How Symantec Endpoint Protection Small Business Edition Protection Features Work Together - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

170
Managing Virus and Spyware Protection

How Symantec Endpoint Protection Small Business Edition protection features work together

How Symantec Endpoint Protection Small Business
Edition protection features work together
By default, a client computer sends information about reputation detections to
Symantec Security Response for analysis. The information helps to refine Insight's
reputation database. The more clients that submit information the more useful
the reputation database becomes.
You can disable the submission of reputation information. Symantec recommends,
however, that you keep submissions enabled.
Client computers also submit other types of information about detections to
Symantec Security Response.
See
Managing Download Insight detections"
See
How Symantec Endpoint Protection Small Business Edition protection features
work together"
on page 170.
See
Enabling or disabling client submissions to Symantec Security Response"
on page 172.
Some policy features require each other to provide complete protection on
Windows client computers.
Warning: Symantec recommends that you do not disable Insight lookups.
How policy features work together
Table 11-16
Policy Feature
Download Protection
on page 165.
Interoperability Notes
Download Protection is part of Auto-Protect and
gives Symantec Endpoint Protection Small
Business Edition the ability to track URLs. The
URL tracking is required for several policy
features.
If you install Symantec Endpoint Protection Small
Business Edition without Download Protection,
Download Insight has limited capability. Browser
Intrusion Prevention and SONAR require
Download Protection.
The Automatically trust any file downloaded
from an intranet website option also requires
Download Protection.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents