About Submitting Information About Detections To Symantec Security Response - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

About submitting information about detections to Symantec Security
Response
File and folder exclusions (continued)
Table 11-7
Files
File and folder exceptions
Trusted files
You can configure your client computers to automatically submit information
about detections to Symantec Security Response for analysis.
Symantec Response and the Global Intelligence Network use this submitted
information to quickly formulate responses to new and developing security threats.
The data that you submit improves Symantec's ability to respond to threats and
customize protection. Symantec recommends that you always allow submissions.
See
About the types of threat protection that Symantec Endpoint Protection
Small Business Edition provides"
You can choose to submit any of the following types of data:
File reputation
Information about the files that are detected based on their reputation. The
information about these files contributes to the Symantec Insight reputation
database to help protect your computers from new and emerging risks.
Managing Virus and Spyware Protection
Managing scans on client computers
Description
You use an Exceptions policy to create exceptions for the
files or the folders that you want Symantec Endpoint
Protection Small Business Edition to exclude from all virus
and spyware scans.
Note:
By default, users on client computers can also create
file and folder exceptions.
For example, you might want to create file exclusions for
an email application inbox.
If the client detects a virus in the Inbox file during an
on-demand or scheduled scan, the client quarantines the
entire inbox. You can create an exception to exclude the
inbox file instead. If the client detects a virus when a user
opens an email message, however, the client still
quarantines or deletes the message.
Virus and spyware scans include a feature that is called
Insight that lets scans skip trusted files. You can choose the
level of trust for the files that you want to skip, or you can
disable the option. If you disable the option, you might
increase scan time.
on page 21.
151

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents