enable Auto-Protect
Enables Auto-Protect for the file system on the client computers.
By default, Auto-Protect for the file system is enabled. You might
need to enable Auto-Protect from the console if you allow users
to change the setting or if you disable Auto-Protect. You can lock
the setting so that users on client computers cannot disable
Auto-Protect.
See
See
183
If you want to enable or disable Auto-Protect for email, you must
include the setting in the Virus and Spyware Protection policy.
Enable Network
Enables and disables the firewall and intrusion prevention on the
Threat Protection and
client computers.
Disable Network
Note:
Threat Protection
See
Running commands on the client computer from the console"
See
Running commands on the client computer from the logs"
You can configure a limited administrator to have rights to some or none of these
commands.
See
Configuring the access rights for a limited administrator"
On managed clients, the commands that you run override the commands that the
user runs. The order in which commands and actions are processed on the client
computer differs from command to command. Regardless of where the command
is initiated, commands and actions are processed in the same way.
You can also run these commands on clients from the Computer Status log.
See
Running commands on the client computer from the logs"
See
About commands you can run on client computers"
Customizing Auto-Protect for Windows clients"
About commands you can run on client computers"on page
on page 183.
The Mac client computer does not process this command.
on page 182.
on page 114.
on page 280.
on page 299.
on page 280.
on page 113.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents