About Submissions Throttling - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

152
Managing Virus and Spyware Protection
Managing scans on client computers

About submissions throttling

Antivirus detections
Information about virus and spyware scan detections.
Antivirus advanced heuristic detections
Information about potential threats that are detected by Bloodhound and other
virus and spyware scan heuristics.
These detections are silent detections that do not appear in the Risk log.
Information about these detections is used for statistical analysis.
SONAR detections
Information about threats that SONAR detects, which include high or low risk
detections, system change events, and suspicious behavior from trusted
applications.
SONAR heuristics
SONAR heuristic detections are silent detections that do not appear in the
Risk log. This information is used for statistical analysis.
On the client, you can also manually submit a sample to Response from the
Quarantine or through the Symantec Web site. To submit a file through the
Symantec Web site, contact Symantec Technical Support.
See
Enabling or disabling client submissions to Symantec Security Response"
on page 172.
See
How Symantec Endpoint Protection Small Business Edition uses reputation
data to make decisions about files"
See
About submissions throttling"
See
About the files and applications that SONAR detects"
Clients may or may not submit samples to Symantec depending on the following
information:
The date of the Submission Data Control file
The percentage of the computers that are allowed to send submissions
Symantec publishes its Submission Control Data (SCD) file and includes it as part
of a LiveUpdate package. Each Symantec product has its own SCD file.
The file controls the following settings:
How many submissions a client can submit in one day
How long to wait before the client software retries submissions
How many times to retry failed submissions
on page 169.
on page 152.
on page 196.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents