Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual page 143

Implementation guide
Table of Contents

Advertisement

Table 11-5
Type of Auto-Protect
Auto-Protect
Internet Email Auto-Protect
Types of Auto-Protect
Description
Continuously scans files as they are read from or written to the client
computer
Auto-Protect is enabled by default for the file system. It loads at computer
startup. It inspects all files for viruses and security risks, and blocks the
security risks from being installed. It can optionally scan files by file
extension, scan files on remote computers, and scan floppies for boot
viruses. It can optionally back up files before it attempts to repair the files,
and terminate processes and stop services.
You can configure Auto-Protect to scan only selected file extensions. When
Auto-Protect scans the selected extensions, it can also determine a file's
type even if a virus changes the file's extension.
For Mac clients or Windows clients that do not run email Auto-Protect,
your client computers are still protected when Auto-Protect is enabled.
Most email applications save attachments to a temporary folder when users
launch email attachments. Auto-Protect scans the file as it is written to
the temporary folder and detects any virus or security risk. Auto-Protect
also detects the virus if the user tries to save an infected attachment to a
local drive or network drive.
Scans Internet email (POP3 or SMTP) and attachments for viruses and
security risks; also performs outbound email heuristics scanning.
By default, Internet Email Auto-Protect supports encrypted passwords and
email over POP3 and SMTP connections. If you use POP3 or SMTP with
Secure Sockets Layer (SSL), then the client detects secure connections but
does not scan encrypted messages.
Note:
For performance reasons, Internet Email Auto-Protect for POP3 is
not supported on server operating systems. Internet email scanning is not
supported for 64-bit computers.
Email scanning does not support IMAP, AOL, or HTTP-based email such
as Hotmail or Yahoo! Mail.
Managing Virus and Spyware Protection
Managing scans on client computers
143

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents